Keep Factually independent
Whether you agree or disagree with our analysis, these conversations matter for democracy. We don't take money from political groups - even a $5 donation helps us keep it that way.
Fact check: How do election officials verify the integrity of electronic voting systems?
1. Summary of the results
Election officials employ a multi-layered approach to verify electronic voting system integrity, combining technological, procedural, and legislative measures [1]. The verification process includes:
- Physical Security: Locked rooms, tamper-evident seals, and limited equipment access [2]
- Technical Measures: Cryptographic techniques, end-to-end auditable systems that create encrypted ballot receipts [3]
- Testing Protocols: Pre-election equipment testing, post-election reviews, and expert security assessments [2]
- Network Security: Isolation of critical systems from the internet, secured transfer devices, and private networks when necessary [2]
Importantly, 98% of ballots now include paper records as a backup measure [4].
2. Missing context/alternative viewpoints
The original question overlooks several crucial aspects:
- Certification Process: The U.S. Election Assistance Commission (EAC) plays a vital role in certifying voting systems [5]
- Federal Collaboration: Election officials work with federal cybersecurity agencies like CISA for free vulnerability testing [4]
- Specific System Vulnerabilities: Ongoing examinations of specific systems like Dominion Voting Systems' ImageCast X and Election Systems & Software's ExpressVote System are conducted [5]
- Voter Verification: End-to-end auditable systems allow voters themselves to verify their votes were counted correctly while maintaining ballot secrecy [3]
3. Potential misinformation/bias in the original statement
The question implies that verification is a single process, when in reality it's continuous and multi-faceted. Several stakeholders are involved:
- Security Researchers: Experts like J. Alex Halderman conduct intensive testing [4]
- Voting System Manufacturers: Companies like Dominion and Election Systems & Software must submit their systems for examination [5]
- Federal Agencies: Organizations like CISA and EAC play crucial oversight roles [4] [5]
The verification process is not just about checking systems but about continuous improvement and adaptation to new security challenges [5].