What do cybersecurity experts say about 2024 voting integrity?

Checked on December 4, 2025
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

Executive summary

Cybersecurity and election experts told reporters that while risks to U.S. voting infrastructure in 2024 were real—ranging from stolen vendor software to AI-enabled disinformation—there was no credible evidence of widespread vote manipulation in the 2024 election (Ms. Magazine; Mashable) [1] [2]. Authorities and industry actors emphasized defensive steps taken in 2024 (paper ballots, audits, CISA/EAC briefings, vendor risk work), even as some analysts warned audits and local resourcing leave gaps that could matter in targeted attacks (Layman Litigation; EAC; UpGuard) [3] [4] [5].

1. “No credible evidence of mass manipulation,” say many election-security experts

Multiple election-integrity specialists interviewed by journalists concluded that despite intense scrutiny and claims online, there is no credible proof that votes were widely manipulated in 2024. The summary of expert responses framed 2024 as imperfect but not compromised at scale, and urged attention to concrete vulnerabilities rather than speculative theft narratives (Ms. Magazine) [1]. Mashable similarly reported expert confidence that technology and processes are more secure than a decade ago and that voters should feel safe casting ballots [2].

2. Real technical threats: stolen software, insider risks, and supply-chain exposure

Experts have repeatedly flagged concrete technical risks that matter even if they did not translate to a mass-alteration of results. A group of computer scientists warned that possession of voting system software—reported in post-2020 breaches—could allow bad actors to probe vulnerabilities or manufacture deceptive evidence; that letter framed those breaches as posing “urgent implications” for 2024 (PBS NewsHour) [6]. Other reporting and analyses list vendor and insider threats and urge tighter controls around election equipment and software (EAC; Layman Litigation) [4] [3].

3. Disinformation and AI: the primary active vector, experts say

Across industry and academic commentary, disinformation—amplified by AI tools and deepfakes—was framed as the most immediate and scalable danger to electoral integrity. Johns Hopkins analysts and cybersecurity firms warned that AI can automate disinformation campaigns, produce realistic deepfakes, and flood social platforms in ways that can erode trust even absent hacking of voting machines (Carey/JHU; Cyber Defense Magazine) [7] [8]. Cybersecurity reporting noted that undermining trust is itself a successful attack on democracy (Cyble; UpGuard) [9] [5].

4. Paper ballots, audits and federal guidance: the defensive architecture

Officials and election bodies leaned on physical paper records, risk-limiting audits, and interagency briefings as core mitigations. The Election Assistance Commission and CISA ran threat briefings, provided checklists on cyber and physical readiness, and promoted audits and vulnerability disclosure practices (EAC; CISA Year in Review) [4] [10]. Industry analysts and journalists pointed out that over 98% paper balloting and expanded audit practices increase verifiability, while urging continued improvement (Cyble; Layman Litigation) [9] [3].

5. Gaps remain: local resourcing, uneven audits, and the political environment

Reporting stressed uneven capacity at county and state levels: many local offices lack funding, personnel and cybersecurity expertise to implement best practices, which creates exploitable weaknesses (Washington Post; Channel Insider) [11] [12]. Some analysts and groups argued audits in many places are not exhaustive enough to detect certain manipulations, noting that under-sampling or exclusion of races from audits limits confidence (Election Truth Alliance; UpGuard) — though these critiques come from advocacy and independent-research sources and are debated in the broader expert community [13] [5].

6. Institutional shifts and political frictions affect security posture

Federal coordination mattered in 2024: CISA and partners ran exercises and built AI-focused roles and resources to bolster defenses (CISA) [10]. But reporting also documented organizational shifts and vacancies—CISA lacked a confirmed director at times and states reported collaborating more with local law enforcement—changes that officials worry could complicate consistent support to jurisdictions (AP News) [14].

7. How experts recommend keeping risk manageable going forward

Across sources, recommended actions are consistent: strengthen vendor controls and insider-threat protections; expand risk-limiting audits and transparency around procedures; invest in local election office cybersecurity and physical security; and counter disinformation proactively, including AI-detection efforts (PBS; EAC; Cyber Defense Magazine) [6] [4] [8]. Experts urge focusing on verifiable processes (paper trails, audits) rather than amplifying unproven claims that degrade trust (Ms. Magazine; Mashable) [1] [2].

Limitations: available sources do not offer exhaustive forensic findings for every jurisdiction, and they disagree about how rigorous audits are in practice—some sources say audits are generally effective, others argue many audits are insufficiently rigorous [5] [13]. Readers should weigh both the absence of evidence for mass manipulation reported by mainstream experts and the concrete, documented vulnerabilities experts say must be fixed [1] [6].

Want to dive deeper?
What were the main cybersecurity vulnerabilities identified during the 2024 U.S. elections?
How did federal agencies respond to election-related cyberthreats in 2024?
What role did disinformation campaigns play in undermining 2024 voting integrity?
Which states reported the most cybersecurity incidents affecting voting systems in 2024?
What steps are experts recommending to secure future elections after 2024 lessons?