Skip to Content

What the DNC Hack Says about Cyber-Based Threats to Democracy

Securing the nation’s election system against hackers is not straightforward, but it starts with keeping voting off the Internet.
August 4, 2016

It’s widely believed that Russian hackers were behind the recent attack on the Democratic National Committee’s e-mail servers. While the consequences of the attack for this year’s presidential election remain to be seen, it’s not hard to imagine how hackers could influence or disrupt our elections—and that could undermine our national stability and security.

That’s why the government should take the advice of security experts who say it must intervene to protect the voting system from cyberthreats.

As Bruce Schneier, a technologist and lecturer at Harvard’s Kennedy School of Government, argued recently in the Washington Post, the government should act quickly in the wake of the DNC hack. “If foreign governments learn they can influence our elections with impunity,” he wrote, “this opens the door to future manipulations, both document thefts and dumps like this one that we see and more subtle manipulations that we don’t see.”

The Secretary of Homeland Security, Jeh Johnson, seems to be listening. On Tuesday he told reporters that he’s considering designating the election system “critical infrastructure,” a move that would require cybersecurity protections for voting machines to be beefed up. Homeland Security coordinates the government’s effort to make sure that our critical infrastructure is resilient and secure from dangers including cyberthreats. There are 16 critical sectors, including finance, energy, and health care.

Adding the voting system to the list would not be straightforward. There is not one system but 9,000 jurisdictions that collect votes, tally them, and report the results. They do this in a wide variety of ways, some using electronic voting machines and others using paper ballots. The good news is that none use Internet-based voting.

Some states that electronically deliver blank absentee ballots have, however, been using the Internet “for the return of voted ballots via e-mail attachments, by digital fax, or through a Web portal,” according to Verified Voting, a group dedicated to safeguarding elections against digital threats.

Schneier notes that in recent years more and more states have adopted electronic voting machines and some “have been flirting” with Internet-based voting, despite repeated warnings against it from him and other security experts. Voting machine manufacturers have “thrown up enough obfuscating babble that election officials are largely mollified,” he writes. Internet voting must not be allowed, he argues, and we must go back to more secure methods, including electronic machines that produce a voter-verified paper trail (not all of them currently do).

As the DNC hack illustrates, it’s not just about voting machines. Hackers could mess things up by taking a variety of different avenues. Some have argued that the Secret Service should also get involved, to protect the cybersecurity of presidential candidates in addition to their physical security.

The DHS did not give specifics about what it would mean if the voting system becomes part of the nation’s critical infrastructure. Hopefully it gets more specific soon: November is just around the corner.

(Read more: Washington Post, Christian Science Monitor, “The States With the Riskiest Voting Technology”)

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

The problem with plug-in hybrids? Their drivers.

Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.

Google DeepMind’s new generative model makes Super Mario–like games from scratch

Genie learns how to control games by watching hours and hours of video. It could help train next-gen robots too.

How scientists traced a mysterious covid case back to six toilets

When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.