Английская Википедия:Electronic voting in the United States

Материал из Онлайн справочника
Перейти к навигацииПерейти к поиску

Шаблон:Short description Шаблон:Use mdy dates

Файл:2018 Ballots being counted in Santa Clara County.webm
Counting ballots by an optical scanner, San Jose, California, 2018

Шаблон:Politics of the United States Electronic voting in the United States involves several types of machines: touchscreens for voters to mark choices, scanners to read paper ballots, scanners to verify signatures on envelopes of absentee ballots, and web servers to display tallies to the public. Aside from voting, there are also computer systems to maintain voter registrations and display these electoral rolls to polling place staff.

Most election offices handle thousands of ballots, with an average of 17 contests per ballot,[1] so machine-counting can be faster and less expensive than hand-counting.

Voluntary guidelines

Шаблон:Main The Election Assistance Commission (EAC) is an independent agency of the United States government which developed the 2005 Voluntary Voting System Guidelines (VVSG).[2] These guidelines address some of the security and accessibility needs of elections. The EAC also accredits three test laboratories which manufacturers hire to review their equipment. Based on reports from these laboratories the EAC certifies when voting equipment complies with the voluntary guidelines.[3]

Twelve states require EAC certification for machines used in their states. Seventeen states require testing by an EAC-accredited lab, but not certification. Nine states and DC require testing to federal standards, by any lab. Four other states refer to federal standards but make their own decisions. The remaining eight states do not refer to federal standards.[4]

Certification takes two years, costs a million dollars, and is needed again for any equipment update, so election machines are a difficult market.[5]

A revision to the guidelines, known as the VVSG 1.1, was prepared in 2009 and approved in 2015.[2] Voting machine manufacturers can choose which guidelines they follow.[6] A new version has been written known as the VVSG 2.0 or the VVSG Next Iteration, which is being reviewed.[2]

Optical scan counting

Шаблон:Further

Файл:Black line on scanned ballot.png
Scanner marked multiple candidates with black line

In an optical scan voting system, each voter's choices are marked on one or more pieces of paper, which then go through a scanner. The scanner creates an electronic image of each ballot, interprets it, creates a tally for each candidate, and usually stores the image for later review.

The voter may mark the paper directly, usually in a specific location for each candidate, then mail it or put it in a ballot box.

Or the voter may select choices on an electronic screen, which then prints the chosen names, usually with a bar code or QR code summarizing all choices, on a sheet of paper to put in the scanner.[7] This screen and printer is called an electronic ballot marker (EBM) or ballot marking device (BMD), and voters with disabilities can communicate with it by headphones, large buttons, sip and puff, or paddles, if they cannot interact with the screen or paper directly. Typically the ballot marking device does not store or tally votes. The paper it prints is the official ballot, put into a scanning system which counts the barcodes, or the printed names can be hand-counted, as a check on the machines.[8]

Most voters do not look at the machine-printed paper to ensure it reflects their choices. When there is a mistake, an experiment found that 81% of registered voters do not report errors to poll workers.[9] No state requires central reporting of errors reported by voters, so the occasional report cannot lead to software correction. Hand-marked paper ballots more clearly have been reviewed by voters, but some places allow correction fluid and tape so ballots can be changed later.[10]

Two companies, Hart and Clear Ballot, have scanners which count the printed names, which voters had a chance to check, rather than bar codes and QR codes, which voters are unable to check.[11] When scanners use the bar code or QR code, the candidates are represented in the bar code or QR code as numbers, and the scanner counts those codes, not the names. If a bug or hack makes the numbering system in the ballot marking device different from the numbering system in the scanner, votes will be tallied for the wrong candidates.[11] This numbering mismatch has appeared with direct recording electronic machines (below).[12]

Errors in ballot marking devices

Ballot marking devices display contests and candidates on a screen where voters can make, change and check selections before printing the choices on paper to put in a ballot box. The election worker provides a code for each voter, to tell the machine what contests that voter may vote on. Contests presented to voters depend on the district boundaries they live in.

  • In a 2023 election in Northampton County, PA, misprogramming switched text on paper between two judge retention contests, so a vote to remove or retain the first was labeled with the name of the second, and vice versa. The county briefly changed to hand-marked paper ballots, but ran out, and went back to the mislabeled BMDs. The county and court changed instructions throughout the day.[13]
  • In a 2022 election in Marietta, GA, up to 157 voters were presented lists of contests which were partly in error, due to recent changes in district boundaries.[14]
  • In a 2019 election in Philadelphia, PA, 40% of polling locations had problems with BMDs, including "touchscreens that were hypersensitive or that froze; paper voting receipts getting jammed in the machines; and panels opening on some machines to expose the equipment’s electronic controls."[15][16]

Errors in optical scans

Some scanners have a row of photo-sensors which the paper ballot passes by, and they record light and dark pixels from the ballot. Other scanners work by scanning the ballot to create an electronic image (i.e. a picture) of the ballot. Then the resulting image (picture) is analyzed by internal software to discern what votes were cast. In these types of vote tabulators, any defect in the scanning apparatus, such as dirt, scratches on the lens, or chads of paper, may mar the image of the ballot. These types of defects may produce long black lines, or white lines in the ballot image, which then may be misread by the software as an undervote (no votes for anyone), or as an overvote (a vote for every candidate).[17][18][19] Some offices blow compressed air over the scanners after every 200 ballots to remove dust.[20]

Software can miscount or fail to count. If it fails or miscounts drastically enough, people notice and check. Errors can happen in the scanner or at the ballot printer. Staff rarely identify the person who caused an error, and assume it was accidental, not a hack.

  • In a 2022 election in DeKalb County, GA, a candidate who actually won appeared to lose, after votes were not counted for her in some precincts, because another candidate withdrew, and programming did not categorize votes correctly.[21][22]
  • in a 2022 election in Clackamas County, OR, scanners could not read more than 100,000 ballots on which the ballot printing company had printed a blurred bar code. The ballots needed to be hand-copied by teams of two onto correctly printed ballots. The problem was discovered May 3, for the May 17 election, and was not corrected until after the election.[23][24][25]
  • in a 2022 election in Lancaster County, PA, scanners could not read 22,000 ballots on which the ballot printing company had put the wrong identification code. The ballots were hand-copied by teams of three onto correctly printed ballots. The state does not let mailed ballots be scanned before election day, so the problem was only discovered on election day.[26][27]
  • in a 2021 election in Williamson, TN, precinct scanners had two errors: They misread QR codes, mistakenly classifying some ballots as provisional and not to be tallied, then kept that not-to-be tallied classification for later ballots, so large numbers of ballots were not included in precinct reports at some precincts. They were re-scanned correctly on a central scanner and checked by a hand-tally.[28] The county rented another brand for the 2022 elections.[29]
  • In a 2021 primary in New York City, 135,000 test ballots were not removed from the database and were included in preliminary counts for the mayoral primary. They were discovered because totals were higher than the number of voters, and corrected by removing them from the count.[30][31]
  • in a 2021 election in Lancaster County, PA, scanners could not read 12,300 ballots on which the ballot printing company had put the wrong identification code.[26][27]
  • in 2020 elections in Collier and Volusia Counties, FL, the election's optical scanners mis-interpreted voters' marks on 0.1% and 0.2% of ballot sheets respectively. These were not enough to change any outcomes, and involved voters' marks which barely touched the ovals intended to record votes. They were discovered by independent software re-examining all the ballot images.[32]
  • in a 2020 election in Antrim County, MI, last minute updates to some ballots were not applied to all scanners, so the scanners had inconsistent numeric codes for different candidates and styles of ballots, causing errors of thousands of votes. Corrections happened in stages, leading to less and less confidence in the results.[33] Results were eventually confirmed by a hand count.[34]
  • In a 2020 election in Windham, New Hampshire, fold lines in the wrong places and dust on scanner sensors caused many fold lines to count as votes.[35]
  • In a 2020 election in Baltimore, Maryland, the private company which printed ballots shifted the location of some candidates on some ballots up one line, so the scanner looked in the wrong places on the paper and reported the wrong numbers. It was caught because a popular incumbent got implausibly few votes, and corrected by hand-copying mailed ballots onto well-formatted ballots.[36]
  • In a 2019 election in Northampton county, Pennsylvania, the software under-counted one candidate by 99%, reporting 164 votes, compared to 26,142 found in a subsequent hand-count, which changed the candidate's loss to a win.[37]
  • In 2018 scanners in various states had problems from humidity, rejecting too many ballots, rejecting staff passwords, delivery to the wrong locations, broken machines, power outages, screen calibration shifting votes to other candidates, and broken cartridges to start machines.[38]
  • In a 2018 New York City election when the air was humid, ballots jammed in the scanner, or multiple ballots went through a scanner at once, hiding all but one.[39]
  • In a 2016 Maryland election, a comparison of two scanning systems on the same ballots revealed that (a) 1,972 ballot images were incorrectly left out of one system, (b) one system incorrectly ignored many votes for write-in candidates,[40] (c) shadows from paper folds were sometimes interpreted as names written in on the ballot, (d) the scanner sometimes pulled two ballots at once, scanning only the top one, (e) the ballot printers sometimes left off certain candidates, (f) voters often put a check or X instead of filling in an oval, which software has to adapt to, and (g) a scratch or dirt on a scanner sensor put a black line on many ballot images, causing the appearance of voting for more than the allowed number of candidates, so those votes were incorrectly ignored.[17][18]
  • In 2016 Wisconsin elections statewide, some voting machines did not detect some of the inks used by voters.[41][42]
  • In a 2016 Rhode Island election, machines were misprogrammed with only one ballot style, though there were two. Results were surprising enough so officials investigated and found the error.[43][42]
  • In a 2014 Stoughton, Wisconsin, election, all voters' choices on a referendum were ignored, because the scanner was programmed to look in the wrong spot on the ballot. It was corrected by a hand count.[20]
  • In a 2012 Palm Beach County, Florida, election, votes in four Wellington City contests were reported for a different contest, causing the wrong winners to be certified in two of the contests. The problem did not occur in the county's other 15 municipalities.[44][45]
  • In a 2010 New York election, 20,000 votes for governor and 30,000-40,000 votes for other offices were ignored, because the scanners overheated and disqualified the ballots by reading multiple votes in races where voters had properly only voted once.[46][47][48]
  • Errors from 2002 to 2008 were listed and analyzed by the Brennan Center for Justice in 2010.[49]
  • Errors before 2006 were listed by the Electronic Frontier Foundation in 2006.[50]
  • In a 2004 Yakima, Washington, election 24 voters' choices on 4 races were ignored by a faulty scanner which created a white streak down the ballot.[51]
  • In a 2004 Medford, Wisconsin, election, all 600 voters who voted a straight party ticket had all their votes ignored, because the manufacturer forgot to program the machines for a partisan election.[52] Election officials did not notice any problem. The consultant who found the lost 600 voters also reported a Michigan precinct with zero votes, since staff put ballots in the scanner upside down.
  • In a 2000 Bernalillo County (Albuquerque area), New Mexico, election, a programming error meant that straight-party votes on paper ballots were not counted for the individual candidates. The number of ballots was thus much larger than the number of votes in each contest. The software was fixed, and the ballots were re-scanned to get correct counts.[53][54]
  • In the 2000 Florida presidential race the most common optical scanning error was to treat as an overvote a ballot where the voter marked a candidate and wrote in the same candidate.[55]
  • Researchers find security flaws in all election computers, which let voters, staff members or outsiders disrupt or change results, often without detection.[56]
  • Security reviews and audits are discussed below.

Recreated ballots

Recreated ballots are paper[57] or electronic[58] ballots created by election staff when originals cannot be counted for some reason. Reasons include tears, water damage, folds which prevent feeding through scanners and voters selecting candidates by circling them or other abnormal marks.[59] Reasons also include citizens abroad who use the Federal Write-In Absentee Ballot because of not receiving their regular ballot in time. As many as 8% of ballots in an election may be recreated.[58]

When auditing an election, audits are done with the original ballots, not the recreated ones, to catch mistakes in recreating them.

Cost of scanning systems

If most voters mark their own paper ballots and one marking device is available at each polling place for voters with disabilities, Georgia's total cost of machines and maintenance for 10 years, starting 2020, has been estimated at $12 per voter ($84 million total). Pre-printed ballots for voters to mark would cost $4 to $20 per voter ($113 million to $224 million total machines, maintenance and printing). The low estimate includes $0.40 to print each ballot, and more than enough ballots for historic turnout levels. The high estimate includes $0.55 to print each ballot, and enough ballots for every registered voter, including three ballots (of different parties) for each registered voter in primary elections with historically low turnout.[60][61] The estimate is $29 per voter ($203 million total) if all voters use ballot marking devices, including $0.10 per ballot for paper.

The capital cost of machines in 2019 in Pennsylvania is $11 per voter if most voters mark their own paper ballots and a marking device is available at each polling place for voters with disabilities, compared to $23 per voter if all voters use ballot marking devices.[62] This cost does not include printing ballots.

New York has an undated comparison of capital costs and a system where all voters use ballot marking devices costing over twice as much as a system where most do not. The authors say extra machine maintenance would exacerbate that difference, and printing cost would be comparable in both approaches.[63] Their assumption of equal printing costs differs from the Georgia estimates of $0.40 or $0.50 to print a ballot in advance, and $0.10 to print it in a ballot marking device.[60]

Direct-recording electronic counting

Шаблон:See

Файл:Paper roll with votes from numerous voters, on iVotronic election computer.png
Roll of paper from direct-recording machine, with votes from numerous voters, Martinsburg, West Virginia, 2018

A touch screen displays choices to the voter, who selects choices, and can change their mind as often as needed, before casting the vote. Staff initialize each voter once on the machine, to avoid repeat voting. Voting data and ballot images are recorded in memory components, and can be copied out at the end of the election.

The system may also provide a means for communicating with a central location for reporting results and receiving updates,[64] which is an access point for hacks and bugs to arrive.

Some of these machines also print names of chosen candidates on paper for the voter to verify. These names on paper can be used for election audits and recounts if needed. The tally of the voting data is stored in a removable memory component and in bar codes on the paper tape. The paper tape is called a Voter-verified paper audit trail (VVPAT). The VVPATs can be counted at 20–43 seconds of staff time per vote (not per ballot).[65][66]

For machines without VVPAT, there is no record of individual votes to check.

Errors in direct-recording electronic voting

Файл:2004 us voting machine problems.png
2004 voting machine problems. Red=100+, Orange=10-99, Yellow=1-9, Gray=0

This approach can have software errors. It does not include scanners, so there are no scanner errors. When there is no paper record, it is hard to notice or research most errors.

  • The only forensic examination which has been done of direct-recording software files was in Georgia in 2020, and found that one or more unauthorized intruders had entered the files and erased records of what it did to them. In 2014–2017 an intruder had control of the state computer in Georgia which programmed vote-counting machines for all counties. The same computer also held voter registration records. The intrusion exposed all election files in Georgia since then to compromise and malware. Public disclosure came in 2020 from a court case.[67][68][69] Georgia did not have paper ballots to measure the amount of error in electronic tallies. The FBI studied that computer in 2017, and did not report the intrusion.[70][67]
  • A 2018 study of direct-recording voting machines (iVotronic) without VVPAT in South Carolina found that every election from 2010 to 2018 had some memory cards fail. The investigator also found that lists of candidates were different in the central and precinct machines, so 420 votes which were properly cast in the precinct were erroneously added to a different contest in the central official tally, and unknown numbers were added to other contests in the central official tallies. The investigator found the same had happened in 2010. There were also votes lost by garbled transmissions, which the state election commission saw but did not report as an issue. 49 machines reported that their three internal memory counts disagreed, an average of 240 errors per machine, but the machines stayed in use, and the state evaluation did not report the issue, and there were other error codes and time stamp errors.[12][71]
  • In a 2017 York County, Pennsylvania, election, a programming error in a county's machines without VVPAT let voters vote more than once for the same candidate. Some candidates had filed as both Democrat and Republican, so they were listed twice in races where voters could select up to three candidates, so voters could select both instances of the same name.[72] They recounted the DRE machines' electronic records of votes and found 2,904 pairs of double votes.[73]
  • In a 2015 Memphis, Tennessee, city election, the central processing system lost 1,001 votes which showed on poll tapes posted at precincts: "at Unity Christian ... precinct's poll tape ... 546 people had cast ballots ... Shelby County's first breakdown of each precinct's voting ... for Unity Christian showed only 330 votes. Forty percent of the votes had disappeared ... At first it looked like votes were missing from not just one precinct but 20. After more investigation, he appeared to narrow that number to four ... In all, 1,001 votes had been dropped from the election night count."[74][75]
  • In a 2012 Shelby County, Tennessee, (Memphis area) election 801 voters signed into a polling place, and only 293 votes were recorded. In another precinct 20 extra memory cards were uploaded before polls closed. The central election management system let the number of memory cards be changed by hand, and reducing it could erase memory cards which had been loaded.[75]
  • In a 2011 Fairfield Township, New Jersey, election a programming error in a machine without a VVPAT gave two candidates low counts. They collected more affidavits by voters who voted for them than the computer tally gave them, so a judge ordered a new election which they won.[76]
  • Errors from 2002 to 2008 were listed and analyzed by the Brennan Center for Justice in 2010.[49]
  • Errors before 2006 were listed by the Electronic Frontier Foundation in 2006.[50]
  • In 2004, 4,812 voting machine problems were reported to a system managed by Verified Voting and Computer Professionals for Social Responsibility.[77][78] Most of these problems were in states which were primarily using direct-recording electronic voting equipment as of 2006.[79]
  • Security reviews and audits are discussed below.

Online, email and fax voting

Шаблон:See Email, fax, phone apps, modems, and web portals transmit information through the internet, between computers at both ends, so they are subject to errors and hacks at the origin, destination and in between.

Election machines online

As of 2018–19, election machines are online, to transmit results between precinct scanners and central tabulators, in some counties in Florida, Illinois, Indiana, Iowa, Michigan, Minnesota, Rhode Island, Tennessee and Wisconsin.[80]

Receiving ballots online

In many states, voters with a computer and printer can download a ballot to their computer, fill it out on the computer, print it and mail it back. This "remote access vote by mail" (RAVBM) avoids transmitting votes online, while letting distant voters avoid waiting for a mailed ballot, and letting voters with disabilities use assistive technologies to fill in the ballot privately and independently, such as screen readers, paddles or sip and puff if they already have them on their computer.[81] The voter also receives a form with tracking numbers and a signature line, to mail back inside or outside the envelope with the ballot, so staff can review eligibility of the voter and prevent multiple votes from the same voter. Many states accept mailed ballots after election day, to allow time for mail from distant voters to arrive.[82] The printed ballot may show just the choices and a bar code or QR code, not all the candidates and unvoted contests.

The voter's choices are not put online, which is an advantage for the voter's privacy. However the system does not work for people who have no printer or no computer. For people, such as soldiers, with a shared computer or printer, votes can be divulged by keystroke logging, by the print queue, or by people seeing ballots on the printer. Alternatives for distant voters are to get a paper ballot from the election office or the Federal Write-In Absentee Ballot.[83] Alternatives for local voters with disabilities are to use a ballot marking device (BMD) at a polling place, if they can get there, or have election staff bring a BMD and ballot box to the voter.[84] The voter's printer does not necessarily use the weight and size of paper expected by the election scanners, so, after separating ballot from identifiers, staff copy the voter's choices onto a standard ballot for scanning.[85] This copying has scope for error.

In California people send a signed application by mail, email or fax and receive a code by email, so there are signature checks both on the application and when the ballot envelope arrives.[86] In Washington, people access the ballot electronically with name and birth date, so signature checks when the ballot envelope arrive are the method to authenticate ballots.[87]

Individuals voting online

States which allow individual voters to submit completed ballots electronically in the United States are:[88]

  • Hawaii allows email voting by any permanent absentee voter who has not received a ballot by five days before an election
  • Idaho allows email and fax voting in declared emergencies
  • Louisiana allows fax voting for voters with a disability
  • Utah allows email and fax voting for those with disabilities
  • Other states have tried or considered software, with problems discussed below.

The Uniformed and Overseas Citizens Absentee Voting Act (UOCAVA) lets overseas citizens and all military and merchant marine voters get ballots electronically (email, fax, or web site). They then submit ballots by mail to 19 states. Seven states allow submission through secure web sites: AL, AZ, CO (if needed), MA, MI,[89] NC, ND, and WV. These seven and the remaining 25 states have a mix of rules allowing email or fax:[88] AK, CA, DE, DC, FL, HI, IN, IA, KS, LA, ME, MS, MO, MT, NE, NV, NJ, NM, OK, OR, RI, SC, TX (for danger, combat zones or space[90][91]), UT, and WA.[88] The Federal Voting Assistance Program converts emails to fax at voter request, so states which require fax receive ballots which started as emails.[92]

Problems in online voting

Security experts have found security problems in every attempt at online voting,[93] [94] [95] [96] including systems in Australia,[97] Estonia,[98][99] Switzerland,[100] Russia,[101][102][103] and the United States.[104][93] [105]

in 2019-2020 researchers found insecurities in online voting systems from Voatz,[104] [106] [107] and Democracy Live.[93][108]

In 2010, graduate students from the University of Michigan hacked into the District of Columbia online voting systems during an online voting mock test run and changed all the cast ballots to cater to their preferred candidates. This voting system was being tested for military voters and overseas citizens, allowing them to vote on the Web, and was scheduled to run later that year. It only took the hackers, a team of computer scientists, thirty-six hours to find the list of the government's passwords and break into the system.[109]

In March 2000 the 2000 Arizona Democratic presidential primary internet election was conducted over the internet using the private company votation.com.[110] Each registered member of the party received a personal identification number in the mail. They could vote in person or over the internet, using their PIN and answering two questions such as date and place of birth. During the election older browsers failed, but no hacks were identified.[111]

Electronic processing of postal and absentee ballots

Файл:2018 Vote by mail envelopes being sorted in Santa Clara County.webm
Sorting vote by mail envelopes, San Jose, Santa Clara County, California, 2018
Файл:Postal ballots rejection rates.png
Postal ballots, rejection rates by state, US, November 2016, except Georgia 2018

Шаблон:Main Checking signatures on envelopes of absentee ballots is hard, and is often computerized in jurisdictions with many absentee ballots. The envelope is scanned, and the voter's signature on the outside of the envelope is instantly compared with one or more signatures on file. The machine sets aside non-matches in a separate bin. Temporary staff then double-check the rejections, and in some places check the accepted envelopes too.[112]

Error rates of computerized signature reviews are not published. "A wide range of algorithms and standards, each particular to that machine's manufacturer, are used to verify signatures. In addition, counties have discretion in managing the settings and implementing manufacturers' guidelines… there are no statewide standards for automatic signature verification… most counties do not have a publicly available, written explanation of the signature verification criteria and processes they use"[112]

Handwriting experts agree "it is extremely difficult for anyone to be able to figure out if a signature or other very limited writing sample has been forged".[113] The National Vote at Home Institute reports that 17 states do not mandate a signature verification process.[114] The Election Assistance Commission says that machines should be set only to accept nearly perfect signature matches, and humans should doublecheck a sample, but EAC does not discuss acceptable error rates or sample sizes.[115]

In the November 2016 general election, rejections ranged from none in Alabama and Puerto Rico, to 6% of ballots returned in Arkansas, Georgia, Kentucky and New York.[116] [117] Where reasons for rejection were known, in 2018, 114,000 ballots arrived late, 67,000 failed signature verification, 55,000 lacked voter signatures, and 11,000 lacked witness signatures in states which require them.[118] The intent of the signature verification step was to catch and reject forged signatures on ballot envelopes.[119][120]

The highest error rates in signature verification are found among lay people, higher than for computers, which in turn make more errors than experts.[121] Researchers have published error rates for computerized signature verification. They compare different systems on a common database of true and false signatures. The best system falsely rejects 10% of true signatures, while it accepts 10% of forgeries. Another system has error rates on both of 14%, and the third-best has error rates of 17%.[122][123] It is possible to be less stringent and reject fewer true signatures, at the cost of also rejecting fewer forgeries, which means erroneously accepting more forgeries.[124] Vendors of automated signature verification claim accuracy, and do not publish their error rates.[125][126][127][128]

Voters with short names are at a disadvantage, since even experts make more mistakes on signatures with fewer "turning points and intersections".[129]

E-pollbooks

Шаблон:Main

An electronic pollbook, also known as an e-pollbook, is a combination of hardware and software which maintains voter register information at a polling place to check if each voter is registered and has not already voted in the election. When voters have a choice of multiple vote centers where they may vote, e-pollbooks communicating over the internet can prevent a voter from voting more than once.[130]

In 2022 Williamson County TX found two problems: that its use of e-poll books sometimes assigned the wrong ballot style to voters, so they voted on contests outside their area, and did not vote on contests in their own area; and that some ballots did not display the voters' precincts.[131]

State and local websites for election results

Election offices display election results on the web by transferring USB drives between offline election computers, and online computers which display results to the public. USB drives can take infections from the online computers to the election computers.[132][133] Local governments communicate electronically with their state governments so the state can display results, with the result that problems at the state level can affect all or many local offices.

Election-reporting websites run software to aggregate and display results. These have had programming errors which showed erroneous partial results during the evening,[134] and the wrong winner.[135] Local officials can change results. A Virginia official was charged with changing results by herself in the state's VERIS system. All charges were dropped when witnesses changed their stories, since computer logs did not prove whether changes were or were not made.[136]

Before the 2016 general election, Russians gained access to at least one employee's account[137] at a vendor which manages election-reporting websites.[138] During the 2018 general election, a hacker in India gained administrative access to the Alaska election-reporting website.[139][140]

Studies by McAfee and ProPublica in 2020 found that most election websites have inadequate security. McAfee analyzed swing states.[141] ProPublica analyzed Super Tuesday states.[142] They found many offices using outdated, insecure, dangerous and inappropriate software, including unsupported operating systems, and using the same few web hosts, which they said is dangerous for critical infrastructure, since finding a flaw in one can lead to access to them all.[142] They criticized offices for not using https encryption, and for public sitenames ending in .com or .org, since it leads voters to trust sites which are not .gov, and voters can easily be tricked by a similar name.[143]

Election security

Файл:US voters by county.png
Biggest counties have a large share of their states' votes, 2016

Шаблон:Main

Decentralized system

In 2016 Homeland Security and the Director of National Intelligence said that United States elections are hard to hack, because they are decentralized, with many types of machines and thousands of separate election offices operating under 51 sets of state laws.[144][145] Others have made similar statements.[146]

An official at the Center for Strategic and International Studies said a nation state would target hacks in key counties.[147] A McAfee expert said decentralization makes defense hard and for "a very determined group, trying to compromise this system, I think it ends up playing more into their favor than against them."[147] Each city or county election is run by one office, and a few large offices affect state elections. County staff cannot in practice defend against foreign governments.[148]

Security reviews

The Brennan Center summarized almost 200 errors in election machines from 2002 to 2008, many of which happened repeatedly in different jurisdictions, which had no clearinghouse to learn from each other.[49] More errors have happened since then. Cleveland State University listed formal studies of voting systems done by several groups through 2008.[149]

Machines in use are not examined to determine if they have been hacked, so no hacks of machines in use have been documented. Researchers have hacked all machines they have tried, and have shown how they can be undetectably hacked by manufacturers, election office staff, pollworkers, voters and outsiders and by the public.[56] Vulnerabilities identified at the 2019 DEFCON Las Vegas hackers convention had been previously noted and "included poor physical security protections that could allow undetected tampering; easily guessable hard-coded system credentials; potential for operating system manipulations; and remote attacks that could compromise memory or integrity checks or cause denial of service."[150] The public can access unattended machines in polling places the night before elections.[151] Some of the hacks can spread among machines on the removable memory cards which tell the machines which races to display, and carry results back to the central tally location.

The CEO of Free and Fair, an open source vendor, said the cheapest way to improve security is for each election office to hire a computer student as a white hat hacker to conduct penetration tests.[152]

Security reviews of election machines
State Year Products reviewed Findings
Texas 2020 ES&S Texas annually reviews software.[153] In 2020 the review noted that procedures did not ensure the ES&S software in use was the same as the software approved by the Election Assistance Commission.[154]
California 2020 Many State and contractor evaluations of all election machines used in the state[155]
California 2007 "top-to-bottom review" of security of all electronic voting systems in the state, including Diebold Election Systems, Hart InterCivic, Sequoia Voting Systems and Elections Systems and Software.[156] August 2 report by computer security experts from the University of California found flaws in voting system source code. On July 27 "red teams" reported on "worst case" Election Day scenarios, where they identified vulnerabilities to tampering or error. The Top to Bottom review also included a comprehensive review of manufacturer documentation as well as a review of accessibility features and alternative language requirements.

The California security experts found significant security flaws in all of the manufacturers' voting systems, flaws that could allow a single non-expert to compromise an entire election.[157] The July and August reports found that three of the tested systems fell far short of the minimum requirements specified in the EAC 2005 Voluntary Voting System Guidelines (VVSG). On August 3, 2007, Bowen decertified machines that were tested, and also the ES&S InkaVote machine, which was not included in the review because the company submitted it past the deadline for testing. Some of the systems tested were conditionally recertified with new stringent security requirements imposed.[158] The companies in question had until the February 2008 California Presidential Primaries to fix their security issues and ensure that election results could be closely audited.

California 2007 Hart eSlate voting system Researchers at UC Davis, and Yolo County reported on security flaws.[159]
California 2004 Diebold Researchers evaluated software because of Harri Hursti's discovery of their hackability in Leon County FL.[160]
Michigan 2017 ES&S[161] and Dominion Voting Systems[162] Provide results to election officials in Excel without hash values, so malware (or unsupervised staff) can change results before publication. Michigan requires election systems to provide results in spreadsheet format; it neither requires nor forbids hash values.[161]
Florida 2008 online voting from Scytl,[105]
Florida 2007 in-person voting from Diebold,[163][164] and ES&S iVotronic.[165]
Florida 2004 ES&S iVotronic machines and central tabulators[166]
Ohio 2007 comprehensive review of Ohio's electronic voting technology from Election Systems & Software, Hart InterCivic, and Premier Election Systems.[167] Three teams of security researchers, based at the Pennsylvania State University, the University of Pennsylvania, and WebWise Security, Inc., conducted the security reviews. The teams had access to voting machines and software source code from the three vendors and performed source code analysis and security penetration testing with the aim of identifying security problems that might affect the integrity of elections that use the equipment.

The 2007 Ohio report noted that all Шаблон:Blockquote

Thus election machines are subject to "class breaks", which are attacks, deliverable by annual updates, against the underlying operating systems and drivers.[168] The 2016 federal certification of ES&S notes that it uses Windows 7, Windows Server 2008, Excel 2007, Adobe Acrobat version 9.0 (support ended 2013), WSUS Offline Update Utility 8.8 (issued 2013[169]) and other off the shelf software.[170]

Ohio 2007 Diebold's Election management software, GEMS[171]
Ohio 2003 AccuVote-TS (Diebold), iVotronic (ES&S), eSlate 3000 (Hart), AVC Edge (Sequoia), and their tabulation systems.[172]
Connecticut 2007 Diebold voting machine and server[173]
New Jersey 2006 Premier Election Solutions (formerly Diebold Election Systems) AccuVote-TSx Princeton University computer scientists studied security of the voting system for a group of New Jersey counties. Their results showed that the AccuVote-TSx was insecure and could be "installed with vote-stealing software in under a minute". The scientists also said that machines can transmit computer viruses from one to another "during normal pre- and post-election activity".[175]
Arizona 2005 ES&S Optech 4C scanner/tabulators A state Senator had a consultant do an evaluation[176]
Maryland 2004 Diebold touchscreen voting system[177]

Audits

Файл:State audits.png
Some states check election machines' counts by hand

Шаблон:Main

Five states check all contests by hand tallies in a small percent of locations, AK, CA, PA, UT, WV, though California excludes about half the ballots, the ones counted after election day, and Alaska excludes small precincts. Two states check all contests by machines independent of the election machines, in a small percent of locations, NY, VT. Seventeen states check one or a few contests by hand, usually federal races and the governor; most local contests are not checked. Four states reuse the same machines or ballot images as the election, so errors can persist, CT, IL, MD, NV. Sixteen states do not require audits, or only in special circumstances. In seven states many voters still lack paper ballots, so audits are not possible. IN, KY, LA, MS, NJ, TN, TX.[178]

Even where audits are done, no state has adequate security on the paper ballots, so they can be damaged to impede audits, or altered to match erroneous machine tallies.[179] Even insiders have breached security.[180][181]

Public attitudes

The Pew Research Center found in October 2018 wide mistrust of election security in both parties, especially among Democrats

  • 8% of voters were "very confident that election systems are secure from hacking and other technological threats".
  • 37% were "somewhat confident", and the remaining 55% were not confident
  • 13% of Republicans were very confident, and 41% were not confident
  • 4% of Democrats were very confident, and 66%% were not confident[182]

An MIT professor's survey found that Republicans think domestic hackers are more likely than foreigners; Democrats think the opposite.[183]

Stanford and Wisconsin researchers in 2019 found that only 89% of voters disapprove if a foreign country would "hack into voting machines and change the official vote count to give [a] candidate extra votes" and the candidate wins. This 89% disapproval is not much more than the 88% who disapprove of a foreign country making campaign contributions and 78-84% against them spreading lies. Only 73-79% disapprove if their party got help, while 94-95% disapprove of the other party getting help. If a foreign country thought about interfering, but did not, 21% distrust the results anyway. This rises only to 84% distrusting final results after a foreign country hacked and changed results.[184][185]

For any of the foreign actions (hacks, contributions or lies), 72% of voters support economic sanctions, 59% support cutting diplomatic relations, 25% support a military threat, and 15% support a military strike. There was less support for action, by 4-20 percentage points, if the foreign country helped one's own party win, so the researchers point out that retaliation is unlikely, since there is little support for it in a winning party. Deep investigation creates more certainty about who is to blame, which they find raises support for retaliation very little. They randomly listed China, Pakistan or Turkey as the interfering country, and do not report any different reactions to them.[185]

A Monmouth University poll in May 2019 found that 73% thought Russia interfered in the 2016 election (not necessarily by hacking), 49% thought it damaged American democracy a lot, 57% thought Russia interfered in the 2018 election, and 60% thought the U.S. government is not doing enough to stop it. Margin of error is ±3.5%.[186]

Election companies

Many election companies are members of the U.S. Cybersecurity and Infrastructure Security Agency's Election Infrastructure Subsector Council.[187]

Three vendors sell most of the machines used for voting and for counting votes. As of September 2016, the American Election Systems & Software (ES&S) served 80 million registered voters, Canadian Dominion Voting Systems 70 million, American Hart InterCivic 20 million, and smaller companies less than 4 million each.[5]

Three companies sell mail sorting and signature verification machines: ES&S, Runbeck and a merged company, Olympus/Vantage/Pitney Bowes/Bell & Howell.[112] In 2018 BlueCrest acquired the Pitney Bowes election business,[188] and in 2021 BlueCrest acquired Fluence,[189] which had obtained the Bell & Howell election business in 2017.[190] In 2022 the BlueCrest printing and sorting business was acquired by Corum Group.[191] Olympus[192] and Vantage[193] machines are sold by BlueCrest. Runbeck uses Vantage sorters from BlueCrest.[194]

The signature-matching software most used is from Parascript,[195] spun off from Paragraph, a Soviet-American joint venture though there are other companies.[196] Parascript had fewer errors than other software in 2010: Paracript rejected 14% of genuine signatures and accepted 8% of forgeries if they were modeled on a genuine signature.[197]

Amazon provides election websites in 40 states, including election-reporting sites in some of them.[198] A Spanish company, Scytl, manages election-reporting websites statewide in 12 U.S. states, and in another 980 local jurisdictions in 28 states.[199] Another website management company is VR Systems, active in 8 states.[200] Maryland's election website is managed by a company owned by an associate of Russian President Putin.[201]

Timeline of development

  • 1964: The Norden-Coleman optical scan voting system, the first such system to see actual use, was adopted for use in Orange County, California.[202]
  • 1974: The Video Voter, the first DRE voting machine used in a government election, developed by the Frank Thornber Company in Chicago, Illinois, saw its first trial use in 1974 near Chicago.[203]
  • Mar. 1975:The U.S. Government is given a report by Roy Saltman, a consultant in developing election technology and policies,[204] in which the certification of voting machines is analyzed for the first time.
  • August 28, 1986: The Uniformed and Overseas Citizen Absentee Voting Act of 1986 (UOCAVA) requires that U.S. states allow certain groups of citizens to register and vote absentee in elections for federal offices.[205]
  • 1990: The FEC (Federal Election Commission) released a universalized standard for computerized voting.
  • 1996: The Reform Party uses I-Voting (Internet Voting) to select their presidential candidate. This election is the first governmental election to use this method in the U.S.[206]
  • May 2002:The FEC revised the standards established for electronic voting from 1990.
  • Nov 2004: 4,438 of votes in the general election is lost by North Carolina's electronic voting machines. The machines continued to count electronic votes past the device's memory capacity and the votes were irretrievably lost.
  • Dec 2005: Black Box Voting showed how easy it is to hack an electronic voting system. Computer experts in Leon County, Fl lead a simulation where they changed the outcome of a mock election by tampering with the tabulator without leaving evidence of their actions.
  • September 13, 2006: It was demonstrated that Diebold Electronic Voting Machine can be hacked in less than a minute. Princeton's Professor of Computer Science, Edward Felten who installed a malware which could steal votes and replace them with fraudulent numbers without physically coming in contact with the voting machine or its memory card. The malware can also program a virus that can spread from machine to machine.
  • September 21, 2006: The governor of Maryland, Bob Ehrlich (R), advised against casting electronic votes as an alternative method for casting paper absentee ballots. This was a complete turn around since Maryland became one of the first states to accept electronic voting systems statewide during his term.
  • September 3, 2009: Diebold, responsible for much of the technology in the election-systems business, sells their hold to Election Systems & Software, Inc for $5 Million, less than 1/5 of its price seven years earlier.[207]
  • October 28, 2009: The federal Military and Overseas Voters Empowerment Act (MOVE) requires U.S. states to provide ballots to UOCAVA voters in at least one electronic format (email, fax, or an online delivery system).[208]
  • January 3, 2013: Voter Empowerment Act of 2013 – This act requires each U.S. state to make available public websites for online voter registration.[209]
  • Spring 2019: Department of Defense DARPA announces $10 million contract for secure, open-source election system prototypes based on the agency's SSITH secure hardware platform work: a touch screen ballot-marking device to demo at the annual DEF CON hacker conference in summer 2019 and an optical scan system to read hand-marked paper ballots targeted for DEF CON 2020.[210][211][212]

Legislation

In the summer of 2004, the Legislative Affairs Committee of the Association of Information Technology Professionals issued a nine-point proposal for national standards for electronic voting.[213] In an accompanying article, the committee's chair, Charles Oriez, described some of the problems that had arisen around the country.[214][215]

Legislation has been introduced in the United States Congress regarding electronic voting, including the Nelson-Whitehouse bill. This bill would appropriate as much as 1 billion dollars to fund states' replacement of touch screen systems with optical scan voting system. The legislation also addresses requiring audits of 3% of precincts in all federal elections. It also mandates some form of paper trail audits for all electronic voting machines by the year 2012 on any type of voting technology.[216]

Another bill, HR.811 (The Voter Confidence and Increased Accessibility Act of 2003), proposed by Representative Rush D. Holt, Jr., a Democrat from New Jersey, would act as an amendment to the Help America Vote Act of 2002 and require electronic voting machines to produce a paper audit trail for every vote. The U.S. Senate companion bill version introduced by Senator Bill Nelson from Florida on November 1, 2007, necessitates the Director of the National Institute of Standards and Technology to continue researching and to provide methods of paper ballot voting for those with disabilities, those who do not primarily speak English, and those who do not have a high literacy rating. Also, it requires states to provide the federal office with audit reports from the hand counting of the voter verified paper ballots. Currently, this bill has been turned over to the United States Senate Committee on Rules and Administration and a vote date has not been set.[217]

During 2008, Congressman Holt, because of an increasing concern regarding the insecurities surrounding the use of electronic voting technology, submitted additional bills to Congress regarding the future of electronic voting. One, called the "Emergency Assistance for Secure Elections Act of 2008" (HR5036), states that the General Services Administration will reimburse states for the extra costs of providing paper ballots to citizens, and the costs needed to hire people to count them.[218] This bill was introduced to the House on January 17, 2008.[219] This bill estimates that $500 million will be given to cover costs of the reconversion to paper ballots; $100 million given to pay the voting auditors; and $30 million given to pay the hand counters. This bill provides the public with the choice to vote manually if they do not trust the electronic voting machines.[218] A voting date has not yet been determined.

The Secure America's Future Elections Act or the SAFE Act (HR 1562) was among the relevant legislation introduced in the 115th Congress. The bill's provisions include designation of the infrastructure used to administer elections as critical infrastructure; funding for states to upgrade the security of the information technology and cybersecurity elements of election-related IT systems; and requirements for durable, readable paper ballots and manual audits of results of elections.

References

Шаблон:Reflist

Шаблон:United States elections Шаблон:Voting rights in the United States

  1. Шаблон:Cite magazine
  2. 2,0 2,1 2,2 Шаблон:Cite web
  3. Шаблон:Cite web
  4. Шаблон:Cite web
  5. 5,0 5,1 Шаблон:Cite web
  6. Шаблон:Cite web
  7. Шаблон:Cite web
  8. Шаблон:Cite news
  9. Шаблон:Cite web
  10. Шаблон:Cite web
  11. 11,0 11,1 Шаблон:Cite web
  12. 12,0 12,1 Шаблон:Cite report
  13. Шаблон:Cite web
  14. Шаблон:Cite news
  15. Шаблон:Cite news
  16. Шаблон:Cite web
  17. 17,0 17,1 Шаблон:Cite web
  18. 18,0 18,1 Шаблон:Cite web
  19. Шаблон:Cite web
  20. 20,0 20,1 Шаблон:Cite web
  21. Шаблон:Cite news
  22. Шаблон:Cite web
  23. Шаблон:Cite news
  24. Шаблон:Cite news
  25. Шаблон:Cite news
  26. 26,0 26,1 Шаблон:Cite news
  27. 27,0 27,1 Шаблон:Cite news
  28. Шаблон:Cite web
  29. Шаблон:Cite news
  30. Шаблон:Cite news
  31. Шаблон:Cite news
  32. Шаблон:Cite web
  33. Шаблон:Cite web
  34. Шаблон:Cite web
  35. Шаблон:Cite web
  36. Шаблон:Cite news
  37. Шаблон:Cite news
  38. Шаблон:Cite news
  39. Шаблон:Cite news
  40. Шаблон:Cite web
  41. Шаблон:Cite news
  42. 42,0 42,1 Шаблон:Cite web
  43. Шаблон:Cite news
  44. Шаблон:Cite news
  45. Шаблон:Cite news
  46. Шаблон:Cite news
  47. Шаблон:Cite news
  48. Шаблон:Cite web
  49. 49,0 49,1 49,2 Шаблон:Cite web
  50. 50,0 50,1 Шаблон:Cite web
  51. Шаблон:Cite web
  52. Шаблон:Cite web
  53. Шаблон:Cite news
  54. Шаблон:Cite news
  55. Шаблон:Cite web
  56. 56,0 56,1 Шаблон:Cite web
  57. "observers from both political parties there ... ballots have to be recreated in every election for a number of reasons, ranging from damaged mail-in ballots, to early voters who use pencils which can't be read by ballot tabulators." Шаблон:Cite news
  58. 58,0 58,1 "With the new digital procedure, staff will be able to fix whatever race couldn't be counted, instead of duplicating a voter's entire ballot." Шаблон:Cite news
  59. Шаблон:Cite news
  60. 60,0 60,1 Шаблон:Cite web
  61. Шаблон:Cite news
  62. Шаблон:Cite web
  63. Шаблон:Cite web
  64. Volume_I.pdf 2005 Voluntary Voting System Guidelines Шаблон:Webarchive from the U.S. Election Assistance Commission
  65. Шаблон:Cite web
  66. Шаблон:Cite web
  67. 67,0 67,1 Шаблон:Cite web
  68. Шаблон:Cite web
  69. Шаблон:Cite news
  70. Шаблон:Cite news
  71. Шаблон:Cite news
  72. Шаблон:Cite news
  73. Шаблон:Cite news
  74. Шаблон:Cite news
  75. 75,0 75,1 Шаблон:Cite web
  76. Шаблон:Cite news
  77. Шаблон:Cite web
  78. Шаблон:Cite web
  79. The following site defaults to the most recent year, and can be adjusted as early as 2006:Шаблон:Cite web
  80. Шаблон:Cite news
  81. Шаблон:Cite web
  82. Шаблон:Cite news
  83. Шаблон:Cite web
  84. Шаблон:Cite web
  85. Шаблон:Cite news
  86. Шаблон:Cite web
  87. Шаблон:Cite web
  88. 88,0 88,1 88,2 Шаблон:Cite web
  89. Шаблон:Cite news
  90. Шаблон:Cite news
  91. Шаблон:Cite news
  92. Шаблон:Cite web
  93. 93,0 93,1 93,2 Шаблон:Cite web
  94. Шаблон:Cite web
  95. "Secure Internet voting will likely not be feasible in the near future ... At the present time, the Internet (or any network connected to the Internet) should not be used for the return of marked ballots" Шаблон:Cite book
  96. "Electronic ballot return faces significant security risks to the confidentiality, integrity, and availability of voted ballots. These risks can ultimately affect the tabulation and results and, can occur at scale ... Even with ... technical security considerations, electronic ballot return remains a high-risk activity." Шаблон:Cite web
  97. Шаблон:Cite conference
  98. Шаблон:Citation
  99. "The OSCE/ODIHR EAM was made aware of a program that could, if it was running on a voter's computer, change the vote without the possibility for the voter to detect it. The case was brought to the attention of the project manager who assessed this threat to be theoretically plausible but nearly impossible to implement in reality." Шаблон:Cite web
  100. Шаблон:Cite web
  101. Шаблон:Cite news
  102. Шаблон:Cite conference
  103. Шаблон:Cite journal
  104. 104,0 104,1 Шаблон:Cite news
  105. 105,0 105,1 Шаблон:Cite web
  106. Шаблон:Cite web
  107. Шаблон:Cite news
  108. Шаблон:Cite news
  109. Шаблон:Cite news
  110. Шаблон:Cite web
  111. Шаблон:Cite web
  112. 112,0 112,1 112,2 Шаблон:Cite web
  113. Шаблон:Cite web
  114. Шаблон:Cite web
  115. Шаблон:Cite web
  116. Шаблон:Cite web
  117. Шаблон:Cite news
  118. Шаблон:Cite web
  119. Шаблон:Cite news
  120. Шаблон:Cite news
  121. Шаблон:Cite CiteSeerX
  122. These systems handle scanned ("offline") signatures from multiple people ("WI, writer-independent"). Шаблон:Cite book
  123. Шаблон:Cite journal
  124. Шаблон:Cite conference
  125. Шаблон:Cite web
  126. Шаблон:Cite web
  127. Шаблон:Cite web
  128. Шаблон:Cite web
  129. Шаблон:Cite journal
  130. Шаблон:Cite web
  131. Шаблон:Cite web
  132. Microsoft Security Intelligence Report Volume 11, January-June, 2011.
  133. Шаблон:Cite web
  134. Шаблон:Cite news
  135. Шаблон:Cite news
  136. Шаблон:Cite news
  137. Шаблон:Cite news
  138. Шаблон:Cite news
  139. Шаблон:Cite news
  140. Шаблон:Cite magazine
  141. Шаблон:Cite web
  142. 142,0 142,1 Шаблон:Cite news
  143. Шаблон:Cite news
  144. Шаблон:Cite web
  145. Шаблон:Cite news
  146. Шаблон:Cite news
  147. 147,0 147,1 Шаблон:Cite news
  148. Шаблон:Cite news
  149. Шаблон:Cite journal
  150. Lily Hay Newman. (September 26, 2019). "Some Voting Machines Still Have Decade-Old Vulnerabilities". Wired website Retrieved March 13, 2022.
  151. Шаблон:Cite web
  152. Шаблон:Cite news
  153. *ESS Шаблон:Cite web
  154. Шаблон:Cite web
  155. Шаблон:Cite web
  156. Шаблон:Cite web
  157. CA SoS Top to Bottom Review Шаблон:Webarchive Retrieved March 2, 2012
  158. Simons, Barbara. August 13, 2007. "California: The Top to Bottom Review". Шаблон:Webarchive The Voter. Retrieved November 27, 2007.
  159. Шаблон:Cite web
  160. Шаблон:Cite web
  161. 161,0 161,1 Шаблон:Cite web
  162. Шаблон:Cite web
  163. Шаблон:Cite web
  164. Шаблон:Cite web
  165. Шаблон:Cite web
  166. Шаблон:Cite web
  167. Ошибка цитирования Неверный тег <ref>; для сносок everest не указан текст
  168. Шаблон:Cite web
  169. Шаблон:Cite web
  170. Шаблон:Cite web
  171. Шаблон:Cite web
  172. Шаблон:Cite web
  173. Шаблон:Cite web
  174. Epstein's report begins on p. 85. Шаблон:Cite web
  175. Riordan, Theresa. September 13, 2006. Шаблон:Cite web Princeton University. Retrieved March 6, 2008.
  176. Шаблон:Cite web
  177. Шаблон:Cite web
  178. Шаблон:Cite news
  179. Шаблон:Cite book
  180. Шаблон:Cite news
  181. Шаблон:Cite web
  182. Шаблон:Cite web
  183. Шаблон:Cite web
  184. Шаблон:Cite journal
  185. 185,0 185,1 Шаблон:Cite web
  186. Шаблон:Cite web
  187. Шаблон:Cite web
  188. Шаблон:Cite web
  189. Шаблон:Cite web
  190. Шаблон:Cite web
  191. Шаблон:Cite web
  192. Шаблон:Cite web
  193. Шаблон:Cite web
  194. Шаблон:Cite web
  195. Шаблон:Cite web
  196. Шаблон:Cite web
  197. Шаблон:Cite web
  198. Шаблон:Cite news
  199. Шаблон:Cite news
  200. Шаблон:Cite news
  201. Шаблон:Cite news
  202. E. G. Arnold, History of Voting Systems in California Шаблон:Webarchive, California Secretary of State Bill Jones, June 1999.
  203. Douglas W. Jones and Barbara Simons, Broken Ballots, CSLI Publications, 2012; see Section 5.2, page 96.
  204. Шаблон:Cite news
  205. Шаблон:Cite web
  206. Шаблон:Cite web
  207. Шаблон:Cite web
  208. Шаблон:Cite web
  209. Шаблон:Cite web
  210. Шаблон:Cite web
  211. Шаблон:Cite web
  212. Шаблон:Cite web
  213. "Legislative Committee Resolution Awaiting BOD Approval" Шаблон:Webarchive. (July 2004). Information Executive Шаблон:Webarchive
  214. Шаблон:Cite web
  215. Шаблон:Cite web
  216. Шаблон:Cite news
  217. Шаблон:Cite web
  218. 218,0 218,1 Шаблон:Cite web
  219. Шаблон:Cite web