What methods do election integrity groups use to audit ballot counts?

Checked on December 5, 2025
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

Executive summary

Election-integrity groups and officials rely chiefly on post‑election audits—above all risk‑limiting audits (RLAs)—which hand‑count statistically selected paper ballots to provide a high probability that reported winners are correct [1] [2]. Other common practices include procedural and pre Election Day checks (logic‑and‑accuracy testing, chain‑of‑custody controls, seals and cameras) and a range of audit styles (ballot comparison, batch comparison, ballot‑polling, machine‑assisted RLAs) highlighted by academics and practitioners [3] [4] [5].

1. What “auditing” usually means in modern U.S. practice

When people talk about election audits today they are primarily referring to post‑election tabulation checks that compare paper records to machine counts; these are designed to confirm that the tabulation produced the correct outcome and to restore public confidence [1] [2]. Election‑administration bodies and legal frameworks frame audits as regular, scientifically designed procedures intended to validate results rather than as ad hoc forensic probes [2] [6].

2. Risk‑limiting audits: the gold standard and how they work

Risk‑limiting audits (RLAs) are widely described as the “gold standard.” They use statistical sampling so a hand count of a relatively small, randomly selected set of ballots can give a quantified probability that the reported outcome is correct; if discrepancies are large, the sample expands and can trigger a full recount [1] [2]. States and officials conduct RLAs publicly and sometimes livestream selection procedures; Pennsylvania described using random draws and hand‑tallying selected batches to compare against machine totals [7] [2].

3. Variants of RLAs and sample strategies

Researchers identify four major RLA methods: ballot comparison, batch comparison, ballot‑polling, and machine‑assisted audits. The most efficient comparison audits make use of cast‑vote records (CVRs) that map electronic records to individual paper ballots or batches, enabling targeted checks [3] [5]. The choice of method depends on voting technology, availability of CVRs, and the margin in the contest being audited [3] [8].

4. Pre‑ and procedural audits: stopping problems before they reach totals

Audits aren’t only post‑count. Election integrity practice includes pre‑election logic‑and‑accuracy testing of voting equipment, procedural audits of voter registration and ballot‑handling, and checks on chain‑of‑custody and ballot management to prevent tampering or error from occurring in the first place [3] [4] [9]. Michigan’s post‑election reporting highlighted thousands of procedural and ballot audits covering all voting methods to confirm officials followed required procedures [9].

5. Security measures that surround auditing work

Physical and technical safeguards—locks, tamper‑evident seals, security cameras, and cybersecurity controls—are standard complements to auditing because audits can only verify what remains available and untampered [4]. Federal and state guidance emphasizes these measures so that paper records exist and are preserved for reliable audits [4] [5].

6. Who runs audits and why funding and independence matter

Bipartisan guidance and policymakers stress that audits should be run by election officials, publicly funded, and transparent; outside actors or partisan funding introduce credibility problems because audits are inherently governmental functions [6]. The Brennan Center and others argue audits help restore public confidence and must be accompanied by legal and institutional safeguards to prevent partisan interference [10] [1].

7. Areas of debate and limits in current reporting

Scholars and practitioners note that while RLAs are well researched, election audit research is still developing and some types of “forensic audits” promoted by certain activists have not been demonstrated to meet established audit standards [3]. Available sources do not mention specific technical claims sometimes circulated about how any single audit method can detect every kind of fraud or manipulation; instead, reports emphasize probabilistic guarantees and the need for paper records and appropriate sampling [3] [5].

8. Practical takeaway for those demanding verification

If you want verifiable counts, the consensus advice in the literature and from election authorities is to require voter‑verifiable paper records, implement RLAs with clear public procedures, preserve ballots and manifests under tamper‑resistant safeguards, and ensure audits are run by nonpartisan election officials with transparent reporting [11] [2] [6]. These steps together deliver statistical assurance about outcomes and the institutional trust that audit designers and policymakers seek [1] [6].

Limitations: this analysis cites public guidance, state examples, and academic syntheses from the provided sources; it does not evaluate individual audit implementations beyond the published descriptions and does not include reporting outside the supplied documents [3] [7] [2].

Want to dive deeper?
What is the difference between risk-limiting audits and full hand recounts?
How do risk-limiting audits determine the sample size and which ballots to check?
What legal and logistical challenges do post-election audits face in the United States?
Which organizations and tools provide open-source software for ballot auditing?
How have high-profile elections changed audit practices since 2020?