
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 13 Apr 2026 13:42:32 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Helping protect the 2025 Moldova elections]]></title>
            <link>https://blog.cloudflare.com/helping-protect-the-2025-moldova-elections/</link>
            <pubDate>Wed, 29 Oct 2025 09:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare mitigated a 12-hour DDoS attack against Moldova's Central Election Commission, blocking over 898 million malicious requests that peaked at 324,333 requests per second. This defense kept critical election infrastructure online and accessible for citizens during a critical parliamentary vote. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On Sunday, September 28, 2025, the Republic of Moldova held a parliamentary election that was described as a referendum on its geopolitical future. The election was conducted amid claims of Russian interference, both <a href="https://www.osce.org/odihr/598219"><u>online and offline</u></a>. Ensuring the security of the election infrastructure was a critical priority, not just to protect the vote count, but to guarantee the system's resilience so that all Moldovans could access authoritative information about the election.</p><p>We were proud to support the Moldovan Central Election Commission (CEC) ahead of their September 28th election. Consistent with public <a href="https://www.nytimes.com/2025/09/28/world/europe/moldova-election-russia.html"><u>reporting</u></a>, cyberattacks were not the story; the focus remained on the democratic process. We want to share what we found as we provided assistance to the CEC on election day. </p>
    <div>
      <h3>Elections in Moldova </h3>
      <a href="#elections-in-moldova">
        
      </a>
    </div>
    <p>The 2025 elections in Moldova were viewed by <a href="https://www.reuters.com/world/europe/moldovas-pro-eu-government-edges-towards-majority-pivotal-vote-2025-09-28/"><u>many</u></a> as a defining moment for the country. Specifically, it pitted the countries' pro-European government against an opposition seeking closer alignment with Russia. The entire election process was carried out under intense pressure from foreign <a href="https://tvpworld.com/89199029/moldovas-parliamentary-vote-faced-serious-foreign-interference"><u>interference</u></a>, employing a wide range of hybrid <a href="https://understandingwar.org/research/russia-ukraine/warning-russia-may-be-planning-violent-protests-after-the-moldovan-elections/"><u>tactics</u></a>. Beyond <a href="https://www.rferl.org/a/moldova-parliamentary-election-eu-russia/33543218.html"><u>disinformation</u></a> and <a href="https://www.bbc.com/news/articles/c4g5kl0n5d2o"><u>illegal </u></a>funding, the Moldovan state faced constant digital <a href="https://therecord.media/moldova-election-pro-eu-party-wins-ddos-incidents-influence-ops"><u>threats</u></a> and was on high <a href="https://tvpworld.com/89141070/isw-report-russia-plotting-violent-unrest-after-moldovan-elections-on-sunday"><u>alert</u></a> for planned post-election violence aimed at promoting distrust in the country's democratic institutions. For the nation, ensuring the security and integrity of the election was a priority.</p><p>Several days before the election, Cloudflare onboarded the Moldova Central Election Commission (CEC), amid concerns over increasing cyberattacks. Since 2017, through the Athenian Project, we have provided protection to over 450 state and local government election entities in the United States. We were able to provide this expertise to the CEC and in less than a week we onboarded many of their election websites and quickly deployed mitigation strategies to help prepare them for election day. </p>
    <div>
      <h3>Cyber attacks to the Moldova Election Commission </h3>
      <a href="#cyber-attacks-to-the-moldova-election-commission">
        
      </a>
    </div>
    <p>Cloudflare data shows that the Moldovan Election Commission experienced significant cyber attacks during the recent elections. From September 27 to September 29, 2025, our data shows how Moldovan citizens used the Internet to follow the political process and highlights the efforts by malicious actors to disrupt key election services.</p><p>For example, on September 28, 2025, the Moldovan Central Election Commission (CEC) experienced a series of concentrated, high-volume (DDoS) attacks strategically timed throughout the day. The attack began in the morning at 09:06:00 UTC and lasted for over twelve hours and ended as the official result reporting was underway at 21:34:00 UTC. In total, we mitigated over 898 million malicious requests directed at the CEC over the twelve-hour period.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/36PlFQIaFV2p47TTTn4tQF/690a36f7587cd9510d0ee63ad3272fb0/image3.png" />
          </figure><p>Cloudflare systems categorized this activity into 11 attack "chunks" — which is a term used to denote a multi-wave pattern indicating a sophisticated attack. These initial bursts began during peak afternoon voting hours, with one of the most intense chunks, Chunk 5, striking before the polls closed at 15:31:00 UTC and hitting the largest recorded peak of 324,333 requests per second (rps).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lw00EJkFkgXoESMwQ9DlK/d2039e2c9158b59b0d332d8e84017004/image1.png" />
          </figure><p>Malicious traffic continued after the polls officially closed (18:00 UTC), directly targeting the result reporting phase. Multiple sustained waves, including attacks that peaked at over 243,000 rps, were mitigated. Fortunately, Cloudflare's automated defenses successfully stopped the attacks in real-time, ensuring the CEC website remained online and accessible for Moldovan citizens.</p><p>The Moldovan government confirmed the attacks, as the Information Technology and Cybersecurity Service (STISC) reported a wide-ranging campaign targeting the CEC.md platform, government cloud systems, and diaspora voting stations. STISC also <a href="https://stisc.gov.md/ro/comunicate-de-presa/comunicat-de-presa-2?cf_history_state=%7B%22guid%22%3A%22C255D9FF78CD46CDA4F76812EA68C350%22%2C%22historyId%22%3A28%2C%22targetId%22%3A%221F5710F55D31707C65DF63B5FE3A3B5A%22%7D"><u>confirmed</u></a> that the attacks were successfully neutralized, without any impact on the availability or integrity of electoral services.</p><blockquote><p><i>“On behalf of the Information Technology and Cybersecurity Service (STISC), the institution technically responsible for ensuring cybersecurity of the electoral process conducted by the Central Electoral Commission of the Republic of Moldova on 28 September, we would like to extend our sincere gratitude for your outstanding support. We truly appreciate the opportunity to use your advanced systems and enterprise licenses during this critical period. Despite facing numerous DDoS attacks, thanks to your effective protection, no service interruptions were experienced, and the public remained unaffected.”</i><b> - STISC Team, Information Technology and Cybersecurity Service, Republic of Moldova</b></p></blockquote><blockquote><p><i>“Cloudflare’s support was essential for Moldova’s parliamentary elections, ensuring uninterrupted access to real-time results for citizens at home and abroad. Their resilient infrastructure allowed us to withstand heavy DDoS attacks and protect the integrity of the democratic process.”</i><b> - Anatolie Golovco, Cybersecurity and Digital Transformation Expert in the Office of the Prime Minister of Moldova</b></p></blockquote>
    <div>
      <h3>Other democracy, media and civic related targets under attack</h3>
      <a href="#other-democracy-media-and-civic-related-targets-under-attack">
        
      </a>
    </div>
    <p>While the Central Election Commission was the primary target, it was not the only one. On September 28, 2025, Cloudflare mitigated hundreds of millions of malicious requests aimed at Moldovan election-related, civil society and news websites. The Commission’s site absorbed the largest share, peaking near 900 million requests in a single day. But it wasn’t alone: a civic participation portal, democracy related services, a relevant broadcaster, and independent news outlets also saw significant DDoS traffic. As the chart shows, these combined attacks created a surge of hostile traffic on election day, showing what seems to be a campaign against both official institutions and public information channels.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6hFSRcCE4XOE8mBlZVhkzv/b1aea52b664ba7ce98eca4acbf60c29c/image5.png" />
          </figure><p>One particularly intense application-layer wave hit a democracy-related parliamentary site, peaking at over 243,000 requests per second.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oIWaWvCNVYHGX2X1h6hyi/cf6993de6edfc481ada9989eec49a4e7/image4.png" />
          </figure><p>These attack patterns mirrored those against the election authority, suggesting a coordinated effort to disrupt both official election processes and the public information channels voters rely on. Cloudflare’s automated protections mitigated these multi-wave attacks in real time, keeping critical information channels available throughout the electoral timeline.</p>
    <div>
      <h3>Securing the democratic process </h3>
      <a href="#securing-the-democratic-process">
        
      </a>
    </div>
    <p>Democracies around the world are increasingly targeted by cyberattacks. Through our <a href="https://www.cloudflare.com/impact/"><u>Impact programs,</u></a> we strive to keep websites vital to democracy — like voter registration sites, election information portals, campaign websites, and news sites — secure and available. From monitoring traffic patterns to mitigating cyberattacks, Cloudflare has observed trends that show the importance of online services during elections and the increasing attacks targeting them.</p><p>In the Moldovan parliamentary elections, the pro-Western governing party won a clear majority, defeating pro-Russian groups. We are proud to have provided services to the Moldovan Central Election Commission in securing the vote, ensuring that citizens—not malicious actors—determined the country's future. To learn more about the Athenian Project, visit:<a href="https://www.cloudflare.com/athenian/"><u> https://www.cloudflare.com/athenian/</u></a></p> ]]></content:encoded>
            <category><![CDATA[Elections]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Moldova]]></category>
            <guid isPermaLink="false">4ewui8C9FvkWIRKHFqEoJ3</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[Exploring Internet traffic shifts and cyber attacks during the 2024 US election]]></title>
            <link>https://blog.cloudflare.com/exploring-internet-traffic-shifts-and-cyber-attacks-during-the-2024-us-election/</link>
            <pubDate>Wed, 06 Nov 2024 08:00:00 GMT</pubDate>
            <description><![CDATA[ Election Day 2024 in the US saw a surge in cyber activity. Cloudflare blocked several DDoS attacks on political and election sites, ensuring no impact. In this post, we analyze these attacks, as well ]]></description>
            <content:encoded><![CDATA[ <p>Elections are not just a matter of casting ballots. They depend on citizens being able to register to vote and accessing information about candidates and the election process, which in turn depend on the strength and security of the Internet. Despite the risks posed by potential cyberattacks aimed to disrupt democracy, Cloudflare did not observe any significant disruptions to campaigns or local government websites from cyberattack.</p><p>Tuesday, November 5, 2024 was <a href="https://en.wikipedia.org/wiki/2024_United_States_presidential_election"><u>Election Day in the United States</u></a>. It not only decided the next president and vice president but also included elections for the US Senate, House of Representatives, state governorships, and state legislatures. Results confirm that Republican Donald Trump won the presidential election.</p><p>In this blog post, we examine online attacks against election-related sites — some of which were notable but none were disruptive — and how initial election results impacted Internet traffic across the US at both national and state levels, with increases in traffic as much as 15% nationwide. We’ll also explore email phishing trends and general DNS data around news interest, the candidates, and election-related activity.</p><p>We’ve been tracking 2024 elections globally through our <a href="https://blog.cloudflare.com/tag/election-security/"><u>blog</u></a> and <a href="https://radar.cloudflare.com/reports/elections-2024"><u>election report on Cloudflare Radar</u></a>, covering some of the more than 60 national elections around the globe this year. At Cloudflare, we support many of these efforts to ensure a secure and trustworthy election process. We worked closely with election officials, government agencies, and civil society groups across the country to ensure that groups working in the election space had the tools they needed to stay online. </p><p>Regarding the US elections, we have previously reported on trends surrounding the first <a href="https://blog.cloudflare.com/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends"><u>Biden vs. Trump debate</u></a>, the <a href="https://blog.cloudflare.com/exploring-internet-traffic-during-the-2024-us-republican-national-convention"><u>attempted assassination of Trump and the Republican National Convention</u></a>, the <a href="https://blog.cloudflare.com/internet-security-trends-2024-us-democratic-convention"><u>Democratic National Convention</u></a>, and the <a href="https://blog.cloudflare.com/how-the-harris-trump-us-presidential-debate-influenced-internet-traffic"><u>Harris-Trump presidential debate</u></a>.</p><p>Key takeaways:</p><ul><li><p>In the 24 hour period from October 31 - November 1, Cloudflare automatically mitigated over 6 billion HTTP DDoS requests that targeted US election-related websites–such as state and local government election sites and political campaigns. There were no significant disruptions to the targeted websites during this time period.</p></li><li><p>The day before the election, DNS traffic to Trump/Republican and Harris/Democrat websites peaked, with daily DNS traffic rising 59% and 4% respectively.</p></li><li><p>On election day, states in the midwest saw the highest traffic growth across the US, as compared to the previous week. </p></li><li><p>Internet traffic in the US peaked after the first polling stations closed, with a 15% increase over the previous week. </p></li><li><p>DNS traffic to news, polling, and election websites also saw large traffic jumps. Polling services were up 756% near poll closures and news sites were up 325% by late evening.</p></li></ul>
    <div>
      <h2>How Cloudflare assists with election infrastructure </h2>
      <a href="#how-cloudflare-assists-with-election-infrastructure">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3tqSzKOhzUbLTgnwfP4cIU/8a433526fab8fbebf0aa3ae8633e78dc/BLOG-2618_2.png" />
          </figure><p>Cloudflare’s goal is to ensure that sites that enable democracy — such as voter registration sites, election information portals, campaign websites, and results reporting platforms — remain secure and accessible, especially under heavy traffic periods or cyberattacks. Through our Impact programs, we provide essential cybersecurity resources to more than 800 websites that work on election infrastructure. </p><ul><li><p><a href="https://www.cloudflare.com/galileo/"><b><u>Project Galileo</u></b></a><b>:</b> Launched in 2014, Project Galileo provides free Business level services to media organizations, human rights defenders and non-profit organizations around the world. We protect more than 65 Internet properties related to elections in the United States that work on a range of topics related to voting rights, promoting free and fair elections, and posting election results. These organizations include <a href="https://www.cloudflare.com/case-studies/voteamerica/"><u>Vote America</u></a>, <a href="https://www.cloudflare.com/case-studies/decision-desk-hq/"><u>Decision Desk HQ</u></a>, <a href="https://www.cloudflare.com/case-studies/us-vote-foundation/"><u>US Vote Foundation</u></a>, and <a href="https://www.cloudflare.com/case-studies/us-vote-foundation/"><u>Electionland</u></a>.</p></li><li><p><a href="https://www.cloudflare.com/athenian/"><b><u>Athenian Project</u></b></a><b>: </b>Launched in 2017, the Athenian Project provides state and local governments that run elections with free Enterprise level services to ensure that voters can access accurate and up-to-date information about voter registration, polling places, and election results without interruption. We currently protect 423 websites in 33 states under the project.</p></li><li><p><a href="https://www.cloudflare.com/campaigns/usa/"><b><u>Cloudflare for Campaigns</u></b></a><b>:</b> Launched in 2020, in partnership with <a href="https://defendcampaigns.org/"><u>Defending Digital Campaigns</u></a>, Cloudflare for Campaigns provides a package of products to address the increasing risks posed by cyberattacks on political campaigns and state parties. We currently protect more than 354 campaigns and 34 state-level political parties in the United States. </p></li></ul><p>Since 2020, we’ve strengthened our partnerships with election officials, government agencies, and nonprofits to provide essential protections. Throughout 2024, we’ve collaborated with <a href="https://www.cisa.gov/"><u>CISA</u></a> (Cybersecurity and Infrastructure Security Agency) and the <a href="https://www.cisa.gov/topics/partnerships-and-collaboration/joint-cyber-defense-collaborative"><u>Joint Cyber Defense Collaborative</u></a>, briefing over 300 election officials on emerging threats and conducting 50+ calls with state and local governments to review security practices. Additionally, we held webinars on cyber threats to election groups and strategies for protecting election infrastructure.</p><p>With Defending Digital Campaigns, we worked to onboard more than 90 campaigns and parties weeks before election day. As part of this, we also worked with political vendors managing campaign infrastructure to provide insight on emerging threats and how to mitigate. Under Project Galileo, we onboarded more than 60 local media and journalism sites reporting on elections to ensure they can provide timely, accurate information on voting processes, candidate platforms, and election results.</p>
    <div>
      <h2>Political and election-related cyber attacks </h2>
      <a href="#political-and-election-related-cyber-attacks">
        
      </a>
    </div>
    <p>As we've seen several times this year, specific DDoS (<a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>Distributed Denial of Service</u></a>) attacks often target political party or candidate websites around election day. While online attacks are frequent and not always election-related, we saw recent DDoS incidents in <a href="https://blog.cloudflare.com/first-round-of-french-election-2024-party-attacks-and-a-modest-traffic-dip"><u>France</u></a>, the <a href="https://blog.cloudflare.com/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts"><u>Netherlands</u></a>, and <a href="https://blog.cloudflare.com/uk-election-day-2024-traffic-trends-and-attacks-on-political-parties"><u>the U.K.</u></a> focused on political parties during election periods. </p><p>In the US, we saw a similar uptick in attacks immediately prior to the election. Cloudflare blocked  cyberattacks targeting websites affiliated with both parties, attempting to take the sites offline. Although some attacks had high volumes of traffic, the targeted websites remained online.</p><p>DDoS attacks targeting US political or elections-related Internet properties in particular clearly picked up starting in September, with the more than 6 billion HTTP DDoS requests seen during the first six days of November exceeding the volume seen during all of September and October.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hYmLIj3qjBvrUxtasPJwy/e247cfbd6c546a52025bbefbfe37d503/BLOG-2618_3.png" />
          </figure><p> </p><p>Some campaign websites drove most of the malicious HTTP request traffic as part of DDoS attacks, with a clear increase since October 1, compared to minimal DDoS activity earlier in 2024. </p><p>Let’s look at a few examples of specific DDoS attacks, as these are easier to track.</p>
    <div>
      <h3>High-profile campaign website, October 29 - November 6 </h3>
      <a href="#high-profile-campaign-website-october-29-november-6">
        
      </a>
    </div>
    <p>Cloudflare blocked a series of DDoS attacks targeting a high-profile campaign website. The attacks began on October 29, with a four-minute spike reaching 345,000 requests per second. On October 31, more intense attacks followed, with the first lasting over an hour, peaking at 213,000 requests per second. Hours later, on November 1, a larger attack reached 700,000 requests per second, followed by two more waves at 311,000 and 205,000 requests per second.</p><p>Over 16 hours, Cloudflare blocked more than 6 billion malicious HTTP requests between October 31 and November 1. Additional attacks continued on November 3, with peaks at 200,000 requests per second (rps); on November 4, at 352,000; on Election Day, November 5, at 271,000 around 14:33 ET (11:33 PT); and on November 6, at 108,000.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7a7BGcwhBRbIppTPwGeMEM/70a460bbb3a37db416bf991324f79773/BLOG-2618_4.png" />
          </figure><p>Our data shows that the attacker(s) randomized user agents, attempted cache-busting techniques (methods to bypass cached content and overload servers with unique requests), and employed a geodiverse approach.</p><p>The DDoS attack on November 1 reached peak bandwidth of over 16 Gbps sent to Cloudflare and maintained over 8 Gbps throughout the main attack, which lasted more than two hours.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WVwTuYycGskegN4Bj6GyC/e0d0a39516f2097fa98e1c6d9771244f/BLOG-2618_5.png" />
          </figure>
    <div>
      <h3>US campaign infrastructure website, November 3</h3>
      <a href="#us-campaign-infrastructure-website-november-3">
        
      </a>
    </div>
    <p>Attackers also expanded their attacks beyond campaign sites, to political parties and their infrastructure, attempting — unsuccessfully — to disrupt services.  For example, on November 3, 2024, a DDoS attack targeted infrastructure associated with a major campaign, lasting two minutes and reaching 260,000 malicious HTTP requests per second. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QEogge3prSiTXFHHV9SZx/752b1ffda3d559c577c0fc8110bb00d7/BLOG-2618_7.png" />
          </figure>
    <div>
      <h3>US state political party, October 29</h3>
      <a href="#us-state-political-party-october-29">
        
      </a>
    </div>
    <p>On October 29, 2024, a high-volume DDoS attack targeted a U.S. political party website from a specific state. The attack lasted over four hours, from 12:00 to 17:29 ET (09:00 to 14:29 PT), and peaked at 206,000 requests per second. In total, over 2 billion malicious HTTP requests were blocked that day as part of this DDoS attack.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5zE45tcuR8ejFHGdNddc7L/ed8093200c0a1a571a2f8f665dc9edd6/BLOG-2618_8.png" />
          </figure><p>The same method used in the November 1 attack on one of the main campaign websites, mentioned above, was also used in this case. Here, the DDoS attack reached a peak of 5.7 Gbps sent to Cloudflare by the attacker, and sustained over 3 Gbps for most of its four-and-a-half-hour duration.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2v9kxcUtFVGQFwzJU6XkOp/390188c9f24fda8b89cbf020d4d89d87/BLOG-2618_9.png" />
          </figure>
    <div>
      <h3>US counties as a target, September 13</h3>
      <a href="#us-counties-as-a-target-september-13">
        
      </a>
    </div>
    <p>Since September, US state and local websites protected by Cloudflare under the Athenian Project have experienced increased DDoS attacks, particularly targeting specific counties. These types of sites have seen over 290 million malicious HTTP requests since September 1, with 4% of all requests blocked as threats. These attacks were less frequent and intense than those on US political campaigns infrastructure. </p><p>On September 13, 2024, a DDoS attack targeted a county website from 19:29 UTC to 22:32 UTC (15:29 to 18:32 ET), lasting three hours and peaking at 46,000 of malicious HTTP requests per second.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/8S5AmvI1llskUuUiZ3JvR/6cb636695b8682170bd8e2f1f7bece7b/BLOG-2618_10.png" />
          </figure><p>These rates of DDoS attacks are already significant, even more so when we compare it with the 2020 US presidential election. In 2020, we <a href="https://blog.cloudflare.com/2020-us-election-cybersecurity-analysis/"><u>saw</u></a> more varied blocked cyberattack HTTP requests, split between WAF (Web Application Firewall) and firewall rules, and DDoS attacks. There were also significantly fewer blocked requests related to DDoS and WAF, with nearly 100 million in the whole month of October 2020 and close to 25 million in November 2020, the month of the election. In contrast, during November 1-6, 2024, alone, we observed over 6 billion malicious HTTP requests in DDoS attacks targeting campaigns.</p><p>It’s also important to note that even smaller attacks can be devastating for websites not well-protected against such high levels of traffic. DDoS attacks not only overwhelm systems but also serve, if successful, as a <a href="https://cloudflare.tv/shows/this-week-in-net/d-do-s-report-certificate-changes-qr-phishing-and-more/oZK6nra4"><u>distraction for IT teams</u></a> while attackers attempt other types of breaches.</p>
    <div>
      <h2>Internet traffic in the US grows after polls closed</h2>
      <a href="#internet-traffic-in-the-us-grows-after-polls-closed">
        
      </a>
    </div>
    <p>Generally, <a href="https://blog.cloudflare.com/tag/election-security"><u>election days</u></a> do not lead to drastic changes in Internet traffic. Traffic usually slightly dips during voting hours, though not as sharply as on national holidays, and rises in the evening as results are announced. </p><p>In the US, a similar pattern was observed on November 5, 2024, with increased Internet traffic at night. However, traffic throughout the day was generally 6% higher than the previous week, starting as early as 09:15 ET (06:15 PT). This may also be because, unlike in other countries, Election Day in the US is on a weekday rather than a weekend and is not a national holiday. Internet traffic peaked after the first polls closed, around 21:15 ET (18:15 PT), as TV news stations displayed countdown clocks. At that moment, traffic was 15% higher than the previous week.</p><p><i>Note: The previous 7 days line that appears in the next chart is one hour behind due to the Daylight Saving Time change over the weekend in the US. All growth calculations in this post take that change into account.</i></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4gShhxZxAddFNz0pBRHR0s/ecb6986c4665410f55988b2045d2362c/BLOG-2618_11.png" />
          </figure><p>The biggest spike in traffic growth (compared to the previous week) of Election Day occurred at around 01:30 am ET (22:30 PT), when <a href="https://x.com/PpollingNumbers/status/1854046880574980484"><u>projections</u></a> began to favor Trump for the presidential victory and <a href="https://x.com/FoxNews/status/1854046899155660983"><u>Fox News</u></a> called Pennsylvania in his favor, with traffic rising 32% compared to the previous week. Later, during Donald Trump's speech between 02:30 and 02:45 am ET (23:30 and 23:45 PT), Internet traffic was 31% higher than the previous week. </p><p>On Election Day, daily Internet traffic in the US reached its highest level of 2024 in terms of requests, showing a 6% increase compared to the previous week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7bTq4tRaszFIMNXTLwgWPw/6aa76a2986bb474a042fc72c6188bc53/BLOG-2618_12.png" />
          </figure><p>As expected for a typical election day, considering what we observed in other countries, the share of traffic from mobile devices was also slightly higher on Election Day at 43%, compared to 42% the previous week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5kKIYDj8eglPtj0zffHXOA/76c7367b1e7af4abe2f74b712834fb00/BLOG-2618_13.png" />
          </figure>
    <div>
      <h3>State-level traffic growth peaks at 21:00 ET (18:00 PT) </h3>
      <a href="#state-level-traffic-growth-peaks-at-21-00-et-18-00-pt">
        
      </a>
    </div>
    <p>State-level traffic shifts on Election Day, compared to the previous week, reveal more detail than country-level data. The map below highlights the biggest traffic changes, peaking at 21:00 ET (18:00 PT) after polling stations began to close. Notably, traffic increased nationwide and at the state level on Election Day, unlike during the two-hour presidential debates, which were broadcast on nationwide TV.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GyyxpTCD4ADVIk21R2pOQ/03ea8617b81cd317d14afa17cdd680e1/BLOG-2618_14.png" />
          </figure><p>The most significant traffic increases were observed in Maine (44%), South Dakota (44%), and Montana (44%). Interestingly, central states saw higher percentages of Internet traffic growth than coastal ones. More populous states, such as California (8%), Texas (19%), New York (22%), and Florida (23%), also experienced notable traffic increases.</p><p>The seven swing states that are <a href="https://www.bbc.com/news/articles/c511pyn3xw3o"><u>considered</u></a> to have been decisive in the election — Georgia, Michigan, Nevada, North Carolina, Pennsylvania, and Wisconsin (we’re not considering Arizona due to data issues) — each saw traffic growth between 17% and 36%. Here’s a more focused view of those swing states for easier consumption:</p><table><tr><td><p><b>State</b></p></td><td><p><b>Growth in traffic</b></p></td><td><p><b>Local time 
(in each state)</b></p></td></tr><tr><td><p>Georgia</p></td><td><p>25%</p></td><td><p>21:15</p></td></tr><tr><td><p>Michigan</p></td><td><p>34%</p></td><td><p>21:15</p></td></tr><tr><td><p>Nevada</p></td><td><p>17%</p></td><td><p>18:15</p></td></tr><tr><td><p>North Carolina</p></td><td><p>14%</p></td><td><p>21:15</p></td></tr><tr><td><p>Pennsylvania</p></td><td><p>33%</p></td><td><p>21:15</p></td></tr><tr><td><p>Wisconsin</p></td><td><p>36%</p></td><td><p>20:15</p></td></tr></table>
    <div>
      <h2>DNS trends: from news outlets to polling services</h2>
      <a href="#dns-trends-from-news-outlets-to-polling-services">
        
      </a>
    </div>
    <p>Switching our focus to domain trends, our <a href="http://1.1.1.1/"><u>1.1.1.1</u></a> resolver DNS data reveals a clear impact during the US elections when analyzing specific categories.</p><p>Analysis of DNS traffic for <b>US news media outlets</b> shows that traffic from the United States rose significantly right after 09:00 ET (06:00 PT), increasing around 15%, compared to the previous week. Traffic continued to climb throughout the day, peaking between 22:00 and 23:00 ET (19:00 and 20:00 PT) with DNS request traffic volume 325% higher than the previous week. There was also a brief spike on Wednesday, November 6, at 05:00 ET (02:00 PT), showing a 117% increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3eoBJOHz37gSZYFdbuapSY/c5fe40345d841ebb5ed69ed4c7f67a8a/BLOG-2618_15.png" />
          </figure><p>We observed significantly higher DNS traffic for <b>polling services </b>websites — websites of platforms or organizations that conduct and publish polls — on Election Day, peaking at 13:00 ET (10:00 PT) with a 206% increase from the previous week, and again at 22:00 ET (19:00 PT), after the polls started to close, with a 756% increase. Daily traffic to this category was up 145% on Election Day, and 36% the day prior.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1IOBseQF9hWO2vLGCUOu2A/b6f0b628b23ea1d82f1d98667706ab00/BLOG-2618_16.png" />
          </figure><p><b>Election and voting information-related </b>websites also saw a notable rise in DNS traffic around Election Day. Traffic clearly began to increase the day before the election, and peaked on November 5, 2024, at 12:00 ET (09:00 PT), with a 313% increase from the previous week. Daily traffic was 139% higher on Election Day, and 68% higher the day before.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gXUO3FvfuPf9QvUrJ7C7a/c2eaf29a518306b2f783ecd1847edae9/BLOG-2618_17.png" />
          </figure><p>Social media sites/applications, especially <b>microblogging platforms</b> like X and Threads, were also impacted during Election Day. DNS traffic for these microblogging platforms peaked at 22:00 ET (19:00 PT), aligning with spikes for news organizations and polling services, showing a 91% increase compared to the previous week. In this microblogging category, daily DNS traffic on Election Day rose by 12% from the previous week.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2LUkx7e6abYPbqWH9vpXs1/bd9da044ebafafffa22d22fbf26e34f3/BLOG-2618_18.png" />
          </figure><p>Regarding the two main presidential candidates, DNS traffic for their websites and their parties’ websites was much higher the day before the election than on Election Day. On November 4, 2024, daily DNS traffic to <b>Trump and Republican</b> websites was up 59% compared to the previous week, while traffic to <b>Harris and Democrat</b> websites, which had a more significant increase in DNS traffic the previous week, rose by 4%. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3jZy22GPey40FDg3gxjBg1/a99412b55d6b032117051d6f3f1f38f3/BLOG-2618_19.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2sDIbWHfRmyt0vqifwl72F/4f61cf9c1d5186cde5e611ec2f9a3028/BLOG-2618_20.png" />
          </figure>
    <div>
      <h2>Candidate-related email phishing trends</h2>
      <a href="#candidate-related-email-phishing-trends">
        
      </a>
    </div>
    <p>From a cybersecurity perspective, trending <a href="https://blog.cloudflare.com/paris-2024-olympics-recap"><u>events</u></a>, topics, and individuals often attract more emails, including malicious, phishing, and spam messages. Our <a href="https://blog.cloudflare.com/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends"><u>earlier</u></a> analysis covered email trends involving “Joe Biden” and “Donald Trump” since January. We’ve since updated it to include Kamala Harris after the <a href="https://blog.cloudflare.com/internet-security-trends-2024-us-democratic-convention/"><u>Democratic Convention</u></a> and the <a href="https://blog.cloudflare.com/how-the-harris-trump-us-presidential-debate-influenced-internet-traffic/"><u>Harris-Trump debate</u></a>.</p><p>From June 1 through November 4, 2024, <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare’s Cloud Email Security</u></a> service processed over 19 million emails with “Donald Trump” or “Kamala Harris” in the subject line — 13.9 million for Trump and 5.3 million for Harris. Nearly half of these emails (49%) were sent since September. In the last 10 days of the campaign (since October 24), Harris was named in 800,000 email subject lines and Trump in 1.3 million.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21O0KXy0aKPf5zX8KI186y/60c89b6c9d0cedc8f2791943fc50f2ff/BLOG-2618_21.png" />
          </figure><p>Since June 1, 12% of emails mentioning Trump were marked as spam, and 1.3% were flagged as malicious or phishing. This rate has dropped since September 1, with only 3% marked as spam and 0.3% as malicious. For emails mentioning Harris, the rates were lower: 0.6% were marked as spam and 0.2% as malicious since June, increasing slightly to 1.2% spam and 0.2% malicious since September 1. Trump was mentioned more frequently in email subjects than Harris and was found in higher overall percentages of spam and malicious emails.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MeF2avFWsQhJiq1emyBtr/2e9f3b785c1bed52394b52f720f8c84b/BLOG-2618_22.png" />
          </figure>
    <div>
      <h2>Conclusion: keeping track of elections</h2>
      <a href="#conclusion-keeping-track-of-elections">
        
      </a>
    </div>
    <p>Although Cloudflare observed a notable increase in DDoS attacks on political and election-related sites, blocking billions of malicious requests, these attacks resulted in no significant disruption due to planning and proactive defenses. We share the Cybersecurity and Infrastructure Security Agency’s <a href="https://www.cisa.gov/news-events/news/statement-cisa-director-easterly-security-2024-elections"><u>view</u></a> that “our election infrastructure has never been more secure” and concur with their conclusion that  “We have no evidence of any malicious activity that had a material impact on the security or integrity of our election infrastructure." Keeping our elections secure and resilient is critical to the functioning of democracy, and Cloudflare is proud to have played our part. </p><p>If you want to follow more trends and insights about the Internet and elections in particular, you can check <a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a>, and more specifically our new <a href="https://radar.cloudflare.com/reports/elections-2024"><u>2024 Elections Insights</u></a> report, which will be updated as elections take place throughout the year.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Elections]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Cloudflare for Campaigns]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">1YyA4YHY9p5HoeHCrgO3L5</guid>
            <dc:creator>João Tomé</dc:creator>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[The backbone behind Cloudflare’s Connectivity Cloud]]></title>
            <link>https://blog.cloudflare.com/backbone2024/</link>
            <pubDate>Tue, 06 Aug 2024 14:00:00 GMT</pubDate>
            <description><![CDATA[ Read through the latest milestones and expansions of Cloudflare's global backbone and how it supports our Connectivity Cloud and our services ]]></description>
            <content:encoded><![CDATA[ <p>The modern use of "cloud" arguably traces its origins to the cloud icon, omnipresent in network diagrams for decades. A cloud was used to represent the vast and intricate infrastructure components required to deliver network or Internet services without going into depth about the underlying complexities. At Cloudflare, we embody this principle by providing critical infrastructure solutions in a user-friendly and easy-to-use way. Our logo, featuring the cloud symbol, reflects our commitment to simplifying the complexities of Internet infrastructure for all our users.</p><p>This blog post provides an update about our infrastructure, focusing on our global backbone in 2024, and highlights its benefits for our customers, our competitive edge in the market, and the impact on our mission of helping build a better Internet. Since the time of our last backbone-related <a href="http://blog.cloudflare.com/cloudflare-backbone-internet-fast-lane">blog post</a> in 2021, we have increased our backbone capacity (Tbps) by more than 500%, unlocking new use cases, as well as reliability and performance benefits for all our customers.</p>
    <div>
      <h3>A snapshot of Cloudflare’s infrastructure</h3>
      <a href="#a-snapshot-of-cloudflares-infrastructure">
        
      </a>
    </div>
    <p>As of July 2024, Cloudflare has data centers in 330 cities across more than 120 countries, each running Cloudflare equipment and services. The goal of delivering Cloudflare products and services everywhere remains consistent, although these data centers vary in the number of servers and amount of computational power.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/38RRu7BaumWFemL23JcFLW/fd1e4aced5095b1e04384984c88e48be/BLOG-2432-2.png" />
          </figure><p></p><p>These data centers are strategically positioned around the world to ensure our presence in all major regions and to help our customers comply with local regulations. It is a programmable smart network, where your traffic goes to the best data center possible to be processed. This programmability allows us to keep sensitive data regional, with our <a href="https://www.cloudflare.com/data-localization/">Data Localization Suite solutions</a>, and within the constraints that our customers impose. Connecting these sites, exchanging data with customers, public clouds, partners, and the broader Internet, is the role of our network, which is managed by our infrastructure engineering and network strategy teams. This network forms the foundation that makes our products lightning fast, ensuring our global reliability, security for every customer request, and helping customers comply with <a href="https://www.cloudflare.com/the-net/building-cyber-resilience/challenges-data-sovereignty/">data sovereignty requirements</a>.</p>
    <div>
      <h3>Traffic exchange methods</h3>
      <a href="#traffic-exchange-methods">
        
      </a>
    </div>
    <p>The Internet is an interconnection of different networks and separate <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">autonomous systems</a> that operate by exchanging data with each other. There are multiple ways to exchange data, but for simplicity, we'll focus on two key methods on how these networks communicate: Peering and IP Transit. To better understand the benefits of our global backbone, it helps to understand these basic connectivity solutions we use in our network.</p><ol><li><p><b>Peering</b>: The voluntary interconnection of administratively separate Internet networks that allows for traffic exchange between users of each network is known as “<a href="https://www.netnod.se/ix/what-is-peering">peering</a>”. Cloudflare is one of the <a href="https://bgp.he.net/report/exchanges#_participants">most peered networks</a> globally. We have peering agreements with ISPs and other networks in 330 cities and across all major </p><p><a href="https://www.cloudflare.com/learning/cdn/glossary/internet-exchange-point-ixp/">Internet Exchanges (IX’s)</a>. Interested parties can register to <a href="https://www.cloudflare.com/partners/peering-portal/">peer with us</a> anytime, or directly connect to our network with a link through a <a href="https://developers.cloudflare.com/network-interconnect/pni-and-peering/">private network interconnect (PNI)</a>.</p></li><li><p><b>IP transit</b>: A paid service that allows traffic to cross or "transit" somebody else's network, typically connecting a smaller Internet service provider (ISP) to the larger Internet. Think of it as paying a toll to access a private highway with your car.</p></li></ol><p>The backbone is a dedicated high-capacity optical fiber network that moves traffic between Cloudflare’s global data centers, where we interconnect with other networks using these above-mentioned traffic exchange methods. It enables data transfers that are more reliable than over the public Internet. For the connectivity within a city and long distance connections we manage our own dark fiber or lease wavelengths using Dense Wavelength Division Multiplexing (DWDM). DWDM is a fiber optic technology that enhances network capacity by transmitting multiple data streams simultaneously on different wavelengths of light within the same fiber. It’s like having a highway with multiple lanes, so that more cars can drive on the same highway. We buy and lease these services from our global carrier partners all around the world.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1RgjDtW5LehGZEYXey4AQH/cfef08965313f67c84a052e0541fc42b/BLOG-2432-3.png" />
          </figure><p></p>
    <div>
      <h3>Backbone operations and benefits</h3>
      <a href="#backbone-operations-and-benefits">
        
      </a>
    </div>
    <p>Operating a global backbone is challenging, which is why many competitors don’t do it. We take this challenge for two key reasons: traffic routing control and cost-effectiveness.</p><p>With IP transit, we rely on our transit partners to carry traffic from Cloudflare to the ultimate destination network, introducing unnecessary third-party reliance. In contrast, our backbone gives us full control over routing of both internal and external traffic, allowing us to manage it more effectively. This control is crucial because it lets us optimize traffic routes, usually resulting in the lowest latency paths, as previously mentioned. Furthermore, the cost of serving large traffic volumes through the backbone is, on average, more cost-effective than IP transit. This is why we are doubling down on backbone capacity in regions such as Frankfurt, London, Amsterdam, and Paris and Marseille, where we see continuous traffic growth and where connectivity solutions are widely available and competitively priced.</p><p>Our backbone serves both internal and external traffic. Internal traffic includes customer traffic using our security or performance products and traffic from Cloudflare's internal systems that shift data between our data centers. <a href="http://blog.cloudflare.com/introducing-regional-tiered-cache">Tiered caching</a>, for example, optimizes our caching delivery by dividing our data centers into a hierarchy of lower tiers and upper tiers. If lower-tier data centers don’t have the content, they request it from the upper tiers. If the upper tiers don’t have it either, they then request it from the origin server. This process reduces origin server requests and improves cache efficiency. Using our backbone to transport the cached content between lower and upper-tier data centers and the origin is often the most cost-effective method, considering the scale of our network. <a href="https://www.cloudflare.com/network-services/products/magic-transit/">Magic Transit</a> is another example where we attract traffic, by means of BGP anycast, to the Cloudflare data center closest to the end user and implement our DDoS solution. Our backbone transports the clean traffic to our customer’s data center, which they connect through a <a href="http://blog.cloudflare.com/cloudflare-network-interconnect">Cloudflare Network Interconnect (CNI)</a>.</p><p>External traffic that we carry on our backbone can be traffic from other origin providers like AWS, Oracle, Alibaba, Google Cloud Platform, or Azure, to name a few. The origin responses from these cloud providers are transported through peering points and our backbone to the Cloudflare data center closest to our customer. By leveraging our backbone we have more control over how we backhaul this traffic throughout our network, which results in more reliability and better performance and less dependency on the public Internet.</p><p>This interconnection between public clouds, offices, and the Internet with a controlled layer of performance, security, programmability, and visibility running on our global backbone is our <a href="http://blog.cloudflare.com/welcome-to-connectivity-cloud">Connectivity Cloud</a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Fk6k5NOgfOM3qpK0z3wb0/2fe9631dbe6b2dfc6b3c3cd0156f293e/Screenshot_2024-08-28_at_3.21.50_PM.png" />
          </figure><p><sub><i>This map is a simplification of our current backbone network and does not show all paths</i></sub></p><p></p>
    <div>
      <h3>Expanding our network</h3>
      <a href="#expanding-our-network">
        
      </a>
    </div>
    <p>As mentioned in the introduction, we have increased our backbone capacity (Tbps) by more than 500% since 2021. With the addition of sub-sea cable capacity to Africa, we achieved a big milestone in 2023 by completing our global backbone ring. It now reaches six continents through terrestrial fiber and subsea cables.</p><p>Building out our backbone within regions where Internet infrastructure is less developed compared to markets like Central Europe or the US has been a key strategy for our latest network expansions. We have a shared goal with regional ISP partners to keep our data flow localized and as close as possible to the end user. Traffic often takes inefficient routes outside the region due to the lack of sufficient local peering and regional infrastructure. This phenomenon, known as traffic tromboning, occurs when data is routed through more cost-effective international routes and existing peering agreements.</p><p>Our regional backbone investments in countries like India or Turkey aim to reduce the need for such inefficient routing. With our own in-region backbone, traffic can be directly routed between in-country Cloudflare data centers, such as from Mumbai to New Delhi to Chennai, reducing latency, increasing reliability, and helping us to provide the same level of service quality as in more developed markets. We can control that data stays local, supporting our Data Localization Suite (<a href="https://www.cloudflare.com/data-localization/">DLS</a>), which helps businesses comply with regional data privacy laws by controlling where their data is stored and processed.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4WCNB78y1jHHsid46pBZOo/e950ced1e510cb8caeea0961c43ea8a0/BLOG-2432-5.png" />
          </figure><p></p>
    <div>
      <h3>Improved latency and performance</h3>
      <a href="#improved-latency-and-performance">
        
      </a>
    </div>
    <p>This strategic expansion has not only extended our global reach but has also significantly improved our overall latency. One illustration of this is that since the deployment of our backbone between Lisbon and Johannesburg, we have seen a major performance improvement for users in Johannesburg. Customers benefiting from this improved latency can be, for example, a financial institution running their APIs through us for real-time trading, where milliseconds can impact trades, or our <a href="https://www.cloudflare.com/network-services/products/magic-wan/">Magic WAN</a> users, where we facilitate site-to-site connectivity between their branch offices.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1o0H8BNLf5ca8BBx38Q5Ee/5b22f7c0ad1c5c49a67bc5149763e81d/BLOG-2432-6.png" />
          </figure><p></p><p>The table above shows an example where we measured the round-trip time (RTT) for an uncached origin fetch, from an end-user in Johannesburg to various origin locations, comparing our backbone and the public Internet. By carrying the origin request over our backbone, as opposed to IP transit or peering, local users in Johannesburg get their content up to 22% faster. By using our own backbone to long-haul the traffic to its final destination, we are in complete control of the path and performance. This improvement in latency varies by location, but consistently demonstrates the superiority of our backbone infrastructure in delivering high performance connectivity.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ZEEZJERWQ2UB1sdTjWUtM/f90b11507ab24edbf84e9b4cfb9b1155/BLOG-2432-7.png" />
          </figure><p></p>
    <div>
      <h3>Traffic control</h3>
      <a href="#traffic-control">
        
      </a>
    </div>
    <p>Consider a navigation system using 1) GPS to identify the route and 2) a highway toll pass that is valid until your final destination and allows you to drive straight through toll stations without stopping. Our backbone works quite similarly.</p><p>Our global backbone is built upon two key pillars. The first is BGP (<a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/">Border Gateway Protocol</a>), the routing protocol for the Internet, and the second is Segment Routing MPLS (<a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">Multiprotocol label switching</a>), a technique for steering traffic across predefined forwarding paths in an IP network. By default, Segment Routing provides end-to-end encapsulation from ingress to egress routers where the intermediate nodes execute no route lookup. Instead, they forward traffic across an end-to-end virtual circuit, or tunnel, called a label-switched path. Once traffic is put on a label-switched path, it cannot detour onto the public Internet and must continue on the predetermined route across Cloudflare’s backbone. This is nothing new, as many networks will even run a “BGP Free Core” where all the route intelligence is carried at the edge of the network, and intermediate nodes only participate in forwarding from ingress to egress.</p><p>While leveraging Segment Routing Traffic Engineering (SR-TE) in our backbone, we can automatically select paths between our data centers that are optimized for latency and performance. Sometimes the “shortest path” in terms of routing protocol cost is not the lowest latency or highest performance path.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6QettBytPdJxacwVLVHYFN/de95a8e5a67514e64931fbe4d26967b6/BLOG-2432-8.png" />
          </figure>
    <div>
      <h3>Supercharged: Argo and the global backbone</h3>
      <a href="#supercharged-argo-and-the-global-backbone">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/lp/pg-argo-smart-routing/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=ao-fy-pay-gbl_en_native-applications-ge-ge-general-core_paid_apo_argo&amp;utm_content=argo&amp;utm_term=cloudflare+argo&amp;campaignid=71700000092259497&amp;adgroupid=58700007751943324&amp;creativeid=666481290143&amp;&amp;_bt=666481290143&amp;_bk=cloudflare%20argo&amp;_bm=e&amp;_bn=g&amp;_bg=138787490550&amp;_placement=&amp;_target=&amp;_loc=1017825&amp;_dv=c&amp;awsearchcpc=1&amp;gad_source=1&amp;gclid=Cj0KCQjwvb-zBhCmARIsAAfUI2uj2VOkHjvM2qspAfBodOROAH_bG040P6bjvQeEbVwFF1qwdEKLXLkaAllMEALw_wcB&amp;gclsrc=aw.ds">Argo Smart Routing</a> is a service that uses Cloudflare’s portfolio of backbone, transit, and peering connectivity to find the most optimal path between the data center where a user’s request lands and your back-end origin server. Argo may forward a request from one Cloudflare data center to another on the way to an origin if the performance would improve by doing so. <a href="http://blog.cloudflare.com/orpheus-saves-internet-requests-while-maintaining-speed">Orpheus</a> is the counterpart to Argo, and routes around degraded paths for all customer origin requests free of charge. Orpheus is able to analyze network conditions in real-time and actively avoid reachability failures. Customers with Argo enabled get optimal performance for requests from Cloudflare data centers to their origins, while Orpheus provides error self-healing for all customers universally. By mixing our global backbone using Segment Routing as an underlay with <a href="https://www.cloudflare.com/application-services/products/argo-smart-routing/">Argo Smart Routing</a> and Orpheus as our connectivity overlay, we are able to transport critical customer traffic along the most optimized paths that we have available.</p><p>So how exactly does our global backbone fit together with Argo Smart Routing? <a href="http://blog.cloudflare.com/argo-and-the-cloudflare-global-private-backbone">Argo Transit Selection</a> is an extension of Argo Smart Routing where the lowest latency path between Cloudflare data center hops is explicitly selected and used to forward customer origin requests. The lowest latency path will often be our global backbone, as it is a more dedicated and private means of connectivity, as opposed to third-party transit networks.</p><p>Consider a multinational Dutch pharmaceutical company that relies on Cloudflare's network and services with our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE solution</a> to connect their global offices, research centers, and remote employees. Their Asian branch offices depend on Cloudflare's security solutions and network to provide secure access to important data from their central data centers back to their offices in Asia. In case of a cable cut between regions, our network would automatically look for the best alternative route between them so that business impact is limited.</p><p>Argo measures every potential combination of the different provider paths, including our own backbone, as an option for reaching origins with smart routing. Because of our vast interconnection with so many networks, and our global private backbone, Argo is able to identify the most performant network path for requests. The backbone is consistently one of the lowest latency paths for Argo to choose from.</p><p>In addition to high performance, we care greatly about network reliability for our customers. This means we need to be as resilient as possible from fiber cuts and third-party transit provider issues. During a disruption of the <a href="https://en.wikipedia.org/wiki/AAE-1">AAE-1</a> (<a href="https://www.submarinecablemap.com/submarine-cable/asia-africa-europe-1-aae-1">Asia Africa Europe-1</a>) submarine cable, this is what Argo saw between Singapore and Amsterdam across some of our transit provider paths vs. the backbone.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66CGBePnLzuLRuTErvf8Cr/813b4b60a95935491e967214851e5a04/BLOG-2432-9.png" />
          </figure><p>The large (purple line) spike shows a latency increase on one of our third-party IP transit provider paths due to congestion, which was eventually resolved following likely traffic engineering within the provider’s network. We saw a smaller latency increase (yellow line) over other transit networks, but still one that is noticeable. The bottom (green) line on the graph is our backbone, where round-trip time more or less remains flat throughout the event, due to our diverse backbone connectivity between Asia and Europe. Throughout the fiber cut, we remained stable at around 200ms between Amsterdam and Singapore. There was no noticeable network hiccup as was seen on the transit provider paths, so Argo actively leveraged the backbone for optimal performance.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1A8CdaGq8P2hF3DtIs9dQI/a10fdf3af9de917fb0036d38eace9905/BLOG-2432-10.png" />
          </figure>
    <div>
      <h3>Call to action</h3>
      <a href="#call-to-action">
        
      </a>
    </div>
    <p>As Argo improves performance in our network, Cloudflare Network Interconnects (<a href="https://developers.cloudflare.com/network-interconnect/">CNIs</a>) optimize getting onto it. We encourage our Enterprise customers to use our free CNI’s as on-ramps onto our network whenever practical. In this way, you can fully leverage our network, including our robust backbone, and increase overall performance for every product within your Cloudflare Connectivity Cloud. In the end, our global network is our main product and our backbone plays a critical role in it. This way we continue to help build a better Internet, by improving our services for everybody, everywhere.</p><p>If you want to be part of our mission, join us as a Cloudflare network on-ramp partner to offer secure and reliable connectivity to your customers by integrating directly with us. Learn more about our on-ramp partnerships and how they can benefit your business <a href="https://www.cloudflare.com/network-onramp-partners/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Connectivity Cloud]]></category>
            <category><![CDATA[Anycast]]></category>
            <category><![CDATA[Argo Smart Routing]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[BGP]]></category>
            <category><![CDATA[Better Internet]]></category>
            <category><![CDATA[Cloudflare Network]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">WiHZr8Fb6WzdVjo0egsWW</guid>
            <dc:creator>Shozo Moritz Takaya</dc:creator>
            <dc:creator>Bryton Herdes</dc:creator>
        </item>
        <item>
            <title><![CDATA[European Union elections 2024: securing democratic processes in light of new threats]]></title>
            <link>https://blog.cloudflare.com/eu-elections-2024/</link>
            <pubDate>Wed, 05 Jun 2024 13:00:46 GMT</pubDate>
            <description><![CDATA[ Between 6 and 9 June 2024, hundreds of millions of EU citizens will be voting to elect their members of the European Parliament (MEPs). All EU member states have different election processes ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2G6IG6MIi99V0OQWJA5fKw/6c0ae6e9c595ce73cc55895da809fc80/EU-elections-1.png" />
            
            </figure><p>Between June 6-9 2024, hundreds of millions of European Union (EU) citizens will be voting to elect their members of the European Parliament (MEPs). The European elections, held every five years, are one of the biggest democratic exercises in the world. Voters in each of the 27 EU countries will elect a different number of MEPs according to population size and based on a proportional system, and the 720 newly elected MEPs will take their seats in July. All EU member states have different election processes, institutions, and methods, and the security risks are significant, both in terms of cyber attacks but also with regard to influencing voters through disinformation. This makes the task of securing the European elections a particularly complex one, which requires collaboration between many different institutions and stakeholders, including the private sector. Cloudflare is <a href="https://www.cloudflare.com/cybersecurity/">well positioned</a> to support governments and political campaigns in managing large-scale cyber attacks. We have also helped election entities around the world by providing tools and expertise to protect them from attack. Moreover, through the <a href="https://www.cloudflare.com/athenian/">Athenian Project</a>, Cloudflare works with state and local governments in the United States, as well as governments around the world through international nonprofit partners, to provide Cloudflare's highest level of protection for free to ensure that constituents have access to reliable election information.</p>
    <div>
      <h2>Election security in 2024: dealing with new and upcoming threats</h2>
      <a href="#election-security-in-2024-dealing-with-new-and-upcoming-threats">
        
      </a>
    </div>
    <p>Ensuring a free, fair, and open electoral process and securing candidate campaigns is understandably a top priority for the EU institutions, as well as for national governments and cybersecurity agencies across the EU. European authorities have already taken a number of measures to ensure the elections are well-protected. Efforts to coordinate election security measures amongst the EU countries are led by the <a href="https://digital-strategy.ec.europa.eu/en/policies/nis-cooperation-group">NIS Cooperation Group</a>, with the support of the <a href="https://www.enisa.europa.eu/news/safeguarding-eu-elections-amidst-cybersecurity-challenges">EU Agency for Cybersecurity</a> (ENISA), the <a href="https://commission.europa.eu/strategy-and-policy/policies/justice-and-fundamental-rights/eu-citizenship-and-democracy/democracy-and-electoral-rights_en">European Commission</a>, and the <a href="https://www.eeas.europa.eu/sites/default/files/documents/2024/Excerpt%20Elections_2nd%20EEAS%20Report%20on%20FIMI%20Threats.pdf">European External Action Service</a> (the EU’s foreign service).</p><p>The NIS Cooperation Group recently issued an updated <a href="https://www.enisa.europa.eu/news/safeguarding-eu-elections-amidst-cybersecurity-challenges">Compendium</a> on safeguarding the elections amidst cybersecurity challenges, noting that <i>“since the last EU elections in 2019, the elections threat landscape has evolved significantly”.</i> Governments note in particular the impact of Artificial Intelligence (AI), including deep fakes, but also the increased sophistication of threat actors and the trend of “hacktivists-for-hire” as new risks that need to be taken into account. European institutions also highlight today’s geopolitical context, with conflicts in Ukraine and the Middle East impacting cyber threats and foreign influence campaigns in Europe. The European External Action Service analyzed cases of FIMI (<a href="https://www.eeas.europa.eu/sites/default/files/documents/2024/Excerpt%20Elections_2nd%20EEAS%20Report%20on%20FIMI%20Threats.pdf">Foreign Information Manipulation and Interference</a>) during recent national elections in Spain and Poland, and put together suggested plans for governments on how to respond to the various stages of those FIMI campaigns originating from foreign (e.g. non-EU) actors. EU High Representative for Foreign Affairs Josep Borrell said in a <a href="https://www.eeas.europa.eu/eeas/fighting-foreign-interference-protect-our-democracy_en">recent blog post</a> that protecting the election process and more broadly European public debate from malign foreign actors <i>“is a security challenge, which we need to tackle seriously”</i>.</p><p>Some national governments have also <a href="https://www.bmi.bund.de/EN/topics/constitution/electoral-law/european-elections/protecting-european-elections/protecting-european-elections-node.html">warned against</a> the risks of so-called hybrid threats, whereby foreign governments deploy various methods to exert influence on other states, including disinformation campaigns, cyberattacks and espionage. Germany’s Federal Ministry of the Interior <a href="https://www.bmi.bund.de/EN/topics/constitution/electoral-law/european-elections/protecting-european-elections/protecting-european-elections-node.html">notes</a> that <i>“elections are often a catalyst for increased levels of illegitimate activity by foreign governments, because stoking fear and spreading hate can contribute to the polarization of society, influencing voting habits. (...) We must make a determined effort to counter these threats.”</i></p>
    <div>
      <h2>EU readiness for election season</h2>
      <a href="#eu-readiness-for-election-season">
        
      </a>
    </div>
    <p>As part of national and EU-level coordination amongst governments and agencies to prepare to mitigate threats and risks to the European elections, ENISA supports national governments’ measures to ensure the elections will be secure, including by organizing a <a href="https://www.enisa.europa.eu/news/eu-cybersecurity-exercise-foster-cooperation-secure-free-and-fair-eu-elections">cybersecurity exercise</a> to test the various crisis plans and responses to potential attacks by national and EU level agencies and governments. ENISA has also put together a checklist for authorities in order to raise awareness on specific risks and threats to the election process.</p><p>The European Union has also prepared for other phenomena endangering the security and integrity of the election process, including the spread of disinformation via online platforms. For example, the European Commission recently issued <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_24_1707">strict guidelines</a> for “Very Large Online Platforms” (VLOPs) and “Very Large Search Engines” (VLOSEs) under the EU Digital Services Act on measures to mitigate systemic risks online that may impact the integrity of elections. These large companies will be required to have dedicated staff to monitor for disinformation threats in the 23 official EU languages across the 27 member states, collaborating closely with European cybersecurity authorities. In addition, in line with <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_23_4843">upcoming EU legislation</a> on transparency of political advertising, political ads on large social media platforms should be clearly labeled as such.</p><p>In its 11th <a href="https://www.enisa.europa.eu/news/eu-elections-at-risk-with-rise-of-ai-enabled-information-manipulation">EU Threat Landscape report</a>, published in 2023, ENISA also warned about the risks associated with the rise of AI-enabled information manipulation, including the disruptive impacts of AI chatbots. The European Commission, in its efforts to fight the proliferation of deep fakes and sophisticated voter manipulation tactics through advanced generative AI systems, recently launched <a href="https://digital-strategy.ec.europa.eu/en/news/commission-sends-requests-information-generative-ai-risks-6-very-large-online-platforms-and-2-very#:~:text=The%20Commission%20is%20requesting%20these,manipulation%20of%20services%20that%20can">inquiries</a> into major AI developers and promoted industry pledges in the context of the EU <a href="https://digital-strategy.ec.europa.eu/en/policies/ai-pact">AI Pact</a>.</p>
    <div>
      <h2>The view from Cloudflare: increases in cyber attacks around elections</h2>
      <a href="#the-view-from-cloudflare-increases-in-cyber-attacks-around-elections">
        
      </a>
    </div>
    <p>It is likely that the EU is going to see a trend similar to many other jurisdictions where there have been increases in cyber threats targeting election entities. In the period between November 2022 and August 2023, <a href="/protecting-global-democracy-against-threats-from-emerging-technology/">Cloudflare mitigated</a> 213.78 million threats to government election websites in the United States. That amounts to 703,223 threats mitigated per day on average. There is indeed already evidence that European institutions are subject to increasing attacks.</p><p>In November 2023, the <a href="https://www.politico.eu/article/cyber-attack-european-parliament-website-after-russian-terrorism/">European Parliament website</a> was subject to a large cyber attack. And in March 2024, <a href="https://www.politico.eu/article/french-government-hit-with-cyberattacks-of-unprecedented-intensity/">French government websites</a> faced attacks of “unprecedented intensity,” according to a spokesperson. A few days before the attacks, on February 25, 2024, Cloudflare blocked a significant DDoS attack on a French government website. It reached as much as 420 million requests per hour and lasted for over three hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7jW57aXBllsZAj14ln3Aly/f7524be3f14215f158d9ad29afd71d16/image1.png" />
            
            </figure><p>The <a href="https://www.politico.eu/article/uk-accuses-russia-of-hacking-politicians-and-journali/">UK government</a> warned last year that there were “sustained” cyberattacks against civil society organizations, journalists and public sector groups, as well as phishing attempts directed at British politicians. Most recently, the IT infrastructure of <a href="https://www.reuters.com/technology/cybersecurity/germanys-christian-democratic-party-hit-by-serious-cyberattack-2024-06-01/">German political party CDU</a> was hit by a “serious cyberattack” according to the German Interior Ministry.</p><p>We have also seen that the magnitude of cyber attacks overall is growing every year. As outlined in Cloudflare’s latest <a href="/ddos-threat-report-for-2024-q1">DDoS threat report</a>, published in Q1 2024, Cloudflare’s defense systems automatically mitigated 4.5 million DDoS attacks during that first quarter, representing a 50% year-over-year (YoY) increase. EU governments noted in their 2024 <a href="https://www.enisa.europa.eu/news/safeguarding-eu-elections-amidst-cybersecurity-challenges">Compendium</a> on safeguarding the elections that DDoS attacks <i>“can still be very effective in undermining the public’s trust in the electoral process, especially if affecting its most critical and visible phases – that is the transmission, aggregation and display of voting results”.</i></p><p>However, it is not only an increase in the size of attacks on websites that is keeping election officials up at night. There are often multiple attack vectors that need to be taken into account, and ensuring election processes and public institutions remain secure is a very complicated task. For example, in the three months leading up to the 2022 U.S. midterm elections, <a href="/securing-the-inboxes-of-democracy/">Cloudflare prevented around 150,000 phishing emails</a> targeting campaign officials. ENISA’s latest EU Threat Landscape report, when discussing phishing campaigns, pointed to the risks of AI applied to social engineering (e.g. used for crafting more convincing phishing messages), which can make phishing less costly, easier to scale-up, and more effective. These developments all show how securing voter registration systems, ensuring the integrity of election-related information, and planning effective incident response are necessary as online threats grow more and more sophisticated.</p><p>Securing the democratic process in the digital age requires partnerships between governments, civil society, and the private sector. Cloudflare has helped election entities around the world by providing tools and expertise to protect themselves from cyberattack. For example, in 2020, we <a href="/cloudflares-athenian-project-expands-internationally">partnered</a> with the International Foundation for Electoral Systems to provide Enterprise-level services to six election management bodies, including the Central Election Commission of Kosovo, State Election Commission of North Macedonia, and many local election bodies in Canada.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rHCWCMOTpxNCwrss0SYrb/8f3e838101314a7337aff409a760dbc4/image6.png" />
            
            </figure>
    <div>
      <h2>Impact on Internet traffic</h2>
      <a href="#impact-on-internet-traffic">
        
      </a>
    </div>
    <p>Cloudflare’s global network, which spans more than 120 countries and protects around 20% of all websites, allows us a unique view of the trends and patterns seen in Internet traffic. Some of those trends, including traffic, connection quality, and Internet outages, can be seen in our Internet insights platform, <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>.</p><p>Several of these trends are especially important to watch during election season. Upon deeper analysis, we observed spikes in traffic to websites related to elections, and to news websites, during this time. From data obtained in 2023 through an analysis of US state and local government websites protected under the <a href="https://www.cloudflare.com/athenian/">Athenian Project</a>, as well as US nonprofit organizations that work in voting rights and promoting democracy under <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, and political campaigns and parties under <a href="https://www.cloudflare.com/campaigns/usa/">Cloudflare for Campaigns</a>, Cloudflare <a href="/2024-the-year-of-elections/">observed</a> an increase in traffic to US election and non-profit websites during the run-up to elections, and then a significant spike on election day as seen in the graphs below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3eTYYud81rfX41IXRfrWWh/a96340cfda118dd262c348e9c18b2e72/image5.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/nAuiMdEaAqx2l5uHfm8dX/3954761369a4c0f8f812b3b1faa872ba/image4.png" />
            
            </figure><p>Cloudflare observed similar patterns for election information websites and news media during the first day of the <a href="/elections-france-2022/">2022 French Presidential elections</a> and during the <a href="/how-the-brazilian-presidential-elections-affected-internet-traffic/">Presidential elections in Brazil</a> that same year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7FBQI7VgXXaQ19msbwD73S/13f94e64fde1ed3a01478f26becb628b/image3.png" />
            
            </figure><p><i>DNS traffic to election domains observed through Cloudflare’s 1.1.1.1 resolver in April 2022, during the first round of the French Presidential elections</i></p>
    <div>
      <h2>Coordinated efforts are key</h2>
      <a href="#coordinated-efforts-are-key">
        
      </a>
    </div>
    <p>The protection of election entities and related organizations and institutions is a huge and complex task. As noted, this requires partnerships and collaboration between different actors, both public and private, with specific expertise. The work done by EU governments and agencies to prepare, be ready and collaborate on election security precautions as outlined above is both welcome and necessary in order to ensure free, fair and above all secure elections. This can only ever be a coordinated effort, with both governments and industry working together to ensure a robust response to any threats to the democratic process. For its part, Cloudflare is protecting a number of governmental and political campaign websites across the EU.</p><p>We want to ensure that all groups working to promote democracy around the world have the tools they need to stay secure online. If you work in the election space and need our help, please <a href="https://www.cloudflare.com/election-security/">get in touch</a>. If you are an organization looking for protection under Project Galileo, please visit our website at <a href="https://www.cloudflare.com/galileo/">cloudflare.com/galileo</a>.</p><p>More information about the European Union elections can be found <a href="https://elections.europa.eu/en/">here</a>. And if you are based in the EU, do not forget to vote!</p> ]]></content:encoded>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Politics]]></category>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[Europe]]></category>
            <category><![CDATA[European Union]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">6PR41u7uUwWw8DYLHhgy0m</guid>
            <dc:creator>Petra Arts</dc:creator>
        </item>
        <item>
            <title><![CDATA[2024, the year of elections]]></title>
            <link>https://blog.cloudflare.com/2024-the-year-of-elections/</link>
            <pubDate>Mon, 20 Nov 2023 14:57:35 GMT</pubDate>
            <description><![CDATA[ We want to ensure that all groups working to promote democracy around the world have the tools they need to stay secure online ]]></description>
            <content:encoded><![CDATA[ <p></p><p>2024 is a year of elections, with more than 70 elections scheduled in 40 countries around the world. One of the key pillars of democracy is trust. To that end, ensuring that the Internet is trusted, secure, reliable, and accessible for the public and those working in the election space is critical to any free and fair election.</p><p>Cloudflare has considerable experience in gearing up for elections and identifying how our cyber security tools can be used to help vulnerable groups in the election space. In December 2022, we <a href="/cloudflare-zero-trust-for-galileo-and-athenian/">expanded our product</a> set to include Zero Trust products to assist these groups against new and emerging threats. Over the last few years, we’ve reported on our work in <a href="https://www.cloudflare.com/election-security/">protecting a range of election entities</a> and as we prepare for the 2024 elections, we want to provide insight into attack trends we’ve seen against these groups to understand what to expect in the next year.</p><p>For this blog post, we identified cyber attack trends for a variety of groups in the elections space based in the United States, as many of our <a href="https://www.cloudflare.com/impact/">Cloudflare Impact</a> projects provide services to these groups. These include U.S. state and local government websites protected under the <a href="https://www.cloudflare.com/athenian/">Athenian Project</a>, as well as U.S. nonprofit organizations that work in voting rights and promoting democracy under <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, and political campaigns and parties under <a href="https://www.cloudflare.com/campaigns/usa/">Cloudflare for Campaigns</a>.</p><p>Our main findings:</p><ul><li><p>From November 1, 2022, to August 31, 2023, Cloudflare mitigated 234,740,000 threats to U.S elections groups surveyed.</p></li><li><p>Internet traffic to these websites has steadily increased, up nearly 25% between January 2023 and August 2023.</p></li><li><p>We observed an increase in traffic to political campaign websites during elections, then steadily decreasing traffic until elections in the following year, as shown with the traffic spikes we see during the analyzed time period.</p></li><li><p>HTTP Anomaly remained the top layer 7 attack vector mitigated by the Web Application Firewall, followed by <a href="https://www.cloudflare.com/learning/security/threats/how-to-prevent-sql-injection/">SQL Injection</a>.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uLE1g3fiHfIMldswX5LUa/856ffc9973a5a54f674b59b089b5a7c0/pasted-image-0.png" />
            
            </figure>
    <div>
      <h3>Supporting state and local governments that run elections with the Athenian Project</h3>
      <a href="#supporting-state-and-local-governments-that-run-elections-with-the-athenian-project">
        
      </a>
    </div>
    <p>Under the <a href="https://www.cloudflare.com/athenian/">Athenian Project</a>, Cloudflare provides our highest level of protection to state and local governments in the United States that run elections. As of November 2023, 390 state and local governments in 31 states are protected under the project. Across this cohort, Cloudflare mitigated 213.78 million threats to government election sites between November 1, 2022, and August 31, 2023, an average of 703,223 threats per day.</p><p>On Election Day, November 7, 2022, we saw traffic to state and local government sites increase by more than 500%. Analysis shows that 80% of this traffic was classified as coming from human users, which is expected, as we tend to see an increase in traffic during election time as constituents view their local county board of election sites to identify polling locations and election results.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1FzizZiLPyn28DMdymSHzk/c482f6a58fe2716d96c1ee7b10a67500/pasted-image-0--1-.png" />
            
            </figure><p>We’ve also seen an increase in state and local governments onboarding .gov domains to Cloudflare. In September 2022, The U.S Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) <a href="https://www.meritalk.com/articles/cisa-making-big-changes-to-gov-registration-management/">announced</a> the agency would launch a new .gov <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name-registrar/">registrar</a> with the intent of making it easier for government organizations to set up a .gov website, while also making the domain more secure. We observed that 65% of traffic to Athenian domains is to .gov domains.</p><p>When we look at traffic that was mitigated by Cloudflare’s <a href="https://www.cloudflare.com/application-services/products/waf/">Web Application Firewall</a> (WAF), specifically <a href="https://developers.cloudflare.com/waf/managed-rules/reference/cloudflare-managed-ruleset/">Cloudflare managed rulesets</a>, we see an oscillating traffic pattern identified as HTTP anomalies until a sudden (and seemingly permanent) drop after mid-April 2023. Managed rulesets are pre-configured firewall rules that provide immediate protection against common vulnerabilities. These managed rulesets are created by the Cloudflare security team, provide fast and effective protection for customer applications, and are updated frequently to cover new vulnerabilities and reduce false positives.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/76ceDOevTTDNPppFiLsvpq/5271fd841c846d99b1da64d5fb70e2e0/pasted-image-0--2-.png" />
            
            </figure><p>The managed rules are a great feature, especially for organizations with limited security resources, as they are easy to enable and protect against common vulnerabilities that Cloudflare has identified that have hit thousands of websites. Within the WAF Managed Rules, the top category that we see for mitigations is HTTP Anomaly. HTTP anomalies include such things as malformed method names, null byte characters in headers, non-standard ports, or content length of zero with a POST request.</p><p>We found 76% of traffic that was mitigated by the WAF was HTTP anomalies, followed by <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL Injection (SQLi)</a> at only 8%. There is another pattern seen in <a href="https://www.cloudflare.com/learning/security/threats/cross-site-scripting/">XSS (Cross-Site-Scripting)</a> attempts that are observed every 23rd day of the month. Given this very "strict" pattern, this could be due to an automated attack of some sort.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2u62maAET9CxFRJH0fStwz/aa43044ee617a8fd4cd7c6e6e8a379a3/pasted-image-0--3-.png" />
            
            </figure>
    <div>
      <h3>Supporting political campaigns and state parties with Cloudflare for Campaigns</h3>
      <a href="#supporting-political-campaigns-and-state-parties-with-cloudflare-for-campaigns">
        
      </a>
    </div>
    <p>Cloudflare <a href="/introducing-cloudflare-for-campaigns/">launched</a> Cloudflare for Campaigns in January 2020, in partnership with the nonprofit, nonpartisan organization <a href="https://defendcampaigns.org/">Defending Digital Campaigns</a>. Under the partnership, we protect 70 political campaigns and 20 political parties in the United States. Between November 1, 2022, and August 31, 2023,Cloudflare mitigated 1.83 million threats to political campaign sites, which is an average of 6,019 threats per day.</p><p>When we look at traffic trends for these domains, we see a spike in November 2022 during the midterm elections in the United States, but significantly lower traffic after this time. Overall, interest in these campaign websites appears to be limited only to election times and some months prior.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2HnIBsAl1HUSqOupcHWTMJ/eb8e6fd2770fa28ddb1969a0491edc6e/pasted-image-0--4-.png" />
            
            </figure><p>When we identify traffic that was blocked by Cloudflare, a majority (79%) was blocked by WAF rules. However, this wasn’t all from malicious sources, as some of the rules have been configured by the campaigns themselves to block other types of unwanted traffic. For example, some campaigns block traffic from outside of the United States from accessing the website, which would be classified as a blocked request. As we’ve worked with many campaigns in the past on how to get the most out of <a href="https://www.cloudflare.com/security/">Cloudflare security tools</a>, we think it is a sign of progress that campaigns are setting specific rules that help them mitigate or challenge traffic that they may not want to access the site.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3AZ1Wh1WQF6HSs3mCHeBiG/88c96daa487036bf8a31f5ac648284c7/pasted-image-0--5-.png" />
            
            </figure><p>In addition to the customer-configured rules, these campaign sites are also protected by WAF managed rules (run by Cloudflare), with 47% of mitigated traffic identified as HTTP Anomaly and 30% SQLi.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/71SGH1ZnO6L2atIXfrLtRn/02558281f295ff495a6115ddb1d51bf7/pasted-image-0--6-.png" />
            
            </figure>
    <div>
      <h3>Supporting organizations that promote free and fair elections with Project Galileo</h3>
      <a href="#supporting-organizations-that-promote-free-and-fair-elections-with-project-galileo">
        
      </a>
    </div>
    <p>As part of our analysis we also identified 69 organizations in the United States that are protected under Project Galileo that work on a range of topics related to voting rights and promoting free and fair elections. For those organizations, Cloudflare mitigated 19.13 million threats between November 1, 2022, and August 31, 2023, an average of 62,927 threats per day.</p><p>We saw a spike in traffic during election time in November 2022 and another slight increase in April 2023. During this time, the largest number of blocked requests was mitigated by Cloudflare’s <a href="https://developers.cloudflare.com/waf/tools/security-level/">Security Level</a>. Cloudflare’s Security Level is a security tool that ranks requests based on IP reputation to decide whether to present a <a href="https://developers.cloudflare.com/firewall/cf-firewall-rules/cloudflare-challenges/#managed-challenge-recommended">Managed Challenge</a> page. A managed challenge helps determine whether the request is considered malicious or legitimate. If the visitor passes the challenge, their request is allowed. If they fail, the request will be blocked. Many of these challenges are issued as a result of domains enabling <a href="https://developers.cloudflare.com/fundamentals/reference/under-attack-mode/">Under Attack Mode</a>, which enforces an elevated Security Level to help mitigate <a href="https://www.cloudflare.com/learning/ddos/what-is-layer-7/">layer 7</a> DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sRGuSzSgxPaOD4eYDjuLM/25cbd85457d071c2fdd384f023189b95/pasted-image-0--7-.png" />
            
            </figure><p>For traffic that was mitigated by the WAF, we found the top mitigation categories to be HTTP Anomalies at 48% and SQLi at 25%. Overall, we saw more requests mitigated by Cloudflare’s WAF than traffic that was considered <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/76f9cINSqnE3k8dywRWwvx/3c7510eaf76018b58dc4790774692e93/pasted-image-0--8-.png" />
            
            </figure>
    <div>
      <h3>Taking our elections expertise global</h3>
      <a href="#taking-our-elections-expertise-global">
        
      </a>
    </div>
    <p>In 2021, <a href="/cloudflares-athenian-project-expands-internationally/">we announced our partnership</a> with the <a href="https://www.ifes.org/">International Foundation for Electoral Systems</a> (IFES) to provide our highest level of protection for free to election management bodies (EMBs) around the world. An EMB is an institution responsible for organizing and overseeing elections in a particular jurisdiction with a primary role of ensuring that the electoral process is conducted fairly and transparently. Since beginning our partnership, we’ve provided protection or expertise to 7 election management bodies to support their work in promoting free and fair elections. As part of this, we’ve worked with election commissions in Kosovo and North Macedonia to protect their election infrastructure.</p><blockquote><p>“Security is the cornerstone of any democratic process, and free and fair elections are no exception. Security products like those from Cloudflare become even more critical in an increasingly digital world. With Cloudflare, we have effectively mitigated numerous cyber threats, ensuring citizens uninterrupted access to electoral information in Kosovo. This has significantly fostered trust and transparency in our electoral processes.”- <b>Kreshnik Spahiu</b>Director of the Information Technology Department, Central Election Commission of Kosovo</p></blockquote><p>As we approach 2024 with many elections in newly emerging democracies, we are excited to continue our work with IFES to provide our services and share our expertise to help election groups stay secure online.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7MCVeBMv0gqdYUj3c9sjwx/91c8b3ca75d132c54877bde911567c0f/Screenshot-2023-11-20-at-10.31.41.png" />
            
            </figure>
    <div>
      <h3>Looking toward 2024…</h3>
      <a href="#looking-toward-2024">
        
      </a>
    </div>
    <p>If 2024 is anything like 2023, we should continue to expect irregularities regarding Internet access during elections. We’ve seen this in areas such as Cambodia, where ahead of the 2023 elections, <a href="https://www.voanews.com/a/cambodian-government-blocks-news-sites-before-unopposed-election-/7185151.html">Cambodian officials ordered internet service providers</a> to block website access to three news outlets reporting on the election as a way to control the independent media. In Zimbabwe, a new law known as the <a href="https://www.amnesty.org/en/latest/news/2023/06/zimbabwe-parliaments-passing-of-patriotic-bill-is-a-grave-assault-on-the-human-rights/">Patriotic Bill was passed before the general election</a>, encompassing a wide range of provisions that make it illegal to engage in speech deemed to pose a threat to the nation's sovereignty or vital national interests.</p><p>The last few years contain many examples of how governments have undermined and controlled the flow of information through Internet shutdowns, restricted social media sites during elections, and imposed blocking of websites that report on results. If current trends continue, 2024 will be a pivotal year for online freedoms.</p><p>In light of this, we want to ensure that all groups working to promote democracy around the world have the tools they need to stay secure online. If you work in the election space and need our help, please apply at <a href="https://www.cloudflare.com/election-security/">https://www.cloudflare.com/election-security</a>.</p> ]]></content:encoded>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[USA]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">21tNo8LFzRETvhAxfWeYuZ</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Zero Trust for Project Galileo and the Athenian Project]]></title>
            <link>https://blog.cloudflare.com/cloudflare-zero-trust-for-galileo-and-athenian/</link>
            <pubDate>Mon, 12 Dec 2022 14:05:00 GMT</pubDate>
            <description><![CDATA[ Starting today, we are making the Cloudflare One Zero Trust suite available to teams that qualify for Projects Galileo or Athenian at no cost. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3xL0V1kl7W886W69TxEAJQ/67e0c687a450d7470cb52c558bb67a1c/image1-1.png" />
            
            </figure><p>The organizations served by <a href="https://www.cloudflare.com/galileo/">Projects Galileo</a> and <a href="https://www.cloudflare.com/athenian/">Athenian</a> face the same security challenges as some of the world’s largest companies, but lack the budget to protect themselves. Sophisticated phishing campaigns attempt to compromise user credentials. Bad actors find ways to disrupt connectivity to critical resources. However, the tools to defend against these threats have historically only been available to the largest enterprises.</p><p>We’re excited to help fix that. Starting today, we are making the <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> Zero Trust suite available to teams that qualify for Project Galileo or Athenian at no cost. Cloudflare One includes the same <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> and connectivity solutions used by over 10,000 customers today to connect their users and safeguard their data.</p>
    <div>
      <h2>Same problem, different missions</h2>
      <a href="#same-problem-different-missions">
        
      </a>
    </div>
    <p>Athenian Project candidates work to safeguard elections in the United States. <a href="https://www.cloudflare.com/galileo/">Project Galileo</a> applicants launched their causes to support journalists, encourage artistic expression, or protect persecuted groups. They each set out to fix difficult and painful problems. None of the applications to our programs wrote their mission statement to deal with phishing attacks or internal data loss.</p><p>However, security problems plague these teams. Instead of being able to focus on their unique mission, these groups spend money, time, and energy attempting to defend from attacks. The headaches range from expensive distractions to outright breaches. Even the mundane work to connect employees to important tools continues to be a headache. Every chore or incident takes away from the ability of these organizations to advance their cause.</p><p>We built Cloudflare One to solve the common security problems that can derail any team. Our mission is to help build a better Internet and, in doing so, we create tools that allow the groups served by the Athenian Project and Project Galileo spend as much of their day solving their own unique challenges.</p><p>The products we are making available today provide security against a broad, and growing, range of attacks that target how a team works together on the Internet. Project Galileo and Athenian candidates can choose to start in any place depending on their <a href="https://zerotrustroadmap.org/">existing security challenges</a>. If you need a guide on where to get started, we’ve broken down three common first steps that we recommend.</p>
    <div>
      <h3>1) Stop phishing attacks</h3>
      <a href="#1-stop-phishing-attacks">
        
      </a>
    </div>
    <p>Many phishing attacks start with a malicious link buried in a single email from a sender that seems trustworthy. A user in your organization clicks on that link, believing it to be from a teammate or manager, and lands on a website that looks almost identical to your identity provider or one of the web applications they use every day. They input their username and password, sending their credentials directly to the attacker.</p><p>Cloudflare One’s email security, our <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Area 1 product</a>, is our first line of phishing defense. Area 1 scans the emails headed to your organization for the presence of potential phishing campaigns and other types of security attacks. Malicious messages never arrive without interrupting the emails that your team should receive. You can deploy Area 1 in minutes with <a href="https://developers.cloudflare.com/email-security/deployment/inline/">a few changes to your DNS records</a> to safeguard your Microsoft 365, Gmail, or nearly any other email deployment.</p><p>As part of today’s announcement, we are making Area 1 available to Project Galileo and Athenian organizations at no cost. The same level of protection trusted by large corporations from <a href="https://www.cloudflare.com/case-studies/werner-enterprises/">Werner Enterprises</a> to <a href="https://www.cloudflare.com/case-studies/consumer-goods-leader/">Fortune 500 consumer packaged goods</a> firms is now available to your team.</p><p>In some cases, an email evades detection or the phishing link reaches your users through other channels. Cloudflare One can still help. When your team members navigate the Internet, they rely on DNS queries made by their device in order to translate the hostname of a website to the IP address of the server. Their device sends those queries to a DNS resolver.</p><p>Cloudflare runs the world’s fastest DNS resolver, <a href="https://1.1.1.1/">1.1.1.1</a>, and we offer a security version that also filters DNS queries made to destinations that are known to be malicious. If a user accidentally clicks on a link from a text message or in a website, their device first sends that DNS query to Cloudflare. If dangerous, we stop the query before the malicious destination can load. If benign, we’ll respond with the destination faster than other resolvers.</p><p>Cloudflare’s DNS filtering <a href="/helping-keep-governments-safe-and-secure/">keeps the US Federal Government safe</a>, but can be deployed by teams of any size. You can secure entire <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/agentless/dns/">office networks</a> with the change of one router setting or deploy our <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/">roaming agent</a> to keep your users safe wherever they work. Together with email protection, your team can filter out phishing attacks in a defense-in-depth approach.</p>
    <div>
      <h3>2) Connect employees and partners</h3>
      <a href="#2-connect-employees-and-partners">
        
      </a>
    </div>
    <p>Many teams that qualify for Project Galileo had to find ways to work across geographies long before the pandemic sent employees home from other companies. These teams typically deployed a legacy <a href="https://www.cloudflare.com/learning/access-management/what-is-a-vpn/">virtual private network (VPN)</a> to allow team members from across the world to reach the tools they needed to collect data, file stories, or submit research. At best, those VPN deployments slowed down user connectivity and introduced maintenance headaches. At worst, they gave anyone on the network overly broad access to nearly any resource.</p><p>With Cloudflare One, your team can operate in any location and still reach your internal tools while controlling exactly who can access which <a href="https://developers.cloudflare.com/cloudflare-one/applications/">application or service</a>. Organizations that need to operate a traditional private network can run one on Cloudflare by deploying our device client (WARP) on user endpoints and establishing outbound connections to our global network via <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/">Cloudflare Tunnel</a>. Users enjoy the performance and availability of Cloudflare’s network while administrators can build granular permissions without the need for additional application development.</p><p>We also know that many Galileo and Athenian organizations work alongside hundreds or thousands of partners and volunteers. Those users need to also reach internal resources but are not willing or able to install software on their personal devices.</p><p>To solve that challenge, Cloudflare One can be deployed in a <a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/">fully clientless mode</a> that can use multiple identity providers including consumer options like Google, Facebook, and LinkedIn. Users authenticate with the single-sign on option they already use from any mobile or desktop device. Administrators control which users can reach specific applications while logging every attempt.</p>
    <div>
      <h3>3) Secure your team’s path to the Internet</h3>
      <a href="#3-secure-your-teams-path-to-the-internet">
        
      </a>
    </div>
    <p>Beyond phishing attacks, bad actors target organizations with other types of threats like malware hidden in downloads. Researchers and journalists exploring a topic with untrusted sources can bring ransomware back into the entire organization. Team members connecting to the Internet from a hotel Wi-Fi network can have unencrypted DNS queries monitored and reported.</p><p>Cloudflare One provides every member of your team with an <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/">encrypted, secured on-ramp</a> to the entire Internet. Powered by the same Cloudflare WARP agent that helps millions of users enjoy a more private Internet connection, Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gatewa</a>y filters all Internet-bound for hidden threats.</p><p>When users inadvertently connect to a malicious destination, Cloudflare One will <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/">block the attempt</a> and present them with a page explaining what just happened. In the other direction, Cloudflare’s network scans downloads for malware and blocks the download before the user can open it.</p><p>The same filtering can be extended <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/data-loss-prevention/">to keep sensitive data</a> from leaving your organization. You can build rules that flag file uploads that contain personal information or patterns that are unique to your team or focus area. With just a few clicks, you can create policies that prevent the accidental or malicious loss of data while also restricting uploads to approved destinations.</p>
    <div>
      <h2>All without the need for an enterprise IT department</h2>
      <a href="#all-without-the-need-for-an-enterprise-it-department">
        
      </a>
    </div>
    <p>Today’s announcement makes the security technology deployed by the world’s largest enterprises available to organizations of any size. And, despite the broad impact of Athenian and Galileo organizations, that size tends to be smaller.</p><p>The teams supported by <a href="https://www.cloudflare.com/galileo/">Project Galileo</a> focus limited resources on advancing journalism, artistic expression, human rights, and other causes. The state and local governments who qualify for the Athenian Project spend their days protecting democracy in the United States. Both groups tend to lack the resources of a Fortune 500 to staff and operate a large IT department.</p><p>We built Cloudflare One as a service that a team could configure and deploy in a matter of hours and still benefit from comprehensive Zero Trust security. We’ve published a <a href="https://zerotrustroadmap.org/">Zero Trust Roadmap</a> that your team can use to determine how to get started with guidelines for the time required at each step.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>We’re excited to extend Projects Galileo and Athenian to include Cloudflare One. Are you an existing qualified organization or interested in applying? Follow the link <a href="https://www.cloudflare.com/athenian/">here</a> and <a href="https://www.cloudflare.com/galileo/">here</a> to get started.</p><p>If you are not part of Project Galileo or Athenian, but still want to begin deploying Cloudflare One, we make the service available at no cost to teams of up to 50 users. Click <a href="https://dash.cloudflare.com/sign-up/teams">here</a> to sign up.</p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Project Galileo]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <guid isPermaLink="false">1bpNMLa2lj9ivLptfM8crx</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Expanding Area 1 email security to the Athenian Project]]></title>
            <link>https://blog.cloudflare.com/expanding-area-1-email-security-to-the-athenian-project/</link>
            <pubDate>Mon, 12 Dec 2022 14:00:00 GMT</pubDate>
            <description><![CDATA[ We are excited to share that we have grown our offering under the Athenian Project to include Cloudflare’s Area 1 email security suite to help state and local governments protect against a broad  ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vWG8T54q5llgOMlTabTE8/61bc5d6c0fa57fb7ea456532d50f6d47/image2-16.png" />
            
            </figure><p>Election security encompasses a wide variety of measures, including the protection of voting machines, election office networks, voter registration databases, and other systems that manage the electoral process. At Cloudflare, we have reported on threats to state and local governments under the <a href="https://www.cloudflare.com/athenian/">Athenian Project</a>, how we prepare political campaigns and state parties under <a href="https://www.cloudflare.com/campaigns/usa/">Cloudflare for Campaigns</a> for election season, and our work with organizations that report on election results and voting rights groups under <a href="https://www.cloudflare.com/galileo/">Project Galileo.</a></p><p>Since the 2022 US midterm elections, we have been thinking about how we help state and local governments <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">deflect larger cyber threats</a> that target the election community and have been analyzing the biggest problems they are facing. In October 2022, Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency, <a href="https://apnews.com/article/2022-midterm-elections-technology-d6bf92f594343d7a489d40394e56e2a1">said</a>, “The current election threat environment is more complex than it has ever been.” Amid threats, intimidation toward election workers, and cyber attacks against election infrastructure and operations, preparing for elections is no easy task.</p><p>At Cloudflare, our mission is to help build a better Internet. The Internet plays a key role in promoting democracy and ensuring constituents’ access to information. With this, we are excited to share that we have grown our offering under the Athenian Project to include Cloudflare’s Area 1 email security suite to help state and local governments protect against a broad spectrum of <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing attacks</a> to keep voter data safe and secure.</p>
    <div>
      <h3>Our work in protecting elections</h3>
      <a href="#our-work-in-protecting-elections">
        
      </a>
    </div>
    <p>To understand why we have expanded our product set, we need to look back on how our services have helped state and local governments during election time. Under the Athenian Project, we have provided our highest level of Cloudflare services—the <a href="https://www.cloudflare.com/plans/enterprise/">Enterprise plan</a>—for free to state and governments that run elections. The idea originally was that, just like every other Internet property, election websites need to be fast, they need to be reliable, and they need to be secure. Yet, scarce budgets too often prevent governments from getting the right resources to prevent attacks and stay online.</p><p>With this, we launched the Athenian Project in 2017. It includes many of our core web services, such as <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS protection</a>, <a href="https://www.cloudflare.com/learning/security/what-is-a-firewall/">Web Application Firewall</a>, <a href="https://www.cloudflare.com/learning/ssl/what-is-ssl/">SSL encryption</a>, and more security features that focus on web applications. We have been able to provide these services to local governments in 31 states and currently protect 359 election entities in the United States.</p><p>We have expanded our product set at Cloudflare with Workers, Pages, <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, and <a href="https://www.cloudflare.com/network-security/">network security solutions</a>. With this, we wanted to understand how we can better support the election community that we work with every day on the Athenian Project.</p>
    <div>
      <h3>We knew we could provide more</h3>
      <a href="#we-knew-we-could-provide-more">
        
      </a>
    </div>
    <p>Internally, we brainstormed on the most pressing issues that face the election community and overall Internet ecosystem. We also asked new and existing Athenian participants on the largest pain points they have when it comes to securing their internal networks and applications. We received a range of answers, from fears of a DDoS attack on election night, to <a href="https://www.cloudflare.com/learning/security/threats/zero-day-exploit/">zero-day exploits</a>, <a href="https://www.cloudflare.com/learning/security/threats/on-path-attack/">on-path attacks</a>, and <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware attacks</a>. Many of the same themes came up, especially for small counties that run elections with a huge fear of phishing and <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">ransomware</a> attacks.</p><p>Despite email's importance as a communication method, many types of email security still are not built into email by default. As a result, email is a major <a href="https://www.cloudflare.com/learning/security/glossary/attack-vector/">attack vector</a> for organizations large and small, and for individual people as well. We have seen <a href="/2022-07-sms-phishing-attacks/">firsthand</a> phishing attempts that take advantage of human psychology to encourage quick —and unfortunate— decision-making. Once an attacker has infiltrated a network, they can easily <a href="https://www.cloudflare.com/learning/security/glossary/what-is-lateral-movement/">move laterally</a> undetected and impact a wide range of sensitive internal systems.</p><p>That is why <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> plays a critical role in preemptive defenses against ransomware attacks. Since many of these attacks start with a malicious or phishing email, effective email security can act as a frontline defense against ransomware, and stop these attacks before they reach inboxes. Due to the ease with which threats can be blocked before they reach an election official’s inbox, we were excited to work with those in the election space to find the best way to make these products available.</p><p>Typically, when we offer new security products under our <a href="https://www.cloudflare.com/impact/">Impact</a> projects, we collaborate with external stakeholders. One example is the civil society groups that we partner with under <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>; many of them work in the election community and at government agencies, such as CISA’s Joint Cyber Defense Collaborative (JCDC). These partnerships help us understand how to provide these security tools in a responsible and sustainable way.</p>
    <div>
      <h3>How one North Carolina county uses Area 1 email security</h3>
      <a href="#how-one-north-carolina-county-uses-area-1-email-security">
        
      </a>
    </div>
    <p>Months before the 2022 US midterm elections, we reached out to a few state and local governments that currently use Zero Trust products, such as Access and Gateway, to discuss email security.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ARiugvSS1AJNra3cbhpTl/57cd998d1495af17cf3560ea735d4db8/Screenshot-2022-12-06-at-13.47.37.png" />
            
            </figure><p>One of our Athenian participants that was eager to work with us on this expansion was Rowan County, North Carolina. For Randy Cress, CIO for Rowan County, election season means all hands on deck for IT staff in order to secure their .gov site that provides accurate, <a href="https://www.cloudflare.com/learning/security/what-is-information-security/">secure information</a> to voters.</p><p>In 2020, <a href="https://www.cloudflare.com/election-security/">Rowan County reported</a> that Cloudflare helped them tackle a 400% increase in traffic on a limited budget which allowed them to refocus resources on other county initiatives. When it comes to phishing attacks, Randy wanted to shield county employees from <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing</a> attacks and block malicious threats automatically.</p><blockquote><p>“<i>Prior to Area 1 Security, we were using Office 365 email protection with limited insight for the specifics for messages that were quarantined. While cloud services from Microsoft are continually evolving, we were looking to reduce complexity to support security functions within our environment, allowing us to continue implementing new layers of defense.</i>”</p></blockquote><p>Deploying <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Area 1</a> gave the county the ability to preemptively discover and eliminate phishing attacks before they inflict damage in their environment. Randy added, <i>“Our team was able to fully onboard prior to the official onboarding call in less than 30 minutes with Cloudflare. We were able to focus on features and specifics of the product offering in lieu of time spent in configuration mode and troubleshooting. Since we are using Cloudflare for</i> <a href="https://www.cloudflare.com/learning/dns/what-is-dns/"><i>DNS</i></a> <i>and DDoS protection, the changes were extremely easy and there were no interruptions to our mail delivery process.”</i></p><p>For the 2022 US midterm elections, Randy reported, "<i>Leading up to the elections, reports within our Area 1 dashboard indicated 2x as many inbound malicious emails from the same time period in October 2022. We saw</i> <a href="https://www.cloudflare.com/learning/bots/what-is-credential-stuffing/"><i>credential harvesting</i></a> <i>as the top threat, and we are easily able to see which users are targeted for email compromise. With Area 1 Security under the Athenian Project, we were able to add additional layers of security to our organization, as it allowed us to preemptively defend against malicious messages before an employee can click on a malicious link. This gives us comfort knowing that Cloudflare is our first line of defense, so we can focus on providing a secure voting process for the constituents of Rowan County."</i></p>
    <div>
      <h3>Area 1 and the Athenian Project</h3>
      <a href="#area-1-and-the-athenian-project">
        
      </a>
    </div>
    <p>Cloudflare Area 1 email security is a cloud-native <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">service</a> that stops phishing attacks and can be used with Enterprise accounts under the Athenian Project. If you are a state or local government that is interested in learning more about the Athenian Project, please apply on our website: <a href="https://www.cloudflare.com/athenian/">https://www.cloudflare.com/athenian/</a>.</p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">3cw4wpK0wsGTFy3doWe2RT</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[Protecting election groups during the 2022 US midterm elections]]></title>
            <link>https://blog.cloudflare.com/protecting-election-groups-during-the-2022-us-midterm-elections/</link>
            <pubDate>Wed, 09 Nov 2022 16:41:00 GMT</pubDate>
            <description><![CDATA[ We at Cloudflare are proud to be able to play a role in helping safeguard the integrity of the electoral process. Through our Impact programs, we provide cyber security products to help protect access ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On Tuesday, November 8, 2022, constituents cast their ballots for the 2022 US midterm elections, which included races for all 435 seats in the House of Representatives, 35 of the 100 seats in the Senate, and many gubernatorial races in states including Florida, Michigan, and Pennsylvania. Preparing for elections is a giant task, and states and localities have their work cut out for them with corralling poll workers, setting up polling places, and managing the physical security of ballots and voting machines.</p><p>We at Cloudflare are proud to be able to play a role in helping safeguard the integrity of the electoral process. Through our <a href="https://www.cloudflare.com/impact/">Impact</a> programs, we provide cyber security products to help protect access to authoritative voting information and the security of sensitive voter data.</p><p>We have reported on our work in the election space with the <a href="https://www.cloudflare.com/athenian/">Athenian Project</a>, dedicated to protecting state and local governments that run elections; <a href="https://www.cloudflare.com/campaigns/usa/">Cloudflare for Campaigns</a>, a project with a suite of Cloudflare products to secure political campaigns’ and state parties’ websites and internal teams; and <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, in which we have helped <a href="https://www.cloudflare.com/case-studies/voteamerica/">voting rights organizations</a> and <a href="https://www.cloudflare.com/case-studies/decision-desk-hq/">election results sites</a> stay online during traffic spikes.</p><p><a href="/2020-us-election-cybersecurity-analysis/">Since our reporting in 2020</a>, we have expanded our <a href="https://www.cisa.gov/sites/default/files/publications/JCDC_Fact_Sheet.pdf">relationships with</a> <a href="/helping-keep-governments-safe-and-secure/">government agencies</a> and worked with project participants across the United States in a range of election roles to support free and fair elections. For the midterm elections, we continued to support election entities with the tools and expertise on how to secure their web infrastructure to promote trust in the voting process.</p><p>Overall, we were ready for the unexpected, as we had experience supporting those in the election community in 2020 during a time of uncertainty around COVID-19 and increased political polarization. But for the midterms, the Cybersecurity and Infrastructure Security Agency (CISA), the key agency tasked with protecting election infrastructure against cyber threats, <a href="https://edition.cnn.com/politics/live-news/midterm-election-results-livestream-voting-11-08-2022/h_ee907ca3e0a8e0a0b11c8e19fc10dfff">reported the morning</a> of November 8 that they “continue to see no specific or credible threat to disrupt election infrastructure” for the day of the election.</p><p>At Cloudflare, although we did see <a href="https://www.thedailybeast.com/mississippi-secretary-of-state-site-down-after-russian-call-to-attack-amid-midterm-election">reports</a> of a few smaller attacks and outages, we are pleased that the robust <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cyber security</a> preparations by governments, nonprofits, local municipalities, campaigns, and state parties appeared to be successful, as we did not identify large-scale attacks on November 8, 2022.</p><p>Below are highlights on the activity we saw as we approached midterms and how we worked together with all of these groups to secure election resources.</p>
    <div>
      <h2>Key takeaways from the 2022 midterm elections</h2>
      <a href="#key-takeaways-from-the-2022-midterm-elections">
        
      </a>
    </div>
    
    <div>
      <h3>For state and local governments protected under the Athenian Project</h3>
      <a href="#for-state-and-local-governments-protected-under-the-athenian-project">
        
      </a>
    </div>
    <ul><li><p>We protect 361 election websites in 31 states. This is a 31% increase since our <a href="/2020-us-election-cybersecurity-analysis/">reporting during the 2020 election.</a></p></li><li><p>Average daily application-layer attack volume against Athenian sites was only 3.4% higher in November through Election Day than it was in October.</p></li><li><p>From October 1 through November 8, 2022, government election sites experienced an average of 16,170,728 threats per day.</p></li><li><p>A majority of the threats to government election sites that Cloudflare mitigated in October 2022 were classified as <a href="/application-security/">HTTP anomaly</a>, <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL injection</a>, and <a href="/searchresults/#q=cve&amp;sort=relevancy">software specific CVEs</a>.</p></li></ul>
    <div>
      <h3>For political campaigns and state parties protected under Cloudflare for Campaigns</h3>
      <a href="#for-political-campaigns-and-state-parties-protected-under-cloudflare-for-campaigns">
        
      </a>
    </div>
    <ul><li><p><a href="/introducing-cloudflare-for-campaigns/">With our partnership</a> with Defending Digital Campaigns, we protected 56 House campaigns, 15 political parties, and 34 Senate campaigns during the midterm elections.</p></li><li><p>Average daily application-layer attack volume against campaign sites was over 3x higher in November through Election Day than it was in October.</p></li><li><p>From October 1 through November 8, 2022, political campaign and state party sites saw an average of 149,949 threats per day.</p></li><li><p><a href="/application-security/">HTTP anomaly</a>, <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL injection</a>, and <a href="https://portswigger.net/web-security/file-path-traversal">directory traversal</a> were the most active categories for mitigated requests against campaign sites in October.</p></li></ul>
    <div>
      <h2>Risks to online election groups as we approached the midterms</h2>
      <a href="#risks-to-online-election-groups-as-we-approached-the-midterms">
        
      </a>
    </div>
    <p>In preparation for the midterms, the Federal Bureau of Investigation (FBI) and CISA put out a variety of public service announcements calling attention to cyber election risks, like <a href="https://www.ic3.gov/Media/Y2020/PSA200930">DDoS attacks</a>, and providing reassurance that cyber attacks were “unlikely to result in large-scale disruptions or prevent voting.” Earlier this year, the FBI issued a <a href="https://www.ic3.gov/Media/News/2022/220329.pdf">warning</a> on phishing attempts, with details about a seemingly organized plot to steal election officials’ credentials via an email with a fake invoice attached.</p><p>We also saw some threat actors announce plans to target the midterm elections. Killnet, a pro-Russia hacking group, targeted US state websites<a href="https://www.nbcnews.com/tech/security/colorado-state-websites-struggle-russian-hackers-vow-attack-rcna51012">, successfully</a> taking the public-facing websites of a <a href="https://www.nbcnews.com/tech/security/colorado-state-websites-struggle-russian-hackers-vow-attack-rcna51012">number of states</a> temporarily offline. Hacking groups will target public-facing government websites to promote mistrust in the democratic process.</p><p>Voting authorities face challenges unrelated to malicious activity, too. Without the proper tools in place, traffic spikes during election season can <a href="https://www.cloudflare.com/learning/performance/preventing-downtime/">impede voters’ ability to access information</a> about polling places, registration, and results. During the 2020 US election, we saw 4x traffic spikes to government elections sites.</p><p>On the political organizing side, political campaigns and state parties increasingly rely on the Internet and their web presence to issue policy stances, raise donations, and organize their campaign operations. In October 2022, the <a href="https://www.washingtonpost.com/politics/2022/10/17/chinese-hackers-are-scanning-state-political-party-headquarters-fbi-says/">FBI notified</a> Republican and Democratic state parties that Chinese hackers were scanning party websites for vulnerabilities.</p>
    <div>
      <h2>So, what happened during the 2022 US midterm elections?</h2>
      <a href="#so-what-happened-during-the-2022-us-midterm-elections">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7B7DkjldQpP49OglkYkpIH/b3653c190a6f69a73c0b38c600c36544/image1-14.png" />
            
            </figure><p>As we prepared for the midterms, we had a team of engineers ready to assist state and local governments, campaigns, political parties, and voting rights organizations looking for help to protect their websites from cyber attacks. A majority of the threats that we saw and directly assisted on were before the election, especially in the wake of many advisories from federal agencies on Killnet’s targeting of US government sites.</p><p>During this time, we worked with CISA’s Joint Cyber Defense Collaborative (JCDC) to provide security briefings to state and local election officials and to make sure our free Enterprise services for state and local governments under the Athenian Project were part of <a href="https://www.cisa.gov/cybersecurity-toolkit-protect-elections">JCDC’s Cybersecurity Toolkit to Protect Elections</a>. We provided additional support in terms of webinars, security recommendations, and best practices to better prepare these groups for the midterms.</p><p>A week before the election, we worked with partners such as <a href="https://defendcampaigns.org/">Defending Digital Campaigns</a> to onboard many political campaigns and state parties to Cloudflare for Campaigns after seeing a number of campaigns come <a href="https://www.cloudflare.com/ddos/under-attack/">under DDoS attack</a>. With this, we were able to accept 21 of the Senate Campaigns up for re-election, with an overall total of 34 Senate campaigns protected under the project.</p>
    <div>
      <h2>Preparing for the next election</h2>
      <a href="#preparing-for-the-next-election">
        
      </a>
    </div>
    <p>Being in the election space means working with local government, campaigns, state parties, and voting rights organizations to build trust. Democracies rely on access to information and trusted election results.</p><p>We accept applications to the Athenian Project all year long, not just during election season — learn <a href="https://www.cloudflare.com/athenian/">how to apply</a>. We look forward to providing more information on threats to these actors in the election space in the next few months to support their valuable work.</p> ]]></content:encoded>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">30yAUSdZ8i6R3CovAzgCHg</guid>
            <dc:creator>Andie Goodwin</dc:creator>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[Shields up: free Cloudflare services to improve your cyber readiness]]></title>
            <link>https://blog.cloudflare.com/shields-up-free-cloudflare-services-to-improve-your-cyber-readiness/</link>
            <pubDate>Fri, 04 Mar 2022 16:46:09 GMT</pubDate>
            <description><![CDATA[ Whether you’re a seasoned professional or a novice website operator, free Cloudflare resources are available. Beyond these resources, there are a few simple steps that you can take to stay protected. ]]></description>
            <content:encoded><![CDATA[ <p>Since our founding, Cloudflare's mission has been to "help build a better Internet," and we take it to heart. It used to be that the services required to adequately secure an online presence were only available to the largest of enterprises — organizations big enough to afford both the technology itself and the teams to manage it.</p><p>We've worked hard over the years to level the playing field. This has meant making more and more of the essential tools for protecting an online presence available to as many people as possible. Cloudflare offers <a href="https://www.cloudflare.com/ddos/">unmetered DDoS protection</a> — for free. We were the first to introduce <a href="https://www.cloudflare.com/ssl/">SSL at scale</a> — for free. And it’s not just protection for your external-facing infrastructure: we have a free Zero Trust plan that enables teams to protect their internal-facing infrastructure, too.</p><p>These types of tools have always been important for the billions of people on the Internet. But perhaps never as important as they've become this week.</p><p>Concurrent with the Russian invasion of Ukraine, we've seen <a href="/internet-traffic-patterns-in-ukraine-since-february-21-2022/">increasing cyberattacks on the Internet, too</a>. Governments around the world are encouraging organizations to go “shields up” — with warnings coming from the United States’ <a href="https://www.cisa.gov/shields-up">Cybersecurity &amp; Infrastructure Security Agency</a>, the United Kingdom’s <a href="https://www.ncsc.gov.uk/news/organisations-urged-to-bolster-defences">National Cyber Security Center</a>, and Japan’s <a href="https://www.meti.go.jp/press/2021/02/20220221003/20220221003.html">Ministry of Economy, Trade, and Industry</a>, amongst others.</p><p>Not surprisingly, we’ve been fielding many questions from our customers about what they should be doing to increase their <a href="https://www.cloudflare.com/learning/security/what-is-cyber-resilience/">cyber resilience</a>. But helping to build a better Internet is broader than just helping our customers. We want everyone to be safe and secure online.</p><p>So: what should you do?</p><p>Whether you’re a seasoned IT professional or a novice website operator, these free Cloudflare resources are available for you today. Beyond these free resources, there are a few simple steps that you can take to help stay protected online.</p>
    <div>
      <h3>Free Cloudflare resources to help keep you and your organization safe</h3>
      <a href="#free-cloudflare-resources-to-help-keep-you-and-your-organization-safe">
        
      </a>
    </div>
    <p>These Cloudflare services are available to everyone on the Internet. If you’re a qualified vulnerable public interest group, or an election entity, we have additional free services available to you.</p><p>Let’s start with the services that are freely available to everyone.</p><p><i>For your public-facing infrastructure, such as a website, app, or API:</i></p><p><a href="https://www.cloudflare.com/plans/free/">Protect your public-facing infrastructure using the Cloudflare</a> Network</p><p>This provides the basics you need to protect public-facing infrastructure: <a href="/unmetered-mitigation/">unmetered DDoS mitigation</a>, free <a href="/introducing-universal-ssl/">SSL</a>, protection from vulnerabilities <a href="https://www.cloudflare.com/en-au/log4j/">including Log4J</a>. Furthermore, it includes built-in global <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">CDN</a> and <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>.</p><p><i>For your internal-facing infrastructure, such as cloud apps, self-hosted apps, and devices:</i></p><p><a href="/teams-plans/">Protect your team with Cloudflare Zero Trust</a></p><p>These essential security controls keep employees and apps protected online by ensuring <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">secure access</a> to the Internet, self-hosted applications and SaaS applications. Free for up to 50 users.</p><p><i>For your personal devices, such as phones, computers, and routers:</i></p><p><a href="https://developers.cloudflare.com/1.1.1.1/1.1.1.1-for-families/">Protect your devices with 1.1.1.2</a></p><p>Otherwise known as Cloudflare for Families. This is the same as Cloudflare’s privacy-protecting, superfast 1.1.1.1 DNS resolver. However, 1.1.1.2 has one big added benefit over 1.1.1.1: if you click on a link that’s about to take you to malware, we step in on your behalf, preventing you from ending up on the malicious site. It’s super simple to set up:  you can follow the instructions <a href="https://developers.cloudflare.com/1.1.1.1/1.1.1.1-for-families/">here</a>, then click the “Protect your home against malware” button; or simply update your DNS settings to use the following:</p><p>1.1.1.21.0.0.22606:4700:4700::11122606:4700:4700::1002</p><p>And while we’ve called it Cloudflare for Families, we should note: it works equally well for businesses, too.</p><p>All the services listed above are available now. They can scale to the most demanding applications and withstand the most determined attacks. And they are made freely available to <i>everyone</i> on the Internet.</p><p>Cloudflare provides an additional level of free services to special types of organizations.</p>
    <div>
      <h3>Project Galileo: for vulnerable public interest groups</h3>
      <a href="#project-galileo-for-vulnerable-public-interest-groups">
        
      </a>
    </div>
    <p>Founded in 2014, Project Galileo is Cloudflare’s response to cyberattacks launched against important yet vulnerable targets like artistic groups, humanitarian organizations, and the voices of political dissent. Perhaps now more than ever, protecting these organizations is crucial to delivering the promise of the Internet. Importantly, it’s not us deciding who qualifies: we work with a range of partner organizations such as the Freedom of the Press Foundation, the Electronic Frontier Foundation, and the Center for Democracy and Technology to help identify qualified organizations.</p><p>Over the past week we’ve seen an influx of applications to Project Galileo from civil society and community organizations in Ukraine and the region who are increasingly organizing to provide support and essential information to the people of Ukraine. To the vulnerable organizations that qualify, we offer a range of further Cloudflare services that we usually reserve for our largest enterprise customers. You can <a href="https://www.cloudflare.com/en-au/galileo/">visit here</a> to find out more about Project Galileo, or if you think your organization might qualify, we encourage you to <a href="https://www.cloudflare.com/en-au/galileo/#apply">apply here</a>.</p>
    <div>
      <h3>The Athenian Project: for election entities</h3>
      <a href="#the-athenian-project-for-election-entities">
        
      </a>
    </div>
    <p>As with public interest groups, there are many malicious actors today who try to interfere with free and democratic elections. One very simple way that they can do this is <a href="https://www.csmonitor.com/World/Passcode/2014/0617/Ukraine-election-narrowly-avoided-wanton-destruction-from-hackers">through</a> cyberattacks. Just like every other Internet property, election websites need to be fast, they need to be reliable, and they need to be secure. Yet, scarce budgets often prevent governments from getting the resources needed to prevent attacks and keep these sites online.</p><p>Just like with Project Galileo, for election entities that qualify, we offer a range of further Cloudflare services to help keep them safe, fast, and online. We have more information about the Athenian Project <a href="https://www.cloudflare.com/en-au/athenian/">here</a>, and if you’re working at an election entity, you can apply at the bottom of that same page.</p><p>We’re all dependent on the Internet more than ever. But as that dependency grows, so too does our vulnerability to attack. Cloudflare provides these no cost services in the spirit of helping to build a better Internet. Please take advantage of them, and spread the word to other people and organizations who could benefit from them too.</p>
    <div>
      <h3>Basic online security hygiene</h3>
      <a href="#basic-online-security-hygiene">
        
      </a>
    </div>
    <p>Beyond <a href="https://www.cloudflare.com/plans/free/">Cloudflare’s free services</a>, there are a range of basic steps that you can take to help protect your online presence. We’re imagining that almost everyone will have heard of these steps before. For those of you who have heard it but have been putting it off, now is the time. Taking these simple steps today can save you a world of cyber heartache tomorrow.</p><p><i>Don’t re-use passwords across accounts.</i> It’s unfortunate, but websites and applications are compromised every day. Sometimes, a compromise will result in a hacker gaining access to all the usernames and passwords on that website or app. One of the first things a hacker will then do is try all those username and password combinations on other popular websites. If you had an account on a compromised website, and your password there is the same as the one you use for (say) your online banking account, well… they’re now in your bank account. Compounding this, compromised credentials are frequently bought and sold in illegal online marketplaces. You can check if your credentials have been compromised <a href="https://haveibeenpwned.com/">on this site</a>. It’s extremely important to ensure that you <i>don’t</i> use the same credentials on multiple sites or apps.</p><p><i>Use multi-factor authentication on your accounts</i>. This adds a second layer of identification beyond just your password. It often takes the form of a confirmation code in a text message or email, or better yet, a randomly generated code from an authentication app, or, best of all, a hardware key that you insert into your computer or wave at your phone. This helps ensure that the person logging into your account is actually you. Internally at Cloudflare, we use hardware keys exclusively because of their high security.</p><p><i>Use a password manager</i>. If you want to compress the two above steps down into one, find and begin using a password manager. A password manager helps you manage passwords across multiple accounts; it automatically creates a random and unique password for each login you have. It can also manage randomly generated multi-factor authentication for you. If you’re in the Apple ecosystem, Apple has one built into iOS and macOS that will sync across your devices. 1Password and LastPass are also very popular examples. We require the use of a password manager at Cloudflare, and recommend their use to everyone.</p><p><i>Keep your software up to date.</i> This applies for all your software — both operating systems and applications, on computers and on your phone. Flaws and potential security holes are being discovered all the time. While vendors are increasingly quick to react, and software can be patched over the Internet in a matter of minutes — this only works if you click the “Install Update Now” button. Or better yet, you can set updates to be automatic, and this can help to guarantee that your systems stay current.</p><p><i>Be extra cautious before clicking on links in emails</i>. According to the CISA, more than 90% of successful cyber-attacks start with a <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">phishing email</a>.  This is when a link or webpage looks legitimate, but it’s actually designed to have you reveal your passwords or other sensitive information. You can double-check the URL of any links you click on. Or better yet, type the URL in yourself, or search for the site you’re looking for from your search engine. Finally, 1.1.1.2 (see above in this post) can help protect you in the event that you do click on one of these phishing links.</p><p><i>Be extra cautious giving credentials to people who have called you.</i> Phishing doesn’t just happen via email. It can happen over the phone, too. It might be a call from someone claiming to work at your bank, telling you there’s strange activity on your account. Or someone claiming to be an IT administrator at your company, asking why you’ve been looking at strange websites. After putting you on the back foot, they’ll ask for something so they “can help you” — possibly a password or a text confirmation code. <i>Don’t give it to them.</i> If you’re at all unsure of anyone who just called you, there’s a simple solution: ask them for their name, their department, and their organization, and then hang up. You can then call them back through a phone number that their organization advertises on their homepage.</p><p><i>Have an offline, or at least a cloud-based, backup of critical or irreplaceable data</i>. Even if you follow every last piece of advice above, there is still the risk that something bad happens. A backup of your critical data — ideally offline, but even one up in the cloud — is your last line of defense. Beyond security resilience, backups also improve your general resilience. Lost devices, natural disasters, and accidents happen. Backups mitigate the impact.</p><p>These are simple and immediate actions you can take to help keep your online presence secure.</p><p>From everyone at Cloudflare: we hope that you and your loved ones are safe during these unpredictable times.</p> ]]></content:encoded>
            <category><![CDATA[Cyber Readiness]]></category>
            <category><![CDATA[Free]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Project Galileo]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[DDoS]]></category>
            <guid isPermaLink="false">pwYRDec1quKki6bzrurMS</guid>
            <dc:creator>James Allworth</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare's Athenian Project Expands Internationally]]></title>
            <link>https://blog.cloudflare.com/cloudflares-athenian-project-expands-internationally/</link>
            <pubDate>Thu, 29 Jul 2021 13:03:00 GMT</pubDate>
            <description><![CDATA[ Due to the growing trend of cyberattacks targeting election infrastructure, election security is not a US-specific issue. Today, we are extending our security tools to a range of election entities ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Over the course of the past few years, we’ve seen a wide variety of different kinds of online threats to democratically-held elections around the world. These threats range from attempts to restrict the availability of information, to efforts to control the dialogue around elections, to full disruptions of the voting process.</p><p>Some countries have shut down the Internet completely during elections. In 2020, Access Now’s <a href="https://www.accessnow.org/keepiton/#problem">#KeepItOn</a> Campaign reported at least 155 Internet shutdowns in 29 countries such as Togo, Republic of the Congo, Niger and Benin. In 2021, Uganda's government <a href="/uganda-january-13-2021-internet-shut-down/">ordered</a> the "Suspension Of The Operation Of Internet Gateways" the day before the country's general election.</p><p>Even outside a full Internet shutdown, election reporting and registration websites can face attacks from other nations and from parties seeking to disrupt the administration of the election or undermine trust in the electoral process. These cyberattacks target not only electronic voting or election technologies, but access to information and communications tools such as voter registration and websites that host election results. In 2014, a <a href="https://www.csmonitor.com/World/Passcode/2014/0617/Ukraine-election-narrowly-avoided-wanton-destruction-from-hackers">series of cyberattacks</a> including DDoS, malware and phishing attacks were launched against Ukraine’s Central Election Commission ahead of the presidential election. These sophisticated attacks attempted to infiltrate the internal voting system and spread malware to deliver fake election results. Similar attacks were seen again in 2019 as Ukraine accused Russia of <a href="https://www.cyberscoop.com/ukraines-president-accuses-russia-launching-cyberattack-election-commission/">launching a DDoS attack</a> against the CEC a month before the presidential election. These types of attacks that target electoral management agencies’ communication tools and public facing websites have been on the rise in countries ranging from Indonesia, North Macedonia, Georgia, and Estonia.  </p><p>Three and a half years ago, Cloudflare <a href="/the-athenian-project/">launched the Athenian Project</a> to provide free Enterprise level services to state and local election websites in the United States. Through this project we have protected over 292 websites with information about voter registration, voting and polling places, as well as sites publishing final results across 30 states at no cost to the entities administering them. However, due to the growing trend of cyberattacks targeting election infrastructure, election security is not a US-specific issue, and since we launched the Athenian Project in the United States many people have asked: why don’t you extend these <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">cybersecurity protections</a> to election entities around the world?</p>
    <div>
      <h3>Challenges, Solutions and Partnerships</h3>
      <a href="#challenges-solutions-and-partnerships">
        
      </a>
    </div>
    <p>The short answer is we weren’t entirely sure whether Cloudflare, a US based company, could provide a free set of upgraded security services to foreign election entities. Cloudflare is a global company with 16 offices around the world and a global network that spans over 100 countries to provide security and performance tools. We are proud to create new and innovative products to enhance user privacy and security, but understanding the intricacies of local elections, the regulatory environment, and political players is complicated, to say the least.</p><p>When we started the Athenian Project in 2017, we understood the environment and gaps in coverage for state and local governments in the United States. The United States has a decentralized election administrative system, which means that local election administrators may conduct elections differently in every state. Because of the funding challenges that come with a decentralized system, state and local governments in all 50 states could benefit from free Enterprise-level services. Fast-forward to more than three years after we launched the project, we have learned a great deal about what types of threats election entities face, what products election entities need for securing their web infrastructure, and how to build trust with state and local governments in need of these types of protections.</p><p>As the Athenian Project and Cloudflare for Campaigns grew in the United States, we received inquiries from foreign election bodies, political parties and campaigns on whether they were eligible for protection under one of these projects. We turned to our Project Galileo partners for their advice and guidance.</p><p>Under Project Galileo, we partner with more than 40 civil society organizations to protect a range of sensitive players on the Internet including human rights organizations, journalism and independent media, and organizations that focus on strengthening democracy in 111 countries. Many of these civil society partners work on election-related matters such as capacity building, strengthening democratic institutions, supporting civil society organizations to equipping these groups with the tools they need to be safe and secure online. These partners, many of whom have local representatives on the ground, understand the intricacies of the election landscape and delicate nature of trust building between local election administrations, political parties and organizations with personnel directly on the ground in many of these regions to provide direct support and expertise when it comes to safeguarding elections.</p><p>After many discussions and years in the making, we are excited to announce our collaboration with The International Foundation for Electoral Systems, National Democratic Institute, the International Republican Institute and to provide free Enterprise Cloudflare services to groups working on election reporting and to election management agencies to provide the tools, resources and expertise to help them stay online in the face of large scale cyber attacks.</p>
    <div>
      <h3>Partnership with International Foundation for Electoral Systems</h3>
      <a href="#partnership-with-international-foundation-for-electoral-systems">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4YO3zdVTwAcG0wsjIY2fax/5d03950da70a3f44f1dc1d23b3fa7826/Screenshot-2021-07-28-at-16.52.05.png" />
            
            </figure><p>As we work with civil society organizations on issues in the election space and extending protections outside the United States, we frequently heard organizations bring up IFES, the International Foundation for Electoral Systems, due to their expertise in promoting and protecting democracy. The International Foundation for Electoral Systems is a nonpartisan, nonprofit organization that has worked in more than 145 countries, from developing to mature democracies.</p><p>Founded in 1987, IFES’ work in promoting democracy and genuine elections has evolved to meet the challenges of today and tomorrow. IFES offers research, innovation and technical assistance to support democratic elections, human rights, combat corruption, promote equal political participation, and ensure that information and technology advance, not undermine, democracy and elections.</p><p>One of the many reasons we wanted to work with IFES on expanding our election offering was due to the organizations’ unique position in terms of technical expertise, understanding of the political landscapes in which they operate, and fundamental knowledge of the types of protections these election management bodies (EMBs) need in preparing and conducting elections. Building trust in the election space is critical when providing support to EMBs. Due to years of hard work from IFES assisting with the implementation of election operations as well as direct assistance to support democratic developments, and the trust IFES has correspondingly developed with EMBs, they were a logical partner.</p><p>IFES’ Center for Technology &amp; Democracy, in collaboration with IFES program teams worldwide, provides cybersecurity and ICT assistance to EMBs and civil society organizations (CSOs). IFES uses leading cybersecurity and ICT practices and standards incorporated into its Holistic Exposure and Adaptation Testing (HEAT) methodology with the aim of increasing EMBs and CSOs digital transformation while mitigating associated risks.</p><blockquote><p><i>“Cloudflare has played an integral role in helping EMBs and CSOs protect their websites, prevent website defacement, and ensure that they are accessible during peak traffic spikes. This has allowed EMBs and CSOs to build internal and external stakeholder confidence while gaining access and building local capacity on cutting-edge cybersecurity solutions and good practices.”</i>— <b>Stephen Boyce</b>, Senior Global Election Technology &amp; Cybersecurity Advisor at IFES.</p></blockquote><p>As part of the partnership with IFES, Cloudflare provides its highest level of services to EMBs working with IFES and equips them with the cybersecurity tools for their web infrastructure and internal teams to promote electoral integrity and stronger democracies. Along with cybersecurity tools, Cloudflare will work closely with IFES on training and direct assistance to these election bodies, so they have the knowledge and expertise to conduct a free, fair, and safe elections.  In the past, Cloudflare has worked with IFES to provide services in support of elections in Georgia, and we look forward to extending these protections to other EMBs in the future.</p>
    <div>
      <h3>Partnership with National Democratic Institute, the International Republican Institute and the Design 4 Democracy Coalition</h3>
      <a href="#partnership-with-national-democratic-institute-the-international-republican-institute-and-the-design-4-democracy-coalition">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/52cymkS1VNcBMxzSDWyfZ4/2c1fe7a45b6eb9b0becba1a6b5c6191a/Screenshot-2021-07-28-at-16.53.12.png" />
            
            </figure><p>The National Democratic Institute and The International Republican Institute are two of the many Project Galileo partners that we have worked with to provide cybersecurity tools to organizations that work building and strengthening democratic institutions and increasing civic participation all around the world. As we worked together on Project Galileo, our conversations often focused on the best way to extend these types of security tools to groups in the election space.</p><p>Cloudflare is excited to announce that we are partnering with the National Democractic Institute (NDI), the International Republican Institute (IRI) and the Design 4 Democracy Coalition (D4D) to expand our election support efforts. Through this initiative, Cloudflare will provide free service to vulnerable groups working on elections, as identified by NDI and IRI. Our combined expertise in cybersecurity and elections administration will enable us to be mutually beneficial in navigating this space. As part of protecting a new set of election groups, Cloudflare will work with NDI and IRI to understand the global threats faced by democratic election institutions.</p><blockquote><p>_“Elections are being undermined by a wide range of malign actors. Through our partnership with Cloudflare, IRI has been able to ensure that the civil society and independent media organizations we support globally are able to defend themselves against cyber attacks and massive increases in web traffic - keeping them safe and online at the most critical moments for democratic integrity. We are excited to be working with Cloudflare, NDI, and the D4D Coalition to expand those offerings to election management bodies, political parties, and political campaigns - a critical step toward ensuring that political competition is fought in the sphere of policy and governance delivery, and not through information and cyber warfare.”_— <b>Amy Studdart</b>, Senior Advisor for Digital Democracy, Center for Global Impact at the International Republican Institute.</p></blockquote><p>As part of our new initiative, when Cloudflare tests new products which would be particularly useful for election groups we will work with NDI, IRI and D4D to encourage these groups to adopt the new services. This might include passing along information and documentation on how to deploy them, offering webinars, and providing other specialized support. Piloting new products with this audience will also provide us with the opportunity to learn about needs and pain points for these groups.</p><blockquote><p><i>“Safe, reliable access to the internet is fundamental to a free, open, and democratic electoral process in the modern era. Cloudflare’s sophisticated protections against various forms of cyberattack have provided invaluable support to at-risk campaigns and civic organizations through NDI and the D4D Coalition. This new initiative will go further to supporting one of the most fundamental of human rights: the vote.”</i>— <b>Chris Doten</b>,  Chief Innovation Officer at the National Democratic Institute.</p></blockquote>
    <div>
      <h3>Extending Protection to State Parties in the United States with Defending Digital Campaigns</h3>
      <a href="#extending-protection-to-state-parties-in-the-united-states-with-defending-digital-campaigns">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5EpX0KsJDlpJzYuVDMkkbV/a9b2bbd0be3faacbd10726f387c76964/Screenshot-2021-07-28-at-16.54.14.png" />
            
            </figure><p>We didn’t forget our friends in the United States. I am excited to announce that we are extending our support to provide a suite of Cloudflare products to eligible state parties in the United States with our partnership with Defending Digital Campaigns (DDC). In January 2020, we <a href="/introducing-cloudflare-for-campaigns/">announced</a> our partnership with <a href="https://www.defendcampaigns.org/">Defending Digital Campaigns</a>, a nonprofit, nonpartisan organization that provides access to cybersecurity products, services, and information to eligible federal campaigns.</p><p>We have reported on the regulatory challenges of providing free or discounted services to political campaigns in the past. Due to campaign finance regulations in the United States, private corporations are prohibited from providing any contributions of either money or services to federal candidates or political party organizations. We partnered with DDC, who was granted special permission by the Federal Election Commission to provide eligible federal campaigns with free or reduced-cost cybersecurity services due to the enhanced threat of foreign cyberattacks against party and candidate committees.</p><p>Since the start of our partnership, we have provided products to protect Presidential, Senate and House campaigns with tools like DDoS protection, web application firewall, SSL encryption, and bot protection. We have also offered campaigns cybersecurity tools to protect their internal networks, offering Cloudflare Access and Gateway to more than 75 campaigns in the 2020 U.S. election.</p><p>After the 2020 U.S. election, DDC extended their offering to protect state parties in select states.</p><p>“One of DDC’s core recommendations for any campaign or an organization like a State Party is protecting their websites from attacks or defacements,” said Michael Kaiser, President and CEO of Defending Digital Campaigns. “Our partnership with Cloudflare is critical to bringing this core protection to eligible entities and protecting our democracy.”</p><p>We are excited to be furthering our partnership with Defendering Digital Campaigns to provide our free suite of services to eligible state parties to better secure themselves from cyber attacks.</p><p>For more information on eligibility for these services under DDC and the next steps, please visit <a href="https://cloudflare.com/campaigns/usa/">cloudflare.com/campaigns/usa</a>.</p>
    <div>
      <h3>To the future…</h3>
      <a href="#to-the-future">
        
      </a>
    </div>
    <p>Recognizing the global nature of cyberthreats targeting election-related technologies, we are excited to be working with these groups to help players in the election space stay secure online. In addition to the goals already laid out, Cloudflare intends to build on these partnerships in the future. Eventually, we hope to assist with each of these partners’ programs as mentors and trainers, perhaps directly participating in assessments and training around critical elections. These groups' expertise makes them fantastic partners in this space, and we look forward to the opportunity to expand our work with their guidance.</p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">8D04XJXrbMODq653fZooe</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[Election Cybersecurity: Protecting the 2020 U.S. Elections.]]></title>
            <link>https://blog.cloudflare.com/election-cybersecurity-preparing-for-the-2020-u-s-elections/</link>
            <pubDate>Mon, 17 Aug 2020 12:30:00 GMT</pubDate>
            <description><![CDATA[ At Cloudflare, we believe that expanding access to tools that election officials and political candidates need to combat a range of online threats both serves our mission to help build a better Internet and strengthens our democracy. ]]></description>
            <content:encoded><![CDATA[ <p>At Cloudflare, our mission is to help build a better Internet. As we look to the upcoming 2020 U.S. elections, we are reminded that having the Internet be trusted, secure, reliable, and accessible for campaigns and citizens alike is critical to our democracy. We rely on the Internet to share and discover pertinent information such as how to register to vote, find polling locations, or learn more about candidates.</p><p>Due to the spread of COVID-19, we are seeing a number of election environments shift online, to varying degrees, with political parties conducting virtual fundraisers, campaigns moving town halls to online platforms and election officials using online forms to facilitate voting by mail. As the 2020 U.S. elections approach, we want to ensure that players in the election space have the tools they need to stay online to promote trust and confidence in the democratic system.</p><p>We’re keeping an eye on how this shift to online activities affect cyberattacks. From April to June 2020, for example, we saw a <a href="/network-layer-ddos-attack-trends-for-q2-2020/">trend</a> of increasing DDoS attacks, with double the amount of L3/4 attacks observed over our network compared to the first three months of 2020. In the election space, we are tracking trends and vulnerabilities to better understand the threats against these critical players. Our goal is to use the information to create best practices for election and campaign officials so they can be better prepared for the upcoming elections.</p><p><b>Key Takeaways:</b></p><ul><li><p>When comparing types of attacks against campaigns and government election sites, we saw the exact inverse type of attacks with political campaigns experiencing more DDoS attacks while government sites experiencing more attempts to exploit security vulnerabilities.</p></li><li><p>On average, state and local government election sites experience 122,475 cyber threats per day with an average of 199 SQL injection attempts per day.</p></li><li><p>On average, political campaigns experience 4,949 cyber threats per day, although larger campaigns may see far more.</p></li></ul>
    <div>
      <h3>The Athenian Project &amp; Cloudflare for Campaigns Participants</h3>
      <a href="#the-athenian-project-cloudflare-for-campaigns-participants">
        
      </a>
    </div>
    <p>Since 2020, the number of domains under the Athenian Project has increased by 48 percent, to 229 state and local government election websites in 28 states receiving our security protections. Cloudflare also protects many political campaigns at all levels on a wide range of plans. Under <a href="/introducing-cloudflare-for-campaigns/">Cloudflare for Campaigns,</a> an initiative we launched in January 2020 to provide a free package of security protections to political campaigns with our partnership with <a href="https://www.defendcampaigns.org/">Defending Digital Campaigns</a>, we protect more than 50 political campaigns from candidates in 27 states.</p>
    <div>
      <h3>Significant traffic spikes and probing for vulnerabilities to government election websites</h3>
      <a href="#significant-traffic-spikes-and-probing-for-vulnerabilities-to-government-election-websites">
        
      </a>
    </div>
    <p>For state and local governments, election night and the days leading up that day are typically the most important days of the year. With constituents accessing voter information such as voting and polling stations, election officials expect higher amounts of traffic to their website. Over the last few months, we’ve seen this shift at Cloudflare, with noticeable increases in traffic ranging from 2 to 3 times the volume of requests to many of these government election websites. We believe there are a wide range of factors for traffic spikes including, but not limited to, states expanding vote-by-mail initiatives and voter registration <a href="https://thehill.com/homenews/state-watch/501577-heres-where-your-state-stands-on-mail-in-voting">deadlines</a> due to emergency orders by 53 states and territories throughout the United States. In March, more than 23 states conducted presidential primaries including 14 states on Super Tuesday, the most states on a single day to host primary elections.</p><p>At this year's DEF CON Voting Village, experts from the Department of Homeland Security <a href="https://www.politico.com/newsletters/weekly-cybersecurity/2020/08/10/looking-back-at-a-landmark-law-on-government-it-modernization-789782">identified</a> routine failure due to abnormally high demand as the largest risk to election systems because of the coronavirus pandemic. We have seen this in full effect, with traffic to election websites being unpredictable, and including unexplained spikes outside of election cycles, per the graph below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4gm6Qv21tg5xhRwAjrzawp/a517449aa57ddc203d514bdba63070e1/image1-7.png" />
            
            </figure><p>To help state and local governments under the Athenian Project prepare for elections, we wanted to identify the types of threats that election websites face and how to better protect their website from malicious attacks. Since the beginning of this year, we’ve seen a large number of attempts to exploit security vulnerabilities that were mitigated by the <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">web application firewall (WAF)</a>, with 90 million threats blocked in March 2020, for example. Cloudflare’s WAF uses managed rulesets to offer a wide range of protection against known vulnerabilities and suspicious behavior and custom firewall rules to allow users to rapidly identify and adapt to the evolving threat landscape. Of the threats we identified, managed rulesets helped mitigate 51% of threats and custom firewall rules mitigated an additional 35% of threats. Having both managed rulesets and custom firewall rules therefore helps safeguard election information.</p><p>In previous <a href="https://arstechnica.com/information-technology/2019/04/dhs-fbi-say-election-systems-in-50-states-were-targeted-in-2016/">elections</a>, attackers have used SQL injections against government election websites to attempt to extract information. We therefore did a deeper dive on those types of attacks, to understand if these threats are being conducted leading up to the 2020 election. We identified a number of SQL injection threats that were blocked by Cloudflare, with an average of 43,884 attempts per day across all domains under the Athenian Project. SQL injection attacks are commonly attempted against government election sites, with the WAF <a href="https://www.cloudflare.com/learning/security/threats/how-to-prevent-sql-injection/">blocking</a> an average of 199 SQL injection threats per day.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7y9ig1wX7AziXeYCvE8Hgq/e691992a5cf4a6ab70560777bee505a9/image2-2.png" />
            
            </figure>
    <div>
      <h3>Political Campaigns have experienced more DDoS attacks</h3>
      <a href="#political-campaigns-have-experienced-more-ddos-attacks">
        
      </a>
    </div>
    <p>When looking at the ecosystem of election security, political campaigns can be soft targets for cyberattacks due to the inability to dedicate resources to sophisticated cybersecurity protections. Campaigns are typically short-term, cash strapped operations that do not have an IT staff or budget necessary to promote long term security strategies.</p><p>To gain a better understanding of the threats around political campaigns, we surveyed 80 U.S. federal political campaigns on a range of Cloudflare plans from Cloudflare for Campaigns to our self serve plans. Cloudflare has mitigated a total of 77,192,840 threats on these sites since January 2020. That means that, on average, these sites saw 4,949 threats per day from January 2020 to present.  In general, we see larger scale attacks against Senate candidate’s sites than those of House candidates.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10d6M1cglV6h5W2Vf7gfFL/d8987686cca0b5720312b045ec4b2109/image4-2.png" />
            
            </figure><p>As the election season has progressed, we’ve also seen an increase in the average number of attacks against political campaigns, with a 187% increase from May to June 2020. As face to face campaigning is not an option, campaigns now rely on online platforms such as video conferencing software, online fundraising and social media to reach voters. This can present significant <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity challenges</a> to already vulnerable groups, such as political campaigns. Political campaigns are realizing the importance of cybersecurity services and have begun working with state parties and committees on training on the types of <a href="https://www.usnews.com/news/politics/articles/2019-05-03/campaigns-grapple-with-how-to-manage-cybersecurity-in-2020">cyber threats</a> and widely available resources for campaigns. With basic cybersecurity hygiene training on issues such as password security, two factor authentication, <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">identifying phishing scams</a>, network protection, internal application security and social media privacy, campaign staff are less likely to be the victims of a data breach.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72sLfeawAVuHIuAlPV8mxc/9644139e68627d35b1c2272783884d1c/image3-2.png" />
            
            </figure><p>There has been a notable amount of DDoS activity against political campaign websites. DDoS attacks, which can be cheap, easy to organize and highly destructive, are often <a href="https://www.cyberscoop.com/ddos-democratic-campaigns-primary-dnc-dccc/">used</a> for targeting political campaigns. A DDoS attack that takes down a campaign's website during critical times can severely disadvantage a website. Campaigns used rate limiting to address 63% of the cyber threats they experienced, suggesting that DDoS attacks remain a significant concern.</p>
    <div>
      <h3>Securing Elections in 2020</h3>
      <a href="#securing-elections-in-2020">
        
      </a>
    </div>
    <p>Democracies rely on access to information and trust in government institutions, especially during a crisis. Reflecting this reality, elections officials are more aware and focused on reliability and resilience than ever before. Likewise, political campaigns are increasingly aware of the potential risks of DDoS activity and other cyber threats.</p><p>As COVID-19 continues to spread, it puts further pressure on ensuring that the Internet can be used to access and share election information. At Cloudflare, we believe that expanding access to tools that election officials and political candidates need to combat a range of online threats both serves our mission to help build a better Internet and strengthens our democracy.</p> ]]></content:encoded>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Cloudflare for Campaigns]]></category>
            <category><![CDATA[Election Security]]></category>
            <guid isPermaLink="false">3KpkXmFtmHmnGfmx1dx4Xp</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Two-Year Anniversary of The Athenian Project: Preparing for the 2020 Elections]]></title>
            <link>https://blog.cloudflare.com/two-year-anniversary-of-the-athenian-project/</link>
            <pubDate>Tue, 10 Dec 2019 16:00:27 GMT</pubDate>
            <description><![CDATA[ Two years ago, Cloudflare launched its Athenian Project, an effort to protect state and local government election websites from cyber attacks. With the two-year anniversary and many 2020 elections approaching, we are renewing our commitment to provide Cloudflare’s highest level of services for free ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Two years ago, Cloudflare launched its Athenian Project, an effort to protect state and local government election websites from cyber attacks. With the two-year anniversary and many 2020 elections approaching, we are renewing our commitment to provide Cloudflare’s highest level of services for free to protect election websites and ensure the preservation of these critical infrastructure sites. We started the project at Cloudflare as it directly aligns with our mission: to help build a better Internet. We believe the Internet plays a helpful role in democracy and ensuring constituents’ right to information. By helping state and local government election websites, we ensure the protection of voters’ voices, preserve citizens’ confidence in the democratic process, and enhance voter participation.</p><p>We are currently helping 156 local or state websites in 26 states to combat DDoS attacks, SQL injections, and many other hostile attempts to threaten their operations. This is an additional 34 domains in states like Ohio, Florida, Kansas, South Carolina and Wisconsin since we <a href="/protecting-elections-one-year-retrospective/">reported</a> statistics after last year’s election.</p><p>The need for security protection of critical election infrastructure is not new, but it is in the spotlight again as the 2020 U.S. elections approach, with the President, 435 seats in the U.S House of Representatives, 35 of the 100 seats in the U.S. Senate, and many state and local representatives on the ballot. According to the <a href="https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume1.pdf">Department of Homeland Security and Federal Bureau of Investigations</a>, election infrastructure in all 50 states was targeted during the 2016 presidential election. The risk is real. <a href="https://www.nytimes.com/2019/05/14/us/florida-election-hacking-desantis.html">Florida counties</a> suffered a spearfishing attack that gave hackers access to the voter registration rolls, and a <a href="https://techcrunch.com/2018/05/04/tennessee-election-ddos-knox-county-voting/">Tennessee county website</a> was knocked offline on election night and had to resort to handing out printed election vote counts.</p><p>Although the U.S government has sought to combat malicious actors that target election infrastructure, with Congress approving funding of $250 million for states in the administering and security of U.S elections in September 2019, there is always more to be done. As states rapidly prepare for the upcoming elections, the need for inexpensive, accessible solutions to protect election infrastructure are at an all-time high. As Micah Van Maanen, the Information Technology Director for Sioux County, Iowa, put it:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EAIv7YRwF8RorP38Fitnb/eab0f840bb781d5ef282ee6f99364873/BDES-170_Athenian2YearAnniversary-Pullquote-1.png" />
            
            </figure><p>At Cloudflare, we believe it is vital to the national interest that elections are secure and free from interference as these fundamentals are essential to United States democracy. In these two years, we have learned a great deal about government election offices all across the U.S, the spread of information and resources available to them, and the small number of people it takes to make an impact in the protection of election infrastructure.</p><p>We still have more to learn to ensure the protection of these critical sites and understanding how we can better prepare state and local election websites for the upcoming elections. As we look into the future of the project in upcoming years, it is important to also look at the past.</p>
    <div>
      <h3>Stories from the Field:</h3>
      <a href="#stories-from-the-field">
        
      </a>
    </div>
    <p>The jurisdictions that are using Cloudflare to protect their election websites are diverse, with state and local governments representing a range of populations from over 1.2 million residents to fewer than 5,000 residents.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1g90qA5ngplUtcW1o1eDwP/9d9dc70d9ec9fc93e355a67321d6698a/i-voted-sticker-lot-1550340-1.jpg" />
            
            </figure><p>I Voted Stickers- Element 5 Digital on Pexels</p><p>In Ohio, the Secretary of State released their yearly state directive in <a href="https://www.sos.state.oh.us/globalassets/elections/directives/2018/dir2018-15.pdf">June 2018</a> and <a href="https://www.ohiosos.gov/globalassets/elections/directives/2019/dir2019-08.pdf">2019</a>, to all counties in Ohio Board of Elections on tools, resources and best cybersecurity practices to strengthen the security of their election system. The Athenian Project was recommended and encouraged in both directives for the DDoS protection, Web Application Firewall, Rate Limiting, Under Attack Mode and 24/7 support. During this past year- we have on-boarded 13 counties in Ohio with a total of 27 domains protected under Cloudflare. In the directive, Ohio plans to become the leader in best practices in the security of elections systems and we are happy to be aiding in this mission.</p><p>The Idaho Secretary of State joined the Athenian Project at the beginning of 2018 and Chad Houck, Idaho’s Chief Deputy Secretary of State, engaged with our team on how exactly the Secretary of State could benefit from Cloudflare services.</p><p>On May 11, 2018, two of Idaho’s state agency websites were defaced by an anti-government group that posted a manifesto in Italian. After receiving notifications from many different sources regarding the security breach and following several inquiries from the press regarding the matter, Chad decided to look at the Idaho Secretary of State Cloudflare account to see if there was any evidence of the same hackers trying to penetrate the IDSOS site. Using Cloudflare’s analytic tools, he was able to see 27,000 blocked requests, up from the normal 240 per day,  within the same 3.5-hour window that saw the other sites defaced. Cloudflare's Web Application Firewall had automatically blocked the bad requests that attempted to penetrate the site.</p><p>Confident in the value of Cloudflare’s tools, Deputy Secretary Houck’s plan is to create policies of operation that assist Idaho’s 44 counties in protecting their election websites and statewide voter registration systems. “With the first two counties already on board for a pilot, our goal is to be the first state to reach 100% county adoption of the Athenian Project tools.”</p>
    <div>
      <h3>Understanding the U.S. Electoral System &amp; Athenian Project Expansion:</h3>
      <a href="#understanding-the-u-s-electoral-system-athenian-project-expansion">
        
      </a>
    </div>
    <p>The United States election system is fragmented and varies greatly from state to state. In some states, the administration of elections is covered by the state government and, in others, by counties or local municipalities. This system is decentralized, meaning that each state and local government has control over how the various duties of elections are distributed. According to the <a href="http://www.ncsl.org/research/elections-and-campaigns/election-administration-at-state-and-local-levels.aspx">National Conference of State Legislators</a>, “there are more than 10,000 election administration jurisdictions in the U.S. The size of these jurisdictions varies dramatically.” This means the voting experience differs from county to county, and from state to state.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5DaBMtSZGcfMtT19L7I7T7/135e8b36216d2f73e251862fcb545e55/photo-1487730202306-21b1a371bab0" />
            
            </figure><p>Photo by <a href="https://unsplash.com/@bmowinkel?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Brandon Mowinkel</a> on <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></p><p>This system fragmentation has been a challenge for the Athenian project. In the process, we have learned that state and local government election offices range on technical abilities and funding. With this in mind, our teams at Cloudflare are looking into new ways to engage the community. Among our efforts, we aim to interact with election security information sharing centers that provide recommendations and resources for election infrastructure to strengthen cybersecurity practices. Doing this helps state and local entities prepare for the upcoming election.</p>
    <div>
      <h2>What’s Next:</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>As we have a year until the 2020 election, we are thinking of how we engage with our current Athenian participants and expand access to Cloudflare services to new states and counties within the United States that might benefit from the Athenian Project. A key aspect that we have learned in this process is that the security of election websites sits with a small group of dedicated government officials that have found each other and built their own networks to share best cybersecurity practices.</p><p>In response to my question to Athenian participants in the onboarding process about how they discovered the project and Cloudflare, many of the answers I receive are similar: they heard about the project from another county, neighboring state, or information sharing centers that recommend using Cloudflare services as an extra layer of protection on their election infrastructure. Rodney Allen, the Executive Director for the Board of Voter Registration &amp; Elections of Pickens County, South Carolina says that “the great thing about the Athenian Project is that Pickens County Board of Elections site has not experienced any downtime or outages thanks to Cloudflare, especially during South Carolina's 2018 general election and special elections in 2019."</p><p>As we set our sights for the 2020 election, we are happy to help provide these state and local governments with the tools they need to protect their election websites. If you run a state or local election website, feel free to reach out through our <a href="https://www.cloudflare.com/athenian/#signup">webform</a> or read more about how our <a href="https://www.cloudflare.com/athenian/#about">Athenian Project</a> can help secure your online presence.</p> ]]></content:encoded>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">1ocQ6muRKPpAPaqzmVXlL5</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[Athenian Project Turns One: Are Election Websites Safer?]]></title>
            <link>https://blog.cloudflare.com/protecting-elections-one-year-retrospective/</link>
            <pubDate>Fri, 21 Dec 2018 19:01:51 GMT</pubDate>
            <description><![CDATA[ One year ago, Cloudflare launched the Athenian Project to provide free Enterprise-level service to election and voter registration websites run by state and local governments in the United States.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>One year ago, Cloudflare launched the <a href="http://cloudflare.com/athenian">Athenian Project</a> to provide free Enterprise-level service to election and voter registration websites run by state and local governments in the United States. Through this project, we have helped over 100 entities in 24 states protect their websites from denial of service attacks, SQL injection, and other malicious efforts aimed at undermining the integrity of their elections. With the end of the year approaching, and the November 6th US midterm elections behind us, we wanted to look back at the project and what we have learned as we move towards 2020.</p>
    <div>
      <h3>US Midterm Election Day</h3>
      <a href="#us-midterm-election-day">
        
      </a>
    </div>
    <p>The morning of November 6th was full of anticipation for the Athenian Project team with the policy, engineering and support teams ready as polls opened in the East. Early in the day, we were notified by our partner at the CDT that some elections websites were experiencing downtime. Mobilizing to help these groups, we reached out to the website administrators and, through the course of the day, on-boarded over 30 new county-level websites to the Athenian Project and helped them manage the unpredictably large amounts of legitimate traffic.</p><p>This last-minute effort would not have been possible without the help of the CDT and all of the other organizations working to maintain election integrity. Each organization brings their own strengths, and it took everyone working together, as well as preparation and diligence on the part of election officials, to make election day a success.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/60TaVAeDXgSamWzRkGwrK/9d69ac958a8b0c2106bfb618af9186a0/Screen-Shot-2018-12-18-at-4.18.01-PM.png" />
            
            </figure><p>I Voted Stickers— Creative Commons Attribution Element5 Digital on Pexels</p>
    <div>
      <h3>Civic Engagement Online</h3>
      <a href="#civic-engagement-online">
        
      </a>
    </div>
    <p>In looking at the aggregated election day data, the biggest story is one of engagement. In the month leading up to the November election, voter registration and election websites on the Athenian Project received nearly three times the number of requests as in September or any other month preceding it. Athenian Project websites received more requests in just the first seven days of November than in any other month except October.</p><p>When we first started the Athenian Project, we expected denial of service and other attacks to be the driving concern. However, we soon found that many state and local election websites experience large fluctuations in legitimate traffic on election day, especially in the event of a contested election, and appreciated having a CDN to help manage these events. As can be seen below, traffic levels, already higher than usual on election day, at times suddenly spiked to four times above the day’s average for certain websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Fa1XcUOuRXMlgM4ZQoYGf/0bb3cf59b8b39c319f410664946ee998/Screen-Shot-2018-12-18-at-4.18.15-PM.png" />
            
            </figure><p>Requests to Athenian Project websites on 11/6/18</p>
    <div>
      <h3>Keeping a Lookout for Bad Actors</h3>
      <a href="#keeping-a-lookout-for-bad-actors">
        
      </a>
    </div>
    <p>We are happy to report that we didn’t see any evidence of a coordinated set of attacks across the election websites on our service. There were, however, a variety of attacks stopped by rules within our Web Application Firewall (WAF). The prevented attacks included scans by malicious bots impersonating helpful bots. These scans enable malicious actors to check for vulnerabilities to exploit, and were stopped using fake user-agent rules which can identify the malicious bot’s attempt to spoof its identity. The WAF also stopped a variety of cross-site scripting attempts, forced login attempts, and SQL injection attacks aimed at gaining access to databases. The attacks appear to have been Internet-wide attacks targeting specific known vulnerabilities rather than election website specific attacks. This finding re-enforces our belief that improving cybersecurity is vital for everyone on the Internet every day, not just in response to large events.</p>
    <div>
      <h3>Where We’re Going in 2019</h3>
      <a href="#where-were-going-in-2019">
        
      </a>
    </div>
    <p>Moving forward, we are hoping to continue improving the reach of the project. One year is a relatively short time, especially when considering code freezes around both the primaries and general elections, and we hope to continue education efforts and on-boardings in advance of the 2020 elections. One item we noticed was that, despite making it easy to <a href="https://www.cloudflare.com/application-services/products/ssl/">obtain SSL certificates and use TLS on Cloudflare</a>, not all of the requests to Athenian Project websites are encrypted. This happens either as a result of misconfiguration, or because Universal SSL has been disabled for the site and no non-Cloudflare certificates have been uploaded. As a result, we will strive to do a better job of encouraging SSL adoption and educating website administrators about the importance of encryption.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2IyPhFTMzv2CQhMAk6WGX6/140534c0982fdf82a1e2d5804024ea31/Screen-Shot-2018-12-19-at-1.56.40-PM.png" />
            
            </figure><p>US Capital Building— Creative Commons Attribution on Pixabay</p><p>We would like to thank election officials and administrators across the country for their hard work in maintaining the integrity of our midterm elections. Election cybersecurity was not a story, and that is a testament to the commitment of these individuals.</p><p>With the midterm elections over, the Cloudflare Athenian Project team is setting our sights on 2020 and any special elections which may come before then as well as looking at opportunities to expand the Athenian Project into new areas. If you run a state or local election website and are interested in the Athenian Project, feel free to reach out through our web form at <a href="http://cloudflare.com/athenian">cloudflare.com/athenian</a>.</p> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Better Internet]]></category>
            <guid isPermaLink="false">5YvY5b4A1n0r7Go5v3JKck</guid>
            <dc:creator>Erin Walk</dc:creator>
        </item>
        <item>
            <title><![CDATA[DC CyberWeek Is Here!]]></title>
            <link>https://blog.cloudflare.com/dc-cyberweek-is-here/</link>
            <pubDate>Mon, 15 Oct 2018 17:15:07 GMT</pubDate>
            <description><![CDATA[ This October is the 15th annual National Cybersecurity Awareness Month in the United States, a collaboration between the US government and industry to raise awareness about the part we can all play in staying more secure online. ]]></description>
            <content:encoded><![CDATA[ <p></p><p><i>Photo by Sarah Ferrante Goodrich / </i><a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit"><i>Unsplash</i></a></p><p>This October is the 15th annual National Cybersecurity Awareness Month in the United States, a collaboration between the US government and industry to raise awareness about the part we can all play in staying more secure online. Here at Cloudflare, where our mission is to help build a better internet, we look forward to this month all year.</p><p>As part of this month-long education campaign, Cloudflare is participating in D.C CyberWeek this week, the largest cybersecurity festival in the U.S, taking place in Washington, DC. This year’s event is expected to have over 10,000 attendees, more than 100 events, and feature representatives from over 180 agencies, private companies, and service providers. We will join with other leaders in cybersecurity, to share best practices, find ways to collaborate, and work to achieve common goals.</p><p>Along with the United States, the European Union also runs a month-long cyber awareness <a href="https://cybersecuritymonth.eu/">campaign</a> in October, with the initiative having started back in 2012. The aim of this advocacy campaign is similar: promoting <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a> among citizens and organizations, and providing information on available tools and resources. <a href="https://www.youtube.com/watch?v=FeFQ67z87_w&amp;feature=youtu.be">Watch</a> our CTO speak to some main considerations around good cyber hygiene, business practices and appropriate policy-making in the field of cybersecurity as part of EU #CyberSecMonth.</p>
    <div>
      <h3>Cloudflare’s Cybersecurity Commitment</h3>
      <a href="#cloudflares-cybersecurity-commitment">
        
      </a>
    </div>
    <p>As well as our own company efforts, we have joined with 60 other global companies to sign on to the Cybersecurity Tech Accord. The Tech <a href="https://cybertechaccord.org/">Accord</a> is a public commitment to protect and empower civilians to take action to secure the internet. The accord itself covers four simple commitments:</p><ul><li><p>That we will protect all of our users everywhere</p></li><li><p>That we will oppose cyberattacks on innocent citizens and enterprises from anywhere</p></li><li><p>That we will help empower users, customers, and developers to strengthen cybersecurity protection</p></li><li><p>That we will partner with each other and with like-minded groups to enhance cybersecurity</p></li></ul><p>But more than that, it is about creating a forum where companies large and small can come together to share best practices, debate threats, and hold each other accountable for our efforts in this arena. It is also a place where we can share ideas for ways in which the government can help shape good cybersecurity hygiene through appropriate laws and policies. Signing on was an easy decision for us; these are commitments we have long supported in practice.</p>
    <div>
      <h3>Cloudflare’s Cybersecurity Contribution</h3>
      <a href="#cloudflares-cybersecurity-contribution">
        
      </a>
    </div>
    <p>Beyond our collaboration with the cybersecurity community, Cloudflare runs two other initiatives, designed to make the internet a more secure place for vulnerable groups who might lack financial or technical resources.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AuBS7jcg9jsoqTf4m36L8/9506a18b2ec2b48e44401e1bcd613fea/Screen-Shot-2018-10-15-at-10.00.11-AM.png" />
            
            </figure>
    <div>
      <h4>Project Galileo</h4>
      <a href="#project-galileo">
        
      </a>
    </div>
    <p>At Cloudflare, we believe that limited resources shouldn’t preclude vulnerable groups from receiving the support they need. As part of our commitment to the overall health of the internet, we started Project Galileo in 2014 to ensure that at-risk public interest groups are able to stay online securely. We started it in response to cyber attacks launched with the intent of silencing important and vulnerable groups, like humanitarian organizations, political dissidents, and artistic groups. We partner with well-respected free speech, public interest, and civil society organizations to help us identify at-risk websites in need of our pro bono efforts. Once our partners have identified these groups, we extend our DDoS and WAF protection to ensure these websites stay online. The hundreds of websites we protect through Project Galileo includes sites for a <a href="https://www.cloudflare.com/galileo/case-study/trevor-project/">national organization</a> providing crisis intervention and suicide prevention services to lesbian, gay, bisexual, transgender and questioning (LGBTQ) young people, an <a href="https://www.cloudflare.com/galileo/case-study/cagle-cartoons/">editorial cartoonist</a>, to an <a href="https://www.cloudflare.com/galileo/case-study/veterans-brotherhood/">organization</a> designed to help veterans with PTSD.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jwVp96bQlsxYNBFLYdggn/fc5492bf7c6da06c0ef04af3ec32913d/TwitterSocial-HeroImage-1200x600.png" />
            
            </figure>
    <div>
      <h4>The Athenian Project</h4>
      <a href="#the-athenian-project">
        
      </a>
    </div>
    <p>The <a href="https://www.cloudflare.com/athenian/">Athenian Project</a> was born out of a recognition that state and local governments had similar challenges as our Project Galileo participants. In an era of increasing distrust on the internet, it is essential that state and locally run election websites are safe, accurate, and online. So we extended our Enterprise-level services to those sites for free. We believe it’s imperative that voter data and election integrity is maintained, and that we can and should help prevent attackers from stealing sensitive voter information that may allow them to sway an election. Election sites should stay online during peak times, like voter registration deadlines, and election days. We have seen huge surges of traffic in those key days, and our AnyCast network has allowed these sites to stay up.</p>
    <div>
      <h3>Moving Forward</h3>
      <a href="#moving-forward">
        
      </a>
    </div>
    <p>We believe CyberWeek is an important time for private companies to spend some time thinking about the broader world. This is just the tip of the iceberg, as we continue to think about new and innovative ways we can be good members of this community. We hope that you will join us in our efforts to help make the internet more secure.</p> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Project Galileo]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <guid isPermaLink="false">2HpEpXnbu3pfAMOYd3kOzw</guid>
            <dc:creator>Erica Fox</dc:creator>
        </item>
        <item>
            <title><![CDATA[Securing U.S. Democracy: Athenian Project Update]]></title>
            <link>https://blog.cloudflare.com/athenian-project-update/</link>
            <pubDate>Thu, 19 Jul 2018 15:01:07 GMT</pubDate>
            <description><![CDATA[ Last December, Cloudflare announced the Athenian Project to help protect U.S. state and local election websites from cyber attack.

Since then, the need to protect our electoral systems has become increasingly urgent.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Last December, Cloudflare <a href="/the-athenian-project/">announced the Athenian Project</a> to help protect U.S. state and local election websites from cyber attack.</p><p>Since then, the need to protect our electoral systems has become increasingly urgent. As described by Director of National Intelligence Dan Coats, the “digital infrastructure that serves this country is literally under attack.” Just last week, we learned new details about how state election systems were targeted for cyberattack during the 2016 election. The U.S. government’s indictment of twelve Russian military intelligence officers describes the scanning of state election-related websites for vulnerabilities and theft of personal information related to approximately 500,000 voters.</p><p>This direct attack on the U.S. election systems using common Internet vulnerabilities reinforces the need to ensure democratic institutions are protected from attack in the future. The Athenian Project is Cloudflare’s attempt to do our part to secure our democracy.</p>
    <div>
      <h3>Engaging with Elections Officials</h3>
      <a href="#engaging-with-elections-officials">
        
      </a>
    </div>
    <p>Since announcing the Athenian Project, we’ve talked to state, county, and municipal officials around the country about protecting their election and voter registration websites. Today, we’re proud to report that we have Athenian Project participants in 19 states, and are in talks with many more. We have also strategized with civil society organizations, government associations, and federal government officials who share the goal of ensuring state and local officials have the tools they need to protect their institutions from cyberattack.</p><p>Working with state and local election officials has given us new appreciation for the dedication of those who serve as election officials, and how difficult it can be for those officials to identify and get the resources they need.</p><p>Local election officials — like ordinary voters — are the foundation of democracy. They guard the infrastructure of our constitutional system. Many officials juggle multiple roles within local government. They may manage multiple election websites, with limited information technology staff. Yet they know that their community, and sometimes the entire country, is relying on them to protect election integrity from countless global threats against it. The Athenian Project is about giving these dedicated professionals the tools they need to fight back and secure their systems.</p><p>A county Clerk-Recorder and Registrar of Voters, who is responsible for a number of election-related websites, told us that election officials worry about drawing attention to themselves, for fear they may be targeted for attack. Although cybersecurity is only one of the many responsibilities on her plate, this official is determined protect the county, using all the resources at her disposal. But without dedicated information technology staff, she has had difficulty identifying how best to protect county infrastructure.</p><p>Cloudflare can help, with both tools and know how.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6oiNdWOQ8TJwPETRvM6ATw/0e1b3a508e27ed5c8d6f1ceec1c929b2/BlogImagery-BenefitsOfCloudflareServices.png" />
            
            </figure>
    <div>
      <h3>Benefits of Cloudflare services</h3>
      <a href="#benefits-of-cloudflare-services">
        
      </a>
    </div>
    <p>Given the current threats, we think it’s important to provide more details about what our services do, and how they can help election officials. We’ve understood since the beginning that election websites would benefit from Cloudflare’s security features, including our DDoS mitigation, Web Application Firewall (WAF), IP reputation database, and ability to block traffic by country or IP address. In fact, reports of DDoS attacks on state and local government websites often get the most coverage because the impact — loss of service to the site — is visible to the public. Until our conversations, however, we did not fully appreciate how our services could solve other common problems for state and local government officials.</p><p>For election officials, the last day of voter registration and election day are often nerve-wracking events. Their websites can see more traffic in an hour than they’ve seen all year. For example, when the Special Election in Alabama in 2017 drew traffic from around the country, Alabama needed a distributed network and a CDN to ensure that the nearly 5 million Alabamians and everyone else in the U.S. could follow along.</p><p>Cloudflare’s other features can also help state and local election websites. The Senate Select Committee on Intelligence <a href="https://www.burr.senate.gov/imo/media/doc/RussRptInstlmt1-%20ElecSec%20Findings,Recs2.pdf">summary</a> of the 2016 election hacking attempts concluded that the majority of malicious access attempts on voting-related websites were perpetrated using SQL injection. Cloudflare’s WAF protects against SQL injection, as well as other forms of attack.</p><p>Recently, one of the states whose election websites are part of the Athenian Project was attacked and two non-election related websites were defaced. Website defacement occurs when someone who is not authorized to make website changes alters the content on the site, often changing the home page to display the hacker’s logo or other material. Although the state’s election websites saw a 100-fold increase in threat traffic, our WAF helped prevent a similar defacement on those sites.</p><p>For election websites that are not already running on HTTPS, Cloudflare can also simplify the process of transitioning to use of SSL. With <a href="/chrome-not-secure-for-http/">Google Chrome’s new initiative</a> to mark non-HTTPS sites as insecure, potential voters visiting non-encrypted voter registration websites will be warned not to enter sensitive information on the site “because it could be stolen by attackers.” That is not the message officials want to send to a public nervous about cyberattacks on election infrastructure. Adding a security certificate can be a daunting task for local officials without IT resources, but for Athenian Project participants, it’s available at the click of a button. Athenian Project participants who need help with certificate management are given dedicated, auto-renewed certificates to improve the security of their sites. Cloudflare page rules can then direct all traffic to the HTTPS site.</p>
    <div>
      <h3>Lessons learned and new tools</h3>
      <a href="#lessons-learned-and-new-tools">
        
      </a>
    </div>
    <p>We’ve also tailored the Athenian Project to better address the needs of those we are serving. So what have we done?</p><ul><li><p><i>More tools:</i> We wanted to provide more tools for those who want to learn about and set up our service. We’ve therefore revamped our website to be more intuitive to navigate and to provide more information. We’ve created a new, <a href="https://www.cloudflare.com/athenian/guide/">interactive guide</a> discussing <a href="https://www.cloudflare.com/learning/security/glossary/website-security-checklist/">website protection</a> and a short video sharing the experience of current Athenian Project participants.</p></li><li><p><i>How-to videos:</i> There are videos to not only walk new participants through creating an account and transitioning their DNS servers, but also to provide best practices so that new participants can identify and turn on important features.</p></li></ul><p><b>Getting Started</b></p><p><b>Best Practices</b></p><ul><li><p><i>Support help:</i> We have found that state and local election officials often have challenges at the onboarding stage that are best addressed through personal attention. We’ve therefore added support features — including Athenian-specific support — to increase the personal interaction we have with officials and to provide them an opportunity to describe their own situation and needs.</p></li><li><p><i>Set up flexibility:</i> We’ve learned to be flexible with how we set up our service. While some counties were eager to leverage as much of the service as possible, including using full DNS delegation and dedicated certificates, others preferred to pick and choose between options. Depending on the circumstances for a given jurisdiction, we customize protection so they can use Cloudflare without needing to change the IT system for the whole state or county.</p></li><li><p><i>Athenian Project-specific terms of service:</i> To address common government contracting restrictions, we’ve drafted an Athenian Project-specific <a href="https://www.cloudflare.com/media/pdf/cloudflare-athenian-project-terms-of-service.pdf">terms of service</a>.</p></li></ul><p>We hope these new details will make it even easier for election officials to get access to tools that can help them fulfill their critical responsibility to protect our elections.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/44eDvXiJ33WsvdWfvq9x6X/00a7950fb3cf8505e8e3170820a41d0c/BlogImagery-WhatsNext.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>In November, every state and district in the country will hold congressional elections. Election officials — and all of us — want to make sure that voter information remains secure and that websites stay online as voters seek out information on polling places and voting requirements, and anxiously refresh results pages on election night.</p><p>The entire American experiment is built on a simple act: a vote. To work as designed, citizens must trust the electoral system, its strength, integrity, and the people who protect it. Cloudflare is proud to support local officials on the front lines of election security.</p><p>And we, like election officials, know that building a resilient system requires long-term commitment. We are committed to continuing to do our part to keep U.S. election websites secure in this election and beyond.</p><p>If you would like more information about the Athenian Project, please visit our website <a href="https://www.cloudflare.com/athenian">cloudflare.com/athenian</a>.</p> ]]></content:encoded>
            <category><![CDATA[Community]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <guid isPermaLink="false">13ebYohKVfR99xxh4yzCk1</guid>
            <dc:creator>Alissa Starzak</dc:creator>
            <dc:creator>Erin Walk</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Athenian Project: Helping Protect Elections]]></title>
            <link>https://blog.cloudflare.com/the-athenian-project/</link>
            <pubDate>Fri, 15 Dec 2017 14:00:00 GMT</pubDate>
            <description><![CDATA[ From cyberattacks on election infrastructure, to attempted hacking of voting machines, to attacks on campaign websites, the last few years have brought us unprecedented attempts to use online vulnerabilities to affect elections both in the United States and abroad. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>From cyberattacks on election infrastructure, to attempted hacking of voting machines, to attacks on campaign websites, the last few years have brought us unprecedented attempts to use online vulnerabilities to affect elections both in the United States and abroad. In the United States, the Department of Homeland Security reported that individuals tried to hack voter registration files or public election sites in 21 states prior to the 2016 elections. In Europe, hackers targeted not only the campaign of Emmanuel Macron in France, but government election infrastructure in the Czech Republic and Montenegro.</p><p>Cyber attack is only one of the many online challenges facing election officials. Unpredictable website traffic patterns are another. Voter registration websites see a flood of legitimate traffic as registration deadlines approach. Election websites must integrate reported results and stay online notwithstanding notoriously hard-to-model election day loads.</p><p>We at Cloudflare have seen many election-related cyber challenges firsthand. In the 2016 U.S. presidential campaign, Cloudflare protected most of the major presidential campaign websites from cyberattack, including the Trump/Pence campaign website, the website for the campaign of Senator Bernie Sanders, and websites for 14 of the 15 leading candidates from the two major parties. We have also protected election websites in countries like Peru and Ecuador.</p><p>Although election officials have worked hard to address the security and reliability of election websites, as well as other election infrastructure, budget constraints can limit the ability of governments to access the technology and resources needed to defend against attacks and maintain an online presence. Election officials trying to secure election infrastructure should not have to face a Hobson’s choice of deciding what infrastructure to protect with limited available resources.</p>
    <div>
      <h3>The Athenian Project</h3>
      <a href="#the-athenian-project">
        
      </a>
    </div>
    <p>Since 2014, Cloudflare has protected at-risk public interest websites that might be subject to cyberattack for free through <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>. As part of Project Galileo, we have supported a variety of non-governmental election efforts helping to ensure that individuals have an opportunity to participate in their democracies. This support included protection of Electionland, a project to track and cover voting problems during the 2016 election across the country and in real-time.</p><p>When Project Galileo began, we did not anticipate that government websites in the United States might be similarly vulnerable because of resourcing concerns. The past few years have taught us otherwise. We at Cloudflare believe that the integrity of elections should not depend on whether state and local governments have sufficient resources to protect digital infrastructure from cyber attack and keep it online.</p><p>The common mission of those working on elections is to preserve citizen confidence in the democratic process and enhance voter participation in elections<a href="#fn1">[1]</a>. To protect voters’ voices, election websites and infrastructure must be stable and secure. Prior to an election, websites provide critical information to the public such as registration requirements, voting locations and sample ballots. After an election, websites provide election results to citizens.</p><p>The institutions in which we place our trust must have the tools to protect themselves. Voter registration websites must stay online before a registration deadline, making it possible for voters who want to register to do so. Election websites should be available on election day notwithstanding increased traffic. Voters should have confidence that officials are doing everything they can to safeguard the integrity of election and voter data, and that election results will be available online.</p><p>That is why today, we are launching the <a href="https://www.cloudflare.com/athenian-project/">Athenian Project</a>, which builds on our work in Project Galileo. The Athenian Project is designed to protect state and local government websites tied to elections and voter data from cyberattack, and keep them online.</p><p>U.S. state and local governments can participate in the Athenian Project if their websites meet the following criteria:</p><ul><li><p>The website is managed and owned by a state, county, or municipal government; and</p></li><li><p>The website is related to</p><ul><li><p>The administration of elections, including the provision of information related to voting and polling places; or-Voter data, including voter registration or verification; or</p></li><li><p>The reporting of election results.</p></li></ul></li></ul><p>For websites that meet these criteria, Cloudflare will extend its highest level of protection for free.</p><p>We recognize that different government actors may have different challenges. We therefore intend to work directly with relevant state and municipal officials to address each site’s needs.</p>
    <div>
      <h3>Protecting our Elections</h3>
      <a href="#protecting-our-elections">
        
      </a>
    </div>
    <p>In the last few months, we have been talking to a number of government officials about how we can help protect their elections. Today, we are proud to report that we helped the State of Alabama protect its website during its special general election for the U.S. Senate on Tuesday.</p><p>“In this year’s historic Senate Special election, it was crucial that our website be able to handle spikes in traffic and remain online in the event of attack,” said Jim Purcell, Acting Secretary of Information Technology for the State of Alabama. “It is very important to our state government and democracy as a whole that voters and the public be able to access registrar, election information, and election results. Cloudflare proved to be an excellent partner, helping us achieve this goal.”</p><p>By allowing voters to exercise their rights to register to vote, speak, and access information, the Internet can and should play a helpful role in democracy. Democracies depend on voters’ voices being enabled, not silenced. Helping to provide state and local governments the tools they need to keep websites online and secure from attack as they hold and report on elections restores the Internet’s promise and serves Cloudflare’s mission of helping to build a better Internet.</p><p>To learn more and apply to the Athenian Project, please visit: <a href="https://www.cloudflare.com/athenian-project/">cloudflare.com/athenian-project</a></p><hr /><ol><li><p>State of New York Board of Elections <a href="https://www.elections.ny.gov/AboutSBOE.html">mission statement</a>. <a href="#fnref1">↩︎</a></p></li></ol> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Reliability]]></category>
            <guid isPermaLink="false">437G2UKQ8AwJO1rrFdN6x0</guid>
            <dc:creator>Alissa Starzak</dc:creator>
        </item>
    </channel>
</rss>