Election Security Information

Security in Elections is a hot topic right now, and we've got some information for you!  Mono County is very committed to ensuring a secure and successful election. We are working with our elections equipment vendor, Dominion Voting, as well as the Department of Homeland Security to be sure that our Elections are run safely, securely, and with integrity.

Here are what some of the top-ranking experts in the Elections Security field have to say:

“Department of Homeland Security (DHS) continues to robustly coordinate with the EAC, the intelligence community, and law enforcement partners. Among non-federal partners, DHS has been engaging state and local officials, as well as relevant private sector entities, to assess the scale and scope of malicious cyber activity potentially targeting the U.S. election infrastructure. In addition to working directly with state and local officials, we partnered with stakeholders to analyze relevant cyber data, including the Multi-State Information Sharing and Analysis Center (MS-ISAC), the 2 National Association of Secretaries of State and the National Association of State Election Directors”.

       -Christopher Krebs, DHS.   Note: Mono County is an active member of the EAC/DHS and MS-ISAC in the delivery of appropriate security into our Elections Infrastructure!

“Our Elections Infrastructure is protected and safe.  News media on past ‘Russian Hacking’ involving publicly accessible voter registration rolls are misleading and reflect a belief that rolls are confidential and private when, in fact, they are used by all candidates and potential candidates in information campaigns.”  

      -Gary Coverdale, Elections Infrastructure Sector- Critical Infrastructure Sector Council Member and Executive Committee Member-MS-ISAC  

“Multiple checks and redundancies in U.S. election infrastructure—including diversity of systems, non-Internet connected voting machines, pre-election testing, and processes for media, campaign, and election officials to check, audit, and validate results—make it likely that cyber manipulation of U.S. election systems intended to change the outcome of a national election would be detected.”