Menu
Blog

U.S. Midterm Elections Series: Voting Machine Security

U.S. Midterm Elections Series: Voting Machine Security
8 minute read

The integrity of votes cast in U.S. elections has come under increased scrutiny in recent years, with partisans of both major political parties calling the outcomes of high-visibility races into question over allegedly-flawed processes.1 2 While investigations to date have not yielded evidence of malicious actors decisively altering voter registration records or voting results,3 vulnerable practices and technology have been identified in a number of voting systems. Most identified vulnerabilities can be addressed, if not prevented, through a combination of physical and digital access controls, timely software patching, and consistent “air-gapping” of systems. The security practices of individual states administering election systems are not always evident, however, indicating some vulnerability in the U.S. electoral process as a whole. 

Election systems have numerous sensitive components, including voter registration databases, electronic polling books, voting machines, and ballot scanners. The scope of this report is limited to voting equipment used at polling locations and ballot-counting facilities. The risk under consideration is the likelihood of a malicious actor tampering with the equipment, software, or physical ballots used to cast and record votes so that vote tallies do not correspond with the voters’ selections.

Compromise Through Physical Access

An investigative report conducted by Reuters identified five instances in which staff of various U.S. counties illegally obtained or provided physical access to voting equipment after the 2020 presidential election. Acting on unfounded rumors of falsified vote counts, the suspects in these cases sought or claimed to be preserving evidence of tampering that might have contributed to the election loss of their favored candidate. While these incidents occurred after votes had been certified at the state level and do not appear to have involved attempts to modify vote counts, they demonstrate the potential for equipment to be compromised by actors with approved physical access.

In one of the five cases, a town clerk provided access to a vote tabulator to three men recruited by a woman impersonating a federal elections official. One of the three, a computer technician, reportedly opened the tabulator and unsuccessfully attempted to insert a flash drive into multiple ports in an effort to extract voting data. Although no data was compromised in this intrusion,4 the incident provides a blueprint for a scenario in which skilled actors enter a polling location or counting facility, falsely claim authority to inspect equipment, interfere with systems for casting or counting votes, and modify results.  

At a minimum, onsite voting systems consist of a vote-casting mechanism and a ballot receptacle. Touchscreen voting mechanisms are programmed in advance with the candidate choices for a given precinct (the “ballot definition”) through some form of removable media—often a flash drive.5 Scanners for tallying ballots are sometimes deployed at voting sites as well, and current versions are also programmed through removable media.6 A malicious actor in possession of a flash drive could, in theory, obtain access to a touchscreen voting machine at a voting site under the guise of being an elections official or technician, and insert content capable of altering voters’ selections. An actor would face formidable obstacles in attempting to compromise more recent releases of touchscreen voting devices. The most recent release of the touchscreen ExpressVote system by ES&S, for example, incorporates signed encryption that prevents further interfacing with a device once an election administrator has entered a ballot definition.

However, counties throughout the United States implement a wide range of voting technologies of varying sophistication. In a review conducted by Pennsylvania’s Department of State of an approved voting system currently used in the state, it is unclear whether that system has provisions for enforcing secure access similar to those touted by ES&S for ExpressVote.8 9  

Anecdotal evidence further suggests that voting equipment may be delivered to a site in advance of an election day. Sites used as polling locations include schools, churches, and other facilities that presumably do not meet high security standards and, in many cases, may be easily breached. Such facilities provide a considerable window for in-person compromise by determined actors.  

Sites that use curtains to conceal voters introduce an added source of insecurity, as the activities of such voters cannot be monitored while interacting with voting equipment. Moreover, regulations that forbid curtaining may be lightly enforced at the precinct level. In Georgia, where state policy requires that voters remain visible while casting votes,10 local media has reported at least one instance of a precinct providing curtaining despite the requirement.11 

Compromise Through Online Access

A review of twenty state election policies suggests widespread awareness that strong security practices preclude connecting voting equipment directly to the internet.12 13 Despite this understanding, an election day exception is made by some states for reporting purposes. Some voting machines are equipped with vote tabulators containing embedded or externally-connected modems capable of transmitting unofficial vote tallies over wireless networks to SSH File Transfer Protocol (SFTP) servers housed within non-networked firewalls. These servers then relay the tallies to a centralized election reporting module. When implemented properly, this expedited form of reporting (enabling counties to provide early, provisional results to the public) involves only time-limited networked connections between voting equipment and wireless networks, which are in turn connected to internet infrastructure. Critics argue that these brief windows of connectivity are sufficient for malicious actors to infiltrate voting equipment through the modems and make changes to the voting software that could compromise present or future voter selections.14 15

In 2019, a group of researchers led by Kevin Skoglund, a member of a cybersecurity advisory group for the U.S. Election Assistance Commission,16 identified 35 cases in which both the reporting modules and the centralized election management systems (EMS) configured to these specialized firewalls maintained connections to the SFTP servers after elections had ended, exposing them to the internet for prolonged periods. EMSes often provide the software updates used to program voting machines prior to elections. Exposed in this way, an EMS could potentially be used to distribute malware through flash drives to voting machines. The election modules could be attacked as well and made to report incorrect results. According to Skoglund, county officials notified of these vulnerable connections were surprised—an indication that resources for monitoring sensitive election assets are limited in many cases.17

Major voting technology providers (ES&S, Dominion, and Hart Intercivic) do not describe procedures for providing updates and patches of their software in publicly-accessible documents. To the extent that voting software updates are distributed online to EMS hosts, the possibility of those updates being compromised in a manner similar to the SolarWinds attack of 2021 cannot be discounted.18

Analyst Commentary

Attacks against U.S. election equipment require a combination of skill and resources that is out of reach for most cybercriminals and hackers.  Nation-states hostile to U.S. interests have demonstrated the capability to stage attacks that are broad in scale and highly sophisticated in execution. Given evidence indicating that U.S. election equipment is inconsistently secured, these assets present an attractive target to nation-state actors with an interest in causing discord resulting from election results being questioned. 

Given the multiple vectors through which voting equipment can be compromised, votes recorded and tallied exclusively through electronic means cannot be verified with a high level of confidence. Only a system that includes some form of paper ballot can provide an adequate means of contesting or defending votes suspected of tampering. Such ballots can be optically scanned or hand-counted to verify election results.19 At present, some 67 percent of U.S. counties require voters to provide a hand-cast paper ballot in tandem with a digital vote. Most others provide either a physical ballot that is marked through a Ballot Marking Device (BMD) or a means of casting votes that is recorded electronically using Direct Recording Electronic Systems (DRE) in combination with a printed paper record (a Voter-Verified Paper Audit Trail or VVPAT). Because voters may not take note of digitally-marked or printed ballots that differ from selections made on compromised equipment, hand-cast ballots are more secure.  At present, 5.1 percent of U.S. counties only provide non-verifiable DRE without VVPAT, suggesting a significant level of readiness to contest or defend a compromised election.20

Recommendations

Election officials can ensure the highest level of security for the voting process by requiring voters to present a hand-cast, paper ballot in addition to any electronic casting of votes.

Attempts to compromise election software can be countered by adopting a Zero Trust architecture on election systems, checking all requests for access to resources (such as software updates) against criteria provided by a wide range of sources before granting access. Wireless modems used for early reporting of election results are subject to intrusion and should not be implemented. Additionally, vulnerability scans should be conducted regularly on election systems to ensure there is no connectivity outside the LAN environments in which they are configured. 

1 hXXps://www.bbc[.]com/news/election-us-2020-54959962

2 hXXps://www.axios[.]com/2022/09/30/stacey-abrams-lawsuit-2018-georgia-governors-election

3 hXXps://www.cisa[.]gov/uscert/ncas/current-activity/2022/10/05/fbi-and-cisa-publish-psa-malicious-cyber-activity-against-election

4 hXXps://www.reuters[.]com/investigates/special-report/usa-election-breaches/

5 hXXps://trumpwhitehouse[.]archives.gov/sites/whitehouse.gov/files/docs/pacei-dr-andrew-appel-report.pdf

6 hXXps://www.dos.pa[.]gov/VotingElections/Documents/Voting%20Systems/ClearBallot/ClearVote-20-Secretarys-certification.pdf

7 hXXps://www.essvote[.]com/products/expressvote/

8 hXXps://www.eac[.]gov/voting-equipment/system-certification-process

9 hXXps://www.dos.pa[.]gov/VotingElections/Documents/Voting%20Systems/ClearBallot/ClearVote-20-Secretarys-certification.pdf

10 hXXps://rules.sos.ga[.]gov/gac/183-1-12

11 hXXps://www.11alive[.]com/article/news/politics/elections/voting-machine-curtain/85-836581fe-ebec-492c-a0f5-996e55d3a085

12 hXXps://www.sos.wa[.]gov/elections/election-security.aspx

13 hXXps://dos.myflorida[.]com/elections/voting-systems/about-voting-systems/

14 hXXps://www.nbcnews[.]com/politics/elections/online-vulnerable-experts-find-nearly-three-dozen-u-s-voting-n1112436

15 hXXps://freedom-to-tinker[.]com/2018/02/22/are-voting-machine-modems-truly-divorced-from-the-internet/

16 hxxps://csrcl.huji.ac.il/book/kevin-skoglund

17 hXXps://www.vice[.]com/en/article/3kxzk9/exclusive-critical-us-election-systems-have-been-left-exposed-online-despite-official-denials

18 hXXps://www.darkreading[.]com/edge-articles/3-years-later-solarwinds-ciso-shares-3-lessons-from-the-infamous-attack

19 hXXps://www.cs.princeton[.]edu/~appel/papers/bmd-insecure.pdf

20 hXXps://verifiedvoting[.]org/verifier/#mode/navigate/map/ppEquip/mapType/normal/year/2022

Tags: Cyber TrendsThreat Intelligence

See ZeroFox in action