Arizona State Capitol Building

Fontes Seeks $10 Million to Strengthen Arizona Election Cybersecurity

Recent attempted cyberattack highlights urgent need for modernization

Arizona Secretary of State Adrian Fontes is urging lawmakers to approve $10 million in cybersecurity funding, along with $3.5 million in annual support, to modernize and protect the state’s election systems. His request comes after a recent attempted cyberattack on the Secretary of State’s candidate portal.

Fontes made his appeal during a bipartisan closed-door briefing to the Arizona Legislature earlier today. He outlined the incident and stressed that while defenses held this time, Arizona cannot rely on outdated systems to withstand future threats. He said the state must invest in long-term security now rather than waiting for a successful breach.

Incident Contained, Critical Systems Safe

The attempted intrusion, which investigators believe was linked to an Iranian-affiliated threat actor, targeted the backend of the candidate portal. Thanks to existing cybersecurity protocols and support from the Arizona Department of Homeland Security, the system was quickly isolated and secured.

Fontes confirmed that no sensitive data was accessed. He also emphasized that two of the state’s most critical systems—the Arizona Voter Information Database (AVID) and the Address Confidentiality Program (ACP), which shields the information of vulnerable individuals—were not affected. Both systems operate on independent, secure networks and were never at risk.

Push for Ongoing Cybersecurity Investment

In his remarks, Fontes explained that the one-time $10 million request would fund immediate upgrades to critical election infrastructure, while the $3.5 million annual investment would provide ongoing monitoring, maintenance, and system protections. He said cybersecurity must be treated as a continuing responsibility, given the sophistication of current and future threats.

Arizona is not alone in facing these risks. Federal officials have warned of escalating Russian cyber threats to election security, while recent indictments against Chinese hackers highlight the global scale of cyber espionage. State leaders say these examples underscore why Arizona must act quickly to harden its defenses.

Bipartisan Lawmakers Respond

The closed-door briefing drew lawmakers from both parties, who acknowledged the seriousness of the issue. According to Fontes, there was a constructive and bipartisan exchange about how to move forward with funding. He underscored that protecting election systems should be seen as a shared duty.

Appropriate federal agencies were notified of the attempted intrusion by the Arizona Department of Homeland Security, which routinely collaborates with the Secretary of State’s office. A public summary of the incident and updated cybersecurity guidance for local election officials and candidate portal users will be released later this week.

Frequently Asked Questions About Arizona Election Security

What is the Arizona Voter Information Database (AVID)?

AVID is the statewide voter registration system that securely manages voter records. It operates on a separate, secure network and was not affected by the recent attempted intrusion.

What is the Address Confidentiality Program (ACP)?

The ACP protects the personal information of survivors of domestic violence, stalking, or other crimes by keeping their residential addresses confidential. This system is fully isolated and was not at risk during the cyberattack attempt.

How does Arizona respond to attempted cyberattacks?

When suspicious activity is detected, affected systems are immediately isolated, and state cybersecurity teams coordinate with the Arizona Department of Homeland Security. Federal partners, such as the Department of Homeland Security and the FBI, are also notified when necessary.

Is my voter information safe?

Yes. Election officials confirmed that no voter information or critical election data was accessed in the recent incident. Arizona’s key election systems are protected by multiple layers of security and operate on secure networks that were not compromised.

Related Articles