z-logo
open-access-imgOpen Access
Making Democracy Harder to Hack
Author(s) -
Scott Shackelford,
Bruce Schneier,
Michael Sulmeyer,
Anne E. Boustead,
Ben Buchanan,
Amanda N. Craig Deckard,
Trey Herr,
Jessica Malekos Smith
Publication year - 2017
Publication title -
university of michigan journal of law reform
Language(s) - English
Resource type - Journals
eISSN - 2688-4933
pISSN - 0363-602X
DOI - 10.36646/mjlr.50.3.making
Subject(s) - corporate governance , context (archaeology) , voting , democracy , hacker , political science , presidential system , public administration , law , computer security , political economy , politics , law and economics , sociology , economics , computer science , paleontology , finance , biology
With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies. Yet a consensus has been slow to emerge as to the desirability and feasibility of reclassifying elections—in particular, voting machines—as critical infrastructure, due in part to the long history of local and state control of voting procedures. This Article takes on the debate—focusing on policy options beyond former Department of Homeland Security Secretary Jeh Johnson’s decision to classify elections as critical infrastructure in January 2017—in the U.S., using the 2016 elections as a case study, but putting the issue in a global context, with in-depth case studies from South Africa, Estonia, Brazil, Germany, and India. Governance best practices are analyzed by reviewing these differing approaches to securing elections, including the extent to which trend lines are converging or diverging. This investigation will, in turn, help inform ongoing minilateral efforts at cybersecurity norm building in the critical infrastructure context, which are considered here for the first time in the literature through the lens of polycentric governance.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here