The US Senate approved $250 million to help states purchase more secure voting equipment — but includes no provisions for what "secure" means. Our buying guide will help state election officials spend taxpayer money wisely. Credit: Thinkstock US state election officials have got to be stressed out. Almost none are cybersecurity experts, and they find themselves pulled hither and thither by partisan politicians on the one hand, and non-partisan security experts on the other hand. The good news is the US Senate just approved a second tranche of funding — this time for $250 million — to help the states secure their election systems.So how are you supposed to spend that money? The $250 million does not include any security requirements or guidance for the voting machines states buy. Is this secure? Is it not? What should you buy? You can’t trust the voting machine vendors either, as they have not been forthcoming on potential vulnerabilities in the past.Senator Ron Wyden (D), one of the few cybersecurity-savvy members of either house of Congress, was critical of the funding bill. “This proposal is a joke,” he said in a statement. “This amendment doesn’t even require the funding be spent on election security — it can go for anything related to elections. Giving states taxpayer money to buy hackable, paperless machines or systems with poor cybersecurity is a waste.”If you’re a state election official trying to do the right thing—or a citizen who wants to know if your election officials are doing the right thing, this guide is for you. How to secure our electionsBefore we get into the nitty-gritty, let’s be clear: There is widespread agreement among security experts on how to secure elections. A new report on voting machine security from the National Academies of Science, Engineering and Medicine lays out the consensus opinion of dozens of leading experts. Voting machine security expert Matt Blaze’s 2017 testimony before Congress painted the solution in vivid colors: use paper ballots, counted with optical scanners, and double-checked with risk-limiting audits. Oh… and avoid online voting and anything that uses the word blockchain.Ready to put some nitty in your gritty? Avoid DRE voting machinesDirect recording electronic (DRE) voting machines are touchscreens that record the results of the ballot to disk, and might print out a receipt for the voter. These machines are just hackable computers that offer no way to audit or recount a vote in case the result looks suspicious. The overwhelming consensus by experts is that these machines are unsuitable for voting and should be junked as soon as possible. “Paperless DRE voting machines should be immediately phased out from US elections,” Blaze highlighted in his testimony to Congress.Spending federal funding to purchase new DRE voting machines would be a major waste of taxpayer money, and make our elections less secure, not more.Hand-marked paper ballotsAre you using hand-marked paper ballots? A lot of vendors have started talking nonsense about “paper ballots” but really mean machine-marked paper ballots that produce bar codes that can then be scanned. These are not hand-marked, and the touchscreen itself can be hacked. How can voters verify their intentions by looking at a bar code? If your vendor is proposing anything other than hand-marked paper ballots, then you should run away screaming.There is an exception to this rule. Disabled people have a right to vote, too, and special machines for people who require accommodation may be the right way to solve that problem. Using machine-marked paper ballots for all voters, however, makes your election hackable and should be avoided.Spend federal funds on good ol’-fashioned paper ballots and consider how best to accommodate disabled voters.Optical scannersA small chorus of alarmists have begun demanding “paper ballots only,” but they are only half right. Ballots in the United States can be extremely complex, and counting paper ballots by hand is a lengthy, error-prone process. Automating that counting helps mitigate the risk of human error. For this reason, experts argue that using paper ballots, counted via optical scanners, is the safest way forward. The voter completes a paper ballot, scans it once using an optical scanner, and then deposits the ballot into a locked box. Optical scanners to count hand-marked paper ballots is widely viewed by security experts as the best way to have both a faster and more accurate vote tally.The great thing about hand-marked paper ballots counted by optical scanners is that it’s very easy to hand count those ballots if necessary. Some hand counting should take place after every election, which brings us to risk-limiting audits.Risk limiting auditsTrust but verify.Using optical scanners raises the specter of what happens if someone hacks the optical scanner. The way around this problem is to hand count a statistically significant portion of the hand-marked paper ballots. To ensure that the optical scan results have not been hacked or otherwise tampered with, risk-limiting audits should be performed after every election on a statistically significant sample of the paper ballots. A risk-limiting audit should be mandatory immediately after every election and before the results are certified.A really easy way to prevent attackers from hacking election systems and changing election results is to double-check the results by hand—maybe not all of them, but a statistically significant sample of them. A landslide victory might lead to a smaller number of votes counted, a close race might lead to most, or even all, of the ballots being recounted by hand.“States should mandate risk-limiting audits prior to the certification of election results,” the National Academies report warns. “With current technology, this requires the use of paper ballots. States and local jurisdictions should implement risk-limiting audits within a decade. They should begin with pilot programs and work toward full implementation. Risk-limiting audits should be conducted for all federal and state election contests, and for local contests where feasible.”The combination of paper ballots and risk-limiting audits is more secure than either alone. One might argue that there’s nothing more secure than paper ballots. Yet, a history of 19th- and 20th-century ballot stuffing in the US makes clear that corrupt political machines can steal an election. Political machines, like those led by Boss Tweed in 1870s New York City, bribed and stole elections. Ballot stuffing has also frequently occurred around the world, where the façade of democracy was more important than a free ballot, for instance in Soviet Russia.Does your voting machine vendor support hand-marked paper ballots, counted by optical scanner, and checked via risk-limiting audits? If so, you’re on the right track. For any vendor who doesn’t tick those boxes, however, you should shred their response to your RFP.Avoid internet voting, and anything involving blockchainPaper ballots, optical scanners, risk-limiting audits. Gotcha, some say, but that means we have to vote in person. It’s like, 2018, duh. I can bank online, how come I can’t vote online from my smartphone?If there is one thing voting security experts agree on, it’s that online voting is not secure, cannot be secured, and will probably never be secure. “Insecure internet voting is possible now,” the National Academies report dryly observes, “but the risks currently associated with internet voting are more significant than the benefits. Secure internet voting will likely not be feasible in the near future.”What about blockchain? Utter the “b”-word around voting security experts and watch their faces turn purple. Avoid unless you really want to provoke another Vesuvius.“While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional security vulnerabilities,” the National Academies conclude. “In particular, if malware on a voter’s device alters a vote before it ever reaches a blockchain, the immutability of the blockchain fails to provide the desired integrity, and the voter may never know of the alteration.”Chasing unproven, insecure voting technology is what got us where we are today. Ensuring elections are trustworthy requires taking a conservative, security-first approach if we care about ensuring trust in our election results.Security is not partisanThe security of voting equipment is not, and should not be, partisan. We can’t have fair elections if we can’t trust voting machines to give us an honest — and verifiable — count. Election officials’ buying decisions today will affect how much we trust the outcome of the 2020 presidential election.“Without such [cybersecurity] guidelines, states and counties could use taxpayer dollars to purchase outdated DRE machines that we know are vulnerable to hacking and malfunction, leaving our elections at risk for years to come,” Justin Vail of ProtectDemocracy.org tells CSO.Whether or not the Senate and House will agree on a final funding bill that includes such minimal security provisions remains to be seen. With or without strings, election officials are still free to do the right thing and spend federal funds on purchasing secure voting machines. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe