Advertisement

After a quiet election night on the cyber front, officials preach vigilance as results come in

As the nation awaits results, U.S. officials are on alert for disinformation campaigns as well as cheap cyberattacks on websites.
Chris Krebs, Chad Wolf, election, DHS, CISA
Acting Homeland Security Secretary Chad Wolf is briefed on election security in September by CISA Director Chris Krebs. (Department of Homeland Security / Flickr)

After years of preparation from security professionals and election officials, Election Day went down without any significant publicly reported cybersecurity incidents, U.S. officials told reporters Tuesday.

Federal and state officials were on watch for any unusual digital activity, but all in all, it was just “another Tuesday on the internet,” as a senior Cybersecurity and Infrastructure Security Agency official put it. In other words, there were no reports of targeted cyberattacks from U.S. adversaries.

Security experts chalked the smooth operation up to vigilance on the part of officials across the election ecosystem, and the resiliency built into the voting process. Voting machines and electronic pollbooks suffered glitches in certain counties in Georgia and Ohio, but they were technical errors that are to be expected and not caused by anything malicious. Election administrators quickly reverted to paper backups and the voting process carried on.

Officials at the Election Infrastructure Information Sharing and Analysis Center, the threat-sharing hub for election administrators, monitored for malicious cyber activity throughout the day — and will continue to do so as votes are counted. They used sensors deployed on state and local IT networks across the country to watch for anything untoward. But no significant attacks came to pass, according to officials.

Advertisement

“The uncertainty created by the pandemic put election officials and federal agencies like CISA on high alert for many months,” said Eddie Perez, global director of technology development and open standards at the nonprofit Open Source Election Technology Institute. “It appears as if that high state of readiness paid off.”

Now, as the nation waits for results to come in, U.S. officials and security experts are on alert for disinformation campaigns as well as cheap cyberattacks on websites reporting results. Neither category of activity would affect the integrity of the vote, but could be used to try to cast doubt on the results.

“The [potential] attack surface is shifting from the actual voting technology into a different set, and that includes election-night reporting,” the senior CISA official said on a Tuesday night briefing with reporters conducted on background.

The digital calm on election night followed moves by U.S. officials, two weeks earlier, to quickly attribute alleged Iranian and Russian cyber activity.

Alleged Iranian hackers conducted reconnaissance of election-related websites in 10 states, and in at least one case, compromised a voting registration database, U.S. officials said. For their part, suspected Russian government-linked hackers found their way into certain state or local IT networks, but that activity did not appear targeted at election infrastructure, according to officials. There was no evidence, in either case, of voter data being altered or the voting process being affected.

Sean Lyngaas

Written by Sean Lyngaas

Sean Lyngaas is CyberScoop’s Senior Reporter covering the Department of Homeland Security and Congress. He was previously a freelance journalist in West Africa, where he covered everything from a presidential election in Ghana to military mutinies in Ivory Coast for The New York Times. Lyngaas’ reporting also has appeared in The Washington Post, The Economist and the BBC, among other outlets. His investigation of cybersecurity issues in the nuclear sector, backed by a grant from the Pulitzer Center on Crisis Reporting, won plaudits from industrial security experts. He was previously a reporter with Federal Computer Week and, before that, with Smart Grid Today. Sean earned a B.A. in public policy from Duke University and an M.A. in International Relations from The Fletcher School of Law and Diplomacy at Tufts University.

Latest Podcasts