Election Security Perspectives From Intelligence and Election Cybersecurity Experts
dc.contributor.author | Nguyen, Terry | |
dc.contributor.author | Sherry, Molly | |
dc.contributor.author | Soonavala, Cyrus | |
dc.date.accessioned | 2025-02-18T20:52:48Z | |
dc.date.available | 2025-02-18T20:52:48Z | |
dc.date.issued | 2025-01-17 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/196554 | en |
dc.description.abstract | Deterring election interference remains an ongoing challenge for national security institutions and election administration agencies. Interference is defined as “any covert, fraudulent, deceptive, or unlawful actions or attempted actions of a foreign government, or of any person acting as an agent of or on behalf of a foreign government, undertaken with the purpose or effect of undermining confidence in, or altering the result or reported result of, the election, or undermining public confidence in election processes or institutions.” The primary areas of concern are voter registration databases, voting machines, and outdated election infrastructure standards that are vulnerable to malign foreign interference. Javed Ali, associate professor of practice at the Gerald R. Ford School of Public Policy, and J. Alex Halderman, the Bredt Family Professor of Engineering and a professor of Electrical Engineering and Computer Science, agreed to share their expert insights into the state of U.S. election security. Professor Ali expressed his confidence in the intelligence community and in improvements made to cyberinfrastructure and inter-agency coordination to deter cybersecurity threats. Professor Halderman encouraged greater state, local, and federal agency cooperation to implement uniform election infrastructure standards. He also urged election administration agencies to implement both defensive and deterrent measures to counter any election interference attempts. An evolving threat landscape presents a variety of security challenges, but Americans can be confident that their vote was safeguarded this election cycle. Despite known attempts at interference, they were not large or effective enough to alter election results. | en_US |
dc.description.sponsorship | Ford Foundation | en_US |
dc.language.iso | en_US | en_US |
dc.subject | election security, cybersecurity, election interference, voting machines, voter registration | en_US |
dc.title | Election Security Perspectives From Intelligence and Election Cybersecurity Experts | en_US |
dc.type | Article | en_US |
dc.subject.hlbtoplevel | Government, Politics and Law | |
dc.contributor.affiliationumcampus | Ann Arbor | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/196554/1/STPP-Election-Security.pdf | |
dc.identifier.doi | https://dx.doi.org/10.7302/25216 | |
dc.description.depositor | SELF | en_US |
dc.working.doi | 10.7302/25216 | en_US |
dc.owningcollname | Science, Technology, and Public Policy (STPP) program |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.