{"id":107688,"date":"2025-03-05T16:08:23","date_gmt":"2025-03-05T21:08:23","guid":{"rendered":"https:\/\/cdt.org\/?post_type=insight&#038;p=107688"},"modified":"2025-03-05T16:08:23","modified_gmt":"2025-03-05T21:08:23","slug":"with-outcome-of-cisa-election-security-review-looming-agency-must-protect-critical-infrastructure","status":"publish","type":"insight","link":"https:\/\/cdt.org\/insights\/with-outcome-of-cisa-election-security-review-looming-agency-must-protect-critical-infrastructure\/","title":{"rendered":"With Outcome of CISA Election Security Review Looming, Agency Must Protect Critical Infrastructure\u00a0"},"content":{"rendered":"\n<p>On Friday, February 14<sup>th<\/sup>, acting Executive Director of the Cyber and Infrastructure Security Agency (CISA) Bridget Bean issued a memo to agency staff <a href=\"https:\/\/www.wired.com\/story\/cisa-election-security-freeze-memo\/?_sp=833cee0c-e423-4bdb-84ab-a20fe6366ecd.1740578583315\">announcing<\/a> that all election security work would be paused pending an internal review in order to refocus on the agency\u2019s core mission. The memo also stated that funding would be cut for the Election Infrastructure Information Sharing and Analysis Center (EI-ISAC), a DHS-funded organization that provides crucial cybersecurity assistance to state and local election officials to harden the nation\u2019s elections systems against cyberattacks.&nbsp;<\/p>\n\n\n\n<p>Tomorrow, March 6th, marks CISA\u2019s self-imposed deadline to conclude its review and send its findings to the White House. It remains unclear if the memo will be made public, nor whether it will provide any measure of transparency regarding the programs that will \u2014 and will not \u2014 continue.&nbsp;<\/p>\n\n\n\n<p>If CISA is serious about focusing on its core mission, the agency must continue its cybersecurity, physical security, and foreign threat information sharing work. Failure to do so would undermine U.S. national security, jeopardize the safety of election officials, and further diminish U.S. standing on the global stage.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Cybersecurity<\/strong>&nbsp;<\/p>\n\n\n\n<p>As the bipartisan leadership of the National Association of Secretaries of State (NASS) recently <a href=\"https:\/\/www.nass.org\/sites\/default\/files\/Election%20Cybersecurity\/2.21.25%20NASS%20Board%20Letter%20to%20Sec.%20Noem.pdf\">explained<\/a>, CISA provides \u201cvaluable\u201d services that \u201cmany state and local election officials regularly utilize\u201d to defend against cybersecurity threat actors, including nation-states and cybercriminal organizations.&nbsp;<\/p>\n\n\n\n<p>Protecting the cybersecurity of state and local elections infrastructure is vital to the United States\u2019 national interest and security. DHS has <a href=\"https:\/\/www.dhs.gov\/archive\/news\/2017\/01\/06\/statement-secretary-johnson-designation-election-infrastructure-critical\">designated election infrastructure<\/a>, including polling places, voter registration databases, and voting machines, as a critical infrastructure subsector since 2017. U.S. election infrastructure is a prize target of foreign governments, whose attacks have <a href=\"https:\/\/securingdemocracy.gmfus.org\/democracy-in-the-crosshairs-five-key-trends-driving-foreign-interference-in-democracies\/\">escalated<\/a> in scale, complexity, and brazenness. During the 2024 election, foreign adversaries targeted state and local elections offices using a variety of techniques, including <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/msc\/documents\/presentations\/CSR\/MTAC-Election-Report-5-on-Russian-Influence.pdf\">probes<\/a> of network defenses, <a href=\"https:\/\/blog.cloudflare.com\/exploring-internet-traffic-shifts-and-cyber-attacks-during-the-2024-us-election\/\">distributed denial of service<\/a> (DDoS) attacks, and <a href=\"https:\/\/www.ic3.gov\/PSA\/2024\/PSA240815\">ransomware<\/a> operations. These attacks seek to polarize the electorate, <a href=\"https:\/\/www.fdd.org\/analysis\/2024\/09\/26\/how-u-s-adversaries-undermine-the-perception-of-election-integrity\/\">denigrate the integrity of our elections<\/a>, and incite <a href=\"https:\/\/www.dni.gov\/files\/ODNI\/documents\/assessments\/NICM-Declassified-Foreign-Threats-to-US-Elections-After-Voting-Ends-in-2024.pdf\">political violence<\/a>, including specifically at election officials, who have <a href=\"https:\/\/www.politico.com\/news\/2024\/05\/01\/2024-election-poll-workers-00154953\">experienced<\/a> escalating death threats and intimidation.&nbsp;<\/p>\n\n\n\n<p>Federal efforts have been crucial in identifying, analyzing, and responding to foreign cyberattacks. CISA, for instance, <a href=\"https:\/\/www.cnn.com\/2024\/04\/26\/politics\/georgia-coffee-county-cyberattack-voter-system\/index.html\">alerted local election officials<\/a> in Coffee County, Georgia that its county government network was targeted by Iranian actors. Coffee County election officials acted swiftly to disconnect from the state voter registration system, preventing the attack from accessing data. CISA \u2014 and the EI-ISAC that it funds \u2014 offer a large range of free <a href=\"https:\/\/www.cisa.gov\/topics\/election-security\/election-security-services\">services<\/a> that help counties like Coffee County, GA defend against cyber intrusion. These include support from cyber experts at the agency in conducting vulnerability scans and penetration testing, coordination on incident response, access to declassified intelligence reports, and a vast information sharing network.&nbsp;<\/p>\n\n\n\n<p>Since its inception, the EI-ISAC has <a href=\"https:\/\/www.oig.dhs.gov\/sites\/default\/files\/assets\/2024-09\/OIG-24-52-Sep24.pdf\">grown<\/a> to include over 3,700 state and local election offices, and has distributed sophisticated <a href=\"https:\/\/statescoop.com\/secretaries-of-state-ask-dhs-to-retain-essential-election-security-services\/\">sensors<\/a> to monitor for system intrusions to more than 1,000 elections officers around the country. CISA\u2019s free services also include access to the .gov top-level domain (TLD) and \u201chas made it available <a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2024-04\/CISA-FBI-The_.gov_Domain-Helping_Mitigate_Election_Office_Cybersecurity_and_Impersonation_Risks_v2_508c.pdf\">at no cost<\/a> to election offices and other qualifying government organizations.\u201d The .gov TLD is a crucial<a href=\"https:\/\/cdt.org\/insights\/only-1-in-4-election-websites-uses-the-gov-domain-thats-a-problem-and-an-opportunity\/\"> trust indicator<\/a> that helps voters identify their elections website as an authentic&nbsp; government website and obtain accurate information about the time, place, and manner of voting. Authorities have identified dozens of fake election websites set up by foreign adversaries to mislead voters and prevent them from voting.&nbsp;<\/p>\n\n\n\n<p>Cybersecurity services from CISA and the EI-ISAC are irreplaceable. As Republican Secretary of the Commonwealth of Pennsylvania Al Schmidt <a href=\"https:\/\/www.wesa.fm\/politics-government\/2025-02-25\/trump-election-security-cuts-pennsylvania\">said<\/a>, CISA has \u201ca national and global perspective when it comes to cyber security risks and all the rest that each individual state can\u2019t do on its own.\u201d For many underserved counties around the U.S., the cybersecurity assistance that CISA provides is often the only source of network hardening assistance available \u2014 not only for elections administrators, but for all county government offices on the network. For instance, in Washington state, 15 county governments <a href=\"https:\/\/www.sos.wa.gov\/sites\/default\/files\/2025-02\/CISA%20and%20ISAC%20Funding%20Letter.pdf\">receive<\/a> \u201cEndpoint Security and Malicious Domain Blocking and Reporting\u201d tools from CISA that secure their network defenses across the county government network. Removing free access to these and other cyber defenses would make local governments susceptible to ransomware and other attacks that could impact not only elections but emergency services, schools, and more.&nbsp;<\/p>\n\n\n\n<p><strong>Physical Security<\/strong><\/p>\n\n\n\n<p>CISA not only protects the cybersecurity of elections offices, but their physical security as well \u2014 an essential resource as almost 40% of election officials have <a href=\"https:\/\/www.brennancenter.org\/our-work\/research-reports\/local-election-officials-survey-may-2024\">reported<\/a> receiving threats of intimidation, while more than half fear for their safety. CISA provides resources like physical security assessments of election facilities and coordinates federal efforts to detect, analyze, and respond to physical threats to election infrastructure as they emerge. In 2024, CISA and the EI-ISAC\u2019s information sharing and incident response teams warned election officials about <a href=\"https:\/\/we-ha.com\/envelope-containing-unidentified-white-powder-found-at-west-hartford-post-office\/#:~:text=The%20Cybersecurity%20and%20Infrastructure%20Security,morning%20a%20suspicious%20envelope%20was\">white powder envelopes<\/a> (and worked with USPS and the FBI to remove some envelopes from the mail stream) that were targeted at election offices in <a href=\"https:\/\/www.npr.org\/2024\/09\/18\/g-s1-23542\/the-fbi-is-investigating-suspicious-packages-sent-to-election-officials\">at least 15 states<\/a>. They shared intelligence that ballot boxes would be <a href=\"https:\/\/propertyofthepeople.org\/document-detail\/?doc-id=25255596\">targeted with attack, <\/a>and provided guidance on securing and monitoring them; assisted with response to <a href=\"https:\/\/www.npr.org\/2024\/10\/28\/nx-s1-5168404\/oregon-washington-arizona-ballots-drop-boxes-fires\">fires<\/a> set in ballot dropboxes; and alerted officials ahead of Election Day to plans for <a href=\"https:\/\/www.votebeat.org\/2025\/02\/27\/cisa-election-cybersecurity-homeland-kristi-noem\/\">wide-spread bomb threats<\/a> from foreign adversaries seeking to upend voting operations. As a result, and despite over 100 bomb threats around the country by <a href=\"https:\/\/www.reuters.com\/world\/us\/fake-bomb-threats-linked-russia-briefly-close-georgia-polling-locations-2024-11-05\/\">Russian-linked<\/a> actors, voting operations were minimally impacted.&nbsp;<\/p>\n\n\n\n<p><strong>CISA\u2019s Mandate and Capacity<\/strong><\/p>\n\n\n\n<p>Protecting the cyber and physical security of elections infrastructure aligns with the vision to \u201cdeliver a more focused provision of services for elections security activities\u201d as <a href=\"https:\/\/www.wired.com\/story\/cisa-election-security-freeze-memo\/\">laid out<\/a> in Executive Director Bean\u2019s February 14<sup>th<\/sup> memo. CISA\u2019s <a href=\"https:\/\/www.congress.gov\/115\/plaws\/publ278\/PLAW-115publ278.pdf\">enabling legislation<\/a> directs the agency to \u201ccoordinate a national effort to secure and protect against critical infrastructure risks\u201d and to \u201cprovide analyses, expertise, and other technical assistance to critical infrastructure owners and operators.\u201d Because election infrastructure is one form of critical infrastructure, providing cybersecurity and physical security assistance, in addition to coordinating threat information sharing with state and local election officials, falls squarely in this mandate.&nbsp;<\/p>\n\n\n\n<p>Continuing this work will require staffing the agency with cybersecurity and physical security advisors (CSAs and PSAs), as well as the ten regional election security advisors who were <a href=\"https:\/\/www.npr.org\/2025\/02\/11\/nx-s1-5293521\/foreign-influence-elections-cisa-trump\">reportedly<\/a> fired from the agency. These staff acted as direct liaisons to election officials to conduct testing, coordinate response, and more. With over 10,000 election jurisdictions around the country, a depleted federal cybersecurity workforce will be overwhelmed with requests. This is particularly the case for requests for physical security assistance offered by CISA. According to <a href=\"https:\/\/www.oig.dhs.gov\/sites\/default\/files\/assets\/2024-09\/OIG-24-52-Sep24.pdf\">DHS\u2019 Office of the Inspector General<\/a>, \u201c[e]ven though CISA had almost 140 PSAs in the field in 2024, the demand for services occasionally outpaced staff capacity. In one region, the high demand caused delays delivering CISA\u2019s assessments and other services.\u201c&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>CISA\u2019s Decision Should Be Transparent<\/strong><\/p>\n\n\n\n<p>While the Agency\u2019s deadline to conclude it\u2019s current election security review is tomorrow, it remains unclear if the outcome of that review will be made available to the public.&nbsp;<\/p>\n\n\n\n<p>If the agency permanently reduces or ends vital election security work, it should \u2014 at the very least \u2014 publicly disclose the details of this decision. This should include a clear explanation of the Agency&#8217;s rationale, transparency about the scope of its personnel and programmatic cuts, and its expectations as to how state and local election officials will fill the resulting security gaps. Election officials are scrambling to understand any changes to the help they can expect from the federal government. They need this information as soon as possible, as many states have local and special elections upcoming \u2014 including in Florida, where special elections will fill 2 vacated U.S. House seats in just 4 weeks. <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/election-security-aid-chopping-block-rattling-local-officials-rcna194674\">According<\/a> to Marion County Supervisor of Elections Wesley Wilcox, who will administer one of those elections, there is \u201cnothing else like\u201d the EI-ISAC\u2019s situation room, which allows election officials to report cyber attacks so others can block them in real time. \u201cWhen we do this special election here in four weeks, there\u2019s a very real chance that there won&#8217;t be a situation room.\u201d Without transparency about the scope of CISA\u2019s decisions, election officials won\u2019t even know what options are available to them.&nbsp;&nbsp;<\/p>\n\n\n\n<p>As the bipartisan leadership of NASS has <a href=\"https:\/\/www.nass.org\/sites\/default\/files\/Election%20Cybersecurity\/2.21.25%20NASS%20Board%20Letter%20to%20Sec.%20Noem.pdf\">said<\/a>, \u201cCISA\u2019s prioritized services help election entities defend against these national security threats.\u201d Cutting support for the EI-ISAC and eliminating CISA\u2019s work to protect the cyber and physical security of election infrastructure would weaken America\u2019s election defenses and make it easier for America\u2019s enemies to cripple critical infrastructure, obstruct voting, mobilize violence, and undermine America\u2019s influence on the global stage. CISA\u2019s leadership should make clear that such work remains core to CISA\u2019s mission and will resume upon completion of the ongoing review.&nbsp;<\/p>\n","protected":false},"featured_media":86101,"template":"","content_type":[7251],"area-of-focus":[849],"class_list":["post-107688","insight","type-insight","status-publish","has-post-thumbnail","hentry","content_type-blog","area-of-focus-elections-democracy"],"acf":[],"_links":{"self":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight\/107688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/types\/insight"}],"version-history":[{"count":2,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight\/107688\/revisions"}],"predecessor-version":[{"id":107690,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight\/107688\/revisions\/107690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/media\/86101"}],"wp:attachment":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/media?parent=107688"}],"wp:term":[{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/content_type?post=107688"},{"taxonomy":"area-of-focus","embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/area-of-focus?post=107688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}