Secure Vote Tabulation

The most interesting data transmissions in the world need to be protected.

Election Defense

Easy to hit, hard to hide

Tabulation comes at the beginning of the end of every election and is entirely predictable. In most states, results are initially tallied in reporting centers and then transmitted to a central location for aggregation. In many states, the reporting centers are manned by local officials and volunteers that need to use potentially compromised computers.

How we solve it

We have engineered a system a novice can use with under 5 minutes of training, but boasts one of the most advanced security architectures we have ever sold.

  • We hide the reporting center‘s data room in multiple clouds

    Each reporting center’s dataroom is placed on its own uniquely keyed, encrypted, and cloaked network composed of multiple commercial clouds.

  • Multifactor authentication protects all data transmissions

    Where available, multifactor authentication includes a physical presence test and a human-to-human visual confirmation. Datasweeps are performed automatically.

Secure Vote Tabulation

Our system allows a novice, with under 5 minutes of training, to use it. But boasts one of the most advanced security architectures we have ever sold.

Hardware Handoff

Hardware handoff between officials.

Setup

Simple setup in minutes on election day.

Visual Confirm

Visual confirmation between officials.

Data Transmission

Transmit data securely with backups.

Wicket Handoff and Confirmation

A pair of state officials physically hand off two Wickets to each reporting center official and their respective secondaries. They shake hands and, in so doing, confirm they have seen each other. Setup instructions are provided with the Wickets.

Setup on Election Day

A Wicket is plugged by the designated reporting center official into the reporting center computer. When the Wicket’s light turns green, the computer can no longer send or receive signals except from election-related sites.

Visual Confirmation between Officials

When a file is ready to be sent, the reporting official opens a web browser and connects to a dedicated secure video conference page, allowing the state officials to visually confirm the identity of the reporting official before granting them any access to the upload page.

Data Transmission

When the file is dropped onto the file page, it starts a journey through a set of secured networks to an analysis and backup center controlled by the state. Here, state personnel can safely review and tabulate data from multiple reporting centers.


Secure Vote Tabulation

What does it cost?

The secure vote tabulation system comes with fully secured voter rolls, access terminals, and Wickets to protect your entire network.

Secure Vote Tabulation

The secure vote tabulation system comes with fully secured voter rolls, access terminals, and (optional) Wickets to protect your entire network.

From

$770

/week

Excluding one time purchase of a Wicket.


Cost

Per Reporting Center

$645/week

Per State Terminal

$125/week

Per Wicket

$1,000 one time


Buy this system

Is this an off-the-shelf solution?

Yes, it sure is. You can buy it through our website and simplify your purchasing process.