Open AccessJournal Article
Protecting the States from Electoral Invasions
TLDR
In 2016, Russian government-backed hackers infiltrated the networks and computers of the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee and various campaign officials, harvesting private information and installing spyware and malware for ongoing intelligence purposes as discussed by the authors.Abstract:
Since the 2016 U.S. presidential election, the threat of foreign interference in U.S. elections has loomed large in the minds of the American public. During the 2016 campaign season, Russian government-backed hackers infiltrated the networks and computers of the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee (DCCC), and various campaign officials, harvesting private information and installing spyware and malware for ongoing intelligence purposes. U.S. intelligence officials have indicated that, using similar tactics, the Russian hackers also targeted election systems and officials in all fifty states, successfully breaching at least two of those states’ election systems, Illinois and Florida.read more
Citations
More filters
Journal ArticleDOI
We Are All Victims: Questionable Content and Collective Victimisation in the Digital Age.
TL;DR: This paper examines and analyses the rationale and modus operandi—both methods and types—that lead to regard questionable content as a new form of collective victimisation in India.
Journal ArticleDOI
Sovereignty, Cyberspace, and the Emergence of Internet Bubbles
Eldar Haber,Lev Topor +1 more
TL;DR: In this article , the authors argue that liberal democracies like the United States might be at a severe disadvantage to fight against cyber proxy warfare due to legal and constitutional barriers, but at the same time, the emergence of platform governance and self-regulation might be proven as a new force within these proxy wars and reshape its boundaries.
References
More filters
The 2014 Sony Hack and the Role of International Law
TL;DR: The authors of as mentioned in this paper argue that assuming North Korea is responsible, the 2014 Sony hack at least breached U.S. sovereignty and caused significant damage to the United States, although the target, adversary, method of attack and the notions of territory and damage appear very different from those in traditional warfare.