1. The Election Influence Operations Playbook

    The threat of Influence Operations (IO) strikes the core of our democracy by seeking to influence hearts and minds with divisive and often false information. Although malicious actors are targeting the whole of society, the upcoming “The Election Influence Operations Playbook” focuses on a subset of influence operations—the types of disinformation attacks and misinformation incidents […]

    read more
  2. 50 Ideas for Recruiting and Retaining Poll Workers

    Whether they’re staffing the polls, processing ballots, or fielding voter phone calls, your temporary election workers are invaluable. But many jurisdictions struggle to recruit enough, even without a global pandemic! That’s why we’re rounding up your success stories. Elections aren’t one-size-fits-all, so steal ideas you like and ignore the rest.

    read more
  3. New Jersey RLA Case Study

    In November 2018, state and local officials in New Jersey took part in the Garden State’s first-ever pilot risk limiting audit (RLA) of voting equipment. A risk-limiting audit is nationally recognized as a reliable method to validate the integrity of the voting equipment and verify the accuracy of election results with a high degree of […]

    read more
  4. Voting Made Clear

    Voting is a right for all U.S. citizens. But it is often threatened by state laws and complex voting procedures. Your rights matter. Your voice matters. Your vote matters. FindLaw.com has the resources you need to vote on Election Day and get help if anything stands in the way.

    read more
  5. Telework and Small Office Network Security Guide

    This guide, published by the Center for Internet Securuty, is meant to assist individuals and organizations in securing commodity routers, modems, and other network devices. Securing these devices is important as there are serious cybersecurity considerations surrounding the usage of network devices.

    read more
  6. The Election Official’s Handbook

    Foreign actors are increasingly sophisticated at using cyber tools and social media to probe and penetrate electoral infrastructure, manipulate public opinion, and cast doubt on the integrity of the election process. On the eve of another presidential election, vulnerabilities in our election systems remain unaddressed. This handbook provides a list of steps that local election […]

    read more