Election audit

An election audit is any review conducted after polls close for the purpose of determining whether the votes were counted accurately (a results audit) or whether proper procedures were followed (a process audit), or both.

Both results and process audits can be performed between elections for purposes of quality management, but if results audits are to be used to protect the official election results from undetected fraud and error, they must be completed before election results are declared final. [1]

Election recounts are a specific type of audit, with elements of both results and process audits.

Boss Tweed:As long as I count the Votes, what are you going to do about it?

The need for verification of election results


In jurisdictions that tabulate election results exclusively with manual counts from paper ballots, or 'hand counts', officials do not need to rely on a single person to view and count the votes. Instead, valid hand-counting methods incorporate redundancy, so that more than one person views and interprets each vote and more than one person confirms the accuracy of each tabulation. In this way, the manual count incorporates a confirmation step, and a separate audit may not be considered necessary.

However, when votes are read and tabulated electronically, confirmation of the results' accuracy must become a separate process.

Within and outside elections, use of computers for decision support comes with certain IT risks. Election-Day electronic miscounts can be caused by unintentional human error, such as incorrectly setting up the computers to read the unique ballot in each election and undetected malfunction, such as overheating or loss of calibration. Malicious intervention can be accomplished by corrupt insiders at the manufacturer, distributor or election authority, or external hackers who access the software on or before Election Day.[2][3]

Computer-related risks specific to elections include local officials’ inability to draw upon the level of IT expertise available to managers of commercial decision-support computer systems[4] and the intermittent nature of elections, which requires reliance on a large temporary workforce to manage and operate the computers.[5] Voting machines are usually air-gapped from the internet, but they receive updates from flash drives which do come from the internet, and in any case air-gapped computers are regularly hacked[6][7][8][9] through flash drives and other means. Besides traditional security risks such as lock-picking and phishing attacks, voting machines are often unattended in public buildings the night before the election.[10] This physical access lets outsiders subvert them.[11]

To reduce the risk of flawed Election-Day output, election managers like other computer-dependent managers rely on testing and ongoing IT security. In the field of elections management, these measures take the form of federal certification of the electronic elections system designs,[12] though there is no way to know the certified software is what is actually installed; security measures in the local election officials’ workplaces; and pre-election testing.[13]

A third risk-reduction measure is performed after the computer has produced its output: Routinely checking the computers' output for accuracy, or auditing. Outside elections,auditing practices in the private sector and in other government applications are routine and well developed. In the practice of elections administration, however, the Pew Charitable Trusts stated in 2016, “Although postelection audits are recognized as a best practice to ensure that voting equipment is functioning properly, that proper procedures are being followed, and that the overall election system is reliable, the practice of auditing is still in its relative infancy. Therefore, a consensus has not arisen about what constitutes the necessary elements of an auditing program.”[14]

Routine results audits also support voter confidence by improving election officials' ability to respond effectively to allegations of fraud or error.[15]

Examples of intrusions into election computers

Computers which tally votes or compile election results are known to have been hacked in the US in 2014[16] [17] [18] and 2016,[19] [20] Ukraine in 2014,[21] and South Africa in 1994.[22] [23] [24] Only the Ukraine hack was disclosed immediately, so regular audits are needed to provide timely corrections.

Audit challenges unique to election results

Confirming that votes were credited to the correct candidates’ totals might seem to be a relatively uncomplicated task, but election managers face several audit challenges not present for managers of other decision-support IT applications. Primarily, ballot privacy prevents election officials from associating individual voters with individual ballots. This makes it impossible for election officials to use some standard audit practices such as those banks use to confirm that ATMs credited deposits to the correct account.

Another challenge is the need for a prompt and irrevocable decision. Election results need to be confirmed promptly, before officials are sworn into office. In many commercial uses of information technology, managers can reverse computer errors even when detected long after the event. However, once elected officials are sworn into office, they begin to make decisions such as voting on legislation or signing contracts on behalf of the government. Even if the official were to be removed because a computer error was discovered to have put that official in office, it would not be possible to reverse all the consequences of the error.

The intermittent nature of elections is another challenge. The number of elections managed by an election authority ranges from two per year (plus special elections) in five US states to one every 4 years (plus by-elections) in parliamentary systems like Canada[25] where different election authorities manage national, provincial and municipal elections. This intermittency limits the development of a full-time, practiced workforce, for either the elections[26] or the audits. Turning election audits over to an independent, disinterested professional accounting firm is another option not available to election officials. Because election results affect everyone, including the election officials themselves, truly disinterested auditors do not exist. Therefore, audit transparency is required to provide credibility.

Attributes of a good election results audit

No governing body or professional association has yet adopted a definitive set of best practices for election audits. However, in 2007 a group of election-integrity organizations, including the Verified Voting Foundation, Common Cause, and the Brennan Center for Justice at NYU School of Law collaborated with the American Statistical Association to produce a set of recommended best practices for post-election results audits:

  • Transparency: The public must be allowed to observe, verify, and point out procedural mistakes in all phases of the audit. This requires that audit procedures and standards be adopted, in written form, and made available before the election.
  • Independence: While the actual work of post-election audits may be best performed by the officials who conduct the elections, the authority and regulation of post-election audits should be independent of officials who conduct the elections.
  • Paper Records: Vote-counting in the audit should be performed with hand-to-eye counts of voter-marked, voter-verified paper ballots.
  • Ballot Accounting (chain of custody, or internal control): The records used in the audit must be verified to be true and complete records of the election.
  • Confirmation of the correct winners: The audits must reach statistical confidence that the computer-tabulated results identified the correct winners.
  • Addressing Discrepancies: When discrepancies are found, investigation is conducted to determine cause of the discrepancies.
  • Comprehensive: The ballot-sample selection process includes all jurisdictions and all ballot types (e.g., absentee, mail-in and accepted provisional ballots).
  • Additional Targeted Samples: The audit includes a limited non-random sample selected on the basis of factors useful for building voter confidence or improving election management, such as Election-Day problems or preliminary results that deviate significantly from historical voting patterns.
  • Binding on Official Results: Post-election audits must be completed before election results are declared official and final, and must either verify or correct the outcome.

Current practices in election results auditing in the United States

Few States Check Election Machines' Counts by Hand

Overview

Considering the recommended best practices above, two states (DC, MA) allow public observation of all steps; three states (MD, NM, VT) have audits done by the Secretary of State, which is partly independent of election day procedures; 18 states hand-count; six states (CO, MD, NC, NM, RI, VA) have good samples for statistical confidence; no states have ways to recover from discrepancies in the chain of custody; other issues are listed in the table below.[27]

Computerization of elections occurred rapidly in the United States following the presidential election of 2000, in which imprecise vote-counting practices played a controversial role, and the subsequent adoption of the Help America Vote Act (HAVA) of 2002. The rapid switch to computerized vote tabulation forced election officials to abandon many pre-automation practices that had been used to verify vote totals, such as the redundancy included in valid hand-counting procedures.[28]

According to information from state profiles provided by Verified Voting, as of mid-2019, only Colorado[29], New Mexico, the District of Columbia, and (in legislation that will not be fully implemented until 2020) Rhode Island require local election officials to perform audits that:

  1. are completed promptly, before official results can be certified;
  2. expand the audit to a state-wide recount of the audited contest(s) whenever the audit detects serious discrepancies in the original sample; and
  3. are binding on the official results.

If followed by local election officials, such requirements create an opportunity to detect and correct any outcome-altering miscounts (whether caused by accident or fraud) that affected the preliminary Election-Night counts.

An additional 19 states prescribe audits that check a flat percentage, typically between 1 and 3 percent, of voting machines or precincts. These audits can detect problems in the individual voting machines selected for audit, but cannot confirm the correct results except in races with very large margins between the winner and losers.[30]

Finally, 28 states finalize official election results without verifying computer-tabulated vote totals. These states either lack paper ballots, have no audit requirements, or in four states (Florida, Vermont, Virginia, and Wisconsin) allow audits to be delayed until after winners are certified.

Other ways to group the states include that 20 states audit by means of hand counts; others use machines or a mix. Ten states audit all races on the ballot; others generally audit the top race and 1-4 others. In 14 states the audit results are used to revise official winners when there is a discrepancy. Another 10 may revise official results, depending on local judgment, and in 9 states the audit creates a report without changing official results, including large states like California, Florida and Illinois. Only two states use hand counts to audit all races, and use the results to revise winners; both are small, Alaska and West Virginia.[27]

Table of state audit practices

List of Election Audit Practices in the US
State[27][31][32] Method of Auditing Ballots Do Audits Revise Election Outcomes? Number of Races Audited Level of Discrepancy to Trigger Action Action if Discrepancy State Gets Report? Which Units Are Sampled? Sample Size Can Public See Ballot Marks? What's Done if Some Ballots Are Missing? Law Rules 2017 Population, Millions
California Hand count, except no audit of almost half the ballots (the 43% tallied after election night)[33] NoAllNo rulesReport[34] Yesprecincts or machines1%NoCal. Elec. Code §336.5, §15360 (West 2015)40
Texas No audit on paperless machines, which many counties use, hand count otherwise Maybe6-Sec. of State chooses 3 races + 3 ballot itemsAnyDetermine cause Yesprecinctsat least 1% or 3, not paperless machinesNoTex. Election Code Ann. §127.201 (Vernon 2015)Election Advisory No. 2012-0328
Florida Count with machines, independent of election, or by hand Noall by machine, or 1 by hand, randomly chosen by each countyNo rulesReport Yesprecincts20%-100% by machine or 2% by handNoFla. Stat. Ann. §101.59121
New York Count with machines different from voting system or by hand YesAllAnyExpand sample in stages to full recount. Unclear if just the affected office Yesmachines3%NoN.Y. Election Law § 9-211 (McKinney 2015)9 N.Y. Comp. Rules & Regs. 6210.1820
Pennsylvania Hand count MaybeAllNo rulesNo rules Noballotslesser of 2% or 2,000 ballotsNoPa. Cons. Stat. tit. 25 §3031.17Directive Concerning the Use, Implementation and Operation of Electronic Voting Systems13
Illinois Count with machines the optical ballots, which are common, others by hand or different machine from election NoAllAnyReport Yesprecincts + machines5%NoIl. Rev. Stat. ch. 10 §5/24A-15, 10 §5/24C-1513
Ohio Hand count Yes3-President, random state-wide, random county-wide, in general elections in even-numbered years0.5% (0.2% if margin under 1%)Expand sample. Sec. of State may order full recount of county Yesmachines, precincts or polling placesat least 5% of votesNoSecretary of State Directive 2014-36,[3] 2015 Election Official Manualsettlement agreement in League of Women Voters, et al. v. Brunner, Case No. 3:05-CV-7309, US N.District of Ohio12
Georgia No audit, though all voters have paper ballots 0 10
North Carolina Hand count Yes1-President or state-wide ballot item"Significant"Expand sample to whole county, all races Noprecinctsstatistician decidesNoNo auditN.C. Gen. Stat. Ann. §163-182.110
Michigan No audit, though all voters have paper ballots 0 10
New Jersey No audit, and many voters lack paper ballots 0 N.J. Stat. Ann. §19:61-99
Virginia Hand count, except early and absentee ballots NoSomeAnyAnalyze Yeslocalitiesrisk-limitingNoCode of VA 24.2-671.18
Washington If parties agree or county auditor requires, then hand count sample of mail ballots, which are the vast majority Maybe1Anyinvestigate + resolve Yesprecincts or batches of mailed ballotsup to 3 precincts or 6 batchesNoWash. Rev. Code Ann. §29A.60.185, §29A.60.170 7
Arizona Hand count Yes5-President, random federal, random state-wide, random legislative, ballot measureStatistical committee chooses cutoffsExpand sample, up to whole county, for affected office Yesprecinctsat least 2% or 2NoAriz. Rev. Stat. §16-6027
Massachusetts Hand count Maybe6-President, state and national Senator and Representative, random ballot questionCast doubt on outcomeSec. of State may expand audit Yesprecincts3%YesMass. Gen. Law Ann. ch. 54 § 109A7
Tennessee Count paper ballots with same method as election day, different optical scanner, but many voters lack paper ballots No1-President or Governor in general1%Expand sample to 3% of precincts. Then no action, but audit is evidence in court Noprecincts1 to 5NoTenn. Code Ann. § 2-20-1037
Indiana If requested by party chair, hand count paper ballots or use machine different from voting system, but many voters lack paper ballots YesAllNo rulesCorrect errors Noprecinctsup to 5% or 5NoIndiana Code §3-12-5-14, §3-11-13-397
Missouri Hand count Maybe5-state-wide candidate + ballot issue, legislator, judicial, county0.50%Investigate and resolve Yesprecincts5%No15 Mo. Code of State Regs. §30-10.1106
Maryland Independent machines re-count ballot images from election machines[35] YesAllAnyInvestigate and resolve YesAll100%NoCode of Md. Regs. §33.08.056
Wisconsin Hand count, except early and absentee ballots No4-President or Governor, and 3 random state contests, only in generalAnyIf no explanation, get manufacturer to investigate Yeswards or other districts reporting results100 per stateNoWis. Stat. Ann. §7.08(6)Wisconsin Elections Commission Voting Equipment Audits6
Colorado Hand count MaybeIn each county: 1 contest in general election, 1 per party in primary,[36][37] non-randomly chosen by Sec. of StateStatistical cutoffsInvestigate + decide Yesballotsrisk-limiting. 5% of machines, in sampled machines, 20% if machine has 1-500 ballots, otherwise lesser of 5% or 500NoColo. Rev. Stat. §1-7-515Colo. Sec. of State Election Rule 256
Minnesota Hand count Yes2-3-Governor + federal0.5% or 2 votesExpand samples for Governor + federal up to whole county, and if counties with 10% of state's ballots discover problems in a race, hand-count affected race statewide Yesprecincts3% or at least 2-4NoMinn. Stat. Ann. §206.896
South Carolina No audit, though all voters have paper ballots 0 5
Alabama No audit, though the state has paper ballots 0 5
Louisiana No audit, and the state lacks paper ballots 0 5
Kentucky Hand count paper ballots, but many counties use paperless machines YesAllNo rulesCorrect errors Yesprecincts3% to 5%NoKy. Rev. Stat. §117.3834
Oregon Hand count, except small precincts Yes2-3-heaviest vote in each county, statewide office + ballot measure0.50%Expand sample to whole county for that vote tally system, all races Yesprecincts with 150 or more ballots3% to 10% depending on margin of victoryNoOr. Rev. Stat. §254.5294
Oklahoma No audit, though voters without disabilities have paper ballots; voters with disabilities do not 0 4
Connecticut Count with machines or by hand Maybe3-President or Governor and 2 other races; 20% of races in primaries and municipal ballots0.50%Investigate and if needed recount county with mix of hand and machine counts Yesvoting districts5%NoConn. Gen. Stat. §9-320f4
Iowa Hand count No1-President or GovernorNo rulesReport Yesprecincts?NoHB 516, enacted in 20173
Utah Hand count NoAllAnyRecord reasons Yesmachines1%NoElection Policy Directive from the Office of the Lieutenant Governor3
Arkansas No audit, though all voters have paper ballots 0 3
Nevada Count with machines or by hand MaybeAllNo rulesNo rules Yesmachines2% or 3%NoNev. Admin. Code 293.255, Nev. Rev. Stat. §293.2473
Mississippi No audit, and most counties lack paper ballots 0 3
Kansas No audit, though most voters have paper ballots 0 3
New Mexico Hand count Yes3-4: federal, governor + closest statewide raceerror over 90% of the margin of victoryExpand sample, up to whole state for affected office Yesprecinctsnone in race with over 15% margin of victory, otherwise 4-165 in stateNoN.M. Stat. Ann. §1-14-13.2 et seq.2
Nebraska If requested by Sec of State, method unclear Maybe3UnclearReport Yesprecincts2%Unclear2
West Virginia Hand count YesAll1% or changed outcomeExpand sample to whole county, all races Noprecincts3%NoW. Va. Code, §3-4A-28 2016 Best Practices Guide for Canvass and Recount2
Idaho No audit, though all voters have paper ballots 0 Idaho Code §34-23132
Hawaii Hand count, except early and absentee ballots Maybe3-state-wide, county-wide, district-wideAnyExpand audit until staff are satisfied with results Yesprecincts10%NoHawaii Rev. Stat. §16-42, Haw. Admin. Rules § 3-172-1021
New Hampshire No audit, though all voters have paper ballots 0 1
Maine No audit, though all voters have paper ballots. 0 1
Rhode Island Hand count YesSomeStatistical cutoffsExpand sample to full recount Rules not yet publishedNot yet publishedrisk-limitingNot yet publishedR.I. Stat. Ann. §17-19-37.41
Montana Hand count Yes4-random federal, state-wide, legislative, ballot measure0.5% or 5 votesExpand sample but not full recount except in small counties with up to 6 precincts. Check machines with errors Yesprecinctsat least 5% or 1NoMont. Code Ann. §13-17-5031
Delaware No audit, though all voters have paper ballots 0 1
South Dakota No audit, though all voters have paper ballots 0 1
North Dakota No audit, though all voters have paper ballots 0 1
Alaska Hand count, except small precincts YesAll1%Expand sample to whole district (1/40th of state), all races Yeslarge precincts1 per House district, with at least 5% of district ballots, so about 600 registered votersNoAlaska Stat. §15.15.4301
District of Columbia Hand count Yes4-random District-wide, 2-ward-wide, 1 any type0.25% or 20% of margin of victoryExpand sample, up to whole county, for affected office Yesprecincts + ballots5%YesD.C. Code Ann. §1-1001.09a1
Vermont Each town counts with same method as election day, optical scan or hand count. Sec.of State randomly picks 6 towns to scan & machine-count all contests[38] NoUnknown by county. All by Sec.of StateAnyInvestigate Yespolling places?No17 Vt. Stat. Ann. §2493, §2581 - §25881
Wyoming No audit, though all voters have paper ballots 0 1

Risk-limiting audits

Colorado elections in 2017, sample sizes needed for risk-limiting audits

Risk-limiting audits are required in Colorado, North Carolina, Rhode Island and Virginia.[27] These store voting machines' interpretation of each ballot ("cast vote record"), collect them centrally over the internet, re-tally them with an independent computer to check totals, and hand-check a sample of the stored paper ballots to check voting machines' interpretations. Samples are big enough to be sure results are accurate, up to an acceptable level of risk, such as 9%. For each audited race, if the original computer interpretations identified the wrong winner, there is a 9%[37] chance in Colorado that the audit will miss it,[39] and the wrong winner will take office. A lower risk limit would let fewer errors through, but would require larger sample sizes. Close races also require larger sample sizes. Colorado audits only a few races, and audits none of the closest races, which need the biggest samples. Auditing all races would require several counties to hand-count thousands of ballots each.

If the samples do not confirm the initial results, more rounds of sampling may be done, but if it appears the initial results are wrong, risk-limiting audits require a 100% hand count to change the result, even if that involves hand-counting hundreds of thousands of ballots.[40]

Colorado notes that they have to be extremely careful to keep ballots in order, or they have to number them, to be sure of comparing the hand counts with the machine records of those exact ballots.[41] Colorado says it has a reliable system to re-tally the records, but it is not yet publicly documented.[42] [39]

In 2010, the American Statistical Association endorsed risk-limiting audits, to verify election outcomes.[43] With use of statistical sampling to eliminate the need to count all the ballots, this method enables efficient, valid confirmation of the outcome (the winning candidates). In 2011, the federal Election Assistance Commission initiated grants for pilot projects to test and demonstrate the method in actual elections.[44] In 2014, the Presidential Commission on Election Administration recommended the method for use in all jurisdictions following all elections, to reduce the risk of having election outcomes determined by undetected computer error or fraud.[45] In 2017, Colorado became the first state to implement risk-limiting audits statewide as a routine practice during the post-election process of certifying election results.

Ballot scans for 100% audits

Public access to ballots and images

Humboldt County, CA, Clear Ballot, and TrueBallot scan all ballots with a commercial scanner, so extensive audits can be done on the scans without damaging paper ballots, without hand-counting, by multiple groups, independently of the election software.[46] Clear Ballot is certified by the US Election Assistance Commission for voting,[47] and they also have an auditing system, ClearAudit. TrueBallot does not currently serve government elections, just private groups. Both use proprietary software, so if it were hacked at the vendor or locally to create false images of the ballots or false counts, then local officials and the public could not check it.

The most open audit system is the Elections Transparency Project, as used in Humboldt County, California, a medium sized county with 58,000 ballots in the 2016 general election.[48] They use a commercial scanner to scan all ballots and put them in a digitally signed file, so true copies of the file can be reliably identified. Ballots with identifying marks are first hand-copied by election staff, to anonymize them, since they are valid under California law.[49] The scanner prints a number on each ballot before scanning it, so the scan can be checked against the same physical ballot later if needed.

The project has written open source software to read the files, and they check all races on all ballots to see if official counts are correct. The first time they scanned and checked, in 2008, they found 200 missing ballots, showing the value of complete checks.[50] Other jurisdictions can similarly scan ballots and use Humboldt's software or their own to audit all races. They need to ensure their in-house counting software is secure and independent of any bugs or hacks in the election software, just as users of risk-limiting audits do.

Reading these scans, with software independent of the election system, is the only practical way to audit a large number of close races, without large hand counts. If scanned on election night, scans are also the only practical way to bypass problems of physical security, since scans are made and digitally signed before ballots are stored, while other audit methods are too slow to do election night. Scanners can process thousands of ballots per hour, and several scanners can operate simultaneously in larger jurisdictions. Once ballots are scanned with a digital signature, they can be analyzed at any convenient time.

Humboldt has gone beyond this internal approach, and decided to release the digitally signed files of ballot images to the public, so others can use their own software, independent of the election system and officials, to check all races on all ballots.[51] [52] [53] Public release lets losing candidates who mistrust the election officials' security measures do their own checks. Humboldt County believes the scans give their citizens high confidence in the county election results.[51]

The "Brakey method" is a variant of the Humboldt scans, with a public release of electronic ballot images already created by most current US election systems.[54]. The Brakey Method requires that the ballot images be connected to their physical ballots through a unique identifier that appears on both digital image and physical ballot. Because ballot images can be hacked if the election software itself is hacked,[55] either at the vendor or elsewhere, ballot images do not provide an independent check unless they can be compared with physical ballots.

Pennsylvania uses these ballot images for its audits,[27] though it does not release them to the public for the public to audit.

Recounts

Recounts may be considered to be a specific type of audit, but not all audits are recounts. The Verified Voting Foundation explains the difference between audits and recounts: Post-election audits are performed to “routinely check voting system performance…not to challenge to the results, regardless of how close margins of victory appear to be", while "recounts repeat ballot counting (and are performed only) in special circumstances, such as when preliminary results show a close margin of victory. Post-election audits that detect errors can lead to a full recount.”[56] In the US, recount laws vary by state, but typically require recounting 100% of the votes, while audits may use samples. Recounts incorporate elements of both results and process audits.

Samples used for election audits

Other variations

Hand and machine counts. Current audits in most states involve counting paper ballots by hand, but some states re-use the same machines used in the election. Three states use different machines, to provide some independent check.

Sample sizes. When states audit, they usually pick a random sample of 1% to 10% of precincts to recount by hand or by machine. If a precinct has more than one machine, and they keep ballots and totals separate by machine, they can draw a sample of machines rather than precincts and count all ballots processed by that machine. These samples can identify systematic errors widely present in the election. They have only a small chance of catching a hack or bug which was limited to a few precincts or machines, even though that could change the result in close races.

Number of races. In the random sample, most states audit only a few races, so they can only find problems in those races.

Physical security. Auditing is done several days after the election, so paper ballots and computer files need to be kept securely. North Carolina specifies that no audit is done if ballots are missing or damaged.[27]

Physical security has its own large challenges. No US state has adequate laws on physical security of the ballots.[57] Security recommendations for elections include: starting audits as soon as possible after the election, preventing access by anyone alone,[58] having risks identified by people other than those who design or manage the storage, using background checks and tamper-evident seals.[59][40] However seals on plastic surfaces can typically be removed and reapplied without damage.[60] [55]

Experienced testers can usually bypass all physical security systems. Security equipment is vulnerable before and after delivery. Insider threats and the difficulty of following all security procedures are usually under-appreciated, and most organizations do not want to learn their vulnerabilities.[61] When a contractor found poor security at county buildings in Iowa, the state ordered no more testing of security.[62]

gollark: This is, what, rendering?
gollark: /converting the string input to a syntax tree
gollark: Well, parsing would be parsing to an AST or something.
gollark: > uhm<@!330678593904443393> ?
gollark: Also because it lets me use arbitrary CSS, that's fun.

References

  1. Report on Election Auditing Archived 2017-08-30 at the Wayback Machine, Election Audits Task Force of the League of Women Voters of the United States, January 2009. Accessed May 12, 2017.
  2. Some Machines are Flipping Votes, but That Doesn’t Mean They Are Rigged, Pam Fessler, National Public Radio, October 26, 2016. Accessed May 12, 2017
  3. The Machinery of Democracy: Protecting Democracy in an Age of Electronic Voting, Brennan Center Task Force for Voting System Security, 2006.
  4. Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting, Aviel David Rubin, Broadway, 2006
  5. Broken Ballots: Will Your Vote Count? Douglas W. Jones and Barbara Simon, CSLI Publications, 2012
  6. Bade, Gavin. "Russian hackers infiltrated utility control rooms, DHS says". Retrieved 2019-07-01.
  7. Steven Cherry; with Ralph Langner (13 October 2010). "How Stuxnet Is Rewriting the Cyberterrorism Playbook". IEEE Spectrum.
  8. Crawford, Jamie. "Govt: China could take down U.S. power grid - CNNPolitics". CNN. Retrieved 2019-07-01.
  9. Sanger, David E.; Perlroth, Nicole (2019-06-15). "U.S. Escalates Online Attacks on Russia's Power Grid". The New York Times. ISSN 0362-4331. Retrieved 2019-07-01.
  10. Felten, Ed. "E-Voting Links for Election Day". Princeton's Center for Information Technology Policy. Retrieved 2019-07-01.
  11. Halpern, Sue (2018-08-23). "Election-Hacking Lessons from the 2018 Def Con Hackers Conference". ISSN 0028-792X. Retrieved 2019-07-01.
  12. Voting Equipment Certification Process, US Election Assistance Commission.
  13. "Pre-election and Parallel Testing" (PDF). Election Management Guidelines. U.S. Election Assistance Commission.
  14. Elections Performance Index Methodology, Pew Charitable Trusts, August 2016. Accessed May 12, 2017.
  15. Confidence in the Electoral System: Why We Do Auditing, Michael W. Trautgott and Frederick G. Conrad, in Confirming Elections: Creating Confidence and Integrity Through Election Auditing, R. Michael Alvarex, Lonna Rae Atkeson, and Thad E. Hall, eds., Palgrave MacMillan, 2012.
  16. Lamb, Logan (2020-01-14). "SUPPLEMENTAL DECLARATION OF LOGAN LAMB" (PDF). CourtListener. Retrieved 2020-02-03.
  17. "Coalition Plaintiffs' Status Report, pages 237-244". Coalition for Good Governance. 2020-01-16. Retrieved 2020-02-03.
  18. Bajak, Frank (2020-01-16). "Expert: Georgia election server showed signs of tampering". Associated Press. Retrieved 2020-02-03.
  19. Cole, Matthew; Esposito, Richard; Biddle, Sam; Grim, Ryan (2017-06-05). "Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election". The Intercept. Retrieved 2020-02-03.
  20. "UNITED STATES OF AMERICA v. VIKTOR BORISOVICH NETYKSHO, et al, Indictment, paragraph 77b". 2018-07-13. Retrieved 2020-02-03.
  21. Clayton, Mark (2014-06-17). "Ukraine election narrowly avoided 'wanton destruction' from hackers". Christian Science Monitor. ISSN 0882-7729. Retrieved 2020-02-03.
  22. "Excerpt from Birth: The Conspiracy to Stop the '94 Election by Peter Harris". Penguin SA @ Sunday Times Books LIVE. 2010-10-25. Retrieved 2020-02-03.
  23. Harris, Peter, 1956- (2010). Birth : the conspiracy to stop the '94 election (1st ed.). Cape Town: Umuzi. ISBN 978-1-4152-0102-2. OCLC 683401576.CS1 maint: multiple names: authors list (link) CS1 maint: date and year (link)
  24. Laing, Aislinn (2010-10-24). "Election won by Mandela 'rigged by opposition'". Daily Telegraph. ISSN 0307-1235. Retrieved 2020-02-03.
  25. Canada, Elections. "Past elections". www.elections.ca. Retrieved 2019-07-13.
  26. The Front Lines of Democracy: Who Staffs our Polling Places and Does it Matter? Bonnie E. Glaser, Karin MacDonald, Iris Hui, and Bruce E. Cain; Election Administration Research Center, University of California at Berkeley. October 2007
  27. "State Audit Laws". Verified Voting. 2017-02-10. Retrieved 2018-04-02.
  28. Broken Ballots: Will Your Vote Count? Douglas W. Jones and Barbara Simon, CSLI Publications, 2012
  29. As of early 2018, Colorado is the only state that has made valid, outcome-confirming election audits routine following all elections.
  30. Counting Votes 2012: A State by State Look at Voting Technology Preparedness, Pamela Smith, Verified Voting Foundation; Michelle Mulder, Rutgers School of Law-Newark; Susannah Goodman, Common Cause Education Fund, 2012. Accessed May 12, 2017
  31. National Conference of State Legislatures. "Post-Election Audits". www.ncsl.org. Retrieved 2018-04-02.
  32. US Census Bureau. "State Population Totals: 2010-2017". www.census.gov. Archived from the original on 2018-03-06. Retrieved 2018-04-02.
  33. In 2018 California law changed to audit only ballots in the "Semifinal Official Canvass," which covers election night. They exclude ballots arriving in the mail after election day, and counties may also exclude any of the earlier mailed and provisional ballots which they do not have time to count by election night. News story on the law, and the law itself, are below. In March 2020, the Semifinal Official Canvass included 57% of the number of ballots which would eventually be counted (5,518,805 out of 9,687,076).
  34. "Los Angeles Post Election Manual Tally Audit Summary Information" (PDF). calvoter.org/issues/votingtech/manualcount.html. 2010-08-20. Retrieved 2018-04-24.
  35. Lamone, Linda (2016-12-22). "Joint Chairman's Report on the 2016 Post-Election Tabulation Audit" (PDF). Maryland State Board of Elections. Retrieved 2018-09-30.
  36. Casias, Danny (2017-11-08). "Audited contests in each county for 2017 RLA (XLSX)". www.sos.state.co.us/pubs/elections/auditCenter.html. Retrieved 2018-04-15.
  37. "Round #1 State Report". www.sos.state.co.us/pubs/elections/auditCenter.html. 2017-11-20. Retrieved 2018-04-09.
  38. "Secretary of State Jim Condos to Conduct Election Audit". www.vermont.gov. 2016-11-22. Retrieved 2018-09-30.
  39. Stark, Philip (2012-03-16). "Gentle Introduction to Risk-limiting Audits" (PDF). IEEE Security and Privacy via University of California at Berkeley, pages 1, 3.
  40. Lindeman, Mark (executive editor), Jennie Bretschneider, Sean Flaherty, Susannah Goodman, Mark Halvorson, Roger Johnston, Ronald L. Rivest, Pam Smith, Philip B. Stark (2012-10-01). "Risk-Limiting Post-Election Audits: Why and How" (PDF). University of California at Berkeley. pp. 3, 16. Retrieved 2018-04-09.
  41. Lovato, Jerome, Danny Casias, and Jessi Romero. "Colorado Risk-Limiting Audit:Conception to Application" (PDF). Bowen center for Public Affairs and Colorado Secretary of State. Retrieved 2018-04-05.
  42. Lindeman, Mark, Ronald L. Rivest, Philip B. Stark and Neal McBurnett (2018-01-03). "Comments re statistics of auditing the 2018 Colorado elections" (PDF). Colorado Secretary of State. Retrieved 2018-04-09.
  43. Statement on Risk-limiting Auditing, American Statistical Association, April 2010. Accessed May 12, 2017
  44. Post-Election Risk-Limiting Audit Pilot Program 2011-2013, Final Report to the United States Election Assistance Commission, California Secretary of State 2013. Accessed May 12, 2017
  45. The American Voting Experience: Report and Recommendations of the Presidential Commission on Election Administration, January 2014
  46. Stark, Philip B. (2010). "Super-Simple Simultaneous Single-Ballot Risk-Limiting Audits". Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections via (EVT/WOTE ’10). USENIX.
  47. "Voting System, US Election Assistance Commission". www.eac.gov. Retrieved 2018-04-10.
  48. "California Supplement to the Statement of Vote, Statewide Summary by County for President" (PDF). elections.cdn.sos.ca.gov.
  49. "California Code, Elections Code - ELEC § 15154". Findlaw. Retrieved 2018-04-24.
  50. Zetter, Kim (2008-12-08). "Unique Transparency Program Uncovers Problems with Voting Software". WIRED. Retrieved 2018-04-06.
  51. "The Elections Transparency Project". The Elections Transparency Project. Archived from the original on 2018-04-06. Retrieved 2018-04-24.
  52. Trachtenberg, Mitch. "Humboldt County Election Transparency Project" (PDF). San Francisco Elections Commission. Retrieved 2018-04-05.
  53. Trachtenberg, Mitch (2013-07-29). "The Humboldt County Election Transparency Project and TEVS" (PDF). Report for Elections Advisory Commission. Retrieved 2018-04-05.
  54. "Actions: The Brakey Method". BlackBoxVoting.org. Retrieved 2018-04-06.
  55. Stauffer, Jacob (2016-11-04). "Vulnerability & Security Assessment Report Election Systems &Software's Unity 3.4.1.0" (PDF). Verified Voting. Retrieved 2018-04-05.
  56. Post-election Audits, Verified Voting Foundation, undated. Accessed May 12, 2017.
  57. Benaloh, Public Evidence from Secret Ballots; et al. (2017). Electronic voting : second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, proceedings. Cham, Switzerland. p. 122. ISBN 9783319686875. OCLC 1006721597.
  58. Lindeman, Mark, Mark Halvorson, Pamela Smith, Lynn Garland, Vittorio Addona, Dan McCrea (2008-09-01). "Best Practices: Chain of Custody and Ballot Accounting, ElectionAudits.org" (PDF). Brennan Center for Justice et al. Retrieved 2018-04-09.
  59. "Chapter 3. PHYSICAL SECURITY" (PDF). US Election Assistance Commission. Retrieved 2018-04-24.
  60. Coherent Cyber, Freeman, Craft McGregor Group (2017-08-28). "Security Test Report ES&S Electionware 5.2.1.0" (PDF): 9 via California Secretary of State. Cite journal requires |journal= (help)CS1 maint: multiple names: authors list (link)
  61. Seivold, Garett (2018-04-02). "Physical Security Threats and Vulnerabilities - LPM". losspreventionmedia.com. Retrieved 2018-04-24.
  62. Greenberg, Andy (2020-08-05). "Inside the Courthouse Break-Ins that Landed 2 White Hat Hackers in Jail". Wired. ISSN 1059-1028. Retrieved 2020-08-09.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.