Understanding Cybersecurity Throughout The Electoral Process - 1
Understanding Cybersecurity Throughout The Electoral Process - 1
CYBERSECURITY THROUGHOUT
THE ELECTORAL PROCESS: A
PHOTO © AP PHOTO/MAHESH KUMAR A. 2009
REFERENCE DOCUMENT
An Overview of Cyber Threats and
Vulnerabilities in Elections
Acknowledgements
This reference document was prepared by the International Foundation for Electoral Systems (IFES)
Center for Applied Research & Learning in consultation with DAI and USAID’s Center for Democracy,
Human Rights and Governance (DRG Center). Dr. Tarun Chaudhary, Thomas Chanussot, and Dr. Manuel
Wally were lead authors. The reference document benefited tremendously from contributions by Dr.
Stephen Boyce, Dr. Beata Martin-Rozumiłowicz, Dr. Staffan Darnolf, Chelsea Dreher, Katherine Ellena,
Brian Polk, Federico Roitman, Victoria Scott, Erica Shein, and Chad Vickery. The authors would also like
to acknowledge Annie Styles for her immense help. The team is grateful to those individuals who reviewed
various drafts and provided valuable insights
EXECUTIVE SUMMARY 1
I. INTRODUCTION 4
II. CYBERSECURITY IN ELECTIONS: A BRIEF HISTORY AND OVERVIEW OF THE LITERATURE 6
A. International, Regional and Domestic Guidance for Cybersecurity in Elections 8
1. Election Technology and Cybersecurity Threats 8
2. Open Data, Transparency, and Privacy 9
B. Practitioner Handbooks and Guidance Documents 11
C. Cybersecurity Instruments and Frameworks 12
D. Academic Literature 14
1. Vulnerabilities Across the Electoral Process 14
2. Voting Technology 16
III. APPLYING A RISK-BASED LENS TO ELECTION CYBERSECURITY 18
A. Risk Management Frameworks 18
B. Controls, Transferrance and Acceptance 19
C. Adopting and Adapting Risk Managment Strategies 21
D. Threat Actors 23
1. Foreign State Actors and Advanced Persistent Threats 24
2. Government Actors 25
3. Criminal Groups 26
4. Non-State Political Groups and Hacktivists 26
5. Insider Threats 26
IV. EMB RISK MITIGATION ACROSS THE ELECTORAL PROCESS 27
A. Legal and Regulatory Context 28
1. Considerations for Introducing New Election Technology 28
2. Cybersecurity-Specific Legal and Regulatory Framework Considerations 30
B. Procurement and Planning 32
C. Boundary Delimitation 34
D. Voter Registration 35
E. Candidate Registration Process 37
F. EMB Communications Platforms 38
G. Voter Information and Education 38
H. Voting Process 39
I. Counting at the Polling-Station Level 42
J. Results Transmission, Tabulation and Reporting 43
K. Electoral Dispute Resolution Process 45
L. Detecting, Investigating and Prosecuting Cybercrime in Elections 46
V. OTHER ELECTION STAKEHOLDERS 48
A. Multi-Stakeholder Coordination 48
B. Civil Society Organizations 49
C. Political Parties 50
VI. CONCLUSIONS 52
ANNEX: LIST OF RELEVANT PUBLICATIONS OR RESOURCES 54
A. International, Regional, and Domestic Standards 54
B. Practitioner Publications 54
C. Cybersecurity Instruments and Frameworks 55
D. Academic Literature 56
E. Jurisprudence 58
F. Other Reports 58
EXECUTIVE SUMMARY
Since electronic voting technology was first introduced, a variety of new technologies have been developed
and integrated into elections around the world, affecting each step of the election process. In many cases,
these technologies are efficient, reduce the risk of human error, 1 improve accessibility, 2 and can mitigate
or prevent some types of election fraud. 3 As election management bodies (EMBs) have taken up new
technologies – particularly around digitization of voter registries, transmission processes and aggregation
of election results – multiple sources of policy, principle and practice in electoral cybersecurity have
emerged to address the potential for disruptive cyber attacks. 4
However, significant gaps remain in developing further guidance and regulation for EMBs, policymakers,
and electoral stakeholders to ensure that electoral technology is secured from threats and trusted by the
public. Failure to address electoral cybersecurity risks can pose a critical threat to electoral integrity.
Malign actors may attempt to manipulate elections directly, undermine public confidence in elections, or
erode the legitimacy of elected representatives and bodies by exploiting vulnerabilities in electronic
information processing and cyberspace. Such loss in trust and concerns about legitimacy could impede
development initiatives and undermine effective and accountable governance.
As the number of election technology applications grows, elections have begun to attract the attention of
a wider spectrum of threat actors. Cyberspace, despite all the societal benefit and economic value it has
helped create, is also an arena of strategic competition and criminal activity. The electronic information
systems in use across electoral processes are therefore important elements of critical national
infrastructure that can be attacked. There are well known examples of cyber attacks focused on elections
launched by well-resourced foreign state actors with the aim of undermining trust in democratic processes
and the legitimacy of their outcomes. Domestic actors have also emerged to threaten elections. They may
be politically, financially, or ideologically motivated, and operate individually or collectively, but like their
foreign counterparts they are finding ways to undermine trust in elections. The emergence of these
domestic actors means that institutions charged with upholding the integrity of elections must also work
to recognize and mitigate potential insider threats.
Election managers should look to trends identified within the wider field of cybersecurity analysis to
understand the types of attacks that can potentially impact systems falling under their purview. While
denial of service attacks that overload infrastructure and other relatively unsophisticated attacks are still
occurring, recent analysis has highlighted how a commoditized market for sophisticated tools and methods
1
Goldsmith, B. and H. Ruthrauff. (2013). Implementing and Overseeing Electronic Voting and Counting Technologies.
National Democratic Institute and International Foundation for Electoral Systems.
https://www.ndi.org/implementing-and-overseeing-e-voting-counting-technologies, pp. 21-22; and National
Democratic Institute. (n.d.). The Rationale for E-voting in Brazil. https://www.ndi.org/e-voting-guide/examples/the-
rationale-for-e-voting-in-brazil.
2
Human Systems Integration Division, Electronic Systems Laboratory, Georgia Tech Research Institute, Georgia
Institute of Technology. (2012, July). Consideration of Voting Accessibility for Injured OIF/OEF Service Members:
Needs Assessment. https://www.nist.gov/system/files/documents/2017/05/09/GTRI-Appendix-A-Accessibility-of-
Voting-Systems.pdf
3
Somanathan, M. (2019, April 5). India’s Electoral Democracy: How EVMs Curb Electoral Fraud. Brookings
Institute. https://www.brookings.edu/blog/up-front/2019/04/05/indias-electoral-democracy-how-evms-curb-
electoral-fraud/
4
The attacks on Ukraine in 2014 and the United States in 2016 are particularly illuminating. See, for instance,
Martin-Rozumilowicz, B. and T. Chanussot (2019). "Cybersecurity and Electoral Integrity: The Case of Ukraine,
2014-Present." In Krimmer, R. et al (Eds). Fourth International Joint Conference on Electronic Voting, E-Vote-ID
2019: 1-4 October 2019, Lochau/Bregenz, Austria: Proceedings. https://www.zora.uzh.ch/id/eprint/175950/
1
5
The Microsoft Digital Defense Report issued in October 2021 has recent trending data. See: Microsoft. (2021,
October). Microsoft Digital Defense Report. https://www.microsoft.com/en-us/security/business/microsoft-digital-
defense-report
6
The term ransomware is often used to describe this practice.
2
The term “cybersecurity” refers to the means through which electronically processed information can be
secured against disruption, disablement, destruction or malicious control, thus protecting against the
possibility of the information’s integrity, availability or confidentiality becoming compromised. 8 The use of
cyber-based attacks against public institutions – including those associated with election infrastructure –
are a known and documented occurrence, and one that has occurred with increasing frequency, as noted
in the next section.
7
For a comprehensive overview of the various institutional arrangements associated with the management of
democratic elections, see: Catt, Helena et al. (2014, September). Electoral Management Design, Revised Edition.
International Institute for Democracy and Electoral Assistance.
https://www.idea.int/sites/default/files/publications/electoral-management-design-2014.pdf
8
Please see the National Institute for Standards and Technology's (NIST) Glossary for definitions. National
Institute for Standards and Technology. (n.d.). Glossary. https://csrc.nist.gov/glossary/term/cybersecurity
4
There are differing opinions as to whether election technology – especially electronic voting and results
management systems – can be fully protected from cyber attacks. While some EMBs (such as Brazil’s
TSE 14) and technology vendors, as well as successful electoral candidates, may insist that election
technology can be fully protected, cybersecurity experts generally agree that there is no way to guarantee
an absolute level of security against cyber threats and fully protect against all risks. While cybersecurity
risks cannot be eliminated entirely, many can be mitigated with the application of security controls as part
of a holistic cybersecurity strategy.
This report provides an overview of the more practical threats to elections and outlines the concept of
cybersecurity as a risk management process that should be adopted by EMBs. The paper begins with an
overview of technology adoption and cybersecurity threats in elections and a brief literature review of
the existing body of work that informs electoral cybersecurity policy and practice.
Next, the paper discusses the primary actors posing cyber threats to election technology. It then applies
the key cybersecurity concepts of risk management and security control mechanisms to the electoral
process using a risk-based approach with a focus on mitigation strategies for election management bodies.
The penultimate section considers the importance of multi-stakeholder coordination and outlines cyber
risks for two additional stakeholder groups: political parties and civil society organizations.
The paper concludes with a discussion of areas where further analysis and guidance is needed to
strengthen the cybersecurity postures of electoral management bodies.
9
Marañon, A. (2021, May 28). How Have Information Operations Affected the Integrity of Democratic Elections in Latin
America? Lawfare. https://www.lawfareblog.com/how-have-information-operations-affected-integrity-democratic-
elections-latin-america
10
Allen, N. and N. van der Waag-Cowling. (2021, July 15). How African States Can Tackle State-Backed Cyber Threats.
Brookings Institute. https://www.brookings.edu/techstream/how-african-states-can-tackle-state-backed-cyber-
threats/
11
Lim, Y. (2020, November 22). Election Cyber Threats in the Asia-Pacific Region. Mandiant.
https://www.fireeye.com/blog/threat-research/2020/11/election-cyber-threats-in-the-asia-pacific-region.html
12
Galloway, Anthony. (2020, October 28). Cyber Attacks on Elections Growing Amid Concern for Australia’s Political
Parties. Sydney Morning Herald. https://www.smh.com.au/politics/federal/cyber-attacks-on-elections-growing-amid-
concern-for-australia-s-political-parties-20201028-p569fg.html
13
Poushter, J. and Fetterolf, J. (2019, January 9). International Publics Brace for Cyberattacks on Elections,
Infrastructure, National Security. Pew Research Center.
https://www.pewresearch.org/global/2019/01/09/international-publics-brace-for-cyberattacks-on-elections-
infrastructure-national-security/
14
TeleSURtv.net. (2021, August 2). TSE de Brasil Respalda Sistema de Voto Electrónico.
https://www.telesurtv.net/news/brasil-tse-respalda-sistema-voto-electronico-20210802-0026.html
5
15
International Foundation for Electoral Systems. (2014, November 20). Electronic Voting Machines Pakistan
Factsheet. https://www.ifes.org/sites/default/files/electronic_voting_machines.pdf; Fischer, E. (2003). Election Reform
and Electronic Voting Systems (DREs): Analysis of Security Issues. Congressional Research Service.
https://crsreports.congress.gov/product/pdf/RL/RL32139/3; Tokaji, D. (2005). The Paperless Chase: Electronic Voting
and Democratic Values, 73 Fordham L. Rev. p. 1719.
https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=4064&context=flr
16
National Democratic Institute, The Rationale for E-voting in Brazil.
17
Georgia Institute of Technology, Consideration of Voting Accessibility for Injured OIF/OEF Service Members: Needs
Assessment.
18
Somanathan, India’s Electoral Democracy: How EVMs Curb Electoral Fraud.
19
Commission on Electronic Voting. (2004, December). First Report of the Commission on Electronic Voting on the
Secrecy, Accuracy and Testing of the Chosen Electronic Voting System.
https://opac.oireachtas.ie/Data/Library3/Library2/DL049949.pdf
20
RTÉ. (2009, April 23). Electronic Voting System to be Scrapped. https://www.rte.ie/news/2009/0423/evoting.html
21
Vaalit Val, Department for Democracy and Public Law, Ministry of Justice. (n.d.). Electronic Voting in Finland.
https://vaalit.fi/en/electronic-voting1
22
European Digital Rights (EDRi). (2009, April 22). Finnish E-Voting Results Annulled by the Supreme Administrative
Court. https://edri.org/our-work/edri-gramnumber7-8evoting-annuled-finland/
6
23
Bundesverfassungsgericht. (2009). Judgment of 3 March 2009 - 2 BvC 3/07.
https://www.bundesverfassungsgericht.de/SharedDocs/Entscheidungen/EN/2009/03/cs20090303_2bvc000307en.ht
ml
24
Center for Strategic & International Studies. (n.a.). Significant Cyber Incidents. https://csis-website-
prod.s3.amazonaws.com/s3fs-
public/210901_Significant_Cyber_Incidents.pdf?iZAairy6vNXrSEp9cFC_TCaB0IxnkE3D
25
Ibid.
26
Ottis, R. (2018). Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective.
Cooperative Cyber Defense Centre of Excellence.
https://ccdcoe.org/uploads/2018/10/Ottis2008_AnalysisOf2007FromTheInformationWarfarePerspective.pdf
27
Kozlowski, A. (2014). Comparative Analysis of Cyberattacks on Estonia, Georgia and Kyrgyzstan. European Scientific
Journal. 3(4), 237-245 ; http://connections-qj.org/article/blending-new-generation-warfare-and-soft-power-hybrid-
dimensions-russia-bulgaria-relations; https://www.president.bg/news3428/interview-of-president-plevneliev-for-the-
bbc.html&lang=en); https://www.bbc.com/news/world-europe-37867591
28
For a dissection of this development, see Martin-Rozumilowicz and Chanussot, "Cybersecurity and Electoral
Integrity."
29
United States Attorney’s Office, Southern District of New York, United States Department of Justice. (2021,
November 18). U.S. Attorney Announces Charges Against Two Iranian Nationals for Cyber-Enabled Disinformation And
Threat Campaign Designed To Interfere With The 2020 U.S. Presidential Election. https://www.justice.gov/usao-
sdny/pr/us-attorney-announces-charges-against-two-iranian-nationals-cyber-enabled
30
AFP. (2021, September 17). German Election Authority Confirms Likely Cyber Attack. Security Week.
https://www.securityweek.com/german-election-authority-confirms-likely-cyber-attack
7
31
News Room. (2021, September 20). Russia. 3 Cyber Attacks Targeting the Elections in their First Day. Eastern Herald.
https://www.easternherald.com/2021/09/20/cyber-attacks-russia-elections/
32
Katherine E. et al. (2018). Cybersecurity in Elections: Developing a Holistic Exposure and Adaptation Testing (HEAT)
Process for Election Management Bodies. IFES. https://www.ifes.org/publications/cybersecurity-elections
33
Council of Europe, CM-Rec (2017)5, 17 June 2017, Appendix I, sec. VIII. https://rm.coe.int/0900001680726f6f.
This is a revision of the 2004 standards, which were the first of their kind.
34
Council of Europe, CM-Rec. (2017)5, Appendix I, sec. VIII.
35
United States Election Assistance Commission. (n.d.). Voluntary Voting System Guidelines. Voting Equipment.
https://www.eac.gov/voting-equipment/voluntary-voting-system-guidelines/
8
KEY SOURCES OF GUIDANCE FOR ADDRESSING ELECTION TECHNOLOGY AND CYBERSECURITY THREATS
36
Secretariat, Council of Europe. (2011, February 16). Certification of E-voting Systems: Guidelines for Developing
Processes that Confirm Compliance with Prescribed Requirements and Standards. GGIS (2010) 3 fin. E.
https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=090000168059bdf8
37
Council of Europe. (n.d.). Budapest Convention on Cybercrime of the Council of Europe.
https://www.coe.int/web/cybercrime/the-budapest-convention
38
The original ransomware attack known as “Petya” held hostage data from several companies and demanded a
ransom to release it. A number of cybersecurity analysts maintain that the newer versions were instead aimed at
causing damage. See: Solon, O. And A. Hern. (2017, June 28). 'Petya' Ransomware Attack: What is it and How Can it
be Stopped? Guardian. https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-
what-why-how
39
United Nations General Assembly. (1990, December 14). Guidelines for the Regulation of Computerized Data Files,
14 December 1990, res. 45/95. http://www.refworld.org/pdfid/3ddcafaac.pdf
40
Ibid.
41
Ibid., sec. B.
9
42
Ibid., (7).
43
Since joining in 2011, Hungary and Turkey withdrew their participation. Azerbaijan’s status is inactive since 2015.
See Open Government Partnership. Open Government Declaration. (n.d.).
https://www.opengovpartnership.org/open-government-declaration.
44
Ibid.
45
Ibid.
46
Regulation (EU) 2016/679. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April
2016 on the protection of natural persons with regard to the processing of personal data and on the free
movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). https://eur-
lex.europa.eu/legal-content/EN/TXT/?qid=1532348683434&uri=CELEX:02016R0679-20160504
47
European Commission. (n.d.). What does the General Data Protection Regulation (GDPR) govern?
https://ec.europa.eu/info/law/law-topic/data-protection/reform/what-does-general-data-protection-regulation-gdpr-
govern_en
48
Marsh and McLennan Companies. (2020, August). Two Years On, the GDPR Continues to Shape Global Data Privacy
Regulation. https://www.marsh.com/us/services/cyber-risk/insights/GDPR-two-years-on-continues-to-shape-global-
privacy-regulation.html.
49
Dipshan, Rhys. (2021, October 6). GDPR's Global Impact May Be More Limited Than You Think.
https://www.law.com/legaltechnews/2021/10/06/gdprs-global-impact-may-be-more-limited-than-you-think-397-
51646/?slreturn=20211023104029
50
G.A. res. 44/132, 44 U.N. GAOR Supp. (No. 49) at 211, U.N. Doc. A/44/49 (1989). See also General Assembly
resolutions 68/167 of 18 December 2013 and 69/166 of 18 December 2014, as well as Human Rights Council
resolutions 28/16 of 26 March 2015 on the right to privacy in the digital age and 32/13 of 1 July 2016 on the
promotion, protection and enjoyment of human rights on the Internet.
10
• United Nations (UN) General Assembly Guidelines for the Regulation of Computerized Data Files
55
Cortes, E. Ramachandran, G. Howard, L., Norden, L. (2019). Preparing for Cyberattacks and Technical Failures A
Guide for Election Officials. Brennan Center for Justice at New York University School of Law.
https://www.brennancenter.org/our-work/policy-solutions/preparing-cyberattacks-and-technical-failures-guide-
election-officials
56
Norden, L., C. Deluzio and G. Ramachandran. (2019, November 12). A Framework for Election Vendor Oversight:
Safeguarding America’s Election Systems. Brennan Center for Justice at New York University School of Law.
https://www.brennancenter.org/sites/default/files/2019-11/2019_10_ElectionVendors.pdf
57
Comprising experts from the EU member states, the European Commission and the European Union Agency for
Cybersecurity (ENISA).
58
European Union Network and Information Security Cooperation Group. (2018, July). Compendium on
Cybersecurity of Election Technology. https://www.ria.ee/public/Cyber_security_of_Election_Technology.pdf
59
Van der Staak, S. Wolf, P. (2019). Cybersecurity in Elections Models of Interagency Collaboration. International
Institute for Democracy and Electoral Assistance. https://www.idea.int/publications/catalogue/cybersecurity-in-
elections
60
The National Institute of Standards and Technology’s website is found at: https://www.nist.gov/.
61
The ISACA website can be found at: https://www.isaca.org/.
62
The International Organization for Standardization’s website can be found at: https://www.iso.org/home.html.
63
The U.S. Computer Emergency Readiness Team’s (US-CERT) website can be found at https://www.us-cert.gov/.
12
64
Shemlse Gebremedhin Kassa. (2016). Information Systems Security Audit: An Ontological Framework. ISACA Journal
vol. 5. https://www.isaca.org/Journal/archives/2016/volume-5/Pages/information-systems-security-audit.aspx.
65
ISACA. (n.d.). COBIT: An ISACA Framework. https://www.isaca.org/resources/cobit
66
ISACA. (2012). COBIT 5: A Business Framework for the Governance and Management of Enterprise IT. Publisher:
ISACA.
67
International Organization for Standardization and International Electrotechnical Commission. (2011). ISO/IEC
27005:2011. https://www.iso.org/standard/56742.html; and European Union Agency for Network and Information
Security. (2018, January 15). ENISA Threat Landscape Report 2017. https://www.enisa.europa.eu/publications/enisa-
threat-landscape-report-2017
68
European Union Agency for Network and Information Security, ENISA Threat Landscape Report 2017, pp. 79-87.
69
Brady, M. Howell, G. Sames, C., Schneider, M. Snyder, J. Weitzel, D. Franklin, G. (2021). Cybersecurity Framework
Election Infrastructure Profile. National Institute of Standards and Technology. U.S. Department of Commerce.
https://csrc.nist.gov/publications/detail/nistir/8310/draft
70
National Institute of Standards and Technology, U.S. Department of Commerce. (2021, March 29). To Help
Protect Our Elections, NIST Offers Specific Cybersecurity Guidelines. https://www.nist.gov/news-
events/news/2021/03/help-protect-our-elections-nist-offers-specific-cybersecurity-guidelines
13
71
Shackelford, S. et al. (2017). Making Democracy Harder to Hack, 50 U. Mich. J. L. Reform 629.
https://repository.law.umich.edu/mjlr/vol50/iss3/3
72
Shackelford et al., Making Democracy Harder to Hack.
73
Dawood, Y. (2021). Combatting Foreign Election Interference: Canada's Electoral Ecosystem Approach to Disinformation
and Cyber Threats. Election Law Journal: Rules, Politics, and Policy, 20(1), 10-31. http://doi.org/10.1089/elj.2020.0652
74
Garnett, H. & James, T. (2020). Cyber Elections in the Digital Age: Threats and Opportunities of Technology for Electoral
Integrity. Election Law Journal: Rules, Politics, and Policy, 19(2), 111-126. http://doi.org/10.1089/elj.2020.0633
75
Dawood, Combatting Foreign Election Interference.
76
Shackelford et al., Making Democracy Harder to Hack.
14
77
Tenove, C., Buffie, J., McKay, S., & Moscrop, D. (2018). Digital Threats to Democratic Elections: How Foreign
Actors Use Digital Techniques to Undermine Democracy. Research Report, Centre for the Study of Democratic
Institutions, University of British Columbia. http://dx.doi.org/10.2139/ssrn.3235819
78
Hodgson, Q. E., Brauner, M. K., Chan, E. W. (2020). Securing U.S. Elections Against Cyber Threats: Considerations for
Supply Chain Risk Management. Santa Monica, CA: RAND Corporation.
https://www.rand.org/pubs/perspectives/PEA512-1.html
79
Fidler, D. P. (2017). Transforming Election Cybersecurity. Council on Foreign Relations.
https://www.cfr.org/report/transforming-election-cybersecurity.
80
Shackelford et al. "Making Democracy Harder to Hack."
81
Garnett and James, Cyber Elections in the Digital Age.
82
Fidler, Transforming Election Cybersecurity.
83
Henschke, A., Sussex, M., & O’Connor, C. (2020). Countering Foreign Interference: Election Integrity Lessons for
Liberal Democracies. Journal of Cyber Policy, 5(2), 180-198. DOI: 10.1080/23738871.2020.1797136
84
Fidler, Transforming Election Cybersecurity.
85
Henschke, Sussex, and O’Connor, Countering Foreign Interference.
86
Fidler, Transforming Election Cybersecurity.
87
Kasongo, E., Bernhard, M., & Bronk, C. (2021). Tales from the Trenches: Case Studies in Election Cybersecurity
Preparedness in Texas. E-Vote-ID 2021, 113.
88
Ibid.
89
Henschke, Sussex, and O’Connor, Countering Foreign Interference.
15
90
Blockchain is a technology that utilizes a decentralized method to record and track transactions. A digital ledger
of transactions is duplicated across many computers and each duplicated ledger is updated as transactions occur.
Each transaction carries a digital signature and timestamp to ensure the validity. Since the technology was
developed to overcome issues of trust and with tamper resistance in mind, the technology may be useful in
electoral contexts. Further information about the general technology can be found at the NIST Blockchain
Overview available at: https://www.nist.gov/blockchain.
91
Gambhir, R. K., & Karsten, J. (2019). Why Paper Is Considered State-of-the-Art Voting Technology. Brookings
Cybersecurity and Election Interference. https://www.brookings.edu/blog/techtank/2019/08/14/why-paper-is-
considered-state-of-the-art-voting-technology/; and Norden, L., Cordova McCadney, A. (2019, March 9). Voting
Machines at Risk: Where We Stand Today. Brennan Center for Justice at New York University School of Law.
https://www.brennancenter.org/our-work/research-reports/voting-machines-risk-where-we-stand-today; and
Feldman, A., Halderman, J., Felten, E. (2007). Security Analysis of the Diebold AccuVote-TS Voting Machine. Security
Analysis of the Diebold AccuVote-TS Voting Machine. In Proc. 2007 USENIX/ACCURATE Electronic Voting
Technology Workshop (EVT’07).
https://www.usenix.org/legacy/event/evt07/tech/full_papers/feldman/feldman_html/index.html
92
Feldman, Halderman, and Felten, Security Analysis of the Diebold AccuVote-TS Voting Machine.
93
Ibid.
94
Balzarotti, D., et al. (2010). An Experience in Testing the Security of Real-World Electronic Voting Systems. IEEE
Transactions on Software Engineering, vol. 36, no. 4, pp. 453-473. https://ieeexplore.ieee.org/document/5210119.
95
Wolchok, S., et al. (2010, October). Security Analysis of India's Electronic Voting Machines. In Proceedings of the
17th ACM conference on Computer and communications security (pp. 1-14).
96
Gonggrijp, R., & Hengeveld, W. J. (2007, August). Studying the Nedap/Groenendaal ES3B voting computer: A
computer security perspective. In Proceedings of the USENIX workshop on accurate electronic voting technology
(pp. 1-1).
16
97
National Democratic Institute. (n.d.). Re-evaluation of the Use of Electronic Voting in the Netherlands.
https://www.ndi.org/e-voting-guide/examples/re-evaluation-of-e-voting-netherlands
98
MIT Election Data + Science Lab. (n.d.). Voting Technology. https://electionlab.mit.edu/research/voting-technology
99
Mook, Rhoades, and Rosenbach, The State and Local Election Cyber-Security Playbook; and Norden, Cordova
McCadney, Voting Machines at Risk.
100
Park, S., Specter, M., Narula, N., Rivest, L R. (2020, December 4). Going from Bad to Worse: from Internet Voting to
Blockchain Voting. Journal of Cybersecurity, Volume 7, Issue 1, 2021, tyaa025.
https://doi.org/10.1093/cybsec/tyaa025
101
Feldman, Halderman, and Felten, Security Analysis of the Diebold AccuVote-TS Voting Machine, p. 14.
102
Gambhir and Karsten, Why Paper Is Considered State-of-the-Art Voting Technology.
103
Park, Specter, Narula, and Rivest, Going from Bad to Worse.
104
Haines, T., Lewis, S. J., Pereira, O., Teague, V. (2020) How Not to Prove your Election Outcome. 2020 IEEE
Symposium on Security and Privacy (SP), pp. 644-660, doi: 10.1109/SP40000.2020.00048
105
Springall, D., et al. (2014). Security analysis of the Estonian internet voting system. In Proceedings of the 2014 ACM
SIGSAC Conference on Computer and Communications Security, pages 703–715. ACM, 2014.
106
Wolchok S., Wustrow E., Isabel D., Halderman J.A. (2012). Attacking the Washington, D.C. Internet Voting System.
In: Keromytis A.D. (Eds) Financial Cryptography and Data Security. FC 2012. Lecture Notes in Computer Science,
vol 7397. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32946-3_10
107
Kshetri, N., & Voas, J. (2018). Blockchain-enabled e-voting. IEEE Software, 35(4). p. 3.
17
108
Ibid.
109
Park, Specter, Narula, and Rivest, Going from Bad to Worse.
110
Ibid.
111
Specter, M. A., Koppel, J., & Weitzner, D. (2020). The Ballot is Busted Before the Blockchain: A Security Analysis of
Voatz, the First Internet Voting Application Used in US Federal Elections. In 29th {USENIX} Security Symposium
({USENIX} Security 20) (pp. 1535-1553).
112
Ibid.
113
Gaudry, P., and A. Golovnev. (2020, February). Breaking the Encryption Scheme of the Moscow Internet Voting
System. In International Conference on Financial Cryptography and Data Security (pp. 32-49). Springer, Cham.
114
NIST SP 800-37 is specific to the information technology concepts. It is available at:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
18
115
The ISO 31000 framework is a general risk management framework that can be applied in various contexts, not
just IT. https://www.iso.org/iso-31000-risk-management.html; the ISO 27001 standard establishes information
technology security controls to be applied within the larger risk management framework.
116
European Union Agency for Cybersecurity. (n.d.). ENISA RM/RA Framework.
https://www.enisa.europa.eu/topics/threat-risk-management/risk-management/current-risk/business-process-
integration/the-enisa-rm-ra-framework
117
This is a simplification for understanding and brevity of the process described in depth within NIST, ISO, ENISA
and other risk management frameworks.
118
NIST SP 800-53 Rev. 5 defines a core set of security and privacy controls that operationalize the framework
elucidated in 800-37. U.S. Department of Commerce and National Institute of Standards and Technology. (2020,
September). SP 800-53 Rev. 5 Security and Privacy Controls for Information Systems and Organizations.
https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
19
Management controls use planning and assessment methods to help control risk (e.g., programmatic
guidelines and policies, assessments to understand efficacy of budget planning and other enterprise-wide
policies and protections that are scoped and executed administratively). Operational controls address the
policies and protections that contribute to the secure operation of information systems throughout the
lifecycle of a system, and are implemented through people executing processes (e.g., mandating specific
change management steps, contingency planning or awareness training). Technical controls are implemented
through the use of technology (e.g., encryption of data at rest and during transmission, automated
monitoring and alarming and the use of verifiable security tokens to prove identity).
The controls themselves are put into practice at - and pertain to - various levels, ranging from the abstract
cybersecurity program level (managing and implementing organized cybersecurity across an enterprise)
down to physical hardware and software controls that implement specific security mechanisms. In addition
to the program level, other commonly used categories include the site level (e.g., within a facility or across
a location), the network level, the environment level (i.e., aggregated systems that are part of a cohesive
whole, such as the server environment or wireless access environment), and the host level (referring to
a single computer system).
Controls, however, are not the only way to manage cybersecurity risk. Risk can also be transferred via
mechanisms such as insurance, through contractual relationships, or between agencies or departments
due to division of responsibilities. Within the election space, such risk transference mechanisms may not
be easily utilized nor appropriate, depending on, among other things, the type of EMB institutional
arrangement or national policies and legal frameworks. In cases where risk cannot be mitigated or
transferred, it can be accepted to facilitate operations. If risk is deemed too great, the information system
or technology can be rejected for use. If the decision is made to adopt the system or technology despite
the risks, the system is considered authorized. In this case, it should be managed throughout its lifecycle,
119
NIST SP 800-53 divides controls into 20 “control families.” for security and privacy while ISO27001 utilizes 14
“control sets.” The three categories presented here are a general consolidation for the purpose of the present
discussion. Another set of commonly utilized controls comes from the Center for Internet Security (CIS) and is
divided among 18 categories. See: Center for Internet Security. (n.d.). The 18 CIS Critical Security Controls.
https://www.cisecurity.org/controls/cis-controls-list/
120
Ibid., p. 9.
20
121
Not discussed here are the granular actions that operationalize the high-level process. This includes the use of
specific plans, sometimes referred to as “information system security plans,” that help organize the implementation
of controls on and across discrete information systems and networks.
122
The particulars of which are also not defined nor developed within the present discussion.
123
It should be noted that often applied security controls can only sufficiently mitigate a portion of the risk present
with the operation of any specific information asset or associated process, the “left over risk” that is uncontrolled
is characterized as “residual risk” that must be recognized and deemed acceptable or rejected. This residual risk is
also defined and tracked within the risk register.
124
Erben, Peter. (2017). Raising Trust in Electoral Technology; Innovation Aided by Traditional Approaches. International
Foundation for Electoral Systems.
https://www.ifes.org/sites/default/files/ifes_erben_raising_trust_in_electoral_technology_innovation_aided_by_trad
itional_approaches_d8_sep_2017.pdf
21
125
For a broad overview of the concept of maturity models, along with a U.S.-based example, see the
Cybersecurity Capability Maturity Model (C2M2) available here: Office of Cybersecurity, Energy Security, and
Emergency Response, U.S. Department of Energy. (n.d.). Cybersecurity Capability Maturity Model (C2M2).
https://www.energy.gov/ceser/cybersecurity-capability-maturity-model-c2m2.
22
There are obvious challenges preventing EMBs from embracing and implementing comprehensive risk
management-based cybersecurity programs across the activities that fall under their responsibility. These
include the unique EMB institutional arrangements in various countries across various contexts, limited
resources and competing priorities, immature national and local cybersecurity mechanisms, a lack of
cybersecurity education, and a range of operational and technical impediments. However, introducing the
risk-management approach to defining, understanding, and discussing these challenges can help clarify steps
EMBs can take toward strengthening their cybersecurity postures. There are several countries that already
have policies in place requiring EMBs to implement the risk management approach for cybersecurity via
the frameworks referenced above, however uptake is far from institutionalized and substantial progress
remains to be made. 127
The following sub-section will present a short discussion of cyber adversaries. It is followed by content
on illustrative threats, vulnerabilities, and mitigation across various components of the electoral process.
It is helpful to view the mitigations discussed below through the lens of the three previously introduced,
basic control types: management, operational and technical. These control types can be integrated into
mature risk management mechanisms tailored to the electoral context. Given the dynamic nature of
cybersecurity, and the multiplicity of contexts EMBs around the world face, this discussion is not, and
cannot be, comprehensive. Instead, this discussion will first highlight how the idea of risk management can
be introduced to clarify the challenge of cybersecurity for EMBs and will then identify areas where further
guidance is needed.
D. THREAT ACTORS
A key part of assessing cybersecurity risk means understanding, as fully as possible, the threat actors. This
discussion will define categories of actors and speak briefly about the types of tactics, techniques, and
procedures employed by such adversaries. Tactics, Techniques, and Procedures (TTPs), as a concept, are
broadly used by the security community (both physical and cyber) to define the universe of techniques
and associated actions malicious actors employ to achieve their intentions. TTPs are important to consider
as, often, certain mixes of techniques, tactics, and procedures can distinguish certain threat actors from
others. In addition, risk management frameworks use comprehensive understanding of TTPs to engineer
controls to provide holistic defense mechanisms. The discussion of cybersecurity TTPs can easily extend
into granular technical dimensions; as such, this report will only provide an introduction of how various
threat actors employ and favor specific methods, tools, and actions. 128
Disinformation as a tactic to undermine public confidence has emerged as a key component within the
election space, especially since 2016. Populist politicians in developing countries have long sought to blame
election technology vulnerabilities for their electoral defeats, but this trend has now also taken hold in
major consolidated democracies — both in the pre- and the post-electoral context. The fallout of such
126
Available here: National Initiative for Cybersecurity Careers and Studies. (n.d.). Workforce Framework for
Cybersecurity (NICE Framework). https://niccs.cisa.gov/workforce-development/cyber-security-workforce-framework
127
One such example of the integrating ISO 27001 standards can be found in the Republic of Moldova: Republic of
Moldova (2017). Central Electoral Commission: 20 Years of Permanent Activity.
https://a.cec.md/storage/old_site_files/files/files/20%20ani%20CEC/Cartea_Cec_20_ani_eng_compressed.pdf
128
For a comprehensive discussion of TTPs that maps selected tactics, techniques, and procedures to specific tools
and methods for specific threat actors, see the MITRE ATT&CK framework available here: MITRE. (n.d.). Att&ck.
https://attack.mitre.org
23
129
Dean, G. & Shamsian, J. (2021, August 14). From Mike Lindell to OAN, Here’s Everyone Dominion and Smartmatic are
Suing over Election Conspiracy Theories So Far. Business Insider. https://www.businessinsider.com/everyone-dominion-
smartmatic-suing-defamation-election-conspiracy-theories-2021-2?op=1
130
Laughlin, N., and P. Shelburne. (2021, January 27). How Voters’ Trust in Elections Shifted in Response to Biden’s
Victory. Morning Consult. https://morningconsult.com/form/tracking-voter-trust-in-elections/
131
For the American context see recent U.S. Director of National Intelligence report: National Intelligence
Council. (2021, March 10). Foreign Threats to the 2020 U.S. Federal Elections.
https://www.dni.gov/files/ODNI/documents/assessments/ICA-declass-16MAR21.pdf
132
Hanson, F., S. O'Connor, M. Walker, and L. Courtois. (2019). Hacking Democracies: Cataloguing Cyber-Enabled
Attacks on Elections. International Cyber Policy Centre. https://apo.org.au/node/236546
133
Mitre Att&ck. (n.d.). APT28. https://attack.mitre.org/groups/G0007/; and
Crowdstrike. (2021, April 1). What is an Advanced Persistent Threat (APT)? https://attack.mitre.org/groups/G0007/
and https://www.crowdstrike.com/cybersecurity-101/advanced-persistent-threat-apt/
134
Mitre Att&ck. (n.d.). APT29. https://attack.mitre.org/groups/G0016/
24
2. GOVERNMENT ACTORS
Government actors often work against certain electoral stakeholders within their own state, particularly
in countries that are electoral autocracies or have characteristics of this typology. 138 Their efforts are
often targeted at undermining the credibility of certain political or civil society actors, especially where
there is a possibility of them making inroads through electoral processes. Instances have been noted in
places like the Russian Federation, Belarus, Africa, South-East Asia, and all across Latin America. 139 These
actors can work independently, but also sometimes coordinate with clandestine services, criminal or
independent groups to achieve their aims. Government actors can also make use of their own means of
surveillance to pressure, intimidate, expose damaging private information, or prosecute electoral
stakeholders seen as problematic or contrary to the interests of political actors in control of state
resources. Examples of such tactics include the way Saudi Arabia utilized mobile phone spyware purchased
from an Israeli company to monitor dissidents and political opponents. 140
135
Burgess, M. (2017, November 1). Exposed: How One of Russia’s Most Sophisticated Hacking Groups Operates.
Wired Magazine. https://www.wired.co.uk/article/how-russian-hackers-work
136
Ibid.
137
Mandiant. (n.d.). Advanced Persistent Threat Groups. https://www.mandiant.com/resources/apt-groups
138
See Lindberg, S. (ed.). (2021, March). Autocratization Turns Viral: Democracy Report 2021. https://www.v-
dem.net/files/25/DR%202021.pdf
139
Robertson, J., M. Riley, and A. Willis. (2016, March 31). How to Hack an Election: Andres Sepulveda Rigged Elections
throughout Latin America for Almost a Decade. He Tells His Story for the First Time. Bloomberg.
https://www.bloomberg.com/features/2016-how-to-hack-an-election/
140
Bergman, R. and M. Mazzetti. (2021, November 3). Israeli Companies Aided Saudi Spying Despite Khashoggi Killing.
New York Times. https://www.nytimes.com/2021/07/17/world/middleeast/israel-saudi-khashoggi-hacking-nso.html
25
5. INSIDER THREATS
Individual or collective threat actors might also operate from within EMBs. Understanding the motivations
of insiders that decide to act against the interests of their employer is difficult. However, a key component
of any comprehensive cybersecurity program is to assess the threat of – and put into place controls for –
141
Fung B. (2020, October 29). Ransomware Hits Election Infrastructure in Georgia County. CNN.
https://edition.cnn.com/2020/10/22/tech/ransomware-election-georgia/index.html; and Organization for Security
and Co-operation in Europe. (2019, August 21). Republic of North Macedonia, Presidential Election, 21 April and 5 May
2019, ODIHR Election Observation Mission Final Report. https://www.osce.org/files/f/documents/1/7/428369_1.pdf
142
Vrabie, V. et al. (n.d.). More Evidence of APT Hackers-for-Hire Used for Industrial Espionage. Bitdefender.
https://www.bitdefender.com/files/News/CaseStudies/study/365/Bitdefender-PR-Whitepaper-APTHackers-
creat4740-en-EN-GenericUse.pdf
143
Bergal, Jenni. ‘Hacktivists’ Increasingly Target Local and State Government Computers. PEW.
https://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2017/01/10/hacktivists-increasingly-target-local-
and-state-government-computers
144
George, J. J., & Leidner, D. E. (2019). From clicktivism to hacktivism: Understanding digital activism. Information
and Organization, 29(3), 100249.
145
Department of Justice Office of the United States Attorneys. (2018, May 29). International Hacker-For-Hire Who
Conspired With And Aided Russian FSB Officers Sentenced To Five Years In Prison. https://www.justice.gov/usao-
ndca/pr/international-hacker-hire-who-conspired-and-aided-russian-fsb-officers-sentenced-five
26
27
146
Yard, M. (ed.). (2011). Civil and Voter Registries: Lessons Learned from Global Experience. International Foundation
for Electoral Systems. p. 8; and; European Commission. (2006). EC Methodological Guide on Electoral Assistance.
https://www.eods.eu/library/EC%20Methodogical%20Guide%20on%20Electoral%20Assistance%202006.pdf. pp. 59-
60.
147
Yard (ed.), Civil and Voter Registries, p. 157.
148
Ibid., 42.
149
Goldsmith, B. and H. Ruthrauff. (2013). Implementing and Overseeing Electronic Voting and Counting Technologies.
National Democratic Institute and International Foundation for Electoral Systems.
https://www.ndi.org/implementing-and-overseeing-e-voting-counting-technologies. p. 106.
150
Organization for Security and Co-operation in Europe. (2013, October 1). Guidelines for Reviewing a Legal
Framework for Elections, Second Edition. https://www.osce.org/odihr/elections/104573, pp. 65-69.
151
Yard, M. (ed.). (2010, September). Direct Democracy: Progress and Pitfalls of Election Technology. International
Foundation for Electoral Systems. p. 21.
152
Council of Europe. (2011, February 16). Guidelines on Transparency of E-Enabled Elections.
https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=090000168059bdf6
28
153
European Commission and United Nations Development Programme. (2010). Procurement Aspects of Introducing
ICT Solution in Electoral Processes. https://www.undp.org/publications/procurement-aspects-introducing-ict-solutions-
electoral-processes. p. 55.
154
European Commission. (2006). EC Methodological Guide on Electoral Assistance.
https://www.eods.eu/library/EC%20Methodogical%20Guide%20on%20Electoral%20Assistance%202006.pdf. p. 57.
155
Council of Europe. (2017, June 14). Guidelines on the Implementation of the Provisions of Recommendation CM/Rec
(2017) 5 on Standards for E-Voting. CM-Rec(2017)50.
156
Catt, H., et al. Electoral Management Design, revised ed. International IDEA. pp. 266-267.
157
European Commission, EC Methodological Guide on Electoral Assistance, p. 63.
29
158
Kasongo, E., Bernhard, M., & Bronk, C. (2021). Tales from the Trenches: Case Studies in Election Cybersecurity
Preparedness in Texas. E-Vote-ID 2021, 113.
159
Shein, E. and A. Brown. (2021). Risk-Limiting Audits: A Guide for Global Use. The International Foundation for
Electoral Systems. https://www.ifes.org/sites/default/files/ifes_risk-
limiting_audits_a_guide_for_global_use_march_2021.pdf
160
Ibid.
161
Ibid.
30
162
See for example: de Freytas-Tamura, K. (2017, September 1). Kenya Supreme Court Nullifies Presidential Election.
New York Times. https://www.nytimes.com/2017/09/01/world/africa/kenya-election-kenyatta-odinga.html
163
UN Assistance Mission for Iraq. (2021, September 9). Iraq’s Electoral Preparations and Processes Report No. 11.
https://reliefweb.int/report/iraq/iraq-s-electoral-preparations-and-processes-report-no-11-9-september-2021. Also
see the following source for an example from a different country context: teleSUR. (2021, February 21). Ecuador's
Comptroller to Audit Electoral Computer System. https://www.telesurenglish.net/news/Ecuadors-Comptroller-to-Audit-
Electoral-Computer-System-20210221-0003.html
164
Timm, J. (2021, May 20). Maricopa County will Need New Voting Machines after GOP’s Audit, Arizona Secretary of
State Says. NBC News. https://www.nbcnews.com/politics/elections/maricopa-county-will-need-new-voting-
machines-after-gop-s-n1268090
31
In March 2016, the website of the Philippines Commission on Elections (COMELEC) was hacked by a group
called Anonymous Philippines. The hacker group LulzSec Pilipinas also released extensive voter information,
including fingerprints. Following the attack, the National Privacy Commission recommended criminal charges
against COMELEC Chairperson Andres Bautista for negligence, stating that “The lack of a clear data governance
policy, particularly in collecting and further processing of personal data, unnecessarily exposed personal and
sensitive information of millions of Filipinos to unlawful access.” 166
While the Commission did not find Bautista guilty of helping with the attack, it ordered COMELEC to
implement new security measures, conduct a privacy assessment, appoint a Data Protection Officer, and
establish a Privacy Management Program and a Breach Management Program. Less than a month later, after a
computer containing biometric records of registered voters was stolen from a regional election office, 167
Chairperson Bautista was impeached and resigned. The Philippines case is a compelling example of potential
institutional and personal liability for EMBs and election officials with respect to cybersecurity in elections, and
the role that privacy commissions may play in oversight of personal data in elections.
165
See Standard 29 in: Ad Hoc Committee of Experts on Legal, Operational and Technical Standards for E-Voting,
Council of Europe. (2017, June 14). Explanatory Memorandum to Recommendation CM/Rec(2017)5 of the Committee of
Ministers to Member States on Standards for E-Voting. https://rm.coe.int/168071bc84
166
National Privacy Commission. (2017, January 5). Privacy Commission Recommends Criminal Prosecution of Bautista
over Comeleak. https://www.privacy.gov.ph/2017/01/privacy-commission-finds-bautista-criminally-liable-for-
comeleak-data-breach/
167
National Privacy Commission. (2017, February 20). NPC Starts Probe into COMELEC’s 2nd Large Scale Data Breach;
Issues Compliance Order. https://www.privacy.gov.ph/2017/02/npc-starts-probe-comelecs-2nd-large-scale-data-
breach-issues-compliance-order/
168
National Conference on State Legislatures. (2021, November 5). Voting Systems Standards, Testing and
Certification. https://www.ncsl.org/research/elections-and-campaigns/voting-system-standards-testing-and-
certification.aspx
32
169
The Express Tribune. (2021, September 10). Key Clauses of Electoral Reforms Bill Rejected.
https://tribune.com.pk/story/2319515/senate-body-rejects-use-of-evms-in-next-elections; and The News. (2021,
September 8). Election Commission Rejects EVM.
170
Golos Info. (2020, July 29). Statement on the New Remote Electronic Voting System of the CEC of Russia.
https://www.golosinfo.org/articles/144545
171
Abawajy, J. (2014). User Preference of Cybersecurity Awareness Delivery Methods. Behavior & Information
Technology, 33(3), 237-248.
172
Shinde, N., & Kulkarni, P. (2021). Cyber Incident Response and Planning: a Flexible Approach. Computer Fraud &
Security, 2021(1), 14-19.
33
EMBs should not introduce new technology without an extensive communication and awareness campaign to
inform stakeholders. Procurement and operationalization of new technology should automatically
trigger consideration of residual cyber risk, and the roll-out should be accompanied by a well-
conceived communication plan. EMB communication should avoid overselling the cyber-resilience of new
technology, and instead emphasize the full array of mitigating measures and contingencies the EMB will
undertake to assure the electorate and political stakeholders that the integrity of an election can be verified and
upheld, even if a successful cyber attack occurs. EMBs might consider publicly communicating any cybersecurity
testing it conducts on new technology.
C. BOUNDARY DELIMITATION
Overview and main uses of technology: The boundary delimitation process refers to drawing
electoral district boundaries (or constituencies). It also involves determining electoral precincts and polling
locations and assigning voters accordingly. Boundary delimitation typically takes place in the pre-electoral
and post-electoral phases. 174 Technology has been increasingly integrated into these processes, replacing
mostly cumbersome manual systems that precisely map locations and distribute voters. Technology, when
part of a transparent and impartial process, can contribute to processes that distribute voters equitably,
that maintain standards of vote weight and ensures the representativeness and non-discrimination nature
of electoral districts. 175 This same technology, when used to manipulate electoral districts and boundaries,
can be a very effective tool in efforts to gerrymander election districts and manipulate electoral outcomes.
Risk discussion: There have not been any reported attacks against the electoral process using boundary
delimitation tools or access. EMBs should consider, however, that the integrity of boundaries and voter
distribution may be vulnerable if data (for instance, geographical information systems databases) are
externally facing (connected to the internet). Interconnectivity with other state institutions, such as census
institutions or ministries responsible for population, also represent vectors of possible compromise.
Additionally, the technologies and components used for activities such as drawing boundaries or for
assigning voters to specific polling locations may not incorporate the ability to log and audit the actions
taken by various users. Without such features, EMBs or the responsible boundary delimitation authority
may not be able to locate the source of mistakes or problems as they arise.
173
Liu, S., & Kuhn, R. (2010). Data loss prevention. IT professional, 12(2), 10-13.
174
Handley, L. (2007). “Boundary Delimitation.” In Challenging the Norms and Standards of Election Administration,
International Foundation for Electoral Systems. 59-74.
175
Ibid.
34
D. VOTER REGISTRATION
Overview and main uses of technology: Voter registration (VR) processes are comprised of
databases related to storing and managing voter registry data, as well as digital components and processes
related to registering voters. At their core, all voter registration systems are structured on databases that
contain voters’ personally identifiable information (PII). The degree of automation, the type of data, and
the range of services varies depending on a country’s legal framework and the election administration’s
eagerness to deploy new technologies.
Over the past decade, the use of biometric voter registration (BVR) has risen steadily. In Africa in
particular, more than 25% of countries now use biometric data during the electoral process. BVR is a
mature technology, most often based on facial features and fingerprints, that collects and analyzes voters’
unique characteristics. It is considered to be an effective mechanism to prevent multiple registration, and
to verify identity and eligibility to vote. BVR has significant limitations, however; it is not universally
accepted in all cultures and political contexts, it requires external vendor expertise, and it can increase
risk exposure from the perspective of personal data privacy, among other potential challenges.
The need to eliminate duplicate voter registrations has made it essential for EMBs to digitize the voter
registration process, and today nearly all voter registries in the world are hosted within electronic
databases. Most countries operate nationwide voter databases, making them critical infrastructure that
could be targeted by cyber attacks. 177
Several attacks against the confidentiality, integrity, inclusivity and availability of voter lists before and
during elections have demonstrated the potential for disruption and damage. Some of the largest data
breaches recorded worldwide have been voter list databases, severely impacting the credibility of EMBs. 178
176
Air-gapped networks have no connections to outside networks (such as the internet) and are hence physically
isolated.
177
The U.S. lacks a nationwide database. While some states have state-wide databases, others rely on each county
to maintain their own database. This makes VR a less attractive target in the U.S., but also multiplies the
cybersecurity effort required to safeguard the myriad U.S. voter databases from attack.
178
Gotinga, J. (2016, April 12). Comelec: No Biometrics in Leaked Data. CNN Philippines.
https://cnnphilippines.com/news/2016/04/12/Comelec-No-biometrics-in-leaked-data-hack.html; and Tanner, A.
35
(2016, April 22). Mexico’s Entire Voter Database Made Accessible on the Internet. Scientific American.
https://www.scientificamerican.com/article/mexico-s-entire-voter-database-made-accessible-on-the-internet/
179
Dawood (2021) and Shackelford et al. (2017).
180
Government Technology. (n.d.). Digital Poll Book Failures Slowed Voting in Several States.
https://www.govtech.com/security/digital-poll-book-failures-slowed-voting-in-several-states.html
181
Case, D. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid. Electricity Information Sharing and
Analysis Center (E-ISAC), 388.
36
182
Patch management is the process of distributing and applying updates to software. In this context, we are mostly
concerned about security patches that aims to correct errors and fix vulnerabilities in the software. Security
vulnerabilities are identified all the time, hence patch management should be a continuous process.
37
38
H. VOTING PROCESS
Overview and main uses of technology: On Election Day, a variety of technologies may be used in
polling stations for the process of voting, including electronic or biometric voter authentication to confirm
registration and/or identify voters, direct recording electronic (DRE) voting machines, optical scanners,
or ballot marking devices (BMD). 185 Internet and absentee voting options are also part of this category
183
In Cambodia in 2017 for example, the Facebook account for the Spokesman of the National Election
Commission (NEC) was hacked and controlled by outside actors “for weeks,” preventing accurate flow of
information between the NEC, media and public. See Phnom Penh Post. (2017, October 9). NEC Facebook Hack
Investigated. https://www.phnompenhpost.com/national/nec-facebook-hack-investigated
184
In Georgia, for instance, a malicious actor set up a mock Facebook account named ‘We are the Real CEC,’
which mimicked the EMB’s own Facebook page. This mock account was used to release false information
(including a decree purportedly issued by the commissioner regarding election observers) and the content was
reposted several times by other political actors. See International Society for Fair Elections and Democracy. (2021,
September 28). Manipulative Campaign on Facebook Regarding Election Processes. https://isfed.ge/eng/sotsialuri-mediis-
monitoringi/manipulatsiuri-kampania-Facebook-ze-saarchevno-protsesebtan-dakavshirebit; and FactCheck. (2021,
September 28). Fabricated Image of the CEC Chairperson’s Decree Is Disseminated Through Social Networks.
https://factcheck.ge/en/story/39991-fabricated-image-of-the-cec-chairperson-s-decree-is-disseminated-through-
social-networks
185
As described by the Brennan Center, ballot marking devices (BMD) are tools that mark a ballot (generally a
paper ballot) on behalf of a voter interacting with “visual or audio prompts provided by a computerized interface.”
In the United States, BMDs are often used to satisfy federal requirements for voters with disabilities to vote
privately and independently; “BMDs are also able to efficiently provide ballots in alternative languages…[and] can
improve the accuracy of voters’ intentional markings on paper ballots, including elderly voters and those with hand
tremors.” See Brennan Center for Justice at New York University School of Law. (2018, May 31). Brennan Center
Overview of Voting Equipment. https://www.brennancenter.org/our-work/research-reports/brennan-center-overview-
voting-equipment. According to Verified Voting, “Most ballot marking devices provide a touchscreen interface
together with audio and other accessibility features similar to those provided with DREs, but rather than recording
the vote directly into computer memory, the voter’s selections are indicated through a marking a paper ballot,
which is then scanned or counted manually.” See Verified Voting. (n.d.). Voting Equipment: Ballot Marking Devices &
Systems. https://verifiedvoting.org/votingequipment/#row1
39
186
Applegate, M., T. Chanussot and V. Basysty. (2020). Considerations on Internet Voting: An Overview for Electoral
Decision-Makers. International Foundation for Electoral Systems. https://www.ifes.org/publications/considerations-
internet-voting-overview-electoral-decision-makers
187
In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle,
monkey-in-the-middle (MITM) or person-in-the-middle (PITM) attack is a cyber attack where the attacker secretly
relays and possibly alters the communications between two parties who believe that they are directly
communicating with each other. See: National Institute of Standards and Technology, Glossary.
188
Gallagher, S. (2011, September 28). Diebold voting machines vulnerable to remote tampering via man-in-the-middle
attack. Ars Technica. https://arstechnica.com/information-technology/2011/09/diebold-voting-machines-vulnerable-
to-remote-tampering-via-man-in-the-middle-attack/; and Information Security Newspaper. (2017). Def Con Voting
Village – Hackers Easily Pwned US Voting Machines. https://www.securitynewspaper.com/2017/07/31/def-con-voting-
village-hackers-easily-pwned-us-voting-machines/
189
In 2020, multiple government agencies and private companies (up to 18,000 clients in total) were compromised
by an attack on the SolarWinds IT infrastructure company. In 2021, several companies were compromised by an
attack on Microsoft Exchange Server.
190
Hodgson et al. (2020).
191
Although not a cyber-attack, a DOS impacted the Florida voter registration system. See Caina Calvan, B. and T.
Spencer. (2020, October 7). Server Configuration Caused Florida Voter Registration Crash.
https://apnews.com/article/election-2020-tallahassee-florida-elections-ron-desantis-
8c986dbc04f5e5205fdcacfaa637b2af
192
Hains et al. (2020); Springall et al. (2014); Wolchock and Halderman (2012).
40
193
Applegate et al, Considerations on Internet Voting.
194
A hash is a function that can be used to calculate a unique digital fingerprint for the data. In this context, a hash
value would be provided by the vendor when delivering the software or hardware, the EMB would calculate a new
hash value for the software and hardware after it is received. If the hash values are different, it can indicate the
device has been tampered with during transmission or transport.
195
According to the Encyclopedia Britannica, a Quick Response (QR) Code is “a type of bar code that consists of a
printed square pattern of small black and white squares that encode data which can be scanned into a computer
system. The black and white squares can represent numbers from 0 to 9, letters from A to Z, or characters in
non-Latin scripts..." See Encyclopedia Britannica. (n.d.). QR Code. https://www.britannica.com/technology/QR-Code
41
196
In Estonia, the cryptographic key that decrypts the votes is split among several parties that have to physically
meet to virtually “open the ballot box”. Without the complete key, the votes cannot be counted.
197
David Jefferson (2018), The Myth of “Secure” Blockchain Voting. Verified Voting. https://verifiedvoting.org/the-
myth-of-secure-blockchain-voting/
198
Bernhard, M. et al. (2019). UnclearBallot: Automated Ballot Image Manipulation. Springer International Publishing.
https://www.springerprofessional.de/en/unclearballot-automated-ballot-image-manipulation/17199860
199
Temple-Raston, D. (2021, April 16). A 'Worst Nightmare’ Cyberattack: The Untold Story of the SolarWinds Hack.
NPR. https://www.npr.org/2021/04/16/985439655/a-worst-nightmare-cyberattack-the-untold-story-of-the-
solarwinds-hack
200
Daniel, B. (2021, April 14). System Hardening: An Easy-to-Understand Overview. Trenton Systems.
https://www.trentonsystems.com/blog/system-hardening-overview
42
201
Wilkins, R., and B. Richardson. (2013, September). UEFI Secure Boot in Modern Computer Security Solutions. Unified
Extensible Firmware Interface Forum.
https://uefi.org/sites/default/files/resources/UEFI_Secure_Boot_in_Modern_Computer_Security_Solutions_2013.p
df
202
“Full disk encryption is a cryptographic method that applies encryption to the entire hard drive including data,
files, the operating system and software programs.” See Ford, A. And L. Huthinson. (2016, January 16). Full Disk
Encryption: Do We Need It? CSO. https://www.csoonline.com/article/3247707/full-disk-encryption-do-we-need-
it.html
203
A botnet is a network or collection of compromised computers or hosts that are connected to the Internet. A
compromised computer is controlled by an adversary to launch large scale attacks against target websites or
infrastructure. See Techopedia. (n.d.). Zombie Network. https://www.techopedia.com/definition/27201/zombie-
network#:~:text=A%20zombie%20network%20is%20a,also%20known%20as%20a%20botnet
43
As IFES has noted previously, tabulation audits fundamentally require verifiable paper records of the intent of
voters – to ensure an independent record of the votes cast to assess the accuracy of a tabulation system’s
results. Some DREs produce a paper receipt that can be used as part of the audit trail. In India, for example, the
Supreme Court ruled that all voting machines must be equipped with printers to provide voter- verifiable
paper audit trails (VVPAT) to allow each voter to verify that his or her intended selections are correctly printed
on a paper record, which is collected in a separate container called the VVPAT box.” 206
Such audits are also inherently limited in their ability to detect errors or incursions occurring in the voting
system prior to the initial count. As Verified Voting has noted about risk-limiting audits in particular, “[they] are
one piece of the larger ecosystem of evidence-based elections that depend upon a trustworthy record to give
confidence to election outcomes. ... They do not tell us whether the voting system has been hacked. They do
not and cannot determine whether voters actually verified their ballots. But they can detect and correct
tabulation errors that could alter election outcomes...” 207
• Complementary procedures and compliance checks are needed that ensure that the
paper and electronic records used in a tabulation audit are fully secured, including poll
204
European Union Election Expert Mission to Iraq. (2018). Final Report (5 April-31 May, 24-31 July 2018). European
Union; and Wahab, B. (2018, June 11). Recount will Test the Integrity of Iraq's Elections. Washington Institute for Near
East Policy. https://www.washingtoninstitute.org/policy-analysis/recount-will-test-integrity-iraqs-elections
205
Shein and Brown, Risk-Limiting Audits.
206
Mohanty, V., et al. (2019). Auditing Indian Elections. Department of Computer Science and Engineering, Indian
Institute of Technology, Madras, page 2. https://arxiv.org/pdf/1901.03108.pdf
207
Verified Voting. (2019). The Role Of Risk-Limiting Audits In Evidence-Based Elections. https://verifiedvoting.org/the-
role-of-risk-limiting-audits-in-evidence-based-elections/
44
208
Shein and Brown, Risk-Limiting Audits.
209
Vickery, C. & K. Ellena. (2020). Election Investigations Guidebook: Standards, Techniques and Resources for
Investigating Disputes in Elections (STRIDE). The International Foundation for Electoral Systems.
210
Xie, T., et al. (2020). The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures. IEEE
Transactions on Mobile Computing.
211
End-to-end encryption is a term that describes the use of cryptographic encoding of data between two or more
end points. Virtual private networks, for example, use end-to-end encryption to securely connect computers over
the Internet.
212
Davis-Roberts, A. (2009, January). International Obligations for Electoral Dispute Resolution: Discussion Paper. The
Carter Center. https://www.cartercenter.org/resources/pdfs/peace/democracy/des/edr-approach-paper.pdf
45
213
Cybercrime Convention Committee (T-CY). (2019, July 8). T-CY Guidance Note #9 Aspects of Election Interference
by Means of Computer Systems Covered by the Budapest Convention. Council of Europe. https://rm.coe.int/t-cy-2019-4-
guidance-note-election-interference/1680965e23
214
Council of Europe. (2020). Electoral Dispute Resolution: Toolkit for Strengthening Electoral Jurisprudence.
https://rm.coe.int/electoral-dispute-resolution/16809f0007
46
215
United States Department of Justice. (2020, February 21). Santa Monica Man Arrested on Federal Charges of
Staging Cyberattacks on the Computer System of Congressional Candidate. https://www.justice.gov/usao-cdca/pr/santa-
monica-man-arrested-federal-charges-staging-cyberattacks-computer-system
216
Associated Press. (2020, October 23). EU Slaps Sanctions on 2 Russians Over Germany Cyber Attack.
https://www.securityweek.com/eu-slaps-sanctions-2-russians-over-germany-cyberattack
217
BBC News. (2018, July 13). Twelve Russians Charged with US 2016 Election Hack.
https://www.bbc.com/news/world-us-canada-44825345
218
Vickery and Ellena, Election Investigations Guidebook.
219
Kiener-Manu, K. (n.d.). Cybercrime module 14 key issues: Information warfare, disinformation and electoral
fraud. UNDOC. https://www.unodc.org/e4j/en/cybercrime/module-14/key-issues/information-warfare--
disinformation-and-electoral-fraud.html.
220
Organized Crime and Corruption Reporting Project. (n.d.) Politicians or Government Officials Selected for Targeting.
https://cdn.occrp.org/projects/project-p/#/professions/politician
47
A. MULTI-STAKEHOLDER COORDINATION
There are various models of interagency collaboration during elections, including on transportation,
security and public health, that are essential to the credible election administration. Although there are
some good examples of multi-stakeholder coordination in the realm of election security – for example,
the 2020 U.S. elections in which the Cybersecurity and Infrastructure Security Agency (CISA) played a
critical supporting role to local and state-level election administrators and the coordination in the 2019
Ukrainian elections between the Ukrainian security services and the Central Election Commission (CEC)
– the field is under-studied and would benefit from more research. Ensuring effective cybersecurity in
elections in particular may necessarily transcend the traditional mandates and capacities of institutions –
particularly EMBs. Effective cybersecurity may require resources that an EMB is unlikely to be able to
gather on its own, as well as a comprehensive threat awareness and detection/deterrence capability that
requires information and data exchange and response from multiple agencies.
There are multiple models of multi-stakeholder collaboration (formal or informal). Some are purely inter-
agency, involving different government departments and independent institutions such as the EMB. Others
include state and non-state agencies (including private sector vendors, social media providers, media and
academia). Some coordination efforts are organized into thematic task forces (for example, a
disinformation task force, or an online voting task force, while others focus on specific parts of the
221
The concept of seams is discussed in detail within and adapted from Chaudhary, T., Jordan, J., Salomone, M., &
Baxter, P. (2018). Patchwork of Confusion: The Cybersecurity Coordination Problem. Journal of Cybersecurity, 4(1).
48
222
See, for example International IDEA’s Models of Interagency Collaboration: van der Staak, S. and P. Wolf.
(2019). Cybersecurity in Elections: Models of Interagency Collaboration. International IDEA.
https://www.idea.int/sites/default/files/publications/cybersecurity-in-elections-models-of-interagency-
collaboration.pdf
49
C. POLITICAL PARTIES
Regular internal communication and electronic information exchange are integral parts of the day-to-day
operations of a political party. These communications can span a wide range of topics, some politically
sensitive – such as draft policy positions, opposition research and campaign strategies – and some involving
personal information – such as personal vetting documents and correspondence with donors. The systems
used for these communications can vary widely and include email accounts, cell phones, landlines, SMS
text messages, third-party messaging applications, web-based platforms, computers, databases,
smartphones and mass messaging applications.
Additionally, in many countries political parties have tens of thousands of members, and sometimes affiliate
groups associated with the party. Political parties need to store information for all the members associated
223
McCallister, E., T. Grance and K Scarfone. (2010). Guide to Protecting the Confidentiality of Personally Identifiable
Information. National Institute of Standards and Technology. Vol. 800, No. 122.
https://csrc.nist.gov/publications/detail/sp/800-122/final
224
Cybersecurity & Infrastructure Security Agency. (2013, June 24). Alert (TA13-175A) Risk of Default Passwords on
the Internet. https://us-cert.cisa.gov/ncas/alerts/TA13-175A
225
Cybersecurity and Infrastructure Security Agency. (2019). Phishing.
https://www.cisa.gov/sites/default/files/publications/NCSAM_Phishing_2020.pdf
226
Esheridan. (n.d.). Blocking Brute Force Attacks. OWASP. https://owasp.org/www-
community/controls/Blocking_Brute_Force_Attacks
227
Ermoshina, K., F. Musiani, and H. Halpin. (2016, September). "End-to-End Encrypted Messaging Protocols: An
Overview." In International Conference on Internet Science. Springer, Cham. pp. 244-254.
50
228
Tenove et al. (2018)
229
Whitaker, B. (2020, August 23). How Russian intelligence officers interfered in the 2016 election. CBS News.
https://www.cbsnews.com/news/russian-hackers-2016-election-democratic-congressional-campaign-committee-60-
minutes-2020-08-23/
230
Zeit Online. (2021, March 26). Russische Hacker Attackieren Offenbar Bundestag.
https://www.zeit.de/politik/deutschland/2021-03/cyberangriff-russland-hacker-bundestag-ghostwriter-geheimdienst-
gru-cyberwar
231
Hunker, J., & Probst, C. W. (2011). Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques.
J. Wirel. Mob. Networks Ubiquitous Computer. Dependable Appl., 2(1), 4-27.
51
VI. CONCLUSIONS
The analysis in this report illustrates the way electronic information systems are heavily utilized across
the electoral process. In cybersecurity terms, that infrastructure represents an expansive “attack surface”
that can be threatened and exploited by foreign or domestic adversaries who intend to disrupt the
electoral process.
While some established democracies have rolled back their use of technology for specific aspects of
election administration, overall, the further digitization of the electoral process will likely only increase. In
fact, the COVID-19 pandemic further accelerated the pace of digitization. In this context of tension
between offering more services online to stakeholders and securing an increasingly adversarial
environment, electoral stakeholders and democracy donors need to consider the cybersecurity risks
associated with technological components, whether it is directly or indirectly related to the electoral
process. Doing so in a piecemeal or ad hoc manner may not be sustainable, or sufficiently effective to
counter current and future integrity threats. In this regard, lessons drawn from the larger cybersecurity
industry – which emphasizes holistic management of cybersecurity – are applicable to the electoral space
and should be embraced by the election community. Cybersecurity must be an ongoing process of risk
management rather than a static requirement; mature cybersecurity programs are adaptable and
continuously recognize threats and curate security mechanisms to address those threats through controls,
vulnerability management, and continuous evaluation.
We recognize, however, that many EMBs may not currently be sufficiently resourced or positioned to
enact such mature cybersecurity programs. The risk management frameworks used by governments and
industry need to be adapted for the electoral space and further work must be done to tailor them to local
contexts. While there has been a great deal published recently to advance thinking about the intersection
of cybersecurity and electoral operations globally, there is still much more that needs to be done. At the
national level, some countries are saddled with laws and regulations that effectively prevent electoral
stakeholders from addressing emerging issues of the digital age. These issues are myriad and include
assigning responsibility for protection of electoral infrastructure, standardizing security requirements,
coordinating the flow of information across various stakeholders, and securing information against misuse
while also anticipating and planning for response and resiliency. Cybersecurity must be considered at every
stage of the electoral process, which is currently not the case in many countries. These considerations
include implementing fundamental managerial controls such as policies that ensure procurement of secure
232
Pegasus is spyware sold by the Israeli company NSO Group which allows surveillance of mobile
communications. It is marketed as a tool for monitoring criminal activity, but has been used by governments to
monitor and target CSOs, journalists, activists and members of political opposition parties deemed controversial
or threatening to ruling governments. The Pegasus Project (led by Amnesty International, Forbidden Stories and
the Organized Crime and Corruption Reporting Project) aims to expose how Pegasus is being exploited. See
Organized Crime and Corruption Reporting Project (n.d.). The Pegasus Project. https://www.occrp.org/en/the-
pegasus-project/
52
53
Catt, H., et al. 2014. International IDEA. Electoral Management Design, revised ed.
Council of Europe. 2011. Certification of e-voting systems: Guidelines for developing processes that
confirm compliance with prescribed requirements and standards.
Council of Europe, Venice Commission. 2018. Draft Compilation of Venice Commission Opinions and
Reports Concerning New Technologies in the Electoral Process.
European Commission and United Nations Development Programme. 2010. Procurement Aspects of
Introducing ICTs solutions in Electoral Processes.
European Union. 2016. REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF
THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of
personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data
Protection Regulation).
OSCE/ODIHR. 2013. Guidelines for Reviewing the Legal Framework for Elections, 2nd ed.
United Nations General Assembly. 1990. Guidelines for the Regulation of Computerized Data Files.
U.S. Election Assistance Commission. 2021. Voluntary Voting System Guidelines: Major Updates of the
Voluntary Voting System Guidelines 2.0.
B. PRACTITIONER PUBLICATIONS
Calkin, B. et al. 2018. Center for Internet Security. A Handbook for Elections Infrastructure Security.
Caufield, M. 2021. Verified Voting. The Price of Voting: Today’s Voting Machine Marketplace.
Cortés, Edgardo et al. 2019. Brennan Center for Justice at New York University School of Law.
Preparing for Cyberattacks and Technical Failures: A Guide for Election Officials.
54
Goldsmith, B. 2011. IFES. Electronic Voting & Counting Technologies: A Guide to Conducting Feasibility
Studies.
Goldsmith, B. and Ruthrauff H. 2013. IFES, NDI. Implementing and Overseeing Electronic Voting and
Counting Technologies.
Miller, G., Perez, E., Sebes, J. E., Valente, S. 2020 (2nd ed.). OSET Institute. Critical Democracy
Infrastructure Protecting American Elections in the Digital Age Threats, Vulnerabilities, and
Countermeasures as a National Security Agenda.
McCormack, C. 2016. Atlantic Council. Democracy Rebooted: The Future of Technology in Elections.
Norden, L., Cordova McCadney, L. 2019. Brennan Center for Justice at New York University School of
Law. Voting Machines at Risk: Where We Stand Today.
Plunkett, D., Monsky, H., et al. 2017. Harvard Kennedy School, Belfer Center. Cybersecurity Campaign
Playbook.
Rhodes, Jill and Robert S. Litt, Eds. 2017. ABA Book Publishing. The ABA Cybersecurity Handbook: A
Resource for Attorneys, Law Firms, and Business Professionals, Second Edition.
Van Der Staark, S., and Wolf, P. 2019. International IDEA. Cybersecurity in Elections – Models of
Interagency Collaboration.
Wolf, P., Alim, A., et al. 2017. International IDEA. Introducing Biometric Technology in Elections.
World Wide Web Foundation. 2017. Open Data Barometer Global Report – Fourth Edition.
Yard, M. (Ed.) 2010. IFES. Direct Democracy: Progress and Pitfalls of Election Technology.
Yard, M. (Ed.) 2011. IFES. Civil and Voter Registries: Lessons Learned from Global Experiences. Civil and
Voter Registries: Lessons Learned from Global Experiences.
55
Gebremedhin Kassa. 2016. S. ISACA Journal (Vol. 5). Information Systems Security Audit: An
Ontological Framework.
Information Systems Audit and Control Association (ISACA). 2019. Control Objectives for Information
Technology (COBIT).
International Organization for Standardization (ISO). ISO 27001 Information Security Management.
National Institute of Standards and Technology. 2018 (ver. 1.1, 3). Framework for Improving Critical
Infrastructure Cybersecurity.
National Institute of Standards and Technology. 2018 (ver. 1.1). Cybersecurity Framework.
National Institute of Standards and Technology. 2018 (rev. 2). Special Publication 800-37 Risk
Management Framework for Information Systems and Organizations: A System Life Cycle Approach for
Security and Privacy.
National Institute of Standards and Technology. 2020 (rev. 5). Special Publication 800-53 Security and
Privacy Controls for Information Systems and Organizations.
National Institute of Standards and Technology. 2021. NIST Interagency or Internal Report 8310 (Draft)
Cybersecurity Framework Election Infrastructure Profile.
D. ACADEMIC LITERATURE
Shackelford, S., Schneier B., Sulmeyer, M., Boustead, A., Buchanan, B., Deckard, A. N. C., Herr, T.,
Smith, J. M. (2017). Making Democracy Harder to Hack. 50 U. Mich. J. L. Reform 629.
Dawood, Y. (2021). Combatting Foreign Election Interference: Canada's Electoral Ecosystem Approach
to Disinformation and Cyber Threats. Election Law Journal: Rules, Politics, and Policy, 20(1), 10-31.
Garnett, H. A., & James, T. S. (2020). Cyber Elections in the Digital Age: Threats and Opportunities of
Technology for Electoral Integrity. Election Law Journal: Rules, Politics, and Policy, 19(2), 111-126.
Tenove, C., Buffie, J., McKay, S., & Moscrop, D. (2018). Digital Threats to Democratic Elections: How
Foreign Actors Use Digital Techniques to Undermine Democracy. Research Report, Centre for the
Study of Democratic Institutions, University of British Columbia.
Hodgson, Q. E., Brauner, M. K., Chan, E. W. (2020). Securing U.S. Elections Against Cyber Threats:
Considerations for Supply Chain Risk Management. Santa Monica, CA: RAND Corporation.
56
Kasongo, E., Bernhard, M., & Bronk, C. (2021). Tales from the Trenches: Case Studies in Election
Cybersecurity Preparedness in Texas. E-Vote-ID 2021, 113.
Gambhir, R. K., & Karsten, J. 2019. Brookings Institution. Why Paper Is Considered State-of-the-Art
Voting Technology.
Norden, L., Cordova McCadney, A. 2019. Brennan Center for Justice at New York University School of
Law. Voting Machines at Risk: Where We Stand Today.
Feldman, A., Halderman, J., Felten, E. 2007. Conference Paper: USENIX/ACCURATE Electronic Voting
Technology Workshop (EVT’07). Security Analysis of the Diebold AccuVote-TS Voting Machine.
Balzarotti, D. et al. 2010. IEEE Transactions on Software Engineering (Vol. 36, No. 4). An Experience in
Testing the Security of Real-World Electronic Voting Systems.
Wolchok, S., et al. 2010. Conference Paper: 17th ACM Conference on Computer and Communications
Security. Security Analysis of India’s Electronic Voting Machines.
Gonggrijp, R., & Hengeveld, W. J. 2007. Conference Paper: USENIX/ACCURATE Electronic Voting
Technology Workshop (EVT’07). Studying the Nedap/Groenendaal ES3B Voting Computer: A
Computer Security Perspective.
National Democratic Institute. Accessed 2021. Re-evaluation of the Use of Electronic Voting in the
Netherlands.
Berger, M., et al. 2018. Harvard Kennedy School, Belfer Center. The State and Local Election Cyber-
Security Playbook.
Park, S., Specter, M., Narula, N., Rivest, L R. 2020. Journal of Cybersecurity (Vol. 7, Iss. 1). Going from
Bad to Worse: From Internet Voting to Blockchain Voting.
Haines, T., Lewis, S. J., Pereira, O., Teague, V. 2020. Conference Paper: IEEE Symposium on Security and
Privacy. How Not to Prove Your Election Outcome.
Springall, D., et al. 2014. Conference Paper: ACM SIGSAC Conference on Computer and
Communications Security. Security Analysis of the Estonian Internet Voting System.
Wolchok S., Wustrow E., Isabel D., Halderman J.A. 2012. Attacking the Washington, D.C. Internet
Voting System. In Keromytis, A.D. (ed). 2012. Lecture Notes in Computer Sinance (Vol. 7397) Financial
Cryptography and Data Security. 2012. Lecture Notes in Computer Science (Vol. 7397). (Springer:
Berlin, Heidelberg).
Kshetri, N., & Voas, J. 2018. IEEE Software (Vol. 35, Iss. 4). Blockchain-Enabled E-Voting.
57
Gaudry, P., & Golovnev, A. 2020. Conference Paper: International Conference on Financial
Cryptography and Data Security. Breaking the Encryption Scheme of the Moscow Internet Voting
System.
E. JURISPRUDENCE
Odinga v. IEBC et al., (2017) (S.C.K) (Kenya).
Curling, et al. v. Raffensperger, et al., 403 F. Supp. 3d 1311 (N.D. Ga. 2019).
Tuggle, et al. v. Ala. Sec’y of State John Merrill, No. 1170216, May 18, 2018, (Ala.).
F. OTHER REPORTS
U.S. Department of Justice, Office of the Deputy Attorney General. 2018. Report of the Attorney
General’s Cyber Digital Task Force.
58