Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:10 PM
Connect Directly

Free & Discounted Security Services Now Available for US Election Orgs

Nonprofit Defending Digital Campaigns (DDC) offers security services for email, user education, mobile, and encrypted communications, to federal election committees.

A nonprofit co-founded by former campaign managers for Hillary Clinton and Mitt Romney officially launched this week to provide free or low-cost security technology and services to federal election campaigns.

Defending Digital Campaigns (DDC) basically acts as an intermediary to negotiate software licenses and service contracts from security vendors and providers and to ensure the tools are properly installed and used.

DDC initially is offering registered political party committees and federal candidates email security services from Agari, anti-phishing services from Area 1 Security, online IT security training from Cybrary, security behavior change services from Elevate Security, managed security services from GRA Quantum, mobile endpoint security software from Lookout, and end-to-end encrypted messaging services from Wickr.

Michael Kaiser, DDC's president and CEO, says the nonprofit will package some of the security services for election organizations. "We will also create groups of products specifically for campaigns," he says.

Election security overall has been a hot button topic in the wake of Russia's election-meddling and hacking voter rolls during the 2016 presidential election cycle, as well as subsequent research demonstrating major security holes in voting systems and equipment. Security experts say Web-based election systems are the most likely and easiest targets for attack during the elections: Election-reporting websites, voter roll websites, and candidate websites all are at risk of disruption via distributed denial-of-service (DDoS) attacks, as well as hacking and data-tampering by nation-state or other attackers.

It's easier for an attacker to remotely penetrate a public-facing website to DDoS it, deface it, alter information (such as changing vote count data or polling place information), or access sensitive data stored on its back-end servers than to bother tampering with a voting machine. 

Romney & Clinton Campaign Roots
DDC was founded by Matt Rhoades, former campaign manager for Mitt Romney, and Robby Mook, former campaign manager for Hillary Clinton, whose organizations both experienced cyberattacks during their campaign tenures. For now the nonprofit is focused on the federal level of election organizations; it received approval in May from the Federal Election Commission (FEC) to offer the free and discounted cybersecurity services in order to help beef up US election security.

"The campaign ecosystem ... from my perspective has gotten less attention than the voting machine issue," DDC's Kaiser says. "Campaigns have to understand, like other businesses, they are a target — for nation-states, hacktivists, and cybercriminals after high-wealth individuals and donor information."  

One example of the cyber-risk to federal elections was the 2016 discovery by Recorded Future of a data breach of the US Election Assistance Commission (EAC), which tests and certifies voting equipment, runs a clearinghouse on elections, and provides the National Voter Registration form. A Russian hacker was spotted looking for buyers for the credentials to the EAC database two weeks before the election. Levi Gundert, vice president of intelligence and risk at Recorded Future, says that attack was a red flag.

"EAC is where voting administrators go to get the latest updates they need to administer their voting centers," he explains. "A lot of times they're downloading [data] and taking it on thumb drives to sneakernet to voting machines. There's absolutely the potential to plant something malicious."

Joseph DePlato, security researcher and co-founder and CTO of Bluestone Analytics, says secure campaigns are key to ensuring voters get accurate and sufficient information.

"I'm hoping [DDC] will be a catalyst for better security and visibility across the entire spectrum of election technologies and processes," he says. "From a voter point of view, I'm concerned with the actual election security versus the campaign security. For example, if voting machines can be compromised and votes changed, that is a direct threat to democracy that should concern every citizen."

But if a campaign is compromised, he says, nation-states could abuse breached documents to wage a social-media influence attack. "But there is no direct threat to local voting machines or processes," he says.

Security vendors traditionally have struggled with how to assist federal election organizations, notes Joel Wallenstrom, CEO of Wickr. "A lot of companies have been trying hard to help out with this problem, but they mostly ran into brick walls," he says. "You had to understand the political processes" and how to get FEC approval in accordance with campaign finance laws. Working via DDC paves the way for security vendors to offer security help to federal election committees, he says.

DDC is not yet publishing specific discounts for the security products it's offering, but says some are free and others are discounted as deeply as 50% or more. All registered national political party committees and federal candidate committees are eligible for cybersecurity help via DDC, as is a House candidate committee with a minimum of $50,000 in receipts for the current election cycle, a Senate candidate committee with a minimum of  $100,000 in receipts for the current election cycle, and a presidential candidate's committee if he or she is polling above 5% in national polls.

Kaiser says the DDC currently has a few House of Representatives' campaigns as its early adopters, and he expects things to ramp up in early 2020 in the run-up to the fall election. "Our initial focus is on the network of people running campaigns every day for committees and parties and to understand their needs," he says.

Meanwhile, several cybersecurity vendors, including big-name vendors like Google, Microsoft, Cloudflare, and McAfee, in the run-up to the 2018 election offered free security services, such as website and user-account protection services to state and local election jurisdictions and campaigns. 

Up Next: MFA
Among the next technologies DDC hopes to add is multifactor authentication (MFA), according to Kaiser.

That plays into the attacks that occurred in the 2016 election. "In part we're informed by what we saw in the last election, so it's going to be a lot of basic blocking and tackling [at first],"  Wickr's Wallenstrom says. "Having two-factor authentication out there, people understanding it's smart to update the operating system on their devices," for example, he explains.

DDC, meanwhile added new members to its board this week: Ron Gula, president and co-founder of Gula Tech Adventures; Alan Blue, co-founder of LinkedIn; and Suzanne Spalding, former DHS undersecretary for the National Protection and Programs Directorate (NPPD). They join DDC board chair and co-founder Debora Plunkett, former director of the NSA Information Assurance Directorate. 

Related Content:

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
Jai Vijayan, Contributing Writer,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...