[House Hearing, 116 Congress]
[From the U.S. Government Publishing Office]
PREPARING FOR 2020: HOW ILLINOIS IS SECURING ELECTIONS
=======================================================================
FIELD HEARING
before the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED SIXTEENTH CONGRESS
FIRST SESSION
__________
OCTOBER 15, 2019
__________
Serial No. 116-40
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Available via the World Wide Web: http://www.govinfo.gov
__________
U.S. GOVERNMENT PUBLISHING OFFICE
40-456 PDF WASHINGTON : 2020
COMMITTEE ON HOMELAND SECURITY
Bennie G. Thompson, Mississippi, Chairman
Sheila Jackson Lee, Texas Mike Rogers, Alabama
James R. Langevin, Rhode Island Peter T. King, New York
Cedric L. Richmond, Louisiana Michael T. McCaul, Texas
Donald M. Payne, Jr., New Jersey John Katko, New York
Kathleen M. Rice, New York Mark Walker, North Carolina
J. Luis Correa, California Clay Higgins, Louisiana
Xochitl Torres Small, New Mexico Debbie Lesko, Arizona
Max Rose, New York Mark Green, Tennessee
Lauren Underwood, Illinois Van Taylor, Texas
Elissa Slotkin, Michigan John Joyce, Pennsylvania
Emanuel Cleaver, Missouri Dan Crenshaw, Texas
Al Green, Texas Michael Guest, Mississippi
Yvette D. Clarke, New York Dan Bishop, North Carolina
Dina Titus, Nevada
Bonnie Watson Coleman, New Jersey
Nanette Diaz Barragan, California
Val Butler Demings, Florida
Hope Goins, Staff Director
Chris Vieson, Minority Staff Director
C O N T E N T S
----------
Page
Statements
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Chairman, Committee on
Homeland Security:
Oral Statement................................................. 1
Prepared Statement............................................. 3
The Honorable Lauren Underwood, a Representative in Congress From
the State of Illinois:
Oral Statement................................................. 3
Prepared Statement............................................. 5
Witnesses
Mr. Matt Masterson, Senior Cybersecurity Advisor, Cybersecurity
and Infrastructure Security Agency, Department of Homeland
Security:
Oral Statement................................................. 7
Prepared Statement............................................. 9
Mr. Steven S. Sandvoss, Executive Director, Illinois Board of
Elections:
Oral Statement................................................. 14
Prepared Statement............................................. 16
Ms. Robin M. O'Connor, Clerk, Lake County, Illinois:
Oral Statement................................................. 18
Prepared Statement............................................. 19
Ms. Elizabeth L. Howard, Counsel, Democracy Program, Brennan
Center for Justice:
Oral Statement................................................. 20
Prepared Statement............................................. 22
PREPARING FOR 2020: HOW ILLINOIS IS SECURING ELECTIONS
----------
Tuesday, October 15, 2019
U.S. House of Representatives,
Committee on Homeland Security,
Gurnee, IL.
The committee met, pursuant to notice, at 10:08 a.m., in
the Village of Gurnee Council Chambers, Gurnee Village Hall,
325 N. O'Plaine Road, Gurnee, Illinois, Hon. Bennie G. Thompson
(Chairman of the committee) presiding.
Present: Representatives Thompson and Underwood.
Also present: Representative Casten.
Chairman Thompson. The Committee on Homeland Security will
come to order.
I ask unanimous consent that Mr. Casten be permitted to
participate in today's hearing. Without objection.
Good morning. Let me apologize for my accent. I am from
Mississippi.
[Laughter.]
Chairman Thompson. It gives everybody consternation because
they say I haven't heard somebody talk like that in a long
time. So trust me, the speed of my voice has nothing to do with
my brain.
[Laughter.]
Chairman Thompson. I am absolutely proud to be here. As I
said to Congresswoman Underwood earlier, I spent the summers of
my college education in Chicago, Illinois working because that
is how I was able to finance my college education in
Mississippi because Illinois paid far better wages than
Mississippi.
So I have come back and I thank you for making me what I am
today because of your generosity.
But I would also like to thank Chairman--Vice Chair
Underwood for inviting committee Members to Illinois to hear
State and local perspectives on election security.
Since she arrived in Congress in January, the Vice Chair
has demonstrated a strong commitment to raising the bar on
Federal efforts to improve election security at the State and
local level.
Too often well-intentioned officials in Washington do not
have a complete understanding of how the Federal Government can
best assist State and local officials in their mission.
But Ms. Underwood has fought to make sure that the boots on
the ground have the resources they need and a seat at the
table, which is why we are having this field hearing today.
The Vice Chair has been a valued leader on the Homeland
Security Committee, and on election security in particular I
want to thank her for her continued efforts to hold the folks
in Washington accountable on behalf of her constituents.
Election security requires a whole-of-government approach--
Federal, State, and local--effort to protect America's
elections. It is a National security issue that transcends
party politics and reaches into the heart of our democracy.
As we approach the 2020 elections it is critical that we
work together to protect democracy's most sacred tradition:
Free and fair elections.
Last Congress, I co-chaired the Congressional Task Force on
Election Security and met with election security experts, State
election officials, and National security experts to assess
vulnerabilities in election infrastructure and determine how to
address them.
The task force published a report in February 2018 that
included 10 recommendations and introduced legislation to
implement them.
That legislation, Election Security Act, was included in
H.R. 1, the For the People Act, which passed the House in March
of this year.
Unfortunately, the Senate has yet to act on that or any
other meaningful election security legislation. Nevertheless,
since 2016 progress has been made toward more secure elections
at State and local levels.
The Department of Homeland Security and Election Assistance
Commission have built stronger, more effective partnerships
with State and local officials.
States like Illinois are at the forefront of that effort
and have led the way. From improvements in the Illinois Century
Network to the Cyber Navigator Program, the State has made
smart investments in election security capabilities that makes
it harder for adversaries to meddle in the 2020 elections.
But continued election security efforts cost money and I
imagine that State and local election officials here struggle
with the same budget demands as their counterparts do in my
district in Mississippi.
That is why I am glad to be here today to learn from all of
you what you need from us to help you continue the important
work you do to secure elections. The Federal Government,
especially Congress, must understand the resource constraints
of local election officials and partner with them to address
vulnerabilities to election infrastructure through grants and
services.
Local election officials are on the front line of securing
our elections and your success depends on the resources and
support you receive from Federal and State government.
The intelligence community has made clear the threats to
our elections persist. Acting Director of National Intelligence
Joseph Maguire told Congress that we should expect adversaries
and strategic competitors to refine their capabilities and add
new tactics as they learn from each other's experiences in
advance of the 2020 elections.
I look forward to hearing from our panel of witnesses today
about how Illinois is leading the way in securing their
election critical infrastructure and how Congress and Federal
agencies can support these efforts to further strengthen our
elections and protect them from another attack.
Before I close, I would like to thank the good people of
Gurnee Village Hall for hosting today's hearing.
[The statement of Chairman Thompson follows:]
Statement of Chairman Bennie G. Thompson
October 15, 2019
I would like to thank the committee's Vice Chair, Ms. Underwood,
for inviting committee Members to Illinois to hear State and local
perspectives on election security. Since she arrived in Congress in
January, the Vice Chair has demonstrated a strong commitment to raising
the bar on Federal efforts to improve election security at the State
and local level. Too often, well-intentioned officials in Washington do
not have a complete understanding of how the Federal Government can
best assist State and local officials in their mission. But Ms.
Underwood has fought to make sure the boots on the ground have the
resources they need and a seat at the table, which is why we are having
this field hearing today. The Vice Chair has been a valued leader on
the Homeland Security Committee, and on election security in
particular, and I want to thank her for her continued efforts to hold
the folks in Washington accountable on behalf of her constituents.
Election security requires a whole-of-government, Federal, State,
and local, effort to protect America's elections. It is a National
security issue that transcends party politics and reaches to the heart
of our democracy. As we approach the 2020 election, it is critical that
we work together to protect democracy's most sacred tradition: Free and
fair elections. Last Congress, I co-chaired the Congressional Task
Force on Election Security, and met with election security experts,
State election officials, and National security experts to assess
vulnerabilities in election infrastructure and determine how to address
them. The Task Force published a report in February 2018 that included
10 recommendations and introduced legislation to implement them. That
legislation, the Election Security Act, was included in H.R. 1, the For
the People Act, which passed the House in March of this year.
Unfortunately, the Senate has yet to act on that or any other
meaningful election security legislation.
Nevertheless, since 2016, progress has been made toward more secure
elections at the State and local level. The Department of Homeland
Security and Election Assistance Commission (EAC) have built stronger,
more effective partnerships with State and local election officials.
And States like Illinois are at the forefront of that effort and have
led the way. From improvements to the Illinois Century Network to the
Cyber Navigator Program, the State has made smart investments in
election security capabilities that make it harder for adversaries to
meddle in the 2020 election. But continued election security efforts
cost money, and I imagine that State and local election officials here
struggle with the same budget demands as their counterparts in my
District in Mississippi. That is why I am glad to be here today to
learn from all of you what you need from us to help you continue the
important work you do to secure elections. The Federal Government--
especially Congress--must understand the resource constraints of local
election officials and partner with them to address vulnerabilities to
election infrastructure though grants and services.
Local election officials are on the front lines of securing our
elections, and your success depends on the resources and support you
receive from Federal and State governments. The intelligence community
has made clear the threats to our elections persist. Acting Director of
National Intelligence, Joseph Maguire, told Congress that we should
expect ``adversaries and strategic competitors to refine their
capabilities and add new tactics as they learn from each other's
experiences'' in advance of the 2020 elections. I look forward to
hearing from our panel of witnesses today about how Illinois is leading
the way and securing their critical election infrastructure, and how
Congress and Federal agencies can support these efforts to further
strengthen our elections and protect them from another attack.
Chairman Thompson. With that, I yield back the balance of
my time and I now recognize the Vice Chair of the full
committee, the gentlewoman from Illinois, Ms. Underwood, for an
opening statement.
Ms. Underwood. Thank you, Mr. Chairman.
Good morning. Thank you all so much for being here with us
today. As Vice Chair of the House Committee on Homeland
Security, I am so thrilled that you joined us as we gaveled in
this committee's first-ever hearing in the Illinois 14th
Congressional District.
I would like to also thank the village of Gurnee for
hosting the committee's hearing today and my colleague,
Congressman Casten, for taking part in the hearing. Thank you.
I would also like to thank Chairman Thompson for holding
this hearing and joining us all the way from Mississippi, and
thank you to the panel of experts who--and public servants
assembled here today. I appreciate the important work that you
do and I look forward to hearing from each of you.
I would also like to acknowledge the Members of our
community who have made time to join us for this important
conversation and an extra special thank you to Mr. Jacob
Carlton and his AP Government students that are here from Zion-
Benton Township High School. Thank you for being here today.
In February of this past year, this committee, led by
Chairman Thompson, held its first hearing of the 116th Congress
on defending our democracy by protecting and security our
Nation's elections.
U.S. intelligence officials have confirmed that there was
foreign interference in the 2016 elections. In Illinois, this
resulted in foreign actors accessing the records of 76,000
Illinois voters.
Since then, State and local election officials have been
working hard to improve election systems and infrastructure.
But due to limited resources, some have faced challenges to
upgrading legacy machines and bringing on additional
cybersecurity personnel.
Congress has recognized the challenges that come with
improving decades-old infrastructure and have provided critical
funding and assistance to States since our State was hacked in
2016.
Here in Illinois, State and local election officials have
worked together to implement a world class Cyber Navigator
Program to help the State improve its cybersecurity posture and
to mitigate future attacks.
This program has allowed our State to hire additional
cybersecurity personnel to facilitate information sharing and
provide guidance on best practices to each of the 108 election
authorities in Illinois.
The Cyber Navigator Program is a valuable tool for the
election officials here in Illinois and it is my hope that
programs such as this can serve as models for other States.
In addition to the funding provided by Congress, this
committee has made election security a priority and has put
forward tough broad policies to secure our elections.
I am proud that these policies were included in H.R. 1, the
For the People Act, which we passed in the House in March.
This is an important package of reforms because it seeks to
restore integrity in our Government and ensure that each and
every American can fully participate in our democracy.
Specifically, it helps protect U.S. elections by improving
voting system security by requiring the Department of Homeland
Security to maintain election systems as critical
infrastructure.
It also requires regular testing of voting systems and
provides much-needed resources for States to conduct post-
election audits and upgrade legacy election systems.
I was also proud to support the fiscal year 2020 House
Appropriations package which included $600 million for the
Election Assistance Commission to distribute election security
grants to bolster State election security efforts.
These two House-passed measures go a long way to help
districts like this one, which is operating under a constrained
budget while trying to do the absolute most to ensure the
integrity of our elections.
Now, the 2020 election is right around the corner and
adversaries are already working to interfere. We don't have
time to wait. The Senate should immediately pass legislation to
strengthen our election security.
As the Chairman stated in our previous election security
committee hearing, we have made great strides since 2016. But
we must remain vigilant against bad actors working to undermine
the beacon of American democracy.
I hope our discussion today will provide this committee and
the public with valuable information and resources and
assistance in preparation for the upcoming elections in 2020.
The integrity of our elections is essential to the
preservation of our republic and it is our patriotic duty as
Americans and my sacred duty as someone elected to represent
this beautiful community, the Illinois 14th, to ensure that our
elections are free from foreign interference.
I look forward to hearing from the witnesses today on the
progress that has been made here in Illinois, what additional
work we can do to support our State and local election
officials, and how we can help other States use Illinois'
success as a model for their own programs.
Thank you again for being here today. I am looking forward
to an educational and productive hearing, and I yield back.
[The statement of Honorable Underwood follows:]
Statement of Honorable Lauren Underwood
October 15, 2019
Good morning, welcome, and thank you all so much for being here
today!
As vice chair of the House Committee on Homeland Security, I am so
thrilled you joined us as we gavel in this committee's first-ever
hearing in Illinois's 14th Congressional District.
I would like to thank the Village of Gurnee for hosting the
committee's hearing today and my colleague, Representative Casten, for
taking part in today's hearing.
I would also like to thank Chairman Thompson for holding this
hearing and for joining us all the way from Mississippi.
Thank you to the panel of experts and public servants assembled
today. I appreciate the important work you do, and I look forward to
hearing from each of you.
I would also like to acknowledge the members of our community who
have made time to join us for this important conversation . . . and a
special thank you to Mr. Jacob Carlson and his AP Government students
from Zion Benton Township High School for being here today.
In February of this year, this committee, led by Chairman Thompson,
held its first hearing of the 116th Congress on defending our democracy
by protecting and securing our Nation's elections.
U.S. intelligence officials have confirmed there was foreign
interference in the 2016 elections. In Illinois, this resulted in
foreign actors accessing the records of 76,000 Illinois voters.
Since then, State and local election officials have been working
hard to improve election systems and infrastructure, but due to limited
resources, some have faced challenges in upgrading legacy machines and
additional hiring of cybersecurity personnel.
Congress has recognized the challenges that come with improving
decades-old election infrastructure and has provided critical funding
and assistance to States since our State was hacked in 2016.
Here in Illinois, State and local election officials have worked
together to implement the world-class Cyber Navigator Program to help
the State improve its cybersecurity posture and mitigate future
attacks.
This program has allowed the State to hire additional cybersecurity
personnel to facilitate information sharing and provide guidance on
best practices to each of the 108 election authorities in Illinois.
The Cyber Navigator Program is a valuable tool for the election
officials in my State, and it is my hope that programs such as this one
can serve as a model for other States.
In addition to funding provided by Congress, this committee has
made election security a priority and has put forward tough, broad
policies to secure our elections. I'm proud that these policies are
included in H.R. 1, the For the People Act, which we passed in the
House in March of this year.
This is an important package of reforms because it seeks to restore
integrity in Government and ensure each and every American can fully
participate in our democracy.
Specifically, it helps protect U.S. elections by improving voting
system security by requiring the Department of Homeland Security to
maintain election systems as critical infrastructure, require regular
testing of voting systems, and provide resources for States to conduct
post-election audits and upgrade legacy election systems.
I also was proud to support the fiscal year 2020 House
appropriations package, which included $600 million for the Election
Assistance Commission to distribute Election Security Grants to bolster
State election security efforts.
These 2 House-passed measures go a long way to help districts like
this one, which is operating under constrained budgets while trying to
do the absolute most to ensure the integrity of our elections.
The election is right around the corner and adversaries are already
working to interfere. We do not have time to wait. The Senate should
immediately pass legislation to strengthen our election security.
As the Chairman stated in our previous election security committee
hearing, we have made great strides since 2016, but we must remain
vigilant against bad actors working to undermine the beacon of American
democracy.
I hope our discussion today will provide this committee and the
public with valuable resources and assistance in preparation for the
upcoming elections in 2020.
The integrity of our elections is essential to the preservation of
our republic, and it is our patriotic duty as Americans, and my sacred
duty as someone elected to represent this community, to ensure our
elections are free from foreign interference.
I look forward to hearing from the witnesses today on the progress
that has been made in Illinois, what additional work we can do to
support our State and local election officials, and how we can help
other States use Illinois's successes as a model for their own
programs.
Thank you again to everyone for being here today--I'm looking
forward to an educational and productive hearing.
Chairman Thompson. I thank the gentlewoman.
Other Members of the committee are reminded that under the
committee rules opening statements may be submitted for the
record.
I would like to extend a welcome to our witnesses.
Mr. Matthew Masterson is a senior advisor on election
security at the Cybersecurity and Infrastructure Security
Agency at the Department of Homeland Security, commonly
referred to as CISA. Prior to that, he served as chairman of
the Election Assistance Commission.
Mr. Steve Sandvoss, executive director of the Illinois
Board of Elections, Mr. Sandvoss previously served as the Board
of Elections' general counsel and has worked for the State
Board of Elections for over 30 years. Congratulations.
Ms. Robin O'Connor is a clerk for Lake County, Illinois.
Ms. O'Connor has been in public service for nearly 13 years.
Thank you.
Finally, Ms. Elizabeth Howard is counsel for the Brennan
Center for Justice's Democracy Program. Ms. Howard focuses her
work on cybersecurity in elections.
Prior to that, Ms. Howard served as deputy commissioner for
the Virginia Department of Elections.
Without objections, the witnesses' full statement will be
inserted in the record. I now ask each witness to summarize his
or her statement for 5 minutes, beginning with Mr. Masterson.
STATEMENT OF MATT MASTERSON, SENIOR CYBERSECURITY ADVISOR,
CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY, DEPARTMENT OF
HOMELAND SECURITY
Mr. Masterson. Thank you, Chairman Thompson, Vice Chair
Underwood, Congressman Casten.
Good morning and thank you for the opportunity to testify
regarding the Department of Homeland Security's efforts to help
secure our election infrastructure in Illinois and across this
country.
My name is Matt Masterson. I am the election security lead
for DHS and the previous chair of the U.S. Election Assistance
Commission as well as election official in the State of Ohio.
The Department of Homeland Security's Cybersecurity and
Infrastructure Security Agency, or CISA, has a strong
relationship with State and local officials in Illinois.
The Department regularly engages with Illinois State
Election Task Force on Training, assessment requests, and
information sharing, and today I want to commend the 108
Illinois election districts and the State of Illinois for
becoming members of the Election Infrastructure, Information
Sharing and Analysis Center, or EIISAC.
In doing so, all election districts in Illinois are part of
a robust community sharing actionable information and valuable
alerts and warnings.
I also want to commend Illinois' successful Cyber Navigator
Program that has been mentioned, which is truly a model for the
rest of the country to follow.
Our progress in working with Illinois is reflective of our
progress with the election community across the country. CISA's
mission is clear, to support election officials and their
private-sector partners to manage--to identify and manage risk
to their systems, help them manage a response within the
existing constitution and election traditions.
Elections are run at the State and local level by dedicated
professionals across America's more than 8,800 election
jurisdictions. But those officials shouldn't have to defend
themselves from sophisticated and persistent threats on their
own.
Since 2016, we at CISA have learned a lot. Over the last 2
years we have worked tirelessly to strengthen our partnership
with the election community.
For the 2020 election we are already providing voluntary
resources and services to all 50 States, over 2,000 local
jurisdictions, 6 election associations, and 12 election
vendors.
Our approach is threefold: No. 1, making sure the election
community has the information they need to defend their
systems; No. 2, making sure they have the technical support and
tools they need to manage risk to their systems; and No. 3,
building enduring partnerships to advance security efforts
together.
CISA is focused on building scalable repeatable mechanisms
to dramatically grow our information-sharing capabilities.
We share contextualized threat intelligence and actual
information through the EIISAC with our close partners in the
intelligence community and law enforcement and private sector.
More importantly, State and local officials across the
country are sharing what they are seeing on their networks and
on their systems with us.
We have deployed intrusion detection capabilities, or
Albert sensors, to provide real-time detection capabilities of
malicious activity on election infrastructure across all 50
States.
Second, we provide technical support and services to
election officials and their vendors. Initially, we offered the
standard services including vulnerability assessments that we
offer to other Federal agencies and critical infrastructure
partners.
As we refined our understanding of election officials'
requirements, we shifted capabilities that are quicker, less
intrusive, and can scale to more jurisdictions.
For instance, in 2018 and in 2019 we deployed a remote
penetration testing capability thanks in part to the funding
that Congress provided to us to allow for remote penetration of
election systems, allowing us to identify risks and
vulnerabilities in election systems without having to deploy
teams into local election offices, interrupting both their time
and people.
This scalability is critical because while our initial
efforts in 2018 were primarily targeted at State election
officials, we recognize the need to increase our support to
counties and municipalities who operate elections as well.
Our Last Mile Initiative seeks to provide information
customized to local county election officials. This initiative
provides no-cost tailored information on cyber risks and a
checklist of cybersecurity action items specific to them.
The final area of focus has been on building enduring
partnerships toward collective defense. It may seem mundane,
but governance, communications, coordination, training, and
planning are critical foundational elements of our efforts to
secure the Nation's elections.
We are clear-eyed that the threat to our democratic
institutions remain and we must continue to press for increased
security and resilience of our election systems.
For the 2020 election cycle, CISA has built off the lessons
learned form 2018 and we are working to prioritize the
following lines of effort.
No. 1, CISA is focused on expanding engagement at the local
level. We continue to work with election officials to improve
both their and our understanding of risks to election systems.
For instance, in June of this year we did our second annual
tabletop vote exercise where 47 States, thousands of local
officials, private sector, and the Federal Government worked
together to work through scenarios, share information, and
understand how we would respond collectively to threats to our
election infrastructure.
No. 2, CISA has expanded our level of engagement and
sharing of best cybersecurity practices with political
organizations, including the DNC and RNC.
CISA recently joined the FBI and ODNI in offering briefings
to Presidential campaigns registered with the FEC and is
engaged directly with Presidential campaigns to offer services
and share information.
No. 3, CISA, in coordination with our interagency partners,
is committed to helping Americans recognize and avoid foreign
disinformation operations impacting our elections.
Through innovative efforts like the war on pineapple
campaign we were educated on the--we educated on the tactics of
foreign influence using a topic everyone can relate to, the
divisive issue of pineapple on pizza.
DHS is also working closely with the intelligence community
to increase the quantity, quality, and timeliness of
intelligence and analysis production at the Unclassified level
to help election officials and the public identify foreign
influence information.
We at CISA are committed to working with Congress to ensure
our efforts cultivate a safer, more secure and resilient
election.
Once again, thank you for the opportunity to appear before
you and I look forward to your questions today.
Thank you very much for the time.
[The prepared statement of Mr. Masterson follows:]
Prepared Statement of Matthew Masterson
October 15, 2019
Chairman Thompson, Congresswoman Underwood, and Members of the
committee, thank you for the opportunity to testify regarding the U.S.
Department of Homeland Security's (DHS) progress in reducing and
mitigating risks to our Nation's election infrastructure. DHS has
worked to establish trust-based partnerships with State and local
officials who administer our elections, as well as political parties
and campaigns, and I look forward to sharing with you an update on our
work during the 2018 midterm elections and our priorities through the
2020 election cycle.
Leading up to the 2018 midterms, DHS worked hand-in-hand with
Federal partners, State and local election officials, and private-
sector vendors to provide them with information and capabilities to
enable them to better defend their infrastructure. On the Federal
level, DHS has coordinated closely with the Federal Bureau of
Investigation (FBI), the Office of the Director of National
Intelligence (ODNI), and Department of Defense (DOD) on these efforts.
This partnership led to a successful model that we aim to continue and
improve upon in the 2020 election cycle.
Since 2016, DHS's Cybersecurity and Infrastructure Security Agency
(CISA) has led a voluntary partnership of Federal Government and
election officials who regularly share cybersecurity risk information.
CISA has engaged directly with election officials--coordinating
requests for assistance, risk mitigation, information sharing, and
incident response. To ensure a coordinated approach to assisting
election officials protect the election infrastructure they manage,
CISA has convened stakeholders from across the Federal Government
through CISA's Election Security Initiative.
CISA and the Election Assistance Commission (EAC) have convened
Federal Government and election officials regularly to share
cybersecurity risk information and to determine an effective means of
assistance. Since 2017, the Election Infrastructure Subsector (EIS)
Government Coordinating Council (GCC) has worked to establish goals and
objectives, to develop plans for the EIS partnership, and to create an
EIS Sector-Specific Plan. Participation in the council is voluntary and
does not change the fundamental role of State and local jurisdictions
in overseeing elections.
CISA and the EAC have also worked with election equipment and
service vendors to launch, in 2017, an industry-led Sector Coordinating
Council (SCC), a self-organized, self-run, and self-governed council
with industry leadership designated by SCC members. The SCC serves as
the industry's principal entity for coordinating with the Federal
Government on critical infrastructure security activities related to
sector-specific strategies. This collaboration is conducted under
CISA's authority to provide a forum in which Federal and private-sector
entities can jointly engage in a broad spectrum of activities to
coordinate critical infrastructure security and resilience efforts,
which is used in each of the critical infrastructure sectors
established under Presidential Policy Directive 21, Critical
Infrastructure Security and Resilience. The SCC has helped CISA further
its understanding of the systems, processes, and relationships
particular to operation of the EIS.
Within the context of today's hearing, I will address our efforts
in 2018 to help enhance the security of elections that are administered
by jurisdictions around the country, along with our election-related
priorities through 2020. While there was activity targeting our
election infrastructure leading up to the midterms, this activity was
consistent with typical malicious activity targeting networked IT
systems. DHS along with the Department of Justice (DOJ), ``concluded
that there is no evidence to date that any identified activities of a
foreign government or foreign agent had a material impact on the
integrity or security of election infrastructure or political/campaign
infrastructure used in the 2018 midterm elections used for the U.S.
Congress.''\1\
---------------------------------------------------------------------------
\1\ ``Acting Attorney General and Secretary of Homeland Security
Submit Joint Report on Impact of Foreign Interference on Election and
Political/Campaign Infrastructure in 2018 Elections.'' February 5,
2019. Retrieved from: https://www.dhs.gov/cisa/news/2019/02/05/acting-
attorney-general-and-secretary-homeland-security-submit-joint-report.
---------------------------------------------------------------------------
assessing the threat
The Department, with and through DHS's Office of Intelligence and
Analysis, regularly coordinates with the intelligence community and law
enforcement partners on potential threats to the homeland. Among non-
Federal partners, DHS has engaged with State and local officials, as
well as relevant private-sector entities, to assess the scale and scope
of malicious cyber activity potentially targeting election
infrastructure in the United States. Election infrastructure includes
the information and communications technology, capabilities, physical
assets, and technologies that enable the registration and validation of
voters; the casting, transmission, tabulation, and reporting of votes;
and the certification, auditing, and verification of elections. Since
2016, State and local election offices and their private-sector
partners have robustly shared information with DHS regarding activity
targeting their systems. As with all networked IT systems, officials
are seeing scanning and probing of their networks on a daily basis.
Election infrastructure is a target for nation-state and non-state
actors seeking access to systems containing sensitive data or what they
perceive to be valuable information. DHS and our intelligence community
(IC) partners continue to assess that the 2020 election remains a
likely cyber and influence target for our adversaries. In short, the
threat to our elections remains and it is incumbent on all levels of
government to work together to respond.
enhancing security
During the 2018 midterms, CISA provided a coordinated response from
DHS and its Federal partners to plan for, prepare for, and mitigate
risk to election infrastructure. Working with election infrastructure
stakeholders was essential to ensuring a more secure election. CISA and
our stakeholders increased awareness of potential vulnerabilities and
provided capabilities to enhance the security of U.S. election
infrastructure, and shared best practices with other nations facing
similar threats.
Election officials across the country have a long-standing history
of working both individually and collectively to reduce risks and
ensure the integrity of their elections. In partnering with these
officials through both new and on-going engagements, CISA will continue
to provide free, voluntary, prioritized services to support their
efforts to secure elections in the 2020 election cycle.
improving coordination with state, local, tribal, territorial, and
private-sector partners
Increasingly, the Nation's election infrastructure leverages
information technology for efficiency and convenience, but also exposes
systems to cybersecurity risks, just like in any other enterprise
environment. Similar to other sectors, CISA helps systems owners and
operators in Federal departments and agencies, State, local, Tribal,
and territorial (SLTT) governments, and the private sector to manage
these cybersecurity risks. Consistent with our long-standing
partnerships with State and local governments, we have been working
with election officials to share information about cybersecurity risks,
and to provide voluntary resources and technical assistance to manage
those risks.
working with the ei-isac
CISA works with the Elections Infrastructure Information Sharing
and Analysis Center (EI-ISAC) to provide threat and vulnerability
information to State and local officials. Through funding by CISA, the
Center for Internet Security created and continues to operate the EI-
ISAC. The EI-ISAC has representatives co-located with CISA's operations
center to enable regular collaboration and access to information and
services for election officials.
providing technical assistance and sharing information
Knowing what to do when a security incident happens--whether
physical or cyber--before it happens is critical. CISA supports
election officials with incident response planning including
participating in exercises and reviewing incident response playbooks.
Crisis communications is a core component of these efforts, ensuring
officials are able to communicate transparently and authoritatively
when an incident unfolds. In some cases, we do this directly with State
and local jurisdictions. In others, we partner with outside
organizations. We recognize that securing our Nation's systems is a
shared responsibility, and we are leveraging partnerships to advance
that mission. CISA actively promotes a range of services including:
Cyber hygiene service for internet-facing systems.--Through this
automated, remote scan, CISA provides a weekly report identifying
vulnerabilities and mitigation recommendations to improve the
cybersecurity of systems connected to the internet, such as on-line
voter registration systems, election night reporting systems, and other
internet-connected election management systems.
Risk and vulnerability assessments (both on-site and remote).--We
have prioritized State and local election systems upon request, and
increased the availability of risk and vulnerability assessments. These
in-depth, on-site or remote evaluations include a system-wide
understanding of vulnerabilities, focused on both internal and external
systems. We provide a full report of vulnerabilities and recommended
mitigations following the testing.
Incident response assistance.--We encourage election officials to
report suspected malicious cyber activity to CISA. Upon request, the
CISA can provide assistance in identifying and remediating a cyber
incident. Information reported to CISA is also critical to the Federal
Government's ability to broadly assess malicious attempts to infiltrate
election systems. This technical information will also be shared with
other State officials so they have the ability to defend their own
systems from similar malicious activity.
Information sharing.--CISA maintains numerous platforms and
services to share relevant information on cyber incidents. Election
officials may also receive information directly from CISA. CISA also
works with the EI-ISAC, allowing election officials to connect with the
EI-ISAC or their State Chief Information Officer to rapidly receive
information they can use to protect their systems. Best practices,
cyber threat information, and technical indicators, some of which had
been previously Classified, have been shared with election officials in
thousands of State and local jurisdictions. CISA incorporates privacy
and civil liberties considerations and protections into the design of
all its activities. Information sharing and use of cybersecurity threat
indicators, or information related to cybersecurity risks and incidents
complies with applicable lawful restrictions on its collection and use
and with Federal and DHS policies protective of privacy and civil
liberties.
Classified information sharing.--To most effectively share
information with all of our partners--not just those with security
clearances--DHS and its Office of Intelligence and Analysis (I&A) work
with the intelligence community to rapidly declassify relevant
intelligence or provide as much intelligence as possible at the lowest
classification level possible. While DHS prioritizes declassifying
information to the greatest extent possible, DHS also provides
Classified information to cleared stakeholders, as appropriate. DHS has
been working with State chief election officials and additional
election staff in each State to provide them with security clearances.
These clearances have helped enable I&A and the intelligence community
to deliver a number of Classified in-person and secure video
teleconferences for a broad audience of State and local elections
officials, in the lead-up to the 2018 midterms and into 2019.
Field-based cybersecurity advisors and protective security
advisors.--CISA has cybersecurity and protective security personnel
available to provide actionable information and connect election
officials to a range of tools and resources to improve the
cybersecurity preparedness of election systems, and to secure the
physical site security of voting machine storage and polling places.
These advisors are also available to assist with planning and incident
management for both cyber and physical incidents.
Physical and protective security tools, training, and resources.--
CISA provides guidance and tools to improve the security of polling
sites and other physical election infrastructure. This guidance can be
found at www.dhs.gov/hometown-security. This guidance helps to train
administrative and volunteer staff on identifying and reporting
suspicious activities, active-shooter scenarios, and what to do if they
suspect an improvised explosive device.
election security efforts leading up to the 2018 mid-terms
In the weeks leading up to the 2018 midterm elections, CISA
officials supported a high degree of preparedness Nation-wide. CISA
provided free technical cybersecurity assistance, continuous
information sharing, and expertise to election offices and campaigns.
All 50 States, over 1,500 local and territorial election offices, 6
election associations, and 12 election venders were engaged in
information sharing and receipt of assistance from EI-ISAC.
In August 2018, CISA hosted a ``Tabletop the Vote'' exercise, a 3-
day, first-of-its-kind exercise to assist our Federal partners, State
and local election officials, and private-sector vendors in identifying
best practices and areas for improvement in cyber incident planning,
preparedness, identification, response, and recovery. Through tabletop
simulation of a realistic incident scenario, exercise participants
discussed and explored potential impacts to voter confidence, voting
operations, and the integrity of elections. Partners for this exercise
included 44 States and the District of Columbia; EAC; Department of
Defense, including the Office of the Secretary of Defense, U.S. Cyber
Command, and the National Security Agency; DHS I&A; DOJ, including the
Federal Bureau of Investigation; Office of the Director of National
Intelligence; and National Institute of Standards and Technology
(NIST).
Through the ``Last Mile Initiative,'' CISA worked closely with
State and local governments to outline critical cybersecurity actions
that should be implemented at the county level. For political
campaigns, CISA disseminated a cybersecurity best practices checklist
to help candidates and their teams better secure their devices and
systems.
On Election Day, DHS deployed field staff across the country to
maintain situational awareness and connect election officials to
appropriate incident response professionals, if needed. In many cases,
these field staff were co-located with election officials in their own
security operations centers. CISA also hosted the National
Cybersecurity Situational Awareness Room, an on-line portal for State
and local election officials and vendors that facilitates rapid sharing
of information. It gives election officials virtual access to the 24/7
operational watch floor CISA. This set-up allowed DHS to monitor
potential threats across multiple States at once and respond in a rapid
fashion.
priorities for the 2020 election cycle
For the 2020 elections, CISA has identified the following lines of
effort to guide the Department's work:
Protecting Election Infrastructure,
Supporting Campaigns and Political Infrastructure,
Raising Public Awareness and Building Resilience, and
Efficiently Sharing Actionable Intelligence and Identifying
Threats.
These priorities include broadening the reach and depth of
information sharing and assistance that CISA is providing to State and
local election officials, deepening our understanding of the elections
risk environment, highlighting the need for regular and consistent
resourcing of election infrastructure, extending the CISA suite of
services for protecting networks to political campaigns and partisan
organizations at the National level, and providing intelligence and
threat reporting to the election community. For more information on
these priorities, please visit: www.dhs.gov/cisa/protect2020.
In addition, CISA is working toward improving the efficiency and
effectiveness of election audits, incentivize the patching of election
systems, and working with the National Institute of Standards and
Technology (NIST) and the States to develop cybersecurity profiles
utilizing the NIST Cybersecurity Framework for Improving Critical
Infrastructure. The Department will continue to engage any political
entity that wants our help. We are continuously working to mature our
understanding of risks to this sector, improve our offerings, and to
provide meaningful security guidance leveraging leading practices.
CISA has made tremendous strides on these efforts and goals and has
been committed to working collaboratively with those on the front lines
of administering our elections to secure election infrastructure from
risks. In February, CISA officials provided updates to the Secretaries
of State, State election directors, and members of the GCC and SCC on
the full package of election security resources that are available from
the Federal Government, along with a roadmap on how to improve
coordination across these entities. DHS also worked with our
intelligence community partners to provide a Classified 1-day read-in
for these individuals regarding the current threats facing our election
infrastructure.
In June, CISA hosted another ``Tabletop the Vote'' exercise with
our Federal partners, State and local election officials, and private-
sector vendors to review coordination protocols and incident response
plans. The Tabletop covered a number of
pre-, post-, and day-of election scenarios, including voter
registration compromises, equipment issues, and misinformation
distributed over news and social media. Participants included
representatives from 47 States, thousands of local election officials,
the District of Columbia, U.S. Virgin Islands, along with our Federal
partners.
In July, DHS joined ODNI, DOJ, and DOD in briefing the full
Congress on the Federal Government's coordinated approach to protecting
the 2020 elections. DHS highlighted the increase in threat information
that is now shared with State, local, territorial governments, the
number of intrusion detection sensors, known as Albert sensors,
deployed across the country, and the prioritization of intelligence
sharing with State and local officials on cyber threats and foreign
interference.
CISA, through the EI-ISAC, now provides threat alerts to all 50
States and more than 2,000 local and territorial election offices. CISA
also provides weekly vulnerability scans for 37 States, 145 local
partners, 1 territory, and 10 private-sector partners. In addition, all
50 States, 110 localities, and 2 territories now have intrusion
detection sensors. These sensors are operated and monitored by EI-ISAC
as part of the Multi-State Information Sharing and Analysis Center's
(MS-ISAC) Albert intrusion detection system. DHS shares intelligence
and other cyber threat information with EI-ISAC for use in Albert,
which assists with identifying specific threats to election
infrastructure networks. EI-ISAC has also deployed Albert sensors
within election vendor environments, to protect their networks that
host voter registration systems in 5 States.
CISA is also expanding our level of engagement with political
organizations. We have worked in close coordination with both the
Democratic National Committee (DNC) and the Republican National
Committee (RNC) to share information and best practices. CISA has also
engaged directly with Presidential and Congressional campaigns. These
efforts have included a joint threat briefing with the FBI and ODNI for
all Presidential campaigns registered with the FEC as well as engaging
directly with campaigns to offer services and share information.
We will remain transparent as well as agile in combating and
securing our physical and cyber infrastructure. It will take continual
investment from all levels of government to ensure that election
systems across the Nation are upgraded, patched, and better secured,
with older more vulnerable systems retired. These efforts require a
whole-of-Government approach.
Our voting infrastructure is diverse, subject to local control, and
has many checks and balances. As the threat environment evolves, DHS
will continue to work with Federal agencies, State and local partners,
and private-sector entities to enhance our understanding of the threat;
and to make essential physical and cybersecurity tools and resources
available to the public and private sectors to increase security and
resiliency.
Thank you for the opportunity to appear before the committee today,
and I look forward to your questions.
Chairman Thompson. Thank you for your testimony.
I now recognize Mr. Sandvoss to summarize his statement for
5 minutes.
STATEMENT OF STEVEN S. SANDVOSS, EXECUTIVE DIRECTOR, ILLINOIS
BOARD OF ELECTIONS
Mr. Sandvoss. Thank you.
Good morning. My name is Steve Sandvoss and I am the
executive director of the Illinois State Board of Elections. I
would like to thank Chairman Thompson, Vice Chairwoman
Underwood, and Congressman Casten for giving me this
opportunity to address you.
As you are aware, in June 2016, the Illinois State Board of
Elections was the victim of a cyber attack during which hackers
gained unauthorized access into the voter registration database
maintained by the SBE.
In response to this attack, measures were immediately
undertaken to eliminate the vulnerability, assess the damage,
and alert the victims and beef up our cyber defenses.
Following all of this, the SBE undertook an unprecedented
effort to secure its voter registration database as well as
other IT-related applications.
Such effort was assisted with a grant from the Election
Assistance Commission that provided $380 million to the States
to assist in their cybersecurity efforts.
Illinois' share was $13.2 million. Shortly after receiving
this grant money, legislation was passed in Illinois that
earmarked no less than half of the grant money to the Cyber
Navigator Program to be created and administered by the State
Board of Elections.
In order to receive any of the grant money, Illinois'
election authorities who conduct the elections in Illinois were
required to participate in the program.
The Cyber Navigator Program consists of three basic parts.
The first part is the Illinois Century Network, which is a
State-managed network delivering internet-type services to
government agencies in Illinois.
The goal of the network is to provide the election
authorities with a cleaner and safer internet. Having this
network under the complete control of the SBE and the
Department of Innovation and Technology ensures that voter
registration and electronic canvassing data never actually flow
over the internet. Additionally, this gives us the ability to
provide security measures and intrusion monitoring.
The second part is the Cybersecurity Information-Sharing
Program, which the SBE is overseeing in partnership with the
State-wide Terrorism and Intelligence Center.
The program involves the research and gathering of
information related to cyber attacks and cyber resiliency and
sharing that information with all Federal, State, and local
stakeholders.
Our goal is to consolidate numerous information sources and
the feedback from the election authorities, distill it into the
most valuable actionable information that is possible.
The third part are the cyber navigators themselves. Nine
cyber navigators are currently on contract to assist the
election authorities by performing on-site risk assessments and
providing resources to ensure election security for 2020 and
beyond.
The navigators will be offering additional services such as
phishing assessments, penetration testing, and educational
trainings. They will also be performing assessments on physical
security and best practices in securing voting equipment.
In additional to the Cyber Navigator Program, the SBE has
worked in partnership with the Illinois National Guards'
cybersecurity team to provide cybersecurity protection for both
the State Board and the election authorities during the 2018
general election.
Members of the Guard were stationed in all regions of the
State, at the SBE office, at the State-wide Terrorism
Information Center, and at their own bases to be ready in the
event of a cyber event.
We are planning on partnering with the Guard to provide
cyber protection and incident response for the upcoming 2020
election.
Following the creation of the Cyber Navigator Program, the
SBE released $2.9 million of the aforementioned grant funds to
the participating election authorities to upgrade election-
related computers systems and to address cyber vulnerabilities
identified by the cyber navigators.
The funds can also be used to implement cybersecurity best
practices for election systems and other activities designed to
improve the security of the election systems.
In addition to the Cyber Navigator Program, the SBE took
many steps to beef up its own internal cybersecurity and these
steps are described in greater detail in my written statement.
Looking to the future, the SBE believes it is necessary to
maintain the Cyber Navigator Program indefinitely and possibly
expand it to address the continuing needs of the election
authorities.
Cybersecurity is an on-going ever-escalating process that
doesn't have an end date and, as such, there will be an on-
going need for funds to maintain the program.
At present, the primary mission of the cyber navigators is
to facilitate the Illinois Century Network connections between
the SBE and the election authorities and to perform risk
assessments of the IT systems of all the election authorities
who are participating in the program to determine their
adherence to the CIS controls.
The first phase of risk assessments is complete and the
cyber navigators are currently reviewing each jurisdiction's
vulnerabilities and are working with them to best utilize the
security grant money to improve their cybersecurity posture.
In addition to the Cyber Navigator Program, the SBE is
continually working on other ways to prepare for the upcoming
election. We are assisting the election equipment management
vendors to improve their security posture.
We have had discussions related to company ownership,
personnel, cloud security, and processes for identifying
cybersecurity risks, incident handling and recovery, testing,
patching, and anomaly handling of hardware and software, and
processes for handling the movement of data.
Our staff continues to participate in tabletop exercises
that simulate cyber instances that could occur during an
election. We are working with emergency management officials to
coordinate preparedness for the upcoming election cycle.
Last, in conjunction with the Cyber Navigator Program and
our Elections Operations Division, the SBE's public information
officer is developing a PR campaign to combat misinformation
and disinformation particularly in social media.
I appreciate your time and consideration and will be happy
to answer any questions you may have.
Thank you.
[The prepared statement of Mr. Sandvoss follows:]
Prepared Statement of Steven S. Sandvoss
October 15, 2019
As the committee is aware, in June 2016 the Illinois State Board of
Elections (SBE) was the victim of a cyber attack which at the time was
of unknown origin. It has since been learned that the attack was
perpetrated by Russian operatives who were seeking unauthorized access
into the voter registration database maintained by the SBE. In response
to this attack, measures were immediately undertaken to close the
access point of the intrusion, assess the extent of the penetration,
determine whether any data was manipulated or destroyed, and ascertain
which voter records were improperly accessed, with the purpose of
alerting said voters and giving guidance to assist them in protecting
their sensitive information. It should be noted that an analysis of the
breach did not reveal any evidence that specific voters were targeted
or that the attack focused on any particular region or demographic. The
SBE quickly alerted Federal law enforcement, and fully cooperated with
their investigation. Following the initial steps described above, the
SBE undertook an unprecedented effort to secure its voter registration
database as well as other IT-related applications.
In March 2018, the EAC provided $380 million in grant money to the
States to assist in their cybersecurity efforts. Illinois' share was
$13.2 million, with a requirement that the State provide a 5 percent
match; which amounted to $661,615. Shortly after receiving this grant
money, legislation was passed in Illinois that earmarked no less than
half of the grant money to a Cyber Navigator Program (CNP), to be
created and administered by the SBE.
In order to receive any of the grant money, Illinois' Election
Authorities (EAs) must agree to participate in the CNP. (The EAs
consist of 101 county clerks, 1 county board of election commissioners,
and 6 city boards of election commissioners, who are responsible for
maintaining a list of registered voters within their jurisdiction,
securing election voting and tabulating equipment and conducting the
actual election on election day, as well as early and mail in voting.)
The CNP consists of 3 basic parts: (1) Requiring the EAs to adopt
the Illinois Century Network (ICN) as their internet service provider
for all traffic between their offices and the SBE, (2) Engaging in a
Cyber Security Information Sharing Program with the EAs to share
cybersecurity-related information, and (3) Creation of a team of
``Cyber Navigators'' to provide cyber assistance to the EAs.
illinois century network (icn)
The ICN is a State-managed network delivering network and internet
services to government agencies in Illinois. The goal of the ICN is to
provide EAs with a cleaner and safer internet. The SBE Plan would bring
all network traffic to and from the EAs to an internal ``10 dot IP''
network system and ``whitelisting'' IP addresses for access to the IVRS
website. Isolating this network to one under the complete control of
the SBE and Department of Innovation and Technology (DoIT) ensures that
voter registration data and EA management operations never actually
flow over the internet. Additionally, this provides us the ability to
provide additional security measures and monitoring.
cybersecurity information-sharing program
In partnership with the Illinois State Police's division of State-
wide Terrorism and Intelligence Center (STIC), the SBE is overseeing
the Cyber Security Information Sharing Program, which involves
researching and gathering of information related to pertinent cyber
attacks and cyber resiliency and sharing that information with all
Federal and State stakeholders. Our goal is to consolidate numerous
information sources and, with feedback from local Election Authorities,
distill it into the most valuable, actionable information possible.
cyber navigators
The Cyber Navigators are assisting the EAs by performing on-site
risk assessments and providing resources to ensure Election Security
for 2020 and beyond. Currently 9 Navigators are assigned in 4 regional
zones in the State. (2 per zone, and 1 lead navigator). The Navigators
will be offering additional services such as phishing assessments,
penetration testing, and educational trainings. They will also be
performing additional risk assessments on physical security and best
practices in securing voting equipment.
In addition to the CNP, the SBE worked in partnership with the
Illinois National Guard's cybersecurity team for coordination of a
cyber defense system to provide cyber protection for both the SBE and
the EAs prior to and on Election Day. Members of the Guard were
stationed in all regions of the State, at the SBE, at STIC and their
own bases to be ready in the event of a State-wide cyber event.
Following the creation of the CNP, the SBE released $2.9 million of
the aforementioned grant funds to the participating EAs to make
purchases to upgrade election-related computer systems and to address
cyber vulnerabilities identified through the risk assessments performed
by the Cyber Navigators and/or other assessments of existing election
systems. Funds could also be used to implement cybersecurity best
practices for election systems and other activities designed to improve
the security of the election systems.
steps taken to improve the sbe's cyber defenses
In addition to the CNP, the SBE took the following steps to beef up
its own cybersecurity.
Hired 2 additional highly-experienced IT staff, including a
Chief Information Security Officer (CISO) with over 20 years of
Information Security experience.
We have deployed advanced Next Generation Endpoint Security
applications which protect agency systems from ransomware and
other types of malware. This includes machine learning Endpoint
Detection and Remediation (EDR) technologies to help with
incident response, forensics, and remediation of security
events.
New agency perimeter firewalls have been installed which
also includes network intrusion prevention systems. Web
application firewalls were also deployed to protect our
agency's public-facing applications.
Secure Web Gateways have been deployed which provides
category and reputation filtering to ensure agency internet
traffic is protected from malicious sources.
Our email security posture has increased significantly due
to implementations of strict spam/phishing policies and
creation of agency Sender Policy Framework (SPF) and Domain-
based Message Authentication, Reporting & Conformance (DMARC)
records.
Data Loss Prevention (DLP) technologies have been deployed
to protect against sensitive data exfiltration. We are also in
the process of deploying full disk encryption solutions to our
endpoints.
We partner with the Illinois Department of Innovation and
Technology to transfer network and system logs to their 24/7
Security Operations Center (SOC).
We are running weekly internal vulnerability scans against
all agency systems and websites. Illinois Department of
Innovation and Technology is running weekly vulnerability scans
against our public-facing websites. DoIT and DHS have also
performed penetration tests and risk & vulnerability
assessments.
Future initiatives include implementations of additional
email, DLP, log management and cybersecurity education
technologies.
Looking to the future, the SBE believes it is necessary to maintain
the Cyber Navigator Program indefinitely and possibly expand it to
address the continuing needs of the EAs. Cybersecurity is an on-going,
ever-escalating process that doesn't have an end date, and as such
there will be an on-going need for funds to maintain the program. At
present, the primary mission of the Cyber Navigators is to perform risk
assessments of the IT systems of all the EAs who are participating in
the CNP (all 108 EAs are participating in the CNP and have completed
the first round of risk assessments). The EAs are in the process of
evaluating the Assessments to determine what type of security
enhancements are needed and are accessing the HAVA grant funds to cover
the expenses. Some of the other steps that have been taken to enhance
security leading up to next year's elections are as follows:
Working with the election equipment and management vendors
to improve their security posture. This involves a series of
questions related to company ownership, personnel, cloud
security, and processes for identifying cybersecurity risks,
incident handling and recovery, testing, patching and anomaly
handling of hardware and software and process for handling the
movement of data.
Participating in Table-Top Exercises.
Working with the Emergency Management officials to
coordinate preparedness for the up-coming election cycle.
Developing a PR campaign to combat misinformation/
disinformation, particularly on social media. The SBE has
produced videos to assist the election officials and voters on
how to spot and report same as well as videos on how to
maintain voting machine security and integrity.
Chairman Thompson. Thank you for your testimony.
I now recognize Ms. O'Connor to summarize her statement for
5 minutes.
STATEMENT OF ROBIN M. O'CONNOR, CLERK, LAKE COUNTY, ILLINOIS
Ms. O'Connor. Good morning. I am the proud Lake County
clerk and leader of a stellar team within our office which
provides multiple services to its citizens.
I do want to stop real quick and say thank you to the two
gentlemen that have just spoken because we use their services
and we are grateful for their offerings. They are steadfast
with their constant support and we are very thankful in the
counties.
OK. Continuing, I just want to talk a little bit about Lake
County, Illinois. Lake County, Illinois protects the security
and reliability of our election infrastructure.
We recognize the importance of using best practices,
researching, and acquiring modern election systems architecture
as well as collaborating with organizations dedicated to the
guiding and providing us to the highest--Lake County has a
population of 700,832, according to the U.S. Census Bureau
Population Estimate Program 2018, and as of October 11, 2019,
458,586 registered voters.
There are 121 voting sites on the day of election and 18
early voting sites throughout the county. Lake County offers 3
voting options: Vote by mail, early voting, and Election Day.
Citizens may grace register to vote on early day--early
voting up to and including Election Day. A snapshot of our
election landscape is that we do have a network-connected
system but it is not connected to the internet. It is our voter
registration system.
We have an indirect connected system, which is our
elected--election management system with e-pollbooks and we
also have a nondigital elections component, which is our vote-
by-mail process, which involves multi-steps.
There are parts which are digital such as on-line requests
and signature verifications.
Lake County participates in the election--Illinois Election
Cyber Navigation risk assessments, which was used to identify
and assess impacts of vulnerabilities on our network and
elections system. A common baseline risk assessment as well as
examining the inherent complexities of network connectivity was
conducted.
The results were as follows. We are proud to say that the
Lake County IT department has already implemented many of the
recommendations and we are working now on implementing the
others recommended.
A common concern is the pairing of information between
voter registration and election tabulation as well as
connectivity. Both systems are separate and not connected.
Our voter registration system will soon be on the Illinois
Century Network. ICN is a separate and private dedicated
network for traffic between the Illinois State Board of
Elections and our voting registration system. Our election
tabulation system, again, is not connected to the internet.
Within our election systems and the mitigating risk
policies we pride ourselves in being proactive and prepared for
risks and threats.
I would like to talk a little bit about the management
systems within our cybersecurity profile. At the county level,
we are very fortunate because we have an IT security officer
along with a robust IT department that has already implemented
many of the cybersecurity measures protecting the county
network and the IT systems, including our e-pollbooks, our
voter registration, and our election tabulation systems.
At the State level, Lake County's Clerk's Office joins the
Illinois Election Cyber Navigator Program and is working to
implement recommendations from the risk assessment.
At the National level, the Lake County Clerk's Office
joined the Election Infrastructure Information Sharing and
Analyst Center and a multi-State Informational Sharing Analysis
Center and we are receiving regular advice and recommendations
from these organizations.
We are also adding an Albert sensor to our voter
registration system which is a monitoring tool that looks for
malicious traffic on our network and alerts for security
operations center and it is a 24/7 analysis center that will
investigate and provide resources to mitigate any issues on our
network.
Finally, the Optical Scan Voting System that we use leaves
a secure paper trail and minimizes the risk against outside
interference as no electronic votes are ever cast.
All voting results can be accurately reproduced by
reinserting the voter paper ballots through a ballot counter or
a manual inspection.
The threats of election interference, we believe, as all of
us who are here, is constant and requires proactive monitoring.
To maintain always this election integrity, the Lake County
Clerk and team values our citizens' confidence to keep their
votes safe and secure.
[The prepared statement of Ms. O'Connor follows:]
Prepared Statement of Robin M. O'Connor
Oct. 15, 2019
Lake County Illinois protects the security and reliability of our
election infrastructure. We recognize the importance of using best
practices researching and acquiring modern election systems
architecture, as well as collaborating with organizations dedicated to
guiding and providing us services of the highest merit.
Lake County has a population of 700,832 according to the U.S.
Census Bureau Population Estimate Program 2018 and 458,586 registered
voters as of October 11, 2019. There are 121 voting sites on the day of
election and 18 early voting sites throughout the county. Lake County
offers 3 voting options: Vote by mail, Early Voting, and Election Day.
Citizens may grace register to vote during Early Voting, up to and
including Election Day.
Listed below is a snapshot of our election landscape:
1. Network connected systems and components (We are not connected
to the internet): Voter Registration System
2. Indirectly connected systems: Election Management System,
ePollbooks
3. Non-digital elections components: In this category our vote by
mail process involves multi-steps. There are parts which are
digital such as on-line requests and signature verifications.
Lake County participated in the Illinois Elections Cyber Navigators
Risk Assessment which was used to identify and assess impacts of
vulnerabilities on our network and election systems. A common baseline
risk assessment as well as examining the inherent complexity of network
connectivity was conducted. The results were as follows: The Lake
County IT Department had already implemented some of the
recommendations, and we are working on implementation of the others.
A common concern is the pairing of information between voter
registration and the election tabulation, as well as connectivity. Both
systems are separate and not connected. Our Voter Registration system
will soon be on the Illinois Century Network (ICN), which is a separate
and private dedicated network for traffic between the Illinois State
Board of Elections and our Voter Registration system. Our Election
Tabulation system is not connected to the internet.
Within our Election Systems and Mitigating Risk policies, we pride
ourselves in being proactive and prepared for risks and threats. Listed
below are management systems within our cybersecurity profile.
A. County Level.--Lake County has an IT Security Officer, along
with a robust IT department that has already implemented
cybersecurity measures protecting the County network and IT
systems, including our ePollbook, voter registration, and
election tabulation systems.
B. State Level.--The Lake County Clerk's Office joined the Illinois
Elections Cyber Navigators program and is working to implement
recommendations from the risk assessment
C. National Level.--The Lake County Clerk's Office joined the EI-
ISAC (Election Infrastructure Information Sharing and Analysis
Center) and MS-ISAC (Multi-State Information Sharing and
Analysis Center) and receive regular advisories and
recommendations from these organizations. We are also adding an
Albert Sensor to our Voter Registration system, which is a
monitoring tool that is looks for malicious traffic on our
network and alerts the Center for Internet Security (CIS)
Security Operations Center, a 247 analysis center that will
investigate and provide resources to mitigate any issues on our
network.
Finally, the optical scan voting system leaves a secure paper trail
and minimizes the risk against outside interference as no electronic
votes are ever cast. All voting results can be accurately reproduced by
re-inserting the voted paper ballots through the ballot counter or
manual inspection.
The threat of election interference is constant and requires
vigilance to maintain election integrity. The Lake County Clerk and
Team values our citizens' confidence to keep their votes safe and
secure.
Chairman Thompson. Thank you very much.
I now recognize Ms. Howard to summarize her statement in 5
minutes.
STATEMENT OF ELIZABETH L. HOWARD, COUNSEL, DEMOCRACY PROGRAM,
BRENNAN CENTER FOR JUSTICE
Ms. Howard. Thank you, Chairman Thompson, Vice Chairwoman
Underwood, and Congressman Casten for the opportunity to
testify today about the on-going efforts to secure election
systems in Illinois and across the country.
Good morning. Election security has long been a priority
for the Brennan Center starting in 2005 when we convened the
Voting Systems Security Task Force to conduct the Nation's
first systemic analysis of voting equipment vulnerabilities.
Our work continues today, and in my role as counsel for the
Democracy Program, I have the opportunity to partner directly
with State and local election officials as they work to
implement important election security measures, many of which
we have supported for years.
As you have heard this morning, the election systems in
Illinois and across the country were targeted in 2016, and
according to our National security and intelligence officials
will be targeted again in 2020.
In fact, the director of DHS's Cybersecurity and
Infrastructure Security Agency--CISA--has stated the big game,
we think, for adversaries is probably 2020.
While well-resourced hostile foreign nation-states may be a
new addition to the list of actors who pose a threat to our
election infrastructure, the tools and tactics they use are
not. Cybersecurity professionals are very familiar with these
threats including distributed denial-of-service attacks,
hacking, and insider threats.
Considering this, it is no surprise that there is wide-
spread agreement on the appropriate countermeasures and
policies that are needed to ensure our election systems can
withstand attack.
In short, we know what we need to do to harden our
infrastructure but we are lacking in leadership and funding.
Illinois election officials are as acutely aware of the
threats facing our election systems as anyone. Successful
attacks on Illinois' voter registration database served as an
unwelcome alarm to election officials everywhere and Illinois'
efforts, including their successes and struggles, are
instructive when analyzing the current National election
security landscape.
In good news, election officials in Illinois and across the
country have made significant progress in protecting our
democracy since 2016.
In Illinois, these efforts have included identifying and
addressing vulnerabilities in the voter registration database
and launching the Cyber Navigator Program, which provides
critical IT and cybersecurity support to local election
officials.
This program is an important component of Illinois' efforts
to secure its systems and serves as a model to other States.
Despite this progress, there is much to do in Illinois and
across the country.
First, in Illinois, most of the voting equipment is
antiquated and many of the machines do not use paper ballots.
These machines need to be replaced immediately.
Next, Illinois should implement robust post-election audits
that serve as a check on the election outcome and answer the
question, ``Did the reported winner really win the election?''
Next, many Illinois counties use electronic poll books.
These are laptops or tablets that poll workers use instead of a
paper list to look up voters at the polls.
There are no Federal or State security guidelines for this
equipment. Illinois should consider expanding its current
voting system security certification process to include
electronic poll books and adopting common-sense contingency
policies such as mandating paper back-up lists at the polls.
Of course, State and local election officials shouldn't be
tasked with protecting our democracy alone. Congress has a very
important role to play in the collective and comprehensive
efforts to secure our infrastructure.
In my written testimony, I offer a number of
recommendations for Congressional action. Among them, require
voting system vendors to report cyber incidents.
Next, make the critical infrastructure designation
permanent to ensure election security remains a priority at DHS
and elections officials retain access to critical information
and resources.
Next, Congress should pay its fair share of the on-going
cost to protect our democracy and this funding should include
responsible accountability measures such as those that were
included in the budget bill that the House passed in June.
Thank you for your time. I look forward to your questions.
[The prepared statement of Ms. Howard follows:]
Prepared Statement of Elizabeth L. Howard
October 15, 2019
Chairman Thompson, Ranking Member Rogers, and Members of the
committee, thank you for the opportunity to speak about the critical
issue of election security. The Brennan Center for Justice--a
nonpartisan law and policy institute that focuses on democracy and
justice--appreciates the opportunity to share with you our analysis of
the important efforts to secure election systems in Illinois and across
the country based on the results of our extensive studies and work to
ensure our Nation's election systems are more secure and reliable
across the country. We are deeply involved in the effort to ensure
accurate and fair voting for all Americans.
For over a decade, I have worked on election administration issues.
In my former position as Deputy Commissioner of Elections in Virginia,
I coordinated various election security projects, including the
decertification of all paperless voting machines in 2017. In my current
role, I focus almost exclusively on election security. Representing the
Brennan Center, I frequently partner with State and local election
officials to assist with the implementation of important election
security measures and serve on the Michigan Secretary of State's
Election Security Commission and the Pennsylvania Secretary of State's
Audit Working Group. I have also co-authored multiple reports on
election security and remedial measures and policies that will better
enable our election infrastructure to withstand attack.
Most recently, I co-authored Defending Elections, which
demonstrates the need for additional election security resources across
the country. This report includes detailed profiles of recent election
security efforts and on-going needs in 6 States, including Illinois. We
noted that as part of Russia's ``sweeping and systemic'' efforts to
interfere with our elections in 2016, Russian operatives ``compromised
the computer network of the Illinois State Board of Elections . . . [,]
then gained access to a database containing information on millions of
registered Illinois voters, and extracted data related to thousands of
U.S. voters before the malicious activity was identified.''\1\ And,
although there is no panacea to counter such threats, Illinois has
implemented a variety of election security measures which should help
identify and patch or otherwise address cybersecurity vulnerabilities
like those the Russians exploited in 2016.
---------------------------------------------------------------------------
\1\ Christopher R. Deluzio, Liz Howard, Paul Rosenzweig, David
Salvo, and Rachael Dean Wilson, Defending Elections, Brennan Center for
Justice, 2019, https://www.brennancenter.org/sites/default/files/
publications/2019_07_EACFunding%20Report_FINAL.pdf.
---------------------------------------------------------------------------
Based on our extensive election security studies and partnerships
with a diverse range of election officials, we believe that Illinois's
successes and struggles in its on-going effort to secure the State's
election infrastructure are instructive when analyzing the election
security landscape across the country. In Illinois, and across the
country, there has been much progress since 2016, but much work remains
to be done.
I hope to convey 3 points in my testimony today:
(1) The risks facing our Nation's election infrastructure in 2020
require urgent action;
(2) Illinois has taken many important steps to improve election
security, including implementation of a cyber navigator program, but
there is more to do; and
(3) Congress has a critical leadership and partnership role to play
in helping Illinois and other States ensure our elections are free,
fair, and secure.
a. the risks facing our election infrastructure must be urgently
addressed.
Illinois was not the only State targeted by Russia in 2016. We now
know that Russia likely targeted State and local election boards in all
50 States and used spear-phishing attacks to gain access to and infect
computers of a voting technology company and 2 Florida counties.\2\ We
also know there is good reason to believe we face even more serious
threats in 2020 and beyond. By 2020, the Russians will have had 4 years
to leverage knowledge gained in 2016 to do more harm. Chris Krebs, head
of the Cybersecurity and Infrastructure Security Agency at the
Department of Homeland Security, has warned that the 2020 election is
``the big game'' for adversaries looking to attack American democracy.
---------------------------------------------------------------------------
\2\ Russian Active Measures Campaigns and Interference in the 2016
U.S. Election Volume 1, Senate Select Committee on Intelligence, 2019,
https://www.intelligence.senate.gov/sites/default/files/documents/
Report_Volume1.pdf (``DHS assessed that the searches, done
alphabetically, probably included all 50 States, and consisted of
research on ``general election-related web pages, voter ID information,
election system software, and election service companies.''); Miles
Parks, ``Florida Governor Says Russian Hackers Breached 2 Counties In
2016,'' NPR, May 14, 2019, https://www.npr.org/2019/05/14/723215498/
florida-governor-says-russian-hackers-breached-two-florida-counties-in-
2016; Sean Gallagher, ``DHS, FBI say election systems in all 50 States
were targeted in 2016,'' Ars Technica, April 10, 2019, https://
arstechnica.com/information-technology/2019/04/dhs-fbi-say-election-
systems-in-50-states-were-targeted-in-2016/ (``The FBI and DHS assess
that Russian government cyber actors probably conducted research and
reconnaissance against all US States' election networks leading up to
the 2016 Presidential elections.''); Election Security Hearing, Before
the Comm. on House Administration, 116th Cong. (2019) (Statement of
Lawrence Norden).
---------------------------------------------------------------------------
In many ways, the major cybersecurity risks posed today by Russia
and other hostile foreign nation-states are not new. They include
hacking, e.g., SQL injections and ransomware attacks, distributed
denial-of-service (DDoS) attacks and insider threats.\3\ Like other
Government officials responsible for protecting the integrity of IT
systems and the information they maintain, election officials are
struggling to manage these risks.\4\
---------------------------------------------------------------------------
\3\ Meredith Berger et al., The State and Local Election
Cybersecurity Playbook, Harvard Kennedy School and Defending Digital
Democracy, 2018, https://www.belfercenter.org/sites/default/files/
files/publication/StateLocalPlaybook%201.1.pdf.
\4\ See e.g., Kylie Bielby, ''GAO: Federal Agencies Struggle to
Manage Cybersecurity Risks,'' Homeland Security Today, July 26, 2019,
https://www.hstoday.us/exclude-from-homepage/gao-federal-agencies-
struggle-to-manage-cybersecurity-risks/; Alyza Sebenius and Kartikay
Mehrotra, ``States Struggle to Update Election Systems for 2020,''
Bloomberg, August 15 2019, https://www.bloomberg.com/news/articles/
2019-08-15/states-struggle-to-update-election-systems-ahead-of-2020;
Benjamin Wofford, ``The hacking threat to the midterms is huge. And
technology won't protect us,'' Vox, October 25, 2018, https://
www.vox.com/2018/10/25/18001684/2018-midterms-hacked-russia-election-
security-voting; Kate Rabinowitz, ``Election Security a High Priority--
Until It Comes to Paying for New Voting Machines,'' ProPublica,
February 20, 2018, https://www.propublica.org/article/election-
security-a-high-priority-until-it-comes-to-paying-for-new-voting-
machines.
---------------------------------------------------------------------------
Election officials hold a special place in our democracy. Not only
are they responsible for protecting our election infrastructure, but
also maintaining and bolstering confidence in the democratic process we
use to decide who will serve important governmental roles at the
Federal, State, and local level. Americans' faith in the integrity of
this system is the foundation of our ability to self-govern and is in
peril.\5\
---------------------------------------------------------------------------
\5\ Robert S. Mueller III, Report On The Investigation Into Russian
Interference In The 2016 Presidential Election, U.S. Department of
Justice, 2019, https://www.justice.gov/storage/report.pdf
(characterizing the Russian government's interferences as a ``sweeping
and systematic'' effort to undermine faith in our democracy).
---------------------------------------------------------------------------
Election officials should not be tasked with shouldering this
responsibility alone. Under our Federal system of government, the risks
facing individual election jurisdictions are a threat to every American
who has confidence in our democracy. Successful attacks against our
infrastructure in any county in any State can have a ripple effect that
impacts the balance of power at the Federal level. While the
decentralized nature of our electoral system is a strength in many
ways, we are only as strong as our weakest link.
There is wide-spread agreement on many of the remedial measures and
policies necessary to create a resilient election infrastructure. We
urge Congress to take immediate steps to protect the votes cast by
every American by passing common-sense legislation to ensure
implementation of minimum election security standards across our Nation
and by paying its fair share of the associated costs.
b. illinois officials have implemented many important election security
measures and policies, including a cyber navigator program, but much
work remains to be done at the federal and state level to address
significant security gaps.
In the wake of Russia's successful infiltration of Illinois' voter
registration database in 2016, Illinois officials took prompt action to
address identified vulnerabilities. Their work continues today.
Illinois' on-going efforts to further strengthen their election
infrastructure include welcoming public and private election security
partners, such as the U.S. Department of Homeland Security (DHS), and
taking advantage of a wide range of free resources available.
In addition, they are using the entirety of the State's 2018
Federal election security grant funds, approximately $14 million, for
cybersecurity improvements. The hallmark of that effort is the State's
cyber navigator program; the State plans to devote at least half of its
Federal grant toward this program. While much progress has been made in
Illinois, the 2018 grant funds were simply not enough to address all
the State's critical election security needs. In fact, the Federal
grant funds were similarly insufficient in every State leaving election
officials across the country in a grim situation. They were forced to
decide which critical election security projects to fund--and which not
to. In Illinois, this meant no Federal funding was available for urgent
needs such as replacing antiquated voting equipment.
Illinois' Cyber Navigator Program Addresses a Critical Election
Security Need and Serves as a Model for Other States Across the
Country.
In 2018, Illinois launched its cyber navigator program (CNP). As
part of this program, cyber navigators with responsibility for
geographic zones across the State work with local election officials to
train relevant personnel and to lead risk assessments and evaluations,
among other things. They fill a role akin in many ways to that of a
chief information security officer for counties. Their assessment and
evaluation efforts help officials identify vulnerabilities and
determine where additional resources may be needed to shore up cyber
defenses. The program's other principal components are infrastructure
improvement, through the Illinois Century Network Expansion, and
information sharing, through the Cybersecurity Information Sharing
Program.\6\
---------------------------------------------------------------------------
\6\ Deluzio et al., Defending Elections.
---------------------------------------------------------------------------
This program addresses a critical problem facing many local
election officials in Illinois and across the country: the lack of IT
and cybersecurity support at the local level.\7\ Without a State
resource for cyber assistance, local election officials who do not have
dedicated IT staff may be at greater risk of a successful cyber attack.
These officials may not have sufficient resources to appropriately
respond to identified cyber threats to local systems or equipment, such
as those risks shared by the Elections Infrastructure Information
Sharing and Analysis Center (EI-ISAC).
---------------------------------------------------------------------------
\7\ Deluzio et al., Defending Elections.
---------------------------------------------------------------------------
Federal, State, and local officials across the country and the
Brennan Center support the wide-spread adoption of this program,\8\
which has been identified as an important component of Illinois'
comprehensive approach to securing the State's election infrastructure.
---------------------------------------------------------------------------
\8\ Deluzio et al., Defending Elections; DHS Election
Infrastructure Security Funding Consideration, National Protection and
Programs Directorate, Department of Homeland Security, June 13, 2018,
https://www.dhs.gov/sites/default/files/publications/
Election%20Infrastructure%20-
Security%20Funding%20Considerations%20Final.pdf.
---------------------------------------------------------------------------
i. Most of Illinois' Voting Machines are Antiquated and Many Do Not Use
Paper Ballots. They Must Be Replaced and Robust--Post-Audits
Must Be Implemented.
Millions of Illinois voters will go to the polls to cast their
ballot on Election Day 2020. They will encounter a variety of different
voting machines at their polling place, from hand-marked paper ballot
systems in some counties to antiquated Direct Recording Electronic
(DRE) machines that produce a voter-verifiable paper audit trail
(VVPAT) in others. As ``the bulk of the voting machinery in Illinois is
at least 15 years old,''\9\ the on-going use of these machines expose
voters to multiple security risks.
---------------------------------------------------------------------------
\9\ Rick Pearson, ``Illinois Pushes Millions Toward Securing Its
Election Systems,'' Government Technology, August 5, 2019, https://
www.govtech.com/budget-finance/Illinois-Pushes-Millions-Toward-
Securing-Its-Election-Systems.html.
---------------------------------------------------------------------------
First, aging voting systems, in general, are a security risk and
less reliable than voting equipment available today. Older systems are
``more likely to fail and are increasingly difficult to maintain.''\10\
Many used in Illinois, such as the AccuVote TSX used in multiple
Illinois counties, including DuPage County, are no longer manufactured
so finding replacement parts will be increasingly difficult over
time.\11\ This problem exacerbates the reported system-specific
security concerns with other older systems used in Illinois, such as
the AutoMARK, including inconsistent vote tallying and reboot times of
15 to 20 minutes.\12\ Moreover, these systems simply lack important
security features expected of voting machines today, such as hardware
access deterrents for ports.\13\
---------------------------------------------------------------------------
\10\ Election Security Hearing, Before the Comm. on House
Administration, 116th Cong. (2019) (Statement of Lawrence Norden);
Josie Bahnke (Elections Director, Office of the Lieutenant Governor,
Alaska), Letter to Election Policy Work Group Members, July 18, 2018,
http://www.elections.alaska.gov/doc/info/180718%20EPWG%20Research.pdf
(``Today the DOE is at a critical juncture: Alaska's voting equipment
and technology are outdated, difficult to repair and prone to
failure.'').
\11\ Lawrence Norden and Andrea Cordova, ``Voting Machines at Risk:
Where We Stand Today,'' Brennan Center for Justice, March 5, 2019,
https://www.brennancenter.org/analysis/voting-machines-risk-where-we-
stand-today.
\12\ Ruth Johnson (Oakland County clerk/register of deeds), Letter
to Rosemary Rodriguez (chairperson, Election Assistance Commission),
October 2, 2008, https://www.eac.gov/assets/1/6/
Oakland_County_Michigan_letter_regarding_ES_S_M_100_voting_machine_tab-
ulators.pdf (stating that 8 percent of M-100 fleet in Oakland County
``reported inconsistent vote totals during their logic and accuracy
testing''); ``Election Systems and Software (ES&S) AutoMARK,'' Verified
Voting, accessed May 4, 2019, https://www.verifiedvoting.org/resources/
voting-equipment/%20ess/automark/ (listing AutoMARK security concerns).
\13\ Deluzio et al., Defending Elections.
---------------------------------------------------------------------------
The continued use of antiquated equipment is a concern in many
other States as well. We estimate at least some voters in as many as 38
States will cast their 2020 ballot on equipment that is more than 10
years old.\14\ In November 2018, we estimate that 34 percent of all
local election jurisdictions were using voting machines that were at
least 10 years old as their primary polling place equipment (or as
their primary tabulation equipment in all vote-by-mail
jurisdictions).\15\ Next, although VVPATs were ``designed primarily for
audit purposes,'' studies have found they have some significant
shortcomings.\16\ For example, one report examining VVPATs in Cuyahoga
County, OH found almost 10 percent of the VVPAT tapes ``were either
destroyed, blank, illegible, missing, taped together or otherwise
compromised,'' and 19 percent of the tapes indicated discrepancies with
the reported counts.\17\ Auditing VVPATs also takes more time than
auditing paper ballots ``due to the need to physically separate the
ballots from the spool in the first count.''\18\ Finally, the results
of least one study ``suggest that people count optical scan ballots
somewhat more accurately than VVPAT paper tapes.''
---------------------------------------------------------------------------
\14\ Norden and Cordova, ``Voting Machine Security'' (Forty-one
States minus Alaska, California, and North Dakota).
\15\ Ibid.
\16\ Stephen N. Goggin et al., ``Comparing the Auditability of
Optical Scan, Voter Verified Paper Audit Trail (VVPAT) and Video
(VVVAT) Ballot Systems,'' USENIX The Advanced Computing Systems
Association, 2008, https://www.usenix.org/legacy/events/evt08/tech/
full_papers/goggin/goggin.pdf (``While VVPAT and VVVAT systems are both
designed primarily for audit purposes, the actual implementation of
VVPAT auditing has not been free from problems. For example, the
Election Science Institute (ESI) examined all aspects of election
administration in Cuyahoga County, Ohio during the May 2006 primary
election. The ESI report found that 10 percent of VVPAT spools were
unreadable or missing, while 19 percent of the spools indicated
discrepancies with the reported counts (ESI, 2006). Alternatives like
VVVAT systems are still currently under development.'')
\17\ DRE Analysis for May 2006 Primary: Cuyahoga County, Ohio,
Election Science Institute, August 2006, 6, https://web.archive.org/
web/20120330212509/http://votingindustry.com/TabulationVendors/1stTier/
Diebold/esi_cuyahoga_final.pdf.
\18\ Stephen N. Goggin et al., ``Comparing the Auditability of
Optical Scan . . . ''; see also Joseph Hall, ``McCormack Hit Job Video
on VVPAT,'' Not Quite a Blog, March, 23, 2019, https://josephhall.org/
nqb2/index.php/mccormack_vvpat_vid (``Recounting VVPAT ballots cast
during early voting on DREs in conjunction with the pilot program ran
for the November 2002 election in Sacremento County, California proved
even more labor-intensive. Sacramento County Registrar of Voters Jill
LaVine, in Congressional testimony on July 7, 2004 reported ``the
recount of 114 VVPAT ballots took 127 hours, approximately 1 hour per
ballot due to the complexity of the long ballot for that election.'').
---------------------------------------------------------------------------
Cybersecurity experts, including the National Academies of
Sciences, Engineering, and Medicine, agree that DREs with VVPAT
represent a security risk and elections should be conducted using
human-readable paper ballots.\19\ The U.S. House of Representatives
recently indicated its support for replacement of all DREs by voting to
provide $600 million in election security funding to States and
requiring those States that continue to use DREs to first use these
funds to replace them.\20\
---------------------------------------------------------------------------
\19\ Securing the Vote, The National Academies of Sciences,
Engineering, and Medicine, 2018, https://www.nap.edu/read/25120/
chapter/1 (``Electronic voting systems that do not produce a human-
readable paper ballot of record raise security and verifiability
concerns.'')
\20\ Financial Services and General Government Appropriations Bill
2020 Report, House Committee on Appropriations, 2019, 3, 51-52, 112,
https://docs.house.gov/meetings/AP/AP00/20190611/109632/HMKP-116-AP00-
20190611-SD003.pdf.
---------------------------------------------------------------------------
Illinois is 1 of only a small number of States that continue to use
DREs with VVPATs as the primary voting system in 1 or more
jurisdictions.\21\ In 2020, Illinois may be 1 of as few as 7 States
with counties that rely primarily on these machines.\22\ The on-going
use of DREs with VVPATs makes the current election infrastructure in
Illinois slightly more secure than the infrastructure in the 8 States
(Indiana, Kansas, Kentucky Louisiana, Mississippi, New Jersey,
Tennessee, & Texas) we estimate will use paperless DREs in 2020.
---------------------------------------------------------------------------
\21\ Federal Funds for Election Security: Will They Cover the Costs
of Voter Marked, Brennan Center for Justice and Verified Voting, 2018,
https://www.brennancenter.org/our-work/research-reports/federal-funds-
election-security-will-they-cover-costs-voter-marked-paper.
\22\ California has required replacement by 2020, Wyoming is
replacing now, and North Carolina State law currently requires
replacement by December 31, 2019. ``Secretary of State Alex Padilla
Sets Deadline for Counties to Retire Old Voting Machines and Modernize
Election Infrastructure,'' California Secretary of State Press Office,
February 27, 2019, https://www.sos.ca.gov/administration/news-releases-
and-advisories/2019/secretary-state-alex-padilla-sets-deadline-
counties-retire-old-voting-machines-and-modernize-election-
infrastructure; ``Funding Elections Technology,'' National Conference
of State Legislatures, July 29, 2019, http://www.ncsl.org/research/
elections-and-campaigns/funding-election-technology.aspx; ``State Board
to Consider Certification of Voting Systems,'' North Carolina State
Board of Elections, July 23, 2019, https://www.ncsbe.gov/Press-
Releases?udt_2226_param_detail=767 (``Under current State law, DREs
will be decertified in North Carolina on December 1, 2019, in favor of
voting equipment that results in paper ballots for all voters. Proposed
legislation pending in the N.C. General Assembly would delay the
decertification date.'').
---------------------------------------------------------------------------
DREs with VVPATs are more secure than paperless DREs because the
VVPAT can be audited after the election. Unlike some States, Illinois
does take advantage of this security feature by conducting an audit of
these paper records to check and confirm electronic vote tallies. We
estimate that Illinois will be 1 of only 24 States and the District of
Columbia that will have voter verifiable paper records for all votes
cast and require post-election audits of those paper records before
certifying election results in 2020.\23\
---------------------------------------------------------------------------
\23\ Norden and Cordova, ``Voting Machine Security''.
---------------------------------------------------------------------------
Illinois relies on the traditional post-election audit method, in
which the results from voting equipment in a specific percentage of
precincts are reviewed. This method provides assurance that individual
voting machines are correctly tabulating votes. Risk-limiting audits
(RLAs) are a relatively new type of audit that provide assurance that
election outcomes are correct by using statistics to analyze random
samples of all votes cast. In 2020, RLAs will be required State-wide in
Colorado and Rhode Island and may be conducted in lieu of traditional
post-election audits at the county level in California, Ohio, and
Washington.
The Brennan Center has long supported both a complete, Nation-wide
transition to paper ballot voting machines and the implementation of
risk limiting audits (``RLAs''), an efficient and effective check on
election results, to ensure security and confidence in electoral
results. Encouragingly, many Illinois counties and multiple States have
made significant progress in replacing their aging and DRE voting
systems in recent months and years. Cook County, Macoupin County,
Arkansas, Georgia, Pennsylvania, and South Carolina have either
completed the replacement of their DRE voting machines or are
transitioning now.\24\ In addition, election officials in at least 6
additional States are piloting risk-limiting audits, the ``gold-
standard'' of post-election audits.\25\
---------------------------------------------------------------------------
\24\ Marley Arechiga, ``Cook County Getting New Voting Machines For
First Time In 13 Years,'' WBEZ, March 26, 2019, https://www.wbez.org/
shows/wbez-news/cook-county-getting-new-voting-machines-for-first-time-
in-13-years/02665912-4298-4ac5-afe8-3b7bff079027; Macoupin County
Clerk's Office, ``We are really excited that the County Board approved
purchasing new voting machines at this week's meeting,'' Facebook,
August 16 2019, https://www.facebook.com/MacoupinCountyClerk.
\25\ Norden and Cordova, ``Voting Machine Security''.
---------------------------------------------------------------------------
ii. Multiple Illinois Counties Use Electronic Pollbooks. There Are No
Federal or State Security Guidelines for Electronic Pollbooks.
They Should Be Included in the Federal Certification Process
and Illinois Should Consider Adopting a State Certification
Process and Common-Sense Contingency Policies.
As of July 2019, 41 States, including Illinois, and DC use or
authorize the use of electronic pollbooks in at least some polling
places.\26\ Electronic pollbooks (EPBs) are laptops or tablets that
poll workers use instead of paper lists to look up voters. Most EPBs
can communicate with other EPBs in the same polling location to share
real-time voter check-in updates.\27\ In addition to an expedited
check-in procedure, shorter lines, lower staffing needs, and cost
savings, one major benefit of EPBs is that they can make it easier to
set up ``vote centers'' during early voting in some States, e.g.,
Illinois, or on Election Day in other States. Vote centers are ``an
alternative to traditional neighborhood-based precincts''.\28\ Anyone
in a particular jurisdiction can vote there, regardless of where they
live, possibly making voting more convenient, providing additional cost
savings, and encouraging increased voter turnout.\29\ If a county uses
multiple vote centers, the electronic pollbooks can automatically sync
during the day to ensure that once someone has voted in a particular
location, they cannot vote in another location on the same day.
---------------------------------------------------------------------------
\26\ ``Electronic Poll Books,'' National Conference of State
Legislatures, July 15, 2019, http://www.ncsl.org/research/elections-
and-campaigns/electronic-pollbooks.aspx; Andrea Cordova, ``Want a
Simple Way to Increase Election Security? Use Paper,'' Brennan Center
for Justice, October 8, 2018, https://www.brennancenter.org/blog/want-
simple-way-increase-election-security-use-paper.
\27\ Edgardo Cortes, Liz Howard, and Lawrence Norden, Better Safe
than Sorry: How Election Officials Can Plan Ahead to Protect the Vote
in the Face of a Cyberattack, Brennan Center for Justice, 2018, https:/
/www.brennancenter.org/sites/default/files/publications/2018_08_-
13_ElectionSecurity_V4.pdf.
\28\ ``Vote Centers,'' National Conference of State Legislatures,
http://www.ncsl.org/research/elections-and-campaigns/vote-centers.aspx.
\29\ Ibid.
---------------------------------------------------------------------------
Despite these advantages, EPBs also have the potential to introduce
cybersecurity risks. In a worst-case scenario, hackers could alter or
delete voter data, even causing voters to appear as if they have voted
when they have not. EPBs that require access to the internet can also
pose problems in rural counties that lack reliable connectivity.\30\
Unlike voting machines, there are currently no Illinois or National
security standards for electronic pollbooks. Currently, the Help
America Vote Act (HAVA), limits the Federal election administration
agency's ability to create requirements for, test, and certify EPBs in
the same way they do for voting machines. The Illinois State Board of
Elections is subject to similar limitations and expanding the State
voting equipment certification process to include EPBs would likely
require legislative action.
---------------------------------------------------------------------------
\30\ Andrea Cordova, ``Want a Simple Way to Increase Election
Security? Use Paper,'' Brennan Center for Justice, October 8, 2018,
https://www.brennancenter.org/blog/want-simple-way-increase-election-
security-use-paper.
---------------------------------------------------------------------------
In the absence of Federal certification standards, 12 States have
developed a State-wide system of e-pollbook regulation and
certification according to the National Conference of State
Legislatures (NCSL) and some States have adopted common-sense
contingency policies to ensure that voting can continue with minimal
interruptions in the event of a successful EPB attack or failure.\31\
In 2018, when 34 States used EPBs, only half required printed back-up
paper pollbooks to be present in the polling place at the time voting
began and, in 32 of the 34 States, we found no requirements in State
law or regulation mandating a minimum number of provisional
ballots.\32\ Although some Illinois counties, such as Cook County,\33\
voluntarily supply each polling place with a paper copy of the
pollbook, or implement other common-sense contingency policies,
Illinois should consider adopting an EPB certification process and
appropriate EPB contingency measures.
---------------------------------------------------------------------------
\31\ ``Electronic Poll Books,'' National Conference of State
Legislatures, July 15, 2019, http://www.ncsl.org/research/elections-
and-campaigns/electronic-pollbooks.aspx.
\32\ Cordova, ``Want a Simple Way to Increase Election Security?
Use Paper''.
\33\ ``Election Security,'' Cook County Clerk's Office, https://
www.cookcountyclerk.com/service/election-security.
---------------------------------------------------------------------------
The Brennan Center supports updating HAVA to allow the Election
Assistance Commission (EAC) to create a certification program for all
electronic pollbooks, as they do for voting systems, in order to
encourage secure EPB systems Nation-wide. These additional
responsibilities will require increased funding and staffing levels for
the EAC to effectively test and certify EPBs.
c. a comprehensive approach to election security requires congressional
leadership and partnership with federal, state, and local election
officials.
While State and local election officials can take many important
steps without Congressional action, these efforts will result in a
patchwork of election infrastructure vulnerabilities across the
country. Only Congress can establish minimum National election security
standards to safeguard our election infrastructure and Americans'
confidence in our electoral system. Congress should take several
meaningful and simple steps to assist and support the on-going efforts
of State and local election officials to ensure that our elections are
free, fair, and secure.
i. Congress should require election system vendors to report
cybersecurity incidents.
Private companies are contracted to perform everything from
building and maintaining election websites that help voters determine
how to register and where they can vote, to printing and designing
ballots, to programming voting machines before each election, to
building and maintaining voter registration databases, voting machines,
and electronic poll books. Congress should consider additional steps to
protect our elections from attacks that target these private election
system vendors and to regulate vendor conduct. Unlike other sectors
that the Federal Government has designated ``critical infrastructure,''
there is currently almost no Federal oversight of the private vendors
who design, build, and maintain our election systems. In fact, there
are more Federal regulations for ballpoint pens and magic markers than
there are for voting systems and other parts of our Federal elections
infrastructure.
The Brennan Center recommends that Congress adopt a mandatory
reporting system for all cybersecurity incidents for election vendors.
While this may seem like a small step, it could have a large impact on
the overall security position of election officials around the country.
We know that the lack of transparency in vendor security is a
significant vulnerability to election security. Private vendors were
targeted in the 2016 election and are likely to be targeted again.\34\
In fact, reporting requirements for cybersecurity incidents are a bare
minimum, and we should be considering additional requirements such as
vendor employee background checks and other lessons learned from
similar critical infrastructure sectors.\35\ The Brennan Center has
documented some of the additional reasons for mandating such reporting
in the 2010 report, Voting System Failures: A Database Solution.\36\
---------------------------------------------------------------------------
\34\ Lawrence Norden and Ian Vandewalker, Securing Elections from
Foreign Interference, Brennan Center for Justice, 2017, https://
www.brennancenter.org/publication/securing-elections-foreign-
interference.
\35\ Brian Calkin et al., A Handbook for Elections Infrastructure
Security, Center for Internet Security, February 2018, https://
www.cisecurity.org/wp-content/uploads/2018/02/CIS-Elections-eBook-15-
Feb.pdf.
\36\ Lawrence Norden, Voting System Failures: A Database Solution,
Brennan Center for Justice, 2010, https://www.brennancenter.org/
publication/voting-system-failures-database-solution.
---------------------------------------------------------------------------
ii. Congress should make the critical infrastructure designation
permanent.
In a decision subsequently affirmed by the Trump
administration,\37\ DHS Secretary Jeh Johnson designated election
systems as ``critical infrastructure'' in January 2017.\38\ This
designation is given to ``systems and assets, whether physical or
virtual, so vital to the United States that the incapacity or
destruction of such systems and assets would have a debilitating impact
on security, National economic security, National public health or
safety, or any combination of those matters.''\39\ It is significant
because it ``enables DHS to prioritize cybersecurity and physical
security assistance to election officials upon request.''\40\ Further,
this designation emphasizes, both domestically and internationally,
that election infrastructure possesses all the benefits and protections
that the Nation has to offer.\41\ ``Finally, a designation makes it
easier for the Federal Government to have full and frank discussions
with key stakeholders regarding sensitive vulnerability
information.''\42\
---------------------------------------------------------------------------
\37\ Progress Made, But Additional Efforts Are Needed to Secure the
Election Infrastructure, Office of Inspector General, Department of
Homeland Security, February 28, 2019, https://www.oig.dhs.gov/sites/
default/files/assets/2019-03/OIG-19-24-Feb19.pdf (``Subsequently,
Secretary John Kelly affirmed the designation during a Congressional
hearing on June 6, 2017''); Chase Gunter, ``DHS secretary reaffirms
support for voting systems' critical infrastructure designation,'' GCN,
June 7, 2017, https://gcn.com/articles/2017/06/07/voting-systems-
critical-infrastructure.aspx (`` `I don't believe we should' back off
on the critical infrastructure designation, [DHS Secretary John Kelly]
told members of the Senate Homeland Security and Governmental Affairs
Committee on June 6'').
\38\ ``Statement by Secretary Jeh Johnson on the Designation of
Election Infrastructure as a Critical Infrastructure Subsector,''
Office of the Press Secretary, U.S. Department of Homeland Security,
January 6, 2017, https://www.dhs.gov/news/2017/01/06/statement-
secretary-johnson-designation-election-infrastructure-critical.
\39\ ``Statement by Secretary Jeh Johnson,'' DHS.
\40\ Election Infrastructure Security Resource Guide, Cybersecurity
and Infrastructure Security Agency, U.S. Department of Homeland
Security, May 2019, https://www.dhs.gov/sites/default/files/
publications/19_0531_cisa_election-security-resources-guide-may-
2019.pdf.
\41\ Ibid.
\42\ ``Statement by Secretary Jeh Johnson,'' DHS.
---------------------------------------------------------------------------
In practice, this designation has resulted in many substantive
partnerships and collaborations. For example, it ``enabled DHS to lead
the formation of an Election Infrastructure Subsector Government
Coordinating Council (EIS GCC) and the private sector's Election
Infrastructure Subsector Sector Coordinating Council (EISCC) to serve
as collaborative forums where the Federal Government, State, and local
government officials, and the private sector can establish mutually-
recognized information sharing to prevent or mitigate the effects of
incidents that undermine the integrity of or public confidence in the
election system.''\43\
---------------------------------------------------------------------------
\43\ Election Infrastructure Security Resource Guide, CISA.
---------------------------------------------------------------------------
Congress should make this designation permanent to guarantee States
are provided with priority access to tools and resources available from
DHS and greater access to information on cyber vulnerabilities on a
voluntary basis.
iii. Congress should provide consistent and reliable funding for
election security.
A lack of financial resources presents the most significant
obstacle to election security improvements in local jurisdictions.
Congress took an important first step in 2018 by allocating $380
million to States for election security activities, and there are
promising signs of more funding coming in 2019. But these one-time
investments are not enough to address the significant problems facing
election systems or provide long-term stability for future election
security planning. It is clear there is an on-going need for Federal
funding to help protect our election infrastructure from foreign
threats. As such, we recommend that the Federal Government increase its
funding commitment to election security and invest in innovative
approaches toward making elections more secure, accessible, and
efficient.
Because the threats to election security evolve over time,
effective election security requires an on-going commitment of
resources, as opposed to a one-time expenditure. Companies in the
private sector have departments and budgets dedicated to security
generally, and often to cybersecurity specifically, precisely for this
reason. Congress should provide a steady stream of funding for the
periodic replacement of outdated voting systems, upgrading of databases
and other election infrastructure, and the purchasing of on-going
technical and security support for all these systems.
The Brennan Center has estimated the Nation-wide 5-year cost for 4
of the highest-priority election security projects to be approximately
$2.2 billion.\44\ This total includes estimated costs for: (1)
Providing additional State and local election cybersecurity assistance,
(2) upgrading or replacing State-wide voter registration systems, (3)
replacing aging and paperless voting machines, and (4) implementing
rigorous post-election audits.
---------------------------------------------------------------------------
\44\ Lawrence Norden and Edgardo Cortes, ``What Does Election
Security Cost?,'' Brennan Center for Justice, August 15, 2019, https://
www.brennancenter.org/our-work/analysis-opinion/what-does-election-
security-cost.
---------------------------------------------------------------------------
conclusion
Election officials in Illinois and across our Nation have made
great progress since 2016 in securing our elections. But in an era when
Americans' confidence in our democracy is at stake and hostile nation
powers are likely to continue to see American election infrastructure
as a target, we cannot rest on our laurels. As one election official
noted in an interview with the Brennan Center, ``we are trying to build
the [protective] wall faster than our opponents are tearing it down.''
Doing so requires consistent, coordinated resources and leadership from
all levels, including Congress, Federal agencies, the States, and local
governments.
Chairman Thompson. Thank you very much.
I thank the witnesses for their testimony. I remind each
Member that he or she will have 5 minutes to question the
panel. I now recognize myself for questions.
Part of Ms. Howard's comments spoke to the varying degree
of ability of certain communities to finance the machines
necessary to conduct the elections.
Mr. Sandvoss, what has been your experience as to whether
or not you have seen counties with the resources to do it on
their own to buy additional equipment?
Mr. Sandvoss. Well, my experience has been that, you know,
the counties in Illinois vary along the largest and most--has
the most resources and those who are small with very little.
So I think there is not a one-size-fits-all answer to that.
But I do think that the voting machines, as it was pointed out
being as antiquated as they are, are going to have to be
replaced relatively soon if for no other reason, like any other
piece of equipment after a while it starts to break down. It
starts to--its life expectancy is coming to an end.
I think what we are facing right now is somewhat of a--you
know, when I say we I mean the election authority community--is
facing a little bit of a dilemma in the fact that voting
machine manufacturers, while they can modify their systems--
your existing systems, they can use patchwork and what not to,
you know, keep them secure.
But we are all waiting for the voluntary voting system
guidelines to be promulgated by the EAC. The voting system
manufactures, my understanding is, are holding off on new
development until they see those standards so they can
manufacture the machines to those standards.
Once those standards an enacted and the machines are
starting to be produced and, of course, they have to be tested,
that is when, I think, the resources is going to be more of an
issue and I think that is probably going to affect all the
counties because replacing the voting machines is not going to
be--not going to be cheap.
So once we are in a position to make a decision on
purchasing those machines then I think big ask is going to take
place.
Now, if our legislature can foot some of that bill, that is
great. I don't--I mean, Illinois, like probably many other
States, is not in great economic shape. Hopefully, we are
getting better.
But even so, I don't know if that is a reliable funding
source for the amount of money that it is going to take to
replace all the voting machines.
Chairman Thompson. Well, one of the challenges we have as
Members of Congress is we have been a partner with State and
locals in some of that acquiring of new equipment.
But one of the problems we run into is we need to have
standards, as you outline, in place so that vendors won't run
out and just sell equipment just because it is new equipment.
It needs to adhere to what we think the guidelines should be.
Mr. Masterson, one of the concerns that we heard early on
is whether or not the Russians or some of these other bad
actors conducted mischief in our 2016 elections.
What are you anticipating the potential for 2020 will be in
the conduct of those elections?
Mr. Masterson. Yes, thank you, Mr. Chairman, and I
appreciate the question. As, I think, Mr. Sandvoss mentioned
and Ms. Howard, we at CISA and Director Krebs have been clear
that we view the threat to election security as on-going and
that 2020 is absolutely a target for nation-state actors and
others to explore vulnerabilities not just in the systems but
create disinformation campaigns in and around the elections
process, which is why our focus isn't just on the cybersecurity
side, although that is our primary focus in working with State
and local official, but also empowering State and local
officials to talk to their voters about the security measures
they have taken, the resiliency of the process, that ability to
audit the process and manage risks to the systems so that
voters can proceed with confidence.
This is where our decentralized system is really effective
because voters can engage directly with the folks that run the
process in their community to ask the questions they have, to
serve as poll workers, to watch pre-election testing of systems
and really to understand the steps that are being taken to
secure the process.
So from our perspective, the targeting of 2020 could come
in the form of cyber operations or simply disinformation, or a
mixture, and we really want to provide the tools and skills for
the State and local officials to respond.
Chairman Thompson. Thank you. I have one additional
question.
Ms. O'Connor, you were quite clear about your system here
in Lake County and I compliment you for it.
Do you see the need either at the State or Federal level
for additional resources that could be made available to you or
what resources do you see as a local person you think the
Federal or State government should provide to you as a local
elected official?
Ms. O'Connor. I think the most--to be honest, they provide
us advice and services. But I am--I come from a background of
education so I am a strong researcher and I believe in
education.
So I look to them for the newest methods, what is out
there, how can they help us get there. So both State--the
State--the Illinois State elections advisors have been so
important to us.
Whenever we have a question we turn to them. We ask them.
They give us advice and that allows us to research the best
practice in the direction in which we are going.
Chairman Thompson. Thank you. I yield 5 minutes to the
gentleman from Illinois, Mr. Casten.
Mr. Casten. Thank you so much, Chair Thompson. Thank you,
Congresswoman Underwood, for allowing me to waive onto this
committee and thank you for doing this in Illinois.
Given the hack that happened on our elections I think it is
critical for us to let people know that we are actively working
to fix this and thank you for having us out here.
It strikes me that there is 2 ways--you know, democracy
depends on people trusting that their elections represent the
will of the people and there is 2 ways that we can frustrate
that.
One is we can go in and physically modify votes. The other
way is we can do some sort of targeted suppression of votes.
Certainly, in the pre-cyber era, I would submit to you that
targeted suppression was much more prevalent.
It is more cost-effective, if you will, in terms of time
and labor whether through poll taxes or literacy tests or
polling place location.
My first question is for you, Mr. Masterson. In a cyber
era, are you more concerned that hackers are going to come in
and try to do more targeted suppression or are they--are you
more concerned about physically altering individual votes?
Mr. Masterson. Yes, thank you for the question,
Congressman.
From our perspective, as we analyze risk we certainly
recognize that there is risk to the voting systems--those
systems that both the voter interacts with and votes on and
tabulates.
But at the same time, we haven't seen and there is no
intelligence to suggest the actual targeting of those systems
or attempts to change votes.
What we know is that adversaries are attempting to
undermine our confidence in the democratic process including by
creating doubt around a person's ability to participate, right.
So we worked throughout 2018 and continue to work now to
share information with State and local officials so they can
engage with their voters on simple messaging.
Understand, are you registered to vote before you head to
the polls? Where are you registered? Where is your polling
place? What is on your ballot? What can you expect to
experience when you enter the voting booth and engaging
directly with those who run the process?
Because the more voters know, the more attempts to
discredit the process or to provide incorrect information to
them, they have trusted sources of information at both the
State and local level to combat that information, right--to go
check the correct elections information and make sure that they
are empowered to participate in the process.
So it is twofold, right. We worry about the infrastructure
but we certainly worry--engage actively with State and local
election officials on countering messaging around the elections
process and, again, driving those voters to trusted sources of
information--your State and local officials--to validate the
information you need about that.
Mr. Casten. So I want to follow up with a second question
but I just want to make sure I understand. So are you--do you
think we are proportionately spending enough time on
suppression as opposed to changing votes?
Mr. Masterson. I think proportionately we--so we think
about it as a hybrid threat, right?
Mr. Casten. Sure.
Mr. Masterson. So there is concern about the
infrastructure. Certainly, upgrading voting machines, having
good consistent post-election audits, which counters that
initial risk concern that you have laid out, is critically
important to us and prioritized.
But equally important----
Mr. Casten. I am sorry. I just want to cut you off because
I know that Madam Underwood momentarily----
Mr. Masterson. No, I apologize, sir.
Mr. Casten. Mr. Sandvoss, as you think about the attack on
Illinois' voter files in the last election, I can see how that
could have led to voter suppression, especially if I can target
those votes and if I can go in and modify which, thankfully, we
don't think happened.
I have a hard time seeing how that would change votes.
Should I be--in light of that, is it reasonable for us to be
concerned about attacks on voter suppression in Illinois versus
changing votes, since that seemed to be the big attack in 2016?
Mr. Sandvoss. Yes, I think from what happened in 2016, you
know, there was no evidence that votes were changed, which was
certainly fortunate.
Our registration system--I think there is some
misunderstanding amongst the--you know, the general population
as reflected by some of the questions that we get.
That is, is that the registration system is completely
apart from the vote tabulation system. So even if the bad
actors were to have manipulated the voter registration data, it
wouldn't have impacted the actual counting of the votes.
So I think that point needed to be made.
Mr. Casten. But, potentially, it might have meant that when
you showed up at your polling place you weren't a registered
voter?
Mr. Sandvoss. Well, here is the--one of the advantages of
having a decentralized system is that each election authority
has its own voter registration database, if you will, for their
particular county.
So if voters came in, even if ours was compromised, they
are going to be using theirs to determine whether or not a
person is registered to vote and if they are where their--what
precinct they would be voting in.
So unless a hacker were to get into their voter
registration system and run amok, I don't think what happened
to us would have impacted at the county level on Election Day.
Our system was hacked back in June and into July whereas
the election was in November, so at least we had some time, you
know, to----
Mr. Casten. I think--I think I am out of time so I will--I
will thank you and I will yield back.
Chairman Thompson. Well, we are a little--you can have more
time if you want----
[Laughter.]
Chairman Thompson [continuing]. Since we are in Illinois.
[Laughter.]
Chairman Thompson. Yes, we--OK.
Mr. Sandvoss. I am sorry. Then the second--the other part
of your question was voter suppression and being concerned
about that or----
Mr. Casten. Yes. Really, just asking for your thoughts of
whether the--whether the attack on--you know, at that higher
level.
You know, there is the attack on the voting machine, which
I think in public's mind we think about, and then there is the
higher level attack on the actual election files.
In my small brain, if I am a hacker, that attack on the
election files feels to me like something that could be a
targeted suppression attempt. But doing that before an election
I have a hard time seeing how that would have led to a changing
vote.
So my question, really, is whether you--whether you would
agree with the conclusion in my small head.
Mr. Sandvoss. I would--yes, I would agree that it would
not--the targeted suppression or the resulting targeted
suppression from the attack on the database, in my opinion,
would just be more toward the system as a whole.
In other words, if the voter registration system could be
infiltrated by foreign actors, does that mean that the whole
election could be manipulated by these same foreign actors.
I can see where that perception could be out there and,
again, perception is reality. Even though we know that it
couldn't have happened the way it was perceived that it could
happen because, again, there is no--there is no direct link
between our voter registration system and the tabulation of
votes.
But if people think that oh, elections is one big process
inside a machine and that machine got hacked, they could say,
heck, why should I bother voting because, you know, if it is so
easy to hack then maybe my vote is not going to count, and that
is where the danger is.
I think that is what the focus is going to be on in 2020
is, you know, through education, as Ms. O'Connor pointed out,
educating the voters by saying that, hey, you might hear
stories of targeted attacks on a voter registration system but
that doesn't mean that your vote is not going to count.
Your vote is going to count, and that, I think, you know,
needs to be, you know, impressed upon the general electorate so
that they, you know, don't lose confidence in the integrity of
the election. I think that is what our big concern is.
Mr. Casten. Thank you. I yield back.
Chairman Thompson. Thank you.
I now recognize the Vice Chair of the full committee, the
gentlewoman from Illinois, for as much time as she deems
necessary.
Ms. Underwood. Oh. Well, thank you, sir.
[Laughter.]
Ms. Underwood. I will ask the question. Thank you so much.
So I want to start with Ms. O'Connor. Thank you again for
appearing on our panel today. I really appreciate your
expertise and your work here in Lake County.
In your opinion, do you believe that voters and our
election infrastructure are well-prepared here in Lake County
ahead of 2020?
Ms. O'Connor. Absolutely. I truly believe that we are well-
prepared. I am very confident. We want our voters to be
confident in our system and I believe that they are.
Lake County moves forward not only using all of the
resources that are provided. We research to find out other
avenues that we can learn and excel in, but also we are
proactive in educating our voters.
Our system, even within our office--when somebody calls our
office, for example, they don't go into a waiting spot. They
are--they are streamlined through the office where they are
always--the call is always answered by a live person and their
questions are answered.
This is very important to us because we believe that every
question is important, and every time we answer somebody's
question we believe that we have educated a family--a group--
not just one.
There are many vectors of misinformation that are out there
concerning elections. When I go speaking to different groups I
continually get similar questions and my goal is to educate.
Our office's goal is to educate people with an
understanding that what we are doing is correct and they should
be confident that their vote is going to count. Every vote is
going to count.
Ms. Underwood. Thank you.
So can you tell us a little bit about the Cyber Navigator
Program, from your perspective, and specifically if we were to
make improvements of--you know, if the Federal Government was
going to scale up the program Nation-wide or authorize more
money for States like Illinois to deploy locally, what
improvements would have that--has that program enabled Lake
County to make locally and what improvements would you
recommend to the program?
Ms. O'Connor. Absolutely. Again, like I said before, that
we are very fortunate because our office is in the Lake County
government building so we also have the technology advancements
and support from the IT experts within the Lake County
building.
But what we are receiving through our survey and how we are
adapting to update our programs and move forward and advance is
I consider stellar because I always like to look at our program
as--this is a very general idea but I like to put it in very
layman's terms because I know we always speak the language.
An election is often very language-motivated, but I like to
say that often we are looked upon election as a castle and in
our area we have the moat of our county building security.
But then we have the dragons of the State and the
National--and also supporting us and giving us additional means
and ways to protect our vote and our office.
Ms. Underwood. Thank you.
Mr. Sandvoss, what benefits does the Cyber Navigator
Program offer the county election officials specifically in
those counties where they have limited budgets at that local
level, which forces them to make difficult resource allocation
decisions?
Mr. Sandvoss. I think the benefits that the Cyber Navigator
Program or cyber navigators themselves provide to the election
authorities is the introduction of a--like a whole new way of
thinking, and even those that have IT departments, I think, you
know, prior to the Navigator Program, even prior to 2016, were
probably not focused as much on cybersecurity as they should
have been, through no fault of their own.
I mean, cybersecurity, to us--you know, we had basic levels
of security but, you know, when it comes to what was really
needed there was nowhere near enough.
So I think what the navigators are doing is providing that
education to the local jurisdictions and the ones that have
more limited resources, which is to say they have no IT
department at all, I think they are the ones that are providing
probably the most benefit to, well, I will say the election
authority community because, you know, the ones that are the
most vulnerable it goes back to the chain being as strong as
its weakest link.
I think what they are doing is they are introducing to the
local election authorities, you know, basic concepts of
security but then, you know, taking it through step by step by
analyzing what is going to be needed in order to be as secure
as they possibly can be.
I think that is probably the primary benefit that they
provide.
Ms. Underwood. What proportion of the 108 jurisdictions--
local election jurisdictions--would you say don't have that
baseline of IT capacity or cybersecurity capacity?
Mr. Sandvoss. To be quite honest, I can't give you a
percentage because I just don't know. But, you know,
anecdotally speaking from, you know, some of the hearings that
we have conducted over the past couple of years, I think maybe
two-thirds.
Ms. Underwood. Really?
Mr. Sandvoss. Yes. When I say that, I mean don't have full-
time IT divisions. They may have a--through their vendor they
probably have a person on contract that can go in and perform
IT services.
So I guess in that respect you could say everybody has at
least one person that they can rely on. But if you are talking
about an actual IT department with full-time employees, I mean,
that would be my guess.
Ms. Underwood. OK.
Mr. Sandvoss. I mean, I could certainly find out and get
back to you on that.
Ms. Underwood. Sure.
Mr. Masterson, did you have anything to add on that in
terms of proportions in our State or across the country?
Mr. Masterson. Yes. So I don't--again, anecdotally, I don't
have specific numbers. But it is not uncommon for many
counties' IT departments to have to support more than just the
elections department if there is even a dedicated IT
professional for the county.
In some counties across the country it is actually
contracted out to private-sector vendors as well.
To your question, ma'am, if I may, on the cyber navigators,
that hands-on keyboard both risk analysis and support is really
critical.
We know the steps that need to be taken to harden our
system's network segmentation two-factor authentication--all of
those controls.
It is a question of how do we get that support, and I think
what Illinois has done here is innovative and really helpful to
those counties.
Ms. Underwood. Thank you.
Back to Mr. Sandvoss. Have there been any challenges
deploying the cyber navigators to all 4 of the geographical
election authorities in Illinois?
Mr. Sandvoss. I think the biggest challenge was probably
selecting the right people to be the navigators because at
first you think of cyber and you think of--you know, you want
people who are well-versed in IT and all the jargon and all the
software and the hardware and what not, which, of course, is
very important.
But since you are basically selling a concept to the
election authorities, you needed to pick people that have not
only the technical skills but the people skills--the ones that
can go into a jurisdiction and not blind them with science but,
rather, approach them in layman's terms, saying, OK, here is--
first of all, I am here to help.
Second of all, you know, if you--you know, may I take a
look at your systems. In other words, approach it from a
standpoint of mutual respect as opposed to just giving orders
from on high, and I think that was probably the biggest
challenge.
But the second probably biggest challenge is, again,
convincing all the jurisdictions that this is something that
you have to take seriously and that even though cybersecurity
up to now has been a remote or a foreign concept, it can't be
thought of anymore like that because, again, you don't want to
be that county on Election Day that the system collapses
because you didn't do everything that you could have, and that
was probably----
Chairman Thompson. Will the gentlelady yield?
Ms. Underwood. Yes, sir.
Chairman Thompson. One of the challenges we have is
building the talent locally so those jurisdictions can do
exactly what you are talking about. The challenge more so is
the over-reliance on vendors versus the capacity.
So what happens is if Lake County didn't possess the
resources and talent internally, they would have to rely on an
outside vendor and that vendor may or may not be what you need.
But what we are trying--grappling with in Washington is how
do we come up with some standards that we all can agree that
every election system should have in order to be verifiable.
So the public policy issue for us is not to say Vendor X,
Y, or Z, but we should say an election system in order to be
verifiable must have 1, 2, 3, and that is the--that is where we
are because we want to make sure that our system of electing
our leaders is as honest and accurate as possible.
So to some degree, we put money out to States and locals as
a carrot for coming and doing that. But, again, it is a
partnership from the Federal, State, and local level and I
think Ms. Howard's testimony--written testimony said it would
cost us about $2 billion to replace the machines around. That
is a lot of money. Illinois might be----
[Laughter.]
Chairman Thompson [continuing]. The exception. But I want
you to kind of talk a little bit about how you came up with
this $2 billion amount as a cost.
Ms. Howard. Yes, sir. Thank you, Mr. Chairman.
So our $2.2 billion estimate is the cost for 4 of the
highest-priority election security measures that we have
identified.
So that includes approximately $750 million to replace the
antiquated and paper coding machines across the country and I
think Mr. Dietrich at the Illinois State Board estimated that
the cost to replace the antiquated equipment here in Illinois
would be approximately $175 million.
Our $2.2 billion estimate also includes $100 million for
audits over the next 5 years, approximately $500 million for
voter registration infrastructure and cybersecurity
improvements, and approximately $830 million to deploy, in
essence, the Cyber Navigator Program that you have here in
Illinois across the rest of the country.
Chairman Thompson. Thank you. I yield back.
Ms. Underwood. Thank you.
So my next question is for Ms. Howard. In the report that
you co-authored you mentioned 2 underfunded election security
projects in Illinois--the adoption of countermeasures for
security vulnerability identified through the risk and
vulnerability assessments and legacy voter and system
replacement, which we talked about a few times here.
Can you expand on your research and do you have any
specific recommendations as to how Illinois can address those
needs?
Ms. Howard. I think, you know, as you mentioned, in
Illinois the 2 unfunded election security projects that we
identified in working with State and local election officials
were, you know, deploying additional counter-measures based on
the findings of the local cyber navigators and to replace the
legacy voting equipment.
So these priorities are exceptionally important for a lot
of reasons and I think that, you know, you can address these in
Illinois promptly, and in Illinois you have a decentralized
system.
So every county is going to be able to decide when and what
type of equipment they are going to purchase when they purchase
new equipment and I understand that Cook County has recently
moved forward with purchasing new equipment and Macoupin County
has recently decided to move forward and purchase new
equipment. So it is moving forward on a county-by-county basis.
Ms. Underwood. I see. Thank you.
So the Senate Intelligence Committee has noted that
election systems that use these optical scanners to review
paper ballots are the least vulnerable to cyber attacks, and I
understand from Ms. O'Connor that that is what Lake County uses
as well.
What vulnerabilities are associated with the use of
electronic voting systems without the optical scanners and then
how many States would you say Nation-wide are using paperless
voting machines in 2020?
Ms. Howard. Thank you for your question.
As you have heard today, the auditability of a system is an
integral component of making it a resilient system and
auditability is just a critical step that all of our systems
need to have.
When you use a direct recording electronic, a DRE--a
paperless DRE system, you cannot conduct a robust post-election
audit on that. So that is the concern that we are looking at.
Right now we estimate that in 2020 there will be 8 States
that continue to use paperless voting equipment as their
primary voting equipment in one or more counties and those 8
States are Indiana, Kansas, Kentucky, Louisiana, Mississippi,
New Jersey, Tennessee, and Texas.
Ms. Underwood. Thank you.
How much funding would the Federal Government need for the
full--that is the $750 million you said--and then of that $750
million how much did Illinois get to make these changes that
you recommended?
Ms. Howard. So it is going to depend upon the vehicle that
Congress uses to deploy these funds. So if it is based on
whether or not the State needs to replace antiquated or is
using equipment that is more than 10 years old, the total
number is going to be a little bit different than if you used
it through the current HAVA formula.
Ms. Underwood. I see. But it would need to be robust by
then?
Ms. Howard. Yes.
Ms. Underwood. OK. Thank you.
So in preparation for this hearing I asked our constituents
in the Illinois 14th about their thoughts on what we should be
doing to secure our elections.
Within a matter of days, my office received 258 responses
from people all over the 14th District. Election security is,
clearly, at the forefront of people's minds here in district.
So I want to use the remainder of my time to bring forward
some of those constituent questions. The first is from Ryan
from Oswego, Illinois, and this is to Mr. Masterson and Mr.
Sandvoss.
What steps are being taken to prevent this structured query
language, or SQL, injection attack from occurring again? For
the folks here, it was that type of attack that the Russian
operatives used in 2016 to penetrate the State Board of
Elections.
Mr. Sandvoss. Well, I would--the step that we took is we
closed the portal in which the SQL injection entered into our
system.
It was a design flaw in the paperless on-line voter
registration application system where the voter is--checks to
see what their registration status is and there was a window
there that should have had a restriction on the number of
characters, and for whatever reason that feature wasn't on
there.
Ms. Underwood. I see.
Mr. Sandvoss. So we discovered what had happened pretty
quickly and immediately corrected it. I would say, going
forward, we have--we conduct risk assessments in penetration
testing, which basically bombards our system with different
types of malware, including SQL, just to see if there is any
other open windows, so to speak, and so far we haven't found
any.
So that is--I mean, you still check on a regular basis just
to make sure. But that is--that is the steps we have taken.
Ms. Underwood. That is great.
Then Peter from Island Lake had a related question--should
there be a hard-copy back-up for all Illinois elections in case
of hacking and do we have an emergency response team in our
State in case hacking is detected?
Mr. Sandvoss. As far as the second part of the question, I
would say we do have an emergency response team. I think it is
a cooperation effort between the State Board of Elections, the
State-wide Terrorism Information Center. We are working with
the DHS as well as the National Guard.
So I think that we would have personnel that are ready to
go on a moment's notice responding to a cyber incident before,
during, and right after the election.
Ms. Underwood. Thank you.
Mr. Sandvoss. So--I am sorry, what was the first part of
the question?
Ms. Underwood. The hard-copy back-up of all elections.
Mr. Sandvoss. Yes. I mean, a hard copy could be produced.
It probably would be a good idea to have.
I guess the only problem with that is that now that we have
grace period registration, same-day registration, that list
would constantly be changing.
So at what point do you print the list or have the back-up?
Because every day it could be different. Somebody could be off
the rolls, on the rolls, and so you would have a lot of
supplemental lists.
But I guess, in general, if there was a major hacking
incident and the whole registration--the electronic part of it
went down, having a paper back-up would be--would be useful.
Ms. Underwood. OK.
Mr. Masterson.
Mr. Masterson. Yes, just very quickly, ma'am. Thank you for
the question.
Certainly, taking regular backups both on-line and off-
line, understanding where those dependencies are is absolutely
critical, and then having an incident response plan and
exercising that plan.
So implementing those back-ups and knowing they are going
to work when you need them is something we recommend and work
with through tabletop exercises and other work with the State
and local so that there is that plan in place and they can
actively respond if something occurs to whether the voter
registration list or other systems.
Ms. Underwood. Did you want to mention the EIISAC that
could be maybe not the emergency response but certainly does
help----
Mr. Masterson. Yes----
Ms. Underwood [continuing]. States and municipalities----
Mr. Masterson. Absolutely. So the EIISAC provides both
information sharing and response. DHS CISA provides incident
responders both remotely but also that can deploy and get
operations back up and running to mitigate the impacts of a
cyber attack. So we have any number of resources that we could
bring to bear, and thank you for asking that.
Ms. Underwood. Sure. OK.
So Paul from Naperville wants to know, is there any way to
know if my personal voting information has been compromised?
Mr. Sandvoss. Assuming he is referring to the 2016 database
breach, he would have been notified.
Ms. Underwood. OK.
Mr. Sandvoss. If there was enough information that we could
determine a specific voter, we were required by law to notify
that voter and we did, and then we provided the voters who were
affected with options or resources that they could use to
determine whether or not the information was improperly used.
To my knowledge, I don't think that anybody suffered any
type of loss as a result of--like, economic loss as a result of
the hack or if they did they haven't come forward to us and
reported it.
Ms. Underwood. So we haven't spent a lot of time here today
talking about social media companies, the misinformation,
disinformation. Congressman Casten raised it during his line of
questioning earlier and I think that that is an important piece
of this.
So I want to know from Ms. O'Connor do you all have any
kind of capacity to do anything on-line to combat that
misinformation or are you more relying on people if they have a
question to proactively reach out to your office?
Ms. O'Connor. We do that--we do it. We are very involved in
social media from our office. So we are always delivering, you
know, correct information, you know, on our Facebook page and
all that--the modern social media aspects that today's world
has.
So, again, our office believes in this educating and if
somebody asks a question on our Facebook page we will correct
them. You know, so in that respect, yes, we are involved in
social media.
Ms. Underwood. OK.
Ms. O'Connor. Yes, we are active in correcting and
educating our constituents.
Ms. Underwood. Awesome. Do you all have recommendations for
how people should flag misinformation or disinformation? Do you
all receive it at the State Board of Elections or is CISA doing
anything in that respect as well?
Mr. Masterson. So I can start. So yes, absolutely. We have
direct lines of contact with all the major social media
companies.
Throughout 2018, State election officials and local
election officials reported activity that we were able to pass
on not just to the platform that had the activity but to all
the platforms so they could look to see if it was cross-
platform activity.
We don't recommend any actions to take on the activity but
we are able to pass it on and say, here is activity that has
been reported to us. Here is the contact for the State or local
election official reporting it.
I will say when it comes to responding to disinformation
around the elections process of misleading on where to vote,
when to vote, things like that, the social media companies took
a very aggressive posture and have published policies about
takedown processes regarding that kind of activity and we are
able to push that to them.
Ms. Underwood. So Christina from Batavia wants to know, is
there anything that citizens should watch for on social media
that might be signs of intrusion or election interference?
Mr. Sandvoss. Well, I guess it depends on how knowledgeable
a given person is with respect to voting procedure. I mean,
if--obviously, if you see something that says oh, Election Day
has been canceled--voting will start, you know, a week from
today or something like that, you know, if it raises a red
flag, if it doesn't make sense, if it just seems not right, we
are going to encourage people to report it. You know, if you
see something say something. So it is those types of things
that----
Ms. Underwood. Report it to you or report it to the
platform?
Mr. Sandvoss. Well, right now I think we are trying to
decide how we are going to do that.
Ms. Underwood. I see.
Mr. Sandvoss. Yes. We haven't solidified that yet. But I
think the idea will be to communicate it probably to us and
then we would distribute it to our partners and then it would
some--you know, it would eventually make its way to these--
whatever social media company it originated from to get it
corrected.
So it is examples like that that we are going to try to,
you know, to put out and are included in our, you know, PR
campaign, if you will, you know, trusted source and, first of
all, you know, trusted source--specific county clerk or the
Board of Election Commissioners or the State Board of
Elections.
So if you see something that doesn't, you know, purport to
be from an official Government agency, question it and then,
second, like I said, if it just doesn't smell right, you know,
say something.
Even if you are wrong doesn't matter. You know, at least it
is communicated and you are being vigilant. So we are going
to--we will, you know, put out basic things like, you know, no,
there is no internet voting.
So any website that purports to say, you know, vote over
the internet, ignore it. It is wrong.
Ms. Underwood. Right.
Mr. Sandvoss. You know, voting--you know, Election Day is,
you know, November 6 or 5 or whatever day it is. You know, if
you get a post that says Election Day has been postponed or,
you know, Democrats vote on Tuesday and Republicans vote on
Wednesday--things that just don't make sense, you know, please,
you know, alert us to that and we can get that--we can get that
taken care of.
Ms. Underwood. One of the students who is here had a
question. It is J.R.--I don't know which one is J.R. Do you
think that it is going to be a recurring problem of other
countries interfering with United States Presidential elections
as well as distributing propaganda on social media?
So we talked about how the cybersecurity piece we knew was
going to be a recurring threat. But just to put a pin in it, do
we think that this social media disinformation will also be a
recurring theme for 2020 and beyond?
Mr. Masterson. Yes, absolutely. I mean, the attempts by
adversaries to undermine confidence in our democratic
institutions as a whole is an on-going and robust effort from a
variety of adversaries.
So absolutely. We view 2020 as a prime target for that as
well as other democratic institutions.
Ms. Underwood. Awesome. Well, I can't stress enough the
importance of today's hearing and the educational benefit that
it has provided to our committee and to the public.
As I said before, the election is around the corner, less
than 6 months until the primary, and we have to seize on every
opportunity to have meaningful conversations like this one.
Thank you, and I yield back.
Chairman Thompson. Thank you.
Mr. Casten has some additional questions.
Mr. Casten. Thank you.
The--so I want to follow on--pick up some of what I was
asking before about the sort-of targeted suppression angle in
addition to changing votes and I--I am not a IT expert by any
stretch but I spent 16 years as the CEO of energy companies,
first as a manufacturer of power generation equipment and then
running utilities.
A part of our job was to figure out where the
vulnerabilities were and close those doors, which is why--which
is why I am, at least, personally hypersensitive to this issue.
There is one question of how you suppress votes. There is a
separate question of how you target them. Having recently won
my first-ever election, it struck me that the--a campaign
office is a beautiful place to hack into that election system
because you have got tens, hundreds, in Congresswoman
Underwood's case and I, thousands of volunteers showing up in
uncontrolled offices, papers all over the place, and doing
something that by its nature is partisan, which means that
sometimes getting National support is a little less than it
should be.
Mr. Masterson or Ms. Howard, I wonder if you have thoughts
on are we doing enough to secure the voter data on the campaign
side of what we do up on this side of the dais and, if not,
what can we do more at a National level so that all that
doesn't fall on campaigns or political parties to provide that
protection? Because if I have that data I know exactly who to
target.
Ms. Howard. I think Matt may be better to answer this
because he--they work directly with campaigns and candidates.
Mr. Casten. OK.
Mr. Masterson. I appreciate the question, and we have been
working with DNC and RNC in campaign committees as well as
individual campaigns in both outreach with information sharing
and the same support and services that we offer for free to
State and local election officials are available to these
campaigns, all with the goal of managing the rest of their
infrastructure.
Specifically to voter data, a big part of the voter
registration data is publicly available already, right. That is
how campaigns get a lot of it. So it is understanding what
additional data is there and how they can secure that data,
working with vendors primarily, right.
So understanding the third-party risk, and then managing
that human element is a huge part of managing campaign risk,
right.
So you hit on it directly, Congressman, and that is that
there is volunteers, pop-up employment opportunities throughout
campaigns and so how do we build-up resilience in the people
engaged in the campaign work through phishing campaign
assessments, through targeted education campaigns. So we have
worked very closely with the campaigns to try to raise that
awareness.
We created a very simple election campaign security
checklist that we worked with both DNC and RNC on and then
pushed it out through their channels in order to just give the
simple steps that whether you are a volunteer or the candidate
yourself that you can take to manage the risk to your systems,
personal devices and otherwise, to protect that data that you
have whether it is voter data or just important campaign
communications, right.
Mr. Casten. My sense is that that--my experience is that
that was more an opt-in than an opt-out program, right, because
you still have volunteers showing up with their own computers.
You know, by design you are not using a Government computer
that has been Government-secured for those.
You know, I think, you know, we certainly tried to do a lot
on our end but, man, it felt like a hole to me. Is there a way
to make that an opt-out program?
Mr. Masterson. So all of our services, all of our support
are voluntary and so it is really a question of, how we can
best engage with the campaigns to either get that information
out or the support and services?
I will say that both the RNC and DNC, in working with them,
have taken a lot of actions, a lot of engagement opportunities
with their campaigns and others to build that awareness.
But it is a big challenge for many campaigns and, candidly,
it starts with the candidate. When the candidate prioritizes
cybersecurity in a campaign, the rest of the campaign
prioritizes.
Mr. Casten. Ms. Howard.
Ms. Howard. Thank you. I would just add that the Federal
Election Commission has been working with nonprofit
organizations on options to provide cyber assistance to
campaigns free of charge.
But, as you know, there is no quorum currently at the FEC
so this is a problem.
Mr. Casten. Mm-hmm. So I want to touch on something that
Congresswoman Underwood raised. The social media question, to
me, is less about does somebody say that is false on social
media, do they get bad information as much as does that
information then atomize and go out?
So the--you know, what Russia did in the United States in
2016 was not substantively different. It is different by scale
but wasn't substantively different from the way they did it in
Estonia or in Georgia or even in their own country.
They create social media campaigns to establish that voters
cannot trust their institutions and at that point the
institutions are weakened because that is Russia's national
agenda.
That is a hard genie to put back in the bottle in a very
atomized media environment. But my question really for all of
you is that we, as public officials, have a duty to make sure
that our election systems are as robust and protected as
possible.
We also have the bully pulpit, and if we--if we exaggerate
this fear beyond a reasonable level, the risk is that people
might say, well, look, you know, all of these Members of
Congress what they are saying, you can't trust your election
system, in which case the Russians have exactly what they want.
So you 4 who are experts in this, how would you like to see
us as public officials talking about this issue in a way that
is both responsible and focused on closing barn doors where
they are open but doesn't in any way over-stoke the fear beyond
what is reasonable?
Mr. Sandvoss. Well, I will speak from my experience and,
granted, this isn't coming from, you know, elected Members of
Congress. This is coming more from the DHS.
But it is certainly appreciated as the communication of the
threats that are out there so that we know what is to expect
and then we, at the State level, can decide how we want to
present that to our general public.
I agree, it is a fine line between being--you want to
project an aura of confidence because--I get this question all
the time, how confident are you in the security of the
elections leading up to 2020?
I want to say that I am confident but I don't want to sound
like I am overconfident because then--you know, I know that
systems can get hacked into and I know that, you know, foreign
actors can engage in misinformation that could be successful.
So to make a prediction that I know might not come true
would be kind-of silly. By the same token, you want to project
an attitude of confidence that at least, hey, we are doing
everything we can to, you know, make the elections secure.
We think they will be secure. Your vote--we think it will
count. I mean, not say think. We know it will count. Then, you
know, just--you know, put people's minds at ease.
I mean, obviously, there is a threat. Everybody knows it.
But try to put their minds at ease and, to me, it is no
different than anything else one might do.
I mean, are you going to not go outside because you risk
getting hit by a car or not fly because you think your plane is
going to down?
People still live their lives and I think, you know, with
voting it should be the same way that, yes, there is risks.
Yes, something could happen.
It might result in a line and it might result in me having
to cast a provisional ballot. But, ultimately, at the end of
the day, my vote is going to count and I think that is the
message we want to send.
Ms. O'Connor. I am just going to comment that we work
really hard to develop a trust and that, to us, is significant.
We inform our citizens when we go to conferences, when we go to
workshops.
For example, the Illinois workshop for clerks we talked
about at that workshop how we have a back-up plan. We talk
about our assessments. We are educated on what we should do
next.
But we also look at each other as a community of Illinois
clerks or as a community of clerks Nation-wide, and I think
that is important because we communicate our ideas.
For example, I will get calls from other clerks saying, you
know, what are you doing for this--how are you sending that
information--can you share it.
We are a community of clerks within the State of Illinois
and I think that is very crucial because as we move forward in
that, you are not only developing trust but you are also
developing a huge network of support.
Ms. Howard. I would say that I agree that there are 2
distinct issues, right--attacks on our infrastructure versus
disinformation and trying to suppress the vote. But I think
that they are linked.
Part of what they do with their disinformation campaigns is
to exploit the concerns that people have about our
infrastructure and investing in our infrastructure to
strengthen it and to inform the public, right.
But it can withstand attack is a very important piece of
this and kind-of, you know, looking back. I think Illinois
election officials have really been pioneers in discussing this
issue in an open and frank manner and have really helped
election officials across the country figure out what is going
to work for them as far as, right, striking the right balance
between being honest and forthcoming about what is going on,
right, but still ensuring that people have confidence in their
voting system.
Mr. Masterson. Just quickly, sir--I really appreciate your
question. I think Americans--most Americans have been impacted
by cyber incidents, right. So they recognize there are
vulnerabilities in systems.
So having an open discussion about what vulnerabilities may
exist, what steps the folks at this table are taking to address
those vulnerabilities, what more could be done to improve the
resilience of the process.
All of us should be engaging voters in those conversations
so that they can understand. They are not--they are not going
to believe if you say everything is fine because they have been
impacted by incidents like that.
Then talking very candidly between Members of Congress and
election officials--it is why I appreciate this hearing so
much--so that you can understand how they view the risks, how
they talk about the challenges to the process and have built
resilience, whether it is through auditing, through a
provisional balloting process, and then engaging your
constituents in what steps they can take.
Because it really is--as the Chairman said, it is a whole-
of-government but it is a whole-of-Nation response and they--
voters have the ability to ensure that their registration
information is up-to-date and correct, that they know their
polling place, what is going to be on the ballot--that they
know they have a right to a provisional ballot such that if
there is a problem at the polls they can still cast a vote and
know and actually get the information from the State that their
vote was counted as cast is critically important.
So I think an honest discussion about both the risks in the
process, the vulnerabilities, but also the steps that have been
taken and continue to need to be taken is really critical as we
move forward.
Mr. Casten. Thank you. I yield back.
Chairman Thompson. Thank you. Yield additional questions to
the gentlelady from Illinois.
Ms. Underwood. Yes. Great conversation. Thank you, Mr.
Chairman.
It dawned on me that we did not talk about the results--the
notification of the findings and making sure that there is a
trust that those findings are correct.
Have you all identified any vulnerabilities within the
State of Illinois' reporting systems or across the country, and
if anybody could just characterize any steps that are taken to
ensure that not just the votes are counted but as they are
reported on Election Night the American public can trust those
findings to be correct.
Ms. Howard. Thank you for the question.
I think your question goes to the--again, the auditability
of the system. So right now we have 24 States, we estimate, in
2020 that will conduct post-election audits before
certification using the paper ballots, right.
Again, to go back to your question of confirming that the
winner actually did win the election. We think, while Illinois
conducts what is called a traditional post-election audit where
they look at a predetermined percentage of votes cast in
particular polling locations, that there is a better method.
We think the risk-limiting audit would answer the questions
that you have and that lots of other voters have, and that it
is something that, you know, we hope to work with Illinois
election officials on in the future.
Ms. Underwood. Thank you. Thank you all.
Yield back, Mr. Chairman.
Chairman Thompson. Thank you.
Well, let me thank our witnesses for their valuable
testimony and the Members for their questions.
The Members of the committee may have additional questions
for the witnesses and we ask that you respond expeditiously in
writing to those questions.
But I can say from the witness testimony so far as Illinois
is concerned and Lake County specifically you are headed
absolutely in the right direction.
From our vantage point in Washington, you are doing exactly
the kind of work that we envision the rest of the country
should do and we encourage that.
We go back to Washington this afternoon with a new sense of
hope that the investment we put in under the HAVA last payment
we can, hopefully, get new money into the system to give
greater capacity to the State and locals toward improving their
system of elections.
So hearing no further business, the committee stands
adjourned.
[Whereupon, at 11:38 a.m., the committee was adjourned.]
[all]