Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity

Could the U.S. Presidential election be hacked?

By Tyler Moore
Can the U.S. election be hacked? Well yes it can but not in the way you think.
October 30, 2020

Could the U.S. Presidential election be hacked? It’s a scary thought. And given how unprecedented 2020 has been, a cyber attack disrupting the vote might seem more plausible than it would have just a few years ago.

The good news is that the integrity of the vote tallying and reporting itself is likely to be maintained overall. The bad news is that the threat actors seeking to disrupt our elections have so far made the rational decision to attack our election’s integrity by focusing on softer targets beyond the vote itself.

It has long been known that voting machines, particularly “advanced” ones with touch screens running commodity operating systems, contain vulnerabilities that could be exploited to alter vote tallies. Another weak point is the transmission of results from precincts to local election boards, and then onto states. Fortunately, these systems have been examined closely, and security experts have recommended a number of sensible best practices to mitigate the risks, from generating back-up paper ballots to using segmented private networks for sending results. Adoption of these measures is by no means uniform or perfect, but election officials across the country have worked very hard to improve the operational security of these systems.

In the U.S., the responsibility for administering elections is decentralized and distributed among thousands of local jurisdictions. On the one hand, such fragmentation makes it extremely difficult to completely secure all such voting systems against a determined attack by a nation-state-level adversary. On the other hand, the scope for damage arising from a single intrusion is naturally limited. To fundamentally alter the results of voting in the election would require simultaneous successful attacks going undetected during the intrusion and afterwards. While possible, it remains comparatively expensive and unlikely to succeed. 

Moreover, by increasing security around the vote tally itself, would-be attackers have been encouraged to focus their efforts on other aspects of the election where attacks are easier to launch and the potential impact is greater. In other words, they are behaving like rational economic actors.

Nation-state adversaries may seek to undermine confidence in the democratic process, as well as steer the electorate to its preferred candidates. With those goals in mind, launching disinformation campaigns through social media and releasing incendiary stolen documents, as Russia did in 2016 and appears to be doing in 2020, is an attractive approach. Such attacks can be launched remotely and target the entire electorate, so they are relatively inexpensive to perpetrate while also offering high impact. By contrast, attacks on the vote tallying process may very well require physical access and only affect a small number of votes. 

In other words, disinformation campaigns targeting social media or leaking sensitive documents have comparatively low risk and high rewards, whereas attacks on the vote itself have high risks and low rewards. Not to mention they are harder to pull off.

So, what are the most likely cyber threats we might experience on Election Day?

We have already seen ransomware cripple the IT systems of local governments. It is conceivable that attackers might try to wreak havoc by launching similar attacks on the infrastructure reporting vote tallies, for example. This would inevitably create delays in tallying the votes. Ransomware on the voting systems themselves — which would bring voting at the polls to a standstill — seems unlikely, given that such systems should be disconnected from the Internet. 

Nonetheless, there is reason to be skeptical that we’ll see attackers adopt such a tactic. Why seek a ransom on Election Day? Election boards are underfunded and may not have the means to pay, and in any event the benefit of doing so would be limited since it usually takes days or weeks to recover systems from the crippling effects of a ransomware attack. It is possible that a nation state adversary unmotivated by actually recovering the ransom might masquerade as a cybercriminal, simply to wreak havoc. But again, such disruptions should not affect the resulting vote count.

Finally, it is not outside the realm of possibility that we could see an isolated incident or two of attacks targeting the vote tally itself. Were that to occur, it would almost certainly be isolated, given the decentralized nature of election administration described above. Instead, such an attack’s goal might be to undermine broader confidence in the election, perhaps providing a pretext to politicians claiming the overall election results are fraudulent, as the President has already alleged without evidence. 

What is most likely, instead, is that we will continue to see attempts to interfere with voter intent up to and including on Election Day. Already, Iran and Russia have been alleged to harvest public voter information and send out messages designed to deter voting. As a society, we should recognize such foreign meddling for what it is — an attempt to discredit the democratic process. 

And how do we know about such meddling? The NSA and Cyber Command have taken on the job of countering foreign election interference. Their willingness to call out attempts to interfere have highlighted both the gravity of the threat and the confidence we should have as a nation in facing down the would-be attackers. More broadly, we should have faith in our institutions to carry out a free and fair vote, and recognize that we have robust processes in place to deter and detect voter fraud, initiate recounts and ensure accurate tallies do in fact occur. 

 

KEYWORDS: election cybersecurity election fraud election security voting security

Share This Story

Moore tyler 17f4640626

Tyler Moore is the Tandy Professor of Cyber Security at the University of Tulsa. His research focuses on security economics, cybercrime measurement, and cybersecurity policy. He is a founding Editor in Chief of the Journal of Cybersecurity, a new interdisciplinary journal published by Oxford University Press. He was a 2016-17 New America Cybersecurity Fellow. Prior to joining TU, he was a postdoctoral fellow at the Center for Research on Computation and Society (CRCS) at Harvard University, the Hess Visiting Assistant Professor of Computer Science at Wellesley College, and an assistant professor at Southern Methodist University. A British Marshall Scholar, Prof. Moore completed his Ph.D. at the University of Cambridge, while he holds BS degrees in Computer Science and Applied Mathematics from the University of Tulsa.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

close

1 COMPLIMENTARY ARTICLE(S) LEFT

Unlock the future of cybersecurity news with Security.
As a leader in enterprise security, we have you covered with the information to keep you ahead of the curve.

JOIN TODAY

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!