CAN THE VOTE BE HACKED?

blank PROCESS blank EFFECT NAMEEFFECT TYPESOURCETARGET LEVFIX
Candidate l-arrow Trojan Horse Candidate Changes stance after winningCandidateFools Voters 1G
l-arrow False Clone Candidate Splitting Opposition VoteOther PartySplit the vote 2A
l-arrow Flippant Candidate Candidate randomly changes stanceCandidateConfusion 1A
blank blank d-arrow blank blank EFFECT NAMEEFFECT TYPESOURCETARGET LEVFIX
Voter l-arrow Negative Campaigning Scare voterPartyVoter 4A
l-arrow Surprise Negative News Story Scare voterNews MediaVoter 5A
l-arrow The President (or a celebrity) takes sides Sway votesPartyVoter 3D
l-arrow Free Celebrity Appearance / Concert Buy votesPartyVoter 5D
l-arrow Making Impossible Promises Buy votesPartyVoter 5G
d-arrow blank d-arrow blank blank EFFECT NAMEEFFECT TYPESOURCETARGET LEVFIX
d-arrow Regis-
tration
l-arrow Hacking Voter Registration Computer hackCheatsMulti votes 2H
l-arrow Multiple Similar IDs Multiple registrationsCheatsMulti votes 1J
l-arrow Fake Names, Same Address Multiple mail-in votesCheatsMulti votes 3J
l-arrow ID Theft to Change Registrations Phone phishingCheatsStop voters 4J
d-arrow blank d-arrow blank blank EFFECT NAMEEFFECT TYPESOURCETARGET LEVFIX
All
Voting
blank Voting Machines Company Fraud Program designDesignerChange votes 0B
blank Hacking Voting Machines Computer hackCheatsChange votes 0B
l-arrow Plurality Voting System (vote for only one) Inherent system biasVoting systemUnintended 5A
l-arrow Straight-Party Voting Inherent system biasParty, UnionsLower races 5A
l-arrow Winner-Take-All Inherent system biasParty, LawLose votes 5G
l-arrow Rigged Voting Machine Setup* Biasing Vote collectionOfficialsChange votes 4F
l-arrow Causing Power Failure at Polling Place Prevent voters from votingCheatsStop voters 2E
l-arrow Blocking Polling Place Access† Prevent voters from votingCheatsStop voters 3E
l-arrow Stealing Ballots‡ Prevent voters from votingCheatsStop voters 3K
blank blank d-arrow blank blank EFFECT NAMEEFFECT TYPESOURCETARGET LEVFIX
Counting
The
Vote
l-arrow Ballot Culling Discarding undesired votesOfficialsLose votes 4F
l-arrow Counting Ballots Twice Counting desired votes twiceOfficialsMake votes 4F
l-arrow Counting Spoiled Ballots Counting discarded votesOfficialsMake votes 4F
l-arrow Hacking Vote Counting Machines Computer hackCheatsChange votes 1C
l-arrow Hacking Central Results Computers Computer hackCheatsChange votes 2C
d-arrow  
RESULT  
NOTES ON THE ABOVE TABLE
  *   Ways Ballots can be Rigged: LEV   Levels of Severity of the Problem:
- Diverting counts to the wrong candidate 0   This does not actually happen.
- Making the straight-Party function choose the wrong candidate 1   This is rare and/or hard to accomplish.
- Misaligned or varying size touch sensor zones on touch screens 2   This is hard to do and/or not encountered very often.
- Misaligned or varying size mark-sense sensor zones for paper ballots 3   This is intermediate in difficulty and occurrence.
- Programmed to change the vote when the voter changes pages 4   This is easy to do and/or is encountered often.
- Programmed to omit every 10th (e.g.) vote 5   This is a ubiquitous problem.
  †   Ways Polling Place Entrances have been Blocked: FIX   How to Fix the Problem:
- A pipe was ordered dug up in front of the polling place. A   Abolish Plurality Voting, adopt Independent Voting System.
- The sidewalk was removed, leaving mud for voters to cross. B   This effect does not happen at all.
- Construction (as above) was ordered by people with no authority. C   Do not allow any connection to the Internet.
- A meeting was called, filling up the parking lot at the site. D   Prohibit office holders and celebrities from political activity.
  ‡   Ways Ballots have been Stolen: E   Guard the polling places to prevent such activities.
- An election official took a box of cast ballots and walked out with it. F   Have technical people from each party present to detect fraud.
- An election official moved a ballot box from counted to uncounted. G   Prohibit this activity by law.
- A voter took a box of cast ballots and walked out with it. H   Use security coding to detect tampering.
- Cheats stole ballots from mailboxes. J   Use cross-checks to detect registration fraud.
- Cheats stole blank ballots, marked one candidate, and put them back. K   Use guards, security coding, and cross-checks to detect fraud.

WHAT CAN NOT HAPPEN:

  1. Hackers can't break into voting machines. They are not on the internet.
  2. Voting machine makers won't cheat
  3. Dimpled chad are not votes

TO MAKE ELECTIONS FAIR, THE FOLLOWING MUST BE DONE:

  1. Abolish the biased Plurality Voting System and adopt the Independent Voting System.
  2. Prohibit by law Straight-Party Voting.
  3. Prohibit by law Winner-Take-All distribution of electors or delegates.
  4. Prohibit by law at-large districts with multiple candidates.
  5. Prohibit by law using the biased Plurality Voting System for public opinion polls.
  6. Do not allow election devices to be connected to the Internet. Use secure leased lines.
  7. Prohibit existing office holders from using their status for political activity.
  8. Prohibit newspeople from taking sides. Freedom of the press assumes an unbiased press.
  9. Prohibit celebrities from using their fame for political activity.
  10. Guard polling places before, during, and after elections to prevent criminal activity.
  11. Require presence of technical people from all parties when voting devices are worked on.
  12. Prohibit by law (with large penalties) impossible promises made by candidates.
  13. Use special multiple security coding to detect any ballot tampering.
  14. Use multiple cross-checks on names, addresses, and ID numbers to detect ID fraud.
  15. Use multiple cross-checks on names and addresses to detect registration fraud.
  16. Use security questions to detect registration fraud.
  17. Have a large penalty for concealing discovered facts about candidates for timed release.
  18. Prohibit by law the use of bad or unproved science to sway voters.

LINKS: