+ Slide 20
Part of
a talk delivered to the ITU Workshop on ... issues in E-Government, June 6, 2003, Geneva
|
Crooks will eventually find the weaknesses of whatever system we use.
Smart crooks do not attack new voting systems
They wait until the public accept and trust the system
Different voting systems have different vulnerabilities
Paper ballots, optical mark-sense, punched cards:
adding ballots to the box
theft of ballots or ballot boxes
precinct-level fraud
county-level fraudMechanical voting machines:
technicians can selectively break counters
county-level fraudDirect recording electronic voting systems:
technicians can selectively change code
county-level fraud
programmers can add corrupt software
state-level fraud
national-level fraud
In short:
Old technology is good for retail fraud
New technology may enable wholsale fraud