1. Rumor Control Start-Up Guide

    Misinformation, disinformation, and malinformation (MDM) can present risks to the election infrastructure community, its owners and operators, and the public. MDM can spread quickly, causing rumors to undermine facts. This document was created as part of the Election Infrastructure Government Coordinating Council and Subsector Coordinating Council’s Joint Mis/Disinformation Working Group. This document is intended to […]

    read more
  2. Tactics of Disinformation

    Disinformation actors use a variety of tactics to influence others, stir them to action, and cause harm. Understanding these tactics can increase preparedness and promote resilience when faced with disinformation. While this series discusses open-source examples of disinformation attributed by others to foreign governments, it does not represent the U.S. government confirming the accuracy of […]

    read more
  3. How to Retain Election Officials and Secure Future Elections

    The 2020 presidential election was called the most secure in U.S. history, largely due to efforts to protect the nation’s different physical and cyber infrastructure. This was a triumph considering the physical, cyber, and even human assets that make up the election infrastructure have been and continue to be susceptible to threats. In 2020, many […]

    read more
  4. Beyond 2020: Policy Recommendations for the Future of Election Security

    The 2020 election presents a paradox. Despite dramatic changes to the election process due to the COVID-19 pandemic and increasingly complex threats since the 2016 election, 2020 is widely regarded as “the most secure [election] in American history.”1 Operationally, it was also one of the smoothest.2 State and local election officials overcame unprecedented challenges and […]

    read more
  5. Managing Cybersecurity Supply Chain Risks in Election Technology

    This guide for election technology providers continues our approach of providing best practices for specific problem areas identified to CIS by the election community. It contains recommendations and best practices to address that need for cybersecurity risks, and refers to these other CIS documents to describe a holistic, consistent approach to risk management.

    read more
  6. The Election Influence Operations Playbook

    The threat of Influence Operations (IO) strikes the core of our democracy by seeking to influence hearts and minds with divisive and often false information. Although malicious actors are targeting the whole of society, the upcoming “The Election Influence Operations Playbook” focuses on a subset of influence operations—the types of disinformation attacks and misinformation incidents […]

    read more
  7. 20 Ways to Protect the 2020 Election

    Modifying election plans to account for coronavirus is understandable and essential. However, drawing on pre-existing election funding to address these modifications presents a particular dilemma: ahead of the presidential election, our nation’s election infrastructure is not yet fully secure, while America’s adversaries continue to possess the capabilities to exploit technical deficiencies and to try to […]

    read more
  8. Telework and Small Office Network Security Guide

    This guide, published by the Center for Internet Securuty, is meant to assist individuals and organizations in securing commodity routers, modems, and other network devices. Securing these devices is important as there are serious cybersecurity considerations surrounding the usage of network devices.

    read more