How They Could Steal the Election This Time

How They Could Steal the Election This Time

How They Could Steal the Election This Time

Electronic counts, unaudited touch-screen ballots, enhance opportunities for fraud.

Facebook
Twitter
Email
Flipboard
Pocket

On November 2 millions of Americans will cast their votes for President in computerized voting systems that can be rigged by corporate or local-election insiders. Some 98 million citizens, five out of every six of the roughly 115 million who will go to the polls, will consign their votes into computers that unidentified computer programmers, working in the main for four private corporations and the officials of 10,500 election jurisdictions, could program to invisibly falsify the outcomes.

The result could be the failure of an American presidential election and its collapse into suspicions, accusations and a civic fury that will make Florida 2000 seem like a family spat in the kitchen. Robert Reich, Bill Clinton’s Labor Secretary, has written, “Automated voting machines will be easily rigged, with no paper trails to document abuses.” Senator John Kerry told Florida Democrats last March, “I don’t think we ought to have any vote cast in America that cannot be traced and properly recounted.” Pointing out in a recent speech at the NAACP convention that “a million African-Americans were disenfranchised in the last election,” Kerry says his campaign is readying 2,000 lawyers to “challenge any place in America where you cannot trace the vote and count the votes” [see Greg Palast, “Vanishing Votes,” May 17].

The potential for fraud and error is daunting. About 61 million of the votes in November, more than half the total, will be counted in the computers of one company, the privately held Election Systems and Software (ES&S) of Omaha, Nebraska. Altogether, nearly 100 million votes will be counted in computers provided and programmed by ES&S and three other private corporations: British-owned Sequoia Voting Systems of Oakland, California, whose touch-screen voting equipment was rejected as insecure against fraud by New York City in the 1990s; the Republican-identified company Diebold Election Systems of McKinney, Texas, whose machines malfunctioned this year in a California election; and Hart InterCivic of Austin, one of whose principal investors is Tom Hicks, who helped make George W. Bush a millionaire.

About a third of the votes, 36 million, will be tabulated completely inside the new paperless, direct-recording-electronic (DRE) voting systems, on which you vote directly on a touch-screen. Unlike receipted transactions at the neighborhood ATM, however, you get no paper record of your vote. Since, as a government expert says, “the ballot is embedded in the voting equipment,” there is no voter-marked paper ballot to be counted or recounted. Voting on the DRE, you never know, despite what the touch-screen says, whether the computer is counting your vote as you think you are casting it or, either by error or fraud, it is giving it to another candidate. No one can tell what a computer does inside itself by looking at it; an election official “can’t watch the bits inside,” says Dr. Peter Neumann, the principal scientist at the Computer Science Laboratory of SRI International and a world authority on computer-based risks.

The four major election corporations count votes with voting-system source codes. These are kept strictly secret by contract with the local jurisdictions and states using the machines. That secrecy makes it next to impossible for a candidate to examine the source code used to tabulate his or her own contest. In computer jargon a “trapdoor” is an opening in the code through which the program can be corrupted. David Stutsman, an Indiana lawyer whose suits in the 1980s exposed a trapdoor that was being used by the nation’s largest election company at that time, puts it well: “The secrecy of the ballot has been turned into the secrecy of the vote count.”

According to Dr. David Dill, professor of computer science at Stanford, all elections conducted on DREs “are open to question.” Challenging those who belittle the danger of fraud, Dill says that with trillions of dollars at stake in the battle for control of Congress and the presidency, potential attackers who might seek to fix elections include “hackers, candidates, zealots, foreign governments and criminal organizations,” and “local officials can’t stop it.”

Last fall during a public talk on “The Voting Machine War” for advanced computer-science students at Stanford, Dill asked, “Why am I always being asked to prove these systems aren’t secure? The burden of proof ought to be on the vendor. You ask about the hardware. ‘Secret.’ The software? ‘Secret.’ What’s the cryptography? ‘Can’t tell you because that’ll compromise the secrecy of the machines.’… Federal testing procedures? ‘Secret’! Results of the tests? ‘Secret’! Basically we are required to have blind faith.”

The integrity of the vote-counting inside DREs depends on audit logs and reports they print out, but as Neumann says, these are “not real audit trails” because they are themselves riggable. The DREs randomly store three to seven complete sets of alleged duplicates of each voter’s ballot, and sets of these images can be printed out after the election and manually counted. The companies claim that satisfies the requirement in the 2002 Help America Vote Act (HAVA) that “a manual audit capacity” must be available. But as informed computer scientists unanimously agree, if the first set of ballot images is corrupted, they all are. I asked Robert Boram, the chief engineer who invented a DRE sold by the RF Shoup voting-systems company, if he could rig his DRE’s three sets of ballot images. “Give me a month,” he replied.

The United States therefore faces the likelihood that about three out of ten of the votes in the national election this November will be unverifiable, unauditable and unrecountable. The private election companies and local and state election officials, when required to carry out recounts of elections conducted inside the DREs, will order the computers to spit out second printouts of the vote totals and the computers’ wholly electronic, fakable “audit trail.” The companies and most of the election officials will then tell the voters that the second printouts are “recounts” that prove the vote-counting was “100 percent accurate,” even though a second printout is not a recount.

HAVA was supposed to solve election problems revealed in 2000; instead, it has made the situation worse. Under the act the Election Assistance Commission (EAC), appointed by President Bush, is supposed to set standards for the vote-counting process, but four months before the election the new agency had only seven full-time staff members. On June 17 the EAC sent $861 million to twenty-five states, mainly to buy computerized machines for which no new technical standards have been set. Its just-appointed fifteen-member technical standards committee does not include more than one leading critic of computerized vote-counting.

Rather than completely testing the vote-counting codes, there is some secretive testing of systems by three private companies that are chosen by the pro-voting-business National Association of State Election Directors. The companies consult obsolete pro-company and completely voluntary standards promulgated by the Federal Election Commission and get paid by the very companies whose equipment is being tested. The three private companies, speciously called Independent Testing Authorities, together constitute a Potemkin village to falsely assure the states and the voters of the security of the systems. Often their work is misrepresented as “federal testing.” The states then test and “certify” the systems, and the local jurisdictions put on dog-and-pony-show “logic and accuracy tests,” which are not capable of discovering hidden codes that would change vote totals.

“The system is much more out of control than anyone here may be willing to admit,” Dr. Michael Shamos, a computer scientist at Carnegie-Mellon University and for many years an examiner of voting machines for Texas and Pennsylvania, told a House panel on June 24. “There’s virtually no control over how software enters a voting machine.” Shamos told another House panel on July 20, “There are no adequate standards for voting machines, nor any effective testing protocols.”

Hackable computer codes control vote-counting in all three kinds of computerized systems that will be used again in the 2004 elections: the ballotless DREs, on which some 36 million will vote; optical-scan systems that electronically tally paper ballots marked by the voters, on which 40 million people will vote; and punch-card ballots, also tabulated by computerized card-readers, which gained notoriety in 2000 and are still used by 22 million voters. (Another 16 million still vote on the old lever machines, about a million on hand-counted paper ballots.)

Florida 2000 was universally misunderstood and mischaracterized in the press as a crisis of hanging chads on the punch-card ballots. The serious issue, then as now, was embodied in the explicit though all but unreported position that James Baker, George W. Bush’s field commander in Florida, staked out to stop the recounting of votes. The computerized vote-counting systems, Baker declared, are “precision machinery” that both count and recount votes more accurately than people do. Now, with Senator Kerry demanding recountability, an ominously intensifying partisan split has developed in Washington over whether to have a voter-verified paper trail and, when necessary, to conduct recounts with it.

Torment in Washington

Though no broad citizens’ movement has formed against computerized vote-counting, a nationwide backlash against unverifiable paperless voting has. The paper ballots used in the op-scan and punch-card systems already provide a voter-verified paper audit trail (VVPAT). The principal proposed security safeguard for the DRE system was invented, but not patented, ten years ago by computer scientist Rebecca Mercuri, now a research fellow at Harvard. In her solution, after voters record their choices on the touch-screen, they confirm them on a paper ballot that appears under glass and then push a button to cast the vote, causing the machine to deposit the paper ballot in a box that will hold it for recounting if that is ordered. The printer for the paper ballots for each voting machine should cost about $50; the total add-on could be $300-$600. Many jurisdictions also have the alternative of expanding or acquiring the relatively inexpensive optical-scan systems or other systems already in place that create paper trails.

In the US Senate seven Democrats and the one Independent are co-sponsoring a bill by Senators Bob Graham and Hillary Clinton to require paper trails on DREs by November, with a loophole for jurisdictions whose officials deem it to be technologically impossible. Clinton told the press that without a voter-verified paper trail GOP-leaning corporations might program voting machines to help Republicans steal elections [see sidebar, page 16]. In an interview in his hideaway office in the Capitol, Graham told me that he regards his and Clinton’s bill as so obviously needed that it’s “a no-brainer.” The absence of a paper trail on the DREs could endanger “the legitimacy” of November’s election, Graham said.

New Jersey Democrat Rush Holt introduced a House bill more than a year ago requiring a paper trail on DREs. It has 149 co-sponsors, including a few prominent Republicans. Holt says, “The verification has to be something that the voter herself or himself has to do”; without that, “we will never have a truly secure election.” Holt’s bill has opened up a partisan divide in the House. The chairman of the committee to which his bill is assigned, Ohio Republican Bob Ney, informed Holt that he is against the bill and would not allow a hearing on it. A few days later Graham and Holt wrote their fellow members of Congress that “without an independent, voter-verified paper trail, we will be able only to guess whether votes are accurately counted.” Last month Ney relented and scheduled two hearings. Holt plans to offer his bill as an amendment to the Treasury appropriation after Congress returns from its August recess. Graham is still mulling his strategy.

The principal stated objection to a DRE paper trail comes from some spokespersons for the disabled, who characterize it as a step back from the touch-screen’s improved accessibility and privacy. Many election officials, whose work paper ballots make both auditable and much more extensive, object variously that the attachment will add costs, that the printers might fail and that paper ballots can be stolen or counterfeited and sometimes produce somewhat different totals.

Leading citizen organizations have been split. Initially the League of Women Voters, concerned to minimize invalidly cast ballots, opposed the paper trail, but there was a revolt in the chapters and a petition for the paper trail was signed by 800 members. At the league’s June convention, after a fight led by Barbara Simons, past president of the Association of Computer Machinery, the league switched sides, endorsing voting systems that are “recountable.” Common Cause, placing the highest value on insuring that every vote is counted and can be recounted if necessary, has been among the leaders of the fight for the paper trail.

Around the States

Not surprisingly, the starkest resistance to the voter-verified paper trail comes from Florida, where more than half the citizens will have to vote on touch-screen systems in November. The President’s brother, Governor Jeb Bush, and Jeb’s Secretary of State, Glenda Hood, express unqualified confidence in the trustworthiness of the DRE systems and militantly oppose providing a paper-ballot trail for them. Hood has denied that the electronic voting machines can be tampered with in the software, saying: “The touch-screen machines are not computers. You’d have to go machine by machine, all over the state.” A spokeswoman for her says flatly that “a manual recount is unnecessary.”

This past spring a powerful state senator proposed to make it illegal to recount votes in the DRE systems, but she backed down when called on it by activists. Then Ed Kast, director of Hood’s division of elections, who has since resigned, sought to achieve the same purpose by diktat, issuing a formal ruling that, despite the extant state law requiring recounts under certain circumstances, supervisors of elections do not need to recount DRE ballots. The ACLU and other groups have sued to invalidate that ruling; a spokesperson for the state Republican Party excoriates the suit as a left-wingers’ “ploy to undermine voters’ confidence.”

Representative Robert Wexler, a Democrat from the southern tier of the three big counties on the Atlantic, which for election scandals is to Florida what Cook County is to Illinois, sued state and county election officials in state and federal court to require the VVPAT on DREs. He argues that allowing some voters to have manual recounts but not others violates the Supreme Court decision in Bush v. Gore compelling equal treatment of voters (although the majority specified it was only for that election). To date his suits, opposed at every step by the Bush Administration in Tallahassee, have gotten nowhere. If he loses, half the voters in Florida, those voting on DREs, will be denied the manual recounts that the other half can have.

The Bush forces in Florida geared up for another purge of released felons from the voter rolls. Ion Sancho, supervisor of elections for Leon County, admits with shame that the state’s felon purge in 2000 resulted in more than 50,000 legal voters being disenfranchised. The state elections division identified 47,000 more suspected felons, a list disproportionately heavy with blacks, and asked that local election supervisors purge them. The Bush people refused to make the list public, but were ordered to do so by a judge. Only then was it discovered that the list excluded felons who are Hispanic. In Florida Hispanics tend to vote Republican. This dandy error was “absolutely unintentional,” the Bush people said–while abandoning the then indefensible list. Miami Herald columnist Jim Defede wrote that Hood–an “amazing incompetent or the leader of a frightening conspiracy”–must resign.

“What are we going to do if there’s a close race?” Wexler asked in the Orlando Sentinel. “The voting records of these machines will have disappeared in cyberspace.” He told me angrily: “Apparently their motives are to suppress the vote in Florida in a number of different ways. They are refusing a paper trail on a computerized voting machine. They are again preparing on the felons–they’ve got a new and improved process. I don’t trust ’em to do the right thing.” This summer, Representative Alcee Hastings, whose district includes Fort Lauderdale and West Palm Beach, exclaimed, “Any way we cut it, these people are going to try to steal this election.”

The Miami-Dade Reform Coalition asked Jeb Bush to audit the touch-screen machines this summer. Bush’s spokesperson rebuffed that as “an accusation du jour.” Undeterred, Democratic US Senator Bill Nelson of Florida demanded, “Why not do an audit when so much is at stake?… The national election for President could ride on the results coming out of Florida.” Senator Nelson even sent a letter to Attorney General John Ashcroft asking that the federal government audit the machines.

This past spring in California, Diebold systems malfunctioned in two counties, disenfranchising thousands of voters. Secretary of State Kevin Shelley discovered that the voting systems in seventeen counties in the state had not been certified, as required by law. After two days of tumultuous hearings in Sacramento, during which high-level election officials called the company’s behavior “despicable” and accused its officials of lying, Shelley prohibited the use of Diebold’s systems in four counties, the first time this has happened in the United States. Shelley, who has said to the Los Angeles Times that he doesn’t want to be “the Katherine Harris of the West Coast,” also made the certification of voting systems in ten more counties dependent on their adoption of twenty-three security improvements that he specified. One of these requires those counties to let citizens vote on paper if they want to, but Shelley flinched at requiring a DRE paper trail this year. Four counties and advocates of the disabled sued Shelley to block his actions, but a federal judge ruled he had the authority and had used it reasonably.

Two secretaries of state, Republicans Dean Heller in Nevada and Matt Blunt in Missouri, have required that DREs in their states have a voter-verified paper ballot for the November election. Sequoia is producing the Mercuri VVPAT on demand for Nevada, and several small election companies, including Avante and AccuPoll, have built Mercuri attachments, won their certification and are ready to sell them to local jurisdictions now. Among the thirty-one other states with DRE voting systems in some of their jurisdictions, as of early summer legislatures in five had rejected requiring the paper trail, another nine were considering such a requirement and seventeen had no such proposal before them.

In swing-state Ohio, under procedures approved by Republican Secretary of State Kenneth Blackwell, thirty-one counties decided they would not use paperless DREs in November, and three said they would. Blackwell then ruled that because of unsolved security problems, none of them will. In Maryland, which imposed Diebold DREs statewide in 2002, the Board of Elections ruled that paper ballots cast in the March primary by citizens who did not want to vote on the DREs would not be counted. That’s now in the courts. The Campaign for Verifiable Voting presented 13,000 signatures for a paper trail and called for the resignation of the state elections chief, Linda Lamone, who, sitting tight, said, “I think everything is going to be just fine.” In Texas, Representative Ciro Rodriguez, chair of the Congressional Hispanic Caucus, was renominated by 150 votes until 419 “found votes” made challenger Henry Cuellar the winner. Rodriguez is contesting the outcome, but since the voting in Bexar County (San Antonio) was conducted on DREs, the votes there can’t be recounted. “There’s no paper trail to verify what was put in,” Cuellar said.

A paper trail will not assure that elections won’t be stolen in the DREs. “The only thing the VVPAT will do is give us the ability to prove that it happened,” says Roxanne Jekot of Cumming, Georgia, a self-taught computer specialist who has become one of the most effective activists against paperless computerized voting. “There is nothing to deter that single outsourced information-technology worker [from manipulating the machine]. Nobody can prove that he did it.”

Many states require recounts if an outcome in a computer-counted race is within a margin of less than 1 percent or a half or quarter percent, but that invites crooked programmers, if any such be at work, to jimmy their rigged outcomes to fall outside the recount-triggering spreads.

Furthermore, a paper trail isn’t an audit unless the ballots are recounted. Even before the advent of touch-screen systems, obtaining actual recounts of elections was becoming more difficult. Election officials, election companies and state laws have often combined to block recounts or discourage narrowly losing candidates from getting them. Incredibly, in 2002 the legislature in Nebraska, the home state of Election Systems & Software, outlawed recounts of the paper ballots in the ES&S optical-scan computerized ballot-counting systems that tally 85 percent or so of the votes in that state. Colorado requires that for elections conducted on DRE machines, recounts must be conducted on the very same machines.

In Alabama two years ago, during a controversy over an election for governor conducted mostly on op-scan machines, Attorney General Bill Pryor, backing up the sheriff in one questioned county, ruled officially that under state law anyone recounting the ballots would be subject to arrest. This year President Bush, circumventing Senate hearings, elevated Pryor to the Eleventh Circuit Court of Appeals in a recess appointment.

‘It’s Really a Matter of Trust’

Confident, friendly, but officious, Jesse Durazo, the registrar of voters of Santa Clara County in the heart of the Silicon Valley, is typical of hundreds of local election officials who berate “the academics.” This past spring, despite dire warnings from Professors Neumann of SRI and Dill of Stanford, Durazo led his county into buying 5,500 of the Sequoia AVC Edge DREs at $3,000 each ($20 million, figuring in everything). The anteroom of his county election headquarters is festooned with cheery signs such as one saying Voting Just Got Easier. He is delighted that DREs will facilitate voting by those who speak a foreign language (including Spanish, Vietnamese and Chinese).

Durazo said that the AVC had first been approved by the federal government (which is not correct) and then certified by the California secretary of state. He said that providing a voter-verified ballot would open the way to “unlimited error,” while computer error, in contrast, can be “quantified.” As for Trojan horses smuggling in corrupt instructions, he said in a confident tone, “I don’t have those fears.” Stealing votes in the computers is next to impossible, he insisted, because local ballots are set up at the last minute, there are a large number of races and ballot initiatives in any one election, and the order of the candidates’ positions on the ballots is rotated in different precincts.

The three sets of all the votes, kept in the computer, provide the recount, he said. Are those not just copies of each other, automatically made? Durazo exclaimed in high dudgeon: “It’s a redundant perfection!… It starts with the premise that the information in the system is correct.”

Alfred Gonzales, Durazo’s Filipino outreach specialist for voters who speak Tagalog, demonstrated the AVC, a sign on the top of which said Try It Out Today. No More Punchcards! I voted on it and asked Gonzales how I knew for sure that my vote would be counted. “Because it will be registered in the machine, saved in the hard drive, and put on a cartridge,” he said. “At the end of the day it will be in the printout of the total.” How did he know the machine would do that? “Because it has been federally certified!” he said. “There is fool-proof security.” Well, one more thing, I asked. There’s no ballot–what if you need a recount? “It’s really a matter of trusting the machine,” Gonzales said. Patting the AVC gently, he intoned with pride, “It’s really a matter of trust.”

“These companies are basically saying ‘trust us,'” Rebecca Mercuri told the New York Times. “Why should anybody trust them? That’s not the way democracy is supposed to work.” Douglas Kellner, a leader on the New York City Board of Elections, exclaimed at a meeting of computer specialists in Berkeley this past spring, “I think the word ‘trust’ ought to be banned from election administration!” Dr. Avi Rubin, computer science professor and technical director of the Information Security Institute at Johns Hopkins University, recently testified before the federal Election Assistance Commission, “The vendors, and many election officials, such as those in Maryland and Georgia, continue to insist that the machines are perfectly secure. I cannot fathom the basis for their claims. I do not know of a single computer security expert who would testify that these machines are secure.”

Mercuri wrote in her dissertation on vote-counting in 2001 that “security flaws (such as Trojan horse attacks)…are possible in all of the computer-based voting systems” and that providing thorough examinations of source code and other circuits for DREs that vary from municipality to municipality “is a Herculean task–one that is likely not to be affordable, even if it were accomplishable.”

Not all the scientists agree. Michael Shamos of Carnegie-Mellon, who once warned that computerized vote-counting is highly vulnerable to fraud, now takes the position that “the issue is not whether voting systems are absolutely secure, but whether they present barriers sufficiently formidable to give us confidence in the integrity of our elections.”

Voting Machines Stolen in Georgia

In 2000 five out of six Georgians cast a paper ballot that could be recounted on ES&S systems. In January 2001, in a speech to the Democratic-controlled legislature, Georgia Secretary of State Cathy Cox, a Democrat who is expected to run for governor in 2006, declared that considering all the recent problems down in Florida, Georgia should adopt one “uniform electronic voting system by November 2004.” Upon Cox’s fervent recommendation of the just-born Diebold Election Systems, in May 2002 Georgia agreed to pay Diebold $54 million for 19,000 DRE voting systems. The counties and cities of Georgia had chosen their own voting machines for the last time, and, less obviously, Georgians had lost their ability to recount their votes in contested elections.

At once Diebold set to manufacturing 282 of its AccuVote TS voting systems a day. Some of the earliest ones arriving in Georgia, sent out for use in the training of election workers, were left in a hotel conference room overnight, stolen and never recovered. Late that June the secret vote-counting codes inside nine to fourteen more of the Diebold machines were stolen. Diebold made an uncounted number of apparently illegal changes in the election-conducting code between June and November. The memory cards on which the votes on each of the computers were recorded on election day all over Georgia had no encryption. According to Rob Behler, who served as Diebold’s production deployment manager in Georgia during the first half of that summer, those cards could be used to change the results manually, precinct by precinct.

Incumbent US Senator Max Cleland and incumbent Governor Roy Barnes, both Democrats, were odds-on favorites to win re-election. A week before the voting an Atlanta Journal-Constitution poll showed Cleland ahead by five points, 49-44, but on election day he lost to his Republican opponent, Saxby Chambliss, by seven points, 53-46, a twelve-point swing. The loss of Governor Barnes to Sonny Perdue was even more remarkable: a one-week switch of fourteen percentage points. These were suspicious anomalies, and subsequently in a Peach State Poll one in eight Georgia voters were “not very confident” or “not at all confident” that the DREs had produced accurate results; another 32 percent were only “somewhat confident.”

In his front parlor at home in Georgia, Rob Behler told me that just before or just as he took over the Atlanta warehouse for Diebold, some of the voting machines had been sent out to “do demos,” and in one southern county “somebody broke in and stole…[nine or] fourteen of the machines and, I think, one of the servers.” He says the vote-counting programs in the stolen computers could have been completely reconstructed by reverse engineering and employed to jimmy the election.

“Quality-checking” the AccuVote machines as they arrived from Diebold at a warehouse in Atlanta, Behler and his crew found problems, he says, with “every single one” of them and about a fifth of them were shoved aside as unusable. When Diebold’s programmers wanted “patches,” that is, changes, inserted into the voting-system software, Behler says, they sent them to him via the company’s open, insecure File Transfer Protocol (FTP) site in cyberspace. On his own unsecured laptop (resting on his desk as he spoke), Behler made twenty-two or twenty-three of the cards that were used to change the programs in the machines.

The night of the November 2002 election, sixty-seven of the memory cards used in Fulton County (Atlanta) disappeared. Running his laptop with a dual battery, Behler says, in six or seven hours he could have changed the totals on those sixty-seven cards. “There’s no technical problem. There was absolutely zero protection on the card itself. You throw the card in, you just drill down into its files.”

Brit Williams, a computer consultant at Kennesaw State University who runs Georgia’s testing of voting systems, confirmed to me that the memory cards were not encrypted and all had the same password (1111), but each one, he contended, was “unique to its machine.” He snapped, “We had 22,000 voting stations. How would you like to be in charge of 22,000 passwords?” Williams said the sixty-seven missing memory cards in Atlanta had been left in the machines by forgetful workers and were recovered.

The Georgia election of 2002 illustrates how serious risks of technical malfunctions and malicious tampering can occur without anyone outside the voting business finding out about them. No doubt in part because of the hasty start-up, Diebold’s “security,” though approved by the independent testing authorities and the state, was in fact farcical. Both of the losing Democrats had backed installation of the DRE systems statewide, so they could hardly call for recounts that their own state party had made literally impossible.

The Kids Prick Open a Scandal

Some kids who are “really interested in computers” were playing around last year, spidering through the links on various websites, when they discovered that Diebold had an unsecured FTP site (the same one Behler had used). One of the boys noted the fact on his website. Some other material on that site–not the stuff about Diebold–attracted a lot of hits, and that automatically led Google, the cyberspace search engine, to position it among the early-listed sites for many searches. One day Bev Harris, a literary publicist in Washington who was doing research for a book on vote-counting in computers, fed Google the right search words and the FTP site itself popped up. Knowing little about computers, she turned to David Allen, who was publishing her book, and he recognized the openly posted source codes and much other data concerning Diebold voting machines.

A small group of activists in Georgia worked with Harris. One of them, Roxanne Jekot, who runs a software consulting firm, analyzed “almost every line” of the Diebold source code and found many ways to change vote totals there and also in the Microsoft operating code. “The software is totally junk,” she says. “They sold vaporware.” Determined to get peer review of what she was finding, Jekot approached David Dill, the Stanford computer science professor.

“Both Roxanne and Bev were very courageous and determined to lift the veil of secrecy on the code,” Dill says. “I think most academics would be much more cautious, especially about publishing the fact that they looked at the code. I certainly was, and I wasn’t about to get other people in trouble by asking them to help me. A number of us would be inclined to talk to lawyers before doing anything too bold. So it made a huge difference that Bev posted the code in New Zealand for everyone to download. That reduced but didn’t eliminate the legal risks of the Johns Hopkins/Rice University people looking at the code. If Bev and whoever else was involved in releasing this code had not been so brave, people [with strong professional reputations] might not have been able to speak out so freely.”

After some agreements on a division of roles, Avi Rubin of Johns Hopkins and three other scientists produced a devastating twenty-three-page exposure of the Diebold software. That was followed by two more damaging technical studies in Ohio. Then a “Red Team” exercise to break the Diebold code was staged at RABA Technologies’ headquarters in Maryland. Four of the eight computer scientists on the team had worked at the National Security Agency, and the team director had been the senior technical director for the NSA. The team concluded, “A voter can be deceived into thinking he is voting for one candidate when, in fact, the software is recording the vote for another candidate.” A security vulnerability “allows a remote attacker to get complete control of the machine.” And one can “automatically upload malicious software” that will “modify or delete elections.” Some kids sniffing around in cyberspace had led, step by step, to the dawning national realization that computerized vote-counting puts democracy in grave danger.

What You Can Do

Public interest groups are mobilizing to head off another Florida. Petitions calling for a paper trail for DREs have attracted something approaching half a million signatures. Lou Dobbs’s quick poll on CNN on “paper receipts of electronic votes” was running 5,735 to 85 for them on July 20. Greg Palast and Martin Luther King III have more than 80,000 signatures on their petition against paperless touch-screens and the purging of voter rolls. Global Exchange, the San Francisco-based organization, is inviting twenty-eight nonpartisan foreign observers to monitor the US election. Eleven members of Congress asked Kofi Annan to send UN monitors. Cindy Cohn of the Electronic Frontier Foundation is organizing attorneys for litigation against paperless electronic voting.

In mid-June the California secretary of state approved the nation’s first set of standards for a verified paper trail for touch-screen machines. A recent “Voting, Vote Capture and Vote Counting” symposium at Harvard’s Kennedy School of Government has produced an “Annotated Best Practices,” available at www.ljean.com/files/ABPractices.pdf. On June 29 the Leadership Conference on Civil Rights and the Brennan Center for Justice, with the endorsement of Common Cause, the NAACP, People for the American Way and most of the leading scientific critics of paperless touch-screen voting, sent the nation’s local election officials a “call for new security measures for electronic voting machines,” including local retention of independent security experts; the full report is available at www.civilrights.org/issues/voting/lccr_brennan_report.pdf.

Douglas Kellner, the New York City election expert, believes the best practical remedy for the dangers of computerized vote-counting is voting on optical-scan systems, posting the election results in the precincts and keeping the ballots with the machines in which they were counted. In all computerized vote-counting situations the precinct results should be publicly distributed and posted in the precincts before they are transmitted to the center for final counting, Kellner says. Once they are sent from the precinct the audit trail is lost.

Citizens can stay current on election developments via several websites: electionline.org, a reliable and up-to-date source; VerifiedVoting.org, Dill’s group; notablesoftware.com, Mercuri’s site; blackboxvoting.org, Bev Harris’s site; countthevote.org, the site of the Georgia group led by Jekot; and these will key into many others. For a steady flow of news stories on this subject (and a few others) from around the country, get on the e-mail list of [email protected]. Official information concerning each state is available online at each state’s website for its secretary of state.

People should go down to their local election departments and ask their supervisor of elections how they are going to know that their votes are counted–and refuse to take “Trust us,” or “Trust the machines,” for an answer. They can be poll watchers. Many organizations are fostering poll watching, including People for the American Way’s Election Protection 2004 project. Common Cause “has made election monitoring a major project,” a spokesperson says. VerifiedVoting.org is concentrating on having people watch election technology, including pre-election testing as well as the procedures on election day. Bev Harris is organizing people to do such work (see her website).

Rebecca Mercuri says that if you believe an election has been corrupted through voting equipment, you should collect affidavits from voters; get the results from every voting machine for all precincts; get the names and titles of everyone involved; inventory the equipment, including the software, and try to have it impounded; demand a recount; and go to the press. Noting that all counties that have rushed to purchase DRE voting systems also have paper-ballot systems in place to handle absentee voters, motor-voters and emergency ballots for when the system breaks down, she suggests mothballing the DREs and using paper ballots. “Counties are saying there’s nothing they can do but use the DREs in November, and that is simply untrue,” Mercuri declares.

Much of this would be unnecessary if Congress enacted either the Graham-Clinton or the Holt bill, which would empower voters to verify their own votes and create a paper trail.

The computerized voting companies have precipitated a crisis for the integrity of democracy. Three months to go.

Can we count on you?

In the coming election, the fate of our democracy and fundamental civil rights are on the ballot. The conservative architects of Project 2025 are scheming to institutionalize Donald Trump’s authoritarian vision across all levels of government if he should win.

We’ve already seen events that fill us with both dread and cautious optimism—throughout it all, The Nation has been a bulwark against misinformation and an advocate for bold, principled perspectives. Our dedicated writers have sat down with Kamala Harris and Bernie Sanders for interviews, unpacked the shallow right-wing populist appeals of J.D. Vance, and debated the pathway for a Democratic victory in November.

Stories like these and the one you just read are vital at this critical juncture in our country’s history. Now more than ever, we need clear-eyed and deeply reported independent journalism to make sense of the headlines and sort fact from fiction. Donate today and join our 160-year legacy of speaking truth to power and uplifting the voices of grassroots advocates.

Throughout 2024 and what is likely the defining election of our lifetimes, we need your support to continue publishing the insightful journalism you rely on.

Thank you,
The Editors of The Nation

Ad Policy
x