Countering Electoral Interference

Russia’s aggressive campaign targeting the 2016 US election revealed not only the extent to which information and communications technologies are being used to undermine democratic processes but also the weaknesses of protection measures. 
 
The US government was effectively caught off guard, once again highlighting that such interference presents a rising global threat. 
 
Comprehensive strategies and tools are clearly needed as part of a long-term, holistic approach to building resilience, but to be effective, they should be informed by the regular sharing of best practices and lessons learned between countries.
In reaction to Russia’s disruptive campaigns in Europe and the United States, European governments took steps before and during their 2017 elections to better protect against disinformation campaigns and cyber-attacks. 
 
An examination of their efforts shows the importance of identifying risks at the local, regional, and national levels and actively engaging political parties and traditional and social media outlets. 
 
These lessons and others could provide the basis for a common, analytical framework to assess the different dimensions of risk and guide countries’ preparatory actions.
 
Lessons from European Efforts
• Consider electoral systems as part of critical infrastructure, institutionalise preparations to protect election processes, and broaden activities to the subnational levels.
• Focus on resilience measures, for example, by conducting regular vulnerability analyses and developing contingency plans. Legal measures should be explored through an inclusive process.
• Issue public statements to deter threat actors and educate voters about disinformation campaigns.
• Train and educate political parties and campaigns to better protect against potential interference.
• Conduct government-media dialogue, encourage media to take voluntary protective measures, and engage social media companies in mitigating potential threats.
• Support international cooperation, particularly the sharing of lessons learned and best practices.
Preparing for the 2018 US Mid-Term Elections
• Issue a clear warning that interference in the 2018 elections by Russia or any other actor will result in severe consequences.
• Coordinate government efforts to protect against cyber-attacks and disinformation.
• Provide more training and support to state and local election officials.
• Regularly assess election infrastructure.
• Encourage states to reevaluate the use of electronic voting machines.
• Encourage political parties and their candidates, staff, and volunteers to follow basic cyber-security practices.
• Encourage donors to require that political parties and campaigns implement basic cyber hygiene for their candidates, staff, and volunteers.
• Urge political parties and campaigns to explicitly state that they will not use or support social media bots.
• Increase society’s resilience by clearly communicating the risks of foreign interference in US democracy.
• Promote independent citizen fact-checking and investigative journalistic initiatives.
• Improve media literacy among the public.
 
Carnegie Endowment
 
You Might Also Read:
 
Hacking The Vote:
 
Tech Giants Face US Congress Over Russia Election:
 
 
« FBI Seizes Control Of Russian Botnet
Quantum Computing - What You Should Know »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

Kuratorium Sicheres Österreich (KSO)

Kuratorium Sicheres Österreich (KSO)

KSO is an independent non-profit association that has set itself the goal of making Austria safer as a national networking and information platform for topics of internal security.

Zivaro

Zivaro

Zivaro provides transformational consulting and technology services to help clients attain real business value from their technology investments.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

Arqit Quantum

Arqit Quantum

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.

Layer 8 Security

Layer 8 Security

Layer 8 Security is a cybersecurity advisory, consulting, and technical services firm that arms businesses with practical compliance, risk management, and security program strategies.

Xeliumtech Solutions

Xeliumtech Solutions

Xeliumtech Solutions are a Digital Transformation partner with quality offerings in Mobile App Development, Ecommerce, Devops, RPA, AI, IoT development, Cybersecurity and more.

Whalebone

Whalebone

Whalebone develop user-centric, no-installation network security products for telcos, internet service providers, enterprises, public institutions, and governments.