National Defense Authorization Act (NDAA) Contains Hidden Election Integrity Gem – Could Have Huge Implications for Voting Machines
- With the National Defense Authorization Act signed by President Donald Trump on December 18th, 2025, a little-known section was snuck into the 3000+ page bill: Section 6805. Requiring Penetration Testing As Part Of The Testing And Certification of Voting Systems.
- This section amends the Help America Vote Act of 2002 by adding a “Required Penetration Testing” section that “provides for the conduct of penetration testing as part of the testing, certification, decertification, and recertification of voting system hardware and software” by an accredited laboratory.
- The amendment now requires the penetration testing as a condition of certification from the U.S. Election Assistance Commission (EAC) and allows consultation with the National Institute of Standards and Technology or any other federal agency on “lab selection criteria” and “other aspects of the program.”
- While this is still short of a legitimate attempt at ensuring election integrity, it is an effort toward scrutinizing the voting systems by finally requiring cybersecurity experts to do what Clay Parikh was restricted from doing during his time as a VSTL contractor.
- Hand-marked paper ballots hand-counted at the precinct level, is being utilized in Dallas County, TX for the 2026 midterm primaries, and is still the ultimate goal of the election integrity community to ensure free and fair elections in the United States.
Source: thegatewaypundit.com
Penetration testing, often abbreviated as “pen testing,” is a cybersecurity practice where authorized experts simulate real-world cyberattacks on a computer system, network, or application to identify and exploit vulnerabilities before malicious actors can do so. The goal is to uncover weaknesses in security measures, such as software flaws, misconfigurations, or inadequate defenses, and provide recommendations for remediation. It typically involves several stages:
- Planning and reconnaissance: Gathering information about the target system.
- Scanning: Using tools to probe for potential entry points.
- Gaining access: Attempting to exploit vulnerabilities to breach the system.
- Maintaining access: Testing how long access can be sustained without detection.
- Analysis and reporting: Documenting findings, risks, and fixes.
In the context of Section 6805 of the Fiscal Year 2026 National Defense Authorization Act (NDAA), which incorporates provisions from the SECURE IT Act (H.R. 6315), penetration testing is mandated as part of the testing, certification, decertification, and recertification process for voting system hardware and software. The Election Assistance Commission (EAC) must implement this requirement within 180 days of enactment, with accreditation of testing entities handled through recommendations from the National Institute of Standards and Technology (NIST). This ensures that voting systems used in federal elections undergo rigorous cybersecurity assessments to detect and mitigate vulnerabilities, enhancing election security