Home Politics & Government We Need To Hack-Proof Our Elections. An Old Technology Can Help.

We Need To Hack-Proof Our Elections. An Old Technology Can Help.


The nation’s top intelligence officers warned Congress this week that Russia is continuing its efforts to target the 2018 elections.

This should come as no surprise: A few months ago, the Department of Homeland Security notified 21 states that hackers had targeted their election systems in 2016. Yet Congress still has not passed legislation to meaningfully address election cybersecurity.

Time is running out. Lawmakers need to act immediately if we are to protect the 2018 and 2020 elections.

There’s no evidence that vote totals were hacked in 2016. But it’s obvious that hackers have been testing the waters. Our attention has focused on Russia, but future threats could also come from North Korea, China, hacking groups such as Anonymous or any other adversary — foreign or domestic.

It should also be no surprise that hackers have U.S. voting systems in their sights. They’re a relatively easy target. Researchers have studied a range of electronic voting infrastructure — including touch screens, optical scanner systems and registration databases — and found serious vulnerabilities that could allow even moderately sophisticated attackers to pose threats to voting integrity. This year, about 40 states are set to use electronic voting or tabulation systems that are more than a decade old — many of which run on software that’s too old to be serviced with vendor security patches. A survey of nearly 300 election officials in 28 states found that a clear majority report needing new voting systems.

We believe there is a framework to secure our elections that can win bipartisan support, minimize costs to taxpayers and respect the constitutional balance between state and federal authorities in managing elections. In September, Mark Meadows (R-N.C.), who chairs the conservative House Freedom Caucus, introduced legislation that would help solve the problem with an elegantly simple fix: paper ballots. Meadows’s Paper Act would authorize cost-sharing with states for the replacement of insecure electronic systems with those that produce a voter-verified physical record. The bill also lays the groundwork for states to regularly implement risk-limiting audits — procedures that check a small random sample of paper records to quickly and affordably provide high assurance that an election outcome was correct.

President Trump has already endorsed this framework, declaring: “There’s something really nice about the old paper ballot system. . . . You don’t worry about hacking.” And in the Senate, a bipartisan group of six lawmakers recently introduced the Secure Elections Act, which presents a sweeping set of security fixes including federal grants to install systems that use voter-verified paper ballots. The best estimates show that we can replace all paperless voting machines in the United States for about the cost of a single F-22 fighter jet — and in fact, the Senate bill would not add to the deficit because it offsets any new spending.

Both the House and Senate bills rightly defend the constitutional principle that states and localities should have primary responsibility over election administration. But they also acknowledge that federal authorities have a role in elections to “provide for the common defense.” Rather than creating new federal mandates, the reform proposals look to identify the best thinking on election security and create guidelines for the use of federal funds.

It’s not practical to expect local election administrators in rural Missouri or small-town Maine to go toe-to-toe with the premier government-backed cyber-mercenaries of China or North Korea. Just as federal agencies prudently provide support for state law enforcement in dealing with terrorism, federal officials should give guidance and support in dealing with the election cybersecurity threat.

If there’s one takeaway from the past year’s endless parade of high-profile cyberattacks, it’s that everyone — from consumers to small businesses to global firms — is at risk. With recent revelations of sophisticated cyberattacks against voting systems in the United States and abroad, it’s clear that anyone running for public office is at risk, too. Members of Congress should recognize that election cybersecurity reforms are in their own personal interest — and in the interest of the United States’ national security.


This article was written by Michael Chertoff and Grover Norquist from The Washington Post and was legally licensed through the NewsCred publisher network. Please direct all licensing questions to legal@newscred.com.



Roots In The Military. Relevant To All.

American Military University (AMU) is proud to be the #1 provider of higher education to the U.S. military, based on FY 2018 DoD tuition assistance data, as reported by Military Times, 2019. At AMU, you’ll find instructors who are former leaders in the military, national security, and the public sector who bring their field-tested skills and strategies into the online classroom. And we work to keep our curriculum and content relevant to help you stay ahead of industry trends. Join the 64,000 U.S. military men and women earning degrees at American Military University.

Request Information

Please complete this form and we’ll contact you with more information about AMU. All fields except phone are required.

Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Ready to apply? Start your application today.

We value your privacy.

By submitting this form, you agree to receive emails, texts, and phone calls and messages from American Public University System, Inc. which includes American Military University (AMU) and American Public University (APU), its affiliates, and representatives. I understand that this consent is not a condition of enrollment or purchase.

You may withdraw your consent at any time. Please refer to our privacy policy, terms, or contact us for more details.