Author: Andrew Appel
-
Design flaw in Dominion ImageCast Evolution voting machine
The Dominion ImageCast Evolution looks like a pretty good voting machine, but it has a serious design flaw: after you mark your ballot, after you review your ballot, the voting machine can print more votes on it!. Fortunately, this design flaw has been patented by a rival company, ES&S, which sued to prevent Dominion from selling…
-
Serious design flaw in ESS ExpressVote touchscreen: “permission to cheat”
Kansas, Delaware, and New Jersey are in the process of purchasing voting machines with a serious design flaw, and they should reconsider while there is still time! Over the past 15 years, almost all the states have moved away from paperless touchscreen voting systems (DREs) to optical-scan paper ballots. They’ve done so because if a…
-
Securing the Vote — National Academies report
In this November’s election, could a computer hacker, foreign or domestic, alter votes (in the voting machine) or prevent people from voting (by altering voter registrations)? What should we do to protect ourselves? The National Academies of Science, Engineering, and Medicine have released a report, Securing the Vote: Protecting American Democracy about the cybervulnerabilities in U.S. election…
-
Are voting-machine modems truly divorced from the Internet?
(This article is written jointly with my colleague Kyle Jamieson, who specializes in wireless networks.) [See also: The myth of the hacker-proof voting machine] The ES&S model DS200 optical-scan voting machine has a cell-phone modem that it uses to upload election-night results from the voting machine to the “county central” canvassing computer. We know it’s…
-
My testimony before the House Subcommittee on IT
I was invited to testify yesterday before the U.S. House of Representatives Subcommittee on Information Technology, at a hearing entitled “Cybersecurity: Ensuring the Integrity of the Ballot Box.” My written testimony is available here. My 5-minute opening statement went as follows: My name is Andrew Appel. I am Professor of Computer Science at Princeton University. …
-
Which voting machines can be hacked through the Internet?
Over 9000 jurisdictions (counties and states) in the U.S. run elections with a variety of voting machines: optical scanners for paper ballots, and direct-recording “touchscreen” machines. Which ones of them can be hacked to make them cheat, to transfer votes from one candidate to another? The answer: all of them. An attacker with physical access…
-
Security against Election Hacking – Part 2: Cyberoffense is not the best cyberdefense!
State and county election officials across the country employ thousands of computers in election administration, most of them are connected (from time to time) to the internet (or exchange data cartridges with machines that are connected). In my previous post I explained how we must audit elections independently of the computers, so we can trust the…
-
Security against Election Hacking – Part 1: Software Independence
There’s been a lot of discussion of whether the November 2016 U.S. election can be hacked. Should the U.S. Government designate all the states’ and counties’ election computers as “critical cyber infrastructure” and prioritize the “cyberdefense” of these systems? Will it make any difference to activate those buzzwords with less than 3 months until the…
-
Internet Voting? Really?
Recently I gave a TEDx talk—I spoke at the local Princeton University TEDx event. My topic was voting: America’s voting systems in the 19th and 20th century, and should we vote using the Internet? You can see the talk here:
-
Internet Voting, Utah GOP Primary Election
Utah’s Republican presidential primary was conducted today by Internet. If you have your voter-registration PIN, or even if you don’t, visit https://ivotingcenter.gop and you will learn something about Internet voting!

