scispace - formally typeset
Open AccessJournal Article

Protecting the States from Electoral Invasions

Drew Marvel
- 01 Jan 2019 - 
- Vol. 28, Iss: 1, pp 197
TLDR
In 2016, Russian government-backed hackers infiltrated the networks and computers of the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee and various campaign officials, harvesting private information and installing spyware and malware for ongoing intelligence purposes as discussed by the authors.
Abstract
Since the 2016 U.S. presidential election, the threat of foreign interference in U.S. elections has loomed large in the minds of the American public. During the 2016 campaign season, Russian government-backed hackers infiltrated the networks and computers of the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee (DCCC), and various campaign officials, harvesting private information and installing spyware and malware for ongoing intelligence purposes. U.S. intelligence officials have indicated that, using similar tactics, the Russian hackers also targeted election systems and officials in all fifty states, successfully breaching at least two of those states’ election systems, Illinois and Florida.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

We Are All Victims: Questionable Content and Collective Victimisation in the Digital Age.

TL;DR: This paper examines and analyses the rationale and modus operandi—both methods and types—that lead to regard questionable content as a new form of collective victimisation in India.
Journal ArticleDOI

Sovereignty, Cyberspace, and the Emergence of Internet Bubbles

TL;DR: In this article , the authors argue that liberal democracies like the United States might be at a severe disadvantage to fight against cyber proxy warfare due to legal and constitutional barriers, but at the same time, the emergence of platform governance and self-regulation might be proven as a new force within these proxy wars and reshape its boundaries.
References
More filters

The 2014 Sony Hack and the Role of International Law

TL;DR: The authors of as mentioned in this paper argue that assuming North Korea is responsible, the 2014 Sony hack at least breached U.S. sovereignty and caused significant damage to the United States, although the target, adversary, method of attack and the notions of territory and damage appear very different from those in traditional warfare.
Related Papers (5)