FAQ and Misconceptions About Electronic Voting
WHAT IS THE PROBLEM WITH ELECTRONIC VOTING SYSTEMS?
Electronic voting machines and ballot tabulators are computers, and like all computers they are susceptible to software bugs, programming errors, malicious coding, and hacking which could corrupt the vote count.
Elections could be hacked or rigged by “insiders” such as vendors or election workers; anyone able to access the voting machines or the systems that program machines and tally the election results. Voting systems may also be hacked or rigged remotely over the Internet by hackers anywhere in the world.
Cyber experts have repeatedly proven that the testing and certification process for basic functionality and accessibility cannot be relied on to ensure voting system security.
WHICH ELECTRONIC VOTING SYSTEMS ARE WORSE THAN OTHERS?
INTERNET VOTING: THE WORST
Any voting structure which transmits voted ballots electronically via email, facsimile or Internet portal is the most vulnerable to hacking as these ballots are directly exposed to cyber attacks and cannot be adequately secured. Nevertheless, thirty-two states allow some voters to send ballots over the Internet.
When voters cast ballots directly on a DRE, their choices are recorded solely in digital form, susceptible to alteration by errors or hacking. The change may not be detectable by the voter because the machine could display the correct vote choices, while digitally recording the wrong vote choices.
Some DRE's have been fitted to produce a receipt called a "Voter Verified Paper Trail" (VVPAT). The flimsy VVPAT does not replace the need for a real voter marked paper ballot and is notoriously difficult to use in a post-election audit.
BALLOT SCANNERS: ONLY SECURE WITH A PAPER AUDIT
Optical ballot scanners are also computers, and can count votes incorrectly because of errors, malicious programming, or hacking. Malicious programming within the scanner would not be detected by the "logic and accuracy" tests conducted by elections officials. But the durable, voter marked paper ballot provides a permanent, legal record of the vote that can be used to audit the computerized election results or conduct a recount.
A public, manual post-election audit is the only process that offers verification and public transparency.
HAVE WE EVER LOST VOTES OR HAD ELECTIONS DISRUPTED DUE TO THESE MACHINES?
Yes, there have been many cases stretching over decades in which computerized voting systems were discovered to have recorded or counted votes inaccurately, disrupting the election or causing the contest to be determined incorrectly.
One example is in North Carolina in 2004. A DRE voting machines lost over 4,500 votes. A statewide contest was determined by fewer votes, compelling the state to re-run the election.
In Palm Beach County, Florida, in March 2012, a problem with the programming software caused votes to be assigned to the wrong candidate and the wrong contest. The election was conducted using voter-marked paper ballots, which permitted the county to conduct a full hand-count of the ballots, changing the winner in one contest.
In these cases the errors were so pronounced it was clear that there was a problem in the count. However, without mandatory, routine post-election audits of paper ballots, most errors or malicious programming in close elections go undetected, potentially swinging the results to the wrong candidate.
ARE OUR VOTING MACHINES CONNECTED TO THE INTERNET?
Most voting machines are not directly connected to the Internet, but this does not ensure they cannot be remotely hacked.
Before each election, each voting machine must receive programming information about the candidates and contests in that election, via an election management system (EMS). The EMS is typically hosted on regular desktop or laptop computers which can potentially be used for other, non-election related, Internet-connected activities.
This means the device that hosts the EMS may be exposed to the Internet and serve as a pathway for a hacker to attack the EMS and infect the voting machines with malicious software that can corrupt the vote count.
Furthermore, many voting machines have built-in wireless capability which will expose the voting machines to the Internet when transmitting election results.
Additionally, any states and counties that allow for a return of online ballots are vulnerable to system-wide infiltration of their voting technology.
WHO OWNS THE ELECTRONIC VOTING TECHNOLOGY AND WHY CAN'T THE PUBLIC VIEW THE SOFTWARE?
When a jurisdiction purchases commercially available voting systems, they typically purchase the hardware outright, but they must license the software. The vendors retain proprietary ownership of the software that is used to record and count votes.
This means the county or state government must pay ongoing software licensing fees in order to use the software on the voting machines each year. Furthermore, because the software is proprietary, it is not available for public inspection and in most cases, cannot be inspected by the jurisdiction licensing the software.
This creates a "black box" for election technology that takes the democratic process out of the public sphere and into a virtual back room.
WHY DO WE NEED A PAPER BALLOT?
A voter-verified paper ballot provides a physical record of the voter’s intent that cannot be altered or manipulated by software errors or hacking.
When the voter marks a paper ballot, their intent can be determined. A durable paper ballot should serve as the legal ballot of record in the case of a recount.
Paper can be counted in public, manually, which provides public oversight of elections indispensable to the democratic process.