Print      
Aging voting machines seen as vulnerable
States lack cash for upgrades
Voting machines used in Philadelphia store votes electronically, without any paper-based backups. (Matt Rourke/Associated Press/File 2016)
By Michael Rubinkam and Frank Bajak
Associated Press

ALLENTOWN, Pa. — Jill Stein’s bid to recount votes in Pennsylvania was in trouble even before a federal judge shot it down Dec. 12. The Green Party candidate’s effort stood little chance of detecting potential fraud or error in the vote, because there was basically nothing to recount.

Pennsylvania is one of 11 states where the majority of voters use antiquated machines that store votes electronically, without printed ballots or other paper-based backups that could be used to double-check the balloting. There’s almost no way to know if they have accurately recorded individual votes — or if anyone tampered with the count.

More than 80 percent of Pennsylvanians who voted Nov. 8 cast their ballots on such machines, according to VotePA, a nonprofit group seeking their replacement. VotePA’s Marybeth Kuznik described the proposed recount: ‘‘You go to the computer and you say, ‘OK, computer, you counted this a week-and-a-half ago. Were you right the first time?’’’

These paperless digital voting machines, used by roughly 1 in 5 voters last month, present one of the most glaring dangers to the security of the rickety, underfunded US election system.

Like many electronic voting machines, they are vulnerable to hacking. But other machines typically leave a paper trail that could be manually checked. Paperless digital machines open the door to potential election rigging that might not ever be detected.

Their prevalence also magnifies other risks in the election system, simply because error or fraud is harder to catch when vote counts can’t be verified. And like other voting machines adopted since the 2000 election, the paperless systems are nearing the end of their useful life — yet there is no plan to replace them.

‘‘If I were going to hack this election, I would go for the paperless machines because they are so hard to check,’’ said Barbara Simons, coauthor of ‘‘Broken Ballots,’’ a study of flawed voting technology.

Stein described her recount effort as a way to ensure the 2016 election wasn’t tainted. There’s no evidence of that — a fact Judge Paul Diamond cited in his decision halting the Pennsylvania recount. Stein pursued similar recounts in Wisconsin and Michigan, to little avail. Those states use paper-based voting technologies.

But a cadre of computer scientists from major universities backed Stein’s recounts to underscore the vulnerability of US elections. These researchers have successfully hacked e-voting machines for more than a decade in tests commissioned by New York, California, Ohio, and other states.

Stein and her witnesses said worries about fraud were justified, given US charges that Russia meddled in the 2016 presidential campaign. E-mails of top Democrats were hacked and leaked.

Over the summer, hackers also tried to breach the voter registration databases of Arizona and Illinois using Russia-based servers, US officials said. Election networks in at least 20 states were probed for vulnerabilities.

‘‘It’s a target-rich environment,’’ said a Rice University computer scientist, Dan Wallach. Researchers want to see the country move to computer-scannable paper ballots, because paper can’t be hacked.

The voting system — a loosely regulated, locally managed patchwork — employs more than two dozen types of machinery. Elections officials across the nation say they take great care to secure their machines from tampering. They are sealed and locked away when not in use.

That makes national elections very difficult to steal without getting caught. But difficult is not impossible. Wallach and his colleagues believe a crafty team of pros could strike surgically, focusing on select counties in battleground states where ‘‘a small nudge might be decisive,’’ he said.

Most voting machines in the United States are at or near the end of their expected life spans. Forty-three states use machines over a decade old. Most run on vintage operating systems such as Windows 2000 and are no longer updated with security patches.

But while many experts agree the system needs an upgrade, no one wants to pay to fix it. Money flowed after the 2000 Florida recount debacle, when punch-card technology was discredited. Congress appropriated $4 billion; states raced to adopt digital technology. But when money ran out, so did the ability of many states to address security concerns. Four in five US election officials polled by New York University’s Brennan Center last year said they are desperate to replace equipment but lack the cash.