The ETA cites sources that inform data analysis for specific states or counties directly within each data analysis, including links to source data. Our citation approach is a combination of in-text hyperlinks and a bibliography-style list of sources at the end of the analysis. We take the same approach in the formal PDF versions of our state or county data packages.
More generalized sources that inform and underpin our work more broadly have been collated here for ease of reference. When appropriate, we have included excerpts from the sources listed.
Broad categories of other resources:
Breaches of Voting System Software Warrant Recounts to Ensure Election Verification
Letter to Vice President Harris from Computer Security Experts (archived)
November 13, 2024 | FreeSpeechForPeople
Description:
A group of computer security experts have written to Vice President Kamala Harris to alert her to the fact that voting systems were breached by Trump allies in 2021 and 2022 and to urge her to seek recounts in key states to ensure election verification.
Following the 2020 election, operatives working with Trump attorneys accessed voting equipment in order to gain copies of the software that records and counts votes. The letter to Vice President Harris argues that this extraordinary and unprecedented breach in election system security merits conducting recounts of paper ballots in order to confirm computer-generated tallies.
Excerpt:
"We write to alert you to serious election security breaches that have threatened the security and integrity of the 2024 elections, and to identify ways to ensure that the will of the voters is reflected and that voters should have confidence in the result. The most effective manner of doing so is through targeted recounts requested by the candidate. In the light of the breaches we ask that you formally request hand recounts in at least the states of Michigan, Nevada, Wisconsin, and Pennsylvania.
In 2022, records, video camera footage, and deposition testimony produced in a civil case in Georgia1 disclosed that its voting system, used statewide, had been breached over multiple days by operatives hired by attorneys for Donald Trump. The evidence showed that the operatives made copies of the software that runs all of the equipment in Georgia, and certain other states, and shared it with other Trump allies and operatives.
Subsequent court filings and public records requests revealed that the breaches in Georgia were part of a larger effort to take copies of voting system software from systems in Michigan, Pennsylvania, Colorado and Arizona, and to share the software in the operatives’ network. According to testimony and declarations by some of the technicians who have obtained copies of the software, they have had access for more than three years to the software for the central servers, tabulators, and highly restricted election databases of both Election Systems & Software (ES&S), and Dominion Voting Systems, the two largest voting system vendors, constituting the most severe election security breach publicly known."
Security Analysis of the Diebold AccuVote-TS Voting Machine (archived)
2007 | Ariel J. Feldman, J. Alex Halderman, and Edward W. Felten
Abstract:
"This paper presents a fully independent security study of a Diebold AccuVote-TS voting machine, including its hardware and software. We obtained the machine from a private party. Analysis of the machine, in light of real election procedures, shows that it is vulnerable to extremely serious attacks.
For example, an attacker who gets physical access to a machine or its removable memory card for as little as one minute could install malicious code; malicious code on a machine could steal votes undetectably, modifying all records, logs, and counters to be consistent with the fraudulent vote count it creates. An attacker could also create malicious code that spreads automatically and silently from machine to machine during normal election activities—a voting-machine virus. We have constructed working demonstrations of these attacks in our lab.
Mitigating these threats will require changes to the voting machine's hardware and software and the adoption of more rigorous election procedures."
Excerpts:
“Malicious software running on a single voting machine can steal votes with little risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss. We have constructed demonstration software that carries out this vote-stealing attack.
Anyone who has physical access to a voting machine, or to a memory card that will later be inserted into a machine, can install said malicious software using a simple method that takes as little as one minute. In practice, poll workers and others often have unsupervised access to the machines. [...]
From a computer security standpoint, [Direct Recording Electronic Voting Systems] have much in common with desktop PCs. Both suffer from many of the same security and reliability problems, including bugs, crashes, malicious software, and data tampering. Despite years of research and enormous investment, PCs remain vulnerable to these problems, so it is doubtful, unfortunately, that [Direct Recording Electronic Voting Systems] vendors will be able to overcome them.”
-
Note: Diebold Election Systems was acquired by Election Systems and Software (ES&S) in 2009 before assets formerly belonging to Diebold were split between ES&S and Dominion Voting.
Source: The Genesis of America’s Corrupted Computerized Election System
October 10, 2018 | Jennifer Cohn
U.S. Senate Select Committee on Intelligence Russian Interference in the 2016 U.S. Election
Volumes 1-5 | Senate Select Committee on Intelligence
Key Excerpts:
Russian Access to Election Infrastructure:
IV. The January 6, 2017 Intelligence Community Assessment (ICA) "Assessing Russian Activities and Intentions in Recent U.S. Elections," states:
Russian intelligence obtained and maintained access to elements of multiple U.S. state or local electoral boards. DHS assesses that the types of systems Russian actors targeted or compromised were not involved in vote tallying.
Based on the Committee's review of the ICA, the Committee concurs with this assessment. The Committee found that Russian-affiliated cyber actors gained access to election infrastructure systems across two states, including successful extraction of voter data. However, none of these systems were involved in vote tallying.
VII. (U) SECURITY OF VOTING MACHINES (U)
The Committee review of Russian activity in 2016 highlighted potential vulnerabilities in many voting machines, with previous studies by security researchers taking on new urgency and receiving new scrutiny. Although researchers have repeatedly demonstrated it is possible to exploit vulnerabilities in electronic voting machines to alter votes, some election officials dispute whether such attacks would be feasible in the context of an actual election.
Questions for the Record | Senate Select Committee on Intelligence
Jeanette Manfra, Acting Director of Undersecretary, National Protection and Programs Directorate U.S. Department of Homeland Security
Excerpt:
“While not a definitive source in identifying individual activity attributed to Russian government cyber actors, the Department of Homeland Security (DHS) is aware of Internet-connected election-related networks, including websites, in at least 21 states that were potentially targeted by Russian government cyber actors. Although we’ve refined our understanding of individual targeted networks, supported by classified reporting, our observations include: a small number of networks were successfully compromised, there were a larger number of states where attempts to compromise networks were unsuccessful, and there were an even greater number of states where only preparatory activity like scanning was observed.”
Expert Testimony | Professor Dr. J. Alex Halderman, Professor of Computer Science & Engineering, University of Michigan.
Excerpts:
U.S. Voting Machines Are Vulnerable
As you know, states choose their own voting technology. Today, the vast majority of 3 votes are cast using one of two computerized methods. Most states and most voters use the first type, called optical scan ballots, in which the voter fills out a paper ballot that is then scanned and counted by a computer. The other widely used approach has voters interact directly with a computer, rather than marking a choice on paper. It’s called DRE, or direct-recording electronic, voting. With DRE voting machines, the primary records of the vote are stored in computer memory.
Both optical scanners and DRE voting machines are computers. Under the hood, they’re not so different from your laptop or smartphone, although they tend to use much older technology—sometimes decades out of date. Fundamentally, they suffer from security weaknesses similar to those of other computer devices. I know because I’ve developed ways to attack many of them myself as part of my research into election security threats.
Ten years ago, I was part of the first academic team to conduct a comprehensive security analysis of a DRE voting machine. We examined what was at that time the most widely used touch-screen DRE in the country, and spent several months probing it for vulnerabilities. What we found was disturbing: we could reprogram the machine to invisibly cause any candidate to win. We also created malicious software—vote-stealing code—that could spread from machine-to-machine like a computer virus, and silently change the election outcome. Vulnerabilities like these are endemic throughout our election system.
Cybersecurity experts have studied a wide range of U.S. voting machines—including both DREs and optical scanners—and in every single case, they’ve found severe vulnerabilities that would allow attackers to sabotage machines and to alter votes.
That’s why there is overwhelming consensus in the cybersecurity and election integrity research communities that our elections are at risk.
Cyberattacks Could Compromise Elections
Of course, interfering in a state or national election is a bigger job than just attacking a single machine. Some say the decentralized nature of the U.S. voting system and the fact that voting machines aren’t directly connected to the Internet make changing a state or national election outcome impossible. Unfortunately, that is not true.
Some election functions are actually quite centralized. A small number of election technology vendors and support contractors service the systems used by many local governments. Attackers could target one or a few of these companies and spread malicious code to election equipment that serves millions of voters.
Furthermore, in close elections, decentralization can actually work against us. An attacker can probe different areas of the most important “swing states” for vulnerabilities, find the areas that have the weakest protection, and strike there. In a close election, changing a few votes may be enough to tip the result, and an attacker can choose where—and on which equipment—to steal those votes. State and local elections are also at risk.
Note: Underlining added for emphasis.
A Guide to Elections Forensics - Research and Innovation Grants Working Papers Series by USAID (2017)
Message from the Democracy, Human Rights, and Governance Center Acting Director
This publication, together with the Election Forensics Toolkit DRG Center Working Paper and the online Election Forensics Toolkit, were produced by USAID in partnership with the University of Michigan and the Institute of International Education as part of the Research and Innovation Grants Working Papers Series. [...]
The research presented in this Guide to Election Forensics, in the more detailed DRG Center Working Paper, and in the online tool explains the role election forensics can play in verifying the integrity of election data, demonstrates several statistical tests used in election forensics to verify election data, and illustrates how those tests identify anomalous patterns in the data that can indicate intentional manipulation of results.
Excerpts:
Election forensics is an emerging field in which scholars use a diverse set of statistical tools—including techniques similar to those developed to detect financial fraud—to analyze numerical electoral data and detect where patterns deviate from those that should occur naturally, following demonstrated mathematical principles. Numbers that humans have manipulated present patterns that are unlikely to occur if produced by a natural process—such as free and fair elections or normal commercial transactions. These deviations suggest either that the numbers were intentionally altered or that other factors—such as a range of normal strategic voting practices—influenced the electoral results. The greater the number of statistical tests that identify patterns that deviate from what is expected to naturally occur, the more likely that the deviation results from fraud rather than legal strategic voting.
Compared to existing methods of electoral transparency such as in-person monitoring and parallel vote tabulations, election forensics has three key advantages:
However, election forensics also has three disadvantages:
Fraud or Fairytales: Russia and Ukraine's Electoral Experience by Mikhail Myagkov, Peter C. Ordeshook & Dimitry Shakin, Post-Soviet Affairs, 21:2 (2013)
"Of course, 1996 might seem like ancient history, so for a more contemporary anomaly, consider Figure 1, which, for each rayon, plots Putin’s vote in 2004 against his vote in 2000. A normal pattern is a high correlation with data distributed around a 45° line or, if a candidate’s popularity increases (as seems to be the case with Putin), a positively sloping line above the 45° diagonal. Again, this expectation is not met in Russia. Although the data match expectations for the “dense cloud” of rayons, there is essentially no relationship between his vote in 2004 and 2000 if his vote exceeded 80 percent in 2004. That is, knowing that Putin received 85 percent versus 95 percent of the vote in 2004 in a rayon tells us only that he got more than 40 percent in 2000. At the same time, if we are told that Putin did poorly in a rayon in 2000 (less than 20 percent), we cannot predict anything about his performance in 2004. We appreciate the fact that the absence of meaningful parties diminishes an electorate’s stability, but it is almost as if, among a significant number of rayons, the 2000 and 2004 elections took place in different countries. [...]
However, suppose a subset of rayons are untainted by fraud, but, as is generally assumed to be the case for some republics, that ballot stuffing or allowing people to vote more than once increases turnout in the remaining regions (and we note by way of example that the six regions reporting turnout in excess of 73 percent in 1999 include Dagestan (ranked second), Mordoviya (third), Tatarstan (fourth), and Bashkortostan (sixth)). This second subset might also yield a normal distribution of turnout, but with a mean shifted up in accordance with the magnitude of the fraud committed. Thus, if we fail to separate the two subsets and simply add their distributions, we should observe a multimodal density or one with an overly “fat” or extended tail. And, as Figures 3a and 3b show, that is precisely what we see in Russia’s ethnic republics in 1996 through 2003."
Statistical Detection of Systematic Election Irregularities: Three Essays on Supervised and Unsupervised Machine Learning Approaches and the Attitudinal Consequences of Exposing Cheating | Lion Behrens | PhD Dissertation, University of Mannheim (2023)
Excerpt:
"The method that I develop builds on the fact that in many countries, elections are not held as singular events. Rather, concurrent electoral contests which are administered side-by-side often take place simultaneously. I show that undervoting irregularities, which emerge if the same polling station documents different turnout levels across different electoral events, can be exploited for the detection of systematic irregularities if the extent of undervoting is related to the winner’s vote share. I present a semi-parametric simulation model to estimate the share of polling stations with vi undervoting irregularities at which vote shares were tainted. I apply this approach to a novel data set of recently contested Ecuadorian elections which report large extents of undervoting and simulated data for which the degree of fraud is known. I find that the proposed method reliably reverse-engineers true shares of fraud in synthetic data and that the empirical patterns which are inherent to Ecuadorian voting returns are well explained by systematic manipulation. [...]
Finally, I assess the attitudinal consequences of confronting individuals with credible information on systematic electoral manipulation (Chapter 4). In the past, scholars have shown that consciousness of election fraud lets individuals withdraw support from candidates, institutions and governments that are supposedly involved in manipulation. Together with my co-author Viktoriia Semenova, I argue that election fraud information will let individuals extrapolate legitimacy loss even to political institutions that are unrelated to electoral events and lead to decays of trust in the political system as a whole. Second, we argue that these spillovers are crucially shaped by the reactions of other political actors, as within-system corrections like court punishments of alleged fraud perpetrators can mitigate decays in diffuse support."
Elections Without Democracy: The Menu of Manipulation | by Andreas Schedler Journal of Democracy | Johns Hopkins University Press (2002)
"The idea of democracy has become so closely identified with elections that we are in danger of forgetting that the modern history of representative elections is a tale of authoritarian manipulations as much as it is a saga of democratic triumphs. Historically, in other words, elections have been an instrument of authoritarian control as well as a means of democratic governance.
Since the early days of the "third wave" of global democratization, it has been clear that transitions from authoritarian rule can lead anywhere. Over the past quarter-century, many have led to the establishment of some form of democracy. But many others have not. They have given birth to new forms of authoritarianism that do not fit into our classic categories of one-party, military, or personal dictatorship. They have produced regimes that hold elections and tolerate some pluralism and interparty competition, but at the same time violate minimal democratic norms so severely and systematically that it makes no sense to classify them as democracies, however qualified. These electoral regimes do not represent limited, deficient, or distorted forms of democracy. They are instances of authoritarian rule. The time has come to abandon misleading labels and to take their nondemocratic nature seriously. [...]
Their dream is to reap the fruits of electoral legitimacy without running the risks of democratic uncertainty. Balancing between electoral control and electoral credibility, they situate themselves in a nebulous zone of structural ambivalence. Delimiting the blurry frontiers of electoral authoritarianism cannot help but be a complex and controversial task. "
Get Out the Vote (or Don’t): Evaluating Manipulation Methods in Russian National Elections from 2000 to 2021 | Chloe Duval | Bachelor's Thesis, University of Chicago (2022)
"Informational Autocrats: Elections in Authoritarian Regimes
To examine the reasoning behind and the extent of the Kremlin’s shift from manipulating Putin’s vote share to manipulating turnout, an understanding of the existing literature on authoritarian states like Russia contextualizes why elections are manipulated in the first place. A new form of autocracy emerged in the 21st century led by informational autocrats. Guriev and Treisman (2019) offer a strong case for why autocrats like Putin choose to have elections and legislatures even if the results are falsified. In contrast to early authoritarian leaders like Stalin and Mao, informational autocrats choose to concentrate their power by using democratic institutions instead of terror. The authors argue the key to regimes like Putin’s is manipulating information to “survive by leading citizens to believe – rationally but incorrectly – that they are competent and public spirited” (Guriev and Treisman 2019, 101). Of course, applying the characteristics of informational autocracy outlined by Guriev and Treisman to a regime such as Putin’s, which historically has relied on television for its information control, has implications as Russia is an informational autocracy with an arguably shrinking information gap between the public and elites.
Informational autocrats often use institutions like elections to maintain legitimacy, consolidate their power, and signal their political strength to the public and bureaucrats alike. Alberto Simpser, in his book Why Governments and Parties Manipulate Elections: Theory, Practice, and Implications (2013), focuses specifically on elections as tools for autocrats to maintain legitimacy and pushes back against the previous academic consensus: that autocrats excessively manipulate them just to win. Putin is a popular politician in Russia, and his approval ratings remain consistently high.8 Since his first term as president in 2000, Putin would be more likely than not to win a free and fair election. Simpser explains why autocrats continue to manipulate elections they could win fairly: “electoral manipulation can potentially yield substantially more than simply winning the election at hand ... [including] to discourage opposition supporters from turning out to vote or to protest; to convince bureaucrats to remain loyal to the government...” (Simpser 2013, 3).
The public, like the bureaucracy, poses a potential problem for an autocrat like Putin. Andrew Little unveils a second motivation autocrats may have to manipulate elections: to keep the public from staging a revolution. It is beneficial for an autocrat to change election results to distort their signal to the public. When deciding whether to protest, the public evaluates the costs and benefits of doing so after seeing election results. Strong election results may dissuade them, since they suggest the autocrat is more popular than anticipated. Little establishes that “the information provided by elections does not only affect incumbent behavior as emphasized in past work, but also all political actors from elites to citizens” (Little 2011, 273).
Electoral Manipulation and Regime Support: Survey Evidence from Russia by Ora John Reuter and David Szakonyi | Higher School of Economics (2020)
Abstract
Does electoral fraud stabilize authoritarian rule or undermine it? The answer to this question rests, in part, on how voters evaluate regime candidates who engage in fraud. Using a survey experiment conducted after the 2016 elections in Russia, we find that voters withdraw their support from ruling party candidates who commit electoral fraud. This effect is especially large among strong supporters of the regime. Core regime supporters are more likely to have ex ante beliefs that elections are free and fair. Revealing that fraud has occurred significantly reduces their propensity to support the regime. These findings illustrate that fraud is costly for autocrats not just because it may ignite protest, but also because it can undermine the regime’s core base of electoral support. Because many of its strongest supporters expect free and fair elections, the regime has strong incentives to conceal or otherwise limit its use of electoral fraud.
Excerpt:
The effects of increasing awareness of electoral fraud are largest among core regime supporters. In electoral authoritarian regimes, regime partisans are more likely to believe ex ante that elections are conducted fairly. This can happen for a number of reasons. Regime supporters are more exposed (and possibly susceptible) to regime propaganda, and partisanship biases may inhibit the internalization of rumors about fraud. Alternatively, they may support the regime precisely because they believe it is holding free and fair elections. Given these pre-conceived notions, the regime’s core supporters will be most likely to punish regime incumbents when fraud is revealed to them. By contrast, swing or weakly aligned voters are already skeptical about electoral integrity. Hence, the revelation of fraud will do less to affect their vote choice. Expectations of electoral fraud are already factored in for these voters.
Using data from the same survey, we report several other findings in support of our main arguments. First, the vast majority of Russians express moral disapproval of electoral fraud, regardless of their affinity for the regime in power. Second, a surprisingly large share of Russians believe that elections are held honestly, and more importantly for this study, regime supporters are much more likely to believe that elections are free and fair. Finally, we find that learning about fraud by UR candidates produces a much larger reduction in support among strong regime backers than it does among weakly aligned voters. We conclude that if information on fraud were to become widespread in Russia, the size of Putin’s electoral coalition would diminish significantly. We replicate these findings with a second survey experiment conducted in Russia in May 2018, which also examines how an individual’s likelihood of voting depends on perceptions of fraud. Our findings demonstrate that excessive use of fraud can destabilize autocracy not just because it leads to mass protest, but also because it erodes the regime’s electoral base.
How trustworthy are electronic voting systems in the US? by Elizabeth Clarkson | American Statistical Association | Royal Statistical Society (2015)
Excerpt:
"When you do your civic duty, and cast your vote for the various candidates and public propositions at an electronic voting machine, how confident are you that the results will be tabulated honestly?
If you feel less than sanguine about it and do a bit of the research to assuage your doubts, be prepared to feel even less confident afterwards. After years of casual research, the results I found have led me to file a lawsuit requesting access to the records needed to perform an audit myself.
My statistical analysis shows patterns indicative of vote manipulation in machines. The manipulation is relatively small, compared with the inherent variability of election results, but it is consistent. These results form a pattern that goes across the nation and back a number of election cycles. I’ve downloaded data and verified the results from several states for myself. Furthermore, the manipulation is not limited to a single powerful operator. My assessment is that the data reveals multiple (at least two) agents working independently to successfully alter voting results. [...]
I want to emphasize, as I always try to do, that statistics don’t prove vote fraud. These statistics show that patterns exist in the data that correlate the type of electronic voting system in use with the %R vote changing with the total votes cast.
Such patterns are examples of what we might expect to see if some voting systems were being sabotaged, but that doesn’t mean that no other explanations are possible for these patterns. Voting machine manipulation is, in my opinion, the most likely explanation for these patterns. The most common pattern supports Republican candidates, but Democratic candidates are sometimes the beneficiary.
The only way to prove vote fraud is through a post-election audit demonstrating significant deviations from the reported totals."
| Copyright © 2025 Election Truth Alliance - All Rights Reserved. | board@electiontruthalliance.org | 9107 West Russell Road Suite 100, Las Vegas, Nevada - 89148 |
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.