"Why wouldn't someone think of democracy as a target?": Security
practices & challenges of people involved with U.S. political campaigns
- URL: http://arxiv.org/abs/2106.00236v1
- Date: Tue, 1 Jun 2021 05:27:51 GMT
- Title: "Why wouldn't someone think of democracy as a target?": Security
practices & challenges of people involved with U.S. political campaigns
- Authors: Sunny Consolvo, Patrick Gage Kelley, Tara Matthews, Kurt Thomas, Lee
Dunn, Elie Bursztein
- Abstract summary: People who are involved with political campaigns face increased digital security threats from well-funded, sophisticated attackers.
To identify campaign security issues, we conducted qualitative research with 28 participants across the U.S. political spectrum.
A main, overarching finding is that a unique combination of threats, constraints, and work culture lead people involved with political campaigns to use technologies in ways that leave them--and democracy--vulnerable to security attacks.
- Score: 8.384303064180134
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: People who are involved with political campaigns face increased digital
security threats from well-funded, sophisticated attackers, especially
nation-states. Improving political campaign security is a vital part of
protecting democracy. To identify campaign security issues, we conducted
qualitative research with 28 participants across the U.S. political spectrum to
understand the digital security practices, challenges, and perceptions of
people involved in campaigns. A main, overarching finding is that a unique
combination of threats, constraints, and work culture lead people involved with
political campaigns to use technologies from across platforms and domains in
ways that leave them--and democracy--vulnerable to security attacks. Sensitive
data was kept in a plethora of personal and work accounts, with ad hoc adoption
of strong passwords, two-factor authentication, encryption, and access
controls. No individual company, committee, organization, campaign, or academic
institution can solve the identified problems on their own. To this end, we
provide an initial understanding of this complex problem space and
recommendations for how a diverse group of experts can begin working together
to improve security for political campaigns.
Related papers
- Inference Attacks on Encrypted Online Voting via Traffic Analysis [19.653420340564946]
We examine how adversaries can exploit metadata from encrypted network traffic to uncover sensitive information during online voting.<n>Our analysis reveals that, even without accessing the content, it is possible to infer critical voter actions, such as whether a person votes, the exact moment a ballot is submitted, and whether the ballot is valid or spoiled.<n>We evaluate our attacks on two widely used online voting platforms, one proprietary and one partially open source, achieving classification accuracy as high as 99.5%.
arXiv Detail & Related papers (2025-09-19T07:14:01Z) - A Systematic Review of Security Communication Strategies: Guidelines and Open Challenges [47.205801464292485]
We identify user difficulties including information overload, technical comprehension, and balancing security awareness with comfort.
Our findings reveal consistent communication paradoxes: users require technical details for credibility yet struggle with jargon and need risk awareness without experiencing anxiety.
This work contributes to more effective security communication practices that enable users to recognize and respond to cybersecurity threats appropriately.
arXiv Detail & Related papers (2025-04-02T20:18:38Z) - 2FA: Navigating the Challenges and Solutions for Inclusive Access [55.2480439325792]
Two-Factor Authentication (2FA) has emerged as a critical solution to protect online activities.
This paper examines the intricacies of deploying 2FA in a way that is secure and accessible to all users.
An analysis was conducted to examine the implementation and availability of various 2FA methods across popular online platforms.
arXiv Detail & Related papers (2025-02-17T12:23:53Z) - On the Use of Proxies in Political Ad Targeting [49.61009579554272]
We show that major political advertisers circumvented mitigations by targeting proxy attributes.
Our findings have crucial implications for the ongoing discussion on the regulation of political advertising.
arXiv Detail & Related papers (2024-10-18T17:15:13Z) - PsySafe: A Comprehensive Framework for Psychological-based Attack, Defense, and Evaluation of Multi-agent System Safety [70.84902425123406]
Multi-agent systems, when enhanced with Large Language Models (LLMs), exhibit profound capabilities in collective intelligence.
However, the potential misuse of this intelligence for malicious purposes presents significant risks.
We propose a framework (PsySafe) grounded in agent psychology, focusing on identifying how dark personality traits in agents can lead to risky behaviors.
Our experiments reveal several intriguing phenomena, such as the collective dangerous behaviors among agents, agents' self-reflection when engaging in dangerous behavior, and the correlation between agents' psychological assessments and dangerous behaviors.
arXiv Detail & Related papers (2024-01-22T12:11:55Z) - Generalizing Political Leaning Inference to Multi-Party Systems:
Insights from the UK Political Landscape [10.798766768721741]
An ability to infer the political leaning of social media users can help in gathering opinion polls.
We release a dataset comprising users labelled by their political leaning as well as interactions with one another.
We show that interactions in the form of retweets between users can be a very powerful feature to enable political leaning inference.
arXiv Detail & Related papers (2023-12-04T09:02:17Z) - Navigating the complex nexus: cybersecurity in political landscapes [0.0]
This study explores the evolving landscape of cyberattacks, their impact on political stability, and strategies for bolstering digital resilience.
The research illuminates the intricate network of technological vulnerabilities, geopolitical dynamics, and ethical concerns that shape the dynamic evolution of cybersecurity in politics.
arXiv Detail & Related papers (2023-08-15T19:37:37Z) - Diverse Perspectives Can Mitigate Political Bias in Crowdsourced Content
Moderation [5.470971742987594]
Social media companies have grappled with defining and enforcing content moderation policies surrounding political content on their platforms.
It is unclear how well human labelers perform at this task, or whether biases affect this process.
We experimentally evaluate the feasibility and practicality of using crowd workers to identify political content.
arXiv Detail & Related papers (2023-05-23T20:10:43Z) - Weakly Supervised Learning for Analyzing Political Campaigns on Facebook [24.29993132301275]
We propose a weakly supervised approach to identify the stance and issue of political ads on Facebook.
We analyze the temporal dynamics of the political ads on election polls.
arXiv Detail & Related papers (2022-10-19T15:35:37Z) - The impact of Twitter on political influence on the choice of a running
mate: Social Network Analysis and Semantic Analysis -- A Review [0.0]
Politics is one of the most talked-about and popular topics on social media networks right now.
Many politicians use micro-blogging services like Twitter because they have a large number of followers and supporters on those networks.
This research is a review on the use of social network analysis (SNA) and semantic analysis (SA) on the Twitter platform to study the supporters networks of political leaders.
arXiv Detail & Related papers (2022-07-31T17:44:57Z) - Having your Privacy Cake and Eating it Too: Platform-supported Auditing
of Social Media Algorithms for Public Interest [70.02478301291264]
Social media platforms curate access to information and opportunities, and so play a critical role in shaping public discourse.
Prior studies have used black-box methods to show that these algorithms can lead to biased or discriminatory outcomes.
We propose a new method for platform-supported auditing that can meet the goals of the proposed legislation.
arXiv Detail & Related papers (2022-07-18T17:32:35Z) - Differentially Private Multi-Agent Planning for Logistic-like Problems [70.3758644421664]
This paper proposes a novel strong privacy-preserving planning approach for logistic-like problems.
Two challenges are addressed: 1) simultaneously achieving strong privacy, completeness and efficiency, and 2) addressing communication constraints.
To the best of our knowledge, this paper is the first to apply differential privacy to the field of multi-agent planning.
arXiv Detail & Related papers (2020-08-16T03:43:09Z) - Political audience diversity and news reliability in algorithmic ranking [54.23273310155137]
We propose using the political diversity of a website's audience as a quality signal.
Using news source reliability ratings from domain experts and web browsing data from a diverse sample of 6,890 U.S. citizens, we first show that websites with more extreme and less politically diverse audiences have lower journalistic standards.
arXiv Detail & Related papers (2020-07-16T02:13:55Z) - Digital Ariadne: Citizen Empowerment for Epidemic Control [55.41644538483948]
The COVID-19 crisis represents the most dangerous threat to public health since the H1N1 pandemic of 1918.
Technology-assisted location and contact tracing, if broadly adopted, may help limit the spread of infectious diseases.
We present a tool, called 'diAry' or 'digital Ariadne', based on voluntary location and Bluetooth tracking on personal devices.
arXiv Detail & Related papers (2020-04-16T15:53:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.