Plain Talk on Election Audits and Recounts

Suddenly many people are asking: What’s an election audit? How is it different from a recount? And they’re asking with both interest and confusion, probably because of the just-completed ballot-counting activity in Georgia. For some really plain talk, it’s not so complicated, so let’s do that….

Election Administration Resources

Hopefully you find our presentation(s) and workshop(s) on election infrastructure and election administration insightful and useful. In particular, we were pleased to have Eddie Perez deliver his talk at DEFCON29 where he offered “additional resources.” And those are here! Below is an on-going organic set of resources we think will be of most benefit to … Continued

Game of Margins—Part II

Following our previous post about the recount process in general, and in particular what it normally would mean in Georgia, this article is an “explainer” on the effort begun recently to “audit” the Georgia election per a directive that Georgia Secretary of State Brad Raffensperger announced this week…

Election-Stealing Voting Machines Theories: Secret Decoder Ring, Part 3

I’m back again with my final entry in the Secret Decoder Ring series that you can use to decode and discard pretty much any theory along the lines of “Election 2020 Stolen via Fancy Technology.” Like all good trilogies, this Part 3 builds on the other two, and as a result is shorter! (But with an appendix, of course.) …..

Game of Margins

A cornerstone to trustworthy elections is a recount process to ensure accurate outcomes. Likewise, trust in the recount process is essential. Recounts are a game of margins, which for this election is especially true. So, I offer an explanation of how recounts are conducted in just the states of most potential consequence in the coming weeks…

Election-Stealing Voting Machines Theories: Secret Decoder Ring, Part 1

Weeks after a normal election there are still 100s of thousands of people, or more, tuning into a variety of theories about how the presidential election was “stolen.”  Among these are theories that center on software in voting systems. These theories exist in a perpetual social media mix-master that continues to generate new combinations of old and new zombie memes about things like “Evil Voting Software,” and “Rampant Election Fraud.” Let’s start deciphering…

Election-Stealing Voting Machines Theories: Secret Decoder Ring, Appendices

In my just concluded 3-part series, I provided some plain talk about the nonsense of several kinds of theories about elections stolen via voting machines. However, I didn’t cover two important related points: 1) what our adversaries can do to attack our democratic elections, and 2) what you, the reader can do to help. Let’s do so here…

We get it: Paper is the Tip of the Iceberg

We recently had a conversation with a potential volunteer who accused us of incrementalism for (among other things) insisting on paper ballots and not pushing for online or smartphone voting. That got us thinking…