An election audit is any review conducted after polls close for the purpose of determining whether the votes were counted accurately (a results audit) or whether proper procedures were followed (a process audit), or both.
Both results and process audits can be performed between elections for purposes of quality management, but if results audits are to be used to protect the official election results from undetected fraud and error, they must be completed before election results are declared final.
Election recounts are a specific type of audit, with elements of both results and process audits.
The need for verification of election results
In jurisdictions that tabulate election results exclusively with manual counts from paper ballots, or 'hand counts', officials do not need to rely on a single person to view and count the votes. Instead, valid hand-counting methods incorporate redundancy, so that more than one person views and interprets each vote and more than one person confirms the accuracy of each tabulation. In this way, the manual count incorporates a confirmation step, and a separate audit may not be considered necessary.
However, when votes are read and tabulated electronically, confirmation of the results' accuracy must become a separate process.
Within and outside elections, use of computers for decision support comes with certain IT risks. Election-Day electronic miscounts can be caused by unintentional human error, such as incorrectly setting up the computers to read the unique ballot in each election and undetected malfunction, such as overheating or loss of calibration. Malicious intervention can be accomplished by corrupt insiders at the manufacturer, distributor or election authority, or external hackers who access the software on or before Election Day.
Computer-related risks specific to elections include local officials’ inability to draw upon the level of IT expertise available to managers of commercial decision-support computer systems and the intermittent nature of elections, which requires reliance on a large temporary workforce to manage and operate the computers. Voting machines are usually air-gapped from the internet, but they receive updates from flash drives which do come from the internet, and in any case air-gapped computers are regularly hacked through flash drives and other means. Besides traditional security risks such as lock-picking and phishing attacks, voting machines are often unattended in public buildings the night before the election. This physical access lets outsiders subvert them.
To reduce the risk of flawed Election-Day output, election managers like other computer-dependent managers rely on testing and ongoing IT security. In the field of elections management, these measures take the form of federal certification of the electronic elections system designs, though there is no way to know the certified software is what is actually installed; security measures in the local election officials’ workplaces; and pre-election testing.
A third risk-reduction measure is performed after the computer has produced its output: Routinely checking the computers' output for accuracy, or auditing. Outside elections, auditing practices in the private sector and in other government applications are routine and well developed. In the practice of elections administration, however, the Pew Charitable Trusts stated in 2016, “Although postelection audits are recognized as a best practice to ensure that voting equipment is functioning properly, that proper procedures are being followed, and that the overall election system is reliable, the practice of auditing is still in its relative infancy. Therefore, a consensus has not arisen about what constitutes the necessary elements of an auditing program.”
Routine results audits also support voter confidence by improving election officials' ability to respond effectively to allegations of fraud or error.
Examples of wrong outcomes found by audits
In 2012 in Palm Beach County, FL, a routine audit which hand-counted a sample of precincts, changed the outcomes in two Wellington City council contests. Votes in each contest were reported for a different contest. The problem did not occur in the county's other 15 municipalities.
Examples of intrusions into election computers
Computers which tally votes or compile election results are known to have been hacked in the US in 2014   and 2016,  Ukraine in 2014, and South Africa in 1994.   Only the Ukraine hack was disclosed immediately, so regular audits are needed to provide timely corrections.
Audit challenges unique to election results
Confirming that votes were credited to the correct candidates’ totals might seem to be a relatively uncomplicated task, but election managers face several audit challenges not present for managers of other decision-support IT applications. Primarily, ballot privacy prevents election officials from associating individual voters with individual ballots. This makes it impossible for election officials to use some standard audit practices such as those banks use to confirm that ATMs credited deposits to the correct account.
Another challenge is the need for a prompt and irrevocable decision. Election results need to be confirmed promptly, before officials are sworn into office. In many commercial uses of information technology, managers can reverse computer errors even when detected long after the event. However, once elected officials are sworn into office, they begin to make decisions such as voting on legislation or signing contracts on behalf of the government. Even if the official were to be removed because a computer error was discovered to have put that official in office, it would not be possible to reverse all the consequences of the error.
The intermittent nature of elections is another challenge. The number of elections managed by an election authority ranges from two per year (plus special elections) in five US states to one every 4 years (plus by-elections) in parliamentary systems like Canada where different election authorities manage national, provincial and municipal elections. This intermittency limits the development of a full-time, practiced workforce, for either the elections or the audits. Turning election audits over to an independent, disinterested professional accounting firm is another option not available to election officials. Because election results affect everyone, including the election officials themselves, truly disinterested auditors do not exist. Therefore, audit transparency is required to provide credibility.
Attributes of a good election results audit
No governing body or professional association has yet adopted a definitive set of best practices for election audits. However, in 2007 a group of election-integrity organizations, including the Verified Voting Foundation, Common Cause, and the Brennan Center for Justice at NYU School of Law collaborated with the American Statistical Association to produce a set of recommended best practices for post-election results audits:
- Transparency: The public must be allowed to observe, verify, and point out procedural mistakes in all phases of the audit. This requires that audit procedures and standards be adopted, in written form, and made available before the election.
- Independence: While the actual work of post-election audits may be best performed by the officials who conduct the elections, the authority and regulation of post-election audits should be independent of officials who conduct the elections.
- Paper Records: Vote-counting in the audit should be performed with hand-to-eye counts of voter-marked, voter-verified paper ballots.
- Ballot Accounting (chain of custody, or internal control): The records used in the audit must be verified to be true and complete records of the election.
- Confirmation of the correct winners: The audits must reach statistical confidence that the computer-tabulated results identified the correct winners.
- Addressing Discrepancies: When discrepancies are found, investigation is conducted to determine cause of the discrepancies.
- Comprehensive: The ballot-sample selection process includes all jurisdictions and all ballot types (e.g., absentee, mail-in and accepted provisional ballots).
- Additional Targeted Samples: The audit includes a limited non-random sample selected on the basis of factors useful for building voter confidence or improving election management, such as Election-Day problems or preliminary results that deviate significantly from historical voting patterns.
- Binding on Official Results: Post-election audits must be completed before election results are declared official and final, and must either verify or correct the outcome.
Current practices in election results auditing in India
India has designed and uses voting machines with one button per candidate. The button, when pressed, prints the selected candidate on a slip of paper (VVPAT), displays it to the voter, drops the slip into a box and tallies a vote for the candidate. The VVPAT is easy for voters to check, since voters only have one vote to cast, for one member of the lower house of Congress. However there is no way to correct the vote if the VVPAT shows an error. The software is encoded on the machines' chip in a way that it cannot be examined. Brookings found that India's adoption of voting machines cut paper ballot stuffing noticeably in states with the most election prosecutions, and led to more voting by disadvantaged populations. Originally the voting machines lacked a paper trail, and VVPATs were added in 2013-2019 because of doubts about security of unchecked machines.
India hand tallies paper VVPATs from a 1.5% sample of election machines on the last evening of voting, before releasing results. In the April–May 2019 elections, the Election Commission of India hand-tallied the slips of paper from 20,675 voting machines (out of 1,350,000 or 1,730,000 machines) and found discrepancies for 8 machines, usually of four votes or less. Most machines tally over 16 candidates, and they did not report how many of these candidate tallies were discrepant. They formed investigation teams to report within ten days, were still investigating in November 2019, with no report as of June 2021 though the VVPATs themselves were destoyed in September 2019. Hand tallies before and after 2019 had a perfect match with machine counts.
Table of Indian audit rules
|Number of Contests Audited||Sample Size||Which Units Are Sampled?||Excluded from Audits||Method of Auditing Ballots||Do Audits Revise Election Outcomes?||Deadline, days after election day||Level of Discrepancy to Trigger Action||Action if Discrepancy||State Gets Report?||Law||Rules||2020 Population|
|All (each election has1 contest)||1.5%||voting machines||none||Hand tally||Maybe||Same day as last day of election||Any||Try to determine cause||Yes||2019 Supreme Court decision established sample size||1380|
Current practices in election results auditing in the United States
Only two US states hand-tally a representative sample of all ballots, and tally all contests on those ballots, and make corrections in official results if needed: PA and WV. Two more states hand-tally all contests on a representative sample of all ballots, so they can check official results, though not necessarily correcting them if that were needed: DE, UT. In PA, UT and WV sample sizes are usually adequate for state-wide contests, but not for close county and local results. All state assembly districts and local governments have a chance of being covered and audited, and they also have a chance of being missed entirely by these random samples of precincts and election machines.
NY checks if election machines performed as expected, not whether they captured voter intent, so circles and checkmarks outside target areas are not checked by the audit. Two other states hand-tally all contests, but the samples exclude significant groups of ballots: AK excludes small precincts; CA excludes ballots processed after election night (a third).[a] For the two thirds of ballots audited, California does ensure that all contests are covered; they add precincts or machines to the initial sample, to ensure they sample at least some ballots from every contest. At the other extreme, thirteen states do not have regular audits of election results. Most of the other states check only a few contests, so errors are not measured in most contests.
Considering the recommended best practices above, two states (DC, MA) allow public observation of all steps; three states (MD, NM, VT) have audits done by the Secretary of State, which is partly independent of election day procedures; 18 states hand-count; six states (CO, MD, NC, NM, RI, VA) have good samples for statistical confidence; no states have ways to recover from discrepancies in the chain of custody; other issues are listed in the table below.
Computerization of elections occurred rapidly in the United States following the presidential election of 2000, in which imprecise vote-counting practices played a controversial role, and the subsequent adoption of the Help America Vote Act (HAVA) of 2002. The rapid switch to computerized vote tabulation forced election officials to abandon many pre-automation practices that had been used to verify vote totals, such as the redundancy included in valid hand-counting procedures.
Table of U.S. audit rules
|State||Number of Contests Audited||Sample Size||Which Units Are Sampled?||Excluded from Audits||Method of Auditing Ballots||Do Audits Revise Election Outcomes?||Deadline, days after election day||Level of Discrepancy to Trigger Action||Action if Discrepancy||State Gets Report?||Law||Rules||2020 Population|
|California||All (sample expands to cover contests not found in initial sample)||1% plus enough extra to cover all contests||batches or precincts||Ballots tallied after election night (1/3 of ballots)[a]||Hand tally||No||Before finalize||No rules||Report||Yes||Cal. Elec. Code §336.5, §15360 15365-15367||No rules for 1%. RLA:2 CCR 7-2||40|
|Texas||6-Sec of State chooses 3 races & 3 ballot items||at least 1% or 3||precincts||Paperless machines, which many counties use||Hand tally||Maybe||21||Any||Try to determine cause||Yes||Tex. Elec. Code Ann. §127.201 (Vernon 2015)||Election Advisory No. 2012-03||29|
|Florida||All by machine, or recount or 1 audit by hand, randomly chosen by each county||20%-100% by machine or 2% by hand||precincts||none||Tally with machines different from voting system or by hand||No||Before finalize||No rules||Report||Yes||Fla. Stat. Ann. §101.591||Procedures Manual and rule 1S-5.026||22|
|New York||All contests on sampled machines||3%||machines||none||Use machines different from voting system, or manual inspection to check if voting system performed as programmed||Yes||15||Any||Expand sample in stages to full recount. Just the affected office||Yes||N.Y. Election Law §9-211||9 N.Y. Comp. Rules & Regs. 6210.18 and 6210.20 Judges can set aside rule 6210.18(e)(1) requiring expansion Johnson v. Martins||20|
|Pennsylvania||All contests in sampled precincts||lesser of 2% or 2,000 ballots. Also RLA||2% by precincts or batches. RLA by ballots?||none||Hand tally||Yes||Before finalize||No rules||No||Pa. Cons. Stat. tit. 25 §3031.17, §2650, and Stein settlement||Directives: Electronic Voting Systems & RLAs||13|
|Illinois||All contests in samples||5%||precincts & machines||none||Tally with machines the optical ballots, which are common, others by hand or different machine from election||No||Before finalize||Any||Report||Yes||Il. Rev. Stat. ch. 10 §5/24A-15, 10 §5/24C-15||12.8|
|Ohio||3-President or Governor, random state-wide, random county-wide||at least 5% of votes||machines, precincts or polling places||odd-numbered years||Hand tally||Yes||Before finalize||0.5% (0.2% if winning margin under 1%)||Expand sample. Sec of State may order full recount of county||Yes||R.C. 3505-331||Secretary of State Directive 2019-30, 2014-36, 2015 Election Official Manual, ||11.8|
|Georgia||1-chosen by SOS, nonrandom||risk-limiting.||ballots||Primaries, runoffs, special, odd years||Hand tally||Yes||Before finalize||Statistical cutoffs||Investigate & decide||Yes||GA 21-2-498(a)(3)||SEB Rule 183-1-15-.04||10.7|
|North Carolina||1-President or state-wide ballot item||statistician decides||precincts||none||Hand tally||Yes||Before finalize||Significant||Expand sample to whole county, all races||No||N.C. Gen. Stat. Ann. §163-182.1||10.4|
|Michigan||1-statewide||5%||precincts||none||Hand tally||No||After finalize||No action||Training||Yes||MCLA §168.31a||Post-Election Audit Manual||10.1|
|New Jersey||All federal & state offices. Atty.Gen. picks county & municipal contests||2%||Batches||DRE (72% of in-person), provisional & emergency ballots, so audit is mostly of mailed ballots||Hand tally of paper ballots||Yes||December 4||0.1%||Double sample of batches. More if likely to correct outcome||Yes||N.J. Stat. Ann. §19:61-9||9.3|
|Virginia||2-President & Senator, or others selected by Sec of State||risk-limiting||machines in at least random fifth of localities (all in 2020)||Primaries||Hand tally||No||After finalize||Any||Analyze||Yes||Code of VA 24.2-671.1||8.6|
|Washington||1-any contest on batches or precincts, 2 in RLA, or 3 on in-person machines||In most counties: 6 batches. Or county could choose 3 precincts, or 4% of in-person machines (rarely-used in all-mail state, or RLA||batches, machines, or precincts||none||Hand tally or machines different from the election machines||Maybe||Before finalize||Any||investigate & resolve||Yes||Wash. Rev. Code Ann. §29A.60.185, §29A.60.170, 434-262-105||7.7|
|Arizona||5-President, random federal, random state-wide, random legislative, ballot measure||Election-day: 2% or at least 2 precincts. Early & mail: 1% or at most 5,000 ballots||Election-day: precincts. Early & mail ballots sampled by batches||Provisionals and counties where a party refuses||Hand tally||Yes||Before finalize||Statistical committee chooses cutoffs||Expand sample, up to whole county, for affected office||Yes||Ariz. Rev. Stat. §16-602||AZ Elections Procedures Manual||7.2|
|Massachusetts||6-President, state and national Senator and Representative, random ballot question||3%||precincts||Primaries & non-Presidential years||Hand tally||Maybe||14||Cast doubt on outcome||Sec of State may expand audit||Yes||Mass. Gen. Law Ann. ch. 54 § 109A||7.0|
|Tennessee||1-President or Governor in general||1 to 5||precincts||59% lack paper ballots||Tally paper ballots with same method as election day, different optical scanner||No||Begins day after election day||1%||Expand sample to 3% of precincts. Then no action, but audit is evidence in court||No||Tenn. Code Ann. § 2-20-103||6.9|
|Indiana||All contests in sample||up to 5% or 5||precincts||34% lack paper ballots.||If requested by a party chair in county, hand tally paper ballots or use machine different from voting system||Yes||12||No rules||Correct errors||No||Indiana Code §3-12-3.5-8, 3-12-13, 3-12-14||6.8|
|Maryland||All on images. 1-statewide by hand||100% of images and 1%-2% by hand||All images. 2% of vote centers, 1% of mailed & other batches||Primaries unless State Elections Administrator chooses to do them||Independent machines re-tally all ballot images from election machines. Hand tally 1-2%||No||120, after finalize||Any||Investigate and resolve||Yes||MD Elec. Law §11-309||Code of Md. Regs. §33.08.05||6.18|
|Missouri||5-state-wide candidate & ballot issue, legislator, judicial, county||5%||precincts||none||Hand tally||Maybe||Before finalize||0.50%||Investigate and resolve||Yes||15 Mo. Code of State Regs. §30-10.110||6.15|
|Wisconsin||4-President or Governor, and 3 random state contests||5%||wards or other districts reporting results||Primaries and early, absentee, provisional||Hand tally||No||Before finalize||Any||If no explanation, get manufacturer to investigate||Yes||Wis. Stat. Ann. §7.08(6)||WI Elections Com'n Voting Equipment Audits, 2018||5.9|
|Colorado||All contests on sampled ballots are checked, but sample is designed and reported for only 2 contests: 1 statewide, 1 in each county (in primary: 1/party/county) non-randomly chosen by Sec of State||risk-limiting based on target contests, so may be too few for other contests||ballots||none||Hand-compare ballots to computer records, and SOS tally of computer records||Maybe||Before finalize||Statistical cutoffs||100% hand tally of whichever of the 2 target contests has errors, not others||Yes||Colo. Rev. Stat. §1-7-515||CO SOS Election Rule 25||5.8|
|Minnesota||2-3-Governor & federal||3% or at least 2-4||precincts||none||Hand tally||Yes||Before finalize||0.5% or 2 votes||Expand samples for Governor & federal up to whole county, and if counties with 10% of state's ballots discover problems in a race, hand-count affected race statewide||Yes||Minn. Stat. Ann. §206.89||5.7|
|South Carolina||All on images. 1-4 per county by hand, chosen by state & local staff||100% on images. For each contest hand-counted in a county: 1 precinct||All images. Some precincts||Unknown||Independent machines re-tally all ballot images from election machines. Hand tally some||Probably||Before certification||0.5%||Explain or audit more||Yes||S. 108 Section 25 amends SC law 7-3-20(C)||SC Election Commission website||5.1|
|Alabama||0||No audit, though state has paper ballots||5.0|
|Louisiana||0||No audit, and state lacks paper ballots||4.7|
|Kentucky||Depends on Sec of State||3% to 5% of ballots. Also process & eligibility audits in 6 counties by AG||precincts & counties||Depends on Sec of State||If ordered by Sec of State, hand tally||Yes||Before finalize||No rules||No rules||Yes||Ky. Rev. Stat. §117.305, §117.383(7), §117.275(9), §15.243(3)||4.5|
|Oregon||2-3 1 heaviest vote in each county, 1 statewide office & 1 ballot measure||3% to 10% depending on margin of victory||precincts (at least 1 over 150 ballots) or batches, random selection by SOS||Small precincts in small counties which only sample 1 precinct||Hand tally, except small precincts||Yes in counties with discrepancies||Before finalize||0.50%||Expand sample to whole county for that vote tally system, all races||Yes||Or. Rev. Stat. §254.529, §254-535||4.2|
|Oklahoma||0||Secretary of the State Election Board may require audits||OK Stat § 26-3-130.||4.0|
|Connecticut||3-President or Governor and 2 other races; 20% of races in primaries and municipal ballots||5%||voting districts||Early, absentee, provisional||Tally with machines or by hand||Maybe||Before finalize||0.50%||Investigate and if needed recount county with mix of hand and machine counts||Yes||Conn. Gen. Stat. §9-320f||3.6|
|Utah||All contests on sampled machines||1%||machines||none||Hand tally||No||Before finalize||Any||Record reasons||Yes||UT Code Ann. §20A-3-201, §20A-3a-202(9)||Election Policy Directive (not public) from Office of Lieutenant Governor||3.27|
|Iowa||1-President or Governor||1 precinct per county||precincts||none||Hand tally||No||After canvass||No rules||Report||Yes||I,C,A, §50.51, HB 516, enacted in 2017||3.19|
|Nevada||All contests on sampled machines||2% or 3%||machines||none||Tally with machines or by hand||No||7||No rules||No rules||Yes||Nev. Rev. Stat. §293.247, SB123(2019)||Nev. Admin. Code 293.255||3.10|
|Arkansas||1-President||2-11 in each of 5 counties||tabulation machines||none||Hand tally||No||60||No rules||No rules||Public||AR Code §7-4-101, §7-4-121 §7-5-702 and uncodified section 5 in Act 888||3.01|
|Mississippi||0||No audit, and most counties lack paper ballots||2.96|
|Kansas||3-4+: 1 each random: federal, statewide, state legislative, county. And all federal, statewide & legislative races closer than 1%||1%||precincts||ballots counted after election night||Hand tally||Yes||Before finalize||No rules||resolve or expand||KSA 25.3009||KAR 7-47-1||2.94|
|New Mexico||3-4-federal, governor & closest statewide race||None in race with over 15% margin of victory, otherwise enough for 90% confidence||precincts||primaries||Hand tally||Yes||Before finalize||error over 90% of the margin of victory||Expand sample, up to whole state for affected office||Yes||N.M. Stat. Ann. §1-14-13.2 et seq.||NMAC 188.8.131.52||2.12|
|Nebraska||3-nonrandom, 1 each federal, state, local||2-2.5%||precincts||Elections which are not state-wide||Hand tally||No||After final adjournment of county canvass bd, & by 5 weeks after election day||Report||Yes||Nebraska Election Security||1.96|
|West Virginia||All contests in sampled precincts||3%||precincts||none||Hand tally||Yes||Before finalize||1% or changed outcome||Expand sample to whole county, all races||No||W. Va. Code, §3-4A-28||2020 Best Practices Guide for Canvass||1.84|
|Idaho||1-(SOS choice can vary in each precinct & batch)||1% (5% of random 8 counties of the 44)||5% of precincts (or more to get 2,100 ballots) and random batches of early & mail ballots with as many such ballots as the sample precincts||odd years||Hand Tally||Probably||Before state verifies final results||Any||SOS may order more audits for problems found||Yes||Code §34-1203A||SOS Directive||1.79|
|Hawaii||3-state-wide, county-wide, district-wide||10%||precincts||none||Hand tally||Yes||Before finalize||Any||Expand audit until staff are satisfied with results||Yes||Hawaii Rev. Stat. §16-42||Haw. Admin. Rules § 3-172-102||1.46|
|New Hampshire||All?||2 towns or city wards||towns or city wards||All other places||Rescan, tally, and compare 5% of new images to new interpretations||No||3 days after election day||None||None||Yes||SB366 (2022)||1.38|
|Maine||0||No audit, though all voters have paper ballots.||1.36|
|Rhode Island||Some, nonrandom||risk-limiting||Precinct, batch or ballot||none||Hand tally||Yes||Before finalize||Statistical cutoffs||Expand sample to full recount||Yes||R.I. Stat. Ann. §17-19-37.4||1.10|
|Montana||4-random federal, state-wide, legislative, ballot measure||at least 5% or 1||precincts||none||Hand tally||Yes in precincts audited||Before finalize||0.5% or 5 votes||Expand sample but not full recount except in small counties with up to 7 precincts. Check machines with errors||Yes||Mont. Code Ann. §13-17-501- §13-17-509||1.08|
|Delaware||All contests on half of sample, 1 statewide contest on half of sample||2 machines per county, 3 districts in Wilmington||machines and districts||none||Hand tally||No||After finalize||0.50%||further tests of same machine, sometimes another||Yes||Del. Code. Title 15 §5012A||0.99|
|South Dakota||0||No audit, though all voters have paper ballots||0.89|
|North Dakota||0||No audit, though all voters have paper ballots||N.D. Cent. Code 16.1-06-15||0.78|
|Alaska||All contests in sample precincts||1 per House district, with at least 5% of district ballots, so about 600 registered voters||large precincts||Small precincts||Hand tally||Yes||Before finalize||1%||Expand sample to whole district (1/40th of state), all races||Yes||Alaska Stat. §15.15.420, §15.15.430, §15.15.440, §15.15.450, §15.10.170||0.73|
|District of Columbia||4-random District-wide, 2-ward-wide, 1 any type||5%||precincts & ballots||none||Hand tally||Yes||Before finalize||0.25% or 20% of margin of victory||Expand sample, up to whole county, for affected office||Yes||D.C. Code Ann. §1-1001.09a||0.69|
|Vermont||All in 6 towns||All in 6 towns randomly picked by Sec of State||polling places||All but 6 towns||Re-scan & machine-tally, except hand tally ballots which were hand tallied on election day.||No||30||Any||Investigate||Yes||17 Vt. Stat. Ann. §2493, §2581 - §2588||0.64|
|Wyoming||0||No audit. Repeat Logic & Accuracy test after election with test ballotss||W.S. 22-11-104||WY Admin. Rules SOS Election Procedures Chapter 25||0.58|
Other state variations. Only DC requires that observers be able to see ballots being audited well enough to discern voter's marks. Three states have rules for what happens when stored ballots are missing: CO-Missing ballots are treated as being cast for all the losers in risk level calculations; MI and NC-no audit.
Risk-limiting audits are required in Colorado, North Carolina, Rhode Island and Virginia. These store voting machines' interpretation of each ballot ("cast vote record"), collect them centrally over the internet, re-tally them with an independent computer to check totals, and hand-check a sample of the stored paper ballots to check voting machines' interpretations. Samples are big enough to be sure results are accurate, up to an acceptable level of risk, such as 9%. For each audited contest, if the original computer interpretations identified the wrong winner, there is a 9% chance in Colorado that the audit will miss it, and the wrong winner will take office. A lower risk limit would let fewer errors through, but would require larger sample sizes. Close contests also require larger sample sizes. Colorado audits only a few contests, and audits none of the closest contests, which need the biggest samples. Auditing all contests would require several counties to hand-count thousands of ballots each.
If the samples do not confirm the initial results, more rounds of sampling may be done, but if it appears the initial results are wrong, risk-limiting audits require a 100% hand count to change the result, even if that involves hand-counting hundreds of thousands of ballots.
Colorado notes that they have to be extremely careful to keep ballots in order, or they have to number them, to be sure of comparing the hand counts with the machine records of those exact ballots. Colorado says it has a reliable system to re-tally the records, but it is not yet publicly documented.
In 2010, the American Statistical Association endorsed risk-limiting audits, to verify election outcomes. With use of statistical sampling to eliminate the need to count all the ballots, this method enables efficient, valid confirmation of the outcome (the winning candidates). In 2011, the federal Election Assistance Commission initiated grants for pilot projects to test and demonstrate the method in actual elections. In 2014, the Presidential Commission on Election Administration recommended the method for use in all jurisdictions following all elections, to reduce the risk of having election outcomes determined by undetected computer error or fraud. In 2017, Colorado became the first state to implement risk-limiting audits statewide as a routine practice during the post-election process of certifying election results.
Ballot scans for 100% audits
Humboldt County Elections Transparency Project, Clear Ballot, and TrueBallot scan all ballots with a commercial scanner, so extensive audits can be done on the scans without damaging paper ballots, without hand-counting, by multiple groups, independently of the election software. Clear Ballot is certified by the US Election Assistance Commission for voting, and they also have an auditing system, ClearAudit. TrueBallot does not currently serve government elections, just private groups. Both use proprietary software, so if it were hacked at the vendor or locally to create false images of the ballots or false counts, then local officials and the public could not check it.
The "Brakey method" is an approach using electronic ballot images already created by most current US election systems. These ballot images could be hacked if the election software itself is hacked, either at the vendor or elsewhere, so for full security, ballot images need to be checked against the paper ballots, to determine if the images are accurate. To enable this one to one ballot-image comparison, the Brakey Method requires that the ballot images be linkable to their paper ballots, either by keeping paper ballots in the same order as the scans, or through a unique identifier that appears on both digital image and physical ballot.
Independent systems to tally ballot images include Audit Engine,   Free and Fair, OSET Institute (under development),  and the Elections Transparency Project, as used in Humboldt County, California, a medium sized county with 58,000 ballots in the 2016 general election.
Humboldt uses a commercial scanner to scan all ballots and puts them in a digitally signed file, so true copies of the file can be reliably identified. Ballots with identifying marks are first hand-copied by election staff, to anonymize them, since they are valid under California law. The scanner prints a number on each ballot before scanning it, so the scan can be checked against the same physical ballot later if needed. The project has written open source software (Trachtenburg Election Verification Software, TEVS) to read the files, and they check all contests on all ballots to see if official counts are correct. The first time they scanned and checked, in 2008, they found 200 missing ballots, showing the value of complete checks. Other jurisdictions can similarly scan ballots and use Humboldt's software or their own to audit all contests. They need to ensure their in-house counting software is secure and independent of any bugs or hacks in the election software, just as users of risk-limiting audits do.
Reading these scans, with software independent of the election system, is a practical way to audit a large number of close contests, without large hand counts. Scans are also the only practical way to bypass problems of physical security, if paper ballots are scanned, digitally signed, and the resulting electronic records are verified against a sample of paper ballots, as ballots arrive. Scans can be made and digitally signed before ballots are stored, while other audit methods are too slow to do election night. Scanners can process thousands of ballots per hour, and several scanners can operate simultaneously in larger jurisdictions. Once ballots are scanned and a digital signature is published, electronic records can be tallied at any convenient time.
Humboldt and several other jurisdictions have gone beyond this internal approach, and release the digitally signed files of ballot images to the public, so others can use their own software, independent of the election system and officials, to check all contests on all ballots.   Public release lets losing candidates who mistrust the election officials' security measures do their own checks. Humboldt County believes the scans give their citizens high confidence in the county election results.
Recounts may be considered to be a specific type of audit, but not all audits are recounts. The Verified Voting Foundation explains the difference between audits and recounts: Post-election audits are performed to “routinely check voting system performance…not to challenge to the results, regardless of how close margins of victory appear to be", while "recounts repeat ballot counting (and are performed only) in special circumstances, such as when preliminary results show a close margin of victory. Post-election audits that detect errors can lead to a full recount.” In the US, recount laws vary by state, but typically require recounting 100% of the votes, while audits may use samples. Recounts incorporate elements of both results and process audits.
Hand and machine counts. Current audits in most states involve counting paper ballots by hand, but some states re-use the same machines used in the election. Three states use different machines, to provide some independent check.
Sample sizes. When states audit, they usually pick a random sample of 1% to 10% of precincts to recount by hand or by machine. If a precinct has more than one machine, and they keep ballots and totals separate by machine, they can draw a sample of machines rather than precincts and count all ballots processed by that machine. These samples can identify systematic errors widely present in the election. They have only a small chance of catching a hack or bug which was limited to a few precincts or machines, even though that could change the result in close contests.
Number of contests. In the random sample, most states audit only a few contests, so they can only find problems in those contests.
Ballot transport and storage
Auditing is done several days after the election, so paper ballots and computer files need to be kept securely. North Carolina specifies that no audit is done if ballots are missing or damaged. Ballots are at risk when being transported from drop boxes and polling places to central locations, and may be protected by GPS tracking, guards, security systems,[b] and/or a convoy of the public.[c]
Auditing in the US is done several days after the election, so paper ballots and computer files need to be stored securely. No US state has adequate laws on physical security of the ballots, and few localities do. 2008 guidelines for audits included starting audits as soon as possible after the election. 2018 guidelines recommend waiting until all ballots are counted, which in the US means one or more weeks until provisional ballots are adjudicated.[d] A faster start for the audit makes it feasible for independent parties to guard storage sites.[e] Security recommendations include preventing access by anyone alone, which would typically require two hard-to-pick locks, and having keys held by independent officials if such officials exist in the jurisdiction; having storage risks identified by people other than those who design or manage the system; and using background checks on staff.
Physical security of stored paper ballots is particularly important between the time the random sample is selected and when the corresponding ballots are examined, to prevent adjusting the ballots to match erroneous electronic records. Neither Colorado nor California has any limit on how much time can pass. Michigan allows two weeks from the time the sample is identified to the time local election officials must audit them.
Britain, Canada, France, Germany, Spain and other countries count all ballots on election night, including final decisions on questionable ballots, so final counts happen before ballots go into storage. Canada and France sometimes use election machines with paper trails. In these cases risk-limiting audits could be done as soon as results are announced on election night.
If audits cannot be done on election night, creating and verifying a paper or electronic backup of the paper ballots on election night, or the next day as in Florida, would provide an alternative benchmark if flaws are later discovered or suspected in the primary storage of paper ballots. Electronic copies in particular can be stored in safes or safe deposit boxes and/or distributed widely, with hash codes to ensure reliability.
Election storage often uses tamper-evident seals, although seals can typically be removed and reapplied without damage, especially in the first 48 hours. Photos taken when the seal is applied can be compared to photos taken when the seal is opened. Detecting subtle tampering requires substantial training. Election officials usually take too little time to examine seals, and the public is too far away to check seal numbers, though they could compare old and new photos projected on a screen. Seal numbers and photos would need their own secure storage.
Since 1850, people have known how to create a master key from any key in a building, such as a borrowed restroom key. Attackers who cannot find key blanks can 3D-print them from a photo of the lock. Insider threats and the difficulty of following all security procedures are usually under-appreciated, and most organizations do not want to learn their vulnerabilities. When a contractor found poor security at county buildings in Iowa, the state ordered no more testing of security.
Sample breaches of election storage
Breaches of election security which have been identified, have primarily been done by insiders.
- 2017 Broward County, FL (Fort Lauderdale) elections staff erroneously destroyed paper ballots from an August 2016 primary. A court case was pending to gain access to them.
- 2017 In Georgia, elections were centrally programmed by Kennesaw State University. Four days after a lawsuit over election records was files, they erased the election records from their server. Later, the day after this case moved to federal court, they erased their backup.
- 2016 Clark County (Las Vegas), NV, Registrar of Voters opened ballot boxes in secret, did a secret recount before the public one, and hid the results. The Registrar said, "You're asking what my results were when we practiced? I can't tell you that.".
- 2010 Saguache County, CO Clerk and two judges hand-tallied ballots without public notice. They were discovered on security cameras.
- 2007-2009 Cudahy, CA, city officials threw away, uncounted, ballots for candidates running against city council members.
- 2007 Cuyahoga County (Cleveland), OH election workers were convicted of going through locked ballots to ensure an audit would not find errors in the election. They testifiecf "that the board had always done things that way - with the knowledge of its attorney," .
- 2002-2007 Clay County, KY, election officials falsified election results and destroyed forms which showed they helped voters, since the voters they helped were being paid to vote certain ways.
- 1993 Philadelphia, PA, election board did not keep absentee ballots which had been rejected, from unregistered voters, and turned them over to the campaign which collected them.
- In 2018 California law changed to audit only ballots in the Semifinal Official Canvass, which covers election night. They exclude ballots arriving in the mail after election day, and counties may also exclude any of the earlier mailed and provisional ballots which they do not have time to count by election night. News story on the law, and the law itself, are below. Semifinal Official Canvass included 57% of ballots 3/3/2020 and 69% 11/3/2020. Each county could choose to audit one or more within-county contests on a statistical sample of all ballots, but would still need 1% tally of all other contests (ELEC 15365 - 15367)
- News story: Steinberg, Sean (2017-10-30). "New California Law Strikes Blow to Election Audits - WhoWhatWhy". WhoWhatWhy. Retrieved 2018-04-24.
- Law: "Bill Text - AB-840 Elections: vote by mail and provisional ballots". leginfo.legislature.ca.gov. 2017-10-15. Retrieved 2020-03-06.
- Definition of Semifinal Official Canvass: "California Elections Code 353.5". leginfo.legislature.ca.gov. 2008-01-01. Retrieved 2020-11-17.
- Ballot count day after 3/3/20: 5,518,805 https://web.archive.org/web/20200305070323/https://electionresults.sos.ca.gov/returns/status
- Ballot count at end of primary: 9,687,076 https://web.archive.org/web/20200424171200/https://electionresults.sos.ca.gov/returns/status
- Ballot count day after 11/3/20 election: 12,296,360 https://web.archive.org/web/20201105171748/https://electionresults.sos.ca.gov/returns/status
- Ballot count at end of general:17,783,784 https://web.archive.org/web/20210110095403/https://electionresults.sos.ca.gov/returns/status
- Handtally reports through 2010: "County 1% Manual Tally Reports". California Secretary of State. Retrieved 2020-03-06.
- Truckers have developed high security systems for valuable shipments.
- Experts recommend letting different party members ride in the ballot transport vehicle, letting other observers accompany the vehicle, and using guards when needed. Ballots have fallen from trucks during transport.
- "Starting to audit only when all the audit units have already been counted is the most straightforward method."
- Organisation for Security and Cooperation in Europe (OSCE) policy calls for independent foreign officials to sleep with ballots, and allows parties to do so. Turkish opposition sleeping with balllots, Republicans guarded warehouse of voted ballots in 2000 in Florida and had state police lock up ballots in New Mexico.
- Lockpicking is widely taught and practiced: Different techniques apply to electronic locks: There are no statistics on how often criminals enter rooms undetected, but law enforcement often does so, so ability to enter rooms undetected is widespread:
- Security camera flaws have been covered extensively.
- Election Audits Task Force (January 2009). Report on Election Auditing (PDF) (Report). League of Women Voters of the United States. Archived from the original (PDF) on 2017-08-30. Retrieved May 12, 2017.
- Some Machines are Flipping Votes, but That Doesn't Mean They Are Rigged, Pam Fessler, National Public Radio, October 26, 2016. Accessed May 12, 2017
- The Machinery of Democracy: Protecting Democracy in an Age of Electronic Voting, Brennan Center Task Force for Voting System Security, 2006.
- Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting, Aviel David Rubin, Broadway, 2006
- Broken Ballots: Will Your Vote Count? Douglas W. Jones and Barbara Simon, CSLI Publications, 2012
- Bade, Gavin. "Russian hackers infiltrated utility control rooms, DHS says". Retrieved 2019-07-01.
- Steven Cherry; with Ralph Langner (13 October 2010). "How Stuxnet Is Rewriting the Cyberterrorism Playbook". IEEE Spectrum.
- Crawford, Jamie. "Govt: China could take down U.S. power grid". CNN. Retrieved 2019-07-01.
- Sanger, David E.; Perlroth, Nicole (2019-06-15). "U.S. Escalates Online Attacks on Russia's Power Grid". The New York Times. ISSN 0362-4331. Retrieved 2019-07-01.
- Felten, Ed (2010-11-02). "E-Voting Links for Election Day". Princeton's Center for Information Technology Policy. Retrieved 2020-11-17.
- Halpern, Sue (2018-08-23). "Election-Hacking Lessons from the 2018 Def Con Hackers Conference". The New Yorker. ISSN 0028-792X. Retrieved 2019-07-01.
- Voting Equipment Certification Process, US Election Assistance Commission.
- "Pre-election and Parallel Testing" (PDF). Election Management Guidelines. U.S. Election Assistance Commission. Retrieved 2020-11-17.
- Elections Performance Index Methodology, Pew Charitable Trusts, August 2016. Accessed May 12, 2017.
- Confidence in the Electoral System: Why We Do Auditing, Michael W. Trautgott and Frederick G. Conrad, in Confirming Elections: Creating Confidence and Integrity Through Election Auditing, R. Michael Alvarex, Lonna Rae Atkeson, and Thad E. Hall, eds., Palgrave MacMillan, 2012.
- Bennett, George (2012-03-19). "Recount shows wrong winners declared in two Wellington election races". Palm Beach Post. Archived from the original on 18 April 2021. Retrieved 2022-09-20.
- Bennett, George (2012-03-31). "Wellington election results tossed out, but legal ground uncertain". Palm Beach Post. Retrieved 2022-09-20.
- Lamb, Logan (2020-01-14). "Supplemental Declaration of Logan Lamb" (PDF). CourtListener. Retrieved 2020-02-03.
- "Coalition Plaintiffs' Status Report, pages 237-244". Coalition for Good Governance. 2020-01-16. Retrieved 2020-02-03.
- Bajak, Frank (2020-01-16). "Expert: Georgia election server showed signs of tampering". Associated Press. Retrieved 2020-02-03.
- Cole, Matthew; Esposito, Richard; Biddle, Sam; Grim, Ryan (2017-06-05). "Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election". The Intercept. Retrieved 2020-02-03.
- "United States of America v. Viktor Borisovich Netyksho, et al, Indictment, paragraph 77b". 2018-07-13. Retrieved 2020-02-03.
- Clayton, Mark (2014-06-17). "Ukraine election narrowly avoided 'wanton destruction' from hackers". Christian Science Monitor. ISSN 0882-7729. Retrieved 2020-02-03.
- "Excerpt from Birth: The Conspiracy to Stop the '94 Election by Peter Harris". Penguin SA @ Sunday Times Books LIVE. 2010-10-25. Retrieved 2020-02-03.
- Harris, Peter (2010). Birth : the conspiracy to stop the '94 election (1st ed.). Cape Town: Umuzi. ISBN 978-1-4152-0102-2. OCLC 683401576.
- Laing, Aislinn (2010-10-24). "Election won by Mandela 'rigged by opposition'". Daily Telegraph. ISSN 0307-1235. Retrieved 2020-02-03.
- "Past elections". www.elections.ca. Retrieved 2019-07-13.
- The Front Lines of Democracy: Who Staffs our Polling Places and Does it Matter? Bonnie E. Glaser, Karin MacDonald, Iris Hui, and Bruce E. Cain; Election Administration Research Center, University of California at Berkeley. October 2007
- Agarwal, Poonam (2021-01-31). "'Redesign EVMs, Facilitate Audits': Experts' Recommendations to EC". The Quint. Retrieved 2021-11-12.
- Choudhury, Salah Uddin Shoaib (2018-08-30). "Looking to cheat in Elections! EVM is at your Service". Times of Assam. Retrieved 2021-11-12.
- Somanathan, Madhavan (2019-04-05). "India's electoral democracy: How EVMs curb electoral fraud". Brookings. Retrieved 2021-11-12.
- Ravi, Shamika (2019-12-06). "How electronic voting machines have improved India's democracy". Brookings. Retrieved 2021-11-12.
- Audit procedures start on p.64 of "Manual on Electronic Voting Machine and VVPAT". Election Commission of India. 2020-09-29. Retrieved 2021-11-13.
- Mahapatra, Dhananjay (2019-04-09). "Supreme Court: Count VVPAT slips of 5 booths in each assembly seat". Times of India. Retrieved 2021-11-08.
- Jain, Bharti (2021-06-03). "Tallying of VVPAT slips and EVM count in constituencies that went to polls recently throw up 100% match". Times of India. Retrieved 2021-11-08.
- "What are EVMs, VVPAT and how safe they are". Times of India. 2019-03-09. Retrieved 2021-11-08.
- Nath, Damini (2019-07-25). "ECI sets up teams to probe VVPAT mismatch in Lok Sabha election". The Hindu. ISSN 0971-751X. Retrieved 2021-11-08.
- Agarwal, Poonam (2020-02-07). "Why Did EC Destroy VVPAT Slips of 2019 LS Polls in Such a Hurry?". The Quint. Retrieved 2021-11-12.
- New York State Board of Elections (2009-06-22). "Audit Procedure for 6210.18". www.wheresthepaper.org. Retrieved 2022-02-13.
- "Audit Law Database". Verified Voting. Retrieved 2020-11-17.
- "Post-Election Audits". National Conference of State Legislatures. Retrieved 2018-04-02.
- "State Population Totals: 2010-2017". US Census Bureau. Archived from the original on 2018-03-06. Retrieved 2018-04-02.
- "Los Angeles Post Election Manual Tally Audit Summary Information" (PDF). calvoter.org/issues/votingtech/manualcount.html. 2010-08-20. Retrieved 2018-04-24.
- Schweers, Jeffrey (2020-06-30). "Florida election supervisors can use auditing equipment for ballot recounts". Tallahassee Democrat. Retrieved 2021-11-18.. 14 counties use the 100% audit system, with 1/3 of state population: Baker, Bay, Broward, Columbia, Hillsborough, Indian River, Leon, Levy, Nassau, Palm Beach, Pinellas, Putnam, St. Lucie, Suwannee, according to "Levy County announces audit plans". Levy County FL Elections. 2021-05-03. Retrieved 2022-02-07.
- "Risk Limiting Audit Directive" (PDF). dos.pa.gov. 2022-09-30. Retrieved 2022-12-13.
- "Use, Implementation and Operation of Electronic Voting Systems" (PDF). www.dos.pa.gov. 2016-08-09. Retrieved 2022-12-14.
- "Stein v. Cortes, No. 2:16-CV-6287-PD" (PDF). PAcounties.org. 2018-11-28.
- "Fact Sheet on Settlement Agreement in League of Women Voters of Ohio v. Brunner, Case No. 3:05-CV-7309 (N.D. Ohio)" (PDF). 2009. Archived from the original (PDF) on 2016-12-17. Retrieved 2021-10-01. Agreement itself
- "Michigan Legislature - Section 168.31a". www.legislature.mi.gov. Retrieved 2021-03-31.
- "Risk-Limiting Audit Report" (PDF). Virginia Dept of Elections. 2021-03-31. Retrieved 2021-10-01.
- "2020 General Election: Post-Election Manual Ballot Tabulation Audit". elections.maryland.gov. Maryland State Board of Elections. Retrieved 2021-10-02.
- "COMAR 33.08.05.08 .Post-Election Audit — Ballot Tabulation Audit — In General". www.dsd.state.md.us. Retrieved 2021-10-02.
- Lamone, Linda (2016-12-22). "Joint Chairman's Report on the 2016 Post-Election Tabulation Audit" (PDF). Maryland State Board of Elections. Retrieved 2018-09-30.
- Casias, Danny (2017-11-08). "Audited contests in each county for 2017 RLA (XLSX)". www.sos.state.co.us/pubs/elections/auditCenter.html. Retrieved 2018-04-15.
- "State Audit Report". www.sos.state.co.us. Colorado Secretary of State. 2017-11-20. Retrieved 2018-04-09.
- "AG Beshear announces results of random General Election audit for voting irregularities, investigations". Northern Kentucky Tribune. Retrieved 2021-10-01.
- Spears, Hailey (2020-11-18). "AG Daniel Cameron Randomly Selects Counties for Post-Election Audit". Spectrum News 1. Retrieved 2021-10-01.
- Antonyan, Tigran; Bromley, Theodore; Michel, Laurent; Russell, Alexander; Shvartsman, Alexander; Stark, Suzanne (2013-06-21). "Computer Assisted Post Election Audits" (PDF). State Certification Testing of Voting Systems National Conference. Archived from the original (PDF) on 2015-09-22 – via University of Connecticut.
- Hanson, Ric (2020-11-12). "Post Election Audit results from Montgomery County". KJAN Radio Atlantic. Retrieved 2021-10-01.
- "Post-Election Audit Report 2020 Pilot Program" (PDF). Arkansas State Bd of Election Commissioners. 2021-03-03. Retrieved 2021-10-01.
- "2019 Act 888, Arkansas Senate Bill 524" (PDF). Arkansas Legislature. 2019-04-12. Retrieved 2021-10-01.
- Ramlagan, Nadia (2020-12-01). "Arkansas Begins 2020 Election-Audit Pilot Program". KASU. Retrieved 2021-10-01.
- "Nebraska Election Security". Nebraska Secretary of State. 2019-09-27. Retrieved 2021-10-08.
- "Audits-VoteWell". www.votewell.net. Retrieved 2021-10-20.
- "Secretary of State Jim Condos to Conduct Election Audit". www.vermont.gov. 2016-11-22. Archived from the original on 2018-09-30. Retrieved 2018-09-30.
- Lindeman, Mark; Stark, Philip B. (2012-03-16). "Gentle Introduction to Risk-limiting Audits" (PDF). IEEE Security and Privacy (Special issue on electronic voting): 1, 3 – via University of California at Berkeley.
- Mark Lindeman; Jennie Bretschneider; Sean Flaherty; Susannah Goodman; Mark Halvorson; Roger Johnston; Ronald L. Rivest; Pam Smith; Philip B. Stark, eds. (October 2012). Risk-Limiting Post-Election Audits: Why and How (PDF) (Report). pp. 3, 16. Retrieved 2018-04-09 – via University of California at Berkeley.
- Jerome Lovato; Danny Casias; Jessi Romero. "Colorado Risk-Limiting Audit:Conception to Application" (PDF). Bowen center for Public Affairs and Colorado Secretary of State. Retrieved 2018-04-05.
- Mark Lindeman; Ronald L. Rivest; Philip B. Stark; Neal McBurnett (2018-01-03). "Comments re statistics of auditing the 2018 Colorado elections" (PDF). Colorado Secretary of State. Retrieved 2018-04-09.
- Statement on Risk-limiting Auditing, American Statistical Association, April 2010. Accessed May 12, 2017
- Post-Election Risk-Limiting Audit Pilot Program 2011-2013, Final Report to the United States Election Assistance Commission, California Secretary of State 2013. Accessed November 17, 2020
- The American Voting Experience: Report and Recommendations of the Presidential Commission on Election Administration, January 2014
- Stark, Philip B. (2010). "Super-Simple Simultaneous Single-Ballot Risk-Limiting Audits" (PDF). Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections – via (EVT/WOTE ’10). USENIX.
- "Voting System, US Election Assistance Commission". www.eac.gov. Retrieved 2018-04-10.
- "Actions: The Brakey Method". BlackBoxVoting.org. Retrieved 2018-04-06.
- Stauffer, Jacob (2016-11-04). "Vulnerability & Security Assessment Report Election Systems &Software's Unity 184.108.40.206" (PDF). Verified Voting. Retrieved 2020-11-17.
- Hertz, Noah (2021-08-28). "Ballot auditor: Volusia County supervisor of elections did a good job". West Volusia Beacon. Retrieved 2021-09-29.
- Stone, Ken (2021-09-09). "El Cajon Democrat Wants Every Election in America Audited, Starts with 4 States". Times of San Diego. Retrieved 2021-09-29.
- Rosenfeld, Stephen (2021-05-12). "Election Audit in Arizona Under DOJ Scrutiny". LA Progressive. Retrieved 2021-09-29.
- "Open and Free Election Technology". Free & Fair. 2017-05-17. Retrieved 2021-09-29.
- Sutner, Shaun. "Voting fraud technology could play role in momentous election". Tech Target. Retrieved 2021-09-29.
- "Real Results". OSET Institute - Open Source Election Technology. Retrieved 2021-09-29.
- "California Supplement to the Statement of Vote, Statewide Summary by County for President" (PDF). elections.cdn.sos.ca.gov.
- "California Code, Elections Code - ELEC § 15154". Findlaw. Retrieved 2018-04-24.
- Zetter, Kim (2008-12-08). "Unique Transparency Program Uncovers Problems with Voting Software". WIRED. Retrieved 2018-04-06.
- "The Elections Transparency Project". The Elections Transparency Project. Retrieved 2020-11-17.
- Trachtenberg, Mitch. "Humboldt County Election Transparency Project" (PDF). San Francisco Elections Commission. Retrieved 2018-04-05.
- Trachtenberg, Mitch (2013-07-29). "The Humboldt County Election Transparency Project and TEVS" (PDF). Report for Elections Advisory Commission. Retrieved 2018-04-05.
- Post-election Audits, Verified Voting Foundation, undated. Accessed November 17, 2020.
- Santos, Melissa (2020-08-19). "Security and ballot drop boxes: How it works in WA". Crosscut. Retrieved 2021-03-03.
- Buckley, Thomas (2021-03-02). "Vaccine Shipments Present a Security Challenge Worthy of a James Bond Film". Bloomberg.com. Retrieved 2021-03-03.
- "Securing Ballot Boxes During Transportation". aceproject.org. Retrieved August 12, 2019.
- "South Africa: Most Mpumalanga Ballot Papers Recovered". AllAfrica. April 22, 2009. Retrieved August 15, 2019.
- King, Colbert (September 9, 2006). "A Ballad of the Ballot Follies in D.C." Washington Post. ISSN 0190-8286. Retrieved August 15, 2019.
- Krimmer, Robert; Volkamer, Melanie; Braun Binder, Nadja; Kersting, Norbert; Driza Maurer, Ardita; Dueñas-Cid, David; Kulyk, Oksana; Schürmann, Carsten; Vinkel, Priit; Pereira, Olivier; Loeber, Leontine (2017). Electronic voting: second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24–27, 2017, proceedings. Cham, Switzerland: Springer. p. 122. ISBN 9783319686875. OCLC 1006721597.
- Ad Hoc Committee for 2020 Election Fairness and Legitimacy (2020-04-28). "Fair Elections During a Crisis: Bipartisan and Diverse Blue-Ribbon Group of Scholars and Thinkers Releases Report on Urgent Changes Needed for November U.S. Elections". U of California, Irvine. Retrieved 2022-05-16.
RLAs require paper ballots or records, and a degree of chain-of-custody over ballots that few states and local jurisdictions currently require.
- Mark Lindeman; Mark Halvorson; Pamela Smith; Lynn Garland; Vittorio Addona; Dan McCrea (September 2008). "Best Practices: Chain of Custody and Ballot Accounting" (PDF). ElectionAudits.org. Retrieved April 9, 2018.
as soon as possible after the initial tallies
- "Principles and Best Practices for Post-Election Tabulation Audits" (PDF). ElectionAudits.org. 2018. Retrieved August 12, 2019.
- "Turkey's opposition sleeping beside ballots to safeguard democracy". Ahval. April 4, 2019. Retrieved August 12, 2019.
- Gall, Carlotta (April 1, 2019). "A Political Quake in Turkey as Erdogan's Party Loses in His Home Base of Support". The New York Times. ISSN 0362-4331. Retrieved August 12, 2019.
- Cobb, Sue (2016-10-17). "The 2000 Presidential Election – The Florida Recount". Association for Diplomatic Studies & Training. Retrieved 2020-03-11.
- Baker, Deborah (2004-10-31). "Contentious 2000 Election Closest in N.M. History". Associated Press. Archived from the original on 2004-11-09. Retrieved 2020-03-11 – via Albuquerque Journal.
- "Chapter 3. PHYSICAL SECURITY" (PDF). US Election Assistance Commission. Retrieved April 24, 2018.
- "2 CCR § 20124". California Code of Regulations. 2020-08-21. Retrieved 2020-09-03.
- "SOS - Statewide risk-limiting election audit process to begin at 11 a.m." www.michigan.gov. Retrieved 2021-01-26.
- Game, Chris (May 7, 2015). "Explainer: how Britain counts its votes". The Conversation. Retrieved August 16, 2019. Keaveney, Paula (June 8, 2017). "How votes are counted on election night". The Conversation. Retrieved August 16, 2019.
- "Elections, Our Country, Our Parliament". lop.parl.ca. Retrieved August 16, 2019.
- "Qu'est-ce qu'un dépouillement ? – Comment se déroule une journée dans un bureau de vote ? Découverte des institutions – Repères – vie-publique.fr" (in French). January 14, 2018. Retrieved August 16, 2019.
- "Stimmenauszählung". Mülheim an der Ruhr (in German). 2019. Retrieved August 17, 2019.
- "¿Qué es el escrutinio y cómo se cuentan los votos en las elecciones generales 2019?". El Confidencial (in Spanish). April 28, 2019. Retrieved August 17, 2019. and Section 14 of the law:"Ley Orgánica 5/1985, de 19 de Junio, del régimen electoral general. SECCIÓN 14.ª ESCRUTINIO EN LAS MESAS ELECTORALES". www.juntaelectoralcentral.es. Retrieved August 17, 2019.
- Casey, Liam (May 9, 2018). "Electronic voting machines expected to speed up voting, ballot counting: Elections Ontario". Global News. Retrieved August 16, 2019.
- "Quelles sont les règles applicables dans les bureaux de vote dotés d'une machine à voter ? - Conseil constitutionnel présidentielle 2017". presidentielle2017.conseil-constitutionnel.fr. Retrieved August 16, 2019.
- Stofan, Jake (April 25, 2018). "Leon County among Florida precincts to implement Clear Audit for elections". WCTV. Retrieved August 17, 2019.
- Burke, Paul (2018). "Scanners, Hashes, and Election Security" (PDF). J of Physical Security. 11: 1–19 – via RBSekurity.
- Johnston, Roger G., and Jon S. Warner (July 31, 2012). "How to Choose and Use Seals". Army Sustainment. Retrieved May 4, 2018.
- Stark, Philip (July 26, 2018). "An Introduction to Risk-Limiting Audits and Evidence-Based Elections Prepared for the Little Hoover Commission" (PDF). University of California, Berkeley. Retrieved August 16, 2019.
- Coherent Cyber (August 28, 2017). Security Test Report: ES&S Electionware 220.127.116.11 (PDF) (Report). Freeman, Craft, McGregor Group. p. 9 – via California Secretary of State.
- Stauffer, Jacob (November 4, 2016). Vulnerability & Security Assessment Report Election Systems & Software's Unity 18.104.22.168 (PDF) (Report). Freeman, Craft, MacGregor Group for California Secretary of State.
- Seivold, Garett (April 2, 2018). "Physical Security Threats and Vulnerabilities – LPM". losspreventionmedia.com. Retrieved April 24, 2018.
- Vanderbilt, Tom (March 12, 2013). "The Strange Things That Happen at a Lock-picking Convention". Retrieved August 15, 2019.
- Menn, Joseph (August 6, 2019). "Exclusive: High-security locks for government and banks hacked by researcher". Reuters. Retrieved August 16, 2019.
- Greenberg, Andy (August 29, 2017). "Inside an Epic Hotel Room Hacking Spree". Wired. ISSN 1059-1028. Retrieved August 16, 2019.
- Tien, Lee (October 26, 2014). "Peekaboo, I See You: Government Authority Intended for Terrorism is Used for Other Purposes". Electronic Frontier Foundation. Retrieved August 15, 2019.
- Bannister, Adam (October 7, 2016). "How to hack a security camera. It's alarmingly simple". IFSEC Global, Security and Fire News and Resources. Retrieved August 16, 2019.
- Doffman, Zak. "Official Cybersecurity Review Finds U.S. Military Buying High-Risk Chinese Tech (Updated)". Forbes. Retrieved August 14, 2019.
- Schneier, Bruce (October 8, 2007). "Hacking Security Cameras – Schneier on Security". www.schneier.com. Retrieved August 16, 2019.
- Dunn, John (June 11, 2019). "Critical flaws found in Amcrest security cameras". Naked Security. Retrieved August 16, 2019.
- Schwartz, John (2003-01-23). "Many Locks All Too Easy To Get Past". The New York Times. ISSN 0362-4331. Retrieved 2021-02-20.
few institutions want to spend the money for robust security... in a battle between convenience and security, convenience has a way of winning.
- Blaze, Matt. "Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks" (PDF). International Association for Cryptologic Research. Retrieved 2021-02-20.
- Burgess, Ben; Wustrow, Eric; Halderman, J. Alex; Shields, Clay; Iyer, Ravishankar K.; Rossow, Christian (2015). Replication Prohibited: Attacking Restricted Keyways with 3D-Printing (PDF). 9th USENIX Workshop on Offensive Technologies.
- Greenberg, Andy (2020-08-05). "Inside the Courthouse Break-Ins that Landed 2 White Hat Hackers in Jail". Wired. ISSN 1059-1028. Retrieved 2020-08-09.
- Singhal, Raag (2018-05-11). "Order on Plaintiff's Motion for Summary Judgment." Circuit Court of the 17th Judicial District. CACE17-010904(21)" (PDF). Hollerback film.
- Friesdat, Lulu (2017-12-12). "Was the Heated 2016 Democratic Primary Rigged for Debbie Wasserman Schultz?". Truthout. Retrieved 2022-05-13.
- Gumbel, Andrew (2018-08-13). "Why US elections remain 'dangerously vulnerable' to cyber-attacks". The Guardian. Retrieved 2022-05-13.
- Recount Now (January 11, 2017). "Report on the 2016 Presidential Recount in Clark County, Nevada. Page 20" (PDF). Internet Archive. Archived from the original (PDF) on August 12, 2019. Retrieved August 17, 2019.
- Weeks, Luther (2011-01-26). "CO Chain of Custody". CTVotersCount. Retrieved 2022-05-16.
- Gottlieb, Jeff , Hector Becerra and Ruben Vives (2012-07-13). "Feds detail scale of graft in Cudahy". Los Angeles Times. Retrieved 2022-05-13.
- Turner, Karl (November 5, 2007). "Elections board workers take plea deal". Cleveland Plain Dealer. Retrieved August 17, 2019.
- "US District Ct, ED KY, Indictment 09-16-Art US v. Maricle, et al" (PDF). 2009-03-03. Archived from the original (PDF) on 3 August 2021. Retrieved 2022-05-13.
- "Docket for United States v. Maricle, 6:09-cr-00016". CourtListener. 2018-03-19. Retrieved 2022-05-13.
- Stapleton (1994-03-16). "MARKS v. STINSON 19 F.3d 873 (1994)". Leagle. Retrieved 2022-05-13.