WASHINGTON — While millions of Americans went to the polls to vote in local elections Tuesday, teams of federal and local law enforcement officials huddled in a pair of conference rooms here with a peculiar goal: secure the Nov. 3, 2020 election in the fictional American town of "Adversaria."
In one room, Yonatan Striem-Amit, a former hacker for the Israeli Army, had assembled a team to launch a variety of simulated cyber attacks on the town's government. His "red team"worked to undermine the election, compromising and manipulating systems and pushing misinformation.
"Let's make people know there was an attempt on the voting booth and create a scare, and start circulating pictures of unattended voting booths," said Striem-Amit, now chief technology officer for the Boston-based cybersecurity firm Cybereason. "If you can get 50,000 people to change their vote or not show up, you can flip the vote."
Meanwhile, across the hall, officials from Homeland Security, the FBI, the Secret Service and the Arlington, Virginia, Police Department were on the "blue team" working to stop them.
The event is what's known as a tabletop exercise, where participants roleplay their responses in an emergency scenario. The test, organized by Cybereason, is just one of many simulated attacks that have played out in conference rooms across the U.S. and are now becoming a common part of election security preparedness more than a year ahead of the 2020 election.
Under the rules of the game, hacking the voting machines was off limits. Instead, all parts of the city were used against itself to create chaos on Election Day to disrupt and undermine the results. Its 911 call center was taken down by a flood of fake internet traffic. The traffic lights in the city were going haywire, causing accidents. A deep-fake video surfaced, showing one of the candidates committing racial and domestic violence.
The scenario was fake but the vulnerabilities were real, a scrimmage designed to test the abilities of federal and local law enforcement to work together and respond to a nation-state attack.
After Russians attempted to interfere with the last presidential election, the U.S. government and private sector have worked to shore up communications and cooperation and get ready for 2020.
"It's really only since 2016 that these sort of real-time scenarios have been happening," said Eddie Perez, global director of technology development for the Open Source Election Technology Institute (OSET), a nonprofit that conducts election technology research.
NBC News has collaborated with the OSET Institute since 2016 to monitor U.S. election technology and voting issues.
"Contingency planning and tabletop exercises that help state and local election officials to be more prepared for the unexpected are a good example of how they are 'upping their game,' Perez said in an email. "They're an essential part of protecting public trust in the 2020 elections."
Simulations like these have become more common among federal and local officials, but Tuesday's event added the unique element of attacks on critical infrastructure.
The hackers even made fake voice calls to impersonate the local election officials' superiors. Then they told the officials to reset the voting machines, focusing on those without paper backups, spreading chaos and confusion.
The simulation also included technology not currently available in the U.S. that could someday become a way for hackers to disrupt elections.
At one point, the hackers noticed the city was piloting a fleet of self-driving buses. They compromised the bus controls, commanding them to crash into lines of voters at polling sites, killing and wounding some of the fake town's citizens.
The team of government officials was eventually declared the winner but not without disrupting the election, including a decision to reschedule the election. The hackers were caught and virtually arrested.
The law enforcement side was praised for its cooperation and communication and effective marshalling of resources, performing better than the blue teams had in previous events. But the attackers of the red team had an innate advantage, forcing their opponents to react.
"At first it looked like the red team was playing chess and the blue team was playing checkers," said Sam Curry, Cybereason's chief security officer.
Cybereason plans on conducting more simulations before 2020. The company said demand is high.