Skip to Content

Worrying new holes have been uncovered in US electoral cyberdefenses

November 2, 2018

With voting in the 2018 midterm elections under way, a new analysis has revealed a security flaw hackers could exploit to corrupt voter registrations and election results.
The news: A study by ProPublica found that computer servers in two states, Kentucky and Wisconsin, were running software that could be compromised by a cyberattack. Kentucky’s system deals with online voter registration, while Wisconsin’s handles results reporting. The two states told ProPublica that voter registration data hasn’t been tampered with, and that they have robust cyberdefenses to prevent intrusions. Still, Wisconsin took its server offline after ProPublica contacted it.
The security flaw: The servers were using File Transfer Protocol (FTP), which is a 40-year-old set of software rules that dictate how networked computers transfer data files. FTP, which sometimes allows files to be transferred anonymously and without encryption, is notoriously insecure. A hacker could take advantage of its weaknesses to compromise a server and then use it to introduce malware or cause it to malfunction.
How it was found: ProPublica used internet protocol addresses for states’ election bodies to see if the servers associated with them had on-ramps to the internet, known as “ports,” that were publicly accessible. Open ports can be used to determine some of the software a server is using.

The bigger picture: As we’ve been reporting, the US electoral system still has plenty of tempting targets for hackers, in spite of efforts to bolster security since the 2016 presidential race. Electronic voting machines are especially vulnerable. Yet in spite of this, we’re still seeing evidence of concerning glitches. In Texas, a technical issue with electronic machines has sometimes caused votes being cast in the hotly contested senate race to be switched accidentally between candidates.

This isn’t the result of a hack—election officials have blamed voters for tapping too fast on screens. But the fact that such a basic issue with the hardware hadn’t been identified and corrected in the run-up to the election is still deeply disturbing.

Deep Dive


How Rust went from a side project to the world’s most-loved programming language

For decades, coders wrote critical systems in C and C++. Now they turn to Rust.

Welcome to the oldest part of the metaverse

Ultima Online, which just turned 25, offers a lesson in the challenges of building virtual worlds.

A new paradigm for managing data

Open data lakehouse architectures speed insights and deliver self-service analytics capabilities.

Three ways networking services simplify network management

The right networking services orchestrate note-perfect network performance.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.