Abstract
The authors lay out the security framework and challenges that face election administration today, specifically focusing on cybersecurity and cyber threats. The chapter presents the current array of actors and initiatives involved addressing these threats and discusses cybersecurity challenges faced by local jurisdictions during the 2016 election. The authors then conclude the chapter with a discussion of ways these threats are being addressed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
To explicate some of the complexity of identifying the cyber threat, in The State and Local Election Cybersecurity Playbook, the Belfer Center puts denial of service attacks in both cyber operations and information operations depending on if the goal was to prevent user access or to undermined trust in the electoral systems or process (Mook et al. 2018).
- 2.
52 U.S.C. §§ 20901–21145.
- 3.
This includes American Samoa, Guam, Puerto Rico, and the US Virgin Islands. See: https://www.eac.gov/assets/1/6/FY2018HAVAGrantsExpenditureReport.pdf.
- 4.
570 U.S. 623, 133 S. Ct. 2612; 186 L. Ed. 2d 651.
References
Agawu, Emefa Addo. “How to Think About Election Cybersecurity: A Guide for Policymakers.” April 3, 2018. https://www.newamerica.org/cybersecurity-initiative/policy-papers/how-to-think-about-election-cybersecurity/.
Alvarez, R. Michael, Lonna Rae Atkeson, and Thad E. Hall. Evaluating Elections: A Handbook of Methods and Standards. New York: Cambridge University Press, 2013.
DeSilver, Drew. “On Election Day, Most Voters Use Electronic or Optical-Scan Ballots.” Pew Research Center, November 8, 2016. http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/.
Goudie, Chuck, and Christine Tressel. “How the Russians Penetrated Illinois Election Computers.” ABC 7 Live Chicago, July 19, 2018. https://abc7chicago.com/politics/how-the-russians-penetrated-illinois-election-computers/3778816/.
Government Accountability Office. “Critical Infrastructure Protection: Additional Actions Are Essential for Assessing Cybersecurity Framework Adoption.” February 2018. https://www.gao.gov/assets/700/690112.pdf.
Hale, Kathleen, and Christa Daryl Slaton. “Building Capacity in Election Administration: Responding to Complexity and Interdependence.” Public Administration Review, 68, no. 5 (2008): 839–849.
Hale, Kathleen, Mitchell Brown, and Robert Montjoy. Administering Elections: How American Elections Work. New York: Palgrave, 2015.
Hawkins, Derek, “The Cybersecurity 202: Voters’ Distrust of Election Security Is Just as Powerful as an Actual Hack, Officials Worry.” Washington Post, June 5, 2018. https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2018/06/05/the-cybersecurity-202-voters-distrust-of-election-security-is-just-as-powerful-as-an-actual-hack-officials-worry/5b1567091b326b08e883912f/?utm_term=.7a03e7805651.
“Illinois Voter Registration System Database Breach Report.” n.d. https://www.intelligence.senate.gov/sites/default/files/documents/os-ssandvoss-062117_0.pdf.
Jeh, Johnson. “Readout of Secretary Johnson’s Call with State Election Officials on Cybersecurity.” Department of Homeland Security, August 15, 2016. https://www.dhs.gov/news/2016/08/15/readout-secretary-johnsons-call-state-election-officials-cybersecurity.
Levine, Mike. “Russia Likely Targeted All 50 States in 2016, but Has Yet to Try Again, DHS Cyber Chief Says.” ABC News, April 24, 2018. https://abcnews.go.com/US/russia-targeted-50-states-2016-dhs-cyber-chief/story?id=54695520.
Mook, Robby, Matt Rhoades, and Eric Rosenbach. “The State and Local Election Cybersecurity Playbook.” Belfer Center for Science and International Affairs, Harvard Kennedy School, February 2018. https://www.belfercenter.org/publication/state-and-local-election-cybersecurity-playbook.
Yaffa, Joshua. “Russia’s View of the Election Hacks: Denials, Amusement, Comeuppance.” The New Yorker, December 20, 2017. https://www.newyorker.com/news/news-desk/russias-view-of-the-election-hacks-denials-amusement-comeuppance.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this chapter
Cite this chapter
Choate, J., Smith, R. (2020). Election Cybersecurity. In: Brown, M., Hale, K., King, B. (eds) The Future of Election Administration. Elections, Voting, Technology. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-14947-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-14947-5_16
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-14946-8
Online ISBN: 978-3-030-14947-5
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)