Image by mohamed Hassan from Pixabay
|
Journal of Science Policy & Governance | Volume 17, Issue 01 | September 30, 2020
|
Policy Memo: Securing Election Infrastructure with Hand-Marked Paper Ballots
Varun Gupta, Joel Hypolite, Stephen Mell, Hersh Sanghvi
|
Keywords: voting machines; election security; critical infrastructure; Congress; democracy
Executive Summary: American democracy is critically threatened by the use of insecure voting systems. Many existing electronic voting machines have malfunctioned during recent elections, and many are also vulnerable to hacking (Appel et al. 2019, Blaze et al. 2019, Blaze 2020). Most states have switched to secure, hand-marked paper ballots, but roughly 30% of Americans will continue to vote using vulnerable voting machines in 2020 (Cordova et al. 2019, Bajak 2020). While Congress allocated $380 million in 2018 and $425 million in 2020 to improve election security, these funds were neither targeted at nor sufficient for replacing all electronic voting machines. We propose that Congress (1) allocate $110 million exclusively for transitioning away from electronic voting machines and (2) prohibit the use of federal funds for purchasing voting systems that do not primarily use hand-marked paper ballots. This one-time transition cost is much smaller than even annual expenditures on other critical infrastructure (Copeland 2010; Halderman 2019). Replacing electronic voting machines with hand-marked paper ballots is the most affordable and secure option.
-Read the full article through download.- |
References
- Anthes, Rob. 2019. “Hacked in 7 minutes: questions of vulnerability surround New Jersey’s aging voting machines.” Community News. Published October 31, 2019. https://communitynews.org/2019/10/31/hacked-in-7-minutes/
- Appel, Andrew, Maia Ginsburg, Harri Hursti, Brian Kernighan, Christopher Richards, Gang Tan, Penny Venetis. “The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting Machine.” USENIX Association. Published August 2009. https://www.usenix.org/legacy/events/evtwote09/tech/full_papers/appel.pdf
- Appel, Andrew, Richard DeMillo, and Philip B. Stark. “Ballot-Marking Devices (BMDs) Cannot Assure the Will of the Voters.” SSRN. May 21, 2019. http://dx.doi.org/10.2139/ssrn.3375755
- Axelrod, Tal. “Mississippi officials confirm multiple cases of voting machines changing votes in GOP governor runoff.” The Hill. August 27, 2019. https://thehill.com/policy/cybersecurity/459067-mississippi-officials-confirm-multiple-cases-of-voting-machines-changing
- Bajak, Frank. 2020. “Reliability of Pricey New Voting Machines Questioned”. February 23, 2020. https://www.usnews.com/news/politics/articles/2020-02-23/reliability-of-pricey-new-voting-machines-questioned
- Bernhard, Matthew, Allison McDonald, Henry Meng, Jensen Hwa, Nakul Bajaj, Kevin Chang, and J. Alex Halderman. 2020. “Can Voters Detect Malicious Manipulation of Ballot Marking Devices?” IEEE Symposium on Security and Privacy (Oakland 2020).
- Blaze, Matt, Harri Hursti, Margaret Macalpine, Mary Hanley, Jeff Moss, Rachel Wehr, Kendall Spencer, Christopher Ferris. 2019. “Def Con 27 Voting Machine Hacking Village Report.” Published August 2019. https://media.defcon.org/DEF%20CON%2027/voting-village-report-defcon27.pdf
- Blaze, Matt. “Testimony Before the US House of Representatives Committee on House Administration - Hearing on ‘2020 Election Security – Perspectives from Voting System Vendors and Experts.’” January 9, 2020. https://www.mattblaze.org/papers/blaze-houseadmin-20200109.pdf
- Brennan Center for Justice, Verified Voting. “Federal Funds for Election Security: Will They Cover the Costs of Voter Marked Paper Ballots.” March 23, 2018.
- https://www.brennancenter.org/our-work/research-reports/federal-funds-election-security-will-they-cover-costs-voter-marked-paper
- Gu, Ronghui, Zhong Shao, Hao Chen, Xiongnan Newman Wu, Jieung Kim, Vilhelm Sjöberg, and David Costanzo. "Certikos: An extensible architecture for building certified concurrent {OS} kernels." In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16), pp. 653-669. 2016.
- Copeland, Claudia. 2010. “Terrorism and Security Issues Facing the Water Infrastructure Sector.” CRS Report for Congress. Congressional Research Service. RL32189. December 15, 2010
- Córdova, Andrea, Elizabeth Howard, and Lawrence Norden. 2019. “Voting Machine Security: Where We Stand Six Months Before the New Hampshire Primary.” Brennan Center for Justice. August 13, 2019. https://www.brennancenter.org/our-work/analysis-opinion/voting-machine-security-where-we-stand-six-months-new-hampshire-primary
- Deluzio, Christopher and Kevin Skoglund. “Pennsylvania Counties' New Voting Systems: An Analysis.” August 15, 2019. https://www.cyber.pitt.edu/votingsystemsanalysis.
- DHS Election Security. July 14, 2020. Accessed August 20, 2020. https://www.dhs.gov/topic/election-security
- Fisher, Kathleen, John Launchbury, and Raymond Richards. "The HACMS program: using formal methods to eliminate exploitable bugs." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 375, no. 2104 (2017): 20150401.
- FBI National Press Office. “FBI Announces New Policy for Notifying State and Local Election Officials of Cyber Intrusions Affecting Election Infrastructure.” January 16, 2020. https://www.fbi.gov/news/pressrel/press-releases/fbi-announces-new-policy-for-notifying-state-and-local-election-officials-of-cyber-intrusions-affecting-election-infrastructure
- Gardner, Amy, and Beth Reinhard. “Broken machines, rejected ballots and long lines: voting problems emerge as Americans go to the polls.” November 6, 2018. Washington Post. https://www.washingtonpost.com/politics/broken-machines-rejected-ballots-and-long-lines-voting-problems-emerge-as-americans-go-to-the-polls/2018/11/06/ffd11e52-dfa8-11e8-b3f0-62607289efee_story.html
- Gerwin, Klein, June Andronick, Matthew Fernandez, Ihor Kuz, Toby Murray, and Gernot Heiser. “Formally Verified Software in the Real World.” Communications of the ACM Vol. 61 No. October 10, 2018. https://cacm.acm.org/magazines/2018/10/231372-formally-verified-software-in-the-real-world/abstract
- Grand View Research. “Healthcare Cyber Security Market Size, Analysis Report.” Published April 2016. https://www.grandviewresearch.com/industry-analysis/healthcare-cyber-security-market
- Halderman, J. Alex. “Election Security: Ensuring the Integrity of U.S. Election Systems.” February 27, 2019. Testimony Before Congress. https://jhalderm.com/pub/misc/fsgg-voting-written19.pdf
- H.R. 1625. “Consolidated Appropriations Act, 2018.” 115th Congress. March 28, 2018.
- H.R. 1158. “Consolidated Appropriations Act, 2020.” 116th Congress. December 20, 2019.
- Johnson, Jeh. “Statement by Secretary Jeh Johnson on the Designation of Election Infrastructure as a Critical Infrastructure Subsector.” Department of Homeland Security, January 6, 2017. https://www.dhs.gov/news/2017/01/06/statement-secretary-johnson-designation-election-infrastructure-critical.
- Leroy, Xavier, Sandrine Blazy, Daniel Kästner, Bernhard Schommer, Markus Pister, and Christian Ferdinand. "CompCert-a formally verified optimizing compiler." 2016.
- Lynch, Dylan. “Checking the Election: Risk-Limiting Audits.” National Conference of State Legislatures 27 no. 26 (2019). https://www.ncsl.org/research/elections-and-campaigns/checking-the-election-risk-limiting-audits.aspx.
- National Election Defense Coalition. 2020. “The National Election Defense Coalition Opposes Adopting Ballot Marking Devices as the Primary Method of Voting.” Accessed May 2020 https://www.electiondefense.org/ballot-marking-devices.
- National Academies of Sciences, Engineering, and Medicine. 2018. “Securing the Vote: Protecting American Democracy.” Washington, DC. The National Academies Press, 2018. https://doi.org/10.17226/25120.
- NCSL: National Conference of State Legislatures. 2018. “Voting System Standards, Testing, and Certification.” Accessed August 19, 2020. https://www.ncsl.org/research/elections-and-campaigns/voting-system-standards-testing-and-certification.aspx
- NIST: National Institute of Standards and Technology. “Voting.” Accessed August 19, 2020. https://www.nist.gov/itl/voting
- OMB: Office of Management and Budget. 2020. “A Budget for America's Future, Fiscal Year 2021 Budget of the U.S. Government.” Executive Office of the President. Published January, 2020. Washington D.C. https://www.whitehouse.gov/wp-content/uploads/2020/02/spec_fy21.pdf
- Ottoboni, Kellie and Phillip B. Stark. 2019. “Election Integrity and Electronic Voting Machines in 2018 Georgia, USA.” International Joint Conference on Electronic Voting. September 24, 2019. https://doi.org/10.1007/978-3-030-30625-0_11
- U.S. Election Assistance Commission. “The Impact of HAVA Funding on the 2018 Elections.” Accessed May 31, 2020. https://www.eac.gov/sites/default/files/paymentgrants/TheImpactofHAVAFundingonthe2018Elections_EAC.pdf.
- U.S. House of Representatives. Joint Explanatory Statement Accompanying H. R. 1158. https://docs.house.gov/billsthisweek/20191216/BILLS-116HR1158SA-JES-DIVISION-C.pdf
- Verified Voting. “Policy on Direct Recording Electronic Voting Machines and Ballot Marking Devices.” Accessed July 23, 2020. https://www.verifiedvoting.org/wp-content/uploads/2019/08/VV-BMD-Policy-V3-LARGE.pdf
- Verified Voting. “Verifier.” Accessed April 3, 2020. https://www.verifiedvoting.org/verifier
- Zetter, Kim. 2018. “Texas Voting Machines Have Been ‘a Known Problem’ for a Decade.” VICE Motherboard. October 30, 2018. https://www.vice.com/en_us/article/negayg/texas-voting-machines-have-been-a-known-problem-for-a-decade
- Zpryme. 2013. “Global Smart Grid Cybersecurity Systems Market Value (2012 – 2020).” Published April 16, 2013. https://zpryme.com/reports/global-smart-grid-cybersecurity-systems-market-value-2012-2020/
Varun Gupta is a Ph.D. student in Computer Science at the University of Pennsylvania. He is interested in machine learning and technology policy.
Joel Hypolite is a Ph.D. candidate in Computer Science at the University of Pennsylvania. He received his BS in Computer Science from the University of Notre Dame. His research interests are broadly in the areas of networking, security, and artificial intelligence.
Stephen Mell is a Ph.D. student in Computer Science at the University of Pennsylvania. He received his Bachelor of Arts in Mathematics at Washington University in St. Louis. His research interests lie at intersection between computational learning and formal logic.
Hersh Sanghvi is a Ph.D. student in Computer Science at the University of Pennsylvania. He received his B.S in Electrical and Computer Engineering from the University of California, Berkeley in 2019. His research interests lie in the areas of robotic perception and control.
Joel Hypolite is a Ph.D. candidate in Computer Science at the University of Pennsylvania. He received his BS in Computer Science from the University of Notre Dame. His research interests are broadly in the areas of networking, security, and artificial intelligence.
Stephen Mell is a Ph.D. student in Computer Science at the University of Pennsylvania. He received his Bachelor of Arts in Mathematics at Washington University in St. Louis. His research interests lie at intersection between computational learning and formal logic.
Hersh Sanghvi is a Ph.D. student in Computer Science at the University of Pennsylvania. He received his B.S in Electrical and Computer Engineering from the University of California, Berkeley in 2019. His research interests lie in the areas of robotic perception and control.
DISCLAIMER: The findings and conclusions published herein are solely attributed to the author and not necessarily endorsed or adopted by the Journal of Science Policy and Governance. Articles are distributed in compliance with copyright and trademark agreements.
ISSN 2372-2193
ISSN 2372-2193