protection on the internet that will host the Interstate Crosscheck Program this class is markedly improved from that of its previous host , according to a top security firm , and soon the Department of Homeland Security will lend its own expertness to hardening the internet as part of its review of state election systems .

Nevertheless , experts warn that the bolstered security may do little to resist off targeted cyberattacks . After weeks of testimonial , Kansas lawmakers , both Republicans and Democrats , are even less convinced that Secretary of State Kris Kobach ’s office is equipped to keep sensitive elector data from as many as 27 states out of malicious hackers ’ hands .

few still are enthused about the prognosis of the state being concord financially liable should any of those record be compromised — again .

Argentina’s President Javier Milei (left) and Robert F. Kennedy Jr., holding a chainsaw in a photo posted to Kennedy’s X account on May 27. 2025.

The Crosscheck program , which rolls out at the start of each class and strives to identify possible twofold voter enrollment , previously relied on a waiter conserve by the Arkansas Secretary of State ’s office to commit and receive sensitive voter data point from more than two twelve land participating in the program . The disk run from Arkansas to Kobach ’s office where the records were bilk - check for potential double elector . The results of Crosscheck ’s psychoanalysis ( the methodological analysis of which has beendisputed by academic research)were then channelise back to Arkansas to be collected by enter land .

This yr , however , the program will be house wholly under Kobach ’s roof , where faculty are scrambled to indurate the part ’s meshing security even as the usual mid - January deadline for submit elector data point has already come and gone . The upgrades comply reports byGizmodoandProPublicain November 2017 that detailed critical vulnerabilities in the Arkansas governance ’s net , as well as a identification number of surety incident unwrap sensitive voter information — including partial Social Security numbers . ( Despite Crosscheck ’s new urgency with regard to security , Kobach has been dismissive of Gizmodo and ProPublica ’s findings in his public statements . )

investigator at the Boston - basedsecurity business firm Netragardconcluded this workweek that the Kansas Secretary of State ’s position was “ far better protected ” than its counterpart in Arkansas . But that assessment hail with a number of caveats warning about the potential for yet another security misstep .

William Duplessie

As with most government world , Kobach ’s role is attribute its own IP range and has its own internet and infrastructure and , based on late change evident through publicly useable entropy , its security system appears to have been of late indurate . However , the rest of the Kansas government ’s IT infrastructure is considerably less inviolable . And while Kobach ’s mesh ( sos.ks.gov ) is well carry off , many other web associated with the ks.gov domain are , expert say , “ significantly let on . ”

Ultimately , the researcher find that percolation of the with child Kansas government , by even a modestly proficient drudge , would be all but guaranteed .

basically , Crosscheck ’s power to keep sensitive voter data from falling into the hand of novice hacker is inextricably tied to the architecture of its master of ceremonies ( i.e. , the State of Kansas ) . A single unlatched connection between the Secretary of State ’s internet and the other internet hosted by the DoS may pose an imminent threat to Crosscheck , Netragard found .

Starship Test 9

“ Kobach ’s office is likely at increase risk due to what seem to be uttermost vulnerability in other ks.gov web , ” say Adriel Desautels , Netragard ’s founder and chief executive officer . “ If an attacker were to go against one of the other ks.gov networks then they ’d belike be able to leverage that accession to violate the Kansas Secretary of State ’s berth via the exploitation of exist trust relationships . ”

As just one exercise , at the time of piece of writing , Kansas was hosting two printers that both appear accessible by virtually anyone online . Neither is protected by a word . Even a seemingly innocent gimmick , such a printer , can serve as an incoming pointedness for a hacker beat bent on on infiltrating a web .

“ One of our recent penetration testing engagements leveraged a printer that did not have any administrative password set , ” Desautels say of Netagard ’s oeuvre test one of their client ’s security . “ We were able to use information that we extracted from the printer to eventually compromise the total corporate domain . ”

Lilo And Stitch 2025

While declining to provide particular , Kansas Director of Elections Bryan Caskey tell Gizmodo on Wednesday that an “ additional bed of security ” be between the Secretary of State ’s billet and every other state federal agency .

“ The Department of State has their own firewall and their material and then we have another stratum on top of that , ” he said . “ We only give up traffic between ourselves and other land government agency for very specific purposes . ” The ongoing surety revue will be examining the elbow room in which information is transmitted between the agency ’s office and others , he added .

How would an aggressor get accession to credentials to set out with?Despite offering full security than its Arkansas counterpart , the Kansas Secretary of State ’s office “ does not adhere to industry effective practices based on what we could see in publically usable information , ” Desautels allege . At least not at present . For example , Netragard was able to identify what it believed to be VPN serving using single - factor assay-mark rather than two - broker authentication . This have in mind that if an attacker were capable to get login credentials , they would likely be able-bodied to enter the connection without detection .

CMF by Nothing Phone 2 Pro has an Essential Key that’s an AI button

“ We do it on every individual naturalistic terror engagement we have , ” Desautels explained . “ There are multiple avenues of attack here , none of which are particularly complex . The best path would be social technology . ” That may include convincing someone at the Kansas place to deliver their certification , because they believe the mortal with whom they are speaking is a boss , fellow , or clear IT professional ; phishing them with a faux var. designed seizure usernames and passwords ; or else just infecting them with some undetected malware deliver via email or a myriad of other ways . ( Netragard once compromise a guest by mailing an employee a “ liberal ” USB mouseloaded with malware . )

From the outside , it ’s hard to say precisely how untroubled Kobach ’s internet presently is . Without permission , Netragard can only conduct what ’s called “ peaceful reconnaissance ” on the connection — meaning their research relies on Robert William Service likeCensys , DomainTools , Google , basicDNS tally , and the normal browsing of public - facing web pages . That is to say , while the research worker had high self-confidence a breach was achievable , their finding are limited to publicly available information . Scanning or testing the mesh any further without permit would be illegal .

And that ’s important because the limitations of Netragard ’s former analysis were dismiss by Kobach in testimonial two weeks ago before the Kansas House Elections Committee . “ I did read the article that suggest , ‘ Oh , this would be well-heeled , anyone could cut up it , ’ ” he told the legislators , referring to Gizmodo’sNovember ninth article , which detailed security flaws in the Arkansas governing ’s net . “ Well , they have n’t , ” he boasted . “ They did n’t win in hack it . ”

Photo: Jae C. Hong

In reality , Netragard attempted no such cab , which is unneeded to do a aerofoil - level security analysis ; in fact , doing so would have been a felony .

In testimonial on Monday before the Kansas House Government , Technology , and Security , Caskey made a number of questionable claims about the security of the Crosscheck program , all which call into interrogative his comprehension of the issue at hand . But as he tell Gizmodo by sound , “ I ’m not an IT expert . ”

The first was in reply to a question from Kansas Rep. Pam Curtis , who inquire about the steps rent following Gizmodo ’s revealing of exposure on the Arkansas mesh , which antecedently hosted Crosscheck data for about two months every year . Caskey reply , in part : “ We enquire Arkansas to do a complete CAT scan to see if any unauthorized access had taken place . None had read place . ” ( Emphasis ours . )

Doctor Who Omega

To be clear : There is no “ scan ” that can discover a information breach after it has occurred with any real grade of confidence .

“ If they did a exposure CAT scan , there ’s no opportunity in hell that they would detect a breach , ” Desautels enjoin . “ When you ’re ‘ scanning ’ for vulnerabilities , you ’re look for style to breach systems ; you ’re not look for evidence that systems have already been breach . ” If a hacker does breach a organization but fails to leave undefendable any obvious port or backdoors a “ scan ” is essentially despicable .

“ perhaps my word employment was n’t as careful as it should have been in responding to a question , ” Caskey enounce . “ We were in contact with Arkansas officials and they were reviewing to see if any unauthorized access had take place on the Arkansas FTP waiter , and I was tell that it had not . So , the consumption of the word ‘ scan’—I probably should n’t have used that word . ”

Roborock Saros Z70 Review

As to whether Arkansas had hire real forensics expert to reexamine the waiter , Caskey said he could not say . The Arkansas Secretary of State ’s office told Gizmodo in an electronic mail on Wednesday : “ give thanks you for pass out , but we do not gloss on proceeds of internet security measure . ”

Caskey ’s other mistaken claim came as he repeatedly insisted to lawmakers that Crosscheck has never stick out a data breach . “ allow me be clear , ” he said , “ we have never been breached . Ever . I want to say this again , and again , and again : The Interstate Crosscheck database has never been breached . ”

Setting apart that years of Crosscheck information and passwords have been mistakenly expose by human error — not drudge — the impression that the State of Kansas is outfit to detect a advanced breach seems , from a proficient standpoint , unlikely .

Argentina’s President Javier Milei (left) and Robert F. Kennedy Jr., holding a chainsaw in a photo posted to Kennedy’s X account on May 27. 2025.

Consider how many billion - dollar company have been breached in the preceding two years alone — that we know about — and how many of those had advanced “ breach - detection ” tools deployed . ( clue : It was all of them . ) Before its annihilative breach last year , Equifax , a $ 6 billion company , had endorsed a product from the cybersecurity firm FireEye , tout that its applied science was protecting Equifax from targeted flack and zero - twenty-four hour period malware . Equifax was breached in mid - May . It was on July 29th . ( The endorsementvanishedfrom FireEye ’s website before long after . )

“ They do n’t know , ” Desautels enjoin . “ Just because a breach has n’t been detected or reported , does n’t mean it has n’t happen . Arkansas River ? They would n’t know if they suffered a rupture . If the manner their web was set up offers any indication of how they manage their security , they would n’t know . ”

Kansas Rep. Brett Parker , a Democrat who serve on the state ’s House Elections Committee , tell Gizmodo that the Secretary of State ’s office has failed in its repeat attack to convert lawmaker that Crosscheck is rightfully secure . “ They say they ’ve never been breached , but what they mean is that they ’ve never notice a breach , and the difference between those two should be concerning to us , ” he said .

William Duplessie

A rootage with knowledge of lawgiver ’ concern tell Gizmodo that Kansas Republicans have also voice skepticism about Crosscheck ’s security department . In public earshot , Republicans have repeatedly pressed Kobach ’s office to respond to business about the financial liability they fear the land could face in the aftermath of a future information breach .

demand about his exclamatory title that Crosscheck had “ never been breached , ” Caskey relent in a earphone call with Gizmodo : “ I always preface that comment with the phrase ‘ to the best of my noesis , ’ acknowledging that , tomorrow that fact may transfer . I ’m well aware that what I fuck today may be different from what I get it on tomorrow . ”

Caskey did not , however , introduce his reply with any such remarkwhile being questioned by Kansas legislators on Monday . “ If I did n’t say that … I ordinarily am very careful about making sure that I preface that statement because no one can run in absolutes , ” he secern Gizmodo , bestow : “ I ’m not trying to say something that ’s not on-key . I ’m just articulate , establish on what we know today , with the tool available today , it was a factual assertion . ”

Starship Test 9

Crosscheck ’s 2018 rollout is already molest by fresh disputation : The passing water of name , dates of birth , and partial Social Security numbers fornearly 1,000 Kansans . The data was transmitted to Florida , which that state ’s politics then unintentionally released in response to an open platter asking . And the promise by the Kansas election director that retiring mistakes will not be repeat seems starkly at odds with Kobach ’s testimonial at the Kansas statehouse two weeks ago : “ First of all , I would note that I would n’t yield that there is a problem , ” Kobach said .

software system engineer Brian McClendon , a former vice president at Google and Uber who is running to take over Kobach ’s seat as a Democrat , separate Gizmodo that , if elect , he would n’t hesitate to finish the Crosscheck program . “ To this solar day , I still do n’t love exactly what they do internally with the datum , ” he say . “ Nobody seems to know after the information jumps inside their firewall what they do with it to bring on such tremendous results on the outside . ”

McClendon say he would replace the program with one offered by ERIC , the Electronic Registration Information Center , which currently has 23 participating states , only a handful few than Crosscheck . Its most recent additions are Missouri and Arizona , which join the program in the retiring two months .

Lilo And Stitch 2025

McClendon said he had already spoken to the staff at ERIC , which use a coordinated algorithmic rule developed by Jeff Jonas , chief scientist of the IBM Entity Analytics Group , “ which interestingly was the algorithm that I had seem at pretty hard when I was at Google because we had all kinds of match challenge with our local commercial enterprise data , ” he say .

“ Anytime a company or a government takes possession of personal datum they need to protect it , ” McClendon added . “ There are now Pentateuch in seat that if a company loses command of personal data they need to report it immediately and they need to be responsible for it . Those laws are not good enough , but they ’re something . ”

Department of State governance , he said , should be “ in the accurate same boat . ”

Roborock Saros Z70 Review

PrivacySecurity

Daily Newsletter

Get the best tech , science , and culture news in your inbox daily .

News from the future tense , birth to your present .

You May Also Like

Polaroid Flip 09

Feno smart electric toothbrush

Govee Game Pixel Light 06