Voting Security Done Right – A Start

As a systems analyst as well as a staunch Constitutionalist, conservative and Christian with a strong background in IT and military operations (20+ year veteran), I feel compelled to point out a few things about voting technology and why demonizing it will not only do nothing to secure the vote but absolutely will push away the majority of swing voters.

First, and contrary to popular misconception, traditional voting polls are NOT inherently secure. Case in point: Battle of Athens aka McMinn County War.

Second, the swing voters. They’re not stupes. In fact, the reason they’re largely registered Independents is because they’re smart enough not to get sucked into the petty extreme left/right arguments while being tired of party politics on every damned issue when many issues require fresh, objective exploration and solutions and NOT a dogmatic party approach.

When it comes to voting, most Independents are well aware that the entire world has solved — completely — the problems associated with Internet banking. We have all the authentication, validation, security, encryption, messaging and session protocols and technology necessary for billions of people all over the globe to conduct secure online banking via their PCs and phones — and that’s precisely what billions of people around the globe do on a daily basis.

Thus, the idea that Internet voting is somehow inherently unsecure is preposterous. It’s either as secure or as unsecure as are all the proceesses, protocols and auditing systems in place to protect it. Same goes for both mail and physical ballots. If they lack the proper processes/protocols/systems, they are absolutely not secure, either. However, with the right processes/protocols/systems, all three forms of voting, including various hybrids, are as secure as — and can be more secure than — online banking.

I am posting several links for your review:

The paper that started it all: Voting – What Is, What Could Be (2001)

NOTE: It’s an old paper, and I disagree with many of their statements and conclusions. At least, however, they were asking many of the right questions:

How mail ballots are done here in Colorado. This is the ENTIRE 373-page state voting law, not a blueprint for proper voting. It’s a prime example of a good system that is nevertheless buried under mountains of largely unnecessary legislative legalese.

The Electoral Vulnerabilities paper (2016) is an excellent overview of the many vulnerabilities inherent in various voting systems, and provides key examples with respect to problems with the 2016 elections:

Election Auditing – Key Issues and Perspectives is an 83-page paper detailing how best to totally lock down elections so as to minimize all types of errors and prevent fraud while providing a TOTALLY transparent process that anyone can review.

“The possi-bility that something might happen in the conduct of an election that might place the correctness of its conclusions at risk have led many to ask the question: “How do we know that the election outcomes announced by election of-ficials are correct?” “

They answer that question, here:

Thus, my hope in providing these resources is that you may first educate yourself with respect to the nature of the problems and efforts to eliminate them before going off half-cocked and declaring, “No ballot by mail!”

As I mentioned earlier, you’re going to lose a LOT of Independent voters with that close-minded dogmatic approach.

As of 2017, Pew Research ascertains party ratios as follows:
Republican: 26%
Democrat: 33%
Independent: 37%

Thus, independents hold a HUGE sway over the outcome of elections. If you lose their vote due to ignorant, ill-informed arguments about voting security, you will have shot both Republicans as well as America in the foot.

By all means, let’s Secure the Vote, but let’s do it CORRECTLY.

voting security