Voting by mail: a Markov chain model for managing the security risks of election systems

Carmen A. Haseltine,Laura A. Albert
2024-10-16
Abstract:The scrutiny surrounding vote-by-mail (VBM) in the United States has increased in recent years, raising concerns about the integrity and security of absentee voting. This paper addresses these issues by introducing a dynamic mathematical modeling framework for performing a risk assessment of VBM processes. We introduce a discrete-time Markov chain (DTMC) to model the VBM process and assess election performance and risk with a novel layered network approach that considers the interplay between VBM processes, malicious and non-malicious threats, and security mitigations. The time-inhomogeneous DTMC framework captures dynamic risks and evaluates performance over time. The DTMC model accounts for a spectrum of outcomes, from unintended voter errors to sophisticated, targeted attacks, representing a significant advancement in the risk assessment of VBM planning and protection. A case study based on real-world data from Milwaukee County, Wisconsin, is used to evaluate the DTMC model. The analysis includes the development of attack scenarios to assess the system's resilience and the evaluation of security measures. The analysis suggests that ballot drop boxes and automatic ballot notification systems are crucial for ensuring secure and reliable operations.
Cryptography and Security,Probability
What problem does this paper attempt to address?
The problem that this paper attempts to solve is the security and reliability issues in the Vote - by - Mail (VBM) process in the United States. Specifically, the author evaluates the risks of vote - by - mail by introducing the Discrete - Time Markov Chain (DTMC) model and proposes a new dynamic mathematical modeling framework to manage the security risks associated with absentee voting. ### Detailed Explanation: 1. **Background and Problem**: - In recent years, the United States has increased its scrutiny of vote - by - mail, raising concerns about the integrity and security of absentee voting. - Vote - by - mail increased significantly during the 2020 election, exposing problems such as mailing delays, security issues, and the accessibility of voting infrastructure. - Research shows that the vote - by - mail system requires an efficient, reliable, and secure planning method. 2. **Research Objectives**: - Introduce a Discrete - Time Markov Chain (DTMC) model to evaluate the electoral performance and risks in the vote - by - mail process. - This model takes into account the interaction between malicious and non - malicious threats and security measures, can capture dynamic risks, and evaluate performance over time. - Verify the effectiveness of the model through actual case studies and analyze the resilience of the system under different threat scenarios. 3. **Main Contributions**: - Propose a new DTMC model that uses a hierarchical network approach to evaluate electoral performance and risks. - Construct a new data set that links each mitigation measure to attacks and the vote - by - mail process. - Use the real - data of Milwaukee County for detailed analysis to study the impact of the intensity of mitigation measures on the performance of the vote - by - mail process under multiple threat scenarios. 4. **Model Structure**: - **Process Layer**: Describes seven states of ballots from request to processing. - **Attack Layer**: Includes active threats to the vote - by - mail process, represented by an attack tree model. - **Mitigation Layer**: Contains processes and actions designed to deal with malicious and non - malicious threats. 5. **Application Examples**: - Calibrate and verify the model with the data of Milwaukee County in the 2020 election. - Analyses show that ballot drop boxes and automatic ballot notification systems are crucial for ensuring safe and reliable operations. ### Summary: This paper aims to support the risk analysis of vote - by - mail by introducing a discrete - time Markov chain model with non - homogeneous time. The model distinguishes between malicious and non - malicious threats, considers risks in dynamic systems, and evaluates the effectiveness of mitigation strategies. Through the hierarchical network approach, the model can more comprehensively understand the complexity and potential threats in the vote - by - mail process.