America's voting infrastructure operates on a foundation that would make any cybersecurity professional uncomfortable. After months of technical investigation into the systems that count our votes, the picture that emerges is one of aging hardware, documented vulnerabilities, and a certification process that prioritizes bureaucratic compliance over genuine security. While no evidence suggests these technical weaknesses have been exploited to alter election outcomes, the capability for such attacks has been conclusively demonstrated by leading cybersecurity researchers.
The voting machine industry represents a critical infrastructure sector dominated by just three companies controlling over 90% of the market, yet it operates with less regulatory oversight than the financial or telecommunications sectors. This investigation examined the technical specifications, security architectures, and real-world deployment practices of the systems that processed over 160 million votes in 2020, revealing significant gaps between vendor promises and documented capabilities.
The Hardware Running America's Democracy
The backbone of American election technology rests on a surprisingly small number of machine types, most running on commodity hardware with consumer-grade components. ES&S systems, which process roughly half of all American votes, run on Intel-based platforms using either Windows Embedded or custom Linux distributions. The company's DS200 precinct scanners employ 12-inch LCD touchscreens connected to thermal printers, while their DS850 central count systems can process 300 double-sided ballots per minute using high-speed digital camera imaging.
Dominion's ImageCast systems, used in over 1,600 jurisdictions, run on Android operating systems for ballot marking devices and custom Linux distributions for scanners. The ImageCast Evolution combines a 19-inch touchscreen with integrated thermal printing and dual-side scanning capabilities, all contained within a motorized ballot feed mechanism that costs jurisdictions upwards of $150,000 per unit. Hart InterCivic's Verity systems employ hardened Linux platforms with touchscreen interfaces, while newer entrants like Clear Ballot build their systems around unmodified commercial-off-the-shelf laptops running Windows 10 or Ubuntu Linux.
The physical security measures across all vendors follow similar patterns: multiple locking mechanisms, serial-numbered tamper-evident seals, and locked enclosures designed to prevent unauthorized access. Yet security researcher Alex Halderman at the University of Michigan has demonstrated that these physical protections can be circumvented with tools available at any hardware store, requiring only brief unsupervised access to install malicious software.
The operating systems powering these machines reveal another layer of concern. Many systems still run on Windows 7 Professional, which Microsoft ended support for in January 2020, leaving them vulnerable to newly discovered security flaws. The Election Assistance Commission's rigid certification process actually creates disincentives for security updates: any software modification can invalidate a system's federal certification, potentially costing vendors millions in recertification fees.
Software Architecture Built on Shaky Foundations
The software stacks underlying voting systems reflect decades of legacy development practices, with many systems built on architectures from the early 2000s. ES&S systems employ Visual Basic scripts for tabulation connected to Microsoft SQL Server databases, while Dominion's Democracy Suite uses proprietary database formats for storing Cast Vote Records and ballot images. Hart InterCivic's Verity platform represents a more modern approach with its Linux and Java-based architecture, but even this system relies on cryptographic implementations that security researchers have identified as potentially vulnerable.
The documented vulnerabilities read like a cybersecurity nightmare. In 2023, researchers at the University of Michigan identified multiple severe security flaws in Georgia's Dominion ImageCast X ballot marking devices, demonstrating methods to manipulate votes through barcode alteration without requiring physical access to the machines. These findings followed earlier work by security researcher Harri Hursti, who in 2005 demonstrated the "Hursti Hack" on Diebold systems, showing how memory cards could be manipulated to alter vote counts through executable code on supposedly non-executable storage devices.
The technical attack vectors documented by academic researchers span multiple vulnerability categories. Matt Blaze's comprehensive analysis of ES&S systems revealed the ability to alter precinct results, install corrupt firmware, and erase audit records through fundamental architectural weaknesses. At DefCon's annual Voting Village, security researchers consistently breach every piece of voting equipment tested, typically within minutes of gaining access.
The formal CVE entries make the argument unambiguous. CVE-2022-1747 documented authentication mechanism forgery in Dominion's ImageCast X systems, while CVE-2022-1742 revealed Android Safe Mode access that enables direct operating system manipulation. These are not theoretical vulnerabilitiesâthey represent documented security flaws assigned official identification numbers by the cybersecurity community.
The software update mechanisms create additional risk. The EAC's "De Minimis" category allows for approved updates across multiple systems without additional testing, while the rigid certification process means critical security patches often go undeployed for months or years. Georgia's delayed implementation of critical security updates until after the 2024 election is one example of how the certification process can make systems less secure over time.
A Certification System Optimized for Compliance, Not Security
The federal certification process for voting systems operates through a framework that prioritizes documented compliance over genuine security testing. The Election Assistance Commission's Voluntary Voting System Guidelines have evolved from VVSG 1.0 in 2005 to VVSG 2.0 in 2021, but the fundamental approach remains focused on functional testing rather than adversarial security assessment.
Only two laboratories in the entire United States hold accreditation to test voting systems: Pro V&V in Alabama and SLI Compliance in Colorado. These Voting System Test Laboratories operate under a vendor-payment model where the companies seeking certification pay for their own testingâa conflict of interest that would be unthinkable in other critical infrastructure sectors. The testing process can take six to 12 months and cost upwards of $6 million, creating significant barriers for new entrants while failing to provide meaningful security assurance.
The testing methodologies focus heavily on functional verificationâensuring machines can accurately count votes under normal operating conditionsâwhile providing limited assessment of security resilience. Laboratory testing occurs in controlled environments that cannot replicate the high-stress conditions of actual elections, varying environmental factors, or the presence of sophisticated adversaries. This gap between testing and deployment conditions has proven repeatedly problematic.
The state-level certification processes add complexity without necessarily improving security. While 38 states plus the District of Columbia incorporate federal certification requirements, the additional state testing often focuses on ballot formatting and election law compliance rather than cybersecurity. California's requirement for source code access represents an exception, but even this enhanced scrutiny operates under confidentiality agreements that limit transparency.
The Concentrated Corporate Ecosystem
The voting machine industry's corporate structure reveals market concentration that would trigger antitrust scrutiny in most other sectors. ES&S controls approximately 50% of the U.S. market through its ownership by the McCarthy Group, while Dominion Voting Systems holds about 30% under private equity ownership by Staple Street Capital. Hart InterCivic rounds out the top three with roughly 15% market share, leaving just 5% for all other vendors combined.