Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Holding the Vote-Counting Machines Accountable
New York Times ^ | September 16, 2004 | LISA GUERNSEY

Posted on 09/16/2004 6:09:28 AM PDT by OESY

COMPUTERIZED voting machines are attracting a lot of attention in this election year, but one system is being watched particularly closely: the AccuVote-TS.

The AccuVote-TS has been the subject of at least four studies over 14 months that expose security holes. This spring California's secretary of state, Kevin Shelley, blasted the manufacturer, Diebold Election Systems, for not following proper procedures in updating its software. Those problems and a battery defect that rendered some machines unusable for hours during the March primary prompted Mr. Shelley to order all counties using touch-screen machines to offer a paper alternative.

Still, the AccuVote-TS will be used by more voters than any other electronic system this fall. Precincts with more than 6 percent of registered voters will use Diebold's system, according to the research company Election Data Services. It says that over all, 29 percent of voters are registered in precincts where ballots will be cast electronically.

Nearly all voters in Maryland and Georgia will use AccuVote-TS, which is also the primary machine used in the California counties of Alameda and Plumas. (In New York, only one jurisdiction - Clifton Park, near Schenectady - will use touch-screen machines, and they are made by Sequoia Voting Systems, a Diebold competitor.)

Officials say that no matter what machines are used, hackers and malfunctions will be kept at bay. "The voters can be assured that we've done everything humanly possible to make the voting equipment secure and safe for them to use," said Linda Lamone, administrator of Maryland's State Board of Elections.

What exactly is being done to build that confidence? Here is a look at some of the oft-cited risks related to the Diebold machine and how they are, or are not, being mitigated.

Connectivity

Worries about computerized voting machines being hacked over the Internet can be allayed off the bat, said David Bear, a Diebold spokesman. No AccuVote machines are connected to the Internet, nor are the servers that crunch the final numbers. At the end of election night, vote totals from each machine can be transmitted to a central office two ways: either by hand carrying the memory cards and printouts that come with each machine or over a modem connection to a private telephone line.

Yet security analysts say that someone could tap into the phone line, gain access to the totals and change them before they are reported. Roxanne Jekot, a computer programmer who maintains a protest Web site called countthevote.org, said many of the lines used for transmission were public school fax lines whose numbers could be easily obtained.

Several security reports last year urged Diebold to encrypt the transmission data so that it appeared as gibberish to anyone without a key. Maryland and the two counties in California will be using an updated version of the AccuVote system that includes such encryption, according to officials. But in Georgia, the transmitted data is not encrypted because the state is using an older version of the system. Chris Riggall, a spokesman for Georgia's secretary of state, Cathy Cox, said that state officials decided that they could not screen the new system in time for the fall elections.

If transmitted data is tainted, election officials say they would be able to detect the problem as soon as the official numbers are tallied. In all three states using the AccuVote-TS, election procedures require officials to compare the totals obtained from the machines' memory cards and printouts to the totals that come across the modem. If the numbers do not match, the totals compiled before the phone-line transmission would most likely be used instead.

"A final result tally is never to be derived from a modem-ed result total," Mr. Riggall said.

Software Testing

Still, David L. Dill, a computer scientist at Stanford University, says there is always the risk that a programmer on the inside could plant a piece of code that switches votes from one candidate to another before the data is even transmitted. Other experts also sound warnings about unintentional software glitches. For example, what if the software contains some obscure bug that subtracts a vote for a candidate every 100th ballot?

Diebold and election officials point to the multiple tests that machines undergo before the polls open. Evaluations are conducted by national, state and independent agencies. At the end of these tests, the machines are sealed with tamperproof tape.

In the days before an election, each machine goes through a "logic and accuracy" test in which a vote is cast in every race to make sure the ballots are written correctly and the numbers add up. The machines are sealed again until election morning, when a printout is generated to show that no votes have yet been cast.

But "you can never find all the bugs," said Aviel D. Rubin, a computer scientist at Johns Hopkins University who was a co-author of the first report criticizing Diebold, in July 2003. "You can never get it perfect."

Smart Cards

When voters arrive at the polls, they receive a smart card containing an electronic chip to insert into the touch screen units and bring up the ballot for their specific precinct or district. The July 2003 report by Dr. Rubin and three other computer scientists said the Diebold cards could be hacked. They envisioned a scenario in which people could forge cards to vote multiple times.

Mr. Riggall said that poll workers are trained to compare the running vote totals with the number of people who have come to vote. He said they would be able to quickly detect whether someone has stuffed the ballot box.

What about other attempts at tampering? In a simulation last year, a team of experts with RABA Technologies, a security company in Columbia, Md., attempted to hack into the cards by guessing passwords. The team was able to gain access to the cards' contents after a few guesses and create a forged supervisor card. With such a card, a perpetrator could disable a touch-screen unit.

Diebold has since tightened its security. It has created a way for authorized poll workers to quickly change a card's pass code when and if necessary. Maryland and California will be using that system in November. But Georgia will not because it could not be tested on each of its 24,500 machines in time, Mr. Riggall said.

Meanwhile, reports of glitches on machines by Diebold and its competitors have spread through Web sites built by voters rights activists and computer scientists. (Among them are verifiedvoting .org and blackboxvoting.org.) But vendors stress, and even e-voting critics agree, that shortcomings can affect any machine, electronic or otherwise. The mechanical lever or optical scanning machine can fail just as batteries do. Poll workers may be poorly trained. Voters can make mistakes.

Officials at sites using e-voting machines say they are prepared for those scenarios. They say they are training poll workers to handle malfunctions, just as they do to head off problems with optical scanners, levers and punch-card machines.

Critics say they can only hope that the problems will not be severe enough to require recounts, since paper ballots will not exist.


TOPICS: Culture/Society; Extended News; Government; News/Current Events; Politics/Elections
KEYWORDS: electronicvoting; votingmachines

1 posted on 09/16/2004 6:09:28 AM PDT by OESY
[ Post Reply | Private Reply | View Replies]

To: OESY

Good grief... Here we go again.


2 posted on 09/16/2004 6:10:32 AM PDT by demkicker (I'm Ra th er sick of Dan)
[ Post Reply | Private Reply | To 1 | View Replies]

To: OESY
Electronic voting machines are the future... of vote fraud.
3 posted on 09/16/2004 6:12:02 AM PDT by airborne (God answers all prayers. Sometimes the answer is ,"No".)
[ Post Reply | Private Reply | To 1 | View Replies]

To: OESY
You know, it's kind of funny. Here in New York City, we still vote using the old pull lever machines, which have been around for many decades. There's no paper printout of my vote. And we trust that the people at the polls are reading the numbers right when they canvass the machine at the end of the day. Yet the New York Times isn't writing newspaper articles about how the New York voting machines are subject to fraud.

A supposed non-partisan, Bev Harris, whose company, Talion, wrote a press release about the Bush AWOL charges in 2000 writes a book about the new electronic voting machines and how bad they are because there is no paper record. The Democrats scream. And the New York Times champions the story.
4 posted on 09/16/2004 6:31:52 AM PDT by conservative in nyc
[ Post Reply | Private Reply | To 1 | View Replies]

To: OESY

Can this be a setup, by the Times, in advance of the election, to discredit certain ballots, in key states, when Bush wins?


5 posted on 09/16/2004 6:33:56 AM PDT by Noachian (in.ter.net n. Gatekeeper of the new media)
[ Post Reply | Private Reply | To 1 | View Replies]

To: OESY
But "you can never find all the bugs," said Aviel D. Rubin, a computer scientist at Johns Hopkins University who was a co-author of the first report criticizing Diebold, in July 2003. "You can never get it perfect."

Confucius say, "Any computer program that accomplishes significant work always contains at least one more bug."

As someone who programmed for 20 years before I retired I can tell you this is painfully true.

I am a poll manager here in SC. This November we'll use electronic voting for the first time. I normally enjoy this job. But I'm not looking forward to Nov 2.

But Nov 3rd, that day SC has reserved for all the RATS to vote, should be a better day.

6 posted on 09/16/2004 8:32:35 AM PDT by upchuck (You do know that the Tasmanians, who never committed adultery, are now extinct, don't you?)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson