Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Is it Possible to Hack the Vote?

Is it Possible to Hack the Vote?

On Tuesday, people around the United States will flood to local polling places to cast their vote for the future leadership of the United States. Voting—the very foundation of representative democracy—is predicated on privacy, anonymity, and freedom from outside influence or coercion. At the core of this system is transparency, confidence in the ability to verify that each person gets one—and only one—vote and that election outcomes echo voters’ intent.

Additionally, there is a requirement to ensure a voting system that is not overly inconvenient to avoid disenfranchising those groups with limited access - people living in rural areas, the disabled, minority groups or those in the military or overseas. To do so has, in some cases, meant an adoption of digital technology.

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

The Houthi Balancing Act After Israel’s Attack on Iran

OPINION — How will the Houthis respond to the devastating Israeli strikes on Iran? This moment could prove decisive for both the Iran-led axis and [...] More
The Attack that Knocked Back Iran’s Nuclear Program

The Attack that Knocked Back Iran’s Nuclear Program

EXPERT INTERVIEW — Israeli airstrikes against targets associated with Iran’s nuclear program early Friday have seemingly dealt a devastating blow as [...] More

Dead Drop: June 13

SHOULD GREENLAND AND PANAMA BE (EVEN MORE) NERVOUS: Defense Secretary Pete Hegseth was engaged in a war of words this week with lawmakers during a [...] More
Report for Friday, June 13, 2025

Report for Friday, June 13, 2025

9:07 AM America/New_York Friday, June 13 [...] More

China Wants Our Hearts. Literally.

OPINION — China is pre-positioning itself on U.S. networks for disruptive and destructive attacks against our critical infrastructure. In the past [...] More