Kevin,
Agreed, though there are many reasons why firewalls are lousy defense at large scale, even without the true and very worrisome case of supply chain based attacks, and situations like VPNfilter where routers (performing firewall functions) were compromised by vulnerabilities that were intentionally kept undisclosed to support a months long FBI operation.
(When I say that firewalls are lousy defense at large scale, what I mean in that across a large population of orgs and sites, a significant portion will be misconfigured or otherwise poorly operated as a result of human error and lack of expertise.)
A related point is that election officials are not alone among Critical Infrastructure (CI) operators in having internet connections for critical systems that are supposed to be air-gapped. DHS recently reported an alarming number of industrial control systems (ICSs) connected to the Internet, some with potentially safety critical risks; and asked for the ability to work through ISPs to contact the operators of these ICSs to help them fix their mis-configured devices and networks.
Since operators in other CI sectors, such as power generation and distribution for example, are not excellent about protecting critical special-purpose devices from Internet-based attacks, we should accept simplistic claims like "not connected to the Internet" or "safely firewall protected" -- claims that are meaningless without evidence, and that experience has shown a claims that not even close to 100% true for any CI sector.
John Sebes / OSET Inst.