The Election System Auditing (ESA) process methodology, Data Defenders' proprietary Applied Computer Forensics™ approach, is designed to mitigate the insider and outsider threat dynamic to voting systems.
This process is designed to aid election officials in maintaining and verifying the operational integrity of their voting systems.
In order to ensure the integrity of the voting process through a continuous effort of auditing, mitigation, and documentation, the ESA solution is designed to quickly yield results that will enable the election jurisdiction to mitigate the presence of threats to the integrity of its voting system.
Furthermore, the ESA strategy can be used to secure the voting process while maintaining the public's trust.
The traditional method for delivering computer forensics services is cumbersome, very long, and can be cost prohibitive for election jurisdictions.
Data Defenders has taken the general computer forensics process commonly and effectively used in other markets and industries such as Federal, State, and Local Law Enforcement and Corporate
sectors and developed a specific application called Applied Computer Forensics™. Our Applied Computer Forensics methodology significantly reduces the cost of service delivery by applying automation
to the forensics analysis process, reducing the amount of time required to analyze large amounts of data.
Election System Auditing™ or ESA is Data Defenders' unique process of analyzing the operational performance, integrity, and reliability of electronic voting systems. Data Defenders has taken the general process of computer forensics and created a specific application designed to serve as a detection and deterrent function for election jurisdictions seeking to establish and maintain the integrity of their electronic voting systems.
The ESA process focuses on analyzing data at various levels of the electronic voting system all the way down to the bit level (smallest level possible). As a result, Data Defenders is able to perform a full forensic audit to detect any anomalies and irregularities in the electronic voting system.
The ESA process consists of three (3) functional components that are designed to yield insight into the state of each election system component.
High-level data analysis examines data in relation to its native environment and its specific aspects, such as file parameters which include hash values.
There is no question that The Vote is one of the most sacred of democratic expressions. With Data Defenders at your side, rest assured you will be arming your operation with the most up-to-date Methodologies to ensure that both the integrity of the vote and the trust and confidence of the voter will be preserved and stay strong.