Category: Voting

  • Four 2020 lawsuits over internet voting

    Citizens with disabilities (and voters living abroad) must have the substantive right to vote—that’s the law.  Sometimes that turns into a demand for internet voting.  But as I wrote earlier this year, internet voting is dangerously insecure, it’s not what most voters with disabilities want, and there are much better ways of accommodating voters with disabilities,…

  • It’s still practically impossible to secure your computer (or voting machine) against attackers who have 30 minutes of access

    It has been understood for decades that it’s practically impossible to secure your computer (or computer-based device such as a voting machine) from attackers who have physical access. The basic principle is that someone with physical access doesn’t have to log in using the password, they can just unscrew your hard drive (or SSD, or…

  • New Hampshire Election Audit, part 2

    In my previous post I explained the preliminary conclusions from the three experts engaged by New Hampshire to examine an election anomaly in the town of Windham, November 2020. Improperly folded ballots (which shouldn’t have happened) had folds that were interpreted as votes (which also shouldn’t have happened) and this wasn’t noticed by any routine…

  • New Hampshire Election Audit, part 1

    Based on preliminary reports published by the team of experts that New Hampshire engaged to examine an election discrepancy, it appears that a buildup of dust in the read heads of optical-scan voting machines (possibly over several years of use) can cause paper-fold lines in absentee ballots to be interpreted as votes. In a local…

  • Accommodating voters with disabilities

    Citizens with disabilities have as much right to vote as anyone else, and our election systems should fully accommodate them. In recent years some advocates have claimed that electronic ballot return, in other words internet voting, is needed to accommodate voters with disabilities. But internet voting is dangerously insecure–in the context of U.S. public elections…

  • Internet Voting is Still Inherently Insecure

    Legislation for voting by internet is pending in Colorado, and other states have been on the verge of permitting ballots to be returned by internet. But voting by internet is too insecure, too hackable, to use in U.S. elections.  Every scientific study comes to the same conclusion—the Defense Department’s study group in 2004, the National…

  • Juan Gilbert’s Transparent BMD

    Princeton’s Center for Information Technology Policy recently hosted a talk by Professor Juan Gilbert of the University of Florida, in which he demonstrated his interesting new invention and presented results from user studies. What’s the problem with ballot-marking devices? It’s well known that a voting system must use paper ballots to be trustworthy (at least…

  • Expert analysis of Antrim County, Michigan

    Preliminary unofficial election results posted at 4am after the November 3rd 2020 election, by election administrators in Antrim County Michigan, were incorrect by thousands of votes–in the Presidential race and in local races. Within days, Antrim County election administrators corrected the error, as confirmed by a full hand recount of the ballots, but everyone wondered:…

  • How lever-action voting machines really worked

    Over the years I have written many articles about direct-recording electronic (DRE) voting machines, precinct-count optical-scan (PCOS) voting machines, ballot-marking devices (BMDs), and other 21st-century voting technology. But I haven’t written much about 20th-century lever machines; these machines were banned by the U.S. Congress in the Help America Vote Act and have not been used…

  • Voting Machine Hashcode Testing: Unsurprisingly insecure, and surprisingly insecure

    By Andrew Appel and Susan Greenhalgh The accuracy of a voting machine is dependent on the software that runs it. If that software is corrupted or hacked, it can misreport the votes.  There is a common assumption that we can check the legitimacy of the software that is installed by checking a “hash code” and…