About this ebook
Election Technology Risks explores the increasing vulnerabilities in today's digital elections and their potential impact on democracy. It examines how technology, while intended to enhance elections, can inadvertently create new avenues for manipulation. The book focuses on electronic voting machine security, ballot protection, and the resilience of election infrastructure against cyberattacks, areas crucial for maintaining public trust and ensuring accurate election outcomes.
Did you know that even seemingly minor vulnerabilities in voting machine software or ballot handling can be exploited? The book uniquely analyzes the convergence of physical ballot handling with digital records.
This book progresses logically, beginning with the evolution of election technology and delving into specific risks like DDoS attacks and vulnerabilities in voting machine software. It provides actionable strategies and policy recommendations, making it distinctively pragmatic. Election Technology Risks is accessible to a broad audience, including policymakers, election officials, and concerned citizens, offering valuable insights into safeguarding election integrity in the digital age.
Read more from Isaac Berners Lee
Frog vs Toad Rating: 0 out of 5 stars0 ratingsDesktop Vs Laptop Rating: 0 out of 5 stars0 ratingsFastest Trains Rating: 0 out of 5 stars0 ratingsRISC vs CISC Rating: 0 out of 5 stars0 ratingsDIY PC Building Rating: 0 out of 5 stars0 ratingsSmart Wearables Rating: 0 out of 5 stars0 ratingsSmartphone Era Rating: 0 out of 5 stars0 ratingsCommunication Essentials Rating: 0 out of 5 stars0 ratingsGlider Origins Rating: 0 out of 5 stars0 ratingsUpgrading Old PCs Rating: 0 out of 5 stars0 ratingsE-Readers vs Tablets Rating: 0 out of 5 stars0 ratingsThe Lighthouse Code Rating: 0 out of 5 stars0 ratingsRetro Hardware Revival Rating: 0 out of 5 stars0 ratingsMatrix The Movie Rating: 0 out of 5 stars0 ratingsAmiga The Computer Rating: 0 out of 5 stars0 ratingsTechnology Facts Rating: 0 out of 5 stars0 ratingsLaptop Cleaning Basics Rating: 0 out of 5 stars0 ratingsFacebook vs TikTok Rating: 0 out of 5 stars0 ratingsCounter Strike History Rating: 0 out of 5 stars0 ratingsCustom Gaming Builds Rating: 0 out of 5 stars0 ratingsCloud vs Edge Rating: 0 out of 5 stars0 ratingsEmbrace Future Tech Rating: 0 out of 5 stars0 ratingsTesla vs Toyota Rating: 0 out of 5 stars0 ratingsNomadic Tiny Challenges Rating: 0 out of 5 stars0 ratingsLocks And Secrets Rating: 0 out of 5 stars0 ratingsSteepest Mountains Rating: 0 out of 5 stars0 ratingsHome Sound Control Rating: 0 out of 5 stars0 ratingsTim Cook's Leadership Rating: 0 out of 5 stars0 ratingsSubway Facts Rating: 0 out of 5 stars0 ratingsBridge Engineering Rating: 0 out of 5 stars0 ratings
Related to Election Technology Risks
Related ebooks
Electronic Voting: Digitizing Democracy, Secure Solutions for Modern Elections Rating: 0 out of 5 stars0 ratingsInsiders' Guide to Technology-Assisted Review (TAR) Rating: 0 out of 5 stars0 ratingsNavigating the Digital Landscape: Fundamentals, Cybersecurity, Emerging Technologies, and Applications Rating: 0 out of 5 stars0 ratingsWhat You Should Know About Cybersecurity Rating: 0 out of 5 stars0 ratingsComputer Forensics: A Pocket Guide Rating: 4 out of 5 stars4/5The Prepper's Guide to the Digital Age: Escape, Evasion, and Survival Rating: 0 out of 5 stars0 ratingsThe Future is Now: Embracing Technology and Innovation Rating: 0 out of 5 stars0 ratingsNavigating Emerging Tech Ethics: 1A, #1 Rating: 0 out of 5 stars0 ratingsDigital Dilemmas: Navigating Ethics in the Age of AI and Surveillance Rating: 0 out of 5 stars0 ratingsDark Web Privacy Rating: 0 out of 5 stars0 ratingsThe Future Code Rating: 0 out of 5 stars0 ratingsInformation Security In Health Systems Rating: 0 out of 5 stars0 ratingsSafeguarding the Digital Fortress: A Guide to Cyber Security: The IT Collection Rating: 0 out of 5 stars0 ratingsSuperintelligence on the Horizon Steering the Course of Cybersecurity Rating: 0 out of 5 stars0 ratingsSecurity and Cyber Laws Digital Defenders Rating: 0 out of 5 stars0 ratingsThe Digital Shield: AI in Cyber Defense Rating: 0 out of 5 stars0 ratingsCarry On: Sound Advice from Schneier on Security Rating: 4 out of 5 stars4/5Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States Rating: 0 out of 5 stars0 ratingsElectronic Surveillance Rating: 0 out of 5 stars0 ratingsAI and ML Applications for Decision-Making in Zero Trust Cyber Security Rating: 0 out of 5 stars0 ratingsSecure Your Internet Use Rating: 0 out of 5 stars0 ratingsCybersecurity - Data Protection and Strategies: First Edition Rating: 0 out of 5 stars0 ratingsThe Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices Rating: 0 out of 5 stars0 ratingsIT Security Concepts Rating: 5 out of 5 stars5/5IT Security Concepts: 1, #1 Rating: 5 out of 5 stars5/5Cybersecurity and Infrastructure Protection Rating: 0 out of 5 stars0 ratingsMonitoring and Surveillance Agents: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsDigital Privacy Literacy Rating: 0 out of 5 stars0 ratingsTech Industry Risks Rating: 0 out of 5 stars0 ratings
Politics For You
The Cult of Trump: A Leading Cult Expert Explains How the President Uses Mind Control Rating: 3 out of 5 stars3/5How to Hide an Empire: A History of the Greater United States Rating: 4 out of 5 stars4/5Government Gangsters: The Deep State, the Truth, and the Battle for Our Democracy Rating: 4 out of 5 stars4/5On Tyranny: Twenty Lessons from the Twentieth Century Rating: 4 out of 5 stars4/5A People's History of the United States Rating: 4 out of 5 stars4/5Capitalism and Freedom Rating: 4 out of 5 stars4/5The Real Anthony Fauci: Bill Gates, Big Pharma, and the Global War on Democracy and Public Health Rating: 4 out of 5 stars4/5The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government Rating: 5 out of 5 stars5/5The Parasitic Mind: How Infectious Ideas Are Killing Common Sense Rating: 4 out of 5 stars4/5Unhumans: The Secret History of Communist Revolutions (and How to Crush Them) Rating: 4 out of 5 stars4/5The Madness of Crowds: Gender, Race and Identity Rating: 4 out of 5 stars4/5Closing of the American Mind Rating: 4 out of 5 stars4/5The U.S. Constitution with The Declaration of Independence and The Articles of Confederation Rating: 4 out of 5 stars4/5The Republic by Plato Rating: 4 out of 5 stars4/5Fear: Trump in the White House Rating: 4 out of 5 stars4/5The Souls of Black Folk: Original Classic Edition Rating: 4 out of 5 stars4/5Daily Stoic: A Daily Journal On Meditation, Stoicism, Wisdom and Philosophy to Improve Your Life Rating: 5 out of 5 stars5/5Son of Hamas: A Gripping Account of Terror, Betrayal, Political Intrigue, and Unthinkable Choices Rating: 4 out of 5 stars4/5Follow the Money: The Shocking Deep State Connections of the Anti-Trump Cabal Rating: 4 out of 5 stars4/5How to Be an Antiracist Rating: 4 out of 5 stars4/5The Strange Death of Europe: Immigration, Identity, Islam Rating: 4 out of 5 stars4/5On Palestine Rating: 4 out of 5 stars4/5The Spook Who Sat by the Door Rating: 4 out of 5 stars4/5This Is How They Tell Me the World Ends: The Cyberweapons Arms Race Rating: 4 out of 5 stars4/5Controversial Essays Rating: 4 out of 5 stars4/5The Gulag Archipelago [Volume 1]: An Experiment in Literary Investigation Rating: 4 out of 5 stars4/5Nuclear War: A Scenario Rating: 4 out of 5 stars4/5
Related categories
Reviews for Election Technology Risks
0 ratings0 reviews
Book preview
Election Technology Risks - Isaac Berners-Lee
A History of Election Technology: From Levers to Networks
Imagine casting your vote not with a pen, a punch card, or a touchscreen, but with a literal lever. For much of election history, the tools of democracy were far simpler – and often, far more fallible – than the complex systems we rely on today. This chapter delves into the captivating evolution of election technology, tracing its path from mechanical marvels to the intricate digital networks that now underpin our electoral processes. Understanding this history is crucial: it illuminates the motivations behind technological shifts, underscores recurring concerns about security and access, and provides vital context for navigating the challenges and opportunities of modern election technology.
We'll explore the era of levers and gears, the rise of punch card systems, the promise and pitfalls of electronic voting machines, and the increasingly important role of the internet, databases, and cybersecurity. Each technological leap forward has been driven by the desire for increased efficiency, greater accuracy, and reduced opportunities for fraud. Yet, as we will see, innovation often brings unforeseen consequences, creating new vulnerabilities that must be addressed to maintain the integrity of our democratic systems.
The Mechanical Age: Levers, Gears, and the Dawn of Automation
Before the advent of electricity and computers, voting was a largely manual process often fraught with opportunities for manipulation. Early voting methods, like voice voting (where voters publicly declared their choice) or paper ballots marked in public spaces, were susceptible to intimidation, bribery, and outright fraud. The need for a more private and reliable system drove the development of mechanical voting machines.
The first patented voting machine in the United States was created by Joseph Myers in 1868, though it was never actually used in an election. These early machines were conceived as a way to reduce the tedious task of counting paper ballots and to minimize human error. The most successful and widely adopted design was the lever voting machine. Patented in 1892 by Jacob Myers (no relation to Joseph), these machines dominated American elections for much of the 20th century.
Lever machines were imposing devices, often made of cast iron and featuring a curtain that closed behind the voter to ensure privacy. A series of levers, one for each candidate or proposition, allowed voters to make their selections. Once the voter had made their choices, pulling a master lever registered the votes and opened the curtain. At the end of the election, poll workers opened the machine and read the vote totals directly from mechanical counters.
The advantages of lever machines were numerous: they were relatively tamper-proof (though not entirely immune, as we'll discuss), provided a physical record of the votes, and were faster than hand-counting paper ballots. They also offered a degree of voter education, as the candidate names and party affiliations were clearly displayed on the machine itself.
Did You Know? Some lever machines were used for over 100 years! New York finally retired its last lever machines in 2010, after using them since the 1890s.
However, lever machines were not without their drawbacks. They were expensive to purchase and maintain, heavy to transport, and required specialized training for poll workers. Furthermore, while they minimized certain types of fraud, they were still vulnerable to tampering. A determined individual could, in theory, manipulate the mechanical counters or jam the levers to prevent votes from being cast.
Moreover, lever machines could be confusing for some voters, particularly those with visual impairments or limited English proficiency. While efforts were made to provide assistance, the lack of accessibility features was a significant concern. Despite these limitations the lever machine represented a significant step forward in election technology, bringing a level of automation and standardization to the voting process that had previously been absent.
The Punch Card Era: A Hole in Democracy?
As technology advanced, the quest for even more efficient and accurate voting methods continued. The punch card system emerged as a popular alternative to lever machines, particularly in larger jurisdictions with growing populations. The basic concept was simple: voters received a card with pre-printed candidate names and propositions, and they used a stylus to punch a hole corresponding to their desired choice. The cards were then fed into a tabulating machine, which counted the votes based on the location of the punched holes.
The advantages of punch card systems were clear: they were relatively inexpensive, easy to use (in theory), and allowed for faster tabulation than manual counting. They also offered a degree of flexibility, as the cards could be easily customized for different elections and jurisdictions.
However, the punch card era was plagued by problems, most notably the infamous hanging chad.
A hanging chad occurred when a voter did not fully punch out the perforated section of the card, leaving a small piece of paper still attached. Tabulating machines often struggled to read these partially punched cards, leading to inaccurate vote counts. In some cases, election officials had to manually inspect and interpret the ambiguous marks, introducing the potential for human error and subjective judgment.
The 2000 presidential election in Florida brought the vulnerabilities of punch card systems to the forefront. The close margin between George W. Bush and Al Gore led to a recount in several counties that used punch card machines. Images of election officials squinting at hanging chads,
dimpled chads,
and pregnant chads
became iconic symbols of the election's uncertainty and the flaws in the technology.
The controversy surrounding the 2000 election exposed the deep-seated problems with punch card systems and highlighted the urgent need for election reform. The Help America Vote Act (HAVA) of 2002 was passed in response, providing federal funding to states to replace outdated voting equipment and improve election administration. HAVA effectively marked the end of the punch card era, paving the way for the widespread adoption of electronic voting machines.
Did You Know? The term chad
comes from the British word for bits of paper left over from punching holes.
The Digital Frontier: Electronic Voting Machines and Beyond
The promise of electronic voting machines (EVMs) was alluring: greater accuracy, faster tabulation, and improved accessibility. EVMs came in various forms, including direct-recording electronic (DRE) machines with touchscreens or buttons, and optical scan systems where voters marked paper ballots that were then scanned and tabulated by a computer.
DRE machines offered several advantages over previous systems. They eliminated the need for paper ballots and manual counting, reduced the risk of hanging chads
and other similar errors, and provided a more user-friendly interface for voters. Many DREs also included accessibility features, such as audio ballots and tactile keypads, to assist voters with disabilities.
However, DREs also introduced new security concerns. Because they recorded votes electronically, there was no physical paper trail to verify the accuracy of the results. Critics argued that DREs were vulnerable to hacking, software glitches, and other forms of manipulation. The lack of a paper trail made it difficult to conduct meaningful audits or recounts, raising questions about the transparency and verifiability of the election results.
Optical scan systems emerged as a popular alternative, offering a compromise between the convenience of electronic tabulation and the security of paper ballots. In this system, voters mark their choices on a paper ballot, which is then fed into an optical scanner that counts the votes. The paper ballots provide a physical record that can be used for audits and recounts, while the electronic tabulation speeds up the counting process.
Despite their advantages, optical scan systems are not without their own vulnerabilities. The scanners themselves can be susceptible to errors or manipulation, and the paper ballots can be damaged or lost. Furthermore, the design of the ballot can influence voter behavior, potentially leading to unintentional errors or biases.
The introduction of electronic voting machines also raised concerns about the security of the software and hardware used to run the elections. Many EVMs rely on proprietary software, which is often not subject to public scrutiny. This lack of transparency makes it difficult to assess the security of the machines and to identify potential vulnerabilities. Additionally, the use of electronic voting machines requires robust security measures to protect against hacking, malware, and other cyberattacks.
Did You Know? Some electronic voting machines were found to be running on outdated operating systems, like Windows XP, long after those systems were no longer supported by Microsoft, making them vulnerable to known security exploits.
The Networked Age: The Internet, Databases, and Cybersecurity Challenges
The evolution of election technology has not stopped with electronic voting machines. The internet, databases, and other digital technologies are now playing an increasingly important role in all aspects of the electoral process, from voter registration and election administration to campaign finance and voter outreach.
Online voter registration has become increasingly popular, making it easier for citizens to register to vote and update their registration information. Many states now allow voters to register online through a secure website, which can streamline the registration process and reduce the potential for errors.
Election administration also relies heavily on digital technologies. Voter databases are used to manage voter registration information, track voter turnout, and generate voter lists. Election websites provide information about candidates, ballot measures, polling locations, and election results. Electronic poll books are used to check in voters at polling places, replacing the traditional paper-based system.
The use of these technologies has brought numerous benefits, including increased efficiency, improved accuracy, and enhanced accessibility. However, it has also created new security challenges. Voter databases are a prime target for hackers, who could potentially use stolen voter information to commit voter fraud or disrupt the election. Election websites can be vulnerable to denial-of-service attacks or malware infections. Electronic poll books can be compromised by hackers or software glitches.
The rise of social media has also had a profound impact on elections. Candidates and campaigns use social media platforms to reach voters, share information, and mobilize supporters. However, social media has also become a breeding ground for misinformation, disinformation, and foreign interference. The spread of fake news and propaganda can undermine public trust in the electoral process and influence voter behavior.
The 2016 presidential election brought the issue of foreign interference in elections to the forefront. U.S. intelligence agencies concluded that Russia had engaged in a coordinated effort to influence the election, including hacking into Democratic Party email accounts, spreading disinformation on social media, and attempting to compromise state election systems. This interference highlighted the vulnerability of our election infrastructure to cyberattacks and the need for stronger security measures.
Did You Know? A report by the Senate Intelligence Committee found that Russian hackers targeted election systems in all 50 states in 2016.
In response to these challenges, election officials, cybersecurity experts, and policymakers are working to strengthen the security of our election infrastructure and protect against foreign interference. Efforts include implementing stronger cybersecurity measures, conducting regular audits of election systems, improving voter registration databases, combating disinformation