太子探花

Technical glitch at Iowa caucuses bares voting security concerns

Troy Price
Iowa Democratic Party chairman Troy Price speaks about the delay in Iowa caucus results Tuesday, Feb. 4, 2020, in Des Moines, Iowa. (AP Photo/Charlie Neibergall)

Americans watched in disbelief, glued to their TV sets, smartphones and tablets, on Monday night as the Iowa caucuses, the first official leg of the 2020 presidential race, never even got out of the starting blocks.

A mechanical malfunction with the app used to tally the votes forced a delay of almost 24 hours, until Tuesday night. A predictable wave of speculation about cyber-vulnerabilities swept the nation during the down time.

Finally, Iowa Democratic Party leaders put the gossip to rest with a statement:

As part of our investigation, we determined with certainty that the underlying data collected via the app was sound. While the app was recording data accurately, it was reporting out only partial data. We have determined that this was due to a coding issue in the reporting system. This issue was identified and fixed. The application鈥檚 reporting issue did not impact the ability of precinct chairs to report data accurately.

The glitch could be costly for the Democratic Party, as many supporters鈥 confidence in the voting process seemed shaken.

U.S. intelligence officials, acutely aware that many Americans vividly remember Russia鈥檚 2016 election interference activities, have spent years tracking election threats targeting both the 2018 midterms and this year鈥檚 general election.

They鈥檝e determined that an expansive wave of actors are relentlessly probing vulnerabilities for an opening to alter the outcome of the Nov. 3 election.

Members of Congress who serve on committees that oversee the intelligence community鈥檚 election security efforts believe immediate, strong action has to be taken.

鈥淚f we鈥檝e learned anything, it鈥檚 that securing our elections is an ongoing process, not a one-and-done deal. Because as our security measures get smarter, so do the malicious actors trying to interfere in our democracy,鈥 Sen. Mark Warner, D-Va., vice chair of the Senate Intelligence Committee, said in a statement to WTOP.

Election threat actors have a Plan B

Russia, China and Iran are leading the way in election interference efforts, with hacktivists and even domestic activists not with a nation-state right on their heels. America’s top election security officials say that changing the election results may not be their ultimate goal.

Theft of voter profiles from registration databases is, according to the intelligence community鈥檚 top election security official, is a very likely objective.

鈥淲e could see adversaries interested in that information for what we would consider traditional intelligence and espionage purposes,鈥 said Shelby Pierson, the election threats executive in the Office of the Director of National Intelligence.

In an exclusive interview, Pierson said these actors are also focused on enabling 鈥渕ore focused and more effective targeting of influence campaigns.鈥

Pierson said this information could provide hostile intelligence services the elements they can use against the U.S. later. 鈥淪o, it’s not just about the actual vote-casting. It鈥檚 acquiring valuable demographic data about the American political landscape that then can enable the influence operations.鈥

Influence campaigns or operations are designed to influence the views of targeted individuals or populations on issues.

According to of Russian interference in the 2016 presidential election, influence operations played a key role. In subsequent public statements, intelligence officials pointed out that other nation-states and actors are utilizing influence operations in a variety of ways to probe Americans鈥 thinking.

The dense, data-rich digital environment of 2020, Pierson said, affords adversaries a high level of accuracy, specificity and efficiency in how they look at specific populations in the U.S.

Those groups, sorted demographically, are subject to influence 鈥渢hrough a broad swath of measures, which could include everything from social media to traditional influence,鈥 Pierson said.

Changing vote totals

Another reason adversaries look to run influence campaigns rather than change election outcomes: It鈥檚 easier.

The collective processes of voting, and then tallying and certifying the votes, in a presidential election presents a complex obstacle course of defenses that hackers would have to defeat individually in order to change the outcome of any given election.

鈥淚t is frankly very difficult to do this,鈥 Pierson said, “because of the broad and complicated enterprise across a whole spectrum of state and local jurisdictions that, in aggregate, create the outcome of an election.鈥

Specifically, Pierson said, 鈥淚f you’re an adversary, you have to be able to potentially affect several different milestones of auditability and counting that have been invested in, including even technical sensors that DHS has sponsored on the network.鈥

Pierson points out that 鈥渁t this juncture, we do not have any intelligence information to suggest that adversaries have sought to compromise voting tallies or change voting numbers.鈥

With Election Day still nine months away, the intelligence community expects a variety of threats to emerge, so they will deploy a variety of weapons to disrupt them.

鈥淚t’s frankly a suite of tools鈥 that includes 鈥渙ffensive cyberoperations and defensive measures in terms of cyber-hygiene,鈥 Pierson said.

Another, Warner said, is 鈥渓egislation that sheds light on political ads online, because folks deserve to know who鈥檚 really funding these ads. We also need to make sure that social media platforms are being held responsible for properly handling inauthentic accounts and synthetic content.鈥

Dozens of Democratic and Republican primaries remain. Americans will likely be inundated with political messages on TV and in their inboxes just before they go to the ballot boxes.

Intelligence officials say there鈥檚 one more key tool to stymie voter manipulation and influence operations: a more aware electorate.

J.J. Green

JJ Green is WTOP's National Security Correspondent. He reports daily on security, intelligence, foreign policy, terrorism and cyber developments, and provides regular on-air and online analysis. He is also the host of two podcasts: Target USA and Colors: A Dialogue on Race in America.

Federal 太子探花 Network Logo
Log in to your WTOP account for notifications and alerts customized for you.