www.cctvcameraworld.com Open in urlscan Pro
96.8.115.171  Public Scan

URL: https://www.cctvcameraworld.com/security-cameras/do-cameras-at-polling-stations-increase-voter-trust/
Submission: On March 21 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

POST https://www.cctvcameraworld.com/contactforms/form/submit/

<form class="form-horizontal pccform" method="post" action="https://www.cctvcameraworld.com/contactforms/form/submit/" novalidate="novalidate">
  <fieldset> <!-- Form Name -->
    <div class="row ">
      <div class="col-md-2"> </div>
      <div class="col-md-8 text-center">
        <p id="text5eee09707a56" style="margin-bottom:15px">Please drop us a line below and we'll get in touch with you shortly!</p>
      </div>
    </div><!-- Text input-->
    <div class="form-group required-control "> <label class="col-md-3 control-label" for="name5eee09707a56">Name</label>
      <div class="col-md-6"> <input id="name5eee09707a56" name="name" type="text" placeholder="" class="form-control  required-entry  " value=""> </div>
    </div><!-- Text input-->
    <div class="form-group required-control "> <label class="col-md-3 control-label" for="email5eee09707a56">E-mail</label>
      <div class="col-md-6"> <input id="email5eee09707a56" name="email" type="text" placeholder="" class="form-control  required-entry validate-email " value=""> </div>
    </div><!-- Text input-->
    <div class="form-group "> <label class="col-md-3 control-label" for="phone5eee09707a56">Phone</label>
      <div class="col-md-6"> <input id="phone5eee09707a56" name="phone" type="text" placeholder="" class="form-control   validate-phoneLax " value=""> </div>
    </div><!-- Select Basic -->
    <div class="form-group required-control "> <label class="col-md-3 control-label" for="department5eee09707a56">Question Type</label>
      <div class="col-md-6"> <select id="department5eee09707a56" name="department" class="form-control   required-entry ">
          <option value="">-- Please Select</option>
          <option value="Pre-Sales Question">Pre-Sales Question</option>
          <option value="Post-Sales Question">Post-Sales Question</option>
          <option value="Something Else">Something Else</option>
        </select> </div>
    </div><!-- Multiple Radios (inline) -->
    <div class="form-group required-control purchased5eee09707a56" disabled="disabled" style="display: none;"> <label class="col-md-3 control-label" for="purchased5eee09707a56">Have you purchased from us?</label>
      <div class="col-md-6"> <label class="radio-inline" for="purchased-05eee09707a56"> <input type="radio" name="purchased" id="purchased-05eee09707a56" value="No" checked="checked" class="required" disabled=""> No </label> <label
          class="radio-inline" for="purchased-15eee09707a56"> <input type="radio" name="purchased" id="purchased-15eee09707a56" value="Yes" class="required" disabled=""> Yes </label> </div>
    </div><!-- Text input-->
    <div class="form-group required-control " disabled="disabled" style="display: none;"> <label class="col-md-3 control-label" for="order_num5eee09707a56">Order Number</label>
      <div class="col-md-6"> <input id="order_num5eee09707a56" name="order_num" type="text" placeholder="" class="form-control  required-entry validate-alphanum " value="" disabled="">
        <p class="help-block">If you don't know your order number, log in to your account to retrieve the order number or check your email for the invoice.</p>
      </div>
    </div>
    <div class="row " disabled="disabled" style="display: none;">
      <div class="col-md-2"> </div>
      <div class="col-md-8 text-center">
        <p id="support_notice_not_purchased5eee09707a56" style="margin-bottom:15px">Please note free support is available by email for products purchased from CCTV Camera World. If you're looking for help with a product purchased elsewhere, feel free
          to purchase a <a href="https://www.cctvcameraworld.com/3rd-party-product-support.html">third party support session here</a>.</p>
      </div>
    </div>
    <div class="row " disabled="disabled" style="display: none;">
      <div class="col-md-2"> </div>
      <div class="col-md-8 text-center">
        <p id="support_notice_purchased_15eee09707a56" style="margin-bottom:15px">Free support is available by email for products purchased from CCTV Camera World.</p>
      </div>
    </div>
    <div class="row " disabled="disabled" style="display: none;">
      <div class="col-md-2"> </div>
      <div class="col-md-8 text-center">
        <p id="support_notice_purchased_25eee09707a56" style="margin-bottom:15px">In a hurry, don't have the time? or are you looking for additional management help from our experts?<br>Configuration services and hands on assistance are available
          through a <a href="https://www.cctvcameraworld.com/networking-support-for-cctv-camera-systems.html">paid support session</a>.</p>
      </div>
    </div><!-- Textarea -->
    <div class="form-group required-control "> <label class="col-md-3 control-label" for="message5eee09707a56">Message</label>
      <div class="col-md-6"> <textarea id="message5eee09707a56" name="message" class="form-control  required-entry  " placeholder=""></textarea> </div>
    </div>
    <div class="form-group "> <label class="col-md-3 control-label" for="visualcaptcha5eee09707a56">Visual Captcha</label>
      <div class="col-md-8 col-lg-8 visualcaptcha">
        <div class="vcaptcha visualCaptcha">
          <div class="visualCaptcha-accessibility-wrapper visualCaptcha-hide">
            <div class="accessibility-description">Type below the <strong>answer</strong> to what you hear. Numbers or words:</div><audio preload="preload">
              <source src="https://www.cctvcameraworld.com/contactforms/form_visualcaptcha/audio/vcaptcha_namespace/5eee09707a56/?r=g7wgxkbiq1w" type="audio/ogg">
              <source src="https://www.cctvcameraworld.com/contactforms/form_visualcaptcha/audio/vcaptcha_namespace/5eee09707a56/?r=g7wgxkbiq1w" type="audio/mpeg">
            </audio>
          </div>
          <p class="visualCaptcha-explanation">Click or touch the <strong>Light Bulb</strong></p>
          <div class="visualCaptcha-possibilities">
            <div class="img">
              <a style="cursor:pointer;"><img src="https://www.cctvcameraworld.com/contactforms/form_visualcaptcha/image/vcaptcha_namespace/5eee09707a56/index/0/?r=g7wgxkbiq1w" id="visualCaptcha-img-0" data-index="0" alt="" title=""></a></div>
            <div class="img">
              <a style="cursor:pointer;"><img src="https://www.cctvcameraworld.com/contactforms/form_visualcaptcha/image/vcaptcha_namespace/5eee09707a56/index/1/?r=g7wgxkbiq1w" id="visualCaptcha-img-1" data-index="1" alt="" title=""></a></div>
            <div class="img">
              <a style="cursor:pointer;"><img src="https://www.cctvcameraworld.com/contactforms/form_visualcaptcha/image/vcaptcha_namespace/5eee09707a56/index/2/?r=g7wgxkbiq1w" id="visualCaptcha-img-2" data-index="2" alt="" title=""></a></div>
            <div class="img">
              <a style="cursor:pointer;"><img src="https://www.cctvcameraworld.com/contactforms/form_visualcaptcha/image/vcaptcha_namespace/5eee09707a56/index/3/?r=g7wgxkbiq1w" id="visualCaptcha-img-3" data-index="3" alt="" title=""></a></div>
            <div class="img">
              <a style="cursor:pointer;"><img src="https://www.cctvcameraworld.com/contactforms/form_visualcaptcha/image/vcaptcha_namespace/5eee09707a56/index/4/?r=g7wgxkbiq1w" id="visualCaptcha-img-4" data-index="4" alt="" title=""></a></div>
          </div>
          <div class="visualCaptcha-button-group">
            <div class="visualCaptcha-refresh-button">
              <a style="cursor:pointer"><img src="https://www.cctvcameraworld.com/static/version1706106372/frontend/cw/security/en_US/PluginCompany_ContactForms/js/lib/visualcaptcha/img/refresh.png" title="Refresh/reload: get new images and accessibility option!" alt="Refresh/reload icon"></a>
            </div>
            <div class="visualCaptcha-accessibility-button">
              <a style="cursor:pointer"><img src="https://www.cctvcameraworld.com/static/version1706106372/frontend/cw/security/en_US/PluginCompany_ContactForms/js/lib/visualcaptcha/img/accessibility.png" title="Accessibility option: listen to a question and answer it!" alt="Sound icon"></a>
            </div>
          </div>
        </div>
      </div>
    </div><!-- Button -->
    <div class="form-group "> <label class="col-md-3 control-label" for="submitform5eee09707a56"></label>
      <div class="col-md-6"> <button id="submitform5eee09707a56" name="submitform" type="submit" class="btn btn-primary">Submit</button> </div>
    </div>
  </fieldset><input type="hidden" name="form_id" value="4"><input type="hidden" value="5eee09707a56" name="uid"><input type="hidden" name="vcaptcha_namespace" value="5eee09707a56">
</form>

POST

<form class="form form-login" method="post" data-bind="event: {submit: login }" id="login-form">
  <div class="fieldset login" data-bind="attr: {'data-hasrequired': $t('* Required Fields')}" data-hasrequired="* Required Fields">
    <div class="field email required">
      <label class="label" for="customer-email"><span data-bind="i18n: 'Email Address'">Email Address</span></label>
      <div class="control">
        <input name="username" id="customer-email" type="email" class="input-text" data-mage-init="{&quot;mage/trim-input&quot;:{}}" data-bind="attr: {autocomplete: autocomplete}" data-validate="{required:true, 'validate-email':true}"
          autocomplete="off">
      </div>
    </div>
    <div class="field password required">
      <label for="pass" class="label"><span data-bind="i18n: 'Password'">Password</span></label>
      <div class="control">
        <input name="password" type="password" class="input-text" id="pass" data-bind="attr: {autocomplete: autocomplete}" data-validate="{required:true}" autocomplete="off">
      </div>
    </div>
    <!-- ko foreach: getRegion('additional-login-form-fields') -->
    <!-- ko template: getTemplate() -->
    <input name="captcha_form_id" type="hidden" data-bind="value: formId,  attr: {'data-scope': dataScope}" value="user_login" data-scope="">
    <!-- ko if: (isRequired() && getIsVisible())--><!-- /ko -->
    <!-- /ko -->
    <!-- /ko -->
    <div class="actions-toolbar">
      <input name="context" type="hidden" value="checkout">
      <div class="primary">
        <button type="submit" class="action action-login secondary" name="send" id="send2">
          <span data-bind="i18n: 'Sign In'">Sign In</span>
        </button>
      </div>
      <div class="secondary">
        <a class="action" data-bind="attr: {href: forgotPasswordUrl}" href="https://www.cctvcameraworld.com/customer/account/forgotpassword/">
                                <span data-bind="i18n: 'Forgot Your Password?'">Forgot Your Password?</span>
                            </a>
      </div>
    </div>
  </div>
</form>

Text Content

The store will not work correctly in the case when cookies are disabled.

JavaScript seems to be disabled in your browser. For the best experience on our
site, be sure to turn on Javascript in your browser.

Menu
 * Home
 * Security Cameras
 * Do Security Cameras at Polling Stations Increase or Undermine Voter Trust?


DO SECURITY CAMERAS AT POLLING STATIONS INCREASE OR UNDERMINE VOTER TRUST?


Map of the Electoral College for the United States presidential election, 2020,
Public Domain

A Pew Research survey from 2020 revealed that "75% of Americans" hypothesized
there could potentially be multiple foreign governments taking action to
influence the U.S. elections (Hartig, 2020). Election security in today's
overwhelming digital state is an absolute necessity to ensure integrity at the
polls. Concerns over potential interference, both international and domestic,
have been at the forefront since the controversial 2000 presidential election.

Bush v. Gore in 2000 had election results concerns leading to a Supreme Court
decision in favor of Bush. This contentious ruling essentially set the stage for
heightened scrutiny and accusations surrounding the 2016 and 2020 U.S. election
cycles, with charges filed and cases brought challenging the outcomes.

Schmitt (2021), a writer for the International Law Studies Journal, signified
that the phenomenon of international election interference is widespread and
that Russia itself encountered a related attack previously by an astounding 15
countries. This shows that no nation is invincible to a cyber-attack on election
processes, and authorities must take swift action to combat such threats.

One of the most promising ways to enhance security at voting polls is to have
cameras installed in law-permitting locations. Voters’ trust can be maintained
if they are made aware upfront of the reasons for security cameras being on-site
and assured their ballots will not be visible for recording. Reminding voters
that surveillance is there to protect them, rather than to invade their privacy,
is a sure way to gain understanding.

Image by Fairfax County


THE PROMISE AND PITFALLS OF SECURITY CAMERAS IN ELECTION SECURITY

Security cameras have been used in and near storage facilities where election
documents are stored as an attempt to deter unauthorized individuals from
accessing files (U.S. Election). Similarly, election officials use video
surveillance to secure computers that contain ballot software and results, as
well as USB drives and other electronic devices holding sensitive information
(U.S. Election). The U.S. Election Commission (n.d.) asserts that these devices
and election materials being protected can only be accessed with key cards or
other designated entry methods, and each time records or equipment are accessed,
it is documented and archived.

Another method that officials use to look for any unusual activity during the
election process (U.S. Election) is cyber surveillance. All technical and
physical security surveillance measures are part of the election infrastructure
that needs to be protected.


SECURITY CAMERAS FOR TRANSPARENCY: EXAMPLES

PBS’s NewsHour political division (2022) wrote an article that shed light on the
importance of having security cameras in the vicinity of voting centers. The
captured security footage they discuss is what the Georgia Secretary of State is
deeming as evidence of unauthorized access of voting equipment (PBS, 2022). The
allegations made were that individuals who were personally interested in
previous President Trump's candidacy, who made claims of election fraud, had
accessed restricted premises without having the proper authorization and
remained on the property for hours (PBS, 2022). This incident stemmed from an
ongoing investigation led by Fani Willis, the District Attorney of Fulton
County, Georgia, to determine whether Trump and allies of his had performed
illegal acts to try to influence the 2020 election (PBS, 2022).

Nierenberg, A. (2023) conveyed that voting results for a democratic mayor in
Bridgeport, Connecticut were thrown out by order of the judge after videos were
recovered showing two women stuffing numerous ballots into drop-boxes. These
perpetrators were partisan to the winning mayor, who had previously served
prison time for federal corruption committed during his term in office from
1991–2003 (Nierenberg, 2023). The judgment determined election laws that
prohibit gathering and retention of absentee ballots, and then submitting them
on behalf of individuals all at once were broken (Nierenberg, 2023).

Image by Phil Roeder


GOVERNING AUTHORITY FOR VIDEO CAMERA USAGE IN ELECTION PROCESSES

The legal and regulatory framework regarding election processes and procedures,
including the intricacies surrounding video cameras and surveillance, lies
primarily in the hands of the states. According to the United States Senate
(n.d.), the Constitution initially granted the states complete control over
voting regulations but provided for Congress to make amendments if necessary.

Federal policy is somewhat silent on video-specific security at election polls,
making the states (or localities) the ultimate decision-makers when it comes to
this topic. The federal government focuses more on general concepts such as
voting and civil rights, as well as restricting illegal tactics to influence
U.S. elections such as tampering with voting materials, making physical threats,
creating propaganda, or spreading disinformation. The U.S. Department of
Homeland Security, Department of Justice, Government Accountability Office, U.S.
Election Assistance Commission, Federal Election Commission, FBI, and Congress
serve as origination points for developing guidelines for states to abide by.

On a widespread basis, video surveillance is generally prohibited during the
actual polling process. The Director of Elections in Texas, Keith Ingram (2018),
issued an Election Advisory [No. 2018-11] which set forth the notion that any
video or sound recording devices, even in the building where voting polls are
being held, should be turned off. They do not believe that cameras should be
used, even when they are turned away from voting equipment (Ingram, 2018).

Using security cameras or other recording devices is seen as a privacy issue to
voters who may not want their ballots (or faces) shared. The NC State Board of
Elections (n.d.) allows phones and devices to be brought to polling locations
but prohibits the use of these devices to communicate with anybody or record
ballots in any manner during the voting process. They relate the reasoning for
this directly to the potential of being engaged in a vote-buying scheme (NC,
n.d.).


PRIVACY IN VOTING

Privacy is a vital component for voters wishing to cast ballots, and officials
alike. The National Institute of Standards and Technology (NIST, 2021) offered a
complex voluntary voting system guide to the Election Assistance Committee
outlining that voters should be able to mark, verify, and cast their ballots
without needing additional assistance. With past threats and intimidation
arising from political tension, it is no wonder people want privacy when it
comes to their votes.

Juan Gilbert (2023), a professor and chair of computer and information science
and engineering at the University of Florida, collaborated with a few PhD
students and evaluated ways to secure and equalize voter access. They signified
that facial recognition could be a breakthrough in adequately identifying voters
while providing an alternative for people who may not have the ability to travel
to voting locations to cast their vote (Gilber, 2023) safely and securely. An
issue that may occur with this technique, however, per Gilbert et. al. (2023),
is that it may disproportionately affect different races due to not properly
identifying people with darker skin tones at a rate nearly as high as lighter
tones.

Artificial intelligence methods, such as facial recognition, may provide wider
accessibility but they also create new vulnerabilities. Hacking, glitches, and
other unforeseen cybersecurity risks increase whenever AI technology is
involved. Unauthorized access is one of the top concerns in voting security, and
such vulnerabilities are heightened when technology is utilized. A UChicago
Harris/AP-NORC Poll (2023) showed that 58% of participants believe AI is bound
to increase the spread of misinformation in electoral and presidential
discussions. UChicago (2023) further relayed that 62% of Republicans and 70% of
Democrats do not want their political candidates using AI in their campaigns.

Image by WyoFile


STRIKING THE RIGHT BALANCE: SECURITY WITHOUT SACRIFICING PRIVACY


DATA PROTECTION METHODS

The NIST (2021) recommends the following actions to protect voting data:
Disconnect from the internet if it is not absolutely needed, securely back up
the data, and ensure policies and procedures are up-to-date. The points should
be clear and forthcoming to anybody who manages voting equipment or processes.
Instructions should make it known that it is prohibited to use personal devices
and that access must be limited to only those who have a business need, and in
separate areas as appropriate (NIST, 2021).

Authoritative personnel who can grant access should maintain a relatively small
and minimal team to keep track of changes, and they should receive important
training to guarantee quality outcomes (NIST, 2021). This staff should
understand that sharing of passwords is never acceptable (NIST, 2021). Data
protection will be most successfully achieved if any changes made, or access
granted is recorded and available for auditing (NIST, 2021). Notifying
individuals when it is identified their information has been breached somehow is
a secondary but essential approach to protecting data from further harm (NIST,
2021).


INTERNATIONAL CASE STUDIES

Australia: The Australian Electoral Commission (2023) designates an Electoral
Integrity Assurance Task Force to monitor and manage suspected crimes,
terrorism, interference, or disinformation involving their election processes.
This task force conducts risk assessments of cyber, foreign, and false
informational threats and shares what they know with the appropriate partnering
entities (AU, 2023). They created this force to increase the trust the public
has in its electoral systems, and to support their democratic values (AU, 2023).
There are multiple ways to vote in Australia and they value the way their
citizens view the government. There is no reference to using security cameras or
video surveillance at their polls, though the National Library of Australia
(2022) reveals that photographs being taken at federal election areas is a
tradition and it has been this way since the early 1900s.

Brazil: The Brazilian Government utilizes a completely electronic voting system.
Will, N. (2021) studied the efficacy of this strategy and deemed that while it
is a fast and accessible process it comes with some risks. Safeguards put in
place include using biometrics for identity verification and monitoring for
actions that were not authorized (Will 2021). With this being their only method
of voting in the country, they do not have to worry about physical video cameras
as much at polling places, but cybersecurity of the electronic voting process is
of vital concern to prevent fraud and other technical nuisances.


PUBLIC SENTIMENT ON VIDEO SURVEILLANCE AT POLLS

When it comes to official state policies in the U.S., it would appear it is
largely believed to be an invasion of a voter’s privacy and right to cast a
secret ballot when video cameras, or other recording is allowed (NCSL, 2022).
The NCSL (2022) relayed that poll watchers are an integral part of voting
oversight because they are partisan to politicians and watch the election
administration closely to make sure no wrongdoing occurs. These political
affiliates are not permitted to interfere in the actual voting process but
merely serve as ‘administrative security guards’ in a sense (NCSL, 2022).

A writer, Sarah Coffey (2022), for the Center for Excellence in Polling
summarized key points from the results of a voter participant survey designed to
measure viewpoints on election security. Considering independents, republicans,
and democrats collectively, 63% agree with a government ID requirement to vote,
a whopping 65% want security cameras overseeing ballot drop boxes, and 67% want
bipartisan officials responsible for the transfer or movement of ballots
(Coffey, 2022). See the full poll results here: Election Security Poll-Center
for Excellence.

There may be more opinions and polls to view or consider in decision-making, but
based on this information alone, it could be perceived that public opinion is
contrary to the rules being imposed by authorities regarding video surveillance
for election security and integrity. Furthermore, these survey participants want
to see election officials penalized if ever discovered they tampered with
election materials (Center for Excellence, 2022).

TapTheForwardAssist, CC BY-SA 4.0, via Wikimedia Commons


MYTHS AND FACTS - DISTINGUISHED BY VIDEO

The January 6 storming of the US Capitol, has been scrutinized extensively
through video evidence by journalists and investigators. This evidence has
helped debunk several myths and clarify the events of that day. Contrary to some
claims, there is no verified evidence that Capitol Police officers uniformly
escorted rioters throughout the Capitol without attempting to remove them.
Additionally, allegations suggesting that individuals disguised themselves as
Trump supporters to instigate violence have not been substantiated by credible
investigations. (Hudnall, 2024).

Hudnall (2024) verified that the videos showed a comedian and his videographer
preparing to interview people there that day to create funny skits and that the
police did indeed ask some individuals to leave several times, but their
requests were ignored.

These instances alone prove that video footage can be misused, which could be
the thought process behind why Speaker Mike Johnson and other interested figures
like Tucker Carlson wanted to reveal the full footage and not just portions of
it to offer transparency to the public (Mendez, et. al 2023). The examples above
are reminders of why it is important to keep in mind that storylines can be
fabricated if the footage has been edited or parts of clips removed, which is
another reason cybersecurity is such a vital safeguard when it comes to
technology like this.

Without the footage from security cameras, however, election stories could not
be validated or disproved.


EXPERT ADVICE

The DOJ Cybersecurity Unit (2017) included digital video devices, such as those
used for security purposes, to be part of the ‘Internet of Things’ (IoT)
category. Most security cameras such as IP cameras or WiFi cameras are
considered IoT devices as they contain software running on internal computer
chips. These security cameras are susceptible to cyber-attacks and criminals can
install malware on them remotely or through other infected devices on the local
computer network, wreaking havoc on their ability to function properly (DOJ
Cyber 2017). To avoid downfalls, the DOJ (2017) suggested researching to gain a
thorough understanding of how to secure your specific device, using strong
passwords, and updating them periodically, disconnecting from the internet when
possible, updating software when prompted, turning off when not in use (anything
plugged in is “on”), and consulting with a professional cybersecurity expert for
advice.

Many election security professionals, computer scientists, and voter advocates
got together and wrote a letter warning federal officials about threats to
future elections (Cassidy, 2023). One of their statements read “The multistate
effort to unlawfully obtain copies of voting system software poses serious
threats to election security and national security and constitutes a potential
criminal conspiracy of enormous consequences,” per Cassidy (2023).

Concerns in the letter pointed to risks of democratic values being compromised
and the ability of voting software to be accessed by bad actors who want to
identify vulnerabilities so they can feasibly manipulate data to their advantage
(Cassidy, 2023). To minimize these threats, the authors of the letter suggested
developing laws that limit access to and retention of election software, ban
accused insurrectionists from carrying out ballot duties, and deliver
consequences to offenders (Cassidy, 2023). Without video cameras on site, there
will be only hearsay, which is not guaranteed to be allowed for use as evidence.

Image by Governor Tom Wolf


BEYOND THE ELECTION SECURITY ACT: BUILDING ENDURING TRUST


2019 ELECTION SECURITY ACT

The Election Security Act of 2019 was introduced to support election processes
financially and provide infrastructure security. Incorporated in this Act is the
Homeland Security Act of 2002 that came first, which touches on cyber security
efforts vital to protecting infrastructure such as election systems. Because
voting equipment is electronic, most of the surveillance security measures
mentioned are from a cyber perspective, instead of actual cameras on the
premises (Election, 2019).

The Election Security Act of 2019 focuses on security to combat misinformation
being spread, improper influence on the US Election Processes, and other bad
intent efforts that can damage the public's trust in the government and its
electoral integrity. Since these threatening actions being monitored can come
from within or outside the country due to the vast access of technological
infrastructure, this act seeks to collaborate with foreign partners to increase
the success of operations and limit harm (Election, 2019).


INITIATIVES AIMED AT BUILDING TRUST IN ELECTORAL PROCESSES

Merivaki, T., et.al (2023) wrote an article citing the MIT Election Data and
Science Lab’s “Learning from Elections” program, which aims to gather election
officials’ social media communications and rate them on their ability to build
trust based on the information they relay to their audiences. They work with the
National Conference of Citizenship to collect all the data posted by state and
local electoral officials (Merivaki, T. 2023). They were able to encourage some
states to use hashtags in all their official communications, such as
“#TrustedInfo 2022” (Merivaki, T. 2023).

The Center for Tech and Civic Life (2020) suggested that tracking ballots
online, ensuring older voting machines are updated, testing machines to
guarantee they will run properly, auditing changes made in a voter system, and
encouraging voter participation in polling processes are all things that can be
done upfront to increase voters' trust. They further recommended that counting
ballots in real-time, displaying confusing ballot results on a public screen,
double- checking results for accuracy, and being honest about detected errors
are ways to keep voters' support after the polls are in (Center, 2020).


EMERGING TECHNOLOGIES

Blockchain: Dr. Leune, a professor in computer science and math, got together
with some of his PhD students to study how blockchain could be used in the
voting process, and they found that it would work well because once something is
input using this method it cannot be altered (Adelphi 2022). The researchers
concluded that blockchain would be 100% secure because there is no way to tamper
with the data without it being recorded and noticed thanks to the cryptography
protections (Adelphi, 2022).

Through blockchain, any individual would have the ability to review the results
of an election while keeping the names of voters private, the writers quoted
after Dr. Luene and his students (Adelphi, 2022). At the time they finished
their study, they ended on the notion that blockchain would primarily work on
machines at polling places but would not have complete efficacy on a fully
technological-based system (Adelphi, 2022).

Encryption: The Center for Internet Security (2024) conveyed that encryption is
an essential part of securing electoral data, whether it is before, during, or
after the voting process. Election officials are provided with the guidance
needed to develop security measures and are responsible for sufficiently
securing any data compiled through voting processes – they are authorized to
determine which information meets the criteria requiring encryption (Center for
Internet, 2024). The Center for Internet Security (2024) also gives access links
to publications issued by the National Institute of Standards and Technology
(NIST), which covers federal encryption standards that are mandatory to follow
in certain circumstances and especially when personal identification information
is present.

Drones (or AI): Using drones or other flying AI to monitor movements at election
sites outside of and around the building could decrease the need for on-site
officers while offering a real-time feed of any dangers that require an
authority presence. This would minimize the uncomfortableness of voters while
serving much-needed protection in the event law enforcement action is imminent.
Mutually, this type of video surveillance would better detect full movement
during the transfer of any voting items instead of solely having cameras at
distinct locations. Space surveillance may assist here, too.

Image by Eden, Janine and Jim


ADDRESSING LOOPHOLES IN ELECTION SECURITY AND PRIVACY



Security cameras equipped with facial recognition are a great starting point in
identifying voters coming to polling stations, monitoring the movement of any
personnel on duty, and catching anything in question that a human may miss.
Implementing video surveillance into voting poll security policy will help
reduce fraud, deter bad behavior, and serve as a secondary form of protection
for individuals coming to cast their votes. There have been concerns in the past
about facial recognition features not being consistently effective among all
races, but this should only be used as a lead and not as a total or final
solution to any investigation.

Voter integrity may increase in times of political tension if they know that any
wrongdoing will be caught on camera. If partisan people are watching the voters,
that may make them more uncomfortable. Actual ballot selections can remain
private while the closed and surrounding areas are recorded for any unusual,
illegal, or suspicious activity. This strategy fosters accountability and acts
as ‘proof.’ Visible security cameras are transparent because people will know
they are being watched.



Virtual voting not only creates unequivocal access to practically everyone but
allows for cybersecurity technology to be incorporated into the process and
monitor all actions taken, with virtually no piece of data left out. This makes
practical sense due to the prime concerns of election crimes and the focus of
new legislation. It would not be perfect though and does open the door to other
threats since the Internet is a far larger platform than a local polling
station. For something like this to work effectively, voter identity and access
controls or prohibitions would need to be thorough and trustworthy; validating
the actual user to justify attaching actions to them is probably the largest
worry. If there is a major technical crash or other disaster that leads to loss
of all the data, recovery may be a problem, too.

Although it may come across as common sense in today's technology-driven era
that anything on the Internet can be seen, some people may find a process that
is completely virtual to be a violation of their privacy. If every action a
voter takes online is monitored and recorded, they should first be provided with
a disclosure in their selected language informing them of this. In this case, if
voters were provided an opt-out option, it may mean they do not have a right to
cast their vote which would be a constitutional offense. People can see human
monitors and video cameras at a voting poll, but they cannot necessarily ‘see’
someone behind a screen who may have unlimited access to their personal
identification information.


CONCLUSION

Security measures around electoral data collection and voter privacy regarding
the actual votes, equipment, and results are increasing and becoming more
regulatory. However, when it comes to the actual polling locations where voters
are coming and going, the biggest security efforts made are placing authorized
staff and law enforcement or other human monitors there to ensure everything
goes smoothly. The utilization of security cameras at the polls is not
widespread or required and is even condemned by some.

The bulk of concerns raised by top federal agencies include interference,
intimidation, threats, undue influence, disinformation, and unauthorized access.
Most of these issues are being addressed in the cyber realm. The difference
between technical and physical monitoring is that every word, opinion, or
viewpoint is captured when it is in a database but not when words are spoken out
loud or actions taken in person. Human error can occur resulting in a hit or
miss when there is not a reliable, impartial source to back up claims, such as
video surveillance.

Security cameras are used in buildings, areas, and in situations that need as
many layers of protection as possible; they may not be able to prevent crimes,
but they sure can prove or disprove claims of criminal activity. Think of
hospitals, police-worn body cameras, government buildings like courthouses,
jails, schools, and the White House – they all have video surveillance. If
elections are one of the most pronounced areas of criminal concern, it only
makes sense to implement video security there, too.

No matter what security measures are put in place, there are going to be
complaints. There is never going to be a 100% satisfaction rate. It is vital for
U.S. election integrity that officials select methods that are logical, proven,
and efficient. If progressive, new tactics are to be acted on, it needs to be
done with caution and at a reasonable pace to identify and correct things that
are not working throughout the process. Ideas being tested should be expected to
take a long time before truly becoming a quality resource.

Voters can stay informed of electoral processes, requirements, and legal nuances
by doing a simple online search to find their local or state election committee
or other organization tasked with managing such intricacies. They can look up
federal resources as well to gain additional clarification on what is or is not
allowed and what their rights are. If voters feel they are illegally or
unethically being targeted or if they have witnessed someone else be treated
unfairly, they can contact the Federal Bureau of Investigations, Department of
Justice, Federal Election Commission, or Election Assistance Commission, to
begin.




REFERENCES 

 1.  Adelphi University. (2022, October 5). Could Blockchain Revolutionize
     Voting?
     https://www.adelphi.edu/news/could-blockchain-revolutionize-voting/ 
 2.  AP-NORC Center for Public Affairs Research. (November 2023). There Is
     Bipartisan Concern About the Use of AI in the 2024 Elections.
     https://apnorc.org/projects/there-is-bipartisan-concern-about-the-use-of-ai-in-the-2024-elections 
 3.  Australian Electoral Commission. (2023, November 28). Electoral Integrity
     Assurance Task Force.
     https://www.aec.gov.au/about_aec/electoral-integrity.htm 
 4.  Cassidy, C. (2023, December 5). Voting experts warn of ‘serious threats’
     for 2024 from election equipment software breaches.
     https://apnews.com/article/election-security-voting-machines-software-2024-80a23479d8a767ba9333b2324c4e424b  
 5.  Center for Excellence in Polling. (2022, June 16). 2022 National Election
     Security Poll.
     https://excellenceinpolling.com/wp-content/uploads/2022/06/CEP-Polling-National-Election-Security-Poll-Crosstabs.pdf 
 6.  Center for Tech and Civic Life. (2020, December 8). 30 Ways Election
     Officials Boost Voter Confidence and Trust.
     https://www.techandciviclife.org/boosting-voter-trust/ 
 7.  Coffey, Sarah. (2022, June 29). 2022 National Election Security Poll.
     Center for Excellence in Polling.
     https://excellenceinpolling.com/poll/2022-national-election-security-poll/ 
 8.  Gilbert, Juan, et. al. (2023, April 7). Evaluating New Technology for
     Equitable and Secure Voter Verification. TechPolicy.press.
     https://www.techpolicy.press/evaluating-new-technology-for-equitable-and-secure-voter-verification/ 
 9.  Hartig, Hannah. (2020). 75% of Americans say it’s likely that Russia or
     other governments will try to influence 2020 election. Pew Research Center.
     https://www.pewresearch.org/short-reads/2020/08/18/75-of-americans-say-its-likely-that-russia-or-other-governments-will-try-to-influence-2020-election/ 
 10. Hudnall, H. (2024, January 6). What's real and not three years after the
     Jan. 6 Capitol riot | Fact check roundup. USA Today.
     https://www.usatoday.com/story/news/factcheck/2024/01/06/debunking-false-claims-about-the-jan-6-capitol-riot-three-years-later/72100035007/ 
 11. Ingram, Keith. (2018, February 16). Election Advisory No. 2018-11. Texas
     Secretary of State.
     https://www.sos.state.tx.us/elections/laws/advisory2018-11.shtml 
 12. Mendez, D., et. al. (2023, November 17). Johnson makes Jan. 6 footage
     available to public, makes good on promise to GOP. Spectrum News NY 1.
     https://ny1.com/nyc/all-boroughs/news/2023/11/17/jan-6-riot-trump-mob-speaker-johnson 
 13. Merivaki, T., et.al. (2023, March 20). Building voter trust on social
     media: Election Officials’ communication strategies during the 2022
     election. MIT Election Data Science Lab.
     https://electionlab.mit.edu/articles/building-voter-trust-social-media 
 14. National Conference of State Legislatures (NCSL). (2022, December 16). Poll
     Watchers and Challengers.
     https://www.ncsl.org/elections-and-campaigns/poll-watchers-and-challengers 
 15. National Library of Australia. (2022). Photographs of 2022 Australian
     Federal Election polling places.
     https://www.nla.gov.au/stories/news/2022/photographs-2022-australian-federal-election-polling-places 
 16. Nierenberg, A. (2023, November 4). Ballot-Stuffers Caught on Camera Have
     Upended a Race for Mayor. The New York Times.
     https://www.nytimes.com/2023/11/04/nyregion/bridgeport-connecticut-mayor-election.html 
 17. North Carolina State Board of Elections. (n.d.). Phone Usage at Polls.
     NCSBE.
     https://www.ncsbe.gov/about-elections/election-security/phone-usage-polls 
 18. PBS News Hour. (2022, September 26). Security footage shows Georgia county
     Republican chair, election official present during breach of voting
     equipment. Politics.
     https://www.pbs.org/newshour/politics/security-footage-shows-georgia-county-republican-chair-election-official-present-during-breach-of-voting-equipment 
 19. Pub. L. No. 107-296 (2002, November 25). Homeland Security Act of 2002.
     https://www.dhs.gov/sites/default/files/2023-11/23_0930_HSA-2002-updated.pdf 
 20. S.1540 - 116th Congress. (2019-2020): Election Security Act of 2019. (2019,
     May 16).
     https://www.congress.gov/bill/116th-congress/senate-bill/1540/text 
 21. Schmitt, Michael (2021). Foreign Cyber Interference in Elections.
     International Law Studies. Vol 97.
     https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=2969&context=ils 
 22. The Center for Internet Security (2024) Election Security Spotlight –
     Encryption.
     https://www.cisecurity.org/insights/spotlight/ei-isac-cybersecurity-spotlight-encryption 
 23. The National Institute of Standards and Technology (NIST). (2021, February
     10). Requirements for the Voluntary Voting System Guidelines 2.0. Technical
     Guidelines Development Committee.
     https://www.eac.gov/sites/default/files/TestingCertification
     Voluntary_Voting_System_Guidelines_Version_2_0.pdf 
 24. The National Institute of Standards and Technology (NIST). (2021, February
     5). Security Recommendations.
     https://www.nist.gov/itl/voting/security-recommendations 
 25. U.S. Department of Justice, Cybersecurity Unit. (2017, July). Securing Your
     “Internet of Things” Device.
     https://www.justice.gov/criminal/criminal-ccips/page/file/984001/dl?inline 
 26. U.S. Election Assistance Commission. (n.d.). Voting System Security
     Measures.
     https://www.eac.gov/sites/default/files/electionofficials/security/Voting_System_Security_Measures_508_EAC.pdf  
 27. United States Senate. (n.d.). Election Laws.
     https://www.senate.gov/about/origins-foundations/electing-appointing-senators/contested-senate-elections/election_laws.htm

Don Stephens is a Technical Support Manager at CCTV Camera World, a leading
Security Camera distributor located in Buffalo, NY. His area of expertise is in
designing professional security camera systems for medium and large scale
businesses, schools, and government projects.

Connect with Don via: Email  |  YouTube

View all posts by Don Stephens

Posted On: March 10 2024
By: Don Stephens
Contact Us
Contact Us


Please drop us a line below and we'll get in touch with you shortly!

Name

E-mail

Phone

Question Type
-- Please Select Pre-Sales Question Post-Sales Question Something Else
Have you purchased from us?
No Yes
Order Number

If you don't know your order number, log in to your account to retrieve the
order number or check your email for the invoice.

Please note free support is available by email for products purchased from CCTV
Camera World. If you're looking for help with a product purchased elsewhere,
feel free to purchase a third party support session here.

Free support is available by email for products purchased from CCTV Camera
World.

In a hurry, don't have the time? or are you looking for additional management
help from our experts?
Configuration services and hands on assistance are available through a paid
support session.

Message

Visual Captcha
Type below the answer to what you hear. Numbers or words:

Click or touch the Light Bulb



Submit
Copyright © 2014-present CCTV Camera World. All rights reserved.

Close
Checkout as a new customer

Creating an account has many benefits:

 * See order and shipping status
 * Track order history
 * Check out faster

Create an Account
Checkout using your account

Email Address

Password

Sign In
Forgot Your Password?