One of the last questions asked of Hillary Clinton and Donald Trump at Monday night’s debate at Hofstra University deserves to be revisited. Moderator Lester Holt asked both candidates whether, if they lost the election, they accept the results as the “will of the voters.” Both indicated that yes, they would.
One of the last questions asked of Hillary Clinton and Donald Trump at Monday night’s debate at Hofstra University deserves to be revisited. Moderator Lester Holt asked both candidates whether, if they lost the election, they accept the results as the “will of the voters.” Both indicated that yes, they would.
In any other presidential race, a question about recognizing the will of the voters would be regarded as a softball — the answer so obvious that surely no debate prep was needed. After all, what kind of presidential nominee seeks to delegitimize the essential process that sustains the greatest democracy on Earth? But these are not ordinary times.
The nation’s voting system faces a very real threat from computer hackers. That much was made clear with the breach of a voter information database in Illinois this summer. Election boards across the country were put on alert by federal authorities out of concern for potential vulnerabilities.
Such a problem deserves to be taken seriously, yet the biggest threat of all might be one not so easily addressed in the final six weeks of the campaign: What if the public loses confidence in the voting system and judges it so unreliable that voters do not think the winner of the election is necessarily the winner at all?
Experts in cybersecurity worry that this sowing of doubt within the electorate is far more worrisome than anything a hacker could achieve. After all, there are significant protections already in place — from disconnecting voting machines from the internet to educating election officials on how to spot a potential breach of the registration or absentee ballot databases. According to a recent report by the Brennan Center for Justice, about 80 percent of votes cast Nov. 8 will leave behind a “paper trail,” meaning they can be double-checked without use of any electronic technology.
Some of these security enhancements stem from the last truly close presidential election, the 2000 contest between Al Gore and George W. Bush that came down to a dispute over Florida and its “hanging chads.” The subsequent reforms include the use of ballot scanner systems that maintain a paper trail, federal certification of equipment and a disconnect from the internet.
Yet there also are added vulnerabilities: The election might be close, and the issue of cybersecurity is sensationalized given that Republicans for years have been attacking the integrity of the U.S. voting system with red herring claims about the need for photo identification cards — supposedly to counter in-person ballot fraud, which is virtually nonexistent, but actually in order to quash turnout by minorities and others who tend to vote Democratic. It’s also unhelpful that Trump’s anti-establishment campaign has been stoking fears of a “stolen” election for months.
In testimony heard Tuesday by the House subcommittee that oversees information technology, it was clear there’s much more the nation needs to do to protect election integrity. …
In the long term, there are numerous reforms needed, from replacing old machines to ending the practice of voting over the internet. In the near-term, election boards must do all they can to recognize and address existing vulnerabilities — including auditing the final results. Still, it would be wise for the candidates and their supporters not to overstate or sensationalize the problem and certainly not to goad supporters into rejecting the outcome before it’s even known.
— The Baltimore Sun