国产视频

In Short

Hacking Democracy

votingbooth
Shutterstock

Donald Trump, the Republican nominee for President of the United States speculated in August that the only way in which he would not win come November would be a It was, certainly, a scandalous statement鈥攂ut the reality of election tampering is not new and made even worse by the fact that our voting system is outdated and insecure. Security experts believe Russians successfully breached voter databases in both earlier this summer, indicating to voters across the country and people around the world that the United States鈥 presidential election itself is hackable.

This is not to say that Trump is right, and it is certainly not to say that the American voting process is rigged or under influence in the way that he meant. It is to say, however, 聽that the United States鈥 voting system is .

Every election cycle, there are reports of , , and . Other countries like Canada, Brazil, and Germany have converted to electronic voting, which has the benefit of limiting human error, providing instantaneous results, and to voters who have disabilities.

While a technological upgrade seems to be what鈥檚 needed to bring our elections into the 21st century, it does bring with it its own set of challenges鈥攏amely, . The alleged Russian interference in the primaries in two states and their timely release of private emails from the DNC indicate that the threat of a foreign government or third party interference in U.S. elections is a potential reality we must acknowledge.

The security of electronic voting machines has become . It is worth noting that electronic voting isn鈥檛 as common as some believe; only five states utilize direct recording electronic systems (DREs) that allow constituents to record their votes directly into a computer鈥檚 memory. The large majority of voters鈥攖hree-quarters to be specific鈥攚ill still be voting using paper ballots this fall. So It is also worth noting that these same machines have been used and were just as hackable in previous elections with no indication of any verifiable interference. But security breaches impacting our government鈥攎ost notably the OPM data breach鈥攁long with those directly impacting our election system have left a tangible feeling of apprehension leading up to the 2016 election. Americans are more aware than ever of the vulnerability of their vote and just the hint of malfeasance can threaten their faith in the integrity of our democracy.

The real danger is not the threat of a large-scale hack influencing the outcome of our election, but rather the shroud of suspicion that the results were tampered with. This does not mean we need to skip the screens鈥攁nyone who remembers the 2000 presidential election almost certainly remembers butterfly ballots and hanging chads. The issue is less whether we choose electronic or paper voting and more that we choose to design a system in which the American people can place their trust and put checks in place to ensure that that trust is not broken.

Verified Voting, a nonpartisan, nonprofit organization advocating for legislation that promotes accuracy, transparency and verifiability of elections, provides a on their website indicating the voting technology used throughout the U.S. and its territories allowing voters to see what they will use at their polling station in November.As the map illustrates, there are quite a few different ways to vote during this election cycle across the country. The good news is that a growing number of voters are using machines that have paper backups to double-check any suspicious results. In fact, more than half of all states conduct by checking vote totals against paper records to ensure that votes are accurate. The less good news is that, since U.S. elections are locally run, with many different systems and varying degrees of security, not every state performs post-election audits.

Take, for example, Pennsylvania, a key post-convention battleground state where Trump and his opponent Hillary Clinton are separated by just one point in the polls. The state has audit requirements but a that do not have a voter verified paper audit trail, leaving it unclear how they might carry out their audit requirement. It鈥檚 worth taking a second look because it鈥檚 the voting systems that cannot be audited that raise suspicion and instill distrust. If the possibility of ballot manipulation exists and the results of an election cannot be guaranteed to be tamper-free, doubt alone can damage voter鈥檚 belief in election outcomes. 聽With a major party candidate already alluding to possible voter fraud a few months prior to Election Day, a seed of mistrust has been firmly planted in some minds.

Steps have already been taken to ensure the integrity of our election system. Congressman Hank Johnson of Georgia鈥檚 4th District and member of the House Judiciary Committee recently introduced the 鈥淓lection Infrastructure and Security Promotion Act of 2016鈥 and the 鈥淓lection Integrity Act of 2016.鈥 The former would require the Department of Homeland Security designate our voting systems as critical infrastructure, increasing their obligation to secure the system like they would our power grid or water supply. The latter would limit the purchase of new voting systems that do not provide voter-verified paper ballots. 鈥攖he security issues the legislation raise appear to be steps in the right direction. They also, however, seem unlikely to prompt effective change before the election this November.

For over two hundred years prior to 国产视频 comments and hacking Russians, American democracy has relied on the peaceful transition of power based on the results of local, state, and national elections. Although history does record various instances of misuse of the system, overall voters had a determined confidence that their ballots were secure and their votes counted in deciding the outcome of elections. The system in place now does not inspire a great deal of confidence in the security of one鈥檚 vote and an upgrade is sorely needed. Whether we move to an electronic process or keep making paper, our systems of voting needs to be secured, and the risk of manipulation of data, eliminated.

More 国产视频 the Authors

Emily Fritcke
Hacking Democracy