Author: San Jose CAN
Date: March 2, 2026
Electronic voting systems include ballot-marking devices, optical scanners, and central tabulators. Concerns fall into several main categories:
Elections depend on trust and transparency. With computers, the counting process occurs inside proprietary software that ordinary citizens cannot inspect. Even experts often cannot verify it without specialized access.
All computers can be compromised under certain conditions. Election equipment is no exception. Researchers have repeatedly demonstrated vulnerabilities in laboratory and controlled environments.
Election infrastructure involves many people: vendors, technicians, contractors, and local officials. Insider access is often the most realistic attack vector in any secure system.
If systems lack voter-verified paper ballots or audits, manipulation may be impossible to detect afterward. This is why cybersecurity experts emphasize auditable paper trails.
Importantly, there is no evidence of widespread machine hacking changing national election outcomes in the United States. Investigations after the 2020 election found no proof of machines being manipulated to alter results. (AP News)
However, the absence of proven manipulation does not eliminate vulnerability concerns.
____________________________________
Below are documented cases that received national attention.
This is one of the most serious election system security incidents in U.S. history.
Investigators reported that operatives “imaged all the hard drives” and copied election system data. (Wikipedia)
Because multiple counties use identical equipment, experts warned that exposure of one county’s software could affect security across the state and beyond. (The New Yorker)
This incident became part of criminal indictments in Georgia.
Key takeaway:
Unauthorized access was possible and occurred without immediate detection.
A county clerk allowed unauthorized access during a system update.
Leaked BIOS passwords and system images were published publicly. (Wikipedia)
Key takeaway:
Insider actions can expose critical election infrastructure.
A security researcher discovered a massive database of election files online due to poor server security.
The system lacked a verifiable paper trail, meaning manipulation could potentially go undetected. (Axios)
Key takeaway:
Basic cybersecurity mistakes can create major vulnerabilities.
Investigations connected to election denial efforts identified attempts to access voting equipment in multiple states, including Michigan and Colorado. (AP News)
Key takeaway:
Election systems have been targeted repeatedly.
A famous security test showed how a voting machine could be altered.
The attack successfully altered results without detection during testing. (Wikipedia)
Key takeaway:
Older machine designs were vulnerable to undetectable manipulation.
____________________________________
The honest answer is nuanced.
Most U.S. voting machines are not connected to the internet during voting. Remote hacking is therefore difficult.
Common realistic scenarios include:
Cybersecurity experts consistently warn that no computer system can be guaranteed secure.
____________________________________
Advocates argue for paper ballots and manual counting based on these principles:
Anyone can observe a hand count. No specialized expertise is required.
Paper ballots create physical evidence that cannot be altered by software alone.
Manual systems cannot be hacked remotely.
Trust increases when citizens can witness the process directly.
Paper ballots enabled Georgia’s 2020 statewide audit and hand recount, which confirmed the election outcome after a close margin. (Wikipedia)
____________________________________
For balance, election administrators raise practical concerns:
Many experts recommend a hybrid model:
Paper ballots + machine counting + mandatory audits
This approach combines speed with verifiability.
____________________________________
The controversy is not simply about whether machines have been hacked.
It is about three questions:
Different groups answer these questions differently.
____________________________________
Facts supported by research and investigations:
Disclosure and Disclaimer
This article was prepared by San Jose CAN with the assistance of artificial intelligence for research and editorial support. Information is believed accurate but not guaranteed. Readers must independently verify all details and consult licensed professionals before taking action. No liability is assumed for reliance on this content.
Copyright © 2026 San Jose CAN. All rights reserved. | Privacy Policy. Terms of Use.