About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

1 [1] (August 16, 2018)

handle is hein.crs/crsmthzzbdc0001 and id is 1 raw text is: 


CRS   INSIGHT


Election Security: Issues in the 2018 Midterm Elections

August 16, 2018 (IN10955)




Related   Authors


     _Cajtrine A-Theohar

     *Eri-c A.Fisce





Catherine A. Theohary, Specialist in National Security Policy, Cyber and Information Operations
(cheohary   crs bc gov, 7-0844)
Eric A. Fischer, Senior Specialist in Science and Technology (efischernacrs lc gov, 7-7071)

In the wake of assessments about                                             I, concerns have been mounting
about tesuiyf th2018midter       eeion. Security efforts are   complicated by the complex, multidimensional
election life cycle, with each dimension involving a broad array of components. The main dimensions can be thought of
as election administration .campaign activities, and media coverage.

Traditionally, concerns about election security have focused largely on election administration. In the wake of the 2016
election, the Department of Homeland Security designated election-administration n  rc  ritical
infrasructure (Cl -sb   or. That made the state and local offices and private-sector entities involved in running
elections eligible for enhanced federal technical assistance and information sharing on both physical- and cyber-
security.

The CI designation expressly applies only to the election-administration dimension. However, malicious actors are
unlikely to respect such limitations. The increasing use of internet connectivity in all three dimensions is creating a
convergence of security risks not only within the dimensions but across them

   *  Attacks on election infrastructure might involve registration databases, voting systems, reporting of results, or
      other components or processes. The goal might be to exfiltrate (surreptitiously obtain) information such as voter
      files, to disrupt the election process, or even to change vote counts and results.
   *  Attacks on political parties and campaigns might involve exfiltration of candidate information or
      communications, disruption of events, or other goals. For example, data from the information networks of a
      political party could offer a foreign adversary insights into the prospective operations, priorities, and
      vulnerabilities of an incoming government, should the party prevail at the polls.
   *  Exploits involving media coverage, especially social media, might include, for example, spreading false or
      misleading information to voters with the aim of affecting their votes or eroding confidence in the election
      outcome. Voter information obtained through attacks on political party or government entities, or by other means,
      could be used to target voters considered susceptible to such misinformation. For example, Cambridge Analytica

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Contact us for annual subscription options:

Already a HeinOnline Subscriber?

profiles profiles most