{"id":213013,"date":"2016-10-28T15:40:03","date_gmt":"2016-10-28T19:40:03","guid":{"rendered":"https:\/\/news.harvard.edu\/gazette\/?p=213013"},"modified":"2016-10-28T18:04:52","modified_gmt":"2016-10-28T22:04:52","slug":"as-americans-vote-will-hackers-pounce","status":"publish","type":"post","link":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/","title":{"rendered":"As Americans vote, will hackers pounce?"},"content":{"rendered":"<header\n\tclass=\"wp-block-harvard-gazette-article-header alignfull article-header is-style-square has-light-background has-colored-heading\"\n\tstyle=\" \"\n>\n\t\n\t<div class=\"article-header__content\">\n\t\t\t<a\n\t\t\tclass=\"article-header__category\"\n\t\t\thref=\"https:\/\/news.harvard.edu\/gazette\/section\/science-technology\/\"\n\t\t>\n\t\t\tScience &amp; Tech\t\t<\/a>\n\t\t\n\t\t<h1 class=\"article-header__title wp-block-heading \">\n\t\tAs Americans vote, will hackers pounce?\t<\/h1>\n\n\t\n\t\n\t<div class=\"article-header__meta\">\n\t\t<div class=\"wp-block-post-author\">\n\t\t\t<address class=\"wp-block-post-author__content\">\n\t\t\t\t\t<p class=\"author wp-block-post-author__name\">\n\t\tLaura Colarusso\t<\/p>\n\t\t\t<p class=\"wp-block-post-author__byline\">\n\t\t\tHarvard Correspondent\t\t<\/p>\n\t\t\t\t\t<\/address>\n\t\t<\/div>\n\n\t\t<time class=\"article-header__date\" datetime=\"2016-10-28\">\n\t\t\tOctober 28, 2016\t\t<\/time>\n\n\t\t<span class=\"article-header__reading-time\">\n\t\t\t4 min read\t\t<\/span>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\n\t\t\t<h2 class=\"article-header__subheading wp-block-heading\">\n\t\t\tPanelists at Kennedy School discuss DNC attacks and wider vulnerabilities\t\t<\/h2>\n\t\t\n<\/header>\n\n\n\n<div class=\"wp-block-group alignwide has-global-padding is-content-justification-center is-layout-constrained wp-block-group-is-layout-constrained\">\n\n\n\t\t<p>In late April, the Democratic National Committee (DNC) suspected that something was wrong with their network and called in the cybersecurity firm CrowdStrike to investigate. A few weeks later, after routine testing, the suspicions were confirmed: The committee had been hacked by the Russians.<\/p>\n<p>The DNC\u2019s system \u201clit up like a Christmas tree,\u201d said Dmitri Alperovitch, CrowdStrike\u2019s chief technology officer. The culprits were bad actors CrowdStrike had seen before and given nicknames. \u201cCozy Bear,\u201d Russia\u2019s Federal Security Service, had been attacking the DNC since the summer of 2015. \u201cFancy Bear,\u201d which refers to Russia\u2019s military intelligence unit, had started its infiltration shortly before CrowdStrike did its test.<\/p>\n<p>As DNC documents were leaked throughout the summer and into the fall, the episode put the United States on notice that Vladimir Putin\u2019s government is intent on influencing the 2016 election, Alperovitch said during a panel discussion at Harvard Kennedy School (HKS). That could mean a couple of things, he said. Russia might try to hack voting machines or it could mount a disinformation campaign to discredit the eventual results.<\/p>\n<p>\u201cThe fundamental objective here by the Russians is not necessarily to get one person or another elected as president,\u201d said Alperovitch. \u201cThe fundamental objective is actually much more nefarious, which is to undermine the very idea of a free and fair election \u2014 the cornerstone of our democracy.\u201d<\/p>\n<p>The decentralized nature of the U.S. vote should protect against a widespread intrusion, said Pamela Smith, president of Verified Voting, a nonpartisan advocacy group. Each of the 9,000 election jurisdictions across the country has its own systems and procedures, meaning no single point of failure could disrupt the tally nationwide.<\/p>\n<p>Additionally, many jurisdictions have mitigation systems that would help election officials reconstruct voters\u2019 intent if electronic voting machines break down or are compromised by an attack. At least 75 percent of voters casting ballots between now and Nov. 8 will do so on machines that have either a paper ballot or a paper backup.<\/p>\n<p><figure id=\"attachment_213015\" aria-describedby=\"caption-attachment-213015\" style=\"width: 605px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-213015 size-full\" src=\"https:\/\/news.harvard.edu\/gazette\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_ss7.jpg\" alt=\"Moderator Michael Sulmeyer, Pamela Smith, Dmitri Alperovitch, and Ben Buchanan. Photo by Sarah Silbiger\" width=\"605\" height=\"403\" srcset=\"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_ss7.jpg 605w, https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_ss7.jpg?resize=150,100 150w, https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_ss7.jpg?resize=300,200 300w, https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_ss7.jpg?resize=48,32 48w, https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_ss7.jpg?resize=96,64 96w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><figcaption id=\"caption-attachment-213015\" class=\"wp-caption-text\">Moderator and director of the Belfer Center&#8217;s Cyber Security Project Michael Sulmeyer (from left), Pamela Smith, Dmitri Alperovitch, and Ben Buchanan at the John F. Kennedy Jr. Forum. \u201cThe fundamental objective [of the hack] &#8230; is to undermine the very idea of a free and fair election,&#8221; said Alperovitch. Photo by Sarah Silbiger<\/figcaption><\/figure>However, five states \u2014 Delaware, Georgia, Louisiana, New Jersey, and South Carolina \u2014 have no paper trail whatsoever. Another nine, including swing state Pennsylvania, have some jurisdictions that rely on paperless voting.<\/p>\n<p>Voting isn\u2019t the only vulnerability. Every state has a computerized voter registration database that could be susceptible to hacking. Already this year, two states \u2014 Arizona and Illinois \u2014 have seen their registration systems breached. The questions now, according to Smith, include: Can records of who is registered to vote be tampered with or deleted? And, if so, how does that affect the election?<\/p>\n<p>\u201cThe breaches \u2026 in June and July of the voter registration systems coupled with the DNC hack of the emails really brought a lot of people up short and made them realize this is not so much theoretical,\u201d said Smith. \u201cThis is happening. We need to check our systems.\u201d<\/p>\n<p>The Department of Homeland Security is collaborating with election officials in 40 states to provide vulnerability scans and cyber-risk assessments. Yet U.S. voting systems are not classified as critical infrastructure, a designation that would allow for enhanced security.<\/p>\n<p>No less urgent, said the\u00a0Belfer Center\u2019s Ben Buchanan, is the need for policymakers to assert consequences for bad actors intent on disrupting American voting.<\/p>\n<p>\u201cThe United States needs to come out after this election and establish some kind of deterrent policy,\u201d said Buchanan, a postdoctoral fellow with the center\u2019s Cyber Security Project. \u201cIf you start to mess with the integrity of an election machine itself [or] the integrity of a voter registration database or of a dissemination system, we will take that very seriously, and we will retaliate. We consider elections so fundamental to our democracy that we are ready to defend them with force or whatever is required.&#8221;<\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;top:612px;left:20px;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;top:612px;left:20px;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n\n\n<\/div>\n\n\t\t","protected":false},"excerpt":{"rendered":"<p>Panelists at the Kennedy School discussed the possibility of hackers targeting the U.S. vote. <\/p>\n","protected":false},"author":108352576,"featured_media":213014,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"gz_ga_pageviews":23,"gz_ga_lastupdated":"2020-02-15 04:09","document_color_palette":null,"author":"Laura Colarusso","affiliation":"Harvard Correspondent","_category_override":"","_yoast_wpseo_primary_category":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1387],"tags":[37169,37167,9609,10553,37165,37168,37166],"gazette-formats":[],"series":[],"class_list":["post-213013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-science-technology","tag-fancy-bear","tag-ben-buchanan","tag-cybersecurity","tag-democratic-national-committee","tag-dmitri-alperovitch","tag-hacking","tag-pamela-smith"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>As Americans vote, will hackers pounce? &#8212; Harvard Gazette<\/title>\n<meta name=\"description\" content=\"Panelists at the Kennedy School discussed the possibility of hackers targeting the U.S. vote.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"As Americans vote, will hackers pounce? &#8212; Harvard Gazette\" \/>\n<meta property=\"og:description\" content=\"Panelists at the Kennedy School discussed the possibility of hackers targeting the U.S. vote.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/\" \/>\n<meta property=\"og:site_name\" content=\"Harvard Gazette\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-28T19:40:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-28T22:04:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.harvard.edu\/gazette\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"605\" \/>\n\t<meta property=\"og:image:height\" content=\"403\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"gazettejohnbaglione\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/\"},\"author\":{\"name\":\"gazettejohnbaglione\",\"@id\":\"https:\/\/news.harvard.edu\/gazette\/#\/schema\/person\/99782494e562769a740295b11ce6dafe\"},\"headline\":\"As Americans vote, will hackers pounce?\",\"datePublished\":\"2016-10-28T19:40:03+00:00\",\"dateModified\":\"2016-10-28T22:04:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/\"},\"wordCount\":691,\"publisher\":{\"@id\":\"https:\/\/news.harvard.edu\/gazette\/#organization\"},\"image\":{\"@id\":\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg\",\"keywords\":[\"\\\"Fancy Bear\\\"\",\"Ben Buchanan\",\"Cybersecurity\",\"Democratic National Committee\",\"Dmitri Alperovitch\",\"hacking\",\"Pamela Smith\"],\"articleSection\":[\"Science &amp; Tech\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2016\",\"copyrightHolder\":{\"@id\":\"https:\/\/news.harvard.edu\/gazette\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/\",\"url\":\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/\",\"name\":\"As Americans vote, will hackers pounce? &#8212; Harvard Gazette\",\"isPartOf\":{\"@id\":\"https:\/\/news.harvard.edu\/gazette\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg\",\"datePublished\":\"2016-10-28T19:40:03+00:00\",\"dateModified\":\"2016-10-28T22:04:52+00:00\",\"description\":\"Panelists at the Kennedy School discussed the possibility of hackers targeting the U.S. vote.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/#primaryimage\",\"url\":\"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg\",\"contentUrl\":\"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg\",\"width\":605,\"height\":403},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/news.harvard.edu\/gazette\/#website\",\"url\":\"https:\/\/news.harvard.edu\/gazette\/\",\"name\":\"Harvard Gazette\",\"description\":\"Official news from Harvard University covering innovation in teaching, learning, and research\",\"publisher\":{\"@id\":\"https:\/\/news.harvard.edu\/gazette\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/news.harvard.edu\/gazette\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/news.harvard.edu\/gazette\/#organization\",\"name\":\"The Harvard Gazette\",\"url\":\"https:\/\/news.harvard.edu\/gazette\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/news.harvard.edu\/gazette\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/news.harvard.edu\/wp-content\/uploads\/2023\/12\/Harvard_Gazette_logo.svg\",\"contentUrl\":\"https:\/\/news.harvard.edu\/wp-content\/uploads\/2023\/12\/Harvard_Gazette_logo.svg\",\"width\":164,\"height\":64,\"caption\":\"The Harvard Gazette\"},\"image\":{\"@id\":\"https:\/\/news.harvard.edu\/gazette\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/news.harvard.edu\/gazette\/#\/schema\/person\/99782494e562769a740295b11ce6dafe\",\"name\":\"gazettejohnbaglione\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"As Americans vote, will hackers pounce? &#8212; Harvard Gazette","description":"Panelists at the Kennedy School discussed the possibility of hackers targeting the U.S. vote.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/","og_locale":"en_US","og_type":"article","og_title":"As Americans vote, will hackers pounce? &#8212; Harvard Gazette","og_description":"Panelists at the Kennedy School discussed the possibility of hackers targeting the U.S. vote.","og_url":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/","og_site_name":"Harvard Gazette","article_published_time":"2016-10-28T19:40:03+00:00","article_modified_time":"2016-10-28T22:04:52+00:00","og_image":[{"width":605,"height":403,"url":"https:\/\/news.harvard.edu\/gazette\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg","type":"image\/jpeg"}],"author":"gazettejohnbaglione","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/#article","isPartOf":{"@id":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/"},"author":{"name":"gazettejohnbaglione","@id":"https:\/\/news.harvard.edu\/gazette\/#\/schema\/person\/99782494e562769a740295b11ce6dafe"},"headline":"As Americans vote, will hackers pounce?","datePublished":"2016-10-28T19:40:03+00:00","dateModified":"2016-10-28T22:04:52+00:00","mainEntityOfPage":{"@id":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/"},"wordCount":691,"publisher":{"@id":"https:\/\/news.harvard.edu\/gazette\/#organization"},"image":{"@id":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/#primaryimage"},"thumbnailUrl":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg","keywords":["\"Fancy Bear\"","Ben Buchanan","Cybersecurity","Democratic National Committee","Dmitri Alperovitch","hacking","Pamela Smith"],"articleSection":["Science &amp; Tech"],"inLanguage":"en-US","copyrightYear":"2016","copyrightHolder":{"@id":"https:\/\/news.harvard.edu\/gazette\/#organization"}},{"@type":"WebPage","@id":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/","url":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/","name":"As Americans vote, will hackers pounce? &#8212; Harvard Gazette","isPartOf":{"@id":"https:\/\/news.harvard.edu\/gazette\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/#primaryimage"},"image":{"@id":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/#primaryimage"},"thumbnailUrl":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg","datePublished":"2016-10-28T19:40:03+00:00","dateModified":"2016-10-28T22:04:52+00:00","description":"Panelists at the Kennedy School discussed the possibility of hackers targeting the U.S. vote.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/#primaryimage","url":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg","contentUrl":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg","width":605,"height":403},{"@type":"WebSite","@id":"https:\/\/news.harvard.edu\/gazette\/#website","url":"https:\/\/news.harvard.edu\/gazette\/","name":"Harvard Gazette","description":"Official news from Harvard University covering innovation in teaching, learning, and research","publisher":{"@id":"https:\/\/news.harvard.edu\/gazette\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.harvard.edu\/gazette\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.harvard.edu\/gazette\/#organization","name":"The Harvard Gazette","url":"https:\/\/news.harvard.edu\/gazette\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.harvard.edu\/gazette\/#\/schema\/logo\/image\/","url":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2023\/12\/Harvard_Gazette_logo.svg","contentUrl":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2023\/12\/Harvard_Gazette_logo.svg","width":164,"height":64,"caption":"The Harvard Gazette"},"image":{"@id":"https:\/\/news.harvard.edu\/gazette\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.harvard.edu\/gazette\/#\/schema\/person\/99782494e562769a740295b11ce6dafe","name":"gazettejohnbaglione"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"As Americans vote, will hackers pounce?","url":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/news.harvard.edu\/gazette\/story\/2016\/10\/as-americans-vote-will-hackers-pounce\/"},"thumbnailUrl":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg?w=150","image":{"@type":"ImageObject","url":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg"},"articleSection":"Science &amp; Tech","author":[{"@type":"Person","name":"gazettejohnbaglione"}],"creator":["gazettejohnbaglione"],"publisher":{"@type":"Organization","name":"Harvard Gazette","logo":"https:\/\/news.harvard.edu\/gazette\/wp-content\/uploads\/2023\/12\/Harvard_Gazette_logo.svg"},"keywords":["\"fancy bear\"","ben buchanan","cybersecurity","democratic national committee","dmitri alperovitch","hacking","pamela smith"],"dateCreated":"2016-10-28T19:40:03Z","datePublished":"2016-10-28T19:40:03Z","dateModified":"2016-10-28T22:04:52Z"},"rendered":"<script type=\"application\/ld+json\" class=\"wp-parsely-metadata\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"As Americans vote, will hackers pounce?\",\"url\":\"https:\\\/\\\/news.harvard.edu\\\/gazette\\\/story\\\/2016\\\/10\\\/as-americans-vote-will-hackers-pounce\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.harvard.edu\\\/gazette\\\/story\\\/2016\\\/10\\\/as-americans-vote-will-hackers-pounce\\\/\"},\"thumbnailUrl\":\"https:\\\/\\\/news.harvard.edu\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/102716__-election_hacking_secondchoice1.jpg?w=150\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/news.harvard.edu\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/102716__-election_hacking_secondchoice1.jpg\"},\"articleSection\":\"Science &amp; Tech\",\"author\":[{\"@type\":\"Person\",\"name\":\"gazettejohnbaglione\"}],\"creator\":[\"gazettejohnbaglione\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"Harvard Gazette\",\"logo\":\"https:\\\/\\\/news.harvard.edu\\\/gazette\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Harvard_Gazette_logo.svg\"},\"keywords\":[\"\\\"fancy bear\\\"\",\"ben buchanan\",\"cybersecurity\",\"democratic national committee\",\"dmitri alperovitch\",\"hacking\",\"pamela smith\"],\"dateCreated\":\"2016-10-28T19:40:03Z\",\"datePublished\":\"2016-10-28T19:40:03Z\",\"dateModified\":\"2016-10-28T22:04:52Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/news.harvard.edu\/p.js"},"jetpack_featured_media_url":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_secondchoice1.jpg","has_blocks":true,"block_data":{"0":{"blockName":"harvard-gazette\/article-header","attrs":{"blockColorPalette":"","coloredHeading":"","creditText":"","displayDetails":"","displayTitle":"","categoryId":1387,"mediaAlt":"","mediaCaption":"","mediaId":"","mediaSize":"","mediaType":"","mediaUrl":"","poster":"","title":"As Americans vote, will hackers pounce?","subheading":"Panelists at Kennedy School discuss DNC attacks and wider vulnerabilities","className":"is-style-square","backgroundFixed":false,"backgroundTone":"light","centeredImage":false,"coloredBackground":false,"displayOverlay":true,"fadeInText":false,"isAmbient":false,"mediaHeight":0,"mediaLength":"","mediaPosition":"","mediaWidth":0,"posterText":"","titleAbove":false,"useUncroppedImage":false,"lock":[],"metadata":[]},"innerBlocks":[],"innerHTML":"","innerContent":[],"rendered":"<header\n\tclass=\"wp-block-harvard-gazette-article-header alignfull article-header is-style-square has-light-background has-colored-heading\"\n\tstyle=\" \"\n>\n\t\n\t<div class=\"article-header__content\">\n\t\t\t<a\n\t\t\tclass=\"article-header__category\"\n\t\t\thref=\"https:\/\/news.harvard.edu\/gazette\/section\/science-technology\/\"\n\t\t>\n\t\t\tScience &amp; Tech\t\t<\/a>\n\t\t\n\t\t<h1 class=\"article-header__title wp-block-heading \">\n\t\tAs Americans vote, will hackers pounce?\t<\/h1>\n\n\t\n\t\n\t<div class=\"article-header__meta\">\n\t\t<div class=\"wp-block-post-author\">\n\t\t\t<address class=\"wp-block-post-author__content\">\n\t\t\t\t\t<p class=\"author wp-block-post-author__name\">\n\t\tLaura Colarusso\t<\/p>\n\t\t\t<p class=\"wp-block-post-author__byline\">\n\t\t\tHarvard Correspondent\t\t<\/p>\n\t\t\t\t\t<\/address>\n\t\t<\/div>\n\n\t\t<time class=\"article-header__date\" datetime=\"2016-10-28\">\n\t\t\tOctober 28, 2016\t\t<\/time>\n\n\t\t<span class=\"article-header__reading-time\">\n\t\t\t4 min read\t\t<\/span>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\n\t\t\t<h2 class=\"article-header__subheading wp-block-heading\">\n\t\t\tPanelists at Kennedy School discuss DNC attacks and wider vulnerabilities\t\t<\/h2>\n\t\t\n<\/header>\n"},"2":{"blockName":"core\/group","attrs":{"templateLock":false,"metadata":{"name":"Article content"},"align":"wide","layout":{"type":"constrained","justifyContent":"center"},"tagName":"div","lock":[],"className":"","style":[],"backgroundColor":"","textColor":"","gradient":"","fontSize":"","fontFamily":"","borderColor":"","ariaLabel":"","anchor":""},"innerBlocks":[{"blockName":"core\/freeform","attrs":{"content":"","lock":[],"metadata":[]},"innerBlocks":[],"innerHTML":"\n\t\t<p>In late April, the Democratic National Committee (DNC) suspected that something was wrong with their network and called in the cybersecurity firm CrowdStrike to investigate. A few weeks later, after routine testing, the suspicions were confirmed: The committee had been hacked by the Russians.<\/p>\n<p>The DNC\u2019s system \u201clit up like a Christmas tree,\u201d said Dmitri Alperovitch, CrowdStrike\u2019s chief technology officer. The culprits were bad actors CrowdStrike had seen before and given nicknames. \u201cCozy Bear,\u201d Russia\u2019s Federal Security Service, had been attacking the DNC since the summer of 2015. \u201cFancy Bear,\u201d which refers to Russia\u2019s military intelligence unit, had started its infiltration shortly before CrowdStrike did its test.<\/p>\n<p>As DNC documents were leaked throughout the summer and into the fall, the episode put the United States on notice that Vladimir Putin\u2019s government is intent on influencing the 2016 election, Alperovitch said during a panel discussion at Harvard Kennedy School (HKS). That could mean a couple of things, he said. Russia might try to hack voting machines or it could mount a disinformation campaign to discredit the eventual results.<\/p>\n<p>\u201cThe fundamental objective here by the Russians is not necessarily to get one person or another elected as president,\u201d said Alperovitch. \u201cThe fundamental objective is actually much more nefarious, which is to undermine the very idea of a free and fair election \u2014 the cornerstone of our democracy.\u201d<\/p>\n<p>The decentralized nature of the U.S. vote should protect against a widespread intrusion, said Pamela Smith, president of Verified Voting, a nonpartisan advocacy group. Each of the 9,000 election jurisdictions across the country has its own systems and procedures, meaning no single point of failure could disrupt the tally nationwide.<\/p>\n<p>Additionally, many jurisdictions have mitigation systems that would help election officials reconstruct voters\u2019 intent if electronic voting machines break down or are compromised by an attack. At least 75 percent of voters casting ballots between now and Nov. 8 will do so on machines that have either a paper ballot or a paper backup.<\/p>\n<p>[caption id=\"attachment_213015\" align=\"alignnone\" width=\"605\"]<img class=\"wp-image-213015 size-full\" src=\"https:\/\/news.harvard.edu\/gazette\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_ss7.jpg\" alt=\"Moderator Michael Sulmeyer, Pamela Smith, Dmitri Alperovitch, and Ben Buchanan. Photo by Sarah Silbiger\" width=\"605\" height=\"403\" \/> Moderator and director of the Belfer Center's Cyber Security Project Michael Sulmeyer (from left), Pamela Smith, Dmitri Alperovitch, and Ben Buchanan at the John F. Kennedy Jr. Forum. \u201cThe fundamental objective [of the hack] ... is to undermine the very idea of a free and fair election,\" said Alperovitch. Photo by Sarah Silbiger[\/caption]However, five states \u2014 Delaware, Georgia, Louisiana, New Jersey, and South Carolina \u2014 have no paper trail whatsoever. Another nine, including swing state Pennsylvania, have some jurisdictions that rely on paperless voting.<\/p>\n<p>Voting isn\u2019t the only vulnerability. Every state has a computerized voter registration database that could be susceptible to hacking. Already this year, two states \u2014 Arizona and Illinois \u2014 have seen their registration systems breached. The questions now, according to Smith, include: Can records of who is registered to vote be tampered with or deleted? And, if so, how does that affect the election?<\/p>\n<p>\u201cThe breaches \u2026 in June and July of the voter registration systems coupled with the DNC hack of the emails really brought a lot of people up short and made them realize this is not so much theoretical,\u201d said Smith. \u201cThis is happening. We need to check our systems.\u201d<\/p>\n<p>The Department of Homeland Security is collaborating with election officials in 40 states to provide vulnerability scans and cyber-risk assessments. Yet U.S. voting systems are not classified as critical infrastructure, a designation that would allow for enhanced security.<\/p>\n<p>No less urgent, said the\u00a0Belfer Center\u2019s Ben Buchanan, is the need for policymakers to assert consequences for bad actors intent on disrupting American voting.<\/p>\n<p>\u201cThe United States needs to come out after this election and establish some kind of deterrent policy,\u201d said Buchanan, a postdoctoral fellow with the center\u2019s Cyber Security Project. \u201cIf you start to mess with the integrity of an election machine itself [or] the integrity of a voter registration database or of a dissemination system, we will take that very seriously, and we will retaliate. We consider elections so fundamental to our democracy that we are ready to defend them with force or whatever is required.\"<\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;top:612px;left:20px;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;top:612px;left:20px;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n","innerContent":["\n\t\t<p>In late April, the Democratic National Committee (DNC) suspected that something was wrong with their network and called in the cybersecurity firm CrowdStrike to investigate. A few weeks later, after routine testing, the suspicions were confirmed: The committee had been hacked by the Russians.<\/p>\n<p>The DNC\u2019s system \u201clit up like a Christmas tree,\u201d said Dmitri Alperovitch, CrowdStrike\u2019s chief technology officer. The culprits were bad actors CrowdStrike had seen before and given nicknames. \u201cCozy Bear,\u201d Russia\u2019s Federal Security Service, had been attacking the DNC since the summer of 2015. \u201cFancy Bear,\u201d which refers to Russia\u2019s military intelligence unit, had started its infiltration shortly before CrowdStrike did its test.<\/p>\n<p>As DNC documents were leaked throughout the summer and into the fall, the episode put the United States on notice that Vladimir Putin\u2019s government is intent on influencing the 2016 election, Alperovitch said during a panel discussion at Harvard Kennedy School (HKS). That could mean a couple of things, he said. Russia might try to hack voting machines or it could mount a disinformation campaign to discredit the eventual results.<\/p>\n<p>\u201cThe fundamental objective here by the Russians is not necessarily to get one person or another elected as president,\u201d said Alperovitch. \u201cThe fundamental objective is actually much more nefarious, which is to undermine the very idea of a free and fair election \u2014 the cornerstone of our democracy.\u201d<\/p>\n<p>The decentralized nature of the U.S. vote should protect against a widespread intrusion, said Pamela Smith, president of Verified Voting, a nonpartisan advocacy group. Each of the 9,000 election jurisdictions across the country has its own systems and procedures, meaning no single point of failure could disrupt the tally nationwide.<\/p>\n<p>Additionally, many jurisdictions have mitigation systems that would help election officials reconstruct voters\u2019 intent if electronic voting machines break down or are compromised by an attack. At least 75 percent of voters casting ballots between now and Nov. 8 will do so on machines that have either a paper ballot or a paper backup.<\/p>\n<p>[caption id=\"attachment_213015\" align=\"alignnone\" width=\"605\"]<img class=\"wp-image-213015 size-full\" src=\"https:\/\/news.harvard.edu\/gazette\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_ss7.jpg\" alt=\"Moderator Michael Sulmeyer, Pamela Smith, Dmitri Alperovitch, and Ben Buchanan. Photo by Sarah Silbiger\" width=\"605\" height=\"403\" \/> Moderator and director of the Belfer Center's Cyber Security Project Michael Sulmeyer (from left), Pamela Smith, Dmitri Alperovitch, and Ben Buchanan at the John F. Kennedy Jr. Forum. \u201cThe fundamental objective [of the hack] ... is to undermine the very idea of a free and fair election,\" said Alperovitch. Photo by Sarah Silbiger[\/caption]However, five states \u2014 Delaware, Georgia, Louisiana, New Jersey, and South Carolina \u2014 have no paper trail whatsoever. Another nine, including swing state Pennsylvania, have some jurisdictions that rely on paperless voting.<\/p>\n<p>Voting isn\u2019t the only vulnerability. Every state has a computerized voter registration database that could be susceptible to hacking. Already this year, two states \u2014 Arizona and Illinois \u2014 have seen their registration systems breached. The questions now, according to Smith, include: Can records of who is registered to vote be tampered with or deleted? And, if so, how does that affect the election?<\/p>\n<p>\u201cThe breaches \u2026 in June and July of the voter registration systems coupled with the DNC hack of the emails really brought a lot of people up short and made them realize this is not so much theoretical,\u201d said Smith. \u201cThis is happening. We need to check our systems.\u201d<\/p>\n<p>The Department of Homeland Security is collaborating with election officials in 40 states to provide vulnerability scans and cyber-risk assessments. Yet U.S. voting systems are not classified as critical infrastructure, a designation that would allow for enhanced security.<\/p>\n<p>No less urgent, said the\u00a0Belfer Center\u2019s Ben Buchanan, is the need for policymakers to assert consequences for bad actors intent on disrupting American voting.<\/p>\n<p>\u201cThe United States needs to come out after this election and establish some kind of deterrent policy,\u201d said Buchanan, a postdoctoral fellow with the center\u2019s Cyber Security Project. \u201cIf you start to mess with the integrity of an election machine itself [or] the integrity of a voter registration database or of a dissemination system, we will take that very seriously, and we will retaliate. We consider elections so fundamental to our democracy that we are ready to defend them with force or whatever is required.\"<\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;top:612px;left:20px;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;top:612px;left:20px;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n"],"rendered":"\n\t\t<p>In late April, the Democratic National Committee (DNC) suspected that something was wrong with their network and called in the cybersecurity firm CrowdStrike to investigate. A few weeks later, after routine testing, the suspicions were confirmed: The committee had been hacked by the Russians.<\/p>\n<p>The DNC\u2019s system \u201clit up like a Christmas tree,\u201d said Dmitri Alperovitch, CrowdStrike\u2019s chief technology officer. The culprits were bad actors CrowdStrike had seen before and given nicknames. \u201cCozy Bear,\u201d Russia\u2019s Federal Security Service, had been attacking the DNC since the summer of 2015. \u201cFancy Bear,\u201d which refers to Russia\u2019s military intelligence unit, had started its infiltration shortly before CrowdStrike did its test.<\/p>\n<p>As DNC documents were leaked throughout the summer and into the fall, the episode put the United States on notice that Vladimir Putin\u2019s government is intent on influencing the 2016 election, Alperovitch said during a panel discussion at Harvard Kennedy School (HKS). That could mean a couple of things, he said. Russia might try to hack voting machines or it could mount a disinformation campaign to discredit the eventual results.<\/p>\n<p>\u201cThe fundamental objective here by the Russians is not necessarily to get one person or another elected as president,\u201d said Alperovitch. \u201cThe fundamental objective is actually much more nefarious, which is to undermine the very idea of a free and fair election \u2014 the cornerstone of our democracy.\u201d<\/p>\n<p>The decentralized nature of the U.S. vote should protect against a widespread intrusion, said Pamela Smith, president of Verified Voting, a nonpartisan advocacy group. Each of the 9,000 election jurisdictions across the country has its own systems and procedures, meaning no single point of failure could disrupt the tally nationwide.<\/p>\n<p>Additionally, many jurisdictions have mitigation systems that would help election officials reconstruct voters\u2019 intent if electronic voting machines break down or are compromised by an attack. At least 75 percent of voters casting ballots between now and Nov. 8 will do so on machines that have either a paper ballot or a paper backup.<\/p>\n<p><figure id=\"attachment_213015\" aria-describedby=\"caption-attachment-213015\" style=\"width: 605px\" class=\"wp-caption alignnone\"><img class=\"wp-image-213015 size-full\" src=\"https:\/\/news.harvard.edu\/gazette\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_ss7.jpg\" alt=\"Moderator Michael Sulmeyer, Pamela Smith, Dmitri Alperovitch, and Ben Buchanan. Photo by Sarah Silbiger\" width=\"605\" height=\"403\" \/><figcaption id=\"caption-attachment-213015\" class=\"wp-caption-text\">Moderator and director of the Belfer Center's Cyber Security Project Michael Sulmeyer (from left), Pamela Smith, Dmitri Alperovitch, and Ben Buchanan at the John F. Kennedy Jr. Forum. \u201cThe fundamental objective [of the hack] ... is to undermine the very idea of a free and fair election,\" said Alperovitch. Photo by Sarah Silbiger<\/figcaption><\/figure>However, five states \u2014 Delaware, Georgia, Louisiana, New Jersey, and South Carolina \u2014 have no paper trail whatsoever. Another nine, including swing state Pennsylvania, have some jurisdictions that rely on paperless voting.<\/p>\n<p>Voting isn\u2019t the only vulnerability. Every state has a computerized voter registration database that could be susceptible to hacking. Already this year, two states \u2014 Arizona and Illinois \u2014 have seen their registration systems breached. The questions now, according to Smith, include: Can records of who is registered to vote be tampered with or deleted? And, if so, how does that affect the election?<\/p>\n<p>\u201cThe breaches \u2026 in June and July of the voter registration systems coupled with the DNC hack of the emails really brought a lot of people up short and made them realize this is not so much theoretical,\u201d said Smith. \u201cThis is happening. We need to check our systems.\u201d<\/p>\n<p>The Department of Homeland Security is collaborating with election officials in 40 states to provide vulnerability scans and cyber-risk assessments. Yet U.S. voting systems are not classified as critical infrastructure, a designation that would allow for enhanced security.<\/p>\n<p>No less urgent, said the\u00a0Belfer Center\u2019s Ben Buchanan, is the need for policymakers to assert consequences for bad actors intent on disrupting American voting.<\/p>\n<p>\u201cThe United States needs to come out after this election and establish some kind of deterrent policy,\u201d said Buchanan, a postdoctoral fellow with the center\u2019s Cyber Security Project. \u201cIf you start to mess with the integrity of an election machine itself [or] the integrity of a voter registration database or of a dissemination system, we will take that very seriously, and we will retaliate. We consider elections so fundamental to our democracy that we are ready to defend them with force or whatever is required.\"<\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;top:612px;left:20px;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;top:612px;left:20px;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n"}],"innerHTML":"\n<div class=\"wp-block-group alignwide\">\n\n\n\n<\/div>\n","innerContent":["\n<div class=\"wp-block-group alignwide\">\n\n","\n\n<\/div>\n"],"rendered":"\n<div class=\"wp-block-group alignwide has-global-padding is-content-justification-center is-layout-constrained wp-block-group-is-layout-constrained\">\n\n\n\t\t<p>In late April, the Democratic National Committee (DNC) suspected that something was wrong with their network and called in the cybersecurity firm CrowdStrike to investigate. A few weeks later, after routine testing, the suspicions were confirmed: The committee had been hacked by the Russians.<\/p>\n<p>The DNC\u2019s system \u201clit up like a Christmas tree,\u201d said Dmitri Alperovitch, CrowdStrike\u2019s chief technology officer. The culprits were bad actors CrowdStrike had seen before and given nicknames. \u201cCozy Bear,\u201d Russia\u2019s Federal Security Service, had been attacking the DNC since the summer of 2015. \u201cFancy Bear,\u201d which refers to Russia\u2019s military intelligence unit, had started its infiltration shortly before CrowdStrike did its test.<\/p>\n<p>As DNC documents were leaked throughout the summer and into the fall, the episode put the United States on notice that Vladimir Putin\u2019s government is intent on influencing the 2016 election, Alperovitch said during a panel discussion at Harvard Kennedy School (HKS). That could mean a couple of things, he said. Russia might try to hack voting machines or it could mount a disinformation campaign to discredit the eventual results.<\/p>\n<p>\u201cThe fundamental objective here by the Russians is not necessarily to get one person or another elected as president,\u201d said Alperovitch. \u201cThe fundamental objective is actually much more nefarious, which is to undermine the very idea of a free and fair election \u2014 the cornerstone of our democracy.\u201d<\/p>\n<p>The decentralized nature of the U.S. vote should protect against a widespread intrusion, said Pamela Smith, president of Verified Voting, a nonpartisan advocacy group. Each of the 9,000 election jurisdictions across the country has its own systems and procedures, meaning no single point of failure could disrupt the tally nationwide.<\/p>\n<p>Additionally, many jurisdictions have mitigation systems that would help election officials reconstruct voters\u2019 intent if electronic voting machines break down or are compromised by an attack. At least 75 percent of voters casting ballots between now and Nov. 8 will do so on machines that have either a paper ballot or a paper backup.<\/p>\n<p><figure id=\"attachment_213015\" aria-describedby=\"caption-attachment-213015\" style=\"width: 605px\" class=\"wp-caption alignnone\"><img class=\"wp-image-213015 size-full\" src=\"https:\/\/news.harvard.edu\/gazette\/wp-content\/uploads\/2016\/10\/102716__-election_hacking_ss7.jpg\" alt=\"Moderator Michael Sulmeyer, Pamela Smith, Dmitri Alperovitch, and Ben Buchanan. Photo by Sarah Silbiger\" width=\"605\" height=\"403\" \/><figcaption id=\"caption-attachment-213015\" class=\"wp-caption-text\">Moderator and director of the Belfer Center's Cyber Security Project Michael Sulmeyer (from left), Pamela Smith, Dmitri Alperovitch, and Ben Buchanan at the John F. Kennedy Jr. Forum. \u201cThe fundamental objective [of the hack] ... is to undermine the very idea of a free and fair election,\" said Alperovitch. Photo by Sarah Silbiger<\/figcaption><\/figure>However, five states \u2014 Delaware, Georgia, Louisiana, New Jersey, and South Carolina \u2014 have no paper trail whatsoever. Another nine, including swing state Pennsylvania, have some jurisdictions that rely on paperless voting.<\/p>\n<p>Voting isn\u2019t the only vulnerability. Every state has a computerized voter registration database that could be susceptible to hacking. Already this year, two states \u2014 Arizona and Illinois \u2014 have seen their registration systems breached. The questions now, according to Smith, include: Can records of who is registered to vote be tampered with or deleted? And, if so, how does that affect the election?<\/p>\n<p>\u201cThe breaches \u2026 in June and July of the voter registration systems coupled with the DNC hack of the emails really brought a lot of people up short and made them realize this is not so much theoretical,\u201d said Smith. \u201cThis is happening. We need to check our systems.\u201d<\/p>\n<p>The Department of Homeland Security is collaborating with election officials in 40 states to provide vulnerability scans and cyber-risk assessments. Yet U.S. voting systems are not classified as critical infrastructure, a designation that would allow for enhanced security.<\/p>\n<p>No less urgent, said the\u00a0Belfer Center\u2019s Ben Buchanan, is the need for policymakers to assert consequences for bad actors intent on disrupting American voting.<\/p>\n<p>\u201cThe United States needs to come out after this election and establish some kind of deterrent policy,\u201d said Buchanan, a postdoctoral fellow with the center\u2019s Cyber Security Project. \u201cIf you start to mess with the integrity of an election machine itself [or] the integrity of a voter registration database or of a dissemination system, we will take that very seriously, and we will retaliate. We consider elections so fundamental to our democracy that we are ready to defend them with force or whatever is required.\"<\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;top:612px;left:20px;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;top:612px;left:20px;\">Save<\/span><\/p>\n<p><span style=\"border-radius:2px;text-indent:20px;width:auto;padding:0 4px 0 0;text-align:center;font:bold 11px\/20px 'Helvetica Neue', Helvetica, sans-serif;color:#ffffff;background:#bd081c no-repeat scroll 3px 50% \/ 14px 14px;position:absolute;opacity:1;z-index:8675309;display:none;cursor:pointer;\">Save<\/span><\/p>\n\n\n<\/div>\n"}},"jetpack-related-posts":[{"id":228648,"url":"https:\/\/news.harvard.edu\/gazette\/story\/2018\/01\/wanted-a-firewall-to-protect-u-s-elections\/","url_meta":{"origin":213013,"position":0},"title":"Wanted: A firewall to protect U.S. elections","author":"gazettejohnbaglione","date":"January 30, 2018","format":false,"excerpt":"A new bipartisan initiative at Harvard Kennedy School picks up where the federal government leaves off, bringing together experts in national security, cybersecurity, and politics to develop practical strategies, tools, and guidance to help U.S. political campaigns protect themselves from cyber threats.","rel":"","context":"In &quot;Nation &amp; World&quot;","block_context":{"text":"Nation &amp; World","link":"https:\/\/news.harvard.edu\/gazette\/section\/nation-world\/"},"img":{"alt_text":"","src":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2017\/08\/2018_30_1_digital_democracy_2500px_3.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2017\/08\/2018_30_1_digital_democracy_2500px_3.png?resize=350%2C200 1x, https:\/\/news.harvard.edu\/wp-content\/uploads\/2017\/08\/2018_30_1_digital_democracy_2500px_3.png?resize=525%2C300 1.5x, https:\/\/news.harvard.edu\/wp-content\/uploads\/2017\/08\/2018_30_1_digital_democracy_2500px_3.png?resize=700%2C400 2x"},"classes":[]},{"id":344686,"url":"https:\/\/news.harvard.edu\/gazette\/story\/2022\/06\/watergate-through-a-harvard-lens\/","url_meta":{"origin":213013,"position":1},"title":"Watergate through a Harvard lens","author":"gazettebeckycoleman","date":"June 14, 2022","format":false,"excerpt":"Many important players in the Watergate saga had Harvard connections.","rel":"","context":"In &quot;Nation &amp; World&quot;","block_context":{"text":"Nation &amp; World","link":"https:\/\/news.harvard.edu\/gazette\/section\/nation-world\/"},"img":{"alt_text":"Senate Select Committee on Watergate.","src":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2022\/06\/20220614_wgate_side_AP_730518089.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2022\/06\/20220614_wgate_side_AP_730518089.jpg?resize=350%2C200 1x, https:\/\/news.harvard.edu\/wp-content\/uploads\/2022\/06\/20220614_wgate_side_AP_730518089.jpg?resize=525%2C300 1.5x, https:\/\/news.harvard.edu\/wp-content\/uploads\/2022\/06\/20220614_wgate_side_AP_730518089.jpg?resize=700%2C400 2x"},"classes":[]},{"id":340062,"url":"https:\/\/news.harvard.edu\/gazette\/story\/2022\/03\/harvard-elections-and-the-critical-role-alumni-play\/","url_meta":{"origin":213013,"position":2},"title":"\u2018Driven by alumni \u2014 and representing our community in a profound way\u2019","author":"Lian Parsons","date":"March 22, 2022","format":false,"excerpt":"Three members of the Harvard alumni nominating committee and the HAA executive director explained the committee\u2019s work, the role alumni play at Harvard in elections, and what it means to get involved and vote.","rel":"","context":"In &quot;Campus &amp; Community&quot;","block_context":{"text":"Campus &amp; Community","link":"https:\/\/news.harvard.edu\/gazette\/section\/campus-community\/"},"img":{"alt_text":"Philip Lovejoy (clockwise from top left) Roger Fairfax, Sid Espinosa, and June Nagao.","src":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2022\/03\/021522_HAA_284.jpeg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2022\/03\/021522_HAA_284.jpeg?resize=350%2C200 1x, https:\/\/news.harvard.edu\/wp-content\/uploads\/2022\/03\/021522_HAA_284.jpeg?resize=525%2C300 1.5x, https:\/\/news.harvard.edu\/wp-content\/uploads\/2022\/03\/021522_HAA_284.jpeg?resize=700%2C400 2x"},"classes":[]},{"id":17261,"url":"https:\/\/news.harvard.edu\/gazette\/story\/2003\/04\/sph-poster-day-winners-named\/","url_meta":{"origin":213013,"position":3},"title":"SPH Poster Day winners named","author":"gazetteimport","date":"April 24, 2003","format":false,"excerpt":"Out of 37 entries, the School of Public Health (SPH) has named two winners for its 17th annual Poster and Exhibit Day. Pauline Koh-Banerjee won for her research Changes in body weight and body fat distribution as risk factors for clinical diabetes in U.S. men and Dmitri Wiederschain won for\u2026","rel":"","context":"In &quot;Campus &amp; Community&quot;","block_context":{"text":"Campus &amp; Community","link":"https:\/\/news.harvard.edu\/gazette\/section\/campus-community\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26160,"url":"https:\/\/news.harvard.edu\/gazette\/story\/2009\/10\/focused-on-the-future\/","url_meta":{"origin":213013,"position":4},"title":"Focused on the future","author":"harvardgazette","date":"October 7, 2009","format":false,"excerpt":"Terry McAuliffe, a visiting fellow this year at the Institute of Politics, uses a Harvard stage to look at the future of the Democratic Party.","rel":"","context":"In &quot;Nation &amp; World&quot;","block_context":{"text":"Nation &amp; World","link":"https:\/\/news.harvard.edu\/gazette\/section\/nation-world\/"},"img":{"alt_text":"","src":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2009\/10\/mcauliffe130_605.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/news.harvard.edu\/wp-content\/uploads\/2009\/10\/mcauliffe130_605.jpg?resize=350%2C200 1x, https:\/\/news.harvard.edu\/wp-content\/uploads\/2009\/10\/mcauliffe130_605.jpg?resize=525%2C300 1.5x"},"classes":[]},{"id":66396,"url":"https:\/\/news.harvard.edu\/gazette\/story\/2000\/11\/national-prize-honors-biography-by-malmstad\/","url_meta":{"origin":213013,"position":5},"title":"National prize honors biography by Malmstad","author":"gazetteimport","date":"November 9, 2000","format":false,"excerpt":"The American Association for the Advancement of Slavic Studies (AAASS) selection committee for the Wayne S. Vucinich Book Prize awarded John E. Malmstad, professor of Slavic Languages at Harvard University, and Nikolay Bogomolov, professor of Russian Literature at University of Moscow, Russia, with an honorable mention for \"Mikhail Kuzmin: A\u2026","rel":"","context":"In &quot;Campus &amp; Community&quot;","block_context":{"text":"Campus &amp; Community","link":"https:\/\/news.harvard.edu\/gazette\/section\/campus-community\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/posts\/213013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/users\/108352576"}],"replies":[{"embeddable":true,"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/comments?post=213013"}],"version-history":[{"count":8,"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/posts\/213013\/revisions"}],"predecessor-version":[{"id":213032,"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/posts\/213013\/revisions\/213032"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/media\/213014"}],"wp:attachment":[{"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/media?parent=213013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/categories?post=213013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/tags?post=213013"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/gazette-formats?post=213013"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/news.harvard.edu\/gazette\/wp-json\/wp\/v2\/series?post=213013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}