Election Cyber Security - Considerations for Educational Institutions

David V Creamer, CTO-CISO, St. Petersburg College

David V Creamer, CTO-CISO, St. Petersburg College

Educational institutions must remain vigilant to assist in lowering the risk to our voting process and our democracy

This November, Americans will vote for the future leadership of the country. United States intelligence officials have stated that significant evidence indicates that foreign nation states sought to influence the 2016 elections and are currently working to do the same in the upcoming 2020 elections.  All Americans have a personal role to play to minimize the effect of any such interference in our elections. However, many of us who work at educational institutions may perceive that we have little to do with securing our elections. We indeed have a significant role to play in addressing cyber security vulnerabilities and protecting against threats to our democratic process.

Secured Polling Places

Many educational institutions serve their communities as polling precincts where election officials and the public mix with faculty, staff and students.  With so many different people in close proximity, physical access to voting equipment is difficult to control. During the 2019 DEFCON convention, one of the largest gathering of hackers and cyber security researchers in the world, a “Voting Machine Hacking Village” assembled over 100 voting machine models utilized across the country.  My observations and discussions with those researchers indicated that physical access to voting equipment and local networks by hackers would result in rapidly compromised voting machines potentially affecting vote counts. One of the hacks observed was simply connecting a flash drive to a USB port on a voting machine running Windows, introducing malware and compromising the voting equipment.

Special attention to securing any physical area where voting equipment is stored is extremely important. There should be limited and monitored access to storage areas including a minimal number of keys and the use of camera systems to verify access. If voting equipment is connecting to institutional data networks, those networks will likely require special configuration in order to provide adequate security.

Infrastructure and Accounts Used for Attacks

Hackers view infrastructure at educational institutions as a rich target, as many institutions have very robust internet connectivity and generally less restrictive policies regarding access to external sites. This is especially true in higher education institutions. Compromised computers and network accounts of staff, faculty and students are a springboard for hackers to attack and break into election-related websites of candidates, political parties, Political Action Committees (PACs) and media. The goal in many cases is to alter websites to misinform the public or simply make a website’s election information unavailable.

For institutions who operate TV or radio stations on campus, a compromised account could lead to a mass broadcast of incorrect or unauthorized political content, as seen during the 2016 election cycle.

Compromised accounts can also become sources of foreign nation-state sponsored or opposition sponsored social media misinformation campaigns.

An effective strategy that educational institutions can employ is minimizing the possibility of compromised accounts. Strategies include use of two-factor authentication requiring both a password and code sent to a smart phone in order to access an account. Increase security for campus media outlets such as TV and radio stations during the election cycle, such as staff monitoring of feeds prior to and during voting hours.  Initiate social media monitoring services providing alerts about posted content that is unusual. Staff and faculty should be aware of incident response processes at the institution and be provided security awareness training focusing on email phishing attacks related to election activity.

Encourage Civic Engagement-but Pay Attention

Higher education institutions encourage civic engagement for their students by sponsoring or allowing outside groups to sponsor “get out the vote” campaigns on campus. These include institutional sponsored campaigns like “Turbovote” or granting campus access to non-partisan groups like the League of Women Voters.  Unfortunately, the bad guys are watching this as well. Imitation registration campaigns, both on campus and online, seek to exclude parts or all of the electorate. Misinformation from hackers imitating an educational institution can redirect people trying to register to vote to a fake site eliminating them as a voter.

Institutions should be very aware of all voter registration campaigns on campus and be prepared with responsible policy and the ability to react quickly in cases where abuse occurs. Train campus police or security departments to enforce institution policies regarding voter registration groups. Information technology departments should deploy automated monitoring of access to sponsored websites like “TurboVote” using your institution’s monitoring software tools. This should alert when access becomes unavailable or if a redirect has occurred.

Time is Running Out

While we participate in our nation’s democratic process, work hand in hand with IT security professionals - either from your institution, state or federal government. Both foreign and domestic entities are trying to undermine the American democratic process, not necessarily by hacking the vote, but by destroying the confidence we have in our election process.  Educational institutions must remain vigilant to assist in lowering the risk to our voting process and our democracy.

Check out: Top Security Assessment Solution Companies

Weekly Brief

Read Also

Our AI Crisis isn't Technical. It's Human.

Our AI Crisis isn't Technical. It's Human.

Fatma Mili, Interim Dean of the College of Humanities and Social Sciences, Montclair State University, and Professor of Computer Science, Grand Valley State University
4 Keys to Managing Change

4 Keys to Managing Change

Sten Swenson, Director of Information Technology, North Carolina State University
Active Engagement is the Foundation of Effective Leadership

Active Engagement is the Foundation of Effective Leadership

Amber Pleasant, Program Director of Adult Education and English Language Learning, Aims Community College
Empowering Leadership through Innovation in Higher Education

Empowering Leadership through Innovation in Higher Education

Brian Fodrey, Assistant Vice President, Business Innovation, Carnegie Mellon University
The New Era of Education

The New Era of Education

Yrjö Ojasaar, Investment Partner, Change Ventures
Redefining Readiness: A Path Toward a Technology-Agnostic Future

Redefining Readiness: A Path Toward a Technology-Agnostic Future

Fatma Elshobokshy, Director of the Center for the Advancement of Learning (CAL), University of the District of Columbia