Skip to main content

Why Voting and Tabulation Machines Are Controversial

Author: San Jose CAN

Date: March 2, 2026


Electronic voting systems include ballot-marking devices, optical scanners, and central tabulators. Concerns fall into several main categories:


1. Software Cannot Be Fully Observed by the Public

Elections depend on trust and transparency. With computers, the counting process occurs inside proprietary software that ordinary citizens cannot inspect. Even experts often cannot verify it without specialized access.


2. Cybersecurity Vulnerabilities Exist by Design

All computers can be compromised under certain conditions. Election equipment is no exception. Researchers have repeatedly demonstrated vulnerabilities in laboratory and controlled environments.


3. Insider Threat Is a Real Risk

Election infrastructure involves many people: vendors, technicians, contractors, and local officials. Insider access is often the most realistic attack vector in any secure system.


4. Detection Can Be Difficult Without Paper Records

If systems lack voter-verified paper ballots or audits, manipulation may be impossible to detect afterward. This is why cybersecurity experts emphasize auditable paper trails.


Importantly, there is no evidence of widespread machine hacking changing national election outcomes in the United States. Investigations after the 2020 election found no proof of machines being manipulated to alter results. (AP News)


However, the absence of proven manipulation does not eliminate vulnerability concerns.


____________________________________



Real-World Incidents That Raised Security Concerns

Below are documented cases that received national attention.


1. Coffee County, Georgia Voting System Breach (2021)

This is one of the most serious election system security incidents in U.S. history.

  • Individuals associated with political efforts to overturn the 2020 election gained unauthorized access to county voting equipment.
  • They copied software, hard drives, and election data.
  • The breach potentially exposed sensitive system information used statewide.

Investigators reported that operatives “imaged all the hard drives” and copied election system data. (Wikipedia)

Because multiple counties use identical equipment, experts warned that exposure of one county’s software could affect security across the state and beyond. (The New Yorker)

This incident became part of criminal indictments in Georgia.

Key takeaway:
Unauthorized access was possible and occurred without immediate detection.



2. Mesa County, Colorado Voting System Data Leak (2021)

A county clerk allowed unauthorized access during a system update.

  • Machine passwords and forensic images were leaked online.
  • The manufacturer confirmed the passwords belonged to the county’s voting systems.
  • The state ordered inspections and restricted access afterward.

Leaked BIOS passwords and system images were published publicly. (Wikipedia)

Key takeaway:
Insider actions can expose critical election infrastructure.



3. Georgia Election Data Exposure Before 2017 Special Election

A security researcher discovered a massive database of election files online due to poor server security.

  • Voter records
  • Election management system files
  • Server access instructions

The system lacked a verifiable paper trail, meaning manipulation could potentially go undetected. (Axios)

Key takeaway:
Basic cybersecurity mistakes can create major vulnerabilities.



4. Michigan and Colorado Unauthorized Access Attempts

Investigations connected to election denial efforts identified attempts to access voting equipment in multiple states, including Michigan and Colorado. (AP News)

Key takeaway:
Election systems have been targeted repeatedly.



5. The Hursti Hack Demonstration (Florida, 2005)

A famous security test showed how a voting machine could be altered.

  • Researchers modified memory cards to change vote totals.
  • The machine still appeared normal.
  • Results tapes were also manipulated.

The attack successfully altered results without detection during testing. (Wikipedia)

Key takeaway:
Older machine designs were vulnerable to undetectable manipulation.


____________________________________



How Easy Is It to Hack Voting Machines?

The honest answer is nuanced.


It Is NOT Easy Remotely

Most U.S. voting machines are not connected to the internet during voting. Remote hacking is therefore difficult.


But Targeted Attacks Are Possible Under Certain Conditions

Common realistic scenarios include:

  • Insider access
  • Physical access to memory cards or ports
  • Malware introduced during updates
  • Compromised vendor supply chains

Cybersecurity experts consistently warn that no computer system can be guaranteed secure.


____________________________________



Why Paper Ballots With Hand Counts Are Proposed

Advocates argue for paper ballots and manual counting based on these principles:


1. Transparency

Anyone can observe a hand count. No specialized expertise is required.


2. Auditability

Paper ballots create physical evidence that cannot be altered by software alone.


3. Resilience

Manual systems cannot be hacked remotely.


4. Public Confidence

Trust increases when citizens can witness the process directly.

Paper ballots enabled Georgia’s 2020 statewide audit and hand recount, which confirmed the election outcome after a close margin. (Wikipedia)


____________________________________



Arguments Against Full Hand Counting

For balance, election administrators raise practical concerns:

  • Human counting errors
  • Time required for large populations
  • Cost of staffing
  • Chain-of-custody management
  • Risk of partisan disputes during counting

Many experts recommend a hybrid model:

Paper ballots + machine counting + mandatory audits

This approach combines speed with verifiability.


____________________________________



Core Reality: The Debate Is About Risk Tolerance

The controversy is not simply about whether machines have been hacked.

It is about three questions:

  1. How much risk is acceptable in democratic elections?
  2. Should elections rely on software that citizens cannot verify?
  3. What system produces the highest public trust?

Different groups answer these questions differently.


____________________________________



Evidence-Based Conclusion

Facts supported by research and investigations:

  • Voting systems have documented vulnerabilities.
  • Unauthorized access incidents have occurred in multiple states.
  • There is no proven nationwide machine manipulation changing election outcomes.
  • Paper ballots significantly improve auditability and verification.
  • Many cybersecurity experts support voter-verified paper records.

Disclosure and Disclaimer

This article was prepared by San Jose CAN with the assistance of artificial intelligence for research and editorial support. Information is believed accurate but not guaranteed. Readers must independently verify all details and consult licensed professionals before taking action. No liability is assumed for reliance on this content.


Home | About Us | Contact

Copyright © 2026 San Jose CAN.  All rights reserved.  |  Privacy Policy.  Terms of Use.