Jump to content
IndiaDivine.org

How They Could Steal the Election This Time - Ronnie Dugger - The Nation

Rate this topic


Guest guest

Recommended Posts

>

>

http://www.thenation.com/doc.mhtml?i=20040816 & s=dugger

>

>

> How They Could Steal the Election This Time

> by RONNIE DUGGER

>

> [from the August 16, 2004 issue]

>

> On November 2 millions of Americans will cast

> their votes for President in computerized voting

> systems that can be rigged by corporate or

> local-election insiders. Some 98 million citizens,

> five out of every six of the roughly 115 million who

> will go to the polls, will consign their votes into

> computers that unidentified computer programmers,

> working in the main for four private corporations

> and the officials of 10,500 election jurisdictions,

> could program to invisibly falsify the outcomes.

>

> The result could be the failure of an American

> presidential election and its collapse into

> suspicions, accusations and a civic fury that will

> make Florida 2000 seem like a family spat in the

> kitchen. Robert Reich, Bill Clinton's Labor

> Secretary, has written, " Automated voting machines

> will be easily rigged, with no paper trails to

> document abuses. " Senator John Kerry told Florida

> Democrats last March, " I don't think we ought to

> have any vote cast in America that cannot be traced

> and properly recounted. " Pointing out in a recent

> speech at the NAACP convention that " a million

> African-Americans were disenfranchised in the last

> election, " Kerry says his campaign is readying 2,000

> lawyers to " challenge any place in America where you

> cannot trace the vote and count the votes " [see Greg

> Palast, " Vanishing Votes, " May 17].

>

> The potential for fraud and error is daunting.

> About 61 million of the votes in November, more than

> half the total, will be counted in the computers of

> one company, the privately held Election Systems and

> Software (ES & S) of Omaha, Nebraska. Altogether,

> nearly 100 million votes will be counted in

> computers provided and programmed by ES & S and three

> other private corporations: British-owned Sequoia

> Voting Systems of Oakland, California, whose

> touch-screen voting equipment was rejected as

> insecure against fraud by New York City in the

> 1990s; the Republican-identified company Diebold

> Election Systems of McKinney, Texas, whose machines

> malfunctioned this year in a California election;

> and Hart InterCivic of Austin, one of whose

> principal investors is Tom Hicks, who helped make

> George W. Bush a millionaire.

>

> About a third of the votes, 36 million, will be

> tabulated completely inside the new paperless,

> direct-recording-electronic (DRE) voting systems, on

> which you vote directly on a touch-screen. Unlike

> receipted transactions at the neighborhood ATM,

> however, you get no paper record of your vote.

> Since, as a government expert says, " the ballot is

> embedded in the voting equipment, " there is no

> voter-marked paper ballot to be counted or

> recounted. Voting on the DRE, you never know,

> despite what the touch-screen says, whether the

> computer is counting your vote as you think you are

> casting it or, either by error or fraud, it is

> giving it to another candidate. No one can tell what

> a computer does inside itself by looking at it; an

> election official " can't watch the bits inside, "

> says Dr. Peter Neumann, the principal scientist at

> the Computer Science Laboratory of SRI International

> and a world authority on computer-based risks.

>

> The four major election corporations count votes

> with voting-system source codes. These are kept

> strictly secret by contract with the local

> jurisdictions and states using the machines. That

> secrecy makes it next to impossible for a candidate

> to examine the source code used to tabulate his or

> her own contest. In computer jargon a " trapdoor " is

> an opening in the code through which the program can

> be corrupted. David Stutsman, an Indiana lawyer

> whose suits in the 1980s exposed a trapdoor that was

> being used by the nation's largest election company

> at that time, puts it well: " The secrecy of the

> ballot has been turned into the secrecy of the vote

> count. "

>

> According to Dr. David Dill, professor of computer

> science at Stanford, all elections conducted on DREs

> " are open to question. " Challenging those who

> belittle the danger of fraud, Dill says that with

> trillions of dollars at stake in the battle for

> control of Congress and the presidency, potential

> attackers who might seek to fix elections include

> " hackers, candidates, zealots, foreign governments

> and criminal organizations, " and " local officials

> can't stop it. "

>

> Last fall during a public talk on " The Voting

> Machine War " for advanced computer-science students

> at Stanford, Dill asked, " Why am I always being

> asked to prove these systems aren't secure? The

> burden of proof ought to be on the vendor. You ask

> about the hardware. 'Secret.' The software?

> 'Secret.' What's the cryptography? 'Can't tell you

> because that'll compromise the secrecy of the

> machines.'... Federal testing procedures? 'Secret'!

> Results of the tests? 'Secret'! Basically we are

> required to have blind faith. "

>

> The integrity of the vote-counting inside DREs

> depends on audit logs and reports they print out,

> but as Neumann says, these are " not real audit

> trails " because they are themselves riggable. The

> DREs randomly store three to seven complete sets of

> alleged duplicates of each voter's ballot, and sets

> of these images can be printed out after the

> election and manually counted. The companies claim

> that satisfies the requirement in the 2002 Help

> America Vote Act (HAVA) that " a manual audit

> capacity " must be available. But as informed

> computer scientists unanimously agree, if the first

> set of ballot images is corrupted, they all are. I

> asked Robert Boram, the chief engineer who invented

> a DRE sold by the RF Shoup voting-systems company,

> if he could rig his DRE's three sets of ballot

> images. " Give me a month, " he replied.

>

> The United States therefore faces the likelihood

> that about three out of ten of the votes in the

> national election this November will be

> unverifiable, unauditable and unrecountable. The

> private election companies and local and state

> election officials, when required to carry out

> recounts of elections conducted inside the DREs,

> will order the computers to spit out second

> printouts of the vote totals and the computers'

> wholly electronic, fakable " audit trail. " The

> companies and most of the election officials will

> then tell the voters that the second printouts are

> " recounts " that prove the vote-counting was " 100

> percent accurate, " even though a second printout is

> not a recount.

>

> HAVA was supposed to solve election problems

> revealed in 2000; instead, it has made the situation

> worse. Under the act the Election Assistance

> Commission (EAC), appointed by President Bush, is

> supposed to set standards for the vote-counting

> process, but four months before the election the new

> agency had only seven full-time staff members. On

> June 17 the EAC sent $861 million to twenty-five

> states, mainly to buy computerized machines for

> which no new technical standards have been set. Its

> just-appointed fifteen-member technical standards

> committee does not include more than one leading

> critic of computerized vote-counting.

>

> Rather than completely testing the vote-counting

> codes, there is some secretive testing of systems by

> three private companies that are chosen by the

> pro-voting-business National Association of State

> Election Directors. The companies consult obsolete

> pro-company and completely voluntary standards

> promulgated by the Federal Election Commission and

> get paid by the very companies whose equipment is

> being tested. The three private companies,

> speciously called Independent Testing Authorities,

> together constitute a Potemkin village to falsely

> assure the states and the voters of the security of

> the systems. Often their work is misrepresented as

> " federal testing. " The states then test and

> " certify " the systems, and the local jurisdictions

> put on dog-and-pony-show " logic and accuracy tests, "

> which are not capable of discovering hidden codes

> that would change vote totals.

>

> " The system is much more out of control than

> anyone here may be willing to admit, " Dr. Michael

> Shamos, a computer scientist at Carnegie-Mellon

> University and for many years an examiner of voting

> machines for Texas and Pennsylvania, told a House

> panel on June 24. " There's virtually no control over

> how software enters a voting machine. " Shamos told

> another House panel on July 20, " There are no

> adequate standards for voting machines, nor any

> effective testing protocols. "

>

> Hackable computer codes control vote-counting in

> all three kinds of computerized systems that will be

> used again in the 2004 elections: the ballotless

> DREs, on which some 36 million will vote;

> optical-scan systems that electronically tally paper

> ballots marked by the voters, on which 40 million

> people will vote; and punch-card ballots, also

> tabulated by computerized card-readers, which gained

> notoriety in 2000 and are still used by 22 million

> voters. (Another 16 million still vote on the old

> lever machines, about a million on hand-counted

> paper ballots.)

>

> Florida 2000 was universally misunderstood and

> mischaracterized in the press as a crisis of hanging

> chads on the punch-card ballots. The serious issue,

> then as now, was embodied in the explicit though all

> but unreported position that James Baker, George W.

> Bush's field commander in Florida, staked out to

> stop the recounting of votes. The computerized

> vote-counting systems, Baker declared, are

> " precision machinery " that both count and recount

> votes more accurately than people do. Now, with

> Senator Kerry demanding recountability, an ominously

> intensifying partisan split has developed in

> Washington over whether to have a voter-verified

> paper trail and, when necessary, to conduct recounts

> with it.

>

> Torment in Washington

>

> Though no broad citizens' movement has formed

> against computerized vote-counting, a nationwide

> backlash against unverifiable paperless voting has.

> The paper ballots used in the op-scan and punch-card

> systems already provide a voter-verified paper audit

> trail (VVPAT). The principal proposed security

> safeguard for the DRE system was invented, but not

> patented, ten years ago by computer scientist

> Rebecca Mercuri, now a research fellow at Harvard.

> In her solution, after voters record their choices

> on the touch-screen, they confirm them on a paper

> ballot that appears under glass and then push a

> button to cast the vote, causing the machine to

> deposit the paper ballot in a box that will hold it

> for recounting if that is ordered. The printer for

> the paper ballots for each voting machine should

> cost about $50; the total add-on could be $300-$600.

> Many jurisdictions also have the alternative of

> expanding or acquiring the relatively inexpensive

> optical-scan systems or other systems already in

> place that create paper trails.

>

> In the US Senate seven Democrats and the one

> Independent are co-sponsoring a bill by Senators Bob

> Graham and Hillary Clinton to require paper trails

> on DREs by November, with a loophole for

> jurisdictions whose officials deem it to be

> technologically impossible. Clinton told the press

> that without a voter-verified paper trail

> GOP-leaning corporations might program voting

> machines to help Republicans steal elections [see

> sidebar, page 16]. In an interview in his hideaway

> office in the Capitol, Graham told me that he

> regards his and Clinton's bill as so obviously

> needed that it's " a no-brainer. " The absence of a

> paper trail on the DREs could endanger " the

> legitimacy " of November's election, Graham said.

>

> New Jersey Democrat Rush Holt introduced a House

> bill more than a year ago requiring a paper trail on

> DREs. It has 149 co-sponsors, including a few

> prominent Republicans. Holt says, " The verification

> has to be something that the voter herself or

> himself has to do " ; without that, " we will never

> have a truly secure election. " Holt's bill has

> opened up a partisan divide in the House. The

> chairman of the committee to which his bill is

> assigned, Ohio Republican Bob Ney, informed Holt

> that he is against the bill and would not allow a

> hearing on it. A few days later Graham and Holt

> wrote their fellow members of Congress that " without

> an independent, voter-verified paper trail, we will

> be able only to guess whether votes are accurately

> counted. " Last month Ney relented and scheduled two

> hearings. Holt plans to offer his bill as an

> amendment to the Treasury appropriation after

> Congress returns from its August recess. Graham is

> still mulling his strategy.

>

> The principal stated objection to a DRE paper

> trail comes from some spokespersons for the

> disabled, who characterize it as a step back from

> the touch-screen's improved accessibility and

> privacy. Many election officials, whose work paper

> ballots make both auditable and much more extensive,

> object variously that the attachment will add costs,

> that the printers might fail and that paper ballots

> can be stolen or counterfeited and sometimes produce

> somewhat different totals.

>

> Leading citizen organizations have been split.

> Initially the League of Women Voters, concerned to

> minimize invalidly cast ballots, opposed the paper

> trail, but there was a revolt in the chapters and a

> petition for the paper trail was signed by 800

> members. At the league's June convention, after a

> fight led by Barbara Simons, past president of the

> Association of Computer Machinery, the league

> switched sides, endorsing voting systems that are

> " recountable. " Common Cause, placing the highest

> value on insuring that every vote is counted and can

> be recounted if necessary, has been among the

> leaders of the fight for the paper trail.

>

> Around the States

>

> Not surprisingly, the starkest resistance to the

> voter-verified paper trail comes from Florida, where

> more than half the citizens will have to vote on

> touch-screen systems in November. The President's

> brother, Governor Jeb Bush, and Jeb's Secretary of

> State, Glenda Hood, express unqualified confidence

> in the trustworthiness of the DRE systems and

> militantly oppose providing a paper-ballot trail for

> them. Hood has denied that the electronic voting

> machines can be tampered with in the software,

> saying: " The touch-screen machines are not

> computers. You'd have to go machine by machine, all

> over the state. " A spokeswoman for her says flatly

> that " a manual recount is unnecessary. "

>

> This past spring a powerful state senator proposed

> to make it illegal to recount votes in the DRE

> systems, but she backed down when called on it by

> activists. Then Ed Kast, director of Hood's division

> of elections, who has since resigned, sought to

> achieve the same purpose by diktat, issuing a formal

> ruling that, despite the extant state law requiring

> recounts under certain circumstances, supervisors of

> elections do not need to recount DRE ballots. The

> ACLU and other groups have sued to invalidate that

> ruling; a spokesperson for the state Republican

> Party excoriates the suit as a left-wingers' " ploy

> to undermine voters' confidence. "

>

> Representative Robert Wexler, a Democrat from the

> southern tier of the three big counties on the

> Atlantic, which for election scandals is to Florida

> what Cook County is to Illinois, sued state and

> county election officials in state and federal court

> to require the VVPAT on DREs. He argues that

> allowing some voters to have manual recounts but not

> others violates the Supreme Court decision in Bush

> v. Gore compelling equal treatment of voters

> (although the majority specified it was only for

> that election). To date his suits, opposed at every

> step by the Bush Administration in Tallahassee, have

> gotten nowhere. If he loses, half the voters in

> Florida, those voting on DREs, will be denied the

> manual recounts that the other half can have.

>

> The Bush forces in Florida geared up for another

> purge of released felons from the voter rolls. Ion

> Sancho, supervisor of elections for Leon County,

> admits with shame that the state's felon purge in

> 2000 resulted in more than 50,000 legal voters being

> disenfranchised. The state elections division

> identified 47,000 more suspected felons, a list

> disproportionately heavy with blacks, and asked that

> local election supervisors purge them. The Bush

> people refused to make the list public, but were

> ordered to do so by a judge. Only then was it

> discovered that the list excluded felons who are

> Hispanic. In Florida Hispanics tend to vote

> Republican. This dandy error was " absolutely

> unintentional, " the Bush people said--while

> abandoning the then indefensible list. Miami Herald

> columnist Jim Defede wrote that Hood--an " amazing

> incompetent or the leader of a frightening

> conspiracy " --must resign.

>

> " What are we going to do if there's a close race? "

> Wexler asked in the Orlando Sentinel. " The voting

> records of these machines will have disappeared in

> cyberspace. " He told me angrily: " Apparently their

> motives are to suppress the vote in Florida in a

> number of different ways. They are refusing a paper

> trail on a computerized voting machine. They are

> again preparing on the felons--they've got a new and

> improved process. I don't trust 'em to do the right

> thing. " This summer, Representative Alcee Hastings,

> whose district includes Fort Lauderdale and West

> Palm Beach, exclaimed, " Any way we cut it, these

> people are going to try to steal this election. "

>

> The Miami-Dade Reform Coalition asked Jeb Bush to

> audit the touch-screen machines this summer. Bush's

> spokesperson rebuffed that as " an accusation du

> jour. " Undeterred, Democratic US Senator Bill Nelson

> of Florida demanded, " Why not do an audit when so

> much is at stake?... The national election for

> President could ride on the results coming out of

> Florida. " Senator Nelson even sent a letter to

> Attorney General John Ashcroft asking that the

> federal government audit the machines.

>

> This past spring in California, Diebold systems

> malfunctioned in two counties, disenfranchising

> thousands of voters. Secretary of State Kevin

> Shelley discovered that the voting systems in

> seventeen counties in the state had not been

> certified, as required by law. After two days of

> tumultuous hearings in Sacramento, during which

> high-level election officials called the company's

> behavior " despicable " and accused its officials of

> lying, Shelley prohibited the use of Diebold's

> systems in four counties, the first time this has

> happened in the United States. Shelley, who has said

> to the Los Angeles Times that he doesn't want to be

> " the Katherine Harris of the West Coast, " also made

> the certification of voting systems in ten more

> counties dependent on their adoption of twenty-three

> security improvements that he specified. One of

> these requires those counties to let citizens vote

> on paper if they want to, but Shelley flinched at

> requiring a DRE paper trail this year. Four counties

> and advocates of the disabled sued Shelley to block

> his actions, but a federal judge ruled he had the

> authority and had used it reasonably.

>

> Two secretaries of state, Republicans Dean Heller

> in Nevada and Matt Blunt in Missouri, have required

> that DREs in their states have a voter-verified

> paper ballot for the November election. Sequoia is

> producing the Mercuri VVPAT on demand for Nevada,

> and several small election companies, including

> Avante and AccuPoll, have built Mercuri attachments,

> won their certification and are ready to sell them

> to local jurisdictions now. Among the thirty-one

> other states with DRE voting systems in some of

> their jurisdictions, as of early summer legislatures

> in five had rejected requiring the paper trail,

> another nine were considering such a requirement and

> seventeen had no such proposal before them.

>

> In swing-state Ohio, under procedures approved by

> Republican Secretary of State Kenneth Blackwell,

> thirty-one counties decided they would not use

> paperless DREs in November, and three said they

> would. Blackwell then ruled that because of unsolved

> security problems, none of them will. In Maryland,

> which imposed Diebold DREs statewide in 2002, the

> Board of Elections ruled that paper ballots cast in

> the March primary by citizens who did not want to

> vote on the DREs would not be counted. That's now in

> the courts. The Campaign for Verifiable Voting

> presented 13,000 signatures for a paper trail and

> called for the resignation of the state elections

> chief, Linda Lamone, who, sitting tight, said, " I

> think everything is going to be just fine. " In

> Texas, Representative Ciro Rodriguez, chair of the

> Congressional Hispanic Caucus, was renominated by

> 150 votes until 419 " found votes " made challenger

> Henry Cuellar the winner. Rodriguez is contesting

> the outcome, but since the voting in Bexar County

> (San Antonio) was conducted on DREs, the votes there

> can't be recounted. " There's no paper trail to

> verify what was put in, " Cuellar said.

>

> A paper trail will not assure that elections won't

> be stolen in the DREs. " The only thing the VVPAT

> will do is give us the ability to prove that it

> happened, " says Roxanne Jekot of Cumming, Georgia, a

> self-taught computer specialist who has become one

> of the most effective activists against paperless

> computerized voting. " There is nothing to deter that

> single outsourced information-technology worker

> [from manipulating the machine]. Nobody can prove

> that he did it. "

>

> Many states require recounts if an outcome in a

> computer-counted race is within a margin of less

> than 1 percent or a half or quarter percent, but

> that invites crooked programmers, if any such be at

> work, to jimmy their rigged outcomes to fall outside

> the recount-triggering spreads.

>

> Furthermore, a paper trail isn't an audit unless

> the ballots are recounted. Even before the advent of

> touch-screen systems, obtaining actual recounts of

> elections was becoming more difficult. Election

> officials, election companies and state laws have

> often combined to block recounts or discourage

> narrowly losing candidates from getting them.

> Incredibly, in 2002 the legislature in Nebraska, the

> home state of Election Systems & Software, outlawed

> recounts of the paper ballots in the ES & S

> optical-scan computerized ballot-counting systems

> that tally 85 percent or so of the votes in that

> state. Colorado requires that for elections

> conducted on DRE machines, recounts must be

> conducted on the very same machines.

>

> In Alabama two years ago, during a controversy

> over an election for governor conducted mostly on

> op-scan machines, Attorney General Bill Pryor,

> backing up the sheriff in one questioned county,

> ruled officially that under state law anyone

> recounting the ballots would be subject to arrest.

> This year President Bush, circumventing Senate

> hearings, elevated Pryor to the Eleventh Circuit

> Court of Appeals in a recess appointment.

>

> 'It's Really a Matter of Trust'

>

> Confident, friendly, but officious, Jesse Durazo,

> the registrar of voters of Santa Clara County in the

> heart of the Silicon Valley, is typical of hundreds

> of local election officials who berate " the

> academics. " This past spring, despite dire warnings

> from Professors Neumann of SRI and Dill of Stanford,

> Durazo led his county into buying 5,500 of the

> Sequoia AVC Edge DREs at $3,000 each ($20 million,

> figuring in everything). The anteroom of his county

> election headquarters is festooned with cheery signs

> such as one saying Voting Just Got Easier. He is

> delighted that DREs will facilitate voting by those

> who speak a foreign language (including Spanish,

> Vietnamese and Chinese).

>

> Durazo said that the AVC had first been approved

> by the federal government (which is not correct) and

> then certified by the California secretary of state.

> He said that providing a voter-verified ballot would

> open the way to " unlimited error, " while computer

> error, in contrast, can be " quantified. " As for

> Trojan horses smuggling in corrupt instructions, he

> said in a confident tone, " I don't have those

> fears. " Stealing votes in the computers is next to

> impossible, he insisted, because local ballots are

> set up at the last minute, there are a large number

> of races and ballot initiatives in any one election,

> and the order of the candidates' positions on the

> ballots is rotated in different precincts.

>

> The three sets of all the votes, kept in the

> computer, provide the recount, he said. Are those

> not just copies of each other, automatically made?

> Durazo exclaimed in high dudgeon: " It's a redundant

> perfection!... It starts with the premise that the

> information in the system is correct. "

>

> Alfred Gonzales, Durazo's Filipino outreach

> specialist for voters who speak Tagalog,

> demonstrated the AVC, a sign on the top of which

> said Try It Out Today. No More Punchcards! I voted

> on it and asked Gonzales how I knew for sure that my

> vote would be counted. " Because it will be

> registered in the machine, saved in the hard drive,

> and put on a cartridge, " he said. " At the end of the

> day it will be in the printout of the total. " How

> did he know the machine would do that? " Because it

> has been federally certified! " he said. " There is

> fool-proof security. " Well, one more thing, I asked.

> There's no ballot--what if you need a recount? " It's

> really a matter of trusting the machine, " Gonzales

> said. Patting the AVC gently, he intoned with pride,

> " It's really a matter of trust. "

>

> " These companies are basically saying 'trust us,' "

> Rebecca Mercuri told the New York Times. " Why should

> anybody trust them? That's not the way democracy is

> supposed to work. " Douglas Kellner, a leader on the

> New York City Board of Elections, exclaimed at a

> meeting of computer specialists in Berkeley this

> past spring, " I think the word 'trust' ought to be

> banned from election administration! " Dr. Avi Rubin,

> computer science professor and technical director of

> the Information Security Institute at Johns Hopkins

> University, recently testified before the federal

> Election Assistance Commission, " The vendors, and

> many election officials, such as those in Maryland

> and Georgia, continue to insist that the machines

> are perfectly secure. I cannot fathom the basis for

> their claims. I do not know of a single computer

> security expert who would testify that these

> machines are secure. "

>

> Mercuri wrote in her dissertation on vote-counting

> in 2001 that " security flaws (such as Trojan horse

> attacks)...are possible in all of the computer-based

> voting systems " and that providing thorough

> examinations of source code and other circuits for

> DREs that vary from municipality to municipality " is

> a Herculean task--one that is likely not to be

> affordable, even if it were accomplishable. "

>

> Not all the scientists agree. Michael Shamos of

> Carnegie-Mellon, who once warned that computerized

> vote-counting is highly vulnerable to fraud, now

> takes the position that " the issue is not whether

> voting systems are absolutely secure, but whether

> they present barriers sufficiently formidable to

> give us confidence in the integrity of our

> elections. "

>

> Voting Machines Stolen in Georgia

>

> In 2000 five out of six Georgians cast a paper

> ballot that could be recounted on ES & S systems. In

> January 2001, in a speech to the

> Democratic-controlled legislature, Georgia Secretary

> of State Cathy Cox, a Democrat who is expected to

> run for governor in 2006, declared that considering

> all the recent problems down in Florida, Georgia

> should adopt one " uniform electronic voting system

> by November 2004. " Upon Cox's fervent recommendation

> of the just-born Diebold Election Systems, in May

> 2002 Georgia agreed to pay Diebold $54 million for

> 19,000 DRE voting systems. The counties and cities

> of Georgia had chosen their own voting machines for

> the last time, and, less obviously, Georgians had

> lost their ability to recount their votes in

> contested elections.

>

> At once Diebold set to manufacturing 282 of its

> AccuVote TS voting systems a day. Some of the

> earliest ones arriving in Georgia, sent out for use

> in the training of election workers, were left in a

> hotel conference room overnight, stolen and never

> recovered. Late that June the secret vote-counting

> codes inside nine to fourteen more of the Diebold

> machines were stolen. Diebold made an uncounted

> number of apparently illegal changes in the

> election-conducting code between June and November.

> The memory cards on which the votes on each of the

> computers were recorded on election day all over

> Georgia had no encryption. According to Rob Behler,

> who served as Diebold's production deployment

> manager in Georgia during the first half of that

> summer, those cards could be used to change the

> results manually, precinct by precinct.

>

> Incumbent US Senator Max Cleland and incumbent

> Governor Roy Barnes, both Democrats, were odds-on

> favorites to win re-election. A week before the

> voting an Atlanta Journal-Constitution poll showed

> Cleland ahead by five points, 49-44, but on election

> day he lost to his Republican opponent, Saxby

> Chambliss, by seven points, 53-46, a twelve-point

> swing. The loss of Governor Barnes to Sonny Perdue

> was even more remarkable: a one-week switch of

> fourteen percentage points. These were suspicious

> anomalies, and subsequently in a Peach State Poll

> one in eight Georgia voters were " not very

> confident " or " not at all confident " that the DREs

> had produced accurate results; another 32 percent

> were only " somewhat confident. "

>

> In his front parlor at home in Georgia, Rob Behler

> told me that just before or just as he took over the

> Atlanta warehouse for Diebold, some of the voting

> machines had been sent out to " do demos, " and in one

> southern county " somebody broke in and stole...[nine

> or] fourteen of the machines and, I think, one of

> the servers. " He says the vote-counting programs in

> the stolen computers could have been completely

> reconstructed by reverse engineering and employed to

> jimmy the election.

>

> " Quality-checking " the AccuVote machines as they

> arrived from Diebold at a warehouse in Atlanta,

> Behler and his crew found problems, he says, with

> " every single one " of them and about a fifth of them

> were shoved aside as unusable. When Diebold's

> programmers wanted " patches, " that is, changes,

> inserted into the voting-system software, Behler

> says, they sent them to him via the company's open,

> insecure File Transfer Protocol (FTP) site in

> cyberspace. On his own unsecured laptop (resting on

> his desk as he spoke), Behler made twenty-two or

> twenty-three of the cards that were used to change

> the programs in the machines.

>

> The night of the November 2002 election,

> sixty-seven of the memory cards used in Fulton

> County (Atlanta) disappeared. Running his laptop

> with a dual battery, Behler says, in six or seven

> hours he could have changed the totals on those

> sixty-seven cards. " There's no technical problem.

> There was absolutely zero protection on the card

> itself. You throw the card in, you just drill down

> into its files. "

>

> Brit Williams, a computer consultant at Kennesaw

> State University who runs Georgia's testing of

> voting systems, confirmed to me that the memory

> cards were not encrypted and all had the same

> password (1111), but each one, he contended, was

> " unique to its machine. " He snapped, " We had 22,000

> voting stations. How would you like to be in charge

> of 22,000 passwords? " Williams said the sixty-seven

> missing memory cards in Atlanta had been left in the

> machines by forgetful workers and were recovered.

>

> The Georgia election of 2002 illustrates how

> serious risks of technical malfunctions and

> malicious tampering can occur without anyone outside

> the voting business finding out about them. No doubt

> in part because of the hasty start-up, Diebold's

> " security, " though approved by the independent

> testing authorities and the state, was in fact

> farcical. Both of the losing Democrats had backed

> installation of the DRE systems statewide, so they

> could hardly call for recounts that their own state

> party had made literally impossible.

>

> The Kids Prick Open a Scandal

>

> Some kids who are " really interested in computers "

> were playing around last year, spidering through the

> links on various websites, when they discovered that

> Diebold had an unsecured FTP site (the same one

> Behler had used). One of the boys noted the fact on

> his website. Some other material on that site--not

> the stuff about Diebold--attracted a lot of hits,

> and that automatically led Google, the cyberspace

> search engine, to position it among the early-listed

> sites for many searches. One day Bev Harris, a

> literary publicist in Washington who was doing

> research for a book on vote-counting in computers,

> fed Google the right search words and the FTP site

> itself popped up. Knowing little about computers,

> she turned to David Allen, who was publishing her

> book, and he recognized the openly posted source

> codes and much other data concerning Diebold voting

> machines.

>

> A small group of activists in Georgia worked with

> Harris. One of them, Roxanne Jekot, who runs a

> software consulting firm, analyzed " almost every

> line " of the Diebold source code and found many ways

> to change vote totals there and also in the

> Microsoft operating code. " The software is totally

> junk, " she says. " They sold vaporware. " Determined

> to get peer review of what she was finding, Jekot

> approached David Dill, the Stanford computer science

> professor.

>

> " Both Roxanne and Bev were very courageous and

> determined to lift the veil of secrecy on the code, "

> Dill says. " I think most academics would be much

> more cautious, especially about publishing the fact

> that they looked at the code. I certainly was, and I

> wasn't about to get other people in trouble by

> asking them to help me. A number of us would be

> inclined to talk to lawyers before doing anything

> too bold. So it made a huge difference that Bev

> posted the code in New Zealand for everyone to

> download. That reduced but didn't eliminate the

> legal risks of the Johns Hopkins/Rice University

> people looking at the code. If Bev and whoever else

> was involved in releasing this code had not been so

> brave, people [with strong professional reputations]

> might not have been able to speak out so freely. "

>

> After some agreements on a division of roles, Avi

> Rubin of Johns Hopkins and three other scientists

> produced a devastating twenty-three-page exposure of

> the Diebold software. That was followed by two more

> damaging technical studies in Ohio. Then a " Red

> Team " exercise to break the Diebold code was staged

> at RABA Technologies' headquarters in Maryland. Four

> of the eight computer scientists on the team had

> worked at the National Security Agency, and the team

> director had been the senior technical director for

> the NSA. The team concluded, " A voter can be

> deceived into thinking he is voting for one

> candidate when, in fact, the software is recording

> the vote for another candidate. " A security

> vulnerability " allows a remote attacker to get

> complete control of the machine. " And one can

> " automatically upload malicious software " that will

> " modify or delete elections. " Some kids sniffing

> around in cyberspace had led, step by step, to the

> dawning national realization that computerized

> vote-counting puts democracy in grave danger.

>

> What You Can Do

>

> Public interest groups are mobilizing to head off

> another Florida. Petitions calling for a paper trail

> for DREs have attracted something approaching half a

> million signatures. Lou Dobbs's quick poll on CNN on

> " paper receipts of electronic votes " was running

> 5,735 to 85 for them on July 20. Greg Palast and

> Martin Luther King III have more than 80,000

> signatures on their petition against paperless

> touch-screens and the purging of voter rolls. Global

> Exchange, the San Francisco-based organization, is

> inviting twenty-eight nonpartisan foreign observers

> to monitor the US election. Eleven members of

> Congress asked Kofi Annan to send UN monitors. Cindy

> Cohn of the Electronic Frontier Foundation is

> organizing attorneys for litigation against

> paperless electronic voting.

>

> In mid-June the California secretary of state

> approved the nation's first set of standards for a

> verified paper trail for touch-screen machines. A

> recent " Voting, Vote Capture and Vote Counting "

> symposium at Harvard's Kennedy School of Government

> has produced an " Annotated Best Practices, "

> available at www.ljean.comABPractices.pdf. On

> June 29 the Leadership Conference on Civil Rights

> and the Brennan Center for Justice, with the

> endorsement of Common Cause, the NAACP, People for

> the American Way and most of the leading scientific

> critics of paperless touch-screen voting, sent the

> nation's local election officials a " call for new

> security measures for electronic voting machines, "

> including local retention of independent security

> experts; the full report is available at

>

www.civilrights.org/issues/voting/lccr_brennan_report.pdf.

>

>

> Douglas Kellner, the New York City election

> expert, believes the best practical remedy for the

> dangers of computerized vote-counting is voting on

> optical-scan systems, posting the election results

> in the precincts and keeping the ballots with the

> machines in which they were counted. In all

> computerized vote-counting situations the precinct

> results should be publicly distributed and posted in

> the precincts before they are transmitted to the

> center for final counting, Kellner says. Once they

> are sent from the precinct the audit trail is lost.

>

> Citizens can stay current on election developments

> via several websites: electionline.org, a reliable

> and up-to-date source; VerifiedVoting.org, Dill's

> group; notablesoftware.com, Mercuri's site;

> blackboxvoting.org, Bev Harris's site;

> countthevote.org, the site of the Georgia group led

> by Jekot; and these will key into many others. For a

> steady flow of news stories on this subject (and a

> few others) from around the country, get on the

> e-mail list of resist. Official information

> concerning each state is available online at each

> state's website for its secretary of state.

>

> People should go down to their local election

> departments and ask their supervisor of elections

> how they are going to know that their votes are

> counted--and refuse to take " Trust us, " or " Trust

> the machines, " for an answer. They can be poll

> watchers. Many organizations are fostering poll

> watching, including People for the American Way's

> Election Protection 2004 project. Common Cause " has

> made election monitoring a major project, " a

> spokesperson says. VerifiedVoting.org is

> concentrating on having people watch election

> technology, including pre-election testing as well

> as the procedures on election day. Bev Harris is

> organizing people to do such work (see her website).

>

>

> Rebecca Mercuri says that if you believe an

> election has been corrupted through voting

> equipment, you should collect affidavits from

> voters; get the results from every voting machine

> for all precincts; get the names and titles of

> everyone involved; inventory the equipment,

> including the software, and try to have it

> impounded; demand a recount; and go to the press.

> Noting that all counties that have rushed to

> purchase DRE voting systems also have paper-ballot

> systems in place to handle absentee voters,

> motor-voters and emergency ballots for when the

> system breaks down, she suggests mothballing the

> DREs and using paper ballots. " Counties are saying

> there's nothing they can do but use the DREs in

> November, and that is simply untrue, " Mercuri

> declares.

>

> Much of this would be unnecessary if Congress

> enacted either the Graham-Clinton or the Holt bill,

> which would empower voters to verify their own votes

> and create a paper trail.

>

> The computerized voting companies have

> precipitated a crisis for the integrity of

> democracy. Three months to go.

>

Link to comment
Share on other sites

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...