Can the intelligence community really share election security threat info?
- By Derek B. Johnson
- Jan 16, 2020
Federal officials will work harder to share information about threats to election infrastructure with state officials, but they may have trouble striking a balance between spreading awareness and protecting sources, according to the intelligence community's election security threats executive.
Attacks on voting infrastructure, political campaign hacks and malign influence operations will be more sophisticated in 2020, but those threats do not end after voters have cast their ballots, the Office of the Director of National Intelligence's Shelby Pierson said. Election attacks are part broader threats from adversarial nations.
"There are many, many other activities and vectors that our adversaries use to pursue us when it's not election day," Pierson said while speaking at a Jan. 14 event hosted by the Election Assistance Commission.
While the government has conducted counterintelligence work for decades, 2016 was "a moment in time in which the intelligence community had very valuable information about the threats that we were facing and the activity that was being undertaken," she said.
Some of that information did come out before election day in 2016, but many state officials complained that the federal government was too slow to notify them of the impending threat from Russian hackers and too secretive when it finally did.
When it comes to the 2020 elections, Russia, China, Iran and other actors have the capabilities and motivation to meddle, and Pierson said she was "committed" to downgrading classification and sharing more information where possible with stakeholders this time around. However, that balancing act between speedy dissemination and protecting sources and methods will remain, and the process will "inevitably leave certain parties unsatisfied."
"I face the criticism that sometimes there's some latency built into that process, that there's potentially a lack of context and specificity to that information, and those are all criticisms and challenges that I take fully on board," Pierson said.
Pierson said she's responsible for "bringing the full force of the IC" to election security. That includes developing new means to access the systems and infrastructure of foreign adversaries and conducting analysis to inform policymaking. She said she is also "personally shepherding" improvements in the security clearance process and enabling cyber operations against actors and groups seeking to meddle in U.S. elections.
One area where intelligence agencies could play a unique role is leveraging their awareness of ongoing influence campaigns and notifying targeted groups, individuals, political candidates and parties, or states and counties. Victims of such campaigns are not automatically notified by the government the way they are for hacks and other cybersecurity incidents. It's "another policy opportunity where we can share information and have already done so," Pierson said.
This article was first posted to FCW, a sibling site to GCN.
Derek B. Johnson is a senior staff writer at FCW, covering governmentwide IT policy, cybersecurity and a range of other federal technology issues.
Prior to joining FCW, Johnson was a freelance technology journalist. His work has appeared in The Washington Post, GoodCall News, Foreign Policy Journal, Washington Technology, Elevation DC, Connection Newspapers and The Maryland Gazette.
Johnson has a Bachelor's degree in journalism from Hofstra University and a Master's degree in public policy from George Mason University. He can be contacted at [email protected], or follow him on Twitter @derekdoestech.
Click here for previous articles by Johnson.