Home

You don’t need to be an IT expert to understand what Wisconsin needs to do about election security.

  • You already know that no computer is immune from manipulation. Even if hackers cannot get at it, corrupt insiders continuously have means and opportunity, so continuous vigilance and oversight are necessary.
  • You know that programmers, technicians, and operators are humans, and that humans sometimes make mistakes.
  • You know that computers sometimes malfunction. As soon as computers were invented, the English language had to invent words like “glitch,” and give new meaning to words like “bug.”

And because you know all that, you know when something important is at stake — for example, our right to self-government through elections — sensible managers should always check to make sure the computers identified the right winners before they officially declare the winner.

And you know that Wisconsin uses paper ballots.

So you know that election officials should be using those paper ballots after every election to make sure that they’re declaring the right winners.

What you may not know is that they are not doing that. Except in the rare cases when a race is recounted, Wisconsin election officials let the computers decide the winners, without any verification.

And you may not know how very efficient and inexpensive verification (known as “risk-limiting auditing”) could be.

Explore the links in the menu above for more information.

To stay up to date with news and action alerts, contact us at info@WisconsinElectionIntegrity.org and ask to be put on our mailing list.

Follow us on Facebook, and check out our blog

*  *  *