Category: Voting
-
Sort the mail-in ballot envelopes, or don’t?
How mail-in ballot envelopes are handled by local election officials can make a huge difference in the cost of recounts and can also affect the security of elections against one form of voting fraud. Counties that count thousands or millions of mail-in (or dropbox) ballots can do it two ways: Sort-then-scan: Sort the ballot envelopes…
-
Unrecoverable Election Screwup in Williamson County TX
In the November 2020 election in Williamson County, Texas, flawed e-pollbook software resulted in voters inadvertently voting for candidates and questions not from their own districts but from others in the same county. These voters were deprived of the opportunity to vote for candidates they were entitled to vote for—and their votes were wrongly counted…
-
Next Steps for Mercer County Following Voting-Machine Failure
Hand-marked optical-scan paper ballots are the most secure form of voting: with any other method, if the computerized voting machines are hacked, there’s no trustworthy paper trail from which we can determine the true outcome of the election, based on the choices that voters actually indicated. Even those voting methods that appear to have a…
-
Why the voting machines failed in Mercer County
On Election Day, November 8, 2022, every voting machine in every polling place in Mercer County, New Jersey failed to work. Voters in each precinct filled in the ovals in their preprinted optical-scan paper ballots, but the voting machines couldn’t read them. So voters were instructed to put their ballots into “slot 3” of the…
-
Is Internet Voting Secure? The Science and the Policy Battles
I will be presenting a similarly titled paper at the 2022 Symposium Contemporary Issues in Election Law run by the University of New Hampshire Law review, October 7th in Concord, NH. The paper will be published in the UNH Law Review in 2023 and is available now on SSRN. I have already serialized parts of…
-
The anomaly of cheap complexity
Why are our computer systems so complex and so insecure? For years I’ve been trying to explain my understanding of this question. Here’s one explanation–which happens to be in the context of voting computers, but it’s a general phenomenon about all our computers: There are many layers between the application software that implements an electoral…
-
Magical thinking about Ballot-Marking-Device contingency plans
The Center for Democracy and Technology recently published a report, “No Simple Answers: A Primer on Ballot Marking Device Security”, by William T. Adler. Overall, it’s well-informed, clearly presents the problems as of 2022, and it’s definitely worth reading. After explaining the issues and controversies, the report presents recommendations, most of which make a lot…
-
Switzerland’s E-voting: The Threat Model
Part 5 of a 5-part series starting here Switzerland commissioned independent expert reviews of the E-voting system built by Swiss Post. One of those experts concluded, “as imperfect as the current system might be when judged against a nonexistent ideal, the current system generally appears to achieve its stated goals, under the corresponding assumptions…
-
What the Assessments Say About the Swiss E-voting System
(Part 4 of a 5-part series starting here) In 2021 the Swiss government commissioned several in-depth technical studies of the Swiss Post E-voting system, by independent experts from academia and private consulting firms. They sought to assess, does the protocol as documented guarantee the security called for by Swiss law (the “ordinance on electronic voting”,…
-
How the Swiss Post E-voting system addresses client-side vulnerabilities
(Part 3 of a 5-part series starting here) In Part 1, I described how Switzerland decided to assess the security and accuracy of its e-voting system. Swiss Post is the “vendor” developing the system, the Swiss cantons are the “customer” deploying it in their elections, and the Swiss Parliament and Federal Chancellery are the “regulators,” …
-
How NOT to Assess an E-voting System
by Vanessa Teague, an Australian computer scientist, cryptographer, and security/privacy expert. (Part 2 of a 5-part series starting here) Australian elections are known for the secret ballot and a long history of being peaceful, transparent and well run. So it may surprise you to learn that the Australian state of New South Wales (NSW) is…
-
How to Assess an E-voting System
Part 1 of a 5-part series If I can shop and bank online, why can’t I vote online? David Jefferson explained in 2011 why internet voting is so difficult to make secure, I summarized again in 2021 why internet voting is still inherently insecure, and many other experts have explained it too. Still, several…