Media Release: What Would an Attack on the U.S. Elections Look Like?

Election Experts to Discuss How Hackers Might Target Voter Rolls, Registration in the 2018 Elections, What Signs to Look For and How to Respond. For more information, please contact Aurora Matthews, aurora@newheightscommunications.com, (301)-221-7984.

What
Press call to discuss election day security preparedness and “What Would a 2018 Election Hack Look Like?”

When
Monday, October 15, 2018, 1pm EDT

Where
Dial-in number: 408-638-0968;
Meeting ID: 363 129 912
Webinar link: https://zoom.us/j/363129912

Verified Voting, the Brennan Center for Justice at NYU Law School and Public Citizen will hold a telepresser and webinar on Monday, October 15 to discuss what a hacking of the 2018 election system might look like. Hackers have different avenues they could take either by altering voter registration rolls, disrupting websites or changing vote counts. Detecting an attack might be obvious, such as disappearing votes, or subtle, like voting tallies not matching exit polls.

Verified Voting Blog: David Jefferson: The Myth of “Secure” Blockchain Voting

Click here to download a pdf version of this blog

In the last couple of years several startup companies have begun to promote Internet voting systems, this time with a new twist – using a blockchain as the container for voted ballots transmitted from voters’ private devices. Blockchains are a relatively new system category somewhat akin to a distributed database. Proponents promote them as a revolutionary innovation providing strong security guarantees that can render online elections safe from cyberattack.

Unfortunately, such claims are false. Although the subject of considerable hype, blockchains do not offer any real security from cyberattacks. Like other online elections architectures, a blockchain election is vulnerable to a long list of threats that would leave it exposed to hacking and manipulation by anyone on the Internet, and the attack might never be detected or corrected.

In its recent report, “Securing the Vote – Protecting American Democracy” the National Academy of Sciences summarized its findings:

Conducting secure and credible Internet elections will require substantial scientific advances.

The use of blockchains in an election scenario would do little to address the major security requirements of voting, such as voter verifiability. The security contributions offered by blockchains are better obtained by other means. In the particular case of Internet voting, blockchain methods do not redress the security issues associated with Internet voting.

In this short paper we attempt to explain why blockchains cannot deliver the security guarantees required for safe online elections. But the summary is simple: Most of the serious vulnerabilities threaten the integrity and secrecy of voting before the ballots ever reach the blockchain.

Media Release: Wisconsin Proves It’s Not Too Late for States to Take Key Election Security Steps Before November

Nearly 20 U.S. States Do Not Audit Election Results by Checking Paper Ballots Against Machine Counts or Lack a Paper Ballot to Conduct Effective Audits

WASHINGTON, D.C. – Wisconsin’s action last week requiring a post-election audit will help secure the November vote and should be followed by states that lack such protections, according to Public Citizen and Verified Voting.

On Tuesday, the Wisconsin Election Commission (WEC) took a key step to secure the vote by requiring an audit of November’s election results before they are made official. The commission voted to randomly select five percent of voting machines in the state to be audited the day after the 2018 general election. For the audit, municipal clerks will hand count ballots from randomly selected machines, comparing what’s on the paper ballot to what the machine recorded. They will do this across four races before the vote count is finalized. (See WEC meeting minutes pages 34 and 49.)

Wisconsin’s action shows that it’s not too late to commit to auditing the 2018 vote counts before finalizing results, Public Citizen and Verified Voting said. Votes can – and should – be checked against voter-marked paper ballots for accuracy.

Verified Voting Blog: Verified Voting Testimony before the Pennsylvania Senate State Government Committee

Written Testimony of Verified Voting.org President Marian K. Schneider before the Pennsylvania Senate State Government Committee Public Hearing on Senate Bill 1249 and Voting Machine Demonstration, September 25, 2018. Download as PDF.

Thank you Chairman Folmer, Minority Chair Williams, and members of the Committee for allowing Verified Voting to submit written testimony in connection with the Senate State Government Committee hearing. We write to address the security risks presented for Pennsylvania’s counties and the need to expeditiously replace aging and vulnerable electronic voting systems. We urge the Committee to recommend that the Commonwealth appropriate adequate funding to permit counties to replace their aging electronic voting systems as soon as possible.

Verified Voting is a national non-partisan, non-profit research and advocacy organization committed to safeguarding elections in the digital age. Founded by computer scientists, Verified Voting’s mission is to advocate for the responsible use of emerging technologies to ensure that Americans can be confident their votes will be cast as intended and counted as cast. We promote auditable, accessible and resilient voting for all eligible citizens. Our board of directors and board of advisors include some of the top computer scientists, cyber security experts and statisticians working in the election administration arena as well as former and current elections officials. Verified Voting has no financial interest in the type of equipment used. Our goal is for every jurisdiction in the United States to have secure and verifiable elections.

There are two basic kinds of electronic voting systems in use in Pennsylvania: Direct recording electronic (DRE) or optical scan systems. Both types of systems are computers, and both are prepared in similar ways. The primary difference is that an optical scan system incorporates a voter-marked paper ballot, marked either with a pen or pencil or with a ballot marking device and that ballot is retained for recounts or audits. Optical scan systems leverage the speed of the computer to report unofficial results quickly. The presence and availability of that paper ballot provides a trustworthy record of voter intent and allows jurisdictions to monitor their system for problems, detect any problems, (either hacking or error), respond to them and recover by, if necessary, hand counting the paper ballots. Seventeen counties in Pennsylvania already benefit from the security protection of paper ballots.

Verified Voting Blog: Serious design flaw in ESS ExpressVote touchscreen: “permission to cheat” | Andrew Appel

This article was originally posted at the Freedom to Tinker blog.

Kansas, Delaware, and New Jersey are in the process of purchasing voting machines with a serious design flaw, and they should reconsider while there is still time!

Over the past 15 years, almost all the states have moved away from paperless touchscreen voting systems (DREs) to optical-scan paper ballots.  They’ve done so because if a paperless touchscreen is hacked to give fraudulent results, there’s no way to know and no way to correct; but if an optical scanner were hacked to give fraudulent results, the fraud could be detected by a random audit of the paper ballots that the voters actually marked, and corrected by a recount of those paper ballots.

Optical-scan ballots marked by the voters are the most straightforward way to make sure that the computers are not manipulating the vote.  Second-best, in my opinion, is the use of a ballot-marking device (BMD), where the voter uses a touchscreen to choose candidates, then the touchscreen prints out an optical-scan ballot that the voter can then deposit in a ballot box or into an optical scanner.  Why is this second-best?  Because (1) most voters are not very good at inspecting their computer-marked ballot carefully, so hacked BMDs could change some choices and the voter might not notice, or might notice and think it’s the voter’s own error; and (2) the dispute-resolution mechanism is unclear; pollworkers can’t tell if it’s the machine’s fault or your fault; at best you raise your hand and get a new ballot, try again, and this time the machine “knows” not to cheat.

Verified Voting Blog: Four ways to defend democracy and protect every voter’s ballot | Douglas W. Jones

This article was originally posted at phys.org.
As voters prepare to cast their ballots in the November midterm elections, it’s clear that U.S. voting is under electronic attack. Russian government hackers probed some states’ computer systems in the runup to the 2016 presidential election and are likely to do so again – as might hackers from other countries or nongovernmental groups interested in sowing discord in American politics.

Fortunately, there are ways to defend elections. Some of them will be new in some places, but these defenses are not particularly difficult nor expensive, especially when judged against the value of public confidence in democracy. I served on the Iowa board that examines voting machines from 1995 to 2004 and on the Technical Guidelines Development Committee of the United States Election Assistance Commission from 2009 to 2012, and Barbara Simons and I coauthored the 2012 book “Broken Ballots.”

Election officials have an important role to play in protecting election integrity. Citizens, too, need to ensure their local voting processes are safe. There are two parts to any voting system: the computerized systems tracking voters’ registrations and the actual process of voting – from preparing ballots through results tallying and reporting.

Verified Voting Blog: The National Academies of Sciences, Engineering, and Medicine releases report on “The Future of Voting”

Today the National Academies of Sciences, Engineering, and Medicine released a report on election security, “Securing the Vote: Protecting American Democracy.” The Committee for The Future of Voting, which includes Verified Voting Board member Ron Rivest and Advisory Board member Andrew Appel, released the report at a public event in Washington, DC, where the report’s findings and key recommendations were discussed. Included in the Committee’s recommendations, which echo many of Verified Voting’s policies, were:

  • Human-readable paper ballots, made available for all elections as soon as 2018
  • State-mandated risk-limiting audits
  • Increased funding to state and local governments for cybersecurity and election infrastructure

In addition to Ron Rivest and Andrew Appel, Verified Voting’s own Barbara Simons, David Dill, Philip Stark, Matt Blaze, Doug Kellner, and Alex Halderman reviewed the report ahead of its release.

To read the full report and recommendations, visit nap.edu/FutureOfVoting

Verified Voting Blog: The Myth of “Secure” Blockchain Voting

Several startup companies have recently begun to promote Internet voting systems, but with a new twist – using a blockchain as the container for voted ballots transmitted over the Internet from the voter’s private device. Blockchains are a relatively new system category a little akin to a distributed database. Proponents of blockchain voting promote it as a revolutionary innovation providing strong security guarantees that enable truly secure online elections. Unfortunately, these claims are false. Blockchains do not offer any real election security at all.

Internet voting has been studied by computer security researchers for over twenty years. Cyber security experts universally agree that no technology, including blockchains, can adequately secure an online public election. Elections have unique security and privacy requirements fundamentally different from and much more stringent than those in other applications, such as e-commerce. They are uniquely vulnerable because anyone on Earth can attack them, and a successful cyberattack might go completely undetected, resulting in the wrong people elected with no evidence that anything was amiss.

Media Release: Audit Language of the Secure Elections Act Falls Short of Standard for Effective Election Cyberdefense

Marian K. Schneider: “Verified Voting cannot in good conscience support the Secure Elections Act unless the previous audit language of the bill is restored

The following is a statement from Marian K. Schneider, president of Verified Voting, formerly Deputy Secretary for Elections and Administration in the Pennsylvania Department of State, regarding the Chairman’s mark of the Secure Elections Act. For additional media inquiries, please contact christy@newheightscommunications.com.

“Voter-verified paper ballots and manual post-election audits provide robust assurance that election outcomes are not manipulated in a cyberattack, and the most important thing elected officials can do to effectively secure the voting process is to require this combination of safeguards, together.

Unfortunately, the Chairman’s mark of the Secure Elections Act falls short of this standard. Unlike previous versions of the language, including the House companion bill introduced last month, the Chairman’s mark removes language that would have required audits to be conducted ‘by hand and not by device.’ This omission would permit software-based audits of digital records that do not provide a meaningful verification of the software that counted the votes. Cybersecurity experts agree that a manual inspection of the actual ballots marked by voters is essential to detecting interference or programming errors.

Verified Voting cannot in good conscience support the Secure Elections Act unless the previous audit language of the bill is restored and the SEA ensures that elections are defended by effective audit processes.”

Verified Voting Blog: Pamela Smith: Testimony Submitted to the Little Hoover Commission

Download Testimony as a PDF

Honorable Members of the Commission: I serve as Senior Advisor to Verified Voting, a national non-partisan non-profit educational and advocacy organization committed to safeguarding elections in the digital age. Verified Voting advocates for the responsible use of emerging technologies to ensure that Americans can be confident their votes will be cast as intended and counted as cast. We promote auditable, accessible and resilient voting for all eligible citizens. I previously served as President of Verified Voting for more than a decade. I have provided information and testimony on voting technology and policy issues at federal and state levels, including to the US House of Representatives Committee on House Administration, and earlier this year at the Joint Hearing of Assembly Elections and Redistricting and Senate Elections and Constitutional Amendments Committees, on Cybersecurity and California’s Elections.[1. March 7, 2018. https://selc.senate.ca.gov/content/oversightinformational-hearings]

I have curated an extensive information resource on election equipment and regulations nationwide, and co-authored several key works on election security policy, including Principles & Best Practices for Post Election Audits[2. Electionaudits.org/principles] and the introductory chapter of Confirming Elections: Creating Confidence and Integrity through Election Auditing.[3. Palgrave/MacMillan, 2012.] I participate in the Future of California Elections, a collaboration between election officials, civil rights organizations and election reform advocates to examine and address the unique challenges facing the State of California’s election system.[4.  Futureofcaelections.org] I also serve on the Los Angeles County Voting Systems for All People (VSAP) Technical Advisory Committee.[5. vsap.lavote.net]

In my capacity at Verified Voting I have worked with advocates, election officials and lawmakers from all across the country. In my view, the states that do the best on metrics relating to voting system security are often the ones that continue to look for and embrace opportunities to improve. As security threats do not stand still, neither can those whose work it is to safeguard our elections and consequently our democracy. I applaud the Little Hoover Commission for taking up this crucial topic of investigation, and am pleased to participate in and contribute to that effort.

Election security is not an on-off switch, where a thing either is secure or it is not. Rather it involves incrementing layers of effort, analysis, systems and procedures, all created or conducted by people, all while balancing costs and priorities. Such incremental measures harden a system, making it more secure than before and solving for problems when they occur. Perfect security is not attainable, but diligence in the pursuit of secure elections is.

Post Election Audits: Verified Voting’s Guide to RLAs in One Infographic

Verified Voting debuted its latest infographic, “A Flowchart for Conducting Risk-Limiting Audits,” at the National Association of Secretaries of States (NASS) 2018 Summer Conference in Philadelphia. In addition to sharing this with election officials at the conferences this summer, Verified Voting is working closely with jurisdictions to demonstrate how to implement robust post-election audits. Check it out below:

RLA Flowchart

This handy flowchart explains the process of conducting a risk-limiting-audit (RLA)

The infographic is part of a series of visuals Verified Voting is creating. This piece breaks down RLAs in a flowchart, and follows the release of “Safeguarding Our Elections: The Solutions to Vulnerabilities in Election Security,” this past June. You can download the infographic here or find it on our Twitter or Facebook.

Media Release: Security Experts Call on ES&S to Provide States with Steps to Disable Problematic Software Installed on Voting Machines

Marian K. Schneider: “Verified Voting calls on all the voting system vendors to be full partners in the effort to secure our elections.”

The following is a statement from Marian K. Schneider, president of Verified Voting, following news that ES&S, the country’s top voting-machine maker, admitted installing problematic remote-access software on election-management systems that it sold over a period of six years. For additional media inquires, please contact aurora@newheightscommunications.com

“Computer security experts agree the computers that program precinct voting devices should never contain any type of remote access software because the presence of this software could lead to hacking that can change election results. To safeguard election systems and instill confidence in the voting process, ES&S should be transparent about which states’ computers have this remote access software installed and provide information about the steps needed to disable or remove it.

“Verified Voting calls on all the voting system vendors to be full partners in the effort to secure our elections. We must all stand shoulder to shoulder to defend our democracy against both internal and external threats that seek to undermine our elections.”

Media Release: Congressional Briefing on Election Cybersecurity

Washington, D.C. — On Tuesday, July 10, a bipartisan group of leading authorities on election administration and cybersecurity will be on Capitol Hill to present an overview of current election security challenges facing federal and state policymakers. Introduced by Senator James Lankford (R-OK), the panel conversation comes one day ahead of a Senate Rules Committee hearing on the issue and months before November’s midterm elections.

When:
Tuesday, July 10, 2018
1:30 PM – 3:30 PM EDT

Where:
Capitol Visitors Center, Room SVC 202/203
First St NE, Washington, DC 20515

Experts will discuss key steps states should be taking to shore up electronic voting systems, which remain not only vulnerable to cyber-attacks but also a prime target of them. According to a recent report issued by the Senate Intelligence Committee, foreign agents targeted election systems in 18 states, conducted malicious access attempts on voting-related websites in at least six states, and additionally gained access to voter registration databases in a small number of states.

Verified Voting Blog: Verified Voting Designs New Ways to Think About Election Security

Summer is here and that means Verified Voting’s work is heating up! In the past few months Verified Voting has added staff, increased our state work, produced a valuable toolkit for election officials and advocates that received press in POLITICO and The Hill and created a set of infographics and maps which appeared in the Wall Street Journal and NPR (make sure to scroll down to see Verified Voting’s latest infographic: “Safeguarding Our Elections: The Solutions to Vulnerabilities in Election Security”).

The media continues to be instrumental in helping us raise awareness about safeguarding elections. Here are some recent highlights:

Fast Company – How U.S. Election Officials Are Trying To Head Off The Hackers
Bloomberg – Hack-Resistant Vote Machines Missing as States Gird for ’18 Vote
Reuters – Ahead of November election, old voting machines stir concerns among U.S. officials
Washington Post – How Colorado became the safest state to cast a vote
Associated Press – Election Hacking Puts Focus on Paperless Voting Machines
Axios – Exclusive poll: Majority expects foreign meddling in midterms
POLITICO – Election system experts debate merits of wireless tech in voting machines

Verified Voting Blog: Verified Voting’s Guide to Election Security in One Infographic

Verified Voting has gone visual! In addition to recently collaborating with the Wall Street Journal and NPR on maps depicting voting technology across the states, Verified Voting created its own infographic: “Safeguarding Our Elections: The Solutions to Vulnerabilities in Election Security.”

The infographic is the first in a series of visuals Verified Voting is creating. This piece breaks down the state of our elections, which states are most vulnerable, the solution and what people can do. We urge you to take a look and share with your networks. You can download infographic or find it on our Twitter or Facebook.

Media Release: Toolkit Advises Advocates and Election Officials on How to Secure the Nation’s Voting Machines

A joint project from Verified Voting, the Brennan Center, Common Cause and the National Election Defense Coalition suggests ways states can use Congressional election security funds.

Download the toolkit as a PDF. For additional media inquires, please contact aurora@newheightscommunications.com.

A new toolkit designed for advocates and election officials offers suggestions for best practices for conducting post-election audits as well as tips for local jurisdictions considering purchasing new voting machines. The toolkit, “Securing the Nation’s Voting Machines,” is a joint project between Verified Voting, the Brennan Center for Justice, Common Cause and the National Election Defense Coalition.

“Cyber security experts agree that our voting systems need to be resilient and allow jurisdictions to monitor, detect, respond and recover from an event that interferes with the software. Resilient systems incorporate a paper ballot that is retained for recounts and post-election audits,” said Marian K. Schneider, president of Verified Voting. “This toolkit provides a roadmap for election officials nationwide who are looking to implement these resilient systems.”

Verified Voting Blog: Letter to State Election Officials on Best Practices for Voting Funds

Download letter as PDF

On March 23rd, Congress allocated $380 million to states to upgrade election security. This is a positive development. In the age of unprecedented hacking risks, researchers have found that electronic voting infrastructure — including voting machines and registration databases — have serious vulnerabilities. While there’s no evidence that vote totals were hacked in 2016, there’s strong evidence that hackers have been testing the waters.

While federal funding can help states address these issues, simply upgrading or replacing election infrastructure is not sufficient. It is essential that states work with the Department of Homeland Security or other trusted providers to scan their systems for cyber vulnerabilities, and follow best practices identified by computer scientists, national security leaders, and bipartisan experts in elections administration to mitigate hacking risks. On March 20, the Senate Select Committee on Intelligence released its long-awaited recommendations on election security and concluded that requiring paper ballots, banning wireless components and implementing statistically sound audits of election results are essential safeguards. Last year, a group of 100 leading computer scientists and other election administration experts voiced the same conclusion. Through years of researching voting equipment security in real election administration environments, the National Institute of Standards and Technology (NIST) has come to similar conclusions about what it will take to defend elections.

Verified Voting Blog: Bruce Schneier: American elections are too easy to hack. We must take action now.

This article was published by The Guardian on April 18, 2018Bruce Schneier is a fellow and lecturer at Harvard Kennedy School and a member of the advisory board of Verified Voting.

Elections serve two purposes. The first, and obvious, purpose is to accurately choose the winner. But the second is equally important: to convince the loser. To the extent that an election system is not transparently and auditably accurate, it fails in that second purpose. Our election systems are failing, and we need to fix them.

Today, we conduct our elections on computers. Our registration lists are in computer databases. We vote on computerized voting machines. And our tabulation and reporting is done on computers. We do this for a lot of good reasons, but a side effect is that elections now have all the insecurities inherent in computers. The only way to reliably protect elections from both malice and accident is to use something that is not hackable or unreliable at scale; the best way to do that is to back up as much of the system as possible with paper.

Recently, there have been two graphic demonstrations of how bad our computerized voting system is. In 2007, the states of California and Ohio conducted audits of their electronic voting machines. Expert review teams found exploitable vulnerabilities in almost every component they examined. The researchers were able to undetectably alter vote tallies, erase audit logs, and load malware on to the systems. Some of their attacks could be implemented by a single individual with no greater access than a normal poll worker; others could be done remotely.

Verified Voting Blog: Federal Funds for Election Security: Will They Cover the Costs of Voter Marked Paper Ballots?

Download the Brennan Center/Verified Voting Full Report (PDF)

Under the terms of the omnibus spending bill voted on by the House, states will receive $380 million within months to start to strengthen the security of our nation’s election infrastructure. This near-term funding is the product of tireless work by members of both parties, and a critical acknowledgment from Congress that protecting our elections is a matter of national security. States can use the funding immediately to begin deploying paper ballots, post-election audits, and other essential cybersecurity improvements. However, the new funding is only a first step, as many in Congress have acknowledged, and further Congressional action will be necessary in order to ensure that future elections are secure.

Most significantly, the omnibus funding as allocated to the states under the Help America Vote Act (HAVA) will not be enough for some states to replace their insecure voting machines. Because paperless electronic voting systems are highly vulnerable to cyberattacks, it is urgent that those systems be replaced as soon as possible, as the Senate Select Committee on Intelligence (SSCI) recommended earlier this week. Until this is done, it will be impossible to ensure that election results as reported by the voting system have not been corrupted by a cyberattack.

Thirteen states, including key swing states like Pennsylvania, continue to use paperless voting today. One of the main reasons is cost: cash-strapped states simply can’t afford to replace this aging equipment. Unfortunately, our analysis shows that under the new federal funding, five of the 13 states with paperless machines will receive less than 25 percent of the money they may need to replace them. Moreover, most states will also need to use some of the new funding to pay for improved auditing and other security measures, leaving even less for crucial technology upgrades.

Media Release: Georgia: Election Integrity Experts Do Not Support the Current House Version of SB 403

Marian K. Schneider: The only people who are happy with SB 403 are voting system vendors who are salivating over the chance to sell many more machines than necessary.”

The following is a statement from Marian K. Schneider, president of Verified Voting, about why Georgia’s current Senate Bill 403 cannot ensure a verifiable and accurate election system. For additional media inquires, please contact aurora@newheightscommunications.com

“Election Integrity experts are not happy with Senate Bill 403 because it leaves the door wide open for Georgia to select insecure systems rather than slamming that door shut in favor of secure and verifiable systems. SB 403 does not mandate a voter-marked paper ballot, marked either by hand or accessible ballot marking device that is counted by a ballot scanner. It allows that possibility, but it also allows for insecure voting machines that record, count and report the voter’s selections while purporting to offer a paper record to the voter. Not only is the door to insecure voting wide open, but the bill language could be read to require all voters to vote on an electronic ballot marking device. That outcome would be needlessly expensive for Georgia taxpayers but it would be more than a welcome outcome for voting system vendors who are anxious to sell as many machines as possible.

Media Release: Senate Intelligence Committee’s Recommendations Outline Urgent Need for Paper Ballots, Post-Election Audits

Marian K. Schneider: The recommendations…make the case that states need immediate federal support to build a stronger defense.”

(March 21 2018) — The Senate Select Committee on Intelligence released a report today about Russian targeting of election infrastructure during the 2016 election. Read the full set of recommendations here. The following is a statement from Marian K. Schneider, president of Verified Voting:

“The Senate Select Committee on Intelligence (SSCI) report recognizes that voter-verified paper ballots and post-election audits are the best way – given current technology – to ensure that an attack on our voting systems can be detected and the outcome verified.

“As the Intelligence Committee hearing established again this morning, there was foreign interference during the 2016 election and a real possibility that similar acts to undermine faith in our democratic system will occur again. Security experts agree that safeguarding and protecting our election systems is important, and the Intelligence Committee report is another indication that Congress and state governments must urgently address the vulnerabilities in our election systems, both by mandating voter-verified paper records and audits as well as allocating resources to accomplish these goals.

Media Release: Verified Voting Opposes Georgia’s Current Voting Machine Legislation

Marian K. Schneider:[T]he current bill will perpetuate the cycle of unverifiable voting in Georgia. Verified Voting cannot support the bill unless significant changes are made.”

The following is a statement from Marian K. Schneider, president of Verified Voting, about why Georgia’s current Senate Bill 403 cannot ensure a verifiable and accurate election system. For additional media inquires, please contact aurora@newheightscommunications.com

“Georgia voters need a secure voting system with voter-marked paper ballots and audits, but instead, Georgia’s electoral system is left insecure and unverifiable. The current version of Senate Bill 403, which recently passed the House Government Affairs Committee, has morphed into a sweetheart deal for a group of voting machine vendors. Georgia voters are simply demanding a verifiable secure election system …nothing more.

Verified Voting Blog: Pennsylvania Takes Critical Steps Toward Election Security by Purchasing Voter-Verifiable Paper Systems

Marian K. Schneider: “We applaud this decision today to increase the integrity of Pennsylvanias elections and its move to safeguard elections.”

The following is a statement from Marian K. Schneider, president of Verified Voting, formerly Deputy Secretary for Elections and Administration in the Pennsylvania Department of State, on Pennsylvania’s announcement that it will no longer purchase paperless DREs and that going forward all new voting machines must have a voter-verifiable paper ballot or paper record. For additional media inquires, please contact aurora@newheightscommunications.com 

“Pennsylvania is taking a critical step towards safeguarding elections by replacing its aging voting systems and restoring voters’ faith that their votes will be counted as cast. The only way to address the risk of software problems is to require a physical paper ballot that can be used to check the computer-generated votes.

Verified Voting Blog: Marian K. Schneider: It’s time to safeguard our elections

This oped was originally published in the York Dispatch on February 1, 2018.

An oversight in York County, Pennsylvania on the eve of last November’s Election Day questioned the rightful winner of the election, but thankfully the potential damage stopped there. Still, the discovery of a technical error — one that allowed voters to cast multiple votes for a candidate in races with cross-filed candidates — risked the integrity of the election. This could’ve been easily preventable with paper ballots.

Most Pennsylvania voters are using paperless electronic voting machines to cast their ballot. The problem is that these outdated machines — also known as direct recording electronic (DRE) systems —are unverifiable. DREs, or voting machines without paper ballot back-up, have been the source of controversy for years because of their inability to allow anyone to verify the results. Instilling confidence in election outcomes can only occur by replacing these systems with newer ones that provide a software independent record of voter intent and implementing statistically meaningful audits of those records.

We know there was foreign interference during the 2016 election cycle, and that similar acts to undermine faith in America’s democratic systems are a possibility. Security experts agree that safeguarding and protecting election systems is important and that no system is completely secure. That’s why security experts recommend ensuring that all computer-based systems, including voting machines are resilient, that is, they have the ability to identify a problem and recover from it. Replacing the outdated voting systems with resilient machines is imperative before the 2018 elections because, for more than 80 percent of Pennsylvania voters in 50 counties, no one has any way of knowing whether the paperless voting machines correctly captured voter intent.

Media Release: Verified Voting Says Paper Ballots and Post-Election Audits Can Safeguard our Elections as State and Local Election Officials Discuss Election Security

Marian K. Schneider: “Passing the bipartisan Security Elections Act will advance our nation’s efforts to protect and ensure trustworthy elections.”

The following is a statement from Marian K. Schneider, president of Verified Voting, regarding the U.S. Election Assistance Commission (EAC) summit held today in Washington, D.C. For additional media inquires, please contact aurora@newheightscommunications.com  

“As officials look to address the risks our elections face today, it is essential that voter-verified paper ballots and post-election audits are recognized as the best way – given current technology – to ensure that an attack on our voting systems can be detected and the outcome verified. With midterm elections quickly approaching, it’s time we also prepare to monitor, detect, respond and recover from these potential attacks. The good news is that we can, and Congress has a bill that goes a long way in doing so.

“The bipartisan Secure Elections Act, introduced late last month by Sen. James Lankford (R-OK) and co-sponsored by Sen. Amy Klobuchar (D-MN), Sen. Lindsey Graham (R-SC), Sen. Kamala Harris (D-CA), Sen, Susan Collins (R-ME) and Sen. Martin Heinrich, (D-NM), aims to provide states with the resources needed to implement these safeguards. 

Media Release: Verified Voting Urges Congress to Pass the Secure Elections Act; Bipartisan Legislation Empowers States to Protect Themselves

Marian K. Schneider: “Passing the bipartisan Secure Elections Act will advance our nation’s efforts to protect and ensure trustworthy elections.”

The following is a statement from Marian K. Schneider, president of Verified Voting, on the Secure Elections Act, which was introduced by Sen. James Lankford (R-OK) and co-sponsored by Sen. Amy Klobuchar (D-MN), Sen. Lindsey Graham (R-SC),Sen. Kamala Harris (D-CA), Sen, Susan Collins (R-ME) and Sen. Martin Heinrich,(D-NM) on December 21, 2017.

“The Secure Elections Act addresses the new reality that our election infrastructure must be protected as matter of national security. At a time when our democracy needs increased protection, Congress should fast-track the newly introduced Secure Elections Act to provide resources for states to safeguard our voting systems and ensure election infrastructure is resilient.

“This bipartisan legislation establishes a structured grant program that creates incentives for states to adopt good cyber hygiene measures in accordance with guidelines developed by an advisory panel of experts. Coupling grants to the states with effective guidelines on spending will ensure the money is used well and moves toward strengthening our elections. In addition, the bill improves the exchange of information about security threats among the different levels of government to allow timely response and action.

Media Release: Election Security Experts Urge Congress to Pass the Security Elections Act; Bipartisan Legislation Empowers States to Protect Themselves

Marian K. Schneider: “Passing the bipartisan Security Elections Act will advance our nation’s efforts to protect and ensure trustworthy elections.”

The following is a statement from Marian K. Schneider, president of Verified Voting, on the Secure Elections Act, which was introduced by Sen. James Lankford (R-OK) and co-sponsored by Sen. Amy Klobuchar (D-MN), Sen. Lindsey Graham (R-SC),Sen. Kamala Harris (D-CA), Sen, Susan Collins (R-ME) and Sen. Martin Heinrich,(D-NM) on December 21, 2017. For additional media inquires, please contact aurora@newheightscommunications.com  

“The Secure Elections Act addresses the new reality that our election infrastructure must be protected as matter of national security. At a time when our democracy needs increased protection, Congress should fast-track the newly introduced Secure Elections Act to provide resources for states to safeguard our voting systems and ensure election infrastructure is resilient.

“This bipartisan legislation establishes a structured grant program that creates incentives for states to adopt good cyber hygiene measures in accordance with guidelines developed by an advisory panel of experts. Coupling grants to the states with effective guidelines on spending will ensure the money is used well and moves toward strengthening our elections. In addition, the bill improves the exchange of information about security threats among the different levels of government to allow timely response and action.

Verified Voting Public Commentary: Verified Voting Testimony before the Pennsylvania State Senate Senate State Government Committee: Voting System Technology and Security

Download as PDF

The security of election infrastructure has taken on increased significance in the aftermath of the 2016 election cycle. During the 2016 election cycle, a nation-state conducted systematic, coordinated attacks on America’s election infrastructure, with the apparent aim of disrupting the election and undermining faith in America’s democratic institutions. Intelligence reports that have been published in 2017 demonstrate that state databases and third-party vendors not only were targeted for attack, but were breached.1 Regardless of the success of hacking attempts in 2016, the consensus among the intelligence community is that future attacks on American elections are inevitable.2 The inevitability of attacks is a key concept in cyber security, that is, it’s not whether a system will be attacked, but when.

The existence and national significance of this threat have escalated the priority of securing Pennsylvania’s elections infrastructure. Two primary areas that require immediate and sustained attention are 1) securing both the state and county networks, databases and data transmission infrastructure that touch elections; and 2) instilling confidence in election outcomes by replacing legacy voting systems with new systems that permit reliable recounts and audits.

During the time that I served the Commonwealth as Deputy Secretary for Elections and Administration and Special Advisor to the Governor on Election Policy, I worked with the Office of Administration-Office of Information Technology to protect the Commonwealth’s networks that touch elections and to implement procedures to recover from any potential attacks. These efforts complied with cyber security best practices to monitor, detect, respond and recover. OA-OIT’s experienced staff is continuing this effort, and along with the Department of State, they have engaged county CIOs and technology staff to coordinate similar efforts at the counties working through the Commonwealth’s relationship with the County Commissioners Association of Pennsylvania (CCAP). Assuming the administration receives support from the General Assembly, the Commonwealth is on the right track to taking the necessary steps to monitor, detect, respond and recover from cyber attacks.

Media Release: Election Security Experts Raise Concern about the Integrity of Alabama’s U.S. Senate Election if a Recount is Needed

Download as PDF

Marian K. Schneider: “Alabama’s recount laws won’t do enough to protect voters’ votes.”

The following is a statement from Marian K. Schneider, president of Verified Voting, on election integrity, and the need for manual recounts and audits. For additional media inquires, please contact aurora@newheightscommunications.com  

“All eyes might be on the candidates running for the U.S. Senate seat in Alabama, but Alabama’s election practices and recount laws also deserve scrutiny. If the race goes to a recount following the election, Alabama’s recount laws won’t do enough to protect voters’ votes because it has no audit structure in place and relies on re-tabulation – where ballots that were tabulated by optical scanners are now re-tabulated by machine. If a recount occurs, it cannot be relied on to detect and correct a potential error in the computerized count unless it is done manually.

Verified Voting Blog: Testimony of Verified Voting to the Georgia House of Representatives House Science and Technology Committee

Download as PDF

Georgia’s voting machines need an update. The lifespan of voting machines has been estimated at 10-15 years.1 Purchased in 2002 Georgia’s voting machines are at the outside of that estimate. As voting systems age they are more susceptible to error, malfunction or security threats potentially losing or miscounting votes.

Georgia is one of only a handful of States that is still casting votes on entirely electronic voting systems, known as Direct Record Electronics (DREs). These machines record votes only in digital form; if the digital records are corrupted, either by benign error or malicious attack, there are no backup records and no way to know whether votes have been corrupted. When Georgia purchased these machines in 2002, the national trend was toward paperless touchscreen voting machines. Since then, however, most states moved away from paperless voting systems, driven by mounting research establishing these machines’ security flaws and some high profile and costly machine failures.2 Most of the nation has adopted voting systems that rely on a voter-marked paper ballot, an election safeguard recognized as essential by election officials and computer security experts alike.

A paper ballot provides a durable, physical record that is out of reach of a cyber attack and cannot be lost by a digital malfunction or programming error. Paper ballots can be used in a recount or to perform a post-election audit or check on the election results to help ensure the election outcome is correct. Today roughly 70% of voters in our nation mark a paper ballot which is counted by an electronic scanner.