{"id":22905,"date":"2024-10-28T09:25:38","date_gmt":"2024-10-28T13:25:28","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/submit\/glj-online\/glj-online-vol-113\/election-website-tampering-relevant-criminal-laws-and-enhancing-deterrence\/"},"modified":"2025-05-12T11:12:44","modified_gmt":"2025-05-12T15:12:44","slug":"election-website-tampering-relevant-criminal-laws-and-enhancing-deterrence","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/submit\/glj-online\/glj-online-vol-113\/election-website-tampering-relevant-criminal-laws-and-enhancing-deterrence\/","title":{"rendered":"Election Website Tampering: Relevant Criminal Laws and Enhancing Deterrence"},"content":{"rendered":"<p class=\"p3\" style=\"text-align: center\">INTRODUCTION<\/p>\n<p class=\"p3\"><b>Imagine: <\/b>It is November 5, 2024\u2014election night. All states but Wisconsin have declared their results. With the presidency hanging in the balance, Wisconsin\u2019s vote counting stretches into a second day. Suddenly, thousands of Donald Trump votes disappear from the election results websites of three Wisconsin counties. Wisconsin shockingly turns from red to blue on CNN, Fox, and MSNBC. On The New York Times\u2019s website, the election predictor needle swings wildly in the opposite direction from where it sat moments before. The Times announces that there has been a tabulation error, revealing that Trump has thousands of fewer votes than initially shown. Kamala Harris has won Wisconsin and, consequently, the election. Protests erupt throughout the country as Republicans insist the presidency has been stolen. Where did the missing Trump votes go?<\/p>\n<p class=\"p3\">One week later, a preliminary investigation reveals the cause of this dramatic change: foreign actors hacked those three counties\u2019 election results websites, artificially inflating Trump\u2019s vote count in an attempt to muddy Harris\u2019 legitimate victory in the state. Fortunately, authorities discover the intrusion and correct it. No actual votes were impacted\u2014the hack merely altered the results shown on the counties\u2019 tabulation websites. But for the American people, who are now more divided and less trusting of governmental institutions than ever, the damage is done. Trump calls for a new election in Wisconsin, and the Republican Party stands behind him in those efforts. Lawsuits and unrest follow. In order to prevent the violent disruption of the counting of electoral votes, Washington, D.C., becomes a military encampment on January 6, 2025.<\/p>\n<p class=\"p1\">Though we may want to believe otherwise, this is not a wildly unrealistic scenario. It is, in fact, shockingly <em>realistic<\/em>. Unofficial election tabulations are critical to the media\u2019s ability to project election results\n\t\t<span class='js-footnote footnote'>\n\t\t\t<button type='button' aria-controls='abstract_footnote_22905_1' class='footnote_inline_btn js-footnote-toggle-btn' aria-describedby='footnote_btn_text_abstract_footnote_22905_1'>\n\t\t\t\t<sup class='footnote_inline_btn_number'>1<\/sup>\n\t\t\t\t<span id='footnote_btn_text_abstract_footnote_22905_1' class='visually_hide'>Open footnote #1<\/span>\n\t\t\t<\/button>\n\t\n\t\t\t<cite id='abstract_footnote_22905_1' class='footnote_content_cite js-footnote-content'>\n\t\t\t\t<span class='footnote_content_wrap'>\n\t\t\t\t\t<button type='button' class='footnote_content_number js-footnote-toggle-btn' aria-controls='abstract_footnote_22905_1' tabindex='-1'>1<\/button>\n\t\n\t\t\t\t\t<span class='footnote_content_wrap_inner'>\n\t\t\t\t\t\t<span class='footnote_content'>\n\t\t\t\t\t\t\t<span class='visually_hide'>Footnote #1 content: <\/span><i>See <\/i>Lenny Bronner, Emily Liu &amp; Jeremy Bowers, <i>What the Washington Post Elections Engineering Team Had to Learn About Election Data, <\/i>WASH. POST: MEDIUM (Apr. 28, 2022), https:\/\/washpost.engineering\/what-the-washington-post-elections-engineering-team-had-to-learn-about-election-data-a41603daf9ca; Joe Pompeo, <i>\u201cCertain Readers May Have a Nervous Reaction\u201d: The <\/i>New York Times <i>Election Needle Is Back, With a Few New Safety Features<\/i>, VANITY FAIR (Nov. 5, 2018), https:\/\/www.vanityfair.com\/news\/2018\/11\/the-new-york-times-election-needle-is-back-with-a-few-new-safety-features; <i>How Does The Times Get Live Election Results?<\/i>, N.Y. TIMES (Nov. 7, 2022), https:\/\/www.nytimes.com\/2022\/11\/07\/us\/politics\/times-results-pages-how-data.html (\u201cWe report vote totals provided by The Associated Press, which collects results from states, counties and townships through a network of websites and more than 4,000 on-the-ground correspondents. . . . [O]ur team of data journalists and software engineers gathers vote tallies directly from the websites of election officials and compares these with our turnout expectations.\u201d); <i>How AP Counts the Vote<\/i>, ASSOCIATED PRESS, https:\/\/www.ap.org\/about\/our-role-in-elections\/counting-the-vote#:~:text=Vote%20count%20reporters%20and%20vote,up%20and%20down%20the%20ballot [https:\/\/perma.cc\/KY8T-LHKP] (last visited Oct. 21, 2024).\n\n\t\t\t\t\t\t<\/span>\n\t\n\t\t\t\t\t\t\n\t\n\t\t\t\t\t\t<span class='footnote_close_btn_wrap'>\n\t\t\t\t\t\t\t<button type='button' class='footnote_close_btn js-footnote-close-btn' aria-label='Back to content'>close<\/button>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/cite>\n\t\t<\/span>\n\t\u00a0<span class=\"s1\">and can currently be easily breached and tampered with.\n\t\t<span class='js-footnote footnote'>\n\t\t\t<button type='button' aria-controls='abstract_footnote_22905_2' class='footnote_inline_btn js-footnote-toggle-btn' aria-describedby='footnote_btn_text_abstract_footnote_22905_2'>\n\t\t\t\t<sup class='footnote_inline_btn_number'>2<\/sup>\n\t\t\t\t<span id='footnote_btn_text_abstract_footnote_22905_2' class='visually_hide'>Open footnote #2<\/span>\n\t\t\t<\/button>\n\t\n\t\t\t<cite id='abstract_footnote_22905_2' class='footnote_content_cite js-footnote-content'>\n\t\t\t\t<span class='footnote_content_wrap'>\n\t\t\t\t\t<button type='button' class='footnote_content_number js-footnote-toggle-btn' aria-controls='abstract_footnote_22905_2' tabindex='-1'>2<\/button>\n\t\n\t\t\t\t\t<span class='footnote_content_wrap_inner'>\n\t\t\t\t\t\t<span class='footnote_content'>\n\t\t\t\t\t\t\t<span class='visually_hide'>Footnote #2 content: <\/span><i>See <\/i>Brett Molina &amp; Elizabeth Weise, <i>11-year-old Hacks Replica of Florida State Website, Changes Election Results<\/i>, USA TODAY (Aug. 14, 2018, 12:20 PM), https:\/\/www.usatoday.com\/story\/tech\/nation-now\/2018\/08\/13\/11-year-old-hacks-replica-florida-election-site-changes-results\/975121002\/ [https:\/\/perma.cc\/8U9S-SWRQ]; Michael D. Regan, <i>An 11-year-old Changed Election Results on a Replica Florida State Website in Under 10 Minutes<\/i>, PBS (Aug. 12, 2018, 5:00 PM), https:\/\/www.pbs.org\/newshour\/nation\/an-11-year-old-changed-election-results-on-a-replica-florida-state-website-in-under-10-minutes [https:\/\/perma.cc\/J95X-EXEB].\n\n\t\t\t\t\t\t<\/span>\n\t\n\t\t\t\t\t\t\n\t\n\t\t\t\t\t\t<span class='footnote_close_btn_wrap'>\n\t\t\t\t\t\t\t<button type='button' class='footnote_close_btn js-footnote-close-btn' aria-label='Back to content'>close<\/button>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/cite>\n\t\t<\/span>\n\t\u00a0<\/span><span class=\"s3\">Unofficial election tabulations are vulnerable to attack, and, as demonstrated by this scenario, the consequences of meddling with them can be enormous. This Note will discuss the current state of, and overlap between, unofficial election tabulations and election-related misinformation. Additionally, this Note will analyze the application of relevant federal criminal laws to the unauthorized modification of unofficial election results, most prominently, The Computer Fraud and Abuse Act (CFAA)\n\t\t<span class='js-footnote footnote'>\n\t\t\t<button type='button' aria-controls='abstract_footnote_22905_3' class='footnote_inline_btn js-footnote-toggle-btn' aria-describedby='footnote_btn_text_abstract_footnote_22905_3'>\n\t\t\t\t<sup class='footnote_inline_btn_number'>3<\/sup>\n\t\t\t\t<span id='footnote_btn_text_abstract_footnote_22905_3' class='visually_hide'>Open footnote #3<\/span>\n\t\t\t<\/button>\n\t\n\t\t\t<cite id='abstract_footnote_22905_3' class='footnote_content_cite js-footnote-content'>\n\t\t\t\t<span class='footnote_content_wrap'>\n\t\t\t\t\t<button type='button' class='footnote_content_number js-footnote-toggle-btn' aria-controls='abstract_footnote_22905_3' tabindex='-1'>3<\/button>\n\t\n\t\t\t\t\t<span class='footnote_content_wrap_inner'>\n\t\t\t\t\t\t<span class='footnote_content'>\n\t\t\t\t\t\t\t<span class='visually_hide'>Footnote #3 content: <\/span><i>See <\/i>Computer Fraud and Abuse Act, Pub. L. No. 99-474, 100 Stat. 1213 (1986) (codified as amended at 18 U.S.C. \u00a7 1030).\n\n\t\t\t\t\t\t<\/span>\n\t\n\t\t\t\t\t\t\n\t\n\t\t\t\t\t\t<span class='footnote_close_btn_wrap'>\n\t\t\t\t\t\t\t<button type='button' class='footnote_close_btn js-footnote-close-btn' aria-label='Back to content'>close<\/button>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/cite>\n\t\t<\/span>\n\t<\/span><span class=\"s1\"> and a 2020 law that amended the CFAA, The Defending the Integrity <\/span>of Voting Systems Act (DIVSA).\n\t\t<span class='js-footnote footnote'>\n\t\t\t<button type='button' aria-controls='abstract_footnote_22905_4' class='footnote_inline_btn js-footnote-toggle-btn' aria-describedby='footnote_btn_text_abstract_footnote_22905_4'>\n\t\t\t\t<sup class='footnote_inline_btn_number'>4<\/sup>\n\t\t\t\t<span id='footnote_btn_text_abstract_footnote_22905_4' class='visually_hide'>Open footnote #4<\/span>\n\t\t\t<\/button>\n\t\n\t\t\t<cite id='abstract_footnote_22905_4' class='footnote_content_cite js-footnote-content'>\n\t\t\t\t<span class='footnote_content_wrap'>\n\t\t\t\t\t<button type='button' class='footnote_content_number js-footnote-toggle-btn' aria-controls='abstract_footnote_22905_4' tabindex='-1'>4<\/button>\n\t\n\t\t\t\t\t<span class='footnote_content_wrap_inner'>\n\t\t\t\t\t\t<span class='footnote_content'>\n\t\t\t\t\t\t\t<span class='visually_hide'>Footnote #4 content: <\/span><i>See <\/i>Defending the Integrity of Voting Systems Act, Pub. L. No. 116-179, 134 Stat. 855 (2020) (codified as amended at 18 U.S.C. \u00a7 1030(e)).\n\n\t\t\t\t\t\t<\/span>\n\t\n\t\t\t\t\t\t\n\t\n\t\t\t\t\t\t<span class='footnote_close_btn_wrap'>\n\t\t\t\t\t\t\t<button type='button' class='footnote_close_btn js-footnote-close-btn' aria-label='Back to content'>close<\/button>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/cite>\n\t\t<\/span>\n\t<span class=\"s1\">\u00a0<\/span>This Note will further provide an overview of the relevant Sentencing Guidelines for a possible breach of this type. Finally, this Note will describe the state of criminal law in this area and argue that the enhanced protections the DIVSA inadvertently provided against the manipulation of unofficial election results should be utilized to adapt the Sentencing Guidelines to further deter actors in this particularly vulnerable area that is critical to the functioning of our democracy.\n\t\t<span class='js-footnote footnote'>\n\t\t\t<button type='button' aria-controls='abstract_footnote_22905_5' class='footnote_inline_btn js-footnote-toggle-btn' aria-describedby='footnote_btn_text_abstract_footnote_22905_5'>\n\t\t\t\t<sup class='footnote_inline_btn_number'>5<\/sup>\n\t\t\t\t<span id='footnote_btn_text_abstract_footnote_22905_5' class='visually_hide'>Open footnote #5<\/span>\n\t\t\t<\/button>\n\t\n\t\t\t<cite id='abstract_footnote_22905_5' class='footnote_content_cite js-footnote-content'>\n\t\t\t\t<span class='footnote_content_wrap'>\n\t\t\t\t\t<button type='button' class='footnote_content_number js-footnote-toggle-btn' aria-controls='abstract_footnote_22905_5' tabindex='-1'>5<\/button>\n\t\n\t\t\t\t\t<span class='footnote_content_wrap_inner'>\n\t\t\t\t\t\t<span class='footnote_content'>\n\t\t\t\t\t\t\t<span class='visually_hide'>Footnote #5 content: <\/span>This Note will mainly discuss the problem of unofficial election website tampering in the context of presidential elections, but the impact of tampering in local, state, and other federal elections remains pertinent as well.\n\n\t\t\t\t\t\t<\/span>\n\t\n\t\t\t\t\t\t\n\t\n\t\t\t\t\t\t<span class='footnote_close_btn_wrap'>\n\t\t\t\t\t\t\t<button type='button' class='footnote_close_btn js-footnote-close-btn' aria-label='Back to content'>close<\/button>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/cite>\n\t\t<\/span>\n\t<\/p>\n<p>Continue reading <a href=\"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-content\/uploads\/sites\/26\/2024\/10\/rosenfeld-ready-for-publication-single-spaced.pdf\"><em>Election Website Tampering: Relevant Criminal Laws and Enhancing Deterrence<\/em><\/a>.<\/p>\n<p><span style=\"font-weight: 400\"><a href=\"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-content\/uploads\/sites\/26\/2024\/10\/rosenfeld-ready-for-publication-single-spaced.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">rosenfeld-ready-for-publication-single-spaced<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>INTRODUCTION Imagine: It is November 5, 2024\u2014election night. All states but Wisconsin have declared their results. With the presidency hanging in the balance, Wisconsin\u2019s vote counting stretches into a second [&hellip;]<\/p>\n","protected":false},"author":13235,"featured_media":0,"parent":22697,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"abstract.php","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-22905","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/22905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/users\/13235"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/comments?post=22905"}],"version-history":[{"count":7,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/22905\/revisions"}],"predecessor-version":[{"id":23441,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/22905\/revisions\/23441"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/22697"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/media?parent=22905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}