Bipartisan Bill Introduced to Combat Election Interference

A group of senators from both the Democratic and Republican parties introduced a bill in Congress in December 2017 that is intended to prevent foreign interference with American elections.

The bill is sponsored by Senator James Lankford, R-Oklahoma, Senator Lindsey Graham, R-South Carolina, Senator Amy Klobuchar, D-Minnesota, and Senator Kamala Harris, D-California. The bill would allocate federal government resources to states and help states identify and prepare for cyberattacks to elections. The sponsors hope to make the legislation law before the 2018 midterm elections.

Foreign Election Interference is a Hot Topic

There is speculation that the Russian government may have interfered with the 2016 US Presidential election. The Department of Homeland Security (DHS) believes that Russian government-connected hackers tried to get into some states’ voter registration systems.

Central Intelligence Agency Director Mike Pompeo, appointed by President Donald Trump, also believes there was Russian interference in the 2012 and previous elections. Pompeo said during an Intelligence and National Security Alliance dinner in 2017, “they’ve been at this a hell of a long time.”

The SAVE Act

The bill introduced in December is similar to another bill which was introduced in Congress on October 31st 2017, the Securing America’s Voting Equipment Act, which was sponsored by Senator Martin Heinrich, D-New Mexico, and Senator Susan Collins, R-Maine.

Heinrich said, “until we set up stronger protections of our election systems and take the necessary steps to prevent future foreign influence campaigns, our nation’s democratic institutions will remain vulnerable.”

Voting Equipment Insecurity

Voting equipment is a significant cyberattack target, and some voting machines have been found to be easy to hack. The DefCon Voting Village last summer featured demonstrations with Diebold ExpressPoll 5000 and WINVote machines. WINVote devices have been found to be notoriously insecure in particular, as Kim Zetter wrote (Read more...)

This is a Security Bloggers Network syndicated blog post authored by Kim Crawley. Read the original post at: Cylance Blog