Keep Factually independent

Whether you agree or disagree with our analysis, these conversations matter for democracy. We don't take money from political groups - even a $5 donation helps us keep it that way.

Loading...Time left: ...
Loading...Goal: $500

Fact check: How do election officials verify the integrity of electronic voting systems?

Checked on June 12, 2025

1. Summary of the results

Election officials employ a multi-layered approach to verify electronic voting system integrity, combining technological, procedural, and legislative measures [1]. The verification process includes:

  • Physical Security: Locked rooms, tamper-evident seals, and limited equipment access [2]
  • Technical Measures: Cryptographic techniques, end-to-end auditable systems that create encrypted ballot receipts [3]
  • Testing Protocols: Pre-election equipment testing, post-election reviews, and expert security assessments [2]
  • Network Security: Isolation of critical systems from the internet, secured transfer devices, and private networks when necessary [2]

Importantly, 98% of ballots now include paper records as a backup measure [4].

2. Missing context/alternative viewpoints

The original question overlooks several crucial aspects:

  • Certification Process: The U.S. Election Assistance Commission (EAC) plays a vital role in certifying voting systems [5]
  • Federal Collaboration: Election officials work with federal cybersecurity agencies like CISA for free vulnerability testing [4]
  • Specific System Vulnerabilities: Ongoing examinations of specific systems like Dominion Voting Systems' ImageCast X and Election Systems & Software's ExpressVote System are conducted [5]
  • Voter Verification: End-to-end auditable systems allow voters themselves to verify their votes were counted correctly while maintaining ballot secrecy [3]

3. Potential misinformation/bias in the original statement

The question implies that verification is a single process, when in reality it's continuous and multi-faceted. Several stakeholders are involved:

  • Security Researchers: Experts like J. Alex Halderman conduct intensive testing [4]
  • Voting System Manufacturers: Companies like Dominion and Election Systems & Software must submit their systems for examination [5]
  • Federal Agencies: Organizations like CISA and EAC play crucial oversight roles [4] [5]

The verification process is not just about checking systems but about continuous improvement and adaptation to new security challenges [5].

Want to dive deeper?
What security measures are built into modern electronic voting machines?
How do paper audit trails work with electronic voting systems?
What are the main vulnerabilities critics identify in electronic voting?
How do pre-election testing and post-election audits verify vote accuracy?
What role do cybersecurity experts play in election system oversight?