Keeping Votes Secure
Pilots have shown that mobile voting works and is safe
As of May 2020, we have successfully completed fourteen pilots in five different states.
Security is an iterative process with multiple checks and balances to ensure integrity and risk reduction with reviews by both government agencies and independent security firms. It is natural for concerns to be raised when new technology is introduced into an established system. This is why we have conducted pilots with small, specific, targeted groups of voters in order to learn and continue to improve the technologies.
As of May 2020, Tusk Philanthropies has successfully completed fourteen mobile voting pilots in five states – Colorado, Oregon, Utah, Washington, and West Virginia – using several mobile voting technology platforms in a variety of elections with a mix of UOCAVA voters and voters with disabilities.
Existing electoral systems are not secure
Today’s election infrastructure is outdated and vulnerable. We need a better alternative immediately.
As we’ve seen now in countless failed elections, our existing systems are easy to hack and difficult to use. Rather than putting band aids on bullet holes, we should look to advances in cloud computing, blockchain, cryptography, and identity verification to develop a better system. Technology solutions that can help us vote more securely than the status quo are within reach.
When it comes to voting, we should have two goals: radically higher participation and radically better security. That can’t happen by making minor changes to existing, failing systems. That’s why the use of mobile voting with an auditable paper trail is the best way forward.
Technology solutions are within reach
Tech innovations can help us vote more securely than the status quo.
There are a wide variety of modern tools and security systems that make resisting large-scale attacks and tampering possible. We are always looking for technologies that offer security, anonymity, and transparency. If there is a technology you think we should know about, let us know and we will work to vet it for future pilots.
As we demonstrated at DEF CON, sending ballots over email like the military does is incredibly insecure. This technology provides a more secure alternative.”
Executive Director, Cyber Policy Initiative
CEO, Cambridge Global Advisors
Mobile voting is an incredible security challenge, where the risks can be mitigated with mature engineering. Using effective security tools that are already built in or added to today’s smartphone technologies will allow us to leverage this new voting channel.”
Principal, ShiftState Security
Former Cyber Special Agent, FBI
Our technology partners are always thoroughly vetted
We work with independent cybersecurity firms to vet each mobile voting vendor that we work with.
Every mobile voting vendor undergoes a thorough technology vetting process, including a full corporate infrastructure security review and penetration test, to allow us to understand the platform capabilities which would be deployed in a pilot. We work with independent cyber security firms who assess each vendor. This generally takes place over the course of six months or more as we get to know both the mobile voting technology and the team behind it. Once a vendor is deployed and the platform used in a pilot, these firms also conduct a post-election security review to assess any events that might have occurred during the election. Audits for all our pilots have shown that no votes were intercepted or changed and that no voter data was compromised. Audit reports for some of our pilots can be viewed here: West Virginia, Denver, Utah County, and the King Conservation District