elections

August 30, 2021
By Shaun Waterman
Credit: Shutterstock/vesperstock

It will be a long time, if ever, before it’s possible to securely deploy internet voting systems for most Americans, but even the most skeptical experts are coming around to the idea that online ballots are OK in certain circumstances, attendees of AFCEA’s 2021 Federal Identity Forum and Expo heard Monday.

That was the takeaway from a panel on election identity, featuring technical experts discussing the development and use of identity technologies in voting. Inevitably, the conversation turned to online voting.

November 4, 2020
By Kimberly Underwood
Cybersecurity officials reporter few cyber attack interruptions on Election Day. Credit: Shutterstock/vesperstock

Despite attempts from adversaries such as China, Iran and Russia to compromise voting on America’s Election Day, the election system worked well, even with the record levels of voting, reported senior officials with the U.S. Department of Homeland Security’s (DHS’) Cybersecurity and Infrastructure Security Agency (CISA). The cybersecurity concerns now move to protecting the final vote counting, canvasing, auditing, certification and inauguration phases.

August 26, 2020
By Robert K. Ackerman
Credit: Shutterstock/ozrimoz

Government and the private sector, particularly social media, are collaborating to forestall election manipulation by outside powers. These efforts aim at preventing disinformation campaigns from gaining a foothold in their steps to affect the upcoming November elections, but they also are maintaining vigilance against direct interference in the electoral process.

August 1, 2020
By Shaun Waterman
Former NSA hacker Dave Aitel speaks at the S4 security conference in Miami. Photo by courtesy of S4

When the first Solarium Commission convened in 1953, it had the task of helping Former President Dwight D. Eisenhower and his cabinet colleagues assess the threat from the Soviet Union after the death of Joseph Stalin and agree on a strategic U.S. response. Three teams of policy experts put together three competing policy models: containment, confrontation and roll-back. Former President Eisenhower famously chose containment, a strategy based on the deterrence of Soviet military power and a norms-based alliance with Western Europe.

July 1, 2020
By Capt. Alex M. Roberts, USAF
U.S. Marines with 8th Communication Battalion, II Marine Expeditionary Force Information Group, collaborate as part of Team Spartan during Cyber Fury 2020. Cyber Fury is an annual training exercise that allows Marines to simulate a series of cyberspace attacks by identifying and countering them. Credit: Lance Cpl. Haley McMenamin, USMC

With the 2020 election fast approaching and tensions with Iran continually shifting, many people are looking to U.S. Cyber Command to help ensure cybersecurity. The command faces an uphill battle because the current construct allows each service branch to retain tactical command of its organic cyber experts. To be more successful in the cyberspace domain, the command needs to take over tasking authority for all cyber-related units, establish a standardized joint cyber schoolhouse and establish a Joint Cyber Operations Command to perform joint, effects-driven cyber operations.