Many of these verification systems are likely online and need to access state databases where voter registration and verification is required to cast a vote, attacks against registered voter databases themselves would also be highly likely.

More Quotes by Stephen Gates