Toll Free: 1-888-928-9744

Election Process Protection: Location Specific Custom Study, Registration, Voting Tallying, and Recommendations

Published: Jun, 2017 | Pages: 129 | Publisher: WinterGreen Research
Industry: Electronics | Report Format: Electronic (PDF)

Democracies need a vote counting process that makes all fraud detectable immediately as the votes are being counted, there needs to be protections built in so that all observers, including the independent media have instant confidence in the integrity of the election process.  

The WinterGreen Research study is customized for each client.  The breadth and depth of the laws, systems,  and procedures used, the variety of voting registration systems and vote counting systems make it impossible to cover all those in depth in one study.  The study gets too long.  Instead this customer study is written in two weeks in response to input from a survey that collects information about the particular system being used.  

Russian efforts to hack voting systems in the United States have been well publicized.  What has been less apparent is the inherent vulnerabilities of many of the voting systems in the US and elsewhere.  Prelude to Custom Election Process Research:  James B. Comey, former director of the F.B.I. Has indicated that Russian operatives intervened in the 2016 presidential election and that it could happen again.  Russian hackers are the best in the world, that is why they are so good at building computer security systems, because they know how to hacek.  

Russian hackers breached Democratic email accounts; they orchestrated a hack that targeted thousands of US government state and local databases.  Apparently Russian computer hacks harvested emails from the State Department and the White House.  They apparently penetrated deep into the computer systems of the Joint Chiefs of Staff.  The Russian effort to manipulate American politics is serious and needs to be addressed by the people responsible for running elections in the US.   

Graham Allison, a longtime Russia scholar at Harvard, said, "Russia's cyber intrusion into the recent presidential election signals the beginning of what is almost sure to be an intensified cyberwar in which both they -- and we -- seek to participate in picking the leaders of an adversary."  The difference, he added, is that American elections are generally fair, so "we are much more vulnerable to such manipulation than is Russia," where results are often preordained... 

In the intelligence community, James R. Clapper Jr., has sounded the alarm since retiring in January.  He was director of national intelligence. "I don't think people have their head around the scope of what the Russians are doing," he said recently.  Russia is coming after us, but not just the U.S., but the free world in general.  In order to take this threat to our national existence, election officials need to take this seriously.

Each locality, be it a country, a state, a region, a city or county has different election systems that are responsive to the local conditions.  This is as it should be.  Elections are inherently local.  The best protections for accuracy and reliability of the voting systems come from local involvement in the process, in the registration process and the vote counting process.  The local people are the best independent observers.  

The security of the systems needs to be reflective of the inherent transparency that is achieved when watchers from opposing parties are able to watch the process in depth.  No part of the process should be secret.  When the author of this study, as a consultant, worked set up the State Board of Elections in Illinois, the most effective systems initiated were those that made the process transparent to representatives of both parties.  The JFK Kennedy election had been stolen and JFK himself was appalled by the illegality of the election and put in process ways to correct the election process to prevent the stealing elections.

More needs to be done now.  More can be done than has been done to prevent Russian efforts to hack voting systems in the United States and other places.  This study represents a step, a guidepost if you will, to preventing hacking and to setting up systems that are secure.  

According to Susan Eustis, lead author of the team that prepares the study, “Growing accountability of the election process needs to happen to protect a democracy.   Election computer systems present great vulnerability and need to be designed in a manner that protects the integrity of the vote registration and the voting counting process.  Administrators are realizing the benefits as related to the quality of high quality, low cost systems.”  

The complete report is a customized look at provides a comprehensive analysis of Elections Systems Practice Computer Security threats in different categories, illustrating the diversity of election vulnerability in the software market segments.  A complete procedure analysis is done, looking at procedures and penetration analysis.  

Data is collected from the headquarters of the National Security Agency and from state capitals that have discovered that the Russians were inside their voter-registration systems.  An analysis is further provided to get people and election officials to look more deeply into the vulnerabilities of the vote tallying systems.  

We now know Russia disrupted American democracy in 2016 and ther is an effort to provide practical advice on how to prevent fraudulent behavior from influencing the outcome of an election.  The recommendations help prevent this type of computer fraud from happening again.  Russian hackers did not just breach Democratic email accounts; according to Mr. Comey, they orchestrated a “massive effort” targeting hundreds of — and possibly more than 1,000 — American government and private organizations since 2015.

WinterGreen Research is an independent research organization funded by the sale of market research studies all over the world and by the implementation of ROI models that are used to calculate the total cost of ownership of equipment, services, and software.  The company has 35 distributors worldwide, including Global Information Info Shop, Market Research.com, Research and Markets, electronics.ca, and Thompson Financial.  It conducts its business with integrity.  

The increasingly global nature of science, technology and engineering is a reflection of the implementation of the globally integrated enterprise.  Customers trust wintergreen research to work alongside them to ensure the success of the participation in a particular market segment.

WinterGreen Research supports various market segment programs; provides trusted technical services to the marketing departments.  It carries out accurate market share and forecast analysis services for a range of commercial and government customers globally.  These are all vital market research support solutions requiring trust and integrity.

Companies Profiled

Market Leaders
•	Dominion Voting Systems Corp
•	Election Systems & Software, Inc (ES&S)

Market Participants
•	Avante International Technology, Inc.
•	Clear Ballot Group, Inc.
•	Dominion Voting Systems Corp
•	Election Systems & Software, Inc (ES&S)
•	Everyone Counts, Inc.
•	Hart InterCivic, Inc.
•	MicroVote General Corp.
•	Precise Voting, LLC
•	Premier Election Solutions, Inc.
•	Sequoia Voting Systems
•	Smartmatic USA Corportation
•	SOE Software, a Scytl Company
•	TruVote International
•	Unisyn Voting Solutions

Key Topics
•	Large Group Voter Registration Systems
•	Rules Based Election Coding Technology
•	Russian Hacking
•	Election hacking
•	Elections Systems Security
•	Vote System Coding
•	Democratic Protections Necessity
•	Voting Systems Records
•	Electronic Vote Coding
•	Protctions for Vote Systems Solutions
•	Computerized Voting System Workflow
•	Claims Adherence
•	Terminology Supported Candidate Management
•	Electronic Coding for Election Officials
•	Election Protection Necessity
•	Correct Coding Tools
•	Electronic Elction Record Systems
•	Language and Computing
•	Recommendations for Security Protection of Solutions
•	Diagnosis of Security Vulnerability
•	Procedure Coding
•	Registration Systems Natural Language Coding
•	NLC
•	Computer Assisted Coding
•	CAC
•	Voting Systems Standards
 Table of Contents

The study itself is a custom look at any particular election district with commentary on particular vulnerabilities and recommendations for improvement. This includes recommendations for improvement in the election code

Voting Machines Prelude	2
Growing Up With Voting Machines	2
Voting Machine Hacking Dynamics	
A Successful Hack	8
Gaps In Our Democracy	14
Backdoor Hacks	16
“To put this to bed with piece of mind we need to count the votes,” said
Stein.
Bruce Schneier, a voting expert at the Kennedy School and adjunct	
lecturer says a recount would not address the possibility of tampering with	
electronic voting machines.	1
“There are some weirdness’s in the vote tallies that could be explained by any number of things and election machine hacking is one of them,” Schneier said. “We need to do forensic analysis of the machines and look at the various internet trails, this is a lot of work and it’s unclear to me if a recount includes this.”
Hacking Individual U.S. Voting Machines

Problem Statement

A System Is Only As Good As Its Weakest Link

“Threat of Outside Intervention in the US Election Process / Could

Russian Hackers Spoil Election Day?”

How To Make Fraud Detectable

Hacking Solution:  Need for Emergency Voting Machine Law

Statement of The Problem: Intensity of the Campaign

The Possibility Of A Close Election That Is Decided By Fraud

Donald Trump

Do We Trust Donald Trump?

Vulnerabilities Of The Vote Counting System

Hillary Clinton

All Elections Are Local

Suggestions to Fix the Vote Counting Election Process Hacking Problem in the Near Term

Hillary or Donald Teamsters Story

Securing Against Hacks from Russia We Are A Country Of Laws

The Nature Of Software

The Value of Software

Certain Protections Need To Be Put In Place Now Types of Hack Attacks

Paper Audit Trail Provides Security for Election Vote Counting Electronic Voting Machine Certification Systems

Paper Ballot Audit Trail

Jurisdictions Can Print A Paper Ballot

Voting Machine Cyberattack Counter Attack

Ballot Configuration

Down Loading Ballot Images Vulnerability

To Those Who Say There Is Not Enough Time

Requiring a Paper Ballot Audit Trail

Conclusion

Susan Eustis:  My Credentials

Review by Roy Saltman previously with the voting team at NIST.

According to Roy:

"Susan Eustis has many years of experience working with the design, sale, and use of voting equipment. In this book, she proposes that the process of vote-tallying employ voter-verified paper audit trails for assurance of correct results. Readers should assure that their local election administrators heed her advice."

Roy G. Saltman is a computer scientist, National Institute of Standards and Technology (retired). He is author of "The History and Politics of Voting Technology," Palgrave Macmillan,. 2006.

Democracy Consultant commentary by

John Livingstone, MD. FRSH (UK)

Assistant Professor in Psychiatry, Harvard Medical School.

Founding Director, Team Clinic Child Evaluation Project, and the Child and Adolescent Outpatient Service, McLean Hospital / Harvard Medical School.

Director, Health, Sports, and Executive Coaching Projects, Gaffney & Livingstone Consultants.

Board Member, National Consortium for Certification of Health and Wellness Coaches.

To request a free sample copy of this report, please complete the form below.

We never share your personal data. Privacy policy
Interested in this report? Get your FREE sample now! Get a Free Sample
Choose License Type
Single User - US $4200
Multi User - US $8400
Hexareeasearch Know

Did you know?

Research Assistance

Phone: 1-415-349-0054

Toll Free: 1-888-928-9744

Email: [email protected]

Why to buy from us

Custom research service

Speak to the report author to design an exclusive study to serve your research needs.

Quality assurance

A testimonial for service excellence represented in the form of BBB "A" Accreditation.

Information security

Your personal and confidential information is safe and secure.

verify