Election System Auditing™

A vote cast is a vote counted

Election jurisdictions work diligently to ensure that the integrity of the voting process remains uncompromised. The objective is to ensure that a vote cast is a vote counted.

As election operations incorporate new technologies, election jurisdictions need to employ new methods and tools to make certain that ballot integrity and voter trust are maintained throughout the election workflow process. Data Defenders’ Election System Auditing solution is designed to mitigate the insider and outsider threat dynamic to electronic voting systems. This solution is designed to aid election officials in maintaining and verifying the operational integrity of their voting systems. In order to ensure the integrity of the voting process, a continuous effort of auditing, mitigation, and documentation is required. Data Defenders’ Election System Auditing solution, which incorporates these three aspects, is designed to quickly yield results that will enable an election jurisdiction to mitigate the presence of threats to the integrity of its voting system paramount to upholding the voting public’s trust and confidence in the voting process.

How does the Election System Auditing process work?

The traditional method for delivering computer forensics services is cumbersome, very long, and can be cost prohibitive for election jurisdictions. Data Defenders’ Applied Computer Forensics methodology has taken the general computer forensics process commonly used in Federal, State, and Local Law Enforcement and Corporate sectors and developed a method to significantly reduce the cost of service delivery by applying automation to the forensics analysis process, reducing the amount of time required to analyze large amounts of data.

The ESA process

The ESA process consists of three (3) functional components that are designed to yield insight into the state of each election system component.
High-level data analysis
High-level data analysis examines data in relation to its native environment and its specific aspects, such as file parameters, which include hash values.
Medium-level data analysis
Medium-level data analysis goes a step further by examining common file behavior across like-voting system components.
Low-level data analysis
Low-level data analysis examines individual file behavior in relation to operational performance characteristics.
There is no question that the vote is one of the most sacred of democratic expressions. With Data Defenders at your side, rest assured you will be arming your operation with the most effective assessment methodologies to ensure that both the integrity of the vote and the trust and confidence of the voter will be preserved and stay strong.