13 Items

Voters mark their ballots during early voting at the Park Slope Armory in Brooklyn, Tuesday, Oct. 27, 2020.

AP Photo/Mary Altaffer

Report - Defending Digital Democracy

Beyond 2020: Policy Recommendations for the Future of Election Security

| February 2021

The 2020 election presents a paradox. Despite dramatic changes to the election process due to the COVID-19 pandemic and increasingly complex threats since the 2016 election, 2020 is widely regarded as “the most secure [election] in American history.” Operationally, it was also one of the smoothest. State and local election officials overcame unprecedented challenges and scarce resources to administer an election with fewer incidents of cyber compromises, technical failures or long lines than anticipated. After Election Day, recount procedures functioned as designed. Yet, amidst these successes, officials from both parties faced a barrage of mis- and disinformation about the election process that served to undermine confidence in the result.

Though the election security ecosystem survived the triple threat of cybersecurity, physical security, and mis- and disinformation in 2020, this success will prove to be hard to replicate in future election cycles without proper investment and reinforcement.

A staff member in the Kweisi Mfume campaign uses gloves while holding a cell phone during an election night news conference at his campaign headquarters after Mfume, a Democrat, won Maryland’s 7th Congressional District special election, Tuesday, April 28, 2020, in Baltimore.

AP Photo/Julio Cortez

Report

The Election Influence Operations Playbook, Part 1

| September 2020

Influence Operations (IO), also known as Information Operations, are a series of warfare tactics historically used to collect information, influence, or disrupt the decision making of an adversary. IO strategies intentionally disseminate information to manipulate public opinion and/or influence behavior. IO can involve a number of tactics, including spreading false information intentionally. This is known as “disinformation.”   

Skilled influence operations often deliberately spread disinformation in highly public places like social media. This is done in the hope that people who have no connection to the operation will mistakenly share this disinformation. Inaccurate information spread in error without malicious intent is known as “misinformation.” 

This playbook explores mis- and disinformation incidents that specifically focus on elections operations and infrastructure. Election officials may not often see or know what the motivation is behind the incidents encountered or whether they are mis- or disinformation. Throughout these guides we refer to mis/disinformation incidents together, as the strategies for countering or responding to them are the same.  

Voters wait in a line outside Broad Ripple High School to vote in the Indiana primary in Indianapolis, Tuesday, June 2, 2020 after coronavirus concerns prompted officials to delay the primary from its original May 5 date.

AP Photo/Michael Conroy

Report

The Election Influence Operations Playbook, Part 2

| September 2020

This section of the Playbook includes recommendations and materials focused on the response process. It will help election officials respond to election-related mis and disinformation incidents quickly and in a coordinated fashion. 

In this playbook, we refer to mis/disinformation throughout as one concept. Instances of both misinformation and disinformation in the elections process provide incorrect information to voters. Incorrect information can be conveyed intentionally or unintentionally. For election officials, any incorrect information, regardless of source or intention, presented to voters can pose a threat to elections, because it can undermine voters’ understanding of and trust in the election.

Press Release - Belfer Center for Science and International Affairs, Harvard Kennedy School

Midterm Campaigns Get Timely Cybersecurity Training in New Belfer Center Video

A practical training video for campaign staff and volunteers from all political parties, "Five Things" was produced by the Belfer Center for Science and International Affairs' bipartisan Defending Digital Democracy Project to help campaigns understand the importance of cybersecurity and learn what they can do about it.

A child waits for her mother to finish voting in a polling booth at the Nativity School on Election Day, Tuesday, Nov. 8, 2016, in Cincinnati. (AP Photo/John Minchillo)

AP Photo/John Minchillo

Analysis & Opinions - Financial Times

America vs. the Hackers: a Cyber-Security Bootcamp

    Author:
  • Hannah Kuchler
| Apr. 26, 2018

It is a war game with a twist. Instead of army officers, election officials are in charge. Instead of battling against an enemy armed with missiles, defences are choreographed against hackers hidden behind foreign computers. With the US midterm elections fast approaching, more than 160 election officials from across the country have just months to learn how to defend democracy.

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Building Cyber Defenses For U.S. Elections

| Spring 2018

Undaunted, a group of young civil servants is working directly with political operatives and state and local officials to fortify campaigns and elections against cyberattacks and information operations: Harvard Kennedy School students affiliated with the Belfer Center’s Defending Digital Democracy Project (D3P).

The room in Bethesda, Md., is prepared Friday, Feb. 16, 2018, for state election officials from all 50 states to attend classified briefings being held to raise awareness of foreign meddling in state election systems. (Brian Murphy/Office of the Director of National Intelligence via AP)

Brian Murphy/Office of the Director of National Intelligence via AP

Analysis & Opinions - The Guardian

Encryption Keeps Us Safe. It Must Not be Compromised With ‘Backdoors’

| Feb. 12, 2018

When the stolen information was exploited to generate news coverage or concoct “fake news” – such as that Democratic operatives were running a sex ring out of a pizza parlour – we learned some hard lessons in why privacy really matters. I worry the current rhetoric around encryption is ignoring that lesson.

teaser image

Press Release

Bipartisan Secretaries in Kentucky & West Virginia Arm Candidates with Cybersecurity Playbook

| Jan. 30, 2018

To mark their states' candidate-filing deadlines, Alison Lundergan Grimes, the Democratic Secretary of State of Kentucky, and Mac Warner, the Republican Secretary of State of West Virginia, are distributing the "Cybersecurity Campaign Playbook" to candidates in their states seeking to be on the ballot in 2018.

- Belfer Center for Science and International Affairs, Harvard Kennedy School

Defending Digital Democracy Project Aims to Protect Election Integrity

| Fall/Winter 2017-2018

In July, the Belfer Center launched a new, bipartisan initiative called the Defending Digital Democracy Project  (D3P). Led by Belfer Center Co-Director Eric Rosenbach, along with the former campaign managers for Hillary Clinton and Mitt Romney, the project aims to identify and recommend strategies, tools, and technology to protect democratic processes and systems from cyber and information attacks.