The examples and perspective in this article may not represent a worldwide view of the subject. (October 2016) (Learn how and when to remove this template message)
Depending on the particular implementation, e-voting may use standalone electronic voting machines (also called EVM) or computers connected to the Internet. It may encompass a range of Internet services, from basic transmission of tabulated results to full-function online voting through common connectable household devices. The degree of automation may be limited to marking a paper ballot, or may be a comprehensive system of vote input, vote recording, data encryption and transmission to servers, and consolidation and tabulation of election results.
A worthy e-voting system must perform most of these tasks while complying with a set of standards established by regulatory bodies, and must also be capable to deal successfully with strong requirements associated with security, accuracy, integrity, swiftness, privacy, auditability, accessibility, cost-effectiveness, scalability and ecological sustainability.
Electronic voting technology can include punched cards, optical scan voting systems and specialized voting kiosks (including self-contained direct-recording electronic voting systems, or DRE). It can also involve transmission of ballots and votes via telephones, private computer networks, or the Internet.
In general, two main types of e-voting can be identified:
- e-voting which is physically supervised by representatives of governmental or independent electoral authorities (e.g. electronic voting machines located at polling stations);
- remote e-voting via the Internet (also called i-voting) where the voter submits his or her votes electronically to the election authorities, from any location.
Electronic voting technology intends to speed the counting of ballots, reduce the cost of paying staff to count votes manually and can provide improved accessibility for disabled voters.
It has been demonstrated that as voting systems become more complex and include software, different methods of election fraud become possible. Others also challenge the use of electronic voting from a theoretical point of view, arguing that humans are not equipped for verifying operations occurring within an electronic machine and that because people cannot verify these operations, the operations cannot be trusted. Furthermore, some computing experts have argued for the broader notion that people cannot trust any programming they did not author.
Critics of electronic voting, including security analyst Bruce Schneier, note that "computer security experts are unanimous on what to do (some voting experts disagree, but it is the computer security experts who need to be listened to; the problems here are with the computer, not with the fact that the computer is being used in a voting application)... DRE machines must have a voter-verifiable paper audit trails... Software used on DRE machines must be open to public scrutiny" to ensure the accuracy of the voting system. Verifiable ballots are necessary because computers can and do malfunction, and because voting machines can be compromised.
Many insecurities have been found in commercial voting machines, such as using a default administration password. Cases have also been reported of machines making unpredictable, inconsistent errors. Key issues with electronic voting are therefore the openness of a system to public examination from outside experts, the creation of an authenticatable paper record of votes cast and a chain of custody for records.
There has been contention, especially in the United States, that electronic voting, especially DRE voting, could facilitate electoral fraud and may not be fully auditable. In addition, electronic voting has been criticised as unnecessary and expensive to introduce. While countries like India continue to use electronic voting, several countries have cancelled e-voting systems or decided against a large-scale rollout, notably the Netherlands, Ireland, Germany and the United Kingdom due to issues in reliability of EVMs.
Types of systemEdit
Electronic voting systems for electorates have been in use since the 1960s when punched card systems debuted. Their first widespread use was in the USA where 7 counties switched to this method for the 1964 presidential election. The newer optical scan voting systems allow a computer to count a voter's mark on a ballot. DRE voting machines which collect and tabulate votes in a single machine, are used by all voters in all elections in Brazil and India, and also on a large scale in Venezuela and the United States. They have been used on a large scale in the Netherlands but have been decommissioned after public concerns.
Internet voting systems have gained popularity and have been used for government elections and referendums in Estonia, and Switzerland as well as municipal elections in Canada and party primary elections in the United States and France.
There are also hybrid systems that include an electronic ballot marking device (usually a touch screen system similar to a DRE) or other assistive technology to print a voter verified paper audit trail, then use a separate machine for electronic tabulation.
Paper-based electronic voting systemEdit
Sometimes called a "document ballot voting system", paper-based voting systems originated as a system where votes are cast and counted by hand, using paper ballots. With the advent of electronic tabulation came systems where paper cards or sheets could be marked by hand, but counted electronically. These systems included punched card voting, marksense and later digital pen voting systems.
These systems can include a ballot marking device or electronic ballot marker that allows voters to make their selections using an electronic input device, usually a touch screen system similar to a DRE. Systems including a ballot marking device can incorporate different forms of assistive technology. In 2004, Open Voting Consortium demonstrated the 'Dechert Design', a General Public License open source paper ballot printing system with open source bar codes on each ballot.
Direct-recording electronic (DRE) voting systemEdit
A direct-recording electronic (DRE) voting machine records votes by means of a ballot display provided with mechanical or electro-optical components that can be activated by the voter (typically buttons or a touchscreen); that processes data with computer software; and that records voting data and ballot images in memory components. After the election it produces a tabulation of the voting data stored in a removable memory component and as a printed copy. The system may also provide a means for transmitting individual ballots or vote totals to a central location for consolidating and reporting results from precincts at the central location. These systems use a precinct count method that tabulates ballots at the polling place. They typically tabulate ballots as they are cast and print the results after the close of polling.
In 2002, in the United States, the Help America Vote Act mandated that one handicapped accessible voting system be provided per polling place, which most jurisdictions have chosen to satisfy with the use of DRE voting machines, some switching entirely over to DRE. In 2004, 28.9% of the registered voters in the United States used some type of direct recording electronic voting system, up from 7.7% in 1996.
In 2004, India adopted Electronic Voting Machines (EVM) for its elections to its parliament with 380 million voters casting their ballots using more than one million voting machines. The Indian EVMs are designed and developed by two government-owned defence equipment manufacturing units, Bharat Electronics Limited (BEL) and Electronics Corporation of India Limited (ECIL). Both systems are identical, and are developed to the specifications of Election Commission of India. The system is a set of two devices running on 7.5 volt batteries. One device, the voting Unit is used by the voter, and another device called the control unit is operated by the electoral officer. Both units are connected by a five-metre cable. The voting unit has a blue button for each candidate. The unit can hold 16 candidates, but up to four units can be chained, to accommodate 64 candidates. The control unit has three buttons on the surface – one button to release a single vote, one button to see the total number of votes cast till now, and one button to close the election process. The result button is hidden and sealed. It cannot be pressed unless the close button has already been pressed. A controversy was raised when the voting machine malfunctioned which was shown in parliament.
Public network DRE voting systemEdit
A public network DRE voting system is an election system that uses electronic ballots and transmits vote data from the polling place to another location over a public network. Vote data may be transmitted as individual ballots as they are cast, periodically as batches of ballots throughout the election day, or as one batch at the close of voting. This includes Internet voting as well as telephone voting.
Public network DRE voting system can utilize either precinct count or central count method. The central count method tabulates ballots from multiple precincts at a central location.
Internet voting can use remote locations (voting from any Internet capable computer) or can use traditional polling locations with voting booths consisting of Internet connected voting systems.
Corporations and organizations routinely use Internet voting to elect officers and board members and for other proxy elections. Internet voting systems have been used privately in many modern nations and publicly in the United States, the UK, Switzerland and Estonia. In Switzerland, where it is already an established part of local referendums, voters get their passwords to access the ballot through the postal service. Most voters in Estonia can cast their vote in local and parliamentary elections, if they want to, via the Internet, as most of those on the electoral roll have access to an e-voting system, the largest run by any European Union country. It has been made possible because most Estonians carry a national identity card equipped with a computer-readable microchip and it is these cards which they use to get access to the online ballot. All a voter needs is a computer, an electronic card reader, their ID card and its PIN, and they can vote from anywhere in the world. Estonian e-votes can only be cast during the days of advance voting. On election day itself people have to go to polling stations and fill in a paper ballot.
In March 2000 the Arizona Democratic Party ran its Presidential Primary over the internet using the private company votation.com. Each registered member of the party received a personal identification number in the mail. These citizens had the option to either cast ballots at a designated location or over the internet from the comfort of their own home. Voters voting over the internet were required to insert their PIN and answer two personal questions. Once all the information is verified, they have the voting options.
By 2009, Estonia had advanced the farthest in utilizing Internet voting technology. In Estonia, each voter has a national ID card that they use to identify each citizen. The ID card is the security Estonia put in to ensure reliability in votes. Security officials said that they have not detected any unusual activity or tampering of the votes.
Impact on turnoutEdit
A 2017 study of online voting in two Swiss cantons found that it had no effect on turnout.
A paper on “remote electronic voting and turnout in the Estonian 2007 parliamentary elections” showed that rather than eliminating inequalities, e-voting might have enhanced the digital divide between higher and lower socioeconomic classes. People who lived greater distances from polling areas voted at higher levels with this service now available. The 2007 Estonian elections yielded a higher voter turnout from those who lived in higher income regions and who received formal education.
Impact on election outcomesEdit
The use of electronic voting in elections remains a contentious issue. Some countries such as Netherlands and Germany have stopped using it after it was shown to be unreliable, while the Indian Election commission recommends it. The involvement of numerous stakeholders including companies that manufacture these machines as well as political parties that stand to gain from rigging complicates this further.
A 2017 study of Brazil found no systematic difference in vote choices between online and offline electorates.
However, it has been also argued that the rigging of EVMs influenced the results of elections in India in 2017 to a large extent.
It has further been argued political parties that have more support from the less fortunate—who are unfamiliar with the Internet—may suffer in the elections due to e-voting, which tends to increase voting in the upper/middle class. It is unsure as to whether narrowing the digital divide would promote equal voting opportunities for people across various social, economic and ethnic backgrounds. In the long run, this is contingent not only on internet accessibility, which is already widely available in Estonia, but also depends on people’s level of familiarity with the Internet.
The security of these in person electronic voting machines is almost entirely dependent on the implementation of security protocols at each locality. A group of researchers studying the recent Estonian elections describe massive operational lapses in security from transferring election results on personal thumb drives to posting network credentials on the wall in view of the public. The researchers concluded that these systems are insecure in their current implementation, and due to the rise of nation state interest in influencing elections, should be "discontinue[d]." 
Electronic voting systems may offer advantages compared to other voting techniques. An electronic voting system can be involved in any one of a number of steps in the setup, distributing, voting, collecting, and counting of ballots, and thus may or may not introduce advantages into any of these steps. Potential disadvantages exist as well including the potential for flaws or weakness in any electronic component.
Charles Stewart of the Massachusetts Institute of Technology estimates that 1 million more ballots were counted in the 2004 USA presidential election than in 2000 because electronic voting machines detected votes that paper-based machines would have missed.
In May 2004 the U.S. Government Accountability Office released a report titled "Electronic Voting Offers Opportunities and Presents Challenges", analyzing both the benefits and concerns created by electronic voting. A second report was released in September 2005 detailing some of the concerns with electronic voting, and ongoing improvements, titled "Federal Efforts to Improve Security and Reliability of Electronic Voting Systems Are Under Way, but Key Activities Need to Be Completed".
Electronic voting systems may use electronic ballot to store votes in computer memory. Systems which use them exclusively are called DRE voting systems. When electronic ballots are used there is no risk of exhausting the supply of ballots. Additionally, these electronic ballots remove the need for printing of paper ballots, a significant cost. When administering elections in which ballots are offered in multiple languages (in some areas of the United States, public elections are required by the National Voting Rights Act of 1965), electronic ballots can be programmed to provide ballots in multiple languages for a single machine. The advantage with respect to ballots in different languages appears to be unique to electronic voting. For example, King County, Washington's demographics require them under U.S. federal election law to provide ballot access in Chinese. With any type of paper ballot, the county has to decide how many Chinese-language ballots to print, how many to make available at each polling place, etc. Any strategy that can assure that Chinese-language ballots will be available at all polling places is certain, at the very least, to result in a significant number of wasted ballots. (The situation with lever machines would be even worse than with paper: the only apparent way to reliably meet the need would be to set up a Chinese-language lever machine at each polling place, few of which would be used at all.)
Critics argue[who?] the need for extra ballots in any language can be mitigated by providing a process to print ballots at voting locations. They argue further, the cost of software validation, compiler trust validation, installation validation, delivery validation and validation of other steps related to electronic voting is complex and expensive, thus electronic ballots are not guaranteed to be less costly than printed ballots.
Electronic voting machines can be made fully accessible for persons with disabilities. Punched card and optical scan machines are not fully accessible for the blind or visually impaired, and lever machines can be difficult for voters with limited mobility and strength. Electronic machines can use headphones, sip and puff, foot pedals, joy sticks and other adaptive technology to provide the necessary accessibility.
Organizations such as the Verified Voting Foundation have criticized the accessibility of electronic voting machines and advocate alternatives. Some disabled voters (including the visually impaired) could use a tactile ballot, a ballot system using physical markers to indicate where a mark should be made, to vote a secret paper ballot. These ballots can be designed identically to those used by other voters. However, other disabled voters (including voters with dexterity disabilities) could be unable to use these ballots.
The concept of election verifiability through cryptographic solutions has emerged in the academic literature to introduce transparency and trust in electronic voting systems. It allows voters and election observers to verify that votes have been recorded, tallied and declared correctly, in a manner independent from the hardware and software running the election. Three aspects of verifiability are considered: individual, universal, and eligibility. Individual verifiability allows a voter to check that her own vote is included in the election outcome, universal verifiability allows voters or election observers to check that the election outcome corresponds to the votes cast, and eligibility verifiability allows voters and observers to check that each vote in the election outcome was cast by a uniquely registered voter.
Electronic voting machines are able to provide immediate feedback to the voter detecting such possible problems as undervoting and overvoting which may result in a spoiled ballot. This immediate feedback can be helpful in successfully determining voter intent.
It has been alleged by groups such as the UK-based Open Rights Group that a lack of testing, inadequate audit procedures, and insufficient attention given to system or process design with electronic voting leaves "elections open to error and fraud".
In 2009, the Federal Constitutional Court of Germany found that when using voting machines the "verification of the result must be possible by the citizen reliably and without any specialist knowledge of the subject." The DRE Nedap-computers used till then did not fulfill that requirement. The decision did not ban electronic voting as such, but requires all essential steps in elections to be subject to public examinability.
In 2013, The California Association of Voting Officials was formed to maintain efforts toward publicly owned General Public License open source voting systems
In 2013, researchers from Europe proposed that the electronic voting systems should be coercion evident. There should be a public evidence of the amount of coercion that took place in a particular elections. An internet voting system called "Caveat Coercitor" shows how coercion evidence in voting systems can be achieved.
A fundamental challenge with any voting machine is produce evidence that the votes were recorded as cast and tabulated as recorded. Election results produced by voting systems that rely on voter-marked paper ballots can be verified with manual hand counts (either valid sampling or full recounts). Non-document ballot voting systems must support auditability in different ways. An independently auditable system, sometimes called an Independent Verification, can be used in recounts or audits. These systems can include the ability for voters to verify how their votes were cast or enable officials to verify that votes were tabulated correctly.
A discussion draft argued by researchers at the National Institute of Standards and Technology (NIST) states, "Simply put, the DRE architecture’s inability to provide for independent audits of its electronic records makes it a poor choice for an environment in which detecting errors and fraud is important." The report does not represent the official position of NIST, and misinterpretations of the report has led NIST to explain that "Some statements in the report have been misinterpreted. The draft report includes statements from election officials, voting system vendors, computer scientists and other experts in the field about what is potentially possible in terms of attacks on DREs. However, these statements are not report conclusions."
Various technologies can be used to assure DRE voters that their votes were cast correctly, and allow officials to detect possible fraud or malfunction, and to provide a means to audit the tabulated results. Some systems include technologies such as cryptography (visual or mathematical), paper (kept by the voter or verified and left with election officials), audio verification, and dual recording or witness systems (other than with paper).
Dr. Rebecca Mercuri, the creator of the Voter Verified Paper Audit Trail (VVPAT) concept (as described in her Ph.D. dissertation in October 2000 on the basic voter verifiable ballot system), proposes to answer the auditability question by having the voting machine print a paper ballot or other paper facsimile that can be visually verified by the voter before being entered into a secure location. Subsequently, this is sometimes referred to as the "Mercuri method." To be truly voter-verified, the record itself must be verified by the voter and able to be done without assistance, such as visually or audibly. If the voter must use a bar-code scanner or other electronic device to verify, then the record is not truly voter-verifiable, since it is actually the electronic device that is verifying the record for the voter. VVPAT is the form of Independent Verification most commonly found in elections in the United States and other countries such as Venezuela.
End-to-end auditable voting systems can provide the voter with a receipt that can be taken home. This receipt does not allow voters to prove to others how they voted, but it does allow them to verify that the system detected their vote correctly. End-to-end (E2E) systems include Punchscan, ThreeBallot and Prêt à Voter. Scantegrity is an add-on that extends current optical scan voting systems with an E2E layer. The city of Takoma Park, Maryland used Scantegrity II for its November, 2009 election.
Systems that allow the voter to prove how they voted are never used in U.S. public elections, and are outlawed by most state constitutions. The primary concerns with this solution are voter intimidation and vote selling.
An audit system can be used in measured random recounts to detect possible malfunction or fraud. With the VVPAT method, the paper ballot is often treated as the official ballot of record. In this scenario, the ballot is primary and the electronic records are used only for an initial count. In any subsequent recounts or challenges, the paper, not the electronic ballot, would be used for tabulation. Whenever a paper record serves as the legal ballot, that system will be subject to the same benefits and concerns as any paper ballot system.
To successfully audit any voting machine, a strict chain of custody is required.
The solution was first demonstrated (New York City, March 2001) and used (Sacramento, California 2002) by AVANTE International Technology, Inc.. In 2004 Nevada was the first state to successfully implement a DRE voting system that printed an electronic record. The $9.3 million voting system provided by Sequoia Voting Systems included more than 2,600 AVC EDGE touchscreen DREs equipped with the VeriVote VVPAT component.  The new systems, implemented under the direction of then Secretary of State Dean Heller replaced largely punched card voting systems and were chosen after feedback was solicited from the community through town hall meetings and input solicited from the Nevada Gaming Control Board.
Inadequately secured hardware can be subject to physical tampering. Some critics, such as the group "Wij vertrouwen stemcomputers niet" ("We do not trust voting machines"), charge that, for instance, foreign hardware could be inserted into the machine, or between the user and the central mechanism of the machine itself, using a man in the middle attack technique, and thus even sealing DRE machines may not be sufficient protection. This claim is countered by the position that review and testing procedures can detect fraudulent code or hardware, if such things are present, and that a thorough, verifiable chain of custody would prevent the insertion of such hardware or software. Security seals are commonly employed in an attempt to detect tampering, but testing by Argonne National Laboratory and others demonstrates that existing seals can usually be quickly defeated by a trained person using low-tech methods.
Security experts, such as Bruce Schneier, have demanded that voting machine source code should be publicly available for inspection. Others have also suggested publishing voting machine software under a free software license as is done in Australia. Software such as Sammaty come under GNU GPL, which means their source code is publicly available and hence transparent.
Testing and certificationEdit
One method to any error with voting machines is parallel testing, which are conducted on the Election Day with randomly picked machines. The ACM published a study showing that, to change the outcome of the 2000 U.S. Presidential election, only 2 votes in each precinct would have needed to be changed.
Criticisms can be mitigated by review and testing procedures to detect fraudulent code or hardware, if such things are present, and through a verifiable chain of custody to prevent the insertion of such hardware or software.
Critics also mention the increasing number of attack programs that online voting systems are greatly susceptible to. Malicious payloads- software data intended to do damage- have become so advanced that they can easily change a voter’s vote without any knowledge to other parties, regardless of voter identification or encryption software.
Those in opposition suggest alternate vote counting systems, citing Switzerland (as well as many other countries), which uses paper ballots exclusively, suggesting that electronic voting is not the only means to get a rapid count of votes. A country of a little over 7 million people, Switzerland publishes a definitive ballot count in about six hours. In villages, the ballots are even counted manually.
Critics also note that it becomes difficult or impossible to verify the identity of a voter remotely, and that the introduction of public networks become more vulnerable and complex.
Polling place electronic voting or Internet voting examples have taken place in Australia, Belgium, Brazil, Canada, Estonia, France, Germany, India, Italy, Namibia, the Netherlands (Rijnland Internet Election System), Norway, Peru, Switzerland, the UK, Venezuela, and the Philippines.
In 1996, after tests conducted on more than 50 municipalities, the Brazilian Electoral Justice has launched their "voting machine". Since 2000, all Brazilian voters are able to use the electronic ballot boxes to choose their candidates. In 2010 presidential election, which had more than 135 million voters, the result was defined 75 minutes after the end of voting. The electronic ballot box is made up of two micro-terminals (one located in the voting cabin and the other with the voting board representative) which are connected by a 5-meter cable. Externally, the micro-terminals have only a numerical keyboard, which does not accept any command executed by the simultaneous pressure of more than one key. In case of power failure, the internal battery provides the energy or it can be connected to an automotive battery. The Brazilian electronic ballot box serves today as a model for other countries.
Each Estonian citizen possesses an electronic chip-enabled ID card, which allows him/her to vote over the internet. The ID card is inserted into a card reader, which is connected to a computer. Once his/her identity is verified (using the electronic ID card as a sort of digital signature), he/she can then cast his/her vote via the internet. Votes are not considered final until the end of election day, so Estonian citizens can go back and re-cast their votes until election day is officially over. Popularity of online voting in Estonia has increased widely throughout the nation, as in the elections of 2014 and 2015, nearly one third of Estonian votes were cast online.
Electronic Voting Machines ("EVM") are being used in Indian General and State Elections to implement electronic voting in part from 1999 elections and recently in 2017 state elections held in five states across India. EVMs have replaced paper ballots in local, state and general (parliamentary) elections in India. There were earlier claims regarding EVMs' tamparability and security which have not been proved.After rulings of Delhi High Court, Supreme Court and demands from various political parties,Election Commission decided to introduce EVMs with voter-verified paper audit trail (VVPAT) system. The VVPAT system was introduced in 8 of 543 parliamentary constituencies as a pilot project in Indian general election, 2014.
It has been suggested that this section be merged with Electronic voting by country#United States of America. (Discuss) Proposed since December 2017.
Timeline of developmentEdit
The U.S. Government is given a report by Roy Saltman, a consultant in developing election technology and policies, in which the certification of voting machines is analyzed for the first time.
Aug 28, 1986
The Uniformed and Overseas Citizen Absentee Voting Act of 1986 (UOCAVA) requires that US states allow certain groups of citizens to register and vote absentee in elections for federal offices.
The FEC (Federal Election Commission) released a universalized standard for computerized voting.
The FEC revised the standards established for electronic voting from 1990.
4,438 of votes in the general election is lost by North Carolina’s electronic voting machines. The machines continued to count electronic votes past the device's memory capacity and the votes were irretrievably lost.
Black Box Voting showed how easy it is to hack an electronic voting system. Computer experts in Leon County, Fl lead a simulation where they changed the outcome of a mock election by tampering with the tabulator without leaving evidence of their actions.
Sep 13, 2006
It was demonstrated that Diebold Electronic Voting Machine can be hacked in less than a minute. Princeton's Professor of Computer Science, Edward Felten who installed a malware which could steal votes and replace them with fraudulent numbers without physically coming in contact with the voting machine or its memory card. The malware can also program a virus that can spread from machine to machine.
Sep 21, 2006
The governor of Maryland, Bob Ehrlich (R), advised against casting electronic votes as an alternative method for casting paper absentee ballots. This was a complete turn around since Maryland became one of the first states to accept electronic voting systems statewide during his term.
Sep 3, 2009
Diebold, responsible for much of the technology in the election-systems business, sells their hold to Election Systems & Software, Inc for $5 Million, less than 1/5 of its price seven years earlier. 
Oct 28, 2009
The federal Military and Overseas Voters Empowerment Act (MOVE) requires US states to provide ballots to UOCAVA voters in at least one electronic format (email, fax, or an online delivery system).
Jan 3, 2013
Voter Empowerment Act of 2013 – This act requires each US state to make available public websites for online voter registration.
Astronauts in orbitEdit
Texas law has allowed American astronauts who cannot vote in person and are unable to vote via absentee ballot, such as those aboard the International Space Station and Mir space station, to cast their ballots in federal elections electronically from orbit since 1997. Ballots are sent via secure email to the Johnson Spaceflight Center and then passed on to the astronauts' home counties in Texas.
Recommendations for improvementEdit
In December 2005 the US Election Assistance Commission unanimously adopted the 2005 Voluntary Voting System Guidelines, which significantly increase security requirements for voting systems and expand access, including opportunities to vote privately and independently, for individuals with disabilities. The guidelines took effect in December 2007 replacing the 2002 Voting System Standards (VSS) developed by the Federal Election Commission.
Some groups such as the Open Voting Consortium believe that to restore voter confidence and to reduce the potential for fraud, all electronic voting systems must be completely available to public scrutiny.
Also proposed is the requirement for use of open public standards and specifications such as the Election Markup Language (EML) standard developed by OASIS and now under consideration by ISO (see documents and schemas). These can provide consistent processes and mechanisms for managing and performing elections using computer systems.
In the summer of 2004, the Legislative Affairs Committee of the Association of Information Technology Professionals issued a nine-point proposal for national standards for electronic voting. In an accompanying article, the committee's chair, Charles Oriez, described some of the problems that had arisen around the country.
Legislation has been introduced in the United States Congress regarding electronic voting, including the Nelson-Whitehouse bill. This bill would appropriate as much as 1 billion dollars to fund states' replacement of touch screen systems with optical scan voting system. The legislation also addresses requiring audits of 3% of precincts in all federal elections. It also mandates some form of paper trail audits for all electronic voting machines by the year 2012 on any type of voting technology.
Another bill, HR.811 (The Voter Confidence and Increased Accessibility Act of 2003), proposed by Representative Rush D. Holt, Jr., a Democrat from New Jersey, would act as an amendment to the Help America Vote Act of 2002 and require electronic voting machines to produce a paper audit trail for every vote. The U.S. Senate companion bill version introduced by Senator Bill Nelson from Florida on November 1, 2007, necessitates the Director of the National Institute of Standards and Technology to continue researching and to provide methods of paper ballot voting for those with disabilities, those who do not primarily speak English, and those who do not have a high literacy rating. Also, it requires states to provide the federal office with audit reports from the hand counting of the voter verified paper ballots. Currently, this bill has been turned over to the United States Senate Committee on Rules and Administration and a vote date has not been set.
During 2008, Congressman Holt, because of an increasing concern regarding the insecurities surrounding the use of electronic voting technology, submitted additional bills to Congress regarding the future of electronic voting. One, called the "Emergency Assistance for Secure Elections Act of 2008" (HR5036), states that the General Services Administration will reimburse states for the extra costs of providing paper ballots to citizens, and the costs needed to hire people to count them. This bill was introduced to the House on January 17, 2008. This bill estimates that $500 million will be given to cover costs of the reconversion to paper ballots; $100 million given to pay the voting auditors; and $30 million given to pay the hand counters. This bill provides the public with the choice to vote manually if they do not trust the electronic voting machines. A voting date has not yet been determined.
The Secure America's Future Elections Act or the SAFE Act (HR 1562) was among the relevant legislation introduced in the 115th Congress. The bill's provisions include designation of the infrastructure used to administer elections as critical infrastructure; funding for states to upgrade the security of the information technology and cybersecurity elements of election-related IT systems; and requirements for durable, readable paper ballots and manual audits of results of elections.
Documented problems with electronic votingEdit
- iVote is a remote electronic voting system in New South Wales that allows eligible voters a chance to vote over the Internet. However, during the New South Wales state election in 2015, there were several reports that over 66,000 electronic votes could have been compromised. Although the iVote website is secure, security specialist believe that a third party website was able to attack the system. This was the first time a major vulnerability was discovered in the middle of an ongoing poll.
- In April 2017, Eighteen EVM machines in Dholpur, Rajasthan were found to be registering votes for the wrong person. Votes being given to one party were wrongly being registered for another political party, BJP instead.
- In the April 2017 elections in Bhind (Madhya Pradesh), electronic machines were found rigged, thus registering votes to the Bharatiya Janta Party (BJP) even when the voter voted for other parties. 18 officials were suspended due to this, however the results were not declared incorrect.
- Omesh Saigal, an IIT alumnus and IAS officer, demonstrated that the 2009 elections in India when Congress Party of India came back to power might be rigged. This forced the election commission to review the current EVMs.
- In Finland, the Supreme Administrative Court declared invalid the results of a pilot electronic vote in three municipalities, and ordered a rerun of the municipal elections (Karkkila, Kauniainen and Vihti). The system had a usability problem where the messages were ambiguous on whether the vote had been cast. In a total of 232 cases (2% of votes), voters had logged in, selected their vote but not confirmed it, and left the booth; the votes were not recorded. Following the failure of the pilot election, the Finnish government has abandoned plans to continue electronic voting based on voting machines. In the memo it was concluded, that the voting machine is not developed any more, and Finnish government will follow the development of different electronic voting systems worldwide.
- On October 30, 2006, the Dutch Minister of the Interior withdrew the license of 1187 voting machines from manufacturer Sdu NV, about 10% of the total number to be used, because it was proven by the General Intelligence and Security Service that one could eavesdrop on voting from up to 40 meters using Van Eck phreaking. National elections are to be held 24 days after this decision. The decision was forced by the Dutch grass roots organisation Wij vertrouwen stemcomputers niet ("We do not trust voting computers").
- A number of problems with voting systems in Florida since the 2000 Presidential election.
- Fairfax County, Virginia, November 4, 2003. Some voters complained that they would cast their vote for a particular candidate and the indicator of that vote would go off shortly after.
- The Premier Election Solutions (formerly Diebold Election Systems) TSx voting system disenfranchised many voters in Alameda and San Diego Counties during the March 2, 2004, California presidential primary due to non-functional voter card encoders. On April 30 California's secretary of state Kevin Shelley decertified all touch-screen machines and recommended criminal prosecution of Diebold Election Systems. The California Attorney-General decided against criminal prosecution, but subsequently joined a lawsuit against Diebold for fraudulent claims made to election officials. Diebold settled that lawsuit by paying $2.6 million. On February 17, 2006 the California Secretary of State Bruce McPherson then recertified Diebold Election Systems DRE and Optical Scan Voting System.
- In Napa County, California, March 2, 2004, an improperly calibrated marksense scanner overlooked 6,692 absentee ballot votes.
- Instances of faulty technology and security issues surrounding these machines were documented on August 1, 2001, in the Brennan Center at New York University Law School. NY University Law School released a report with more than 60 examples of e-voting machine failures in 26 states in 2004 and 2006. Examples included Spanish language ballots that were cast by voters but not counted in Sacramento in 2004.
- In 2010, graduate students from the University of Michigan hacked into the District of Columbia online voting systems during an online voting mock test run and changed all the cast ballots to cater to their preferred candidates. This voting system was being tested for military voters and overseas citizens, allowing them to vote on the Web, and was scheduled to run later that year. It only took the hackers, a team of computer scientists, thirty-six hours to find the list of the government’s passwords and break into the system.
- Problems in the United States general elections, 2006
- During early voting in Miami, Hollywood and Fort Lauderdale, Florida, in October 2006 three votes intended to be recorded for Democratic candidates were displaying as cast for Republican. Election officials attributed it to calibration errors in the touch screen of the voting system.
- In Pennsylvania, a computer programming error forced some to cast paper ballots. In Indiana, 175 precincts also resorted to paper. Counties in those states also extended poll hours to make up for delays.
- Cuyahoga County, Ohio: The Diebold computer server froze and stopped counting votes then the printers jammed so paper copies could not be retrieved for many votes and there was no way to be sure of the accuracy of the votes when the votes were being counted.
- Waldenburg, Arkansas: The touch screen computer tallied zero votes for one mayoral candidate who confirmed that he certainly voted for himself and therefore there would be a minimum of one vote; this is a case of disappearing votes on touchscreen machines.
- Sarasota, Florida: There was an 18,000-person "undervote" in a congressional election. The subsequent investigation found that the undervote was not caused by software error. Poor ballot design was widely acknowledged as the cause of the undervote.
- 2008 United States elections
- Virginia, Tennessee, and Texas: Touch screen voting machines flipped votes in early voting trials.
- Humboldt County, California: A security flaw erased 197 votes from the computer database.
- California top-to-bottom review
In May 2007, California Secretary of State Debra Bowen commissioned a "top-to-bottom review" of all electronic voting systems in the state. She engaged computer security experts led by the University of California to perform security evaluations of voting system source code as well as "red teams" running "worst case" Election Day scenarios attempting to identify vulnerabilities to tampering or error. The Top to Bottom review also included a comprehensive review of manufacturer documentation as well as a review of accessibility features and alternative language requirements.
The end results of the tests were released in the four detailed Secretary of State August 3, 2007, resolutions (for Diebold Election Systems, Hart InterCivic, Sequoia Voting Systems and Elections Systems and Software, Inc.) and updated October 25, 2007 revised resolutions for Diebold and Sequoia voting systems. The security experts found significant security flaws in all of the manufacturers' voting systems, flaws that could allow a single non-expert to compromise an entire election.
On August 3, 2007, Bowen decertified machines that were tested in her top-to-bottom view including the ES&S InkaVote machine, which was not included in the review because the company submitted it past the deadline for testing. The report issued July 27, 2007, was conducted by the expert "red team" attempting to detect the levels of technological vulnerability. Another report on August 2, 2007 was conducted by a source code review team to detect flaws in voting system source code. Both reports found that three of the tested systems fell far short of the minimum requirements specified in the 2005 Voluntary Voting System Guidelines (VVSG). Some of the systems tested were conditionally recertified with new stringent security requirements imposed. The companies in question have until the February 2008 California Presidential Primaries to fix their security issues and ensure that election results can be closely audited.
The Premier Election Solutions (formerly Diebold Election Systems) AccuVote-TSx voting system was studied by a group of Princeton University computer scientists in 2006. Their results showed that the AccuVote-TSx was insecure and could be "installed with vote-stealing software in under a minute." The scientists also said that machines can transmit computer viruses from one to another "during normal pre- and post-election activity."
- 2000 presidential election in Florida
Punched cards received considerable notoriety in 2000 when their uneven use in Votomatic style systems in Florida was alleged to have affected the outcome of the U.S. presidential election. Invented by Joseph P. Harris, Votomatic was manufactured for a time under license by IBM. William Rouverol, who built the prototype and wrote patents, stated that after the patents expired in 1982, lower quality machines had appeared on the market. The machines used in Florida had five times as many errors as a true Votomatic, he said.
Punched-card-based voting systems, the Votomatic system in particular, use special cards where each possible hole is pre-scored, allowing perforations to be made by the voter pressing a stylus through a guide in the voting machine. A problem with this system is the incomplete punch; this can lead to a smaller hole than expected, or to a mere slit in the card, or to a mere dimple in the card, or to a hanging chad. This technical problem was claimed by the Democratic Party to have influenced the 2000 U.S. presidential election in the state of Florida; critics claimed that punched card voting machines were primarily used in Democratic areas and that hundreds of ballots were not read properly or were disqualified due to incomplete punches, which allegedly tipped the vote in favor of George W. Bush over Al Gore.
In the 2006 film Man of the Year starring Robin Williams, the character played by Williams—a comedic host of political talk show—wins the election for President of the United States when a software error in the electronic voting machines produced by the fictional manufacturer Delacroy causes votes to be tallied inaccurately.
In Runoff, a 2007 novel by Mark Coggins, a surprising showing by the Green Party candidate in a San Francisco Mayoral election forces a runoff between him and the highly favored establishment candidate—a plot line that closely parallels the actual results of the 2003 election. When the private-eye protagonist of the book investigates at the behest of a powerful Chinatown businesswoman, he determines that the outcome was rigged by someone who defeated the security on the city's newly installed e-voting system.
"Hacking Democracy" is a 2006 documentary film shown on HBO. Filmed over three years, it documents American citizens investigating anomalies and irregularities with electronic voting systems that occurred during America's 2000 and 2004 elections, especially in Volusia County, Florida. The film investigates the flawed integrity of electronic voting machines, particularly those made by Diebold Election Systems and culminates in the hacking of a Diebold election system in Leon County, Florida.
The central conflict in the MMO video game Infantry resulted from the global institution of direct democracy through the use of personal voting devices sometime in the 22nd century AD. The practice gave rise to a 'voting class' of citizens composed mostly of homemakers and retirees who tended to be at home all day. Because they had the most free time to participate in voting, their opinions ultimately came to dominate politics.
Electronic voting manufacturersEdit
- Advanced Voting Solutions, formerly Shoup Voting Machine Co.
- Bharat Electronics Limited (India)
- Dominion Voting Systems (Canada)
- Electronics Corporation of India Ltd
- ES&S (United States)
- Everyone Counts (United States)
- Hart InterCivic (United States)
- Nedap (Netherlands)
- Premier Election Solutions (formerly Diebold Election Systems) (United States)
- Sequoia Voting Systems (United States)
- VOTEX / TM Technologies Elections Inc. (Canada)
- "i-Voting". e-Estonia. Archived from the original on 2017-02-11.
- "Res. 9597 Philippines concerning grid power requirements for various needs including i-voting". nea.gov.ph. Archived from the original on 2013-07-02.
- "Switzerland's new legislation on internet voting". electoralpractice.ch. Archived from the original on 2015-04-02.
- Buchsbaum, T. (2004). "E-voting: International developments and lessons learnt". Proceedings of Electronic Voting in Europe Technology, Law, Politics and Society. Lecture Notes in Informatics. Workshop of the ESF TED Programme together with GI and OCG.
- Zissis, D.; Lekkas (April 2011). "Securing e-Government and e-Voting with an open cloud computing architecture". Government Information Quarterly. 28 (2): 239–251. doi:10.1016/j.giq.2010.05.010.
- Hagai Bar-El. "Why secure e-voting is so hard to get". Archived from the original on 2015-09-12.
- Thompson, Ken (August 1984) Reflections on Trusting Trust
- Schneier, Bruce (September 2004), openDemocracy Archived 2007-06-09 at the Wayback Machine. What’s wrong with electronic voting machines? Archived 2008-05-22 at the Wayback Machine.
- Schneier, Bruce. "An Incredibly Insecure Voting Machine". Schneier on Security. Archived from the original on 8 December 2015. Retrieved 3 December 2015.
- Feldman, Halterman & Felten. "Security Analysis of the Diebold AccuVote-TS Voting Machine". Usenix. Archived from the original on 8 December 2015. Retrieved 3 December 2015.
- Schneier, Bruce. "What's Wrong With Electronic Voting Machines?". Schneier on Security. Archived from the original on 8 December 2015. Retrieved 3 December 2015.
- "Wichita State mathematician says Kansas voting machines need to be audited to check accuracy". Topeka Capital-Journal. Archived from the original on 3 December 2015. Retrieved 3 December 2015.
- Kobie, Nicole. "Why electronic voting isn't secure". The Guardian. Archived from the original on 8 December 2015. Retrieved 3 December 2015.
- Hern, Alex. "Should Britain introduce electronic voting?". The Guardian. Archived from the original on 8 December 2015. Retrieved 3 December 2015.
- Saltman, Roy.EFFECTIVE USE OF COMPUTING TECHNOLOGY IN VOTE-TALLYING Archived 2016-02-11 at Wikiwix. NIST.
- Serdült, U. (April 2015). "Fifteen Years of Internet Voting in Switzerland: History, Governance and Use". IEEE Xplore CFP1527Y-PRT: 126–132. doi:10.1109/ICEDEG.2015.7114487. ISBN 978-3-9075-8910-6.
- "Event List" (PDF). caltech.edu. Archived from the original (PDF) on 2016-03-04.
- U.S. Election Assistance Commission. "2005 Voluntary Voting System Guidelines". Archived from the original (PDF) on February 7, 2008.
- Kids Voting Central Ohio. "A Short History of Voting in the United States" (PDF). Archived from the original (PDF) on 2010-12-23.
- U.S. Federal Election Commission. "Direct Recording Electronic information page". Archived from the original on 2007-11-14.
- "Know Your Electronic Voting Machine" (PDF). Archived (PDF) from the original on 2011-06-05. Retrieved 2010-09-01.
- "Aam Aadmi Party "proved" in voting machines in the assembly". ManoramaOnline. Archived from the original on 2017-12-22. Retrieved 2017-12-19.
- "Arizona Democratic Party Selects Votation.com to Hold World's First Legally-Binding Public Election Over the Internet. - Free Online Library". www.thefreelibrary.com. Retrieved 2017-12-19.
- "How online voting works". usatoday.com. 10 March 2000.
- Alvarez, R. Michael; Hall, Thad E.; Trechsel, Alexander H. (2009-07-01). "Internet Voting in Comparative Perspective: The Case of Estonia". PS: Political Science & Politics. 42 (3): 497–505. doi:10.1017/S1049096509090787. ISSN 1537-5935. Archived from the original on 2017-12-22.
- Doug Gross (8 November 2011). "Why can't Americans vote online?". CNN. Archived from the original on 4 March 2016.
- Germann, Micha; Serdült, Uwe (2017-06-01). "Internet voting and turnout: Evidence from Switzerland". Electoral Studies. 47: 1–12. doi:10.1016/j.electstud.2017.03.001.
- Bochsler, Daniel (May 26, 2010). "Can Internet voting increase political participation?" (PDF). Centre for the Study of Imperfection in Democracies. Archived (PDF) from the original on September 18, 2016.
- "The Constitutionality of Electronic Voting in Germany". NDI - National Democratic Institute USA. Archived from the original on 25 March 2017. Retrieved 31 May 2017.
- Mellon, Jonathan; Peixoto, Tiago; Sjoberg, Fredrik M (2017-06-01). "Does online voting change the outcome? Evidence from a multi-mode public policy referendum". Electoral Studies. 47: 13–24. doi:10.1016/j.electstud.2017.02.006.
- Mukunth, Vasudevan (10 May 2017). "Ten Questions Worth Asking About EVM Tampering". The Wire. Archived from the original on 11 May 2017. Retrieved 31 May 2017.
- Springall, Drew; Finkenauer, Travis; Durumeric, Zakir; Kitcat, Jason; Hursti, Harri; MacAlpine, Margaret; Halderman, Alex, Security Analysis of the Estonian Internet Voting System, retrieved 3 December 2017
- Friel, Brian (November 2006)Let The Recounts Begin, National Journal Archived June 19, 2005, at the Wayback Machine.
- Government Accountability Office (May 2004) "Electronic Voting Offers Opportunities and Presents Challenges Archived 2016-03-03 at the Wayback Machine."
- Government Accountability Office (September 2005) "Federal Efforts to Improve Security and Reliability of Electronic Voting Systems Are Under Way, but Key Activities Need to Be Completed Archived 2016-02-09 at the Wayback Machine."
- "Archived copy". Archived from the original on November 20, 2015. Retrieved June 2, 2016.
- "Protecting the Integrity and Accessibility of Voting in 2004 and Beyond". People for the American Way Archived December 12, 2004, at the Wayback Machine.
-  Archived August 10, 2007, at the Wayback Machine.
- "Ballot Templates." Archived 2012-08-29 at the Wayback Machine. (tactile ballots) International Foundation for Election Systems
- Juels, Ari; Dario Catalano; Markus Jakobsson (November 2002). "Coercion-Resistant Electronic Elections". Cryptology ePrint Archive (165). Archived from the original on 7 April 2014. Retrieved 2 May 2012.
- Chaum, David; Peter Y. A. Ryan; Steve Schneider (2005). "A Practical Voter-Verifiable Election Scheme". ESORICS'05: 10th European Symposium on Research in Computer Security. LNCS. 3679: 118–139.
- Kremer, Steve; Mark Ryan; Ben Smyth (2010). "Election verifiability in electronic voting protocols". ESORICS'10: 15th European Symposium on Research in Computer Security. 6345: 389–404.
- "ORG Election Report highlights problems with voting technology used". Openrightsgroup.org. Archived from the original on 2009-02-24. Retrieved 2010-05-24.
- "Open Rights Group - ORG verdict on London Elections: "Insufficient evidence" to declare confidence in results". Open Rights Group. Archived from the original on 2009-04-22.
- "Ruling of the Second Senate of the Federal Constitutional Court of Germany, 3 March 2009". Bundesverfassungsgericht.de. Archived from the original on 11 July 2011. Retrieved 2010-05-24.
- "German Federal Constitutional Court, Press release no. 19/2009 of 3 March 2009". Bundesverfassungsgericht.de. Archived from the original on 4 April 2009. Retrieved 2010-05-24.
- Gurchetan S Grewal, Mark D Ryan, Sergiu Bursuc, Peter Y A Ryan. Caveat Coercitor: coercion-evidence in electronic voting. 34th IEEE Symposium on Security and Privacy, 2013
- Caveat Coercitor: coercion-evidence in electronic voting Archived 2016-03-03 at the Wayback Machine., 2013 IEEE Symposium on Security and Privacy
- "Draft white paper on VVPR" (PDF). Archived from the original (PDF) on November 28, 2009. Retrieved 2010-05-24.
-  Archived February 2, 2007, at the Wayback Machine.
- apleasant (2013-11-25). "E-voting Audits in Venezuela". www.ndi.org. Archived from the original on 2017-02-14. Retrieved 2017-02-13.
- "Pilot Study of the Scantegrity II Voting System Planned for the 2009 Takoma Park City Election" (PDF). Archived from the original (PDF) on July 19, 2011.
- Hardesty, Larry. "Cryptographic voting debuts". MIT news. Archived (PDF) from the original on 2011-07-19. Retrieved 2009-11-30.
- ‘Paper trail’ voting system used in Nevada Archived 2009-02-23 at the Wayback Machine., Associated Press Sept. 7, 2004
- Nevada improves odds with e-vote Archived 2016-03-03 at the Wayback Machine., CNN October 29, 2004
- "Nedap/Groenendaal ES3B voting computer a security analysis (chapter 7.1)" (PDF). Archived (PDF) from the original on 2010-01-07. Retrieved 2010-05-24.
- "Defeating Existing Tamper-Indicating Seals". Argonne National Laboratory. Archived from the original on 2008-10-07.
- "The Problem with Electronic Voting Machines". Schneier.com. Archived from the original on 2010-02-08. Retrieved 2010-05-24.
- "The electronic voting and counting system". Elections.act.gov.au. Archived from the original on February 18, 2011. Retrieved 2010-05-24.
- "Sammaty Election Engine under GNU GPL v3". Archived from the original on 2016-03-04.
- Di Franco, A., Petro, A., Shear, E., and Vladimirov, V. 2004. Small vote manipulations can swing elections. Commun. ACM 47, 10 (Oct. 2004), 43–45. DOI= http://doi.acm.org/10.1145/1022594.1022621
- Rubin, Avi (2002). "Security Considerations for Remote Electronic Voting over the Internet". Communications Policy and Information Technology: Promises, Problems, Prospects. MIT Press. p. 105. ISBN 978-0-262-03300-8. Archived from the original on 2018-05-10.
- Ron McCallum, 'Participating in Political and Public life' (2011) 32 AltLJ 80. "Archived copy". Archived from the original on 2016-01-06. Retrieved 2016-02-08.
- E-lected (2014-05-28). "E-voting scores another triumph in Belgium". e-lected blog (a view on electronic voting around the world). Archived from the original on 2017-02-14. Retrieved 2017-02-13.
- "e-Democracy entrepreneur: 'Online voting will boom in coming years'". EurActiv.com. Archived from the original on 2016-11-19. Retrieved 2017-02-13.
- Canada, Elections. "A Comparative Assessment of Electronic Voting". Archived from the original on 2017-02-14. Retrieved 2017-02-13.
- "BBC NEWS | Europe | Estonia forges ahead with e-vote". news.bbc.co.uk. Archived from the original on 2017-03-17. Retrieved 2017-01-29.
- "i-Voting - e-Estonia". e-estonia.com. Archived from the original on 2017-02-11. Retrieved 2017-01-29.
- Kobie, Nicole (2015-03-30). "Why electronic voting isn't secure – but may be safe enough". The Guardian. ISSN 0261-3077. Archived from the original on 2017-03-08. Retrieved 2017-02-13.
- Forum, Forbes Leadership. "Venezuela's Election System Holds Up As A Model For The World". Forbes. Archived from the original on 2017-02-14. Retrieved 2017-02-13.
- News, ABS-CBN. "US, EU hail democratic milestone of Philippine polls". ABS-CBN News. Archived from the original on 2016-03-10. Retrieved 2017-02-13.
- Brazilian Superior Electoral Court. "Electronic voting". Archived from the original on 2012-07-21.
- "Statistics - Internet Voting - Voting methods in Estonia - Estonian National Electoral Committee". Archived from the original on 9 April 2017. Retrieved 1 April 2017.
- "Verifiable Internet Voting in Estonia" http://research.cyber.ee/~jan/publ/mobileverification-ie Archived 2014-12-09 at the Wayback Machine.
- E. G. Arnold, History of Voting Systems in California Archived 2016-03-06 at the Wayback Machine., California Secretary of State Bill Jones, June 1999.
- Douglas W. Jones and Barbara Simons, Broken Ballots, CSLI Publications, 2012; see Section 5.2, page 96.
- "How E-voting Works". HowStuffWorks. Archived from the original on 2015-07-03.
- "Electronic Voting". Archived from the original on 2015-05-06.
- "Historical Timeline". Retrieved 2015-02-25.
- "Archived copy". Archived from the original on 2015-05-15. Retrieved 2015-05-22.
- "Voter Empowerment Act of 2013 (2013; 113th Congress H.R. 12) - GovTrack.us". GovTrack.us. Archived from the original on 2015-10-18.
- "Astronauts beam votes home". CNN. 2 November 2010. Archived from the original on 3 March 2016.
- James, Kate (2 November 2010). "Astronauts Cast Vote From Space Thanks to 1997 Texas Law". Gather.com. Archived from the original on 11 May 2011. Retrieved 2 November 2010.
- "Index of /election/eml/v5.0/". Docs.oasis-open.org. Archived from the original on 2014-02-21. Retrieved 2014-02-06.
- "Legislative Committee Resolution Awaiting BOD Approval" Archived 2011-07-24 at the Wayback Machine.. (July 2004). Information Executive
-  Archived September 8, 2004, at the Wayback Machine.
-  Archived July 24, 2011, at the Wayback Machine.
- Padgett, Tim (2007-11-03). "Voting Out E-Voting Machines". TIME. Archived from the original on 2013-08-24. Retrieved 2014-02-06.
- AlterNet / By Steven Rosenfeld (2007-08-07). "The Fallout From California's Ban on Electronic Voting Machines". Alternet. Archived from the original on 2011-06-29. Retrieved 2014-02-06.
- "Bill Summary & Status - 110th Congress (2007–2008) - S.2295 - CRS Summary - THOMAS (Library of Congress)". Thomas.loc.gov. 2007-11-01. Archived from the original on 2015-10-18. Retrieved 2014-02-06.
- "Archived copy" (PDF). Archived from the original (PDF) on 2008-03-05. Retrieved 2008-03-06.
- "H.R.5036: Emergency Assistance for Secure Elections Act of 2008 - U.S. Congress". OpenCongress. 2008-04-15. Archived from the original on 2012-03-13. Retrieved 2014-02-06.
- Michael Safi. "NSW election result could be challenged over iVote security flaw". The Guardian. Archived from the original on 2016-11-24.
- Chatterjee, Abalokitesh (9 April 2017). "18 BJP Only EVMs Seized in Dholpur, Rajasthan". State Herald. Archived from the original on 13 June 2017. Retrieved 31 May 2017.
- Datta, Prabhash (10 April 2017). "How EVM tampering row flared up: Truth behind Bhind experiment of Madhya Pradesh". India Today. Archived from the original on 27 May 2017. Retrieved 31 May 2017.
- "Was Election 2009 rigged? - Rediff.com India News". Ia.rediff.com. 2009-07-04. Archived from the original on 2013-12-03. Retrieved 2014-02-06.
- "KHO: Kuntavaalit uusiksi Vihdissä, Karkkilassa ja Kauniaisissa" [Brax does not differ from the voting because of the mess]. YLE Uutiset, Talous ja politiikka (in Finnish). YLE. 2009-04-09. Archived from the original on April 12, 2009. Retrieved 2009-04-09.
- "Sähköisen äänestyksen kehittämistä ei jatketa nykyiseltä pohjalta" [the development of e-voting is not extended on the current basis] (in Finnish). Valtioneuvosto (Finnish Government). 2010-01-08. Archived from the original on 22 February 2014. Retrieved 26 February 2017.
- "Ministerie van Binnenlandse Zaken en Koninkrijksrelaties | Rijksoverheid.nl" (PDF). Minbzk.nl. Archived from the original (PDF) on March 25, 2009. Retrieved 2014-02-06.
- "Wij vertrouwen stemcomputers niet" (in Dutch). Wijvertrouwenstemcomputersniet.nl. Archived from the original on 2008-12-16. Retrieved 2010-05-24.
- "English – Wij vertrouwen stemcomputers niet". Wijvertrouwenstemcomputersniet.nl. Archived from the original on 2010-07-26. Retrieved 2010-05-24.
- AP via International Herald Tribune (October 30, 2006): "Dutch government scraps plans to use voting computers in 35 cities including Amsterdam"
- Dr. R. Mercuri (2002-09-11). "Florida Primary 2002: Back to the Future". Notablesoftware.com. Archived from the original on 2011-01-03. Retrieved 2010-05-24.
- Cho, David; Rein, Lisa (November 18, 2003). "Fairfax To Probe Voting Machines (Washington Post, November 18, 2003)". Washingtonpost.com. Archived from the original on November 9, 2012. Retrieved 2010-05-24.
- Greg Lucas (May 1, 2004). "State bans electronic balloting in 4 counties; Touch-screen firm accused of 'reprehensible,' illegal conduct". San Francisco Chronicle. Archived from the original on February 21, 2009.
- Hardy, Michael (March 3, 2004). "California nixes e-voting". Fcw.com. Archived from the original on March 7, 2016.
- Associated Press (November 10, 2004). "Diebold to Settle E-Voting Suit". Wired.com. Archived from the original on May 17, 2008. Retrieved 2010-05-24.
- State of California Secretary of State (February 17, 2006). Approval of use of Diebold Election Systems, Inc. Archived May 2, 2006, at the Wayback Machine.
- Kim, Zetter (2004-03-19). "E-Vote Snafu in California County". Wired. Archived from the original on September 16, 2013.
- Wheaton, Sarah. "Voting Test Falls Victim to Hackers". The New York Times. Archived from the original on 2017-06-27. Retrieved 2015-02-20.
- [dead link]
- [dead link]
- Thompson, Clive (January 6, 2008). "Can You Count on Voting Machines?". The New York Times. Archived from the original on April 2, 2015. Retrieved March 29, 2010.
- "2006 Congressional District 13 Race - Florida Division of Elections - Department of State". Election.dos.state.fl.us. Archived from the original on 2013-11-12. Retrieved 2014-02-06.
- "Technology Review". Technology Review. Retrieved 2010-05-24.
- Grossman, Wendy M (30 April 2009). "Why machines are bad at counting votes". London: The Guardian. Archived from the original on 28 February 2014. Retrieved 2009-07-14.
- CA SoS Top to Bottom Review Archived 2014-12-03 at the Wayback Machine. Retrieved March 2, 2012
- Simons, Barbara. August 13, 2007. "California: The Top to Bottom Review." Archived 2016-02-25 at the Wayback Machine. The Voter. Retrieved November 27, 2007.
- Riordan, Theresa. 13 September 2006. "Archived copy". Archived from the original on 2016-03-04. Retrieved 2016-02-08. Princeton University. Retrieved March 6, 2008.
- "IGS Votomatic Prototype Goes to the Smithsonian". Institute of Governmental Studies, Public Affairs Report. University of California, Berkeley. 42 (4). Winter 2001. Archived from the original (– Scholar search) on July 13, 2007.
- "January Magazine, "The Fix Is In"". Januarymagazine.com. Retrieved 2010-05-24.
- "Infantry Archive, 'The Collective Era'". freeinfantry.com. Archived from the original on 2017-01-03. Retrieved 2016-09-21.
|Wikimedia Commons has media related to Voting machines.|
- Electronic Vote around the World – Smartmatic
- Election Assistance Commission
- Vote.NIST.gov – The National Institute of Standards and Technology Help America Vote Act page.
- An Electronic Voting Case Study in KCA University, Kenya
- The Election Technology Library research list – A comprehensive list of research relating to technology use in elections.
- E-Voting information from ACE Project
- How do we vote in India.
- Electronic Voting Systems at Curlie (based on DMOZ)
- NPR summary of current technology status in the states of the U.S., as of May 2008.
- Internet Voting in Estonia
- Progetto Salento eVoting A project for an e-voting test in Melpignano e Martignano (Lecce – Italy) designed by Prof. Marco Mancarella – University of Salento.
- Jardí-Cedó, Roger; Pujol-Ahulló, Jordi; Castellà-Roca, Jordi; Viejo, Alexandre (2012). "Study on Poll-Site Voting and Verification Systems". Computers & Security. 31 (8): 989–1010. doi:10.1016/j.cose.2012.08.001. A review of existing electronic voting systems and its verification systems in supervised environments.
- Open Counting
- Systems Behind E-Voting
- VoteBox(tm) UK Online Voting