It is difficult to get a hand recount in the U.S., even when voting machines use paper ballots.

By @JennyCohn1

  1. According to Computer Science and Engineering Professor Alex Halderman (Univ. Michigan), the only way to verify if an electronic vote tally is correct is to hand count the paper ballots or to forensically analyze the machines.
  2. Private vendors, however, block forensic analyses on the grounds that their code is proprietary. …

3. Thus, as a practical matter, the only way to verify an electronic vote tally in the United States is to hand count the paper ballots or (if used instead) Voter Verifiable Paper Audit Trails.

4. But most states require hand recounts, if at all, only when the margin of victory is exceedingly small.

5. Thus, hackers can avoid a statutorily mandated hand recount by flipping enough votes to exceed the specified margin.

6. If that specified margin is exceeded, courts are of little use. In 2016, for example, the court in Wisconsin refused to order a hand recount, instead leaving the decision up to the counties.

7. Although a few Wisconsin counties hand recounted voluntarily, most large counties refused, choosing instead to re-run the machines. … …

8. The recount in Michigan was no better. It excluded voting machines with broken seals and precincts where the number of voters and the number of votes differed. It was also shut down after only three days. … …

9. In Pennsylvania, although most machines are paperless, the court refused to order any recount at all, even as to those machines that used paper.

10. In addition, according to the Congressional testimony of Computer Science Professor Andrew Appel (Princeton University), just twelve states have laws requiring regular post-election hand audits to make sure the computers aren’t cheating.

11. Appel further testified that, “in most of those twelve states, the sampling methods are weak.” (Id.)

12. According to Professor Halderman, “only two states — Colorado and New Mexico — ‘conduct audits that are robust enough to detect cyberattacks.’” … … … … …

Source link

Leave a Reply

Pin It on Pinterest

Share This

Share this post with your friends!