Election Process Protection: Location Specific Custom Study, Registration, Voting Tallying, and Recommendations


#1170777

129pages

Winter Green Research

$ 4200

In Stock

Every state, region, city, and country has election system that is unique to it. As per the local conditions, each area has its own election system. This is ideal as elections are inherently local and the reliability of voting systems will come from local involvement in the election process. The involvement from the local side should come for registration process and vote counting process for best protection and high accuracy. This is because the local people are the ideal for being independent observers.  Since watchers from both the parties are able to monitor the process themselves, the security of the voting system is high and there remains inherent transparency in this election process. There is nothing which is hidden and secret in such election processes. Increased accountability of the election process is required for protecting the democracy. The election computer systems need to be designed in a way that the vote counting and vote registration process remains protected. It is thus important to make use of high quality systems which are not vulnerable to security issues.

Political campaigning accounting for billions of dollars in spending, and domination of the news cycle (as James Michael Curley said so famously, “Just spell my name right”) get all the headlines. But what really matters in the end for the democratic process is the mechanics of running the election. We need a process that cannot be subverted. Countries, nations, states, regions, and counties need a process that counts the votes accurately and lets all qualified people vote.

Democracies need a vote counting process that makes all fraud detectable immediately as the votes are being counted, there needs to be protections built in so that all observers, including the independent media have instant confidence in the integrity of the election process.

The WinterGreen Research study is customized for each client. The breadth and depth of the laws, systems, and procedures used, the variety of voting registration systems and vote counting systems make it impossible to cover all those in depth in one study. The study gets too long. Instead this customer study is written in two weeks in response to input from a survey that collects information about the particular system being used.

Russian efforts to hack voting systems in the United States have been well publicized. What has been less apparent is the inherent vulnerabilities of many of the voting systems in the US and elsewhere. Prelude to Custom Election Process Research: James B. Comey, former director of the F.B.I. Has indicated that Russian operatives intervened in the 2016 presidential election and that it could happen again. Russian hackers are the best in the world, that is why they are so good at building computer security systems, because they know how to hacek.

Russian hackers breached Democratic email accounts; they orchestrated a hack that targeted thousands of US government state and local databases. Apparently Russian computer hacks harvested emails from the State Department and the White House. They apparently penetrated deep into the computer systems of the Joint Chiefs of Staff. The Russian effort to manipulate American politics is serious and needs to be addressed by the people responsible for running elections in the US.

Graham Allison, a longtime Russia scholar at Harvard, said, "Russia's cyber intrusion into the recent presidential election signals the beginning of what is almost sure to be an intensified cyberwar in which both they -- and we -- seek to participate in picking the leaders of an adversary." The difference, he added, is that American elections are generally fair, so "we are much more vulnerable to such manipulation than is Russia," where results are often preordained...

In the intelligence community, James R. Clapper Jr., has sounded the alarm since retiring in January. He was director of national intelligence. "I don't think people have their head around the scope of what the Russians are doing," he said recently. Russia is coming after us, but not just the U.S., but the free world in general. In order to take this threat to our national existence, election officials need to take this seriously.

Each locality, be it a country, a state, a region, a city or county has different election systems that are responsive to the local conditions. This is as it should be. Elections are inherently local. The best protections for accuracy and reliability of the voting systems come from local involvement in the process, in the registration process and the vote counting process. The local people are the best independent observers.

The security of the systems needs to be reflective of the inherent transparency that is achieved when watchers from opposing parties are able to watch the process in depth. No part of the process should be secret. When the author of this study, as a consultant, worked set up the State Board of Elections in Illinois, the most effective systems initiated were those that made the process transparent to representatives of both parties. The JFK Kennedy election had been stolen and JFK himself was appalled by the illegality of the election and put in process ways to correct the election process to prevent the stealing elections.

More needs to be done now. More can be done than has been done to prevent Russian efforts to hack voting systems in the United States and other places. This study represents a step, a guidepost if you will, to preventing hacking and to setting up systems that are secure.

“Growing accountability of the election process needs to happen to protect a democracy. Election computer systems present great vulnerability and need to be designed in a manner that protects the integrity of the vote registration and the voting counting process. Administrators are realizing the benefits as related to the quality of high quality, low cost systems.”

The complete report is a customized look at provides a comprehensive analysis of Elections Systems Practice Computer Security threats in different categories, illustrating the diversity of election vulnerability in the software market segments. A complete procedure analysis is done, looking at procedures and penetration analysis.

Data is collected from the headquarters of the National Security Agency and from state capitals that have discovered that the Russians were inside their voter-registration systems. An analysis is further provided to get people and election officials to look more deeply into the vulnerabilities of the vote tallying systems.

We now know Russia disrupted American democracy in 2016 and ther is an effort to provide practical advice on how to prevent fraudulent behavior from influencing the outcome of an election. The recommendations help prevent this type of computer fraud from happening again. Russian hackers did not just breach Democratic email accounts; according to Mr. Comey, they orchestrated a “massive effort” targeting hundreds of — and possibly more than 1,000 — American government and private organizations since 2015.

Companies Profiled

Market Leaders

  • Dominion Voting Systems Corp
  • Election Systems & Software, Inc (ES&S)

Market Participants

  • Avante International Technology, Inc.
  • Clear Ballot Group, Inc.
  • Dominion Voting Systems Corp
  • Election Systems & Software, Inc (ES&S)
  • Everyone Counts, Inc.
  • Hart InterCivic, Inc.
  • MicroVote General Corp.
  • Precise Voting, LLC
  • Premier Election Solutions, Inc.
  • Sequoia Voting Systems
  • Smartmatic USA Corportation
  • SOE Software, a Scytl Company
  • TruVote International
  • Unisyn Voting Solutions

Key Topics

  • Large Group Voter Registration Systems
  • Rules Based Election Coding Technology
  • Russian Hacking
  • Election hacking
  • Elections Systems Security
  • Vote System Coding
  • Democratic Protections Necessity
  • Voting Systems Records
  • Electronic Vote Coding
  • Protctions for Vote Systems Solutions
  • Computerized Voting System Workflow
  • Claims Adherence
  • Terminology Supported Candidate Management
  • Electronic Coding for Election Officials
  • Election Protection Necessity
  • Correct Coding Tools
  • Electronic Elction Record Systems
  • Language and Computing
  • Recommendations for Security Protection of Solutions
  • Diagnosis of Security Vulnerability
  • Procedure Coding
  • Registration Systems Natural Language Coding
  • NLC
  • Computer Assisted Coding
  • CAC
  • Voting Systems Standards

Table of Contents

Election Process Protection: Executive Summary

The Study Itself Is A Custom Look At Any Particular Election District With Commentary On Particular Vulnerabilities And Recommendations For Improvement. This Includes Recommendations For Improvement In The Election Code
Voting Machines Prelude 2
Growing Up With Voting Machines 2
Voting Machine Hacking Dynamics
A Successful Hack 8
Gaps In Our Democracy 14
Backdoor Hacks 16
“To put this to bed with piece of mind we need to count the votes,” said Stein.
Bruce Schneier, a voting expert at the Kennedy School and adjunct lecturer says a recount would not address the possibility of tampering with electronic voting machines. 1
“There are some weirdness’s in the vote tallies that could be explained by any number of things and election machine hacking is one of them,” Schneier said. “We need to do forensic analysis of the machines and look at the various internet trails, this is a lot of work and it’s unclear to me if a recount includes this.”
Hacking Individual U.S. Voting Machines
Problem Statement
A System Is Only As Good As Its Weakest Link
“Threat of Outside Intervention in the US Election Process / Could Russian Hackers Spoil Election Day?”
How To Make Fraud Detectable
Hacking Solution: Need for Emergency Voting Machine Law
Statement of The Problem: Intensity of the Campaign
The Possibility Of A Close Election That Is Decided By Fraud
Donald Trump
Do We Trust Donald Trump?
Vulnerabilities Of The Vote Counting System
Hillary Clinton
All Elections Are Local
Suggestions to Fix the Vote Counting Election Process Hacking Problem in the Near Term
Hillary or Donald
Teamsters Story
Securing Against Hacks from Russia
We Are A Country Of Laws
The Nature Of Software
The Value of Software
Certain Protections Need To Be Put In Place Now
Types of Hack Attacks
Paper Audit Trail Provides Security for Election Vote Counting
Electronic Voting Machine Certification Systems
Paper Ballot Audit Trail
Jurisdictions Can Print A Paper Ballot
Voting Machine Cyberattack Counter Attack
Ballot Configuration
Down Loading Ballot Images Vulnerability
To Those Who Say There Is Not Enough Time
Requiring a Paper Ballot Audit Trail
Conclusion
Susan Eustis: My Credentials