COMMENTARY: Jake Braun — Serious cyberthreats to consider for Election Day

In the lead up to the 2020 general election, Jake Braun, Executive Director of at the University of Chicago’s Cyber Policy Initiative and author of “Democracy in Danger: How Hackers and Activists Exposed Fatal Flaws in the Election System,” offered commentary on the state of mail-in-voting, the possibilities of online voting, and election security.

In an interview with co-host of CyberHub Engage James Azar, and Synack co-founder Mark Kuhr, Braun said, “We need to bring together democratic countries to fight against [election interference] and publicly call it out so when this happens in France or Germany, all of the democratic … Read More

COMMENTARY: Jake Braun – The two most serious vulnerabilities lie in voter registration databases and election night returns data

In a recent discussion with Virginia’s WTKR, Jake Braun, Executive Director at the University of Chicago’s Cyber Policy Initiative and author of “Democracy in Danger: How Hackers and Activists Exposed Fatal Flaws in the Election System,” offered his insights into the state of cybersecurity for the upcoming 2020 presidential election.

“Braun says the two most serious vulnerabilities lie in voter registration databases and election night returns data. He says the hacking of either could cause chaos at the polls or spawn conspiracy theories about the election’s outcome.

‘We’re already seeing ransomware attacks on databases and we’re already seeing things … Read More

COMMENTARY: Jake Braun – A Perfect Storm of Vulnerabilities Could Determine the 2020 Election

Jake Braun, former White House Liaison to the Department of Homeland Security, outlines the four greatest weaknesses of our election ecosystem in a new article for the Boston Review

As the Director of the Cyber Policy Initiative at the University of Chicago Harris School of Public Policy, Mr. Braun specializes in cyber, national, and election security. In his article, he explains that flawed infrastructure, conspiracies, vulnerability to system hacks, and susceptibility to trolls all dangerously compound the effect of one another. Rather than confront each of these threats individually, he offers a number of recommendations to address the vulnerabilities … Read More