Unresolved Security Threats for Ballot Marking Devices

5Mind. The Meme Platform

A general guide to Ballot Marking Devices verifiability, auditability, privacy and preparation security threats by Garland Favorito

Abstract
Some jurisdictions in different states have begun transitioning their voting equipment to electronic ballot marking devices (BMD). While these devices are necessary for disabled voter accessibility and Americans with Disability Act (ADA) compliance, some jurisdictions are requiring these touchscreen ballot printers to be used for all voters. Since most margins of victory exceed the number of disabled voters it is improbable that disabled voter BMDs can be hacked to rig an election. However, the attempt to use BMDs for additional voters creates a severe threat of election rigging that must be properly mitigated.

The move toward BMDs has generated a series of discussions, papers and articles among computer scientists and election integrity advocates that define BMD security vulnerabilities and debate whether or not they can be adequately alleviated. This paper adds new information to the discussion in several ways:

  • It outlines key attributes of BMDs that determine BMD ballot quality and maps currently available vendor products to those attributes.
  • It discusses the different security threats that are unique to those attributes, including threats to privacy, verifiability, auditability and overall security.
  • It includes real-life, unmitigated examples of security threats identified in Georgia’s voting systems.
  • It details a new threat model that has not previously been analyzed.
  • It provides evidence the new “Dropped Race Threat Model” may have already been implemented in a statewide 2018 Georgia race.

Jurisdictions must make genuine efforts to analyze BMD purchases more thoroughly and protect the constitutional rights of their voters against these various security threats. Those rights are implicit in Art. I Sec. IV and confirmed by U.S. Supreme Court decisions such as Reynolds v. Sims (1964) in which the court declared: “the right to have a vote counted is as open to protection as the right to put a ballot in a ballot box”.

Likewise, voters who have no mechanism to ensure their votes were counted as cast are equally as disenfranchised as voters who have no mechanism to determine if their ballots were placed in a ballot box.

About Garland Favorito

Garland Favorito was the first technology professional in America to advocate against a statewide implementation of paperless electronic voting on the grounds that it poses a threat to the Constitutional right to vote. In February of 2002, he sent written warnings to election officials explaining how paperless voting produces results that cannot be verified by the voter or audited by elections officials. February 2002 emails to Professor. Britain Williams, who headed the Georgia voting system implementation and Assistant Secretary of State Michael Barnes, were authenticated by both parties under oath in depositions. Those depositions were part of the Favorito v. Handel court case that was decided by the Georgia Supreme Court. In 2017, two dozen computer scientists wrote to the Georgia secretary of state urging him to abandon electronic voting for essentially the same reasons Garland had provided 15 years earlier.

After his advice was ignored, Garland founded Voters Organized for Trusted Election Results in Georgia (VoterGA). He also serves as a volunteer Elections Director for the Constitution Party of Georgia. VoterGA is a nonpartisan, non-profit, all-volunteer organization dedicated to restoring the integrity of Georgia elections. Its primary objective is to advocate for verifiable, auditable and recount-capable voting in Georgia. It also advocates for fair and equal ballot access for all Georgia candidates. Garland makes presentations for VoterGA to a wide range of groups throughout the state and is recognized as a leading expert on the usage of, and risks involved with, Georgia’s voting machines. He has testified in numerous committee hearings, produced a variety of reports, and was deposed for over six hours in the Favorito v. Handel lawsuit.

Garland is a career Information Technology (IT) professional with over 40 years of in-depth experience in internet systems design, business systems analysis, database administration, application development, systems architecture, life cycle methodologies, computer programming, project management, and multi-factor security. His experience centers on medium and large-scale mission-critical applications in nearly all facets of American business. His industry experience includes banking, financial systems, health care, accounting, manufacturing, inventory, purchasing, retailing, utilities, telecommunications, insurance, software development and the service industry.

Unresolved Security Threats for Ballot Marking Devices PDF

unresolved-bmd-security-threats

Contact Your Elected Officials
The Thinking Conservative
The Thinking Conservativehttps://www.thethinkingconservative.com/
The goal of THE THINKING CONSERVATIVE is to help us educate ourselves on conservative topics of importance to our freedom and our pursuit of happiness. We do this by sharing conservative opinions on all kinds of subjects, from all types of people, and all kinds of media, in a way that will challenge our perceptions and help us to make educated choices.

New Book Warns Failure of Congress to Defend Separation of Powers Fuels Rise of Authoritarianism

The Book Congress: An Irrelevant Institution or Guardian of the Republic argues that Congress's decline threatens the Constitution’s separation of powers.

What Happens to State Sovereignty When Federal Money Stops?

What happens to state sovereignty when the federal government can no longer afford to subsidize 36% of state budgets, on average?

Japanese Nationalists vs. the Replacement Migration Machine

Japan has begun to falter in its resolute refusal to embrace the mass migration regime that international governments and NGOs had demanded it do.

CIA is On Tucker Carlson for Talking to Iran

“They read my text messages” and the Central Intelligence Agency is trying to “frame me as a foreign agent,” alleged Tucker Carlson.

The EU Poses A Much More Credible Threat To Russia Than The Inverse

Unlike back in June 1941, Russia is now a nuclear superpower, and that might be the only factor that deters the EU from invading Russia.

Virginia Democrats Pass Sweeping Agenda in First Trifecta Session but Adjourn Without a Budget

Virginia Democrats ended their first trifecta session, passing bills raising the minimum wage, banning assault firearms, limiting ICE cooperation, and expanding paid leave.

Judge Blocks RFK Jr.’s Appointees to Vaccine Panel

A federal judge in Massachusetts ruled that Health Sec. Robert F. Kennedy Jr. illegally appointed 13 new members to an influential vaccine panel.

US Coast Guard Intercepts Semi-Submersible in Pacific Carrying 17,600 Pounds of Cocaine

17,600 pounds of cocaine were seized from a smuggling vessel—enough to produce more than 6 million potentially lethal doses, officials said.

MAHA Movement Emphasizes Shift Away From Glyphosate to Regenerative Farming, Eating Real Food

Weeks after Trump’s glyphosate executive order, many MAHA proponents believe that awareness about chemicals and regenerative farming is on the rise.

Trump Puts China Visit on Hold Amid Iran War

As the Iran war continues, President Donald Trump said he would delay his long-awaited trip to Beijing, originally set for the end of this month.

White House Outlines Vision for Underground Visitor Screening Facility

The 33,000-square-foot facility proposed beneath Sherman Park would process visitors entering the White House and could open by mid-2028 if approved.

Trump Signs Order Assigning Vance to Head Anti-Fraud Task Force

President Donald Trump signed an executive order on March 16, officially creating an anti-fraud task force headed by Vice President JD Vance.

US Opens New Trade Probes Targeting 60 Countries Over Alleged Forced Labor Practices

The U.S. has launched trade probes into 60 economies to investigate whether their trade practices allow imports produced with forced labor.
spot_img

Related Articles

Popular Categories

MAGA Business Central