Election Security in the Digital Age

As voting technology evolves, so do the threats. Understanding election security is essential for every citizen who cares about the integrity of democracy.

Overview

The Election Security Landscape

Election security encompasses the policies, procedures, and technologies that protect the integrity of the voting process from the moment a voter registers through the final certification of results. In the United States, where elections are administered by thousands of local jurisdictions, security is a complex, multi-layered challenge.

The 2016 election cycle marked a turning point in public awareness. Reports of attempted intrusions into voter registration databases, social media manipulation campaigns, and probing of election infrastructure by foreign actors elevated election security from a niche concern to a national priority. Since then, billions of dollars have been invested in hardening election infrastructure, but significant challenges remain.

Threat Landscape

Threats to Election Infrastructure

Nation-State Cyber Operations

Foreign governments have the resources, motivation, and technical capability to target election systems. Intelligence agencies have confirmed that multiple nation-states have probed or attempted to access American election infrastructure. These operations may target voter registration databases, election night reporting systems, or the voting machines themselves.

Insider Threats

Individuals with authorized access to election systems -- whether election officials, vendors, or poll workers -- can pose a security risk. Strong chain-of-custody procedures, dual-control access requirements, and comprehensive audit logs are essential safeguards against insider threats.

Supply Chain Vulnerabilities

Voting machines, ballot scanners, and election management software are produced by a small number of private vendors. The hardware and software supply chain for these systems spans multiple countries and companies, creating potential points of compromise. A vulnerability introduced at the manufacturing or software development stage could affect thousands of jurisdictions simultaneously.

Disinformation and Undermining Trust

Even without directly altering votes, adversaries can undermine confidence in election results through disinformation campaigns. Transparent, auditable election systems -- anchored by paper ballots -- are the most effective defense against narratives that seek to delegitimize outcomes.

Protecting Elections

Defense in Depth

Election security experts advocate a "defense in depth" approach: multiple, overlapping layers of protection so that no single vulnerability can compromise an entire election.

  1. Paper Ballots and Optical Scanners

    Hand-marked paper ballots counted by optical scanners provide the strongest foundation. The paper ballot is the official record; the scanner produces a fast electronic tally that can be verified against the paper at any time.

  2. Pre-Election Testing

    Logic and accuracy testing before every election ensures that voting machines and scanners are recording and counting votes correctly. These tests use known ballots with predetermined results to verify machine accuracy.

  3. Post-Election Audits

    Risk-limiting audits compare a statistical sample of paper ballots to machine-reported results. If discrepancies are found, the audit escalates to a full hand recount. This process provides strong evidence that the correct winner was identified.

  4. Network Security and Air Gaps

    Voting machines should never be connected to the internet. Air-gapped systems, encrypted data transfers, and rigorous network security protocols protect against remote cyber attacks.

  5. Transparency and Observation

    Open processes that allow candidates, parties, and nonpartisan observers to monitor every stage of the election -- from machine testing through ballot counting and auditing -- build public confidence and deter malfeasance.

Governance

Federal and State Roles

Election administration in the United States is decentralized by design. While the federal government sets baseline standards and provides funding, the day-to-day administration of elections falls to state and local officials. This creates both strengths and challenges.

Federal Level

  • -- Election Assistance Commission (EAC) sets voluntary standards
  • -- CISA provides cybersecurity support to state and local officials
  • -- Congress allocates election security funding (HAVA)
  • -- Federal law sets baseline voting rights protections

State and Local

  • -- States choose and certify voting equipment
  • -- Counties and cities administer elections directly
  • -- State legislatures set election law and audit requirements
  • -- Secretaries of state oversee statewide election processes
Your Role

What Citizens Can Do

Election security is not just a job for officials and technologists. Every citizen plays a role in safeguarding democracy.

Stay Informed

Learn about the voting systems used in your jurisdiction. Understand the difference between paper ballots, DRE machines, and ballot-marking devices.

Advocate for Paper

Contact your elected officials and urge them to require paper ballots and risk-limiting audits for all elections.

Be a Poll Worker

Volunteer as a poll worker or election observer. Direct participation in the electoral process is one of the most powerful things you can do.