Election audit


An election audit is any review conducted after polls close for the purpose of determining whether the votes were counted accurately or whether proper procedures were followed, or both.
Both results and process audits can be performed between elections for purposes of quality management, but if results audits are to be used to protect the official election results from undetected fraud and error, they must be completed before election results are declared final.
Election recounts are a specific type of audit, with elements of both results and process audits.

The need for verification of election results

In jurisdictions that tabulate election results exclusively with manual counts from paper ballots, or 'hand counts', officials do not need to rely on a single person to view and count the votes. Instead, incorporate redundancy, so that more than one person views and interprets each vote and more than one person confirms the accuracy of each tabulation. In this way, the manual count incorporates a confirmation step, and a separate audit may not be considered necessary.
However, when votes are read and tabulated electronically, confirmation of the results' accuracy must become a separate process.
Within and outside elections, use of computers for decision support comes with certain IT risks. Election-Day electronic miscounts can be caused by unintentional human error, such as incorrectly setting up the computers to read the unique ballot in each election and undetected malfunction, such as overheating or loss of calibration. Malicious intervention can be accomplished by corrupt insiders at the manufacturer, distributor or election authority, or external hackers who access the software on or before Election Day.
Computer-related risks specific to elections include local officials’ inability to draw upon the level of IT expertise available to managers of commercial decision-support computer systems and the intermittent nature of elections, which requires reliance on a large temporary workforce to manage and operate the computers. Voting machines are usually air-gapped from the internet, but they receive updates from flash drives which do come from the internet, and in any case air-gapped computers are regularly hacked through flash drives and other means. Besides traditional security risks such as lock-picking and phishing attacks, voting machines are often unattended in public buildings the night before the election. This physical access lets outsiders subvert them.
To reduce the risk of flawed Election-Day output, election managers like other computer-dependent managers rely on testing and ongoing IT security. In the field of elections management, these measures take the form of federal certification of the electronic elections system designs, though there is no way to know the certified software is what is actually installed; security measures in the local election officials’ workplaces; and pre-election testing.
A third risk-reduction measure is performed after the computer has produced its output: Routinely checking the computers' output for accuracy, or auditing. Outside elections,auditing practices in the private sector and in other government applications are routine and well developed. In the practice of elections administration, however, the Pew Charitable Trusts stated in 2016, “Although postelection audits are recognized as a best practice to ensure that voting equipment is functioning properly, that proper procedures are being followed, and that the overall election system is reliable, the practice of auditing is still in its relative infancy. Therefore, a consensus has not arisen about what constitutes the necessary elements of an
auditing program.”
Routine results audits also support voter confidence by improving election officials' ability to respond effectively to allegations of fraud or error.

Examples of intrusions into election computers

Computers which tally votes or compile election results are known to have been hacked in the US in 2014
and 2016,
Ukraine in 2014,
and South Africa in 1994.
Only the Ukraine hack was disclosed immediately, so regular audits are needed to provide timely corrections.

Audit challenges unique to election results

Confirming that votes were credited to the correct candidates’ totals might seem to be a relatively uncomplicated task, but election managers face several audit challenges not present for managers of other decision-support IT applications. Primarily, ballot privacy prevents election officials from associating individual voters with individual ballots. This makes it impossible for election officials to use some standard audit practices such as those banks use to confirm that ATMs credited deposits to the correct account.
Another challenge is the need for a prompt and irrevocable decision. Election results need to be confirmed promptly, before officials are sworn into office. In many commercial uses of information technology, managers can reverse computer errors even when detected long after the event. However, once elected officials are sworn into office, they begin to make decisions such as voting on legislation or signing contracts on behalf of the government. Even if the official were to be removed because a computer error was discovered to have put that official in office, it would not be possible to reverse all the consequences of the error.
The intermittent nature of elections is another challenge. The number of elections managed by an election authority ranges from two per year in five US states to one every 4 years in parliamentary systems like Canada where different election authorities manage national, provincial and municipal elections. This intermittency limits the development of a full-time, practiced workforce, for either the elections or the audits. Turning election audits over to an independent, disinterested professional accounting firm is another option not available to election officials. Because election results affect everyone, including the election officials themselves, truly disinterested auditors do not exist. Therefore, audit transparency is required to provide credibility.

Attributes of a good election results audit

No governing body or professional association has yet adopted a definitive set of best practices for election audits. However, in 2007 a group of election-integrity organizations, including the , Common Cause, and the Brennan Center for Justice at NYU School of Law collaborated with the American Statistical Association to produce a set of recommended best practices for post-election results audits:

Overview

Considering the recommended best practices above, two states allow public observation of all steps; three states have audits done by the Secretary of State, which is partly independent of election day procedures; 18 states hand-count; six states have good samples for statistical confidence; no states have ways to recover from discrepancies in the chain of custody; other issues are listed in the table below.
Computerization of elections occurred rapidly in the United States following the presidential election of 2000, in which imprecise vote-counting practices played a controversial role, and the subsequent adoption of the Help America Vote Act of 2002. The rapid switch to computerized vote tabulation forced election officials to abandon many pre-automation practices that had been used to verify vote totals, such as the redundancy included in valid hand-counting procedures.
According to , as of mid-2019, only Colorado, New Mexico, the District of Columbia, and Rhode Island require local election officials to perform audits that:
  1. are completed promptly, before official results can be certified;
  2. expand the audit to a state-wide recount of the audited contest whenever the audit detects serious discrepancies in the original sample; and
  3. are binding on the official results.
If followed by local election officials, such requirements create an opportunity to detect and correct any outcome-altering miscounts that affected the preliminary Election-Night counts.
An additional 19 states prescribe audits that check a flat percentage, typically between 1 and 3 percent, of voting machines or precincts. These audits can detect problems in the individual voting machines selected for audit, but cannot confirm the correct results except in races with very large margins between the winner and losers.
Finally, 28 states finalize official election results without verifying computer-tabulated vote totals. These states either lack paper ballots, have no audit requirements, or in four states allow audits to be delayed until after winners are certified.
Other ways to group the states include that 20 states audit by means of hand counts; others use machines or a mix. Ten states audit all races on the ballot; others generally audit the top race and 1-4 others. In 14 states the audit results are used to revise official winners when there is a discrepancy. Another 10 may revise official results, depending on local judgment, and in 9 states the audit creates a report without changing official results, including large states like California, Florida and Illinois. Only two states use hand counts to audit all races, and use the results to revise winners; both are small, Alaska and West Virginia.

Table of state audit practices

Risk-limiting audits

Risk-limiting audits are required in Colorado, North Carolina, Rhode Island and Virginia. These store voting machines' interpretation of each ballot, collect them centrally over the internet, re-tally them with an independent computer to check totals, and hand-check a sample of the stored paper ballots to check voting machines' interpretations. Samples are big enough to be sure results are accurate, up to an acceptable level of risk, such as 9%. For each audited race, if the original computer interpretations identified the wrong winner, there is a 9%
chance in Colorado that the audit will miss it, and the wrong winner will take office. A lower risk limit would let fewer errors through, but would require larger sample sizes. Close races also require larger sample sizes. Colorado audits only a few races, and audits none of the closest races, which need the biggest samples. Auditing all races would require several counties to hand-count thousands of ballots each.
If the samples do not confirm the initial results, more rounds of sampling may be done, but if it appears the initial results are wrong, risk-limiting audits require a 100% hand count to change the result, even if that involves hand-counting hundreds of thousands of ballots.
Colorado notes that they have to be extremely careful to keep ballots in order, or they have to number them, to be sure of comparing the hand counts with the machine records of those exact ballots. Colorado says it has a reliable system to re-tally the records, but it is not yet publicly documented.
In 2010, the American Statistical Association endorsed risk-limiting audits, to verify election outcomes. With use of statistical sampling to eliminate the need to count all the ballots, this method enables efficient, valid confirmation of the outcome. In 2011, the federal Election Assistance Commission initiated grants for pilot projects to test and demonstrate the method in actual elections. In 2014, the Presidential Commission on Election Administration recommended the method for use in all jurisdictions following all elections, to reduce the risk of having election outcomes determined by undetected computer error or fraud. In 2017, risk-limiting audits statewide as a routine practice during the post-election process of certifying election results.

Ballot scans for 100% audits

Humboldt County, CA, , and scan all ballots with a commercial scanner, so extensive audits can be done on the scans without damaging paper ballots, without hand-counting, by multiple groups, independently of the election software.
Clear Ballot is certified by the US Election Assistance Commission for voting,
and they also have an auditing system, ClearAudit. TrueBallot does not currently serve government elections, just private groups. Both use proprietary software, so if it were hacked at the vendor or locally to create false images of the ballots or false counts, then local officials and the public could not check it.
The most open audit system is the Elections Transparency Project, as used in Humboldt County, California, a medium sized county with 58,000 ballots in the 2016 general election.
They use a commercial scanner to scan all ballots and put them in a digitally signed file, so true copies of the file can be reliably identified. Ballots with identifying marks are first hand-copied by election staff, to anonymize them, since they are valid under California law.
The scanner prints a number on each ballot before scanning it, so the scan can be checked against the same physical ballot later if needed.
The project has written open source software to read the files, and they check all races on all ballots to see if official counts are correct. The first time they scanned and checked, in 2008, they found 200 missing ballots, showing the value of complete checks. Other jurisdictions can similarly scan ballots and use Humboldt's software or their own to audit all races. They need to ensure their in-house counting software is secure and independent of any bugs or hacks in the election software, just as users of risk-limiting audits do.
Reading these scans, with software independent of the election system, is the only practical way to audit a large number of close races, without large hand counts. If scanned on election night, scans are also the only practical way to bypass problems of physical security, since scans are made and digitally signed before ballots are stored, while other audit methods are too slow to do election night. Scanners can process thousands of ballots per hour, and several scanners can operate simultaneously in larger jurisdictions. Once ballots are scanned with a digital signature, they can be analyzed at any convenient time.
Humboldt has gone beyond this internal approach, and decided to release the digitally signed files of ballot images to the public, so others can use their own software, independent of the election system and officials, to check all races on all ballots.
Public release lets losing candidates who mistrust the election officials' security measures do their own checks. Humboldt County believes the scans give their citizens high confidence in the county election results.
The "Brakey method" is a variant of the Humboldt scans, with a public release of electronic ballot images already created by most current US election systems.. The Brakey Method requires that the ballot images be connected to their physical ballots through a unique identifier that appears on both digital image and physical ballot. Because ballot images can be hacked if the election software itself is hacked, either at the vendor or elsewhere, ballot images do not provide an independent check unless they can be compared with physical ballots.
Pennsylvania uses these ballot images for its audits, though it does not release them to the public for the public to audit.

Recounts

Recounts may be considered to be a specific type of audit, but not all audits are recounts. The Verified Voting Foundation explains the difference between audits and recounts: Post-election audits are performed to “routinely check voting system performance…not to challenge to the results, regardless of how close margins of victory appear to be", while "recounts repeat ballot counting in special circumstances, such as when preliminary results show a close margin of victory. Post-election audits that detect errors can lead to a full recount.” In the US, recount laws vary by state, but typically require recounting 100% of the votes, while audits may use samples. Recounts incorporate elements of both results and process audits.

Other variations

Hand and machine counts. Current audits in most states involve counting paper ballots by hand, but some states re-use the same machines used in the election. Three states use different machines, to provide some independent check.
Sample sizes. When states audit, they usually pick a random sample of 1% to 10% of precincts to recount by hand or by machine. If a precinct has more than one machine, and they keep ballots and totals separate by machine, they can draw a sample of machines rather than precincts and count all ballots processed by that machine. These samples can identify systematic errors widely present in the election. They have only a small chance of catching a hack or bug which was limited to a few precincts or machines, even though that could change the result in close races.
Number of races. In the random sample, most states audit only a few races, so they can only find problems in those races.
Physical security. Auditing is done several days after the election, so paper ballots and computer files need to be kept securely. North Carolina specifies that no audit is done if ballots are missing or damaged.
Physical security has its own large challenges. No US state has adequate laws on physical security of the ballots.
Security recommendations for elections include: starting audits as soon as possible after the election, preventing access by anyone alone,
having risks identified by people other than those who design or manage the storage, using background checks and tamper-evident seals.
However seals on plastic surfaces can typically be removed and reapplied without damage.
Experienced testers can usually bypass all physical security systems. Security equipment is vulnerable before and after delivery. Insider threats and the difficulty of following all security procedures are usually under-appreciated, and most organizations do not want to learn their vulnerabilities.