fb-pixel Skip to main content

Antiquated voting machines vulnerable to rigging, experts say

Voting machines in Philadelphia store votes electronically, without printed ballots or other paper-based backups.Matt Rourke/Associated Press/File 2016

ALLENTOWN, Pa. — Jill Stein’s bid to recount votes in Pennsylvania was in trouble even before a federal judge shot it down Dec. 12. The Green Party candidate’s effort stood little chance of detecting potential fraud or error in the vote, because there was basically nothing to recount.

Pennsylvania is one of 11 states where the majority of voters use antiquated machines that store votes electronically, without printed ballots or other paper-based backups that could be used to double-check the balloting. There’s almost no way to know if they have accurately recorded individual votes — or if anyone tampered with the count.


More than 80 percent of Pennsylvanians who voted Nov. 8 cast their ballots on such machines, according to VotePA, a nonprofit group seeking their replacement. VotePA’s Marybeth Kuznik described the proposed recount: ‘‘You go to the computer and you say, ‘OK, computer, you counted this a week-and-a-half ago. Were you right the first time?’’’

These paperless digital voting machines, used by roughly 1 in 5 voters last month, present one of the most glaring dangers to the security of the rickety, underfunded US election system.

Like many electronic voting machines, they are vulnerable to hacking. But other machines typically leave a paper trail that could be manually checked. Paperless digital machines open the door to potential election rigging that might not ever be detected.

Their prevalence also magnifies other risks in the election system, simply because error or fraud is harder to catch when vote counts can’t be verified. And like other voting machines adopted since the 2000 election, the paperless systems are nearing the end of their useful life — yet there is no comprehensive plan to replace them.

‘‘If I were going to hack this election, I would go for the paperless machines because they are so hard to check,’’ said Barbara Simons, coauthor of ‘‘Broken Ballots,’’ a study of flawed voting technology.


Stein described her recount effort as a way to ensure the 2016 election wasn’t tainted by hacking or fraud. There’s no evidence of either so far — a fact federal judge Paul Diamond cited in his decision halting the Pennsylvania recount.

Stein pursued similar recounts in Wisconsin and Michigan, to little avail. Those states use more reliable paper-based voting technologies. (The Electoral College certified Donald Trump’s presidential victory last week.)

But a cadre of computer scientists from major universities backed Stein’s recounts to underscore the vulnerability of US elections. These researchers have successfully hacked e-voting machines for more than a decade in tests commissioned by New York, California, Ohio, and other states.

Stein and her witnesses said worries about fraud were justified, given US charges that Russia meddled in the 2016 presidential campaign. E-mails of top Democrats were hacked and leaked.

Over the summer, hackers also tried to breach the voter registration databases of Arizona and Illinois using Russia-based servers, US officials said. Election networks in at least 20 states were probed for vulnerabilities.

‘‘It’s a target-rich environment,’’ said a Rice University computer scientist, Dan Wallach. Researchers would like to see the country move entirely to computer-scannable paper ballots, because paper can’t be hacked.

The voting system — a loosely regulated, locally managed patchwork of more than 3,000 jurisdictions overseen by the states — employs more than two dozen types of machinery from 15 manufacturers. Elections officials across the nation say they take great care to secure their machines from tampering. They are sealed and locked away when not in use.


That makes national elections very difficult to steal without getting caught. But difficult is not impossible. Wallach and his colleagues believe a crafty team of pros could strike surgically, focusing on select counties in a few battleground states where ‘‘a small nudge might be decisive,’’ he said.

Most voting machines in the United States are at or near the end of their expected lifespans. Forty-three states use machines more than a decade old. Most run on vintage operating systems such as Windows 2000 that predate the iPhone and are no longer updated with security patches.

On Nov. 8, election officials across the country handled numerous complaints of aging touchscreens losing calibration and casting votes for the wrong candidate.

But while many experts agree the voting system needs an upgrade, no one wants to pay to fix it.

Money flowed after the 2000 Florida recount debacle, when punch-card technology was discredited by hanging chads. Congress appropriated $4 billion for election upgrades; states raced to replace punch cards and lever machines with digital technology.

But when that money ran out, so did the ability of many states to address security concerns overlooked in their initial rush. Four in five US election officials polled by New York University’s Brennan Center last year said they are desperate to replace equipment but lack the cash.

Voters in poorer areas suffer disproportionately, the center found. Data collected in Virginia, Ohio, Minnesota, and Colorado suggest the poor are more apt to encounter failing machines.


In Virginia, wealthier counties near Washington have upgraded technology while lower-income counties in the state’s southwest have not been able to afford it, said Edgardo Cortes, state elections commissioner.

‘‘The federal money is not there and in most instances state money is not being made available, either,’’ Cortes said. ‘‘So the entire cost is falling to local governments.’’

Just as Congress delivered a death blow to punch cards, it should also outlaw paperless touchscreen voting machines and pay for their replacement, said Andrew Appel, a Princeton University computer scientist.