The ETA cites sources that inform data analysis for specific states or counties directly within each data analysis, including links to source data. Our citation approach is a combination of in-text hyperlinks and a bibliography-style list of sources at the end of the analysis. We take the same approach in the formal PDF versions of our state or county data packages.
More generalized sources that inform and underpin our work more broadly have been collated here for ease of reference. When appropriate, we have included excerpts from the sources listed.
Currently, this section focuses on voting system vulnerabilities. This is to help answer common questions we receive about whether or not manipulating votes through electronic voting infrastructure is even possible. Yes, it is possible - and the links and excerpts below provide more context.
Breaches of Voting System Software Warrant Recounts to Ensure Election Verification
Letter to Vice President Harris from Computer Security Experts (archived)
November 13, 2024 | FreeSpeechForPeople
Description:
A group of computer security experts have written to Vice President Kamala Harris to alert her to the fact that voting systems were breached by Trump allies in 2021 and 2022 and to urge her to seek recounts in key states to ensure election verification.
Following the 2020 election, operatives working with Trump attorneys accessed voting equipment in order to gain copies of the software that records and counts votes. The letter to Vice President Harris argues that this extraordinary and unprecedented breach in election system security merits conducting recounts of paper ballots in order to confirm computer-generated tallies.
Excerpt:
"We write to alert you to serious election security breaches that have threatened the security and integrity of the 2024 elections, and to identify ways to ensure that the will of the voters is reflected and that voters should have confidence in the result. The most effective manner of doing so is through targeted recounts requested by the candidate. In the light of the breaches we ask that you formally request hand recounts in at least the states of Michigan, Nevada, Wisconsin, and Pennsylvania.
In 2022, records, video camera footage, and deposition testimony produced in a civil case in Georgia1 disclosed that its voting system, used statewide, had been breached over multiple days by operatives hired by attorneys for Donald Trump. The evidence showed that the operatives made copies of the software that runs all of the equipment in Georgia, and certain other states, and shared it with other Trump allies and operatives.
Subsequent court filings and public records requests revealed that the breaches in Georgia were part of a larger effort to take copies of voting system software from systems in Michigan, Pennsylvania, Colorado and Arizona, and to share the software in the operatives’ network. According to testimony and declarations by some of the technicians who have obtained copies of the software, they have had access for more than three years to the software for the central servers, tabulators, and highly restricted election databases of both Election Systems & Software (ES&S), and Dominion Voting Systems, the two largest voting system vendors, constituting the most severe election security breach publicly known."
Security Analysis of the Diebold AccuVote-TS Voting Machine (archived)
2007 | Ariel J. Feldman, J. Alex Halderman, and Edward W. Felten
Abstract:
"This paper presents a fully independent security study of a Diebold AccuVote-TS voting machine, including its hardware and software. We obtained the machine from a private party. Analysis of the machine, in light of real election procedures, shows that it is vulnerable to extremely serious attacks.
For example, an attacker who gets physical access to a machine or its removable memory card for as little as one minute could install malicious code; malicious code on a machine could steal votes undetectably, modifying all records, logs, and counters to be consistent with the fraudulent vote count it creates. An attacker could also create malicious code that spreads automatically and silently from machine to machine during normal election activities—a voting-machine virus. We have constructed working demonstrations of these attacks in our lab.
Mitigating these threats will require changes to the voting machine's hardware and software and the adoption of more rigorous election procedures."
Excerpts:
“Malicious software running on a single voting machine can steal votes with little risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss. We have constructed demonstration software that carries out this vote-stealing attack.
Anyone who has physical access to a voting machine, or to a memory card that will later be inserted into a machine, can install said malicious software using a simple method that takes as little as one minute. In practice, poll workers and others often have unsupervised access to the machines. [...]
From a computer security standpoint, [Direct Recording Electronic Voting Systems] have much in common with desktop PCs. Both suffer from many of the same security and reliability problems, including bugs, crashes, malicious software, and data tampering. Despite years of research and enormous investment, PCs remain vulnerable to these problems, so it is doubtful, unfortunately, that [Direct Recording Electronic Voting Systems] vendors will be able to overcome them.”
-
Note: Diebold Election Systems was acquired by Election Systems and Software (ES&S) in 2009 before assets formerly belonging to Diebold were split between ES&S and Dominion Voting.
Source: The Genesis of America’s Corrupted Computerized Election System
October 10, 2018 | Jennifer Cohn
U.S. Senate Select Committee on Intelligence Russian Interference in the 2016 U.S. Election
Volumes 1-5 | Senate Select Committee on Intelligence
Key Excerpts:
Russian Access to Election Infrastructure:
IV. The January 6, 2017 Intelligence Community Assessment (ICA) "Assessing Russian Activities and Intentions in Recent U.S. Elections," states:
Russian intelligence obtained and maintained access to elements of multiple U.S. state or local electoral boards. DHS assesses that the types of systems Russian actors targeted or compromised were not involved in vote tallying.
Based on the Committee's review of the ICA, the Committee concurs with this assessment. The Committee found that Russian-affiliated cyber actors gained access to election infrastructure systems across two states, including successful extraction of voter data. However, none of these systems were involved in vote tallying.
VII. (U) SECURITY OF VOTING MACHINES (U)
The Committee review of Russian activity in 2016 highlighted potential vulnerabilities in many voting machines, with previous studies by security researchers taking on new urgency and receiving new scrutiny. Although researchers have repeatedly demonstrated it is possible to exploit vulnerabilities in electronic voting machines to alter votes, some election officials dispute whether such attacks would be feasible in the context of an actual election.
Questions for the Record | Senate Select Committee on Intelligence
Jeanette Manfra, Acting Director of Undersecretary, National Protection and Programs Directorate U.S. Department of Homeland Security
Excerpt:
“While not a definitive source in identifying individual activity attributed to Russian government cyber actors, the Department of Homeland Security (DHS) is aware of Internet-connected election-related networks, including websites, in at least 21 states that were potentially targeted by Russian government cyber actors. Although we’ve refined our understanding of individual targeted networks, supported by classified reporting, our observations include: a small number of networks were successfully compromised, there were a larger number of states where attempts to compromise networks were unsuccessful, and there were an even greater number of states where only preparatory activity like scanning was observed.”
Expert Testimony | Professor Dr. J. Alex Halderman, Professor of Computer Science & Engineering, University of Michigan.
Excerpts:
U.S. Voting Machines Are Vulnerable
As you know, states choose their own voting technology. Today, the vast majority of 3 votes are cast using one of two computerized methods. Most states and most voters use the first type, called optical scan ballots, in which the voter fills out a paper ballot that is then scanned and counted by a computer. The other widely used approach has voters interact directly with a computer, rather than marking a choice on paper. It’s called DRE, or direct-recording electronic, voting. With DRE voting machines, the primary records of the vote are stored in computer memory.
Both optical scanners and DRE voting machines are computers. Under the hood, they’re not so different from your laptop or smartphone, although they tend to use much older technology—sometimes decades out of date. Fundamentally, they suffer from security weaknesses similar to those of other computer devices. I know because I’ve developed ways to attack many of them myself as part of my research into election security threats.
Ten years ago, I was part of the first academic team to conduct a comprehensive security analysis of a DRE voting machine. We examined what was at that time the most widely used touch-screen DRE in the country, and spent several months probing it for vulnerabilities. What we found was disturbing: we could reprogram the machine to invisibly cause any candidate to win. We also created malicious software—vote-stealing code—that could spread from machine-to-machine like a computer virus, and silently change the election outcome. Vulnerabilities like these are endemic throughout our election system.
Cybersecurity experts have studied a wide range of U.S. voting machines—including both DREs and optical scanners—and in every single case, they’ve found severe vulnerabilities that would allow attackers to sabotage machines and to alter votes.
That’s why there is overwhelming consensus in the cybersecurity and election integrity research communities that our elections are at risk.
Cyberattacks Could Compromise Elections
Of course, interfering in a state or national election is a bigger job than just attacking a single machine. Some say the decentralized nature of the U.S. voting system and the fact that voting machines aren’t directly connected to the Internet make changing a state or national election outcome impossible. Unfortunately, that is not true.
Some election functions are actually quite centralized. A small number of election technology vendors and support contractors service the systems used by many local governments. Attackers could target one or a few of these companies and spread malicious code to election equipment that serves millions of voters.
Furthermore, in close elections, decentralization can actually work against us. An attacker can probe different areas of the most important “swing states” for vulnerabilities, find the areas that have the weakest protection, and strike there. In a close election, changing a few votes may be enough to tip the result, and an attacker can choose where—and on which equipment—to steal those votes. State and local elections are also at risk.
Note: Underlining added for emphasis.
U.S. Senate Select Committee on Intelligence Russian Interference in the 2016 U.S. Election
Questions for the Record | Senate Select Committee on Intelligence
Jeanette Manfra, Acting Director of Undersecretary, National Protection and Programs Directorate U.S. Department of Homeland Security
Excerpt:
“While not a definitive source in identifying individual activity attributed to Russian government cyber actors, the Department of Homeland Security (DHS) is aware of Internet-connected election-related networks, including websites, in at least 21 states that were potentially targeted by Russian government cyber actors. Although we’ve refined our understanding of individual targeted networks, supported by classified reporting, our observations include: a small number of networks were successfully compromised, there were a larger number of states where attempts to compromise networks were unsuccessful, and there were an even greater number of states where only preparatory activity like scanning was observed.”
| Copyright © 2025 Election Truth Alliance - All Rights Reserved. | board@electiontruthalliance.org | 9107 West Russell Road Suite 100, Las Vegas, Nevada - 89148 |
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.