<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Suzanne Mello-Stark | Vox</title>
	<subtitle type="text">Our world has too much noise and too little context. Vox helps you understand what matters.</subtitle>

	<updated>2017-06-16T21:22:26+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.vox.com/author/suzanne-mello-stark" />
	<id>https://www.vox.com/authors/suzanne-mello-stark/rss</id>
	<link rel="self" type="application/atom+xml" href="https://www.vox.com/authors/suzanne-mello-stark/rss" />

	<icon>https://platform.vox.com/wp-content/uploads/sites/2/2024/08/vox_logo_rss_light_mode.png?w=150&amp;h=100&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Suzanne Mello-Stark</name>
			</author>
			
			<title type="html"><![CDATA[It’s now clear US voting is hackable. Here are 6 things we must do to prevent chaos.]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/the-big-idea/2017/6/16/15816510/voting-security-hacks-russia-georgia-election" />
			<id>https://www.vox.com/the-big-idea/2017/6/16/15816510/voting-security-hacks-russia-georgia-election</id>
			<updated>2017-06-16T17:22:26-04:00</updated>
			<published>2017-06-16T10:50:01-04:00</published>
			<category scheme="https://www.vox.com" term="Politics" /><category scheme="https://www.vox.com" term="The Big Idea" />
							<summary type="html"><![CDATA[There&#8217;s never a good time, politically speaking, to raise questions about our voting system&#8217;s vulnerability to hackers. But we can no longer avoid the issue. Bloomberg News reported this week that the US government determined that Russian hackers penetrated the voting systems in 39 states in the weeks leading up to the November 2016 election. [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="A voter casts a ballot in Georgia’s special runoff election this month, in the state’s sixth congressional district. A recent report suggests Georgia’s election system is vulnerable to hacking. | Joe Raedle / Getty" data-portal-copyright="Joe Raedle / Getty" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8698459/GettyImages_669770762.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
	A voter casts a ballot in Georgia’s special runoff election this month, in the state’s sixth congressional district. A recent report suggests Georgia’s election system is vulnerable to hacking. | Joe Raedle / Getty	</figcaption>
</figure>
<p>There&rsquo;s never a good time, politically speaking, to raise questions about our voting system&rsquo;s vulnerability to hackers. But we can no longer avoid the issue.</p>

<p>Bloomberg News <a href="https://www.bloomberg.com/politics/articles/2017-06-13/russian-breach-of-39-states-threatens-future-u-s-elections">reported this week</a> that the US government determined that Russian hackers penetrated the voting systems in 39 states in the weeks leading up to the November 2016 election. The hacks did not involve changing votes &mdash; &nbsp;typically they were forays into voter registration databases &mdash;&nbsp; but in at least one case, in Illinois, the hackers tried to delete voter data, Bloomberg reported.&nbsp;</p>

<p>US officials complained to the Russians, who denied involvement, but President Obama decided not to alert the public, because he didn&rsquo;t want people to lose faith in the system.</p>

<p>To this day, President Trump&rsquo;s aides suggest that Democrats who call for an investigation into Russian hacking are sore losers. But the evidence that Russia attempted to influence our 2016 election has become unignorable. In January 2017, the CIA, FBI, and NSA jointly released <a href="https://www.dni.gov/files/documents/ICA_2017_01.pdf">an assessment</a> that Russia used cyber tools to influence American public opinion (specifically, to &ldquo;denigrate Secretary Clinton&rdquo;).</p>

<p>And the Bloomberg piece was only one of several bombshells about compromised American voting systems to land this month. The Intercept <a href="https://theintercept.com/2017/06/05/top-secret-nsa-report-details-russian-hacking-effort-days-before-2016-election/">obtained</a> an NSA document that described in detail how Russian military hackers  &mdash; not amateurs &mdash; mounted a phishing attack against an unnamed voting software supplier, then used information it obtained to try the same with local government officials. What the hackers obtained was unclear &mdash; and, again, the interference seems to have fallen short of changing votes. &nbsp;Still, the Intercept wrote, &ldquo;Russian hacking may have penetrated further into US voting systems than was previously understood.&rdquo; &nbsp;&nbsp;&nbsp;</p>

<p>Finally, Politico <a href="http://www.politico.com/magazine/story/2017/06/14/will-the-georgia-special-election-get-hacked-215255">reported</a> the alarming story of how a curious security researcher discovered last year that Kennesaw State University&rsquo;s Center for Election Systems had left unprotected, on its website, computer files essential for running Georgia elections. Expecting to download a few PDFs about the center&rsquo;s work, he found himself in possession of registration databases, pollbook software, and instructions to election workers about logging in to registration systems &mdash; passwords included.</p>

<p>He reported the vulnerabilities to the center, but several were not fixed as of this March, so he went to the media. Georgia is preparing for a special runoff election this month that has turned into the most expensive House race in US history. If you were a hacker looking to undermine American politics, you couldn&rsquo;t pick a better election.</p>

<p>Securing our elections from bad actors is not a partisan issue, and should not be treated as such. It is true that our decentralized, precinct-by-precinct system would make a coordinated national vote hack a massive undertaking. But given that our elections usually come down to a few predictable states, swaying even a national election is not as hard a task as it once seemed. Sowing chaos at the district or precinct level appears to be within hackers&rsquo; current capabilities.</p>

<p>We need to put partisanship aside, and bolster election security as soon as possible &mdash; certainly by the 2018 midterms.&nbsp;Speaking as someone who studies computer security and has served in technical adviser roles in election commissions and secretary of state offices in Rhode Island and Connecticut, I offer the following recommendations:</p>
<h2 class="wp-block-heading">1) Establish audit capability in every precinct</h2>
<p>That means &mdash; strange as it may sound in this digital era &mdash; reestablishing paper trails. Many precincts attempt post-election audits, but many do not. What&rsquo;s more, many audits are not vigorous enough to establish with confidence that no interference has occurred. This is something we can, and should, fix immediately. In Connecticut, audits are required by law. Five percent of districts are selected and an electronic audit of the paper ballots is conducted to ensure they&nbsp;match the totals&nbsp;established by the voting machines.</p>

<p>Other states are moving to embrace that standard, but not fast enough. In Rhode Island, which currently lacks audits, legislators have introduced a bill to mandate them. Audits and paper trails should be universal.</p>
<h2 class="wp-block-heading">2) Ditch direct-recording electronic voting machines (DREs)</h2>
<p>This will help with the auditing problem. DREs are <a href="https://ballotpedia.org/Voting_methods_and_equipment_by_state">used in a number of states</a>, including swing states such as Georgia, Pennsylvania, Wisconsin, and Florida. Ironically, some of these machines were acquired in the wake of the &ldquo;hanging chad&rdquo; debacle of the 2000 presidential election, with the goal of modernizing voting systems. But these machines often do not have voter verified paper trails (i.e., paper ballots), which makes audits impossible. DREs were a bad idea from the start, and the experiment needs to end.</p>
<h2 class="wp-block-heading">3) Implement stronger safeguards for online registration systems</h2>
<p>Many states are switching to electronic pollbooks. Poll workers can log in to them and verify that a voter who shows up at a precinct is registered and eligible. By breaking into these systems &mdash; as seems to have already happened, to some degree &mdash; and changing data, hackers could wreak havoc on Election Day.&nbsp;With a few clicks, hackers could unregister voters, change their mailing addresses, or misspell their names.</p>

<p>It would be even easier to unleash a distributed denial of service (DDOS) attack on a poll station &mdash;overwhelming a crucial server with traffic and preventing poll workers from connecting to the registration database. That could halt voting altogether. The recent news reports conclusively show that states are not sufficiently protecting these systems. We have the knowledge to do so; it&rsquo;s a question of focusing on the problem and supplying the needed resources and experts.&nbsp;And this is yet another case where paper can be an effective defense: If poll workers have hard copies of voter rolls, they can keep working even if their database connections get blocked.</p>
<h2 class="wp-block-heading">4) Discourage online voting — at all costs</h2>
<p>A total of&nbsp;32&nbsp;states <a href="http://www.ncsl.org/research/elections-and-campaigns/internet-voting.aspx">allow </a>at least some voters to send back marked ballots via a web-based-portal, email, or fax &mdash; insecure means of communication.<strong> </strong>And the MOVE Act (Military and Overseas Voter Empowerment Act) mandates that all states have a mechanism to allow ballots to be <em>sent</em> to voters in military by electronic means. But it is all too easy to adopt someone&rsquo;s identity online and thereby get a blank ballot. There must be additional measures put in place to ensure that ballots requested online are going to the right people. (Even checking signatures could help.)</p>

<p>As for allowing votes to be <em>cast</em> online, computer security experts are essentially unanimous in arguing that it should never happen.<strong> </strong>No states should allow votes to be submitted electronically, period.</p>
<h2 class="wp-block-heading">5) Strengthen the chain of custody</h2>
<p>In the context of an election, a strong chain of custody means safeguarding the ballots, as well as the election-related software and hardware used. The public should be confident that the ballots and election machines are secure from the moment of their creation until the tally is finalized at the Board of Elections. Machines must be kept under literal lock and key, given that computer scientists have demonstrated that they can install a new chip into a voting machine, and alter its software, in about a minute. When software is first installed, a &ldquo;hash&rdquo; can be applied &mdash;essentially, a digital fingerprint that changes if the software has been altered. This is just one example of many protections that security experts with technical expertise can implement.<strong>&nbsp; </strong></p>
<h2 class="wp-block-heading">6) Give states more money    </h2>
<p>To pay for these necessary changes, funding is needed at the state level.&nbsp;There has not been major funding for election reform since the Help America Vote Act of 2002, which disbursed $1.3 billion to 42 states, American Samoa, and the District of Columbia.&nbsp;This law also established the Election Assistance Commission.&nbsp;Although the EAC does not have federal regulatory authority, it provides a needed mechanism to assist states in identifying, evaluating, and adopting new security standards. With the right resources and experts, the states have a better chance to execute the goals I&rsquo;ve outlined here.</p>

<p>We tend to forget our cybersecurity history. Russia has been hacking the US since the &rsquo;80s. And the more they uncover fresh vulnerabilities in our systems, the more aggressive they will be. As former FBI Director James Comey told the Senate Intelligence Committee this month, &ldquo;They will be back.&rdquo;</p>

<p>We must be ready when that happens. Right now, we aren&rsquo;t.</p>

<p><em>Suzanne Mello-Stark&nbsp;is an associate teaching professor at Worcester Polytechnic Institute in Worcester, Massachusetts, and has served in technical advisory roles to the election commissions and secretary of state offices in Rhode Island and Connecticut.</em>&nbsp;</p>
<hr class="wp-block-separator" />
<p><a href="http://vox.com/the-big-idea">The Big Idea</a> is Vox&rsquo;s home for smart discussion of the most important issues and ideas in politics, science, and culture &mdash; typically by outside contributors. If you have an idea for a piece, pitch us at <a href="mailto:thebigidea@vox.com">thebigidea@vox.com</a>.</p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Suzanne Mello-Stark</name>
			</author>
			
			<title type="html"><![CDATA[Some states — including swing states — have flawed voting systems]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/the-big-idea/2016/11/1/13486386/election-rigged-paper-trail-audit" />
			<id>https://www.vox.com/the-big-idea/2016/11/1/13486386/election-rigged-paper-trail-audit</id>
			<updated>2016-11-01T09:53:20-04:00</updated>
			<published>2016-11-03T07:30:00-04:00</published>
			<category scheme="https://www.vox.com" term="2016 Presidential Election" /><category scheme="https://www.vox.com" term="Politics" /><category scheme="https://www.vox.com" term="The Big Idea" />
							<summary type="html"><![CDATA[Donald Trump has been arguing that the 2016 election will be rigged, provoking concerns about what his supporters may do if &#8212; as seems likely &#8212; he loses. In fact, as President Obama and many others have pointed out, the decentralized nature of our state-by-state system makes the coordinated hijacking of a national election all [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="Voters in Provo, Utah, voting early. | George Frey/Getty Images" data-portal-copyright="George Frey/Getty Images" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/7385841/617963694.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
	Voters in Provo, Utah, voting early. | George Frey/Getty Images	</figcaption>
</figure>
<p>Donald Trump has been arguing that the 2016 election will be rigged, provoking concerns about what his supporters may do if &mdash; as seems likely &mdash; he loses. In fact, as President Obama and many others have pointed out, the decentralized nature of our state-by-state system makes the coordinated hijacking of a national election all but impossible. Such a feat would require coordination and conspiracy on a truly massive scale&mdash; with so many participants that many would surely be caught in the act.</p>

<p>That does not mean that there aren&rsquo;t problems with the apparatus of our elections. Although the entire system can&rsquo;t be collectively hacked or rigged, individual electronic voting machines remain vulnerable to hacking &mdash; and some states are connecting their voting machines to the internet, needlessly creating another security weakness. This is especially dangerous when those machines don&rsquo;t create a paper trail that allows for double-checking or auditing.</p>

<p>Some states made the mistake, after the debacle of the 2000 election &ndash; remember &#8220;hanging chads&#8221;? &ndash; of rushing to embrace technology as a solution to that year&rsquo;s problems, yet they failed to think through potential vulnerabilities.</p>

<p>The good news is that while there are problems, we can fix them. It is important, now more than ever, to put safeguards in place, so that if a distortion of facts begins, we can quickly shut down the conspiracy theorists. It may not be possible to finish the reform process by November 8, but it must be a priority.</p>
<h2 class="wp-block-heading">A diversity of approaches offers protection</h2>
<p>States oversee their own election commissions and have the authority to use whatever voting machines they choose, from paper ballot scanners to touchscreen and other digital devices &mdash;internet-enabled or not &mdash; or a mix of all of the above.</p>

<p>This lack of homogeneity and systemic connectivity among voting machines is precisely what helps protect the election process from significant, widespread manipulation. Hacking would take local, physical breaches of security, an effort that would be extraordinarily difficult to coordinate across precincts (let alone states).</p>

<p>Instead, the major problem is our inability to fully audit election results. <a href="verifiedvoting.org">VerifiedVoting.org</a>, which advocates for best practices in elections, <a href="https://www.verifiedvoting.org/resources/post-election-audits/">rates</a> 25 states as having an &#8220;inadequate&#8221; auditing mechanism &mdash; and only seven as &#8220;excellent&#8221; or &#8220;good.&#8221;</p>

<p>Many newer voting machines provide no evidence of how an individual voted. There is no paper trail to follow if there are doubts or challenges. If an election is deemed too close to call, or if a machine error occurs, nothing can be done to scrutinize the vote count and reinstate the tally. It would be necessary to hold the election again or accept the election outcome as is.</p>
<h2 class="wp-block-heading">Old-fashioned hand counting has advantages</h2>
<p>In Massachusetts, one state whose voting system I am closely familiar with, 64 of the state&rsquo;s 350-plus towns and cities still rely on hand counting by volunteers. While that may sound archaic, it allows for an audit or a recount. The other municipalities use four different types of optical scan voting machines &mdash; but all of them use paper. So in Massachusetts, if there is a contested election, officials can retrieve the paper ballots and count them again.</p>

<p>The state passed an audit law in 2014, to be used for the first time in the upcoming election; 3 percent of precincts will be manually recounted &mdash; one way to detect irregularities.</p>

<p>Since 1997, Rhode Island has used optical scanners with paper ballots. Rhode Island has had very few problems with elections. However, in the event of an issue, there are no laws in place that establish procedures for conducting an orderly audit. Moreover, this year <a href="http://turnto10.com/news/local/ri-voters-get-new-voting-machines-for-upcoming-elections">the state &#8220;upgraded&#8221;</a> to machines that have the ability to send the votes to the board of elections over the internet &mdash; a step backward in terms of security. (The machines do have other advantages: They can notify voters when they have cast a ballot in which the bubbles have been filled in incorrectly, for example.)</p>
<h2 class="wp-block-heading">The seductive attraction, and dangers, of &quot;direct-recording electronic systems&quot;</h2>
<p>Several swing states, including Virginia, Pennsylvania, and Florida, pressured by tech-savvy consumers who demanded what they believe is a more sophisticated and convenient system, moved to newer, so-called direct-recording electronic systems (DREs). To the general public, these seem more modern because they employ a familiar touchscreen interface. But many DREs leave no paper trail &mdash; known in the trade as a voter-verified paper audit trail &mdash; which makes a recount or an audit all but impossible. And because the technology is proprietary, researchers and the public have little to no access to the vendor&rsquo;s software information for testing, comparing, and troubleshooting.</p>

<p>In order for an election system to be trusted, it must be verifiable. There must be methods with which to check that machines calculate votes as voters intend. There must be strong evidence that machines function as designed, so voters &mdash; and candidates &mdash; feel confident that elections are fair and accurate. Maintaining a paper trail and keeping election machines off the internet are well-founded methods of instilling trust in our elections.</p>
<h2 class="wp-block-heading">The importance of a secure chain of custody</h2>
<p>We can learn from forensics. After a crime, investigators collect evidence like blood samples and footprints. To prove that evidence remains uncontaminated, it is strongly safeguarded and a chain of custody is established. In an election, chain of custody refers to the safekeeping and secure transport of ballots &mdash; and the machines themselves. If a strong chain of custody can be proved, the public can feel confident that the ballots and election machines are secure from the moment of their creation until the final tally at the board of elections. Putting ballots or machines on the internet breaks the chain.</p>

<p>In Connecticut &mdash; rated by <a href="verifiedvoter.org">VerifiedVoter.org</a> above Massachusetts and Rhode Island &mdash; paper ballots and manual audits are required by law. For each election, 10 percent of randomly chosen voting districts are selected, and a hand count is conducted. The secretary of state receives a report that indicates the total number of counted ballots. The auditors examine each ballot and make note of potential anomalies, such as marks found outside the ovals or marks made with pencil instead of a pen.</p>

<p>In the modern era, the code used in voting machines needs to be subject to audits too. Hardware and software should be open, transparent, and available for public examination. The code should be periodically reviewed by qualified computer scientists in an open environment to be sure the system is error-free and operates as intended. (Computer scientists are among the strongest proponents of paper trails.)</p>

<p>In addition, voting machines should have error-detection capability, so that problems can be caught in real time, rather than in the audit phase. And error messages should be internally logged as well and externally documented</p>
<h2 class="wp-block-heading">Two steps forward, one step back</h2>
<p>The Help America Vote Act of 2002, adopted two years after the controversy surrounding the 2000 presidential election, established some important guidelines, but, in some states, it also led to a rush to buy DREs &mdash; thereby causing fresh problems.</p>

<p>And not just theoretical problems. In a congressional election using DREs that took place in Florida in 2006, Republican Vern Buchanan defeated Democrat Christine Jennings by the minuscule margin of 369 votes. It was determined that in Sarasota County, where DREs were used, 18,000 votes went unrecorded. Since there was no paper trail, there was <a href="http://www.cs.rice.edu/~dwallach/pub/sarasota07.pdf">no way to determine</a> how those 18,000 people voted.</p>

<p>On the tech front, scientists at Princeton University have demonstrated that given access to a DRE system for one minute, <a href="https://citp.princeton.edu/research/voting/">they could install malicious code</a> that could alter vote counts and compromise the internal records of the election machine. Although many of the states have since either switched out these machines or adapted them to create paper trails, there are far too many still in use.</p>

<p>We&rsquo;ve made considerable strides since the 2000 presidential election, but challenges remain.</p>

<p>This November will test our nation&rsquo;s ability to protect polling places from hacking &ndash; and our ability to quickly audit and verify results in close or contested races. If we escape problems in the states that use no-paper-trail DREs, we can exhale &mdash; and then finish the job of fixing the system.</p>

<p><em>Suzanne Mello-Stark is an associate teaching professor at Worcester Polytechnic Institute in Worcester, Massachusetts, and has served in technical advisory roles to the election commissions and secretary of state offices in Rhode Island and Connecticut. </em></p>
<hr class="wp-block-separator" />
<p>The Big Idea is Vox&rsquo;s home for smart, often scholarly excursions into the most important issues and ideas in politics, science, and culture &mdash; typically written by outside contributors. If you have an idea for a piece, pitch us at <a href="mailto:thebigidea@vox.com"><strong>thebigidea@vox.com</strong></a>.</p>
						]]>
									</content>
			
					</entry>
	</feed>
