Countering Electoral Interference

Russia’s aggressive campaign targeting the 2016 US election revealed not only the extent to which information and communications technologies are being used to undermine democratic processes but also the weaknesses of protection measures. 
 
The US government was effectively caught off guard, once again highlighting that such interference presents a rising global threat. 
 
Comprehensive strategies and tools are clearly needed as part of a long-term, holistic approach to building resilience, but to be effective, they should be informed by the regular sharing of best practices and lessons learned between countries.
In reaction to Russia’s disruptive campaigns in Europe and the United States, European governments took steps before and during their 2017 elections to better protect against disinformation campaigns and cyber-attacks. 
 
An examination of their efforts shows the importance of identifying risks at the local, regional, and national levels and actively engaging political parties and traditional and social media outlets. 
 
These lessons and others could provide the basis for a common, analytical framework to assess the different dimensions of risk and guide countries’ preparatory actions.
 
Lessons from European Efforts
• Consider electoral systems as part of critical infrastructure, institutionalise preparations to protect election processes, and broaden activities to the subnational levels.
• Focus on resilience measures, for example, by conducting regular vulnerability analyses and developing contingency plans. Legal measures should be explored through an inclusive process.
• Issue public statements to deter threat actors and educate voters about disinformation campaigns.
• Train and educate political parties and campaigns to better protect against potential interference.
• Conduct government-media dialogue, encourage media to take voluntary protective measures, and engage social media companies in mitigating potential threats.
• Support international cooperation, particularly the sharing of lessons learned and best practices.
Preparing for the 2018 US Mid-Term Elections
• Issue a clear warning that interference in the 2018 elections by Russia or any other actor will result in severe consequences.
• Coordinate government efforts to protect against cyber-attacks and disinformation.
• Provide more training and support to state and local election officials.
• Regularly assess election infrastructure.
• Encourage states to reevaluate the use of electronic voting machines.
• Encourage political parties and their candidates, staff, and volunteers to follow basic cyber-security practices.
• Encourage donors to require that political parties and campaigns implement basic cyber hygiene for their candidates, staff, and volunteers.
• Urge political parties and campaigns to explicitly state that they will not use or support social media bots.
• Increase society’s resilience by clearly communicating the risks of foreign interference in US democracy.
• Promote independent citizen fact-checking and investigative journalistic initiatives.
• Improve media literacy among the public.
 
Carnegie Endowment
 
You Might Also Read:
 
Hacking The Vote:
 
Tech Giants Face US Congress Over Russia Election:
 
 
« FBI Seizes Control Of Russian Botnet
Quantum Computing - What You Should Know »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

C2B2 Consulting

C2B2 Consulting

C2B2 are experts in middleware support and consultancy. We specialise in ensuring scalability, performance and security of large scale systems.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Avira

Avira

Avira provide a portfolio of antivirus, security and performance applications for Windows, Android, Mac, and iOS.

Belden

Belden

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden brands include Hirschmann and Tofino Security.

XM Cyber

XM Cyber

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

Secure Halo

Secure Halo

Secure Halo has been protecting the intellectual assets and sensitive information of the federal government and private sector for 20+ years, through our proactive approach to risk and cybersecurity.