Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Making Democracy Harder To Hack, Scott Shackelford, Bruce Schneier, Michael Sulmeyer, Anne Boustead, Ben Buchanan, Amanda N. Craig Deckard, Trey Herr, Jessica Malekos Smith Jan 2017

Making Democracy Harder To Hack, Scott Shackelford, Bruce Schneier, Michael Sulmeyer, Anne Boustead, Ben Buchanan, Amanda N. Craig Deckard, Trey Herr, Jessica Malekos Smith

University of Michigan Journal of Law Reform

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies. Yet a consensus has been slow to emerge as to the desirability and feasibility of reclassifying elections—in particular, voting machines—as critical infrastructure, due in part to the long history of local and state control of voting procedures. This Article takes on the debate—focusing on policy options beyond former Department of Homeland Security Secretary …


Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As Critical Infrastructure Under The United States Code, Allaire M. Monticollo Jan 2017

Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As Critical Infrastructure Under The United States Code, Allaire M. Monticollo

Law Student Publications

In just the past five years, the United States has suffered numerous hacks into important entities and institutions across the country by ill-intentioned actors. Private companies and government agencies alike have felt the negative impacts of security breaches by hackers infiltrating proprietary and protected systems. Even the United States political landscape has proven vulnerable to bad actors in the realm of cyber security. Furthermore, analysts have attributed some of the most recent highly publicized hacks to state-sponsored groups. As cyber security threats and opportunities for foreign hackers to infiltrate critical systems become more prevalent, it is natural to wonder where …