Orlando Sentinel (Sunday)

20 ways the vote is secure (and there are more)

-

We wish we had the room to list all the security measures protecting Florida ballots. But even a cursory review should provide voters peace of mind that ballots are processed and counted in a safe and secure manner — though critics can make a valid case that some of these measures go too far, disenfranc­hising some voters. Most of these measures are specified in Florida statute but we also checked with local supervisor­s, some of whom have added additional layers of security.

1. Following state law and using informatio­n from multiple sources, supervisor­s are always working to make sure voter rolls are up to date. Starting 30 days before an election, an official voter roll is prepared that is uploaded to electronic “poll books” for use at early voting locations and on Election Day.

2. Voting equipment must come from a state-certified vendor and is put through rigorous testing, including a final pre-election “logic and accuracy” check which is open to the public. All equipment is sealed with numbered tags and kept in locked cages with video surveillan­ce.

3. Requests for mail ballots are logged and there are tight restrictio­ns on those who request, pick up and return ballots for other people.

4. Voters can track the progress of their ballot on their county supervisor­s’ websites, and monitor its return to elections officials.

5. Local post offices separate ballots from regular mail in secure areas where they are guarded and monitored by security cameras until they are transporte­d to elections offices.

6. Mail ballots themselves have multiple security features. That starts with an outer envelope that, among other informatio­n, includes a voter signature block. Once the ballot is verified, the envelope is opened, where an inner envelope protects the secrecy of the ballot itself. Ballots are printed on non-standard-sized paper using high-precision printers to avoid photocopyi­ng.

7. Signature verificati­on is a laborious process and takes place in a secure room under video surveillan­ce; members of the public can also make appointmen­ts to observe. Before an envelope is opened, elections workers compare the signature on the outer envelope to the one on file. Apparent mismatches are reviewed by two other workers (a new law also expands the ability of candidates and political parties to participat­e in the signature-review process, including the ability to challenge signature matches). Ballots with mismatched signatures and those that aren’t signed are set aside, where they may be reviewed by the county’s canvassing board.

8. Those voters are contacted to “cure” their ballots by completing affidavits and providing ID. Once the ballot is verified, the envelope is opened, where an inner envelope protects the secrecy of the ballot itself.

9. Each day’s mail ballots are fed into tabulation machines, then placed in secure envelopes that are sealed, tagged and stored in a secure area that remains under video surveillan­ce.

10. Any time ballots are handled, at least two elections-office workers must be present. Otherwise they’re locked up under video surveillan­ce.

11. During early voting, voters have the option of returning their mail ballots in-person, using secure drop boxes.

12. Voting equipment remains sealed with a numbered, tamper-proof tag until it arrives at early voting locations (and on Election Day, precincts.) Before voting starts, at least two pollworker­s set up the equipment, verify the tag, and run a report that shows the vote count is zero.

13. As voters arrive and check in, their ID and signature is checked against voter rolls.

14. Most voters are given a paper ballot and mark it with a pen, but some voters use assistive technology to complete and print a paper ballot. Voters feed their own ballots into the tabulator.

15. Vote tabulators at early-voting sites and precincts cannot connect to the internet. At the end of the day, tabulation results are transmitte­d through secure, encrypted “tunnels” to the main elections offices, with multiple layers of safeguards that prevent tampering.

16. The same data is stored on memory cards inside each machine; these are later compared to the transmitte­d data.

17. Tabulators are checked several times a day against the electronic pollbook, ensuring that the number of checked-in voters matches the number of ballots cast.

18. Tabulators and ballots are once again sealed with tamper-proof, numbered tags for transport back to the elections office. At least two pollworker­s must accompany the ballots and equipment during transport. At the election offices ,ballots and equipment are again under 24-hour video surveillan­ce.

19. Post-election audits verify results in selected races and precincts. Very close elections trigger automatic recounts.

20. Most counties have made significan­t upgrades to their elections facilities as well, with ballots and voting equipment handled in rooms that are physically secure but have large windows where the public can observe, along with 24-hour video surveillan­ce.

As we’ve said, there’s more. But we tried to focus on things that show a clear chain of custody, the care with which ballots are handled and the obsession with video and in-person surveillan­ce. The next time you hear “The vote was hacked,” you’ll know how prepostero­us that claim really is.

Newspapers in English

Newspapers from United States