Beruflich Dokumente
Kultur Dokumente
receives a
Georgia D
Footnotes show that much of the information for the evaluation was
prepared by Chris Harvey at SOS office.
the state and for its ballot accounting and reconciliation procedures. Additionally,
Georgia requires election officials to conduct pre-election logic and accuracy test-
ing on all machines that will be used in an upcoming election.
To improve its overall election security, Georgia should switch over to a paper-
based voting system and require mandatory post-election audits that test the
accuracy of election results after every election. Encouragingly, a new piece of
bipartisan legislation would require paper ballots and establish risk-limiting
audits. The state should also work alongside DHS for the purposes of identifying
and assessing vulnerabilities in its voter registration system. While recognizing the
importance of state autonomy when it comes to elections, federal agencies with
expertise in cybersecurity and access to classified information on contemporane-
ous cyberthreats have the personnel and resources necessary to thoroughly probe
and analyze complex election databases, machines, and cybervulnerabilities. By
combining their expertise on cyberthreats and their insight into the unique quali-
ties of localized election infrastructure, state and federal officials can better assess
and deter attempts at electoral disruption. These provisions, if implemented cor-
rectly, would significantly affect the security of Georgia’s elections.
• Electronic poll books are used statewide in Georgia.424 The state conducts In addition to conducting its own
pre-election testing on electronic poll books prior to an election. Paper voter
425
vulnerability testing on its voter
registration lists are available at polling places that use electronic poll books on registration system, Georgia also
Election Day.426 contracts with third-party vendors
to conduct regular vulnerability
Voter-verified paper audit trail: Unsatisfactory assessments that include
• Elections are carried out using paperless DRE machines.429 penetration testing.428