Stay up to date with notifications from The Independent

Notifications can be managed in browser preferences.

US election 2016: Why hackers could tip the result

Following the troubled 2000 presidential election, the flawed paper system made way for electronic voting technology. But critics claim hackers are still able to change the outcome of the race

Craig Timberg
Wednesday 31 August 2016 06:09 EDT
Comments
When it comes to voting machines, experts say the most secure systems rely on the strengths of old technologies and new ones
When it comes to voting machines, experts say the most secure systems rely on the strengths of old technologies and new ones (Rex)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Reports this week of Russian intrusions into US election systems have startled many voters, but computer experts are not surprised. They have long warned that Americans vote in a way that's so insecure that hackers could change the outcome of races at the local, state and even national level.

Multibillion-dollar investments in better election technology after the troubled 2000 presidential election count prompted widespread abandonment of flawed paper-based systems, such as punch ballots. But the rush to embrace electronic voting technology – and leave old-fashioned paper tallies behind – created new sets of vulnerabilities that have taken years to fix.

“There are computers used in all points of the election process, and they can all be hacked,” said Princeton computer scientist Andrew Appel, an expert in voting technologies. “So we should work at all points in that system to see how we make them trustworthy even if they do get hacked.”

The alleged Russian hacks to voter registration systems in Arizona and Illinois exposed one of the major weak spots in election systems. Deleting or altering data on voter rolls could cause mayhem on election day, disenfranchising some voters. Many voting machines themselves also are vulnerable, especially touch-screen systems that do not create a paper record as a guard against fraud or manipulation.

Several swing states, including Pennsylvania, Florida and Virginia, are struggling to rid their polling stations of insecure touch-screen systems. Other states, such as Georgia and New Jersey, still use them at every polling station.

At stake are not just the results themselves. Faith in the reliability and transparency of balloting, experts say, are crucial to democracy, especially in a year when allegations of voting irregularities already have been aired by politicians, most notably Republican presidential nominee Donald Trump.

While there are few documented cases of electronic systems producing flawed voting results in the United States, experts say fears of potential hacks by foreign intelligence services are legitimate. Government databases of all sorts have been routinely pilfered by hackers for years, meaning that voter rolls likely are vulnerable too.

“I am not an expert on reading Vladmir Putin's mind, and I don't know what he's up to if anything, but if your goal is to simply cause chaos, then destroying the voter registration databases would be an excellent way to cause chaos,” said Dan S Wallach, a Rice University computer science professor who long has studied the security of election systems.

When it comes to voting machines, experts say the most secure systems rely on the strengths of old technologies and new ones. Voting machines with optical scanners, for example, use computer technology to read paper ballots in which voters fill in a bubble next to their preferred candidates. This creates both an electronic tally and a paper record, as do some newer touch-screen systems.

The combination is difficult for even the most sophisticated hackers to defeat. Some states require automatic auditing of selected results to verify that computerized and paper totals are the same. In the case of controversy, recounting is a possible if cumbersome remedy.

Systems that collect only digital records offer many possible targets for hackers – at polling machines, at counting stations and on the computers that collect and tally up overall results for a jurisdiction. Princeton researchers showed in 2006 that one widely deployed electronic voting machine was vulnerable to a virus that could be carried on cartridges used to collect totals. Once installed, such a virus could quietly tweak results for years without detection.

Even when electronic systems are insecure, paper records allow for auditing and verification. Such reviews have caught software errors that could have affected the outcomes of elections.

In a 2006 Republican Primary in Potawatomie County, Iowa, an election official noticed that a little-known candidate was close to beating a popular incumbent. When the official ordered a hand count of the ballots, they uncovered a programming mistake that was tipping the election toward the challenger.

Fairfax County, Virginia, probed its new voting machines in 2003 after election day malfunctions, including one where some machines appeared to subtract 1 out of every 100 votes for a Republican candidate who lost a close school board candidate.

Maryland recently switched to secure optical scanners for its elections. Virginia has been upgrading its systems and is expected to complete the transition by 2020.

The nationwide trend is toward adoption of systems that produce paper and electronic records; they are deployed universally in 35 states and in many counties elsewhere, according to tracking by Verified Voting Foundation, a California-based nonprofit group that monitors voting technologies. Pamela Smith, president of Verified Voting Foundation, estimated that more than 75 per cent of US voters cast ballots on machines that create a reliable paper trail.

“When you have voters marking a physical ballot, it's pretty easy to check – and it's obvious what's being counted,” Smith said. “Those physical records of voter intent can be used for a postelection audit to check the software on a system counting the votes or if a candidate requests a recount or one is required because the margin of victory is small. It lets election officials use that record to demonstrate that the count was correct.”

More than just vote tallies can be in peril. The alleged Russian intrusions into voting systems in Arizona and Illinois, which prompted the FBI to issue warnings to election officials in June, could have targeted voter lists or other personal data kept on state databases. Altering lists of registered voters could potentially cause long lines or other problems on election day, leading some people to not cast ballots.

The 2000 presidential election, won by George W Bush after months of wrangling over “butterfly ballots,” “hanging chads” and other flaws with paper balloting systems, prompted Congress to outlaw punch ballots and allocate $3bn (£2.2bn) to help states switch to supposedly secure electronic systems.

Much of the first wave of new technologies, however, left no paper record of voter intent and often relied on outdated hardware and software. Technology experts warned of the security risks but several states made major investments in flawed machines before there was widespread consensus among election officials that paper verification was essential.

“The systems are absolutely horrible,” said Joe Hall, chief technologist for the Center for Democracy and Technology. “Some of these systems are essentially 15 to 20 year old computers, and there's only so much you can do to try to protect them, unfortunately.”

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in