Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesGovernment: Federal, State and Local

Can the voting process be hacked?

By Carnell Council CISSP
Can the voting process be hacked? Yes it can.
September 17, 2020

The term "Kill Chain Methodology" or "Cyber Kill Chain" has been widely used in the world of cybersecurity to interpret the different stages involved in a cyberattack. This term was originally coined by the military to define the steps used by an attacker to reach the intended target (Spitzner, 2019). However, in 2011, Lockheed Martin released an insightful paper on Kill Chain about cybersecurity (Hutchins, Cloppert & Amin, 2011). This article addresses the need to understand each step an adversary takes so that attacks can be disrupted or stopped right in their tracks. In a nutshell, from a hacker's perspective, a kill chain is a way to illegally gain access to a network or network device via a series of progressive steps. Consequently, from a defender's perspective, every stage of this process presents an opportunity to prevent intrusions.

So, what kind of systems, networks or devices can hackers exploit by employing this methodology? The answer is simple: as far your imagination is willing to take you! A recent documentary called “Kill Chain” is predicting that even the 2020 U.S. elections are at risk of falling prey to this methodology.

How can voting processes be targeted?

Here are several ways that cyber attackers can execute Kill Chain target attacks on the voting process:

  • Use baiting to install malicious ballot program: An attacker could easily use baiting techniques or replace legitimate devices with their own infected device (Green, 2019).
  • Infect an election official's device: It is quite easy for an attacker to use a phishing technique to infect an election official's device, gain remote access and tamper with the election ballot program.
  • Create fake election management systems: Election jurisdictions, both large and small, routinely hire privately-owned, small businesses to provide them with election management system technology (Green, 2019). Election jurisdiction budgetary constraints, typically, serve as the primary driver for choosing a small business. In many cases, the same budgetary constraints limit the jurisdiction's ability to perform their due diligence as it pertains to obtaining positive industry references. So, more often than not, these election jurisdictions are unable to attest to the fact that the service offerings or software providers are not hackers, or at a minimum have not been breached themselves. This particular scenario is a formidable kill chain tactic that hackers use to easily fool election jurisdictions into thinking they are buying a legitimate service.
  • Send phishing emails to voters: Absentee and/or vote-by-mail (VBM) deadlines are always posted on elections jurisdiction websites. Immediately after VBM deadlines have passed, attackers could hack into the voter registration systems and send emails out to voters predicting long queues, announce changes in their voting center, or voting center closures (Green, 2019). This might discourage people from going out to vote.

Can voting machines be hacked?

There are two types of voting machines used in the U.S., namely the optical voting machines and direct recording electronic (DRE) machines. The former uses paper ballots, and the DRE records your votes electronically. Some of these machines provide a paper trail, whereas some do not. The good news is that at least 22 states have chosen to use paper ballots for security reasons (Córdova, McCadney, Howard & Norden, 2019). However, the rest of the states are using some semblance of either optical or DRE machines. The issue with these machines is that most of them are over a decade old. Designed in a period when cyberattacks were not so rampant, they carry outdated software and even their providers like Microsoft, are not issuing any updates. This presents a great risk of security vulnerabilities.

Ways in which malicious actors can exploit voting machines:

  • Physically tamper with the device's hardware: This attack is unlikely as it is difficult to go unnoticed while physically tampering with a machine. However, at certain hacking events like DEFCON, voting machines were proven to be exploited by simulated hack attacks (Vicens, 2019). These kinds of machines can also be purchased over eBay, which gives attackers the freedom to study their underlying architecture.
  • Design multiple-use election cards for DRE machines: Normally, one election card is used per voter, but attackers can create fake ones and use them infinitely if given a chance.
  • Remotely access the machines: Most voting machines are not connected to the internet. However, some machines are internet accessible, making them susceptible to attackers who can insert malicious code through remote access (Green, 2019).
  • Connect to the same Wi-Fi network: Since most voting machines have no firewalls or other technical security controls in place to prohibit unauthorized remote access, it can be easy for an attacker to sit in the same room, connect to the public Wi-Fi and run a targeted attack to take over the device.

How can cybersecurity help election jurisdictions limit their risk of exposure?

As the U.S. moves towards digitizing and modernizing its aging and outdated election infrastructure, there has been a growing need for a revolutionized approach to cybersecurity (Brewster, 2019).

The adoption of new technologies has become prevalent among election jurisdictions who have introduced a voter-centered approach to elections that put voters at the center and maximize stakeholder participation. New technologies featured in voter-centered environments include wireless, tablet-based, electronic poll books, and Q.R. code-based ballot-marking devices (Brewster, 2019). While these innovations improve voter experience and increase individual participation in the democratic process, digital-enabled networks and cloud-supported architectures introduce new and unique challenges, particularly in the area of cybersecurity.

Elections jurisdictions should seek out the expertise and advise of a cybersecurity and advisory consulting firm (CACF) to evaluate the staff, technology, processes, and policies involved in the elections process at the county level (Anderson, 2019). A CACF can help local election jurisdictions identify and remediate security vulnerabilities exposed in the nine major election infrastructure components required for a secure, accurate, fair, and accessible election. Assessment results would include feedback and insights that will point out areas where counties will need to fine-tune and enhance current security measures.

The nine major election infrastructure components include:

  • Voter registration and database systems
  • Electronic pollbook/onsite voter registration systems
  • Vote capture devices
  • Vote tally systems (Goldstein, 2019)
  • Election night reporting systems
  • Election officials’ communication mediums
  • State and other county systems that process elections data
  • Traditional and social media communication applications used for situational reporting
  • Vendor election equipment/service architectures

Key benefits of assessing the aforementioned components include reinforcing the local election jurisdictions ability to:

  • Understand the current state of readiness and ability to react to and recover from security events
  • Receive prioritized recommendations toward the use of proper controls and measure needed to reduce attack surfaces
  • Pinpoint crucial security issues and target for prompt remediation

The Verdict

Can the 2020 election be hacked? Yes, the U.S. 2020 elections can be compromised due to lack of funding or legislation, but by the same token, it is also preventable.

A prototypical election cybersecurity program should incorporate the following precepts:

  • Empower an elections jurisdiction to identify and update obsolete operating systems on election business systems.
  • Employ feasible cybersecurity controls and defensive measures based on the Center of Internet Security (CIS) and the National Institute of Standards and Technology (NIST) security framework.
  • Utilize electronic ballot marking devices instead of DREs.
  • Exclusively use paper ballots (Karan Gambhir & Karsten, 2019).
  • Routinely conduct elections cyber-maturity assessments.

The lack of up-to-date software inventories, essential security controls, and other suitable defenses against known attack vectors make up an election jurisdiction's attack surface. Hence, implementing a comprehensive elections cybersecurity program that promotes the use of technical security controls combined with administrative and physical defensive measures can reduce a jurisdiction's attack surface.

Measurable reductions seen in a jurisdiction's attack surface are often parallel to its ability to mitigate vulnerabilities ahead of time, before an adversary (e.g., hostile nation-states, hacking groups, or malicious insiders) can attempt to gain access to their crown-jewel systems and disrupt an election. Therefore, an election jurisdiction's ability to considerably reduce their attack surface over time is synonymous with their security posture. The stronger and more resilient their security posture, the lower the risk is toward a prospective voter-centered approach.

 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Carnell council

Carnell Council, CISSP, is an AT&T Cybersecurity consultant.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • election

    MIT Researchers: Voatz, Voting App, Can Be Hacked

    See More
  • voting election

    It’s time to modernize the voting process

    See More
  • Security Expert Says a Tesla Can Be Hacked in 30 Seconds

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing