[go: up one dir, main page]

Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

Election Technology Risks
Election Technology Risks
Election Technology Risks
Ebook175 pages2 hours

Election Technology Risks

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Election Technology Risks explores the increasing vulnerabilities in today's digital elections and their potential impact on democracy. It examines how technology, while intended to enhance elections, can inadvertently create new avenues for manipulation. The book focuses on electronic voting machine security, ballot protection, and the resilience of election infrastructure against cyberattacks, areas crucial for maintaining public trust and ensuring accurate election outcomes.



Did you know that even seemingly minor vulnerabilities in voting machine software or ballot handling can be exploited? The book uniquely analyzes the convergence of physical ballot handling with digital records.



This book progresses logically, beginning with the evolution of election technology and delving into specific risks like DDoS attacks and vulnerabilities in voting machine software. It provides actionable strategies and policy recommendations, making it distinctively pragmatic. Election Technology Risks is accessible to a broad audience, including policymakers, election officials, and concerned citizens, offering valuable insights into safeguarding election integrity in the digital age.

LanguageEnglish
PublisherPublifye
Release dateFeb 15, 2025
ISBN9788233963910
Election Technology Risks

Read more from Isaac Berners Lee

Related to Election Technology Risks

Related ebooks

Politics For You

View More

Related categories

Reviews for Election Technology Risks

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Election Technology Risks - Isaac Berners-Lee

    A History of Election Technology: From Levers to Networks

    Imagine casting your vote not with a pen, a punch card, or a touchscreen, but with a literal lever. For much of election history, the tools of democracy were far simpler – and often, far more fallible – than the complex systems we rely on today. This chapter delves into the captivating evolution of election technology, tracing its path from mechanical marvels to the intricate digital networks that now underpin our electoral processes. Understanding this history is crucial: it illuminates the motivations behind technological shifts, underscores recurring concerns about security and access, and provides vital context for navigating the challenges and opportunities of modern election technology.

    We'll explore the era of levers and gears, the rise of punch card systems, the promise and pitfalls of electronic voting machines, and the increasingly important role of the internet, databases, and cybersecurity. Each technological leap forward has been driven by the desire for increased efficiency, greater accuracy, and reduced opportunities for fraud. Yet, as we will see, innovation often brings unforeseen consequences, creating new vulnerabilities that must be addressed to maintain the integrity of our democratic systems.

    The Mechanical Age: Levers, Gears, and the Dawn of Automation

    Before the advent of electricity and computers, voting was a largely manual process often fraught with opportunities for manipulation. Early voting methods, like voice voting (where voters publicly declared their choice) or paper ballots marked in public spaces, were susceptible to intimidation, bribery, and outright fraud. The need for a more private and reliable system drove the development of mechanical voting machines.

    The first patented voting machine in the United States was created by Joseph Myers in 1868, though it was never actually used in an election. These early machines were conceived as a way to reduce the tedious task of counting paper ballots and to minimize human error. The most successful and widely adopted design was the lever voting machine. Patented in 1892 by Jacob Myers (no relation to Joseph), these machines dominated American elections for much of the 20th century.

    Lever machines were imposing devices, often made of cast iron and featuring a curtain that closed behind the voter to ensure privacy. A series of levers, one for each candidate or proposition, allowed voters to make their selections. Once the voter had made their choices, pulling a master lever registered the votes and opened the curtain. At the end of the election, poll workers opened the machine and read the vote totals directly from mechanical counters.

    The advantages of lever machines were numerous: they were relatively tamper-proof (though not entirely immune, as we'll discuss), provided a physical record of the votes, and were faster than hand-counting paper ballots. They also offered a degree of voter education, as the candidate names and party affiliations were clearly displayed on the machine itself.

    Did You Know? Some lever machines were used for over 100 years! New York finally retired its last lever machines in 2010, after using them since the 1890s.

    However, lever machines were not without their drawbacks. They were expensive to purchase and maintain, heavy to transport, and required specialized training for poll workers. Furthermore, while they minimized certain types of fraud, they were still vulnerable to tampering. A determined individual could, in theory, manipulate the mechanical counters or jam the levers to prevent votes from being cast.

    Moreover, lever machines could be confusing for some voters, particularly those with visual impairments or limited English proficiency. While efforts were made to provide assistance, the lack of accessibility features was a significant concern. Despite these limitations the lever machine represented a significant step forward in election technology, bringing a level of automation and standardization to the voting process that had previously been absent.

    The Punch Card Era: A Hole in Democracy?

    As technology advanced, the quest for even more efficient and accurate voting methods continued. The punch card system emerged as a popular alternative to lever machines, particularly in larger jurisdictions with growing populations. The basic concept was simple: voters received a card with pre-printed candidate names and propositions, and they used a stylus to punch a hole corresponding to their desired choice. The cards were then fed into a tabulating machine, which counted the votes based on the location of the punched holes.

    The advantages of punch card systems were clear: they were relatively inexpensive, easy to use (in theory), and allowed for faster tabulation than manual counting. They also offered a degree of flexibility, as the cards could be easily customized for different elections and jurisdictions.

    However, the punch card era was plagued by problems, most notably the infamous hanging chad. A hanging chad occurred when a voter did not fully punch out the perforated section of the card, leaving a small piece of paper still attached. Tabulating machines often struggled to read these partially punched cards, leading to inaccurate vote counts. In some cases, election officials had to manually inspect and interpret the ambiguous marks, introducing the potential for human error and subjective judgment.

    The 2000 presidential election in Florida brought the vulnerabilities of punch card systems to the forefront. The close margin between George W. Bush and Al Gore led to a recount in several counties that used punch card machines. Images of election officials squinting at hanging chads, dimpled chads, and pregnant chads became iconic symbols of the election's uncertainty and the flaws in the technology.

    The controversy surrounding the 2000 election exposed the deep-seated problems with punch card systems and highlighted the urgent need for election reform. The Help America Vote Act (HAVA) of 2002 was passed in response, providing federal funding to states to replace outdated voting equipment and improve election administration. HAVA effectively marked the end of the punch card era, paving the way for the widespread adoption of electronic voting machines.

    Did You Know? The term chad comes from the British word for bits of paper left over from punching holes.

    The Digital Frontier: Electronic Voting Machines and Beyond

    The promise of electronic voting machines (EVMs) was alluring: greater accuracy, faster tabulation, and improved accessibility. EVMs came in various forms, including direct-recording electronic (DRE) machines with touchscreens or buttons, and optical scan systems where voters marked paper ballots that were then scanned and tabulated by a computer.

    DRE machines offered several advantages over previous systems. They eliminated the need for paper ballots and manual counting, reduced the risk of hanging chads and other similar errors, and provided a more user-friendly interface for voters. Many DREs also included accessibility features, such as audio ballots and tactile keypads, to assist voters with disabilities.

    However, DREs also introduced new security concerns. Because they recorded votes electronically, there was no physical paper trail to verify the accuracy of the results. Critics argued that DREs were vulnerable to hacking, software glitches, and other forms of manipulation. The lack of a paper trail made it difficult to conduct meaningful audits or recounts, raising questions about the transparency and verifiability of the election results.

    Optical scan systems emerged as a popular alternative, offering a compromise between the convenience of electronic tabulation and the security of paper ballots. In this system, voters mark their choices on a paper ballot, which is then fed into an optical scanner that counts the votes. The paper ballots provide a physical record that can be used for audits and recounts, while the electronic tabulation speeds up the counting process.

    Despite their advantages, optical scan systems are not without their own vulnerabilities. The scanners themselves can be susceptible to errors or manipulation, and the paper ballots can be damaged or lost. Furthermore, the design of the ballot can influence voter behavior, potentially leading to unintentional errors or biases.

    The introduction of electronic voting machines also raised concerns about the security of the software and hardware used to run the elections. Many EVMs rely on proprietary software, which is often not subject to public scrutiny. This lack of transparency makes it difficult to assess the security of the machines and to identify potential vulnerabilities. Additionally, the use of electronic voting machines requires robust security measures to protect against hacking, malware, and other cyberattacks.

    Did You Know? Some electronic voting machines were found to be running on outdated operating systems, like Windows XP, long after those systems were no longer supported by Microsoft, making them vulnerable to known security exploits.

    The Networked Age: The Internet, Databases, and Cybersecurity Challenges

    The evolution of election technology has not stopped with electronic voting machines. The internet, databases, and other digital technologies are now playing an increasingly important role in all aspects of the electoral process, from voter registration and election administration to campaign finance and voter outreach.

    Online voter registration has become increasingly popular, making it easier for citizens to register to vote and update their registration information. Many states now allow voters to register online through a secure website, which can streamline the registration process and reduce the potential for errors.

    Election administration also relies heavily on digital technologies. Voter databases are used to manage voter registration information, track voter turnout, and generate voter lists. Election websites provide information about candidates, ballot measures, polling locations, and election results. Electronic poll books are used to check in voters at polling places, replacing the traditional paper-based system.

    The use of these technologies has brought numerous benefits, including increased efficiency, improved accuracy, and enhanced accessibility. However, it has also created new security challenges. Voter databases are a prime target for hackers, who could potentially use stolen voter information to commit voter fraud or disrupt the election. Election websites can be vulnerable to denial-of-service attacks or malware infections. Electronic poll books can be compromised by hackers or software glitches.

    The rise of social media has also had a profound impact on elections. Candidates and campaigns use social media platforms to reach voters, share information, and mobilize supporters. However, social media has also become a breeding ground for misinformation, disinformation, and foreign interference. The spread of fake news and propaganda can undermine public trust in the electoral process and influence voter behavior.

    The 2016 presidential election brought the issue of foreign interference in elections to the forefront. U.S. intelligence agencies concluded that Russia had engaged in a coordinated effort to influence the election, including hacking into Democratic Party email accounts, spreading disinformation on social media, and attempting to compromise state election systems. This interference highlighted the vulnerability of our election infrastructure to cyberattacks and the need for stronger security measures.

    Did You Know? A report by the Senate Intelligence Committee found that Russian hackers targeted election systems in all 50 states in 2016.

    In response to these challenges, election officials, cybersecurity experts, and policymakers are working to strengthen the security of our election infrastructure and protect against foreign interference. Efforts include implementing stronger cybersecurity measures, conducting regular audits of election systems, improving voter registration databases, combating disinformation

    Enjoying the preview?
    Page 1 of 1