Electronic voting in the United States

Electronic voting in the United States involves several types of machines: touch screens for voters to mark choices, scanners to read paper ballots, scanners to verify signatures on envelopes of absentee ballots, and web servers to display tallies to the public. Aside from voting, there are also computer systems to maintain voter registrations and display these electoral rolls to polling place staff.

Election machines are computers, often 10-20 years old, since certification and purchase processes take at least two years, and offices lack money to replace them until they wear out.[1] Like all computers they are subject to errors, which have been widely documented, and hacks, which have not been documented, though security flaws which would permit undetectable hacks have been documented.

Most election offices handle thousands of ballots, with an average of 17 contests per ballot,[2] so machine-counting can be faster and less expensive than hand-counting.

Voluntary guidelines

The Election Assistance Commission (EAC) is an independent agency of the United States government which developed the 2005 Voluntary Voting System Guidelines (VVSG).[3] These guidelines address some of the security and accessibility needs of elections. The EAC also accredits three test laboratories which manufacturers hire to review their equipment.[4] Based on reports from these laboratories the EAC certifies when voting equipment complies with the voluntary guidelines.

Twelve states require EAC certification for machines used in their states. Seventeen states require testing by an EAC-accredited lab, but not certification. Nine states and DC require testing to federal standards, by any lab. Four other states refer to federal standards but make their own decisions. The remaining eight states do not refer to federal standards.[5]

Certification takes two years, costs a million dollars, and is needed again for any equipment update, so election machines are a difficult market.[1]

A revision to the guidelines, known as the VVSG 1.1, was prepared in 2009 and approved in 2015.[3] Voting machine manufacturers can choose which guidelines they follow.[6] A new version has been written known as the VVSG 2.0 or the VVSG Next Iteration, which is being reviewed.[3]

Optical scan counting

Scanner marked multiple candidates with black line

In an optical scan voting system, each voter's choices are marked on one or more pieces of paper, which then go through a scanner. The scanner creates an electronic image of each ballot, interprets it, creates a tally for each candidate, and usually stores the image for later review.

The voter may mark the paper directly, usually in a specific location for each candidate, then mail it or put it in a ballot box.

Or the voter may select choices on an electronic screen, which then prints the chosen names, usually with a bar code or QR code summarizing all choices, on a sheet of paper to put in the scanner.[7] This screen and printer is called an electronic ballot marker (EBM) or ballot marking device (BMD), and voters with disabilities can communicate with it by headphones, large buttons, sip and puff, or paddles, if they cannot interact with the screen or paper directly. Typically the ballot marking device does not store or tally votes. The paper it prints is the official ballot, put into a scanning system which counts the barcodes, or the printed names can be hand-counted, as a check on the machines.[8] Most voters do not look at the paper to ensure it reflects their choices, and when there is a mistake, 93% of voters do not report it to poll workers.[9]

Two companies, Hart and Clear Ballot, have scanners which count the printed names, which voters had a chance to check, rather than bar codes and QR codes, which voters are unable to check.[10] When scanners use the bar code or QR code, the candidates are represented in the bar code or QR code as numbers, and the scanner counts those codes, not the names. If a bug or hack makes the numbering system in the ballot marking device different from the numbering system in the scanner, votes will be tallied for the wrong candidates.[10] This numbering mismatch has appeared with direct recording electronic machines (below).[11]

Errors in optical scans

Scanners have a row of photo-sensors which the paper passes by, and they record light and dark pixels from the ballot. A black streak results when a scratch or paper dust causes a sensor to record black continuously.[12][13] A white streak can result when a sensor fails.[14] In the right place, such lines can indicate a vote for every candidate or no votes for anyone. Some offices blow compressed air over the scanners after every 200 ballots to remove dust.[15]

Software can miscount; if it miscounts drastically enough, people notice and check. Staff rarely can say who caused an error, so they do not know whether it was accidental or a hack.

  • In a 2020 election in Baltimore, Maryland, the private company which printed ballots shifted the location of some candidates on some ballots up one line, so the scanner looked in the wrong places on the paper and reported the wrong numbers. It was caught because a popular incumbent got implausibly few votes.[16]
  • In a 2019 election in Northampton county, Pennsylvania, the software under-counted one candidate by 99%, reporting 164 votes, compared to 26,142 found in a subsequent hand-count, which changed the candidate's loss to a win.[17]
  • In a 2018 New York City election when the air was humid, ballots jammed in the scanner, or multiple ballots went through a scanner at once, hiding all but one.[18]
  • In a 2016 Maryland election, a comparison of two scanning systems on the same ballots revealed that (a) 1,972 ballot images were incorrectly left out of one system, (b) one system incorrectly ignored many votes for write-in candidates,[19] (c) shadows from paper folds were sometimes interpreted as names written in on the ballot, (d) the scanner sometimes pulled two ballots at once, scanning only the top one, (e) the ballot printers sometimes left off certain candidates, (f) voters often put a check or X instead of filling in an oval, which software has to adapt to, and (g) a scratch or dirt on a scanner sensor put a black line on many ballot images, causing the appearance of voting for more than the allowed number of candidates, so those votes were incorrectly ignored.[12][13]
  • In a 2014 Stoughton, Wisconsin, election, all voters' choices on a referendum were ignored, because the scanner was programmed to look in the wrong spot on the ballot.[15]
  • In a 2010 New York election, 20,000 votes for governor and 30,000-40,000 votes for other offices were ignored, because the scanners overheated and disqualified the ballots by reading multiple votes in races where voters had properly only voted once.[20][21][22]
  • Errors from 2002-2008 were listed and analyzed by the Brennan Center in 2010.[23]
  • Security reviews and audits are discussed below.

Recreated ballots

Recreated ballots are paper[24] or electronic[25] ballots created by election staff when originals cannot be counted for some reason. Reasons include tears, water damage, folds which prevent feeding through scanners and voters selecting candidates by circling them or other abnormal marks.[26] Reasons also include citizens abroad who use the Federal Write-In Absentee Ballot because of not receiving their regular ballot in time. As many as 8% of ballots in an election may be recreated.[25]

When auditing an election, audits are done with the original ballots, not the recreated ones, to catch mistakes in recreating them.

Cost of scanning systems

If most voters mark their own paper ballots and one marking device is available at each polling place for voters with disabilities, Georgia's total cost of machines and maintenance for 10 years, starting 2020, has been estimated at $12 per voter ($84 million total). Pre-printed ballots for voters to mark would cost $4 to $20 per voter ($113 million to $224 million total machines, maintenance and printing). The low estimate includes $0.40 to print each ballot, and more than enough ballots for historic turnout levels. the high estimate includes $0.55 to print each ballot, and enough ballots for every registered voter, including three ballots (of different parties) for each registered voter in primary elections with historically low turnout.[27][28] The estimate is $29 per voter ($203 million total) if all voters use ballot marking devices, including $0.10 per ballot for paper.

The capital cost of machines in 2019 in Pennsylvania is $11 per voter if most voters mark their own paper ballots and a marking device is available at each polling place for voters with disabilities, compared to $23 per voter if all voters use ballot marking devices.[29] This cost does not include printing ballots.

New York has an undated comparison of capital costs and a system where all voters use ballot marking devices costing over twice as much as a system where most do not. The authors say extra machine maintenance would exacerbate that difference, and printing cost would be comparable in both approaches.[30] Their assumption of equal printing costs differs from the Georgia estimates of $0.40 or $0.50 to print a ballot in advance, and $0.10 to print it in a ballot marking device.[27]

Direct-recording electronic counting

Roll of paper from direct-recording machine, with votes from numerous voters, Martinsburg, West Virginia, 2018

A touch screen displays choices to the voter, who selects choices, and can change her mind as often as needed, before casting the vote. Staff initialize each voter once on the machine, to avoid repeat voting. Voting data and ballot images are recorded in memory components, and can be copied out at the end of the election.

The system may also provide a means for communicating with a central location for reporting results and receiving updates,[31] which is an access point for hacks and bugs to arrive.

Some of these machines also print names of chosen candidates on paper for the voter to verify. These names on paper can be used for election audits and recounts if needed. The tally of the voting data is stored in a removable memory component and in bar codes on the paper tape. The paper tape is called a Voter-verified paper audit trail (VVPAT). The VVPATs can be counted at 20–43 seconds of staff time per vote (not per ballot).[32][33]

For machines without VVPAT, there is no record of individual votes to check.

Errors in direct-recording electronic voting

This approach can have software errors. It does not include scanners, so there are no scanner errors. When there is no paper record, it is hard to notice or research most errors.

  • The only forensic examination which has been done of direct-recording software files was in Georgia in 2020, and found that one or more unauthorized intruders had entered the files and erased records of what it did to them. In 2014-2017 an intruder had control of the state computer in Georgia which programmed vote-counting machines for all counties. The same computer also held voter registration records. The intrusion exposed all election files in Georgia since then to compromise and malware. Public disclosure came in 2020 from a court case.[34][35][36] Georgia did not have paper ballots to measure the amount of error in electronic tallies. The FBI studied that computer in 2017, and did not report the intrusion.[37][34]
  • A 2018 study of direct-recording voting machines (iVotronic) without VVPAT in South Carolina found that every election from 2010-2018 had some memory cards fail. The investigator also found that lists of candidates were different in the central and precinct machines, so 420 votes which were properly cast in the precinct were erroneously added to a different contest in the central official tally, and unknown numbers were added to other contests in the central official tallies. The investigator found the same had happened in 2010. There were also votes lost by garbled transmissions, which the state election commission saw but did not report as an issue. 49 machines reported that their three internal memory counts disagreed, an average of 240 errors per machine, but the machines stayed in use, and the state evaluation did not report the issue, and there were other error codes and time stamp errors.[11][38]
  • In a 2017 York County, Pennsylvania, election, a programming error in a county's machines without VVPAT let voters vote more than once for the same candidate. Some candidates had filed as both Democrat and Republican, so they were listed twice in races where voters could select up to three candidates, so voters could select both instances of the same name.[39] They recounted the DRE machines' electronic records of votes and found 2,904 pairs of double votes.[40]
  • In a 2011 Fairfield Township, New Jersey, election a programming error in a machine without a VVPAT gave two candidates low counts. They collected more affidavits by voters who voted for them than the computer tally gave them, so a judge ordered a new election which they won.[41]
  • Errors from 2002-2008 were listed and analyzed by the Brennan Center in 2010.[23]
  • Security reviews and audits are discussed below.

Online, email and fax voting

Email, fax, phone apps, and web portals transmit information through the internet, between computers at both ends, so they are subject to errors and hacks at the origin, destination and in between. Security experts have found security problems in every attempt at online voting,[42] [43] [44] [45] including systems in Australia,[46] Estonia,[47][48] Switzerland,[49] Russia,[50][51][52] and the United States.[53][42]

States that allow remote electronic voting in the United States are:[54]

  • Hawaii allows email voting by any permanent absentee voter who has not received a ballot by five days before an election
  • Idaho allows email and fax voting in declared emergencies
  • Utah allows email and fax voting for those with disabilities
  • Other states have tried or considered software, with problems discussed below.

The Uniformed and Overseas Citizens Absentee Voting Act (UOCAVA) lets overseas citizens and all military and merchant marine voters get ballots electronically (email, fax, or web site). They then submit ballots by mail to 18 states. Elsewhere they submit by email, fax, or secure web site,[54] including from space.[55][56]

Researchers have found insecurities in online voting systems from Voatz,[53] [57] [58] and Democracy Live.[42][59]

In 2010, graduate students from the University of Michigan hacked into the District of Columbia online voting systems during an online voting mock test run and changed all the cast ballots to cater to their preferred candidates. This voting system was being tested for military voters and overseas citizens, allowing them to vote on the Web, and was scheduled to run later that year. It only took the hackers, a team of computer scientists, thirty-six hours to find the list of the government's passwords and break into the system.[60]

In March 2000 the 2000 Arizona Democratic presidential primary internet election was conducted over the internet using the private company votation.com.[61] Each registered member of the party received a personal identification number in the mail. They could vote in person or over the internet, using their PIN and answering two questions such as date and place of birth. During the election older browsers failed, but no hacks were identified.[62]

Electronic processing of postal and absentee ballots

Postal ballots, rejection rates by state, US, November 2016, except Georgia 2018

Checking signatures on envelopes of absentee ballots is hard, and is often computerized in jurisdictions with many absentee ballots. The envelope is scanned, and the voter's signature on the outside of the envelope is instantly compared with one or more signatures on file. The machine sets aside non-matches in a separate bin. Temporary staff then double-check the rejections, and in some places check the accepted envelopes too.[63]

Error rates of computerized signature reviews are not published. "A wide range of algorithms and standards, each particular to that machine's manufacturer, are used to verify signatures. In addition, counties have discretion in managing the settings and implementing manufacturers' guidelines… there are no statewide standards for automatic signature verification… most counties do not have a publicly available, written explanation of the signature verification criteria and processes they use"[63]

Handwriting experts agree "it is extremely difficult for anyone to be able to figure out if a signature or other very limited writing sample has been forged,"[64] The National Vote at Home Institute reports that 17 states do not mandate a signature verification process.[65] The Election Assistance Commission says that machines should be set only to accept nearly perfect signature matches, and humans should doublecheck a sample, but EAC does not discuss acceptable error rates or sample sizes.[66]

In the November 2016 general election, rejections ranged from none in Alabama and Puerto Rico, to 6% of ballots returned in Arkansas, Georgia, Kentucky and New York.[67] [68] Where reasons for rejection were known, in 2018, 114,000 ballots arrived late, 67,000 failed signature verification, 55,000 lacked voter signatures, and 11,000 lacked witness signatures in states which require them.[69]

The highest error rates in signature verification are found among lay people, higher than for computers, which in turn make more errors than experts.[70] Researchers have published error rates for computerized signature verification. They compare different systems on a common database of true and false signatures. The best system falsely rejects 10% of true signatures, while it accepts 10% of forgeries. Another system has error rates on both of 14%, and the third-best has error rates of 17%.[71][72] It is possible to be less stringent and reject fewer true signatures, at the cost of also rejecting fewer forgeries, which means erroneously accepting more forgeries.[73] Vendors of automated signature verification claim accuracy, and do not publish their error rates.[74][75][76][77]

Voters with short names are at a disadvantage, since even experts make more mistakes on signatures with fewer "turning points and intersections."[78]

State and local websites for election results

Election offices display election results on the web by transferring USB drives between offline election computers, and online computers which display results to the public.[79] USB drives can take infections from the online computers to the election computers.[80][81] Local governments communicate electronically with their state governments so the state can display results, with the result that problems at the state level can affect all or many local offices.

Election-reporting websites run software to aggregate and display results. These have had programming errors which showed erroneous partial results during the evening,[82] and the wrong winner.[83]

Before the 2016 general election, Russians gained access to at least one employee's account[84] at a vendor which manages election-reporting websites.[85] During the 2018 general election, a hacker in India gained administrative access to the Alaska election-reporting website.[86][87]

Studies by McAfee and ProPublica in 2020 found that most election websites have inadequate security. McAfee analyzed swing states.[88] ProPublica analyzed Super Tuesday states.[89] They found many offices using outdated, insecure, dangerous and inappropriate software, including unsupported operating systems, and using the same few web hosts, which they said is dangerous for critical infrastructure, since finding a flaw in one can lead to access to them all.[89] They criticized offices for not using https encryption, and for public sitenames ending in .com or .org, since it leads voters to trust sites which are not .gov, and voters can easily be tricked by a similar name.[90]

Election security

Decentralized system

In 2016 Homeland Security and the Director of National Intelligence said that United States elections are hard to hack, because they are decentralized, with many types of machines and thousands of separate election offices operating under 51 sets of state laws.[91][92]

In 2018 a McAfee expert agreed decentralization makes hacking hard, but added it makes defense hard, and a nation state could hack multiple places.[93] In any case each city or county election is run by one office, and a few large offices affect state elections. County staff cannot in practice defend against the Russian state.[94]

Security reviews

The Brennan Center summarized almost 200 errors in election machines from 2002-2008, many of which happened repeatedly in different jurisdictions, which had no clearinghouse to learn from each other.[23] More errors have happened since then.

Machines in use are not examined to determine if they have been hacked, so no hacks of machines in use have been documented. Researchers have hacked all machines they have tried, and have shown how they can be undetectably hacked by manufacturers, election office staff, pollworkers, voters and outsiders and by the public.[95] The public can access unattended machines in polling places the night before elections.[96] Some of the hacks can spread among machines on the removable memory cards which tell the machines which races to display, and carry results back to the central tally location.

In December 2007 the Ohio Secretary of State Jennifer Brunner released the results of a comprehensive review of Ohio's electronic voting technology. The study examined electronic voting systems – both touch-screen and optical scan – from Election Systems & Software, Hart InterCivic, and Premier Election Systems.[97] Three teams of security researchers, based at the Pennsylvania State University, the University of Pennsylvania, and WebWise Security, Inc., conducted the security reviews. The teams had access to voting machines and software source code from the three vendors and performed source code analysis and security penetration testing with the aim of identifying security problems that might affect the integrity of elections that use the equipment.

Besides specific problems in each system, the Ohio report noted that all

"election systems rely heavily on third party software that implement interfaces to the operating systems, local databases, and devices such as optical scanners... the construction and features of this software is unknown, and may contain undisclosed vulnerabilities such trojan horses or other malware."[97]

In August 2007, California Secretary of State Debra Bowen announced results of a "top-to-bottom review" of security of all electronic voting systems in the state, including Diebold Election Systems, Hart InterCivic, Sequoia Voting Systems and Elections Systems and Software.[98] An August 2 report by computer security experts from the University of California found flaws in voting system source code. On July 27 "red teams" reported on "worst case" Election Day scenarios, where they identified vulnerabilities to tampering or error. The Top to Bottom review also included a comprehensive review of manufacturer documentation as well as a review of accessibility features and alternative language requirements.

The California security experts found significant security flaws in all of the manufacturers' voting systems, flaws that could allow a single non-expert to compromise an entire election.[99] The July and August reports found that three of the tested systems fell far short of the minimum requirements specified in the EAC 2005 Voluntary Voting System Guidelines (VVSG). On August 3, 2007, Bowen decertified machines that were tested, and also the ES&S InkaVote machine, which was not included in the review because the company submitted it past the deadline for testing. Some of the systems tested were conditionally recertified with new stringent security requirements imposed.[100] The companies in question had until the February 2008 California Presidential Primaries to fix their security issues and ensure that election results could be closely audited.

California has continued to report on security of newer election machines.[101]

In 2006, Princeton University computer scientists studied security of the Premier Election Solutions (formerly Diebold Election Systems) AccuVote-TSx voting system for a group of New Jersey counties. Their results showed that the AccuVote-TSx was insecure and could be "installed with vote-stealing software in under a minute." The scientists also said that machines can transmit computer viruses from one to another "during normal pre- and post-election activity."[102]

Audits

Some States Check Election Machines' Counts by Hand

Five states check all contests by hand tallies in a small percent of locations, AK, CA, PA, UT, WV, though California excludes about half the ballots, the ones counted after election day, and Alaska excludes small precincts. Two states check all contests by machines independent of the election machines, in a small percent of locations, NY, VT. Seventeen states check one or a few contests by hand, usually federal races and the governor; most local contests are not checked. Four states reuse the same machines or ballot images as the election, so errors can persist, CT, IL, MD, NV. Sixteen states do not require audits, or only in special circumstances. In seven states many voters still lack paper ballots, so audits are not possible. IN, KY, LA, MS, NJ, TN, TX.[103]

Public attitudes

The Pew Research Center found in October 2018 wide mistrust of election security in both parties, especially among Democrats

  • 8% of voters were "very confident that election systems are secure from hacking and other technological threats."
  • 37% were "somewhat confident", and the remaining 55% were not confident
  • 13% of Republicans were very confident, and 41% were not confident
  • 4% of Democrats were very confident, and 66%% were not confident[104]

An MIT professor's survey found that Republicans think domestic hackers are more likely than foreigners; Democrats think the opposite.[105]

Stanford and Wisconsin researchers in 2019 found that only 89% of voters disapprove if a foreign country would "hack into voting machines and change the official vote count to give [a] candidate extra votes" and the candidate wins. This 89% disapproval is not much more than the 88% who disapprove of a foreign country making campaign contributions and 78-84% against them spreading lies. Only 73-79% disapprove if their party got help, while 94-95% disapprove of the other party getting help. If a foreign country thought about interfering, but did not, 21% distrust the results anyway. This rises only to 84% distrusting final results after a foreign country hacked and changed results.[106]

For any of the foreign actions (hacks, contributions or lies), 72% of voters support economic sanctions, 59% support cutting diplomatic relations, 25% support a military threat, and 15% support a military strike. There was less support for action, by 4-20 percentage points, if the foreign country helped one's own party win, so the researchers point out that retaliation is unlikely, since there is little support for it in a winning party. Deep investigation creates more certainty about who is to blame, which they find raises support for retaliation very little. They randomly listed China, Pakistan or Turkey as the interfering country, and do not report any different reactions to them.[106]

A Monmouth University poll in May 2019 found that 73% thought Russia interfered in the 2016 election (not necessarily by hacking), 49% thought it damaged American democracy a lot, 57% thought Russia interfered in the 2018 election, and 60% thought the US government is not doing enough to stop it. Margin of error is ±3.5%.[107]

Election companies

Three vendors sell most of the machines used for voting and for counting votes. As of September 2016, the American Election Systems & Software (ES&S) served 80 million registered voters, Canadian Dominion Voting Systems 70 million, American Hart InterCivic 20 million, and smaller companies less than 4 million each.[1]

More companies sell signature verification machines: ES&S, Olympus, Vantage, Pitney Bowes, Runbeck, and Bell & Howell.[63]

Amazon provides election websites in 40 states, including election-reporting sites in some of them.[108] A Spanish company, Scytl, manages election-reporting websites statewide in 12 U.S. states, and in another 980 local jurisdictions in 28 states.[109] Another website management company is VR Systems, active in 8 states.[110] Maryland's election website is managed by a company owned by an associate of Russian President Putin.[111]

Timeline of development

  • 1964: The Norden-Coleman optical scan voting system, the first such system to see actual use, was adopted for use in Orange County, California.[112]
  • 1974: The Video Voter, the first DRE voting machine used in a government election, developed by the Frank Thornber Company in Chicago, Illinois, saw its first trial use in 1974 near Chicago.[113]
  • Mar. 1975:The U.S. Government is given a report by Roy Saltman, a consultant in developing election technology and policies, in which the certification of voting machines is analyzed for the first time.
  • Aug 28, 1986: The Uniformed and Overseas Citizen Absentee Voting Act of 1986 (UOCAVA) requires that US states allow certain groups of citizens to register and vote absentee in elections for federal offices.[114]
  • 1990: The FEC (Federal Election Commission) released a universalized standard for computerized voting.
  • 1996: The Reform Party uses I-Voting (Internet Voting) to select their presidential candidate. This election is the first governmental election to use this method in the U.S.[115]
  • May 2002:The FEC revised the standards established for electronic voting from 1990.
  • Nov 2004: 4,438 of votes in the general election is lost by North Carolina’s electronic voting machines. The machines continued to count electronic votes past the device's memory capacity and the votes were irretrievably lost.
  • Dec 2005: Black Box Voting showed how easy it is to hack an electronic voting system. Computer experts in Leon County, Fl lead a simulation where they changed the outcome of a mock election by tampering with the tabulator without leaving evidence of their actions.
  • Sep 13, 2006: It was demonstrated that Diebold Electronic Voting Machine can be hacked in less than a minute. Princeton's Professor of Computer Science, Edward Felten who installed a malware which could steal votes and replace them with fraudulent numbers without physically coming in contact with the voting machine or its memory card. The malware can also program a virus that can spread from machine to machine.
  • Sep 21, 2006: The governor of Maryland, Bob Ehrlich (R), advised against casting electronic votes as an alternative method for casting paper absentee ballots. This was a complete turn around since Maryland became one of the first states to accept electronic voting systems statewide during his term.
  • Sep 3, 2009: Diebold, responsible for much of the technology in the election-systems business, sells their hold to Election Systems & Software, Inc for $5 Million, less than 1/5 of its price seven years earlier.[116]
  • Oct 28, 2009: The federal Military and Overseas Voters Empowerment Act (MOVE) requires US states to provide ballots to UOCAVA voters in at least one electronic format (email, fax, or an online delivery system).[117]
  • Jan 3, 2013: Voter Empowerment Act of 2013 – This act requires each US state to make available public websites for online voter registration.[118]
  • Spring 2019: Department of Defense DARPA announces $10 million contract for secure, open-source election system prototypes based on the agency's SSITH secure hardware platform work: a touch screen ballot-marking device to demo at the annual DEF CON hacker conference in summer 2019 and an optical scan system to read hand-marked paper ballots targeted for DEF CON 2020.[119][120][121]

Legislation

In the summer of 2004, the Legislative Affairs Committee of the Association of Information Technology Professionals issued a nine-point proposal for national standards for electronic voting.[122] In an accompanying article, the committee's chair, Charles Oriez, described some of the problems that had arisen around the country.[123][124]

Legislation has been introduced in the United States Congress regarding electronic voting, including the Nelson-Whitehouse bill. This bill would appropriate as much as 1 billion dollars to fund states' replacement of touch screen systems with optical scan voting system. The legislation also addresses requiring audits of 3% of precincts in all federal elections. It also mandates some form of paper trail audits for all electronic voting machines by the year 2012 on any type of voting technology.[125]

Another bill, HR.811 (The Voter Confidence and Increased Accessibility Act of 2003), proposed by Representative Rush D. Holt, Jr., a Democrat from New Jersey, would act as an amendment to the Help America Vote Act of 2002 and require electronic voting machines to produce a paper audit trail for every vote. The U.S. Senate companion bill version introduced by Senator Bill Nelson from Florida on November 1, 2007, necessitates the Director of the National Institute of Standards and Technology to continue researching and to provide methods of paper ballot voting for those with disabilities, those who do not primarily speak English, and those who do not have a high literacy rating. Also, it requires states to provide the federal office with audit reports from the hand counting of the voter verified paper ballots. Currently, this bill has been turned over to the United States Senate Committee on Rules and Administration and a vote date has not been set.[126]

During 2008, Congressman Holt, because of an increasing concern regarding the insecurities surrounding the use of electronic voting technology, submitted additional bills to Congress regarding the future of electronic voting. One, called the "Emergency Assistance for Secure Elections Act of 2008" (HR5036), states that the General Services Administration will reimburse states for the extra costs of providing paper ballots to citizens, and the costs needed to hire people to count them.[127] This bill was introduced to the House on January 17, 2008.[128] This bill estimates that $500 million will be given to cover costs of the reconversion to paper ballots; $100 million given to pay the voting auditors; and $30 million given to pay the hand counters. This bill provides the public with the choice to vote manually if they do not trust the electronic voting machines.[127] A voting date has not yet been determined.

The Secure America's Future Elections Act or the SAFE Act (HR 1562) was among the relevant legislation introduced in the 115th Congress. The bill's provisions include designation of the infrastructure used to administer elections as critical infrastructure; funding for states to upgrade the security of the information technology and cybersecurity elements of election-related IT systems; and requirements for durable, readable paper ballots and manual audits of results of elections.

References

  1. Hitt, Lorin, Simran Ahluwalia, Matthew Caulfield, Leah Davidson, Mary Margaret Diehl, Alina Ispas, and Michael Windle. "The Business of Voting Market Structure and Innovation in the Election Technology Industry". Penn Wharton Public Policy Initiative,. Retrieved 2020-07-07.CS1 maint: extra punctuation (link)
  2. Hedlin, Simon (2015-11-03). "Do Long Ballots Offer Too Much Democracy?". Atlantic. Retrieved 2020-07-08.
  3. "Voluntary Voting System Guidelines". U.S. Election Assistance Commission. Retrieved 2020-07-09.
  4. "Accredited Laboratories". U.S. Election Assistance Commission. Retrieved 2020-07-08.
  5. "Voting System Standards, Testing and Certification". www.ncsl.org. Retrieved 2020-07-08.
  6. "Free Speech For People and National Election Defense Coalition to U.S. Election Assistance Commission: Don't Let Voting Machine Vendors Use Obsolete Standards". Free Speech For People. 2019-06-07. Retrieved 2020-07-09.
  7. "Ballot Marking Devices". Verified Voting. Retrieved 2020-02-28.
  8. Cohn, Jennifer (2018-05-05). "What is the latest threat to democracy?". Medium. Retrieved 2020-02-28.
  9. Bernhard, Matthew, Allison McDonald, Henry Meng, Jensen Hwa, Nakul Bajaj, Kevin Chang, J. Alex Halderman (2019-12-28). "Can Voters Detect Malicious Manipulation of Ballot Marking Devices?" (PDF). Halderman. Retrieved 2020-02-28.
  10. Perez, Edward, Joy London, Gregory Miller (March 2019). "Georgia State Election Technology Acquisition, Assessing Recent Legislation in Light of Planned Procurement" (PDF). OSET Institute. Retrieved 2020-03-05.
  11. Buell, Duncan (2018-12-23). Analysis of the Election Data from the 6 November 2018 General Election in South Carolina (PDF). League of Women Voters of South Carolina (Report). Retrieved 2020-02-05.
  12. Walker, Natasha (2017-02-13). "2016 Post-Election Audits in Maryland" (PDF). Elections Advisory Commission. Retrieved 2020-02-27.
  13. Ryan, Tom and Benny White (2016-11-30). "Transcript of Email on Ballot Images" (PDF). Pima County, AZ. Retrieved 2020-02-15.
  14. Gideon, John (2005-07-05). "Hart InterCivic Optical-Scan Has A Weak Spot". www.votersunite.org. Retrieved 2020-02-15.
  15. McKim, Karen; 2015 (2015-02-17). "Unregistered Dust Bunnies May be Voting in Wisconsin Elections: Stoughton Miscount Update". Wisconsin Grassroots Network. Retrieved 2020-06-26.CS1 maint: numeric names: authors list (link)
  16. Davis, Emily Opilo, Talia Richman, Phil (2020-06-03). "Concern from candidates, officials as error creates delay in release of returns; Dixon leads in Baltimore mayoral count". Baltimore Sun. Retrieved 2020-07-30.
  17. Corasaniti, Nick (2019-11-30). "A Pennsylvania County's Election Day Nightmare Underscores Voting Machine Concerns". The New York Times. ISSN 0362-4331. Retrieved 2020-02-15.
  18. MacDougall, Ian (2018-11-07). "What Went Wrong at New York City Polling Places? It Was Something in the Air. Literally". ProPublica. Retrieved 2020-02-18.
  19. Lamone, Linda (2016-12-22). "Joint Chairman's Report on the 2016 Post-Election Tabulation Audit" (PDF). Maryland State Board of Elections. Retrieved 2020-02-15.
  20. Hamilton, Colby (2012-05-09). "Machine Casts Phantom Votes in the Bronx, Invalidating Real Ones: Report". WNYC New York Public Radio. Retrieved 2020-06-26.
  21. Keefe, Hohn (2011-12-06). "Thousands of NY Votes Tossed Over Ballot Confusion". WNYC New York Public Radio. Retrieved 2020-06-26.
  22. Norden, Larry, and Sundeep Iyer (2011-12-05). "Design Deficiencies and Lost Votes". Brennan Center for Justice. Retrieved 2020-06-26.
  23. Norden, Lawrence (2010-09-16). "Voting system failures: a database solution" (PDF). Brennan Center, NYU. Retrieved 2020-07-07.
  24. "observers from both political parties there... ballots have to be recreated in every election for a number of reasons, ranging from damaged mail-in ballots, to early voters who use pencils which can’t be read by ballot tabulators." Jordan, Ben (2018-11-07). "MKE Election Commission responds to criticism". WTMJ TV Milwaukee. Retrieved 2020-05-17.
  25. "With the new digital procedure, staff will be able to fix whatever race couldn’t be counted, instead of duplicating a voter’s entire ballot." White, Rebecca (2019-11-18). "One Washington County Plans to Speed Vote Counting with Tech". Government Technology. Retrieved 2020-05-17.
  26. Writer, Steve Miller, Journal Staff (2006-11-07). "Oddly marked ovals bane of poll workers' day". Rapid City Journal. Retrieved 2020-05-17.
  27. Perez, Edward, and Gregory Miller (March 2019). "Georgia State Election Technology Acquisition, A Reality Check". OSET Institute. Retrieved 2020-03-06.
  28. Fowler, Stephen. "Here's What Vendors Say It Would Cost To Replace Georgia's Voting System". Georgia Public Broadcasting. Retrieved 2020-02-28.
  29. Deluzio, Christopher, Kevin Skoglund (2020-02-28). "Pennsylvania Counties' New Voting Systems Selections: An Analysis" (PDF). University of Pittsburgh. Retrieved 2020-02-28.
  30. "Paper Ballots Costs". www.nyvv.org. Retrieved 2020-02-28.
  31. 2005 Voluntary Voting System Guidelines Archived 2006-02-08 at the Wayback Machine from the US Election Assistance Commission
  32. Theisen, Ellen (2005-06-14). "Cost Estimate for Hand Counting 2% of the Precincts in the U.S." (PDF). VotersUnite.org. Retrieved 2020-02-14.
  33. "VOTER VERIFIED PAPER AUDIT TRAIL Pilot Project Report" (PDF). Georgia Secretary of State. 2007-04-10. Retrieved 2020-02-15.
  34. Lamb, Logan (2020-01-14). "SUPPLEMENTAL DECLARATION OF LOGAN LAMB" (PDF). CourtListener. Retrieved 2020-02-03.
  35. "Coalition Plaintiffs' Status Report, pages 237-244". Coalition for Good Governance. 2020-01-16. Retrieved 2020-02-03.
  36. Bajak, Frank (2020-01-16). "Expert: Georgia election server showed signs of tampering". Associated Press. Retrieved 2020-02-03.
  37. Zetter, Kim. "Will the Georgia Special Election Get Hacked?". Politico. Retrieved 2020-02-16.
  38. Freed, Benjamin (2019-01-07). "South Carolina voting machines miscounted hundreds of ballots, report finds". Scoop News Group. Retrieved 2020-02-05.
  39. Kessler, Brandie, Teresa Boeckel and Dylan Segelbaum; Boeckel, Teresa; Segelbaum, Dylan (2017-11-07). "'Redo' of some York County races - including judge - possible after voting problems". York Daily Record. Retrieved 2020-03-11.
  40. Lee, Rick (2017-11-20). "UPDATE: York Co. election judicial winners: Kathleen Prendergast, Clyde Vedder, Amber Anstine Kraft". York Daily Record. Retrieved 2020-03-11.
  41. Thibodeau, Patrick (2016-10-05). "If the election is hacked, we may never know". ComputerWorld. Retrieved 2020-02-18.
  42. Appel, Andrew (2020-06-08). "Democracy Live internet voting: unsurprisingly insecure, and surprisingly insecure". Princeton University. Retrieved 2020-06-23.
  43. "Internet Voting". Verified Voting. Retrieved 2020-06-20.
  44. "Secure Internet voting will likely not be feasible in the near future... At the present time, the Internet (or any network connected to the Internet) should not be used for the return of marked ballots" National Academies of Sciences (2018-09-06). "Securing the Vote: Protecting American Democracy". Retrieved 2020-06-23.
  45. "Electronic ballot return faces significant security risks to the confidentiality, integrity, and availability of voted ballots. These risks can ultimately affect the tabulation and results and, can occur at scale... Even with ... technical security considerations, electronic ballot return remains a high-risk activity." Election Assistance Commission, National Institute of Standards and Technology, FBI, Cybersecurity & Infrastructure Security Agency (2020-05-11). "RISK MANAGEMENT FOR ELECTRONIC BALLOT DELIVERY, MARKING, AND RETURN" (PDF). Retrieved 2020-06-23.CS1 maint: multiple names: authors list (link)
  46. Halderman, J. Alex, and Vanessa Teague (2015-08-13). The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. International Conference on E-Voting and Identity via Springer.
  47. Springall, Drew; Finkenauer, Travis; Durumeric, Zakir; Kitcat, Jason; Hursti, Harri; MacAlpine, Margaret; Halderman, Alex, Security Analysis of the Estonian Internet Voting System, retrieved 3 December 2017
  48. "The OSCE/ODIHR EAM was made aware of a program that could, if it was running on a voter’s computer, change the vote without the possibility for the voter to detect it. The case was brought to the attention of the project manager who assessed this threat to be theoretically plausible but nearly impossible to implement in reality." "ESTONIA PARLIAMENTARY ELECTIONS OSCE/ODIHR Election Assessment Mission Report" (PDF). OSCE. 6 March 2011. Retrieved 2020-06-20.
  49. Zetter, Kim (2019-03-12). "Researchers Find Critical Backdoor in Swiss Online Voting System". Vice. Retrieved 2020-06-20.
  50. Gupta, Manhar. "Russia's Blockchain Voting Turned Into A Fiasco". Cryptotrends.
  51. Gaudry, Pierrick, and Alexander Golovnev (2020-02-10). Breaking the Encryption Scheme of the Moscow Internet Voting System (PDF). Financial Cryptography 2020 via International Financial Cryptography Association.
  52. Anderson, Ross (2020-02-21). "Electronic voting systems". The RISKS Digest, Volume 31 Issue 59. 31 via Newcastle University.
  53. Zetter, Kim (2020-02-13). "'Sloppy' Mobile Voting App Used in Four States Has 'Elementary' Security Flaws". VICE. Retrieved 2020-06-23.
  54. "Electronic Transmission of Ballots". www.ncsl.org. Retrieved 2020-07-08.
  55. "Astronauts beam votes home". CNN. 2 November 2010. Archived from the original on 3 March 2016.
  56. James, Kate (2 November 2010). "Astronauts Cast Vote From Space Thanks to 1997 Texas Law". Gather.com. Archived from the original on 11 May 2011. Retrieved 2 November 2010.
  57. Specter, Michael A., James Koppel, Daniel Weitzner (2020-02-12). "The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections" (PDF). Massachusetts Institute of Technology. Retrieved 2020-06-23.
  58. Halper, Evan; Twitter; options, Show more sharing; Facebook; Twitter; LinkedIn; Email; URLCopied!, Copy Link; Print (2019-05-16). "The vote-by-phone tech trend is scaring the life out of security experts". San Diego Union Tribune. Retrieved 2020-06-23.
  59. Parks, Miles (2020-02-28). "States Expand Internet Voting Experiments Amid Pandemic, Raising Security Fears". National Public Radio. Retrieved 2020-06-23.
  60. Wheaton, Sarah. "Voting Test Falls Victim to Hackers". The New York Times. Archived from the original on 2017-06-27. Retrieved 2015-02-20.
  61. "Arizona Democratic Party Selects Votation.com to Hold World's First Legally-Binding Public Election Over the Internet. - Free Online Library". www.thefreelibrary.com. Retrieved 2017-12-19.
  62. "How online voting works". usatoday.com. 10 March 2000.
  63. "Signature Verification and Mail Ballots: Guaranteeing Access While Preserving Integrity" (PDF). Stanford University. 2020-04-15. Retrieved 2020-06-01.
  64. Armitage, Susie (2018-11-05). "Handwriting Disputes Cause Headaches for Some Absentee Voters". ProPublica. Retrieved 2020-06-01.
  65. "Vote at Home Policy Actions: 1 and 2 Stars" (PDF). National Vote at Home Institute. May 2020. Retrieved 2020-06-18.
  66. "Signature Verification and Cure Process" (PDF). US Election Assistance Commission. 2020-05-20. Retrieved 2020-06-17.
  67. "THE ELECTION ADMINISTRATION AND VOTING SURVEY (EAVS) 2016 Comprehensive Report" (PDF). Election Assistance Commission. 2017-06-28. Retrieved 2020-06-12.
  68. Salame, Richard (2020-06-18). "As States Struggle With Vote-by-Mail, "Many Thousands, If Not Millions" of Ballots Could Go Uncounted in November". Type Investigations. Retrieved 2020-06-18.
  69. "Election Administration and Voting Survey (EAVS) 2018 Comprehensive report" (PDF). Election Assistance Commission. Retrieved 2020-06-12.
  70. Srihari, Sargur N. (2010-08-12). "Computational Methods for Handwritten Questioned Document Examination 1 FINAL REPORT to Dept. of justice Award Number: 2004-IJ-CX-K050". citeseerx.ist.psu.edu. Retrieved 2020-06-19.
  71. These systems handle scanned ("offline") signatures from multiple people ("WI, writer-independent"). Hafemann, Luiz G., Robert Sabourin and Luiz S. Oliveira (2017-10-16). "Offline Handwritten Signature Verification - Literature Review". IEEE. Retrieved 2020-07-17.
  72. Bibi, Kiran; Naz, Saeeda; Rehman, Arshia (2020-01-01). "Biometric signature authentication using machine learning techniques: Current trends, challenges and opportunities". Multimedia Tools and Applications. 79 (1): 289–340. doi:10.1007/s11042-019-08022-0. ISSN 1573-7721.
  73. Igarza, Juan; Goirizelaia, Iñaki; Espinosa, Koldo; Hernáez, Inmaculada; Méndez, Raúl; Sanchez, Jon (2003-11-26). Online Handwritten Signature Verification Using Hidden Markov Models. CIARP 2003. 2905. pp. 391–399. doi:10.1007/978-3-540-24586-5_48.
  74. "SignatureXpert for Vote by Mail" (PDF). Parascript. 2020-05-05. Retrieved 2020-07-21.
  75. "Agilis Ballot Packet Sorting System" (PDF). Runbeck. 2019-11-07.
  76. "Criterion Elevate". www.fluenceautomation.com. Retrieved 2020-07-21.
  77. "Vote-By-Mail Best Practices Webinar Series". www2.bluecrestinc.com. Retrieved 2020-07-21.
  78. Sita, Jodi; Found, Bryan; Rogers, Douglas K. (September 2002). "Forensic Handwriting Examiners' Expertise for Signature Comparison". Journal of Forensic Sciences. 47 (5): 15521J. ISSN 0022-1198.
  79. Marks, Marilyn (2017-06-14). "Georgia's Voting System, the Internet, and the Meaning of "Is"". Medium. Retrieved 2020-07-30.
  80. Microsoft Security Intelligence Report Volume 11, January-June, 2011.
  81. "The State of USB Drive Security: Study of IT and IT Practitioners". news.bloomberglaw.com. Retrieved 2020-07-30.
  82. Reding, Shawna (2020-07-14). "Texas Secretary of State website fixes technical glitch in runoff election results". KVUE - ABC. Retrieved 2020-07-30.
  83. Cottrill, Clarissa (2018-05-18). "Official results in: Hammer, Redding win judge seats". Journal. Retrieved 2020-07-30.
  84. Cole, Matthew; Esposito, Richard; Biddle, Sam; Grim, Ryan (2017-06-05). "Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election". Retrieved 2020-07-30.
  85. Sherman, Amy (2016-10-19). "Premature posting of election results was mistake, not a crime". Miami Herald. Retrieved 2020-07-30.
  86. Herz, Nathaniel (2018-05-08). "Hackers broke partway into Alaska's election system in 2016. Officials say no damage was done". Anchorage Daily News. Retrieved 2020-07-30.
  87. Newman, Lily Hay (2020-03-16). "'Kill Chain': HBO's Election Security Doc Stresses Urgency". Wired. ISSN 1059-1028. Retrieved 2020-07-30.
  88. "McAfee Research Reveals Election Website Security Shortcomings in 2020 Battleground States". www.mcafee.com. 2020-02-03. Retrieved 2020-07-31.
  89. Gillum, Jack (2020-03-02). "Is your local election website safe? Investigation finds security risks in old systems". Raleigh News & Observer.
  90. "Majority of Election Websites in Battleground States Failing in Cybersecurity". Security Magazine. 2020-02-04. Retrieved 2020-07-31.
  91. "Joint Statement from the Department Of Homeland Security and Office of the Director of National Intelligence on Election Security". Department of Homeland Security. 2016-10-07. Retrieved 2020-07-08.
  92. Brandom, Russell (2016-10-28). "How worried should we be about election hacking?". The Verge. Retrieved 2020-07-08.
  93. Good, Chris (2018-10-31). "When it comes to election cybersecurity, decentralized system is viewed as both blessing and curse". ABC News. Retrieved 2020-07-08.
  94. McManus, Doyle (2019-06-16). "Column: Norway, if you're listening: Feel free to hack our presidential race". Los Angeles Times. Retrieved 2020-07-09.
  95. Blaze, Matt, Harri Hursti , Margaret Macalpine, Mary Hanley, Jeff Moss, Rachel Wehr, Kendal L Spencer, Christopher Ferris (2019-09-26). "DEF CON 27 Voting Machine Hacking Village" (PDF). Defcon. Retrieved 2020-03-11.
  96. Felten, Ed (2010-06-08). "NJ Voting Machines Left Unattended, Despite Court Opinion". Princeton University. Retrieved 2020-07-08.
  97. McDaniel; et al. (2007-12-07). EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing (PDF) (Report). Retrieved 2020-02-05.
  98. "Top-to-Bottom Review". California Secretary of State. Retrieved 2020-07-08.
  99. CA SoS Top to Bottom Review Archived 2014-12-03 at the Wayback Machine Retrieved March 2, 2012
  100. Simons, Barbara. August 13, 2007. "California: The Top to Bottom Review." Archived 2016-02-25 at the Wayback Machine The Voter. Retrieved November 27, 2007.
  101. "Voting Technology Vendors". California Secretary of State. Retrieved 2020-07-08.
  102. Riordan, Theresa. 13 September 2006. "Archived copy". Archived from the original on 2016-03-04. Retrieved 2016-02-08.CS1 maint: archived copy as title (link) Princeton University. Retrieved March 6, 2008.
  103. "State Audit Laws". Verified Voting. Retrieved 2020-07-08.
  104. "Voter views on U.S. election security". Pew Research Center - U.S. Politics & Policy. 2018-10-29. Retrieved 2020-08-05.
  105. Stewart, Charles (2018-03-08). "What does "election hacking" mean to the public?". electionupdates.caltech.edu. Retrieved 2020-08-05.
  106. Tomz, Michael, Jessica L. P. Weeks (August 2019). "Public Opinion and Foreign Electoral Intervention" (PDF). Stanford University. Retrieved 2020-08-04.
  107. "Russia". www.pollingreport.com. May 16–20, 2019. Retrieved 2020-08-05.CS1 maint: date format (link)
  108. Bose, Nandita (2019-10-15). "How Amazon.com moved into the business of U.S. elections". Reuters. Retrieved 2020-07-31.
  109. Heilweil, Rebecca (2 December 2017). "Nine Companies That Want To Revolutionize Voting Technology". Forbes. Retrieved 4 December 2018.
  110. Malone, Claire (July 13, 2018). "What The Latest Mueller Indictment Tells Us About Election Hacking". FiveThirtyEight. The Intercept report was based on National Security Agency documents, which did not directly identify the company but made references to a product made by VR Systems, whose products are used in eight states.
  111. Donovan, Doug (2018-08-07). "Maryland senators ask Treasury panel to investigate Russian oligarch's ties to state election contractor - Baltimore Sun". Baltimore Sun. Retrieved 2020-07-30.
  112. E. G. Arnold, History of Voting Systems in California Archived 2016-03-06 at the Wayback Machine, California Secretary of State Bill Jones, June 1999.
  113. Douglas W. Jones and Barbara Simons, Broken Ballots, CSLI Publications, 2012; see Section 5.2, page 96.
  114. "How E-voting Works". HowStuffWorks. Archived from the original on 2015-07-03.
  115. "Electronic Voting". Archived from the original on 2015-05-06.
  116. "Historical Timeline". Retrieved 2015-02-25.
  117. "Archived copy". Archived from the original on 2015-05-15. Retrieved 2015-05-22.CS1 maint: archived copy as title (link)
  118. "Voter Empowerment Act of 2013 (2013; 113th Congress H.R. 12) - GovTrack.us". GovTrack.us. Archived from the original on 2015-10-18.
  119. Zetter, Kim; Maiberg, Emanuel (2019-03-14). "DARPA Is Building a $10 Million, Open Source, Secure Voting System". Vice. Retrieved 2019-06-01.
  120. "DARPA is trying to build an unhackable open-source voting system". MIT Technology Review. 2019-03-15. Retrieved 2019-06-01.
  121. Robitzski, Dan (2019-03-14). "DARPA is building an open source voting machine". Futurism. Retrieved 2019-06-01.
  122. "Legislative Committee Resolution Awaiting BOD Approval" Archived 2011-07-24 at the Wayback Machine. (July 2004). Information Executive
  123. http://www.aitp.org/newsletter/2004julaug/index.jsp?article=evote.htm Archived September 8, 2004, at the Wayback Machine
  124. http://www.aitp.org/newsletter Archived July 24, 2011, at the Wayback Machine
  125. Padgett, Tim (2007-11-03). "Voting Out E-Voting Machines". TIME. Archived from the original on 2013-08-24. Retrieved 2014-02-06.
  126. "Bill Summary & Status - 110th Congress (2007–2008) - S.2295 - CRS Summary - THOMAS (Library of Congress)". Thomas.loc.gov. 2007-11-01. Archived from the original on 2015-10-18. Retrieved 2014-02-06.
  127. "Archived copy" (PDF). Archived from the original (PDF) on 2008-03-05. Retrieved 2008-03-06.CS1 maint: archived copy as title (link)
  128. "H.R.5036: Emergency Assistance for Secure Elections Act of 2008 - U.S. Congress". OpenCongress. 2008-04-15. Archived from the original on 2012-03-13. Retrieved 2014-02-06.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.