Security experts say that election hardware and software must be transparently and rigorously tested, but only by certified experts. However, nearly all partisan reviews lay out such protocols and focus on 2020 results rather than hunting for security flaws.
In Arizona, the company chosen by the Republican-led Legislature, Cyber Ninjas, has no experience auditing previous elections and its executives have promoted conspiracy theories. claims that fraudulent voting machines cost Mr. Trump. The company also employed Republicans to help conduct the review in Maricopa County, including a former legislator who was present at the January 6 rally in Washington before the riots at the Capitol.
In Wisconsin, Republican congressional speaker Robin Vos is pushing for a review of the 2020 results led by a former state Supreme Court judge who declared in November that the election had been beaten steal. And in Pennsylvania, the Republican leader in the state Senate announced hearings he likened to a “forensic investigation” into the election, saying it could include issuing subpoenas. to seize voting machines and ballots.
Christopher Krebs, a former head of the Federal Cybersecurity and Infrastructure Agency, said such reviews could easily compromise voting machines. “The main concern is that someone unqualified gets in and takes the risk, putting something or some malware on the system,” he said. “You have someone accessing these things, not knowing what to do, and once you’ve reached that point, it’s hard to restore the machine’s certificate.”
Confirming machines are effective means replacing them, which is often quick and expensive. Philadelphia’s board of elections denied the GOP’s earlier request for access to the city’s voting machines, saying it would cost more than $35 million to buy the new machines.
In Arizona, Secretary of State Katie Hobbs, a Democrat, told Maricopa County in May that her office would certify 385 machines and nine voting machines that had been assigned for election review by the GOP. leader.
“The problem with the device was that the chain of custody was lost,” Ms. Hobbs said in an interview. “Chain chain ensures that only authorized people have access to it, so that vulnerability cannot be exploited.”