Book Reviews | Gordon Campbell | News Flashes | Scoop Features | Scoop Video | Strange & Bizarre | Search

 


USA Coup: Voting Machines In Georgia And Maryland

EDITOR'S NOTE: The following are two extremely insightful articles from http://www.citypaper.com/, the website of Baltimore's free weekly community paper, on the Voting Machine saga. The articles are archived here as part of Scoop's ongoing investigation into an AMERICAN COUP

FAIR USE NOTICE: This page contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of criminal justice, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.

From: http://www.citypaper.com/current/mobs2.html

Mobtown Beat - Ballot Check


Computerized Voting Comes Under Fire in Georgia and California
By Van Smith
February 19 - February 25, 2003

In California and Georgia, skepticism is quickly growing over the computer systems used to administer elections. The same type of system in question--known as "direct recording electronic" (DRE)--is used in Baltimore City and four Maryland counties, and the entire state is committed to switch to DRE by 2006 ("Future Vote," Dec. 12 & Attached). Maryland elections officials are monitoring the budding controversy but remain unconvinced that computer elections in the Free State are risky, as critics contend.

The growing concerns arise from two recent developments. Reputable computer-security experts have joined forces in California to insist that the systems have inherent, though simply solved, security flaws. And allegations have surfaced in Georgia, where computers were used by all voters for the first time last November, that sensitive election-software files were on a publicly accessible Internet file server--a situation, computer experts say, that would present an opportunity for code tampering to manipulate election outcomes.

In Santa Clara County, Calif.--home to Stanford University and Silicon Valley, and thus a high-tech savvy electorate--technologists' security concerns about computer voting have led county officials to delay a planned $20 million voting-system purchase in order to gather more information about the risks. Computer-security expert Peter Neumann and Stanford computer scientist David Dill have testified twice so far this year before the county board of supervisors, explaining that the systems as currently designed provide no guarantee of accurate voting because they are not auditable.

The solution, Neumann, Dill, and others say, lies in providing paper receipts at polling booths that voters can use to verify that their votes are recorded as intended. This "voter-verifiable audit trail," reads a resolution Dill is promoting (which has been endorsed by more than 300 technologists, including professors at the University of Maryland and Johns Hopkins University), "should be one of the essential requirements" for the systems. Their cause got a boost from the newly elected California secretary of state, Kevin Shelley, who announced on Feb. 6 that he will convene a panel of experts to study the security risks of computer voting.

Meanwhile, two voting-machine companies--Avante of New Jersey and AccuPoll of California--have begun marketing systems that provide voter-verified receipts, an indication that some in the voting-machine industry see recent events as writing on the wall.

In Georgia, where a computerized November election handed the U.S. Senate majority to the Republican party, a state elections official says his office is being "bombarded" with questions about allegations of security breaches in the conduct of that election. The rush of scrutiny was touched off by recent postings on blackboxvoting.com, a Web site administered by Bev Harris, a Renton, Wash.-based public-relations consultant who is writing a book about the risks of computer voting.

Harris says that Diebold Election Systems, whose technology was used to run the Georgia elections, put sensitive software code used in that election on an Internet file server that was publicly accessible. "Anybody could download, edit, or upload those files," Harris said in a Feb. 17 telephone interview. "It was like a blueprint for how to mess with these machines--source codes, testing protocols, hardware and software specifications--up on the Web. Diebold doesn't even allow the government to look at this stuff, yet there it was for anyone to look at or manipulate."

When asked detailed questions about Harris' allegations, Diebold issued the following statement to City Paper: "Our review of this matter indicates that there is no merit to the insinuations of security breaches in the Diebold Election Systems solutions. The old Global Elections Systems site has been taken down because it contained old, out-of-date material. For 144 years, Diebold has been synonymous with security, and we take security very seriously in all of our products and services."

Maryland elections chief Linda Lamone says her staff discovered Diebold's open file server before last November's election and demanded that the company, which manufactures and administers touchscreen DREs for about 40 percent of the state's electorate, provide a secure server for Maryland's elections. Lamone says Diebold complied with the state's request. "They found [the open server] and refused to use it," Lamone says of the state election board's technical staff. "They were very upset about it."

Georgia, however, did use the open server, downloading software patches to tweak the elections program and ensure it worked properly on Election Day. Brit Williams, a college professor who tested and certified Diebold's system in preparation for Georgia's November elections, explains in a Web-published transcript of an interview with Harris that "we were in the heat of the election. Some of the things we did [involving the open server], we probably compromised security a little bit. . . . We've gone back since the election and done extensive testing on all this."

Georgia elections spokesman Chris Rigel could not be reached for comment.

The U.S. Senate race in Georgia produced unexpected success for the Republican party, and City Paper's county-by-county analysis of the outcome, published in December, produced unusual results. The analysis showed that 60 percent of Georgia voters lived in 101 counties where the November results showed pronounced shifts of party loyalty from the August primary.

The potential for election fraud in Georgia "needs to be examined under oath," Harris says, adding that lawyers are crafting strategies to bring lawsuits that would focus on election-software security. "Citizens of any place that used [DREs] would have standing to sue," she contends.

In Maryland, Lamone is confident that code manipulation was prevented during last fall's election and adds that a "very high number of voters trusted the [new] equipment." As for voter-verified receipts, Lamone admits that the state elections board "didn't talk about it at all" as they explored the new computer-election technology in 2001. In light of the growing awareness of the need for receipts, and for better security in general when it comes to computer voting, Lamone now says that "if Diebold can provide [voter-verified receipts] and it's not too costly, I have no objection to it."

Paul Herrnson, a University of Maryland professor who has extensively studied and tested the state's new computer-voting technology, is emphatic when saying that "there are tremendous concerns" raised by computer voting. "The current system does not have a paper trail, and that is a problem." In light of Harris' allegations and the odd outcome in the Georgia Senate race, Herrnson adds: "People should have questions, and a [computer-voting machine] company that is not responsive to those questions is probably a company that should not be trusted."

*************

FROM: http://www.citypaper.com/2002-12-11/feature.html

Feature - Future Vote


Computerized Balloting is Taking Over Elections In Maryland--But Can We Trust the Results?
By Van Smith
December 11 - December 17, 2002

On Nov. 21, a computer programmer for Autotote, an electronic-wagering company, admitted in court that he was the "inside man" in a computer-based scheme that manipulated horse-racing stakes, culminating in an Oct. 23 Breeders' Cup wager that would have yielded $3 million in winnings for a Baltimore man had the bet not raised suspicions.

The scandal prompted the National Thoroughbred Racing Association to convene a panel headed by former New York mayor Rudolph Giuliani to review the industry's computer-betting system. It also spawned a lawsuit: Gambler Jimmy "the Hat" Allard accuses Autotote of negligence, claiming in a statement made through his law firm that the "betting public may have been cheated out of countless millions of dollars for possibly the past eight years" due to lapses in the company's computer security.

This fall, voters in four Maryland counties for the first time cast ballots on computerized voting machines using a technology called "direct recording electronic" (DRE), a system that Baltimoreans have been using since 1998. The whole state is scheduled to switch over to a unified computer voting system by 2006, but DRE system skeptics question the system's security because, just like the Breeders' Cup betting scandal, it could be rigged using computer code.

Imagine a computer programmer at Diebold Election Systems or Sequoia Pacific Systems, the two companies that manufacture computer voting machines used in Maryland, manipulating the software code used to run the machines to tweak the results in favor of some candidate, some party, some agenda. Imagine that he or she gets caught overreaching. Losers and voters in computerized elections nationwide would mull lawsuits and question the integrity of their races' results, just as Allard questions whether bettors have been cheated all along by the Autotote system.

"If you can fix the Breeders' Cup, I guess it's certainly possible to do the same with computer elections," says former Maryland U.S. Attorney George Beall, who also headed the state task force that investigated voting irregularities in the 1994 Baltimore City election. Given the potential stakes in politics vs. gambling--a hand on the purse strings of the public agenda, compared to a winning Pick Six ticket worth $3 million--the possibility seems worthy of consideration.

The potential stakes are even higher than the outcome of a few political campaigns. An actual incident of computer-voting fraud, should one ever be discovered, would cause a crisis of democracy. In addition to criminal charges being brought and state panels being convened to investigate, a shadow of doubt would fall over the legitimacy of all those who gained office with votes cast through computers, and the electorate's confidence in how we choose our leadership would fall further. There's never been a proven case, but what's to prevent it from happening?

Precious little, nationally recognized computer-security experts say. First and foremost among them are Peter Neumann, principal scientist at SRI International's computer-science lab in Menlo Park, Calif., and Rebecca Mercuri, computer-science professor at Bryn Mawr College outside Philadelphia. Despite their well-aired warnings over at least the past 15 years and a few minor scandals involving the three companies that make most of the voting machines, simple steps that would abate the risk of tampering have not been implemented as counties and states across the country--and governments around the world--increasingly switch to computers for holding elections.

Federal legislation passed this fall, the Help America Vote Act (HAVA), includes $3.9 billion to help jurisdictions pay for election-technology upgrades, so, barring any changes in the trend, many more voters can look forward to casting digital ballots in the years ahead.

Diebold Election spokesman Joe Richardson says the security concerns that Neumann and Mercuri raise about DRE voting systems are moot. The level of security precautions already taken are sufficient to provide "what the voters are looking for," which, he says, is "peace of mind" that their votes were accurately recorded and counted. So why not give it to them by implementing the additional security that the skeptics say will prevent fraudulent outcomes while protecting ballot secrecy? Because the existing security "does not necessitate it," Richardson says.

In the coming months, the new HAVA regulations governing election technology will be written, and skeptics hope adequate security measures will be included. Even if they are, though, there's no way to be assured of the integrity of computer elections already held. A look at some of those outcomes in light of the security risks posed by electronic voting gives cause for concern.

When all was said and done, the Maryland elections on Nov. 5 were good to Bob Urosevich. As the president of North Canton, Ohio-based Diebold Election Systems, his reputation was riding on the performance of the AccuVote-TS computer-voting system, which got its first workout in Maryland during the fall elections. The state and Montgomery, Prince George's, Dorchester, and Allegany counties split the $13 million price tag for nearly 5,000 of Diebold's touch-screen units, which resemble the ubiquitous ATMs manufactured by Diebold Election's parent company, Diebold Inc. "We are pleased all four counties had successful general elections," Urosevich said in a press release the next day, "and look forward to working on the statewide implementation of this secure voting technology."

This fast-emerging way to vote appears at first glance to be manifestly better than what it is replacing. Lasting memories of past election debacles involving punch cards or lever machines--Florida in 2000, say, or Baltimore City in 1994--strengthen the allure of voting via a central device in most Americans' daily lives: the computer. So governments worldwide are increasingly relying on this privately owned technology to run public elections.

The rub, though, is in what can't be seen when the computers are recording and tabulating the votes--the proprietary software code that runs the system.

Like any voting system--and despite Urosevich's emphasis on its secure nature--DRE is not fraud-proof. With computers, security experts say, the method of committing election fraud is, in theory, insidiously simple. Here's how it would work: A company insider who knows how to write computer code surreptitiously inserts some nefarious programming language into the election software, causing votes on Election Day to be recorded and tabulated in whatever fashion achieves his or her purpose--for example, redirecting a small percentage of votes cast for Candidate A to Candidate B's total. Such a piece of code could run without otherwise obviously affecting the machine's operation or the outcome of other races.

Since nearly all computer elections are paperless, there is no independent, voter-verified record with which to compare the computer-generated outcome in the event of a recount. Computer-voting recounts, therefore, are merely a matter of taking another look at the same data that was stored in the computer's memory after the polls closed, and are therefore unlikely to produce any changes in the results. As long as the outcome is not patently bizarre--a complete unknown beats a popular incumbent in a landslide, for example, or more votes are cast than there are voters--it would be exceedingly difficult to question it. Knowing that the industry considers each election software code to be a trade secret, and won't let anyone examine it without a court order, the corrupt insider is able to commit the crime without fear of detection.

Neumann, the computer-security expert with SRI International, says the Breeders' Cup scandal aptly illustrates core security problems with electronic voting. The difference in the security precautions taken in electronic wagering vs. computer voting lies in what he calls the "desire for accountability." In betting, "you want complete accountability," he explains. "Everything's on the record, and there's no anonymity." Someone places a computer bet, and information associated with that bet is maintained so a name and a face can later be connected to it, if need be. With voting, though, "you want to maintain a level of secrecy, of anonymity, in the ballot. So the desire for accountability is less. And vendors, when selling these systems, essentially say, 'If you want ballot secrecy, we're not going to be able to give you accountability.'" The result: vastly less stringent safeguards in protecting computer elections from fraud than exist in protecting online wagering from fraud.

Clearly, this potential risk is not registering with decision-makers, at least not to the point where they demand a more secure system. The only example of a jurisdiction changing its mind about purchasing a DRE voting system, Neumann says, is from the mid-1990s, when New York City canceled a contract with Sequoia because of the concerns he continues to voice today. Otherwise, the trend is clear: Elections officials across the country--in Florida, Georgia, California, Texas, and Louisiana, to name but a few states--and officials as far away as Brazil and Belgium are opting to buy DRE systems. And when Maryland Secretary of State John Willis announced earlier this year that 2006 is the target date for all state elections to be entirely electronic, he did so fully aware of these risks. Today, he defends the decision, saying the state "felt that the advantages outweighed the disadvantages."

"An absolute disaster." That's how Neumann characterizes Maryland's decision to go with a unified, statewide DRE system without an independently verified audit trail. Neumann is not some loopy conspiracy nut who happens to have a lot of letters after his name. With his double-doctorate and 50 years as a computer scientist, he is the widely respected principal scientist at SRI, where he has worked since 1971. Earlier this year, he received the highest honor in information security: the Computer System Security Award from the U.S. Commerce Department's National Institute of Standards and Technology and the National Security Agency. When Neumann uses words like "absolute disaster," they carry some authority.

"He's being totally cynical about the process," retorts Willis, who chaired the Special Committee on Voting Systems and Procedures in Maryland, which recommended a unified DRE system. "It was the intent of the commission and of the governor and state legislature to capture as much voter intent as possible as efficiently as possible. And with Diebold's system, we are capturing more voter intent--assuming we believe the codes are right and nobody's manipulating them."

How does Willis know that's not happening? "Well, one, you have to have confidence in the vendor," he says. "And then you have testing before, during, and after the election, and the source codes are kept in escrow so they can't be changed. And then if something looks odd in the outcome, there are experienced people around who are going to notice aberrations from historical voting patterns at the precinct level. And if it could be empirically demonstrated that something there does not make sense, then a court could order a look at the code and the outcome would be challenged with technical expertise.

"So if somebody tried to rig a computer election here, it would require a good deal of sophistication. I think we'd be able to detect it," Willis continues. "But if they can beat all of that, how would we detect it and what would be do about it? Well, the academics are right--some of those questions are still unaddressed. We were aware of the risks, and I have no objection to raising theoretical concerns, and I can't say that those risks aren't there, but they were outweighed by the advantages of capturing as much voter intent as possible."

Neumann and Mercuri have some simple advice on how to get around the security problems that Willis describes: After a vote is cast, they say, the computer should issue a physical record of the choices made by the voter, not unlike an ATM receipt. The voter would then review the record for accuracy and drop it into a precinct lockbox. That way, in the event of a recount, the computer-generated outcome can be compared to the independently verified record contained in the lockbox. Absent such voter-verified receipts, Neumann says, "there is absolutely zero accountability."

Given this apparently simple solution, why are states buying DRE systems that don't provide such independent auditability? Maryland's commission weighed the option but decided against it, Willis says.

"We went through this philosophical debate over the whole idea of having paper records and putting them in a drop box," he says. "But at that point, it starts to seem like, 'So why not just go back to paper ballots?' And there are all sorts of problems with paper ballots." Willis acknowledges that providing such receipts would only require reconfiguring the printers already inside each Diebold machine in Maryland, but adds that "it's very labor intensive" to do manual recounts with receipts--"and there are going to be recounts."

Mercuri says she suspects election administrators like the potentially vulnerable computer systems because the recounts are so orderly and predictable--you always get the same outcome from the computer's memory. No messy manual recounts, no legal arguments over voter intent--no Florida 2000 debacles.

Diebold Election's voting industry director, Mark Radke, points out that his company's system offers an audit-trail option: the ability to print out each and every ballot, if the need arises. They're called "ballot images," and Mercuri says they "prove nothing" because voters do not see them at the time they vote and thus can't verify that the ballot accurately reflects their intended votes.

Asked repeatedly, "Is a ballot image a voter-verified receipt?" Radke refuses to give a yes or no answer. Instead, he repeatedly stresses the "overall security of the software," pointing out that testing, data scrambling, and encryption all work to secure the system to insure it produces accurate outcomes. As for the idea that a lack of voter-verified receipts may be sufficient to undermine voter confidence, Radke responds, "At that point, I guess we'll just have to agree to disagree," adding that, to date, no jurisdiction has asked for receipts.

Another factor to consider in trying to explain the rush to DRE technology is the influence of lobbyists. In Maryland this year, Diebold competitor Election Systems & Software hired a team of four lobbyists from the Annapolis firm Alexander & Cleaver. During the current election cycle, the company and the lobbyists combined have given nearly $30,000 to Maryland political campaigns--including to those of state senators Michael Collins (D-6th) and Joan Carter Conway (D-43rd), both members of the commission that recommended the new DRE systems. That kind of expenditure buys access to lawmakers, who (short of meddling in the procurement process) can help lobbyists influence state officials as they decide what election technology to buy.

At the federal level, the lobbying activity by Election.com is notable. Billing itself as "the global election company," Election.com provides computer election services and aims to talk the federal government into staging a national online computer election. With capital and a line of credit secured by Saudi investors, and former Republican congressman, cabinet member, and vice-presidential candidate Jack Kemp on its five-member board, Election.com has substantial political clout. An extra push was provided in 2000, when the company spent $100,000 to further its cause by hiring two lobbyists who specialize in representing the information-technology industry. Apparently, it paid off: In late October, Newsday reported that Election.com's federal contract to administer online electronic elections for the military in 2004 "appears on track."

Election Systems, of Omaha, Neb., doesn't have far to go for friends in high places. Major shareholder Michael McCarthy serves as the campaign treasurer for conservative Republican Nebraska Sen. Chuck Hagel, who is sure to answer the company's calls.

For Neumann, though, the rapid switch to DRE systems boils down to a simple explanation: "Inertia. There is simply no recognition on the part of the voting public as to how vulnerable the systems are," he says. "Nobody's listening, because voters, by and large, don't understand the technology. And the vendors stonewall any attempt to drive them into accountability, and I can only assume it's because then [the vendors] can't rig anything. I have no hard evidence that they do, but I don't know what else it could be."

***###***

It's one thing to theorize about the possibilities of computer-election fraud. It is quite another to ponder whether or not it has already happened. But that is the problem with election technology: Once it is understood that it can be rigged and detection is unlikely under the current level of security and oversight, people are free to doubt the integrity of any outcome. When upsets occur in computer elections, or when a series of tight contests all fall in favor of one party, security-savvy observers who doubt the safety of the technology are going to wonder whether someone has manipulated the code. Results across the country on Nov. 5, which were tabulated and announced without the expected benefit of exit polling, cause Rebecca Mercuri to suspect fraud might have occurred.

"All I have [to go on] is races across the country that looked to be close that were all won by candidates of the same party," Mercuri says. "OK, that could happen. But we have no real way to know whether the races were manipulated. And in states with computer voting, there were very surprising outcomes."

Voter News Service is an exit-polling outfit funded by the major TV networks and the Associated Press. After its analysis mistakenly prompted networks to call Florida for Al Gore on election night 2000, great effort was put into revamping VNS's data services, which provide much valuable information about how people vote--and also serve as a soft check to see if vote counts don't square up with how people say they voted. VNS's database broke down due to a computer glitch on this year's election night, and the data still aren't available. "Where is that data?" an exasperated Mercuri asks. "All they do . . . is Election Day exit polling. We rely on that for error-check, and without it there is no real way to know that something's amiss."

The results in Georgia, in particular, worry Mercuri. That's because it is the only state with a unified, statewide DRE system--similar to the one Maryland has decided to implement. And in Georgia, the results favored the Republican Party with unexpected decisiveness. The U.S. Senate race in Georgia helped clinch majority status in the U.S. Senate for the Republicans, and the Democratic governor was tossed out in favor of the Peach State's first Republican chief executive since Reconstruction.

Are any of the results in Georgia so surprising that they raise questions about election integrity in light of the security problems with computer voting? The answer is a matter of perspective.

Incumbent Sen. Max Cleland, a first-term Democrat who lost three limbs in the Vietnam War and was the youngest-ever head of the Veterans Administration, ran unchallenged in the August primary. Saxby Chambliss, a four-term Republican congressman from central-south Georgia whose bad knee got him a deferment from serving in Vietnam, won a three-way GOP primary with President Bush's endorsement. During the general-election campaign, Chambliss aired a TV ad with an image of Osama bin Laden and a voice-over that questioned Cleland's commitment to national security, and another in which the Veterans of Foreign Wars endorsed Chambliss over the Democrat. The Republican consistently put out the message that Cleland is too liberal for Georgia. Cleland was stoic about the attacks, but also fought back, questioning Chambliss' voting record on issues important to senior citizens and students, among others. Between the primary and general elections, polling consistently showed Cleland in a double-digit lead over Chambliss, but slipping as Election Day approached; one election-eve poll had Chambliss in the lead by one point.

On Election Day, the conservative weekly magazine National Review published its predictions for Senate races nationwide. "Republicans may be disappointed if they don't capture the Senate tonight, but they should put things in perspective," national political reporter John Miller wrote. "Midterm elections usually lead to big-time losses for the party that controls the White House. At most, it appears the GOP will lose a seat or two." In Georgia, National Review predicted that Cleland would win. However, Chambliss' astounding 53 percent to 46 percent win over the Democrat helped the GOP win back the Senate, a clincher in a string of victories in races that had been too close to call before Nov. 5.

For those inclined to believe that the results in Georgia were legitimately recorded and counted--and other than Mercuri, no one spoken with for this article would do so on the record--the results are perfectly believable. Even without exit polling, it is clear that the influx of prominent national Republican leaders, including Bush, in Georgia prior to Election Day gave the party's statewide candidates a lift in the final stretch of the campaign. Georgia's Senate delegation historically tends to be Democratic, but, as was pointed out by in-state observers after the election, Georgia has been trending Republican for some time now. Election Day manifested the trend, as right-leaning voters came out in droves, due in part to the much-lauded get-out-the-vote effort engineered by former Christian Coalition leader Ralph Reed, who now heads the Georgia GOP, with substantial assistance from the national party and White House senior adviser Karl Rove. The GOP's success in Georgia was simply the result of the party's concentrated effort to win.

For those inclined to share Mercuri's worries about the Georgia outcome, the GOP's extraordinary effort only goes so far in explaining voter performance. A close look at county-level data for the primary and general elections, for instance, shows remarkably shifts in voter loyalties in unlikely areas of the state. Code manipulation or not, the results are unusual enough to stump, at least partially, the head of the University of Georgia's political science department. But first, some background on the race.

Voters in Georgia don't register as party members; they choose which primary to participate in when they show up at the polls. Thus, how voters cast their ballots in the primary serves as a leading indicator of the state's partisan patterns and provides a good comparison to general-election patterns, says Charles Bullock, the University of Georgia professor. With 3.7 million registered voters in 159 counties (by comparison, Maryland's 22 counties have 2.7 million voters), county-by-county analysis gives a pretty high level of definition as to how those patterns are distributed.

August's primary results reinforce Georgia political wisdom that there is a partisan wall separating the Republican-dominated northwest segment of the state--the 58 counties surrounding Atlanta, where two-thirds of the registered voters reside--and the other 101 counties to the south and east, which combined have half the population, but a greater number who cast Democratic ballots in August. Within each of these two regions are islands of renegade counties. DeKalb, Fulton, and Clayton counties in the Atlanta metro area, for instance, are heavily populated with Democratic voters; several areas in the rest of the state, including Chambliss' south-central Georgia base, show heavier Republican participation than Democratic. Overall, though, as Bullock confirms, North Georgia tends to lean Republican, South Georgia tends to lean Democrat.

In the 58 northern counties, in spite of the heavy rain that fell all day Nov. 5, turnout was higher than expected, at a little more than 55 percent. The official results had Chambliss with 53.3 percent of the vote to Cleland's 45.1 percent, with the rest going to the Libertarian candidate. In South Georgia, where turnout was slightly below average, voters also picked Chambliss, 51 percent to 47.4 percent. Unfortunate for Cleland, but not the sort of thing totally unexpected in politics.

What's interesting, though, is how the counties' party loyalties shifted between the primary and the general election. Voters in 58 counties spread throughout the state (accounting for 40 percent of the state's electorate) voted more as less as they did in the primary. In the other 101 counties, the results were a little odd. In 27 counties in the Republican-dominated North, voters supported Republican Chambliss as expected, but Democrat Cleland won 14 percent more of the vote than he did in the primary. Likewise in 74 counties in the traditionally Democratic South, Cleland carried the day, but Chambliss won 22 percent more of the ballots than he could have expected based on the primary results.

So in the end, 60 percent of Georgia's electorate live in counties which dramatically shifted partisan loyalties between the primary and general elections. Yet the final tally didn't follow those shifts. In addition to his stable power base, Cleland won those anomalous Southern counties that shifted toward the GOP in the primary by an 18 percent margin. Unfortunately for him, Chambliss won the Northern counties that veered towards the Dems in the primary by a whopping 29 percent of the vote. What happened?

"Good question," Bullock says over the phone, agreeing that it is a puzzling outcome. After mulling it over for a few days, he e-mails to suggest that the disparity in the number might be partially explained by voters in the minority party--say, Democrats in a heavily Republican county--casting ballots in the majority party's primary in order to influence local races, then switching back to their true allegiances for the general election. While he cautions that it would take a much deeper statistical analysis to determine exactly what went on in the 2002 Georgia Senate race, Bullock agrees that the vote swings are acute and intuitively don't make sense, especially since they occurred in county after county.

How would a programmer bent on throwing the Georgia Senate election go about using software code to create this outcome? Jason Kitcat, a British programmer who recently abandoned his long-pursued goal of designing a secure Internet-voting system because he now feels it is an impossibility, considered the question and explained his reasoning in an e-mail to City Paper:

"Where the system is entirely DRE [like Georgia's], then you have many problems and potential points of failure. The system could be compromised at the ballot station by informing voters that they have voted Republican and storing Democrat," Kitcat writes. "This can be done quite intelligently with randomisers, statistical analysers, etc., so that only a useful but hard-to-detect portion of the votes are manipulated. Depending on the system of transferring the sub-totals from each DRE 'ballot box' to intermediary and final counting systems, there are an incredible number of opportunities to compromise the vote."

Using Kitcat's suggested methods, theoretically it would be possible to, say, select counties where the outcome is expected to favor the Democrats by wide margins and target them for vote manipulation in favor of the GOP. That way, the outcome would still favor the Democrats, the Republicans would pick up the necessary votes, and no one would be the wiser.

"While computer audit tools allow you to track down changes to hard disks even after they have been erased, they would be useless in systems of the scale used for any serious public election," he continues. "If a few votes are changed here and there, it would be basically undetectable. This could be done at operating system, database, communications, or applications level. The final counting system can also modify the results in a huge number of clever ways using techniques mentioned above."

Given the potential for breaching DRE systems and manipulating codes, Kitcat, like Neumann and Mercuri, cannot comprehend why states are buying them. "While the technologies will always be flawed to some extent, the amount of trust election administrators put in the suppliers of DRE systems is shocking," he writes. "They provide closed, proprietary systems which have never been assessed by independent third parties--we have no reliable assurances of the security or privacy they claim to provide!"

And are the vendors worthy of the level of trust they get from election officials? That, like the integrity of the Georgia Senate election, is a matter of perspective. Maryland Secretary of State Willis says he trusts Diebold, in part, because it is experienced with this technology in the ATM market, which requires a very high level of security. But other observers point to ethics scandals involving the industry and wonder whether private companies should be entrusted with the voting process.

Taken as a whole, the voting-machine industry is tightly knit and has a decidedly right-wing flavor, according to well-documented research by public-relations executive Bev Harris and Philadelphia journalist Lynn Landes, who question the soundness of putting private-sector partisans in charge of secretive vote counts.

Harris and Landes point to a bribery scheme involving the purchase of Sequoia machines in Louisiana, which was uncovered in 1999 and netted convictions against state elections commissioner Jerry Fowler and Sequoia's exclusive agent there, David Philpot. A vice president of Election Systems, which makes absentee-ballot-counting machines in use in Maryland, received immunity in exchange for his cooperation in a successful corruption case against the Arkansas secretary of state in 1995. Given the taint of bribery surrounding voting-machine companies, Mercuri says, "you have to wonder what's going on" as more and more states purchase DRE systems.

***###***

Whether or not you believe computer elections have already been tampered with, the risk remains. As long as there is no voter-verified audit trail, results that seem bizarre can be questioned only in theory. Mercuri sees an opportunity to close this credibility gap as regulations are written pursuant to HAVA, Congress' new voting-system legislation.

"The legislation calls for an audit trail," Mercuri says. "But it's clear that the computer-voting companies interpret that as meaning ballot images--the post-election printouts of how each vote was recorded. Ballot images don't prove anything. The voter never sees it, never checks it for accuracy. This can be fixed, though, as the regulations are written by making sure the words 'voter-verified audit trail' are included. So we'll see if that makes it in there."

Either way, Mercuri is not impressed with the new technology--voter-verified audit trail or not. As she monitored the Election Day performance of DRE voting systems in states across the country, she noted problems cropping up. "These things are programmed incorrectly, or the screens and push-buttons are misaligned," she says, pointing out cases in Texas, Florida, and Georgia where voters selected one candidate and the computer screen kept indicating they had selected a different candidate. "And then it's reported that a programmer came in and fixed the problem," Mercuri says. "How do we know he fixed it? Why should we trust these results? No one's going to notice that mistakes were made unless the outcome is completely weird.

"Everyone was saying it was fine, it went well on Election Day for new computer-voting machines, and I don't understand why the news covered it that way," she continues. "It didn't go well. There were major news reports about these problems, yet the whole thing was spun as if they never happened. We don't accept this level of bad performance in other products that are time-critical and have to be accurate, but we accept it when it's voting machines."

Diebold's Radke says voters "have accepted the new technology," pointing to Georgia, where polling for "positive remarks" found a 97 percent acceptance rate. "It went very, very smoothly in Georgia, " he concludes. "People accepted the new technology."

In Maryland on Election Day, software problems did occur in Montgomery County with the new DRE units. One Washington Post reporter summed it up by writing that "confusion reigned" in the use of the new machines. Despite the fact that the two main parties don't have separate ballots in a general election, programming errors caused the word "Democrat" to be displayed at the top of some ballots, "Republican" on others. One voter, a Silver Spring computer consultant, told the Post reporter, "there something wrong. I could check 'Ehrlich' and I could check 'Morella,' but I'm not sure those answers went into the database. . . . It's hard for me to believe."

Despite these problems, Maryland Secretary of State Willis says the state studied voter acceptance of the new technology and found it to be very high. "Most of the voters adapted to it pretty well," he says. As for whether or not the problems in Montgomery may have altered outcomes, Willis is confident that they didn't. "We have looked hard at the results, and we know that they comport with historical voting patterns," he says. "So if anyone's rigging computer elections, they didn't mess with Maryland."

Given the risks of undetected manipulation, though, voters will have to trust computer elections won't be messed with in the future.


***ENDS***

FAIR USE NOTICE: This page contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of criminal justice, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.

© Scoop Media

 
 
 
 
 
Top Scoops Headlines

 

Valerie Morse: The Security State: We Should Not Be Surprised, But We Should Be Worried

On the very day that the Inspector-General of Intelligence and Security released her report into the actions of people the Prime Minister’s office in leaking classified Security Intelligence Service (NZSIS) documents to right-wing smearmonger Cameron ... More>>

Ramzy Baroud: PFLP Soul-Searching: Rise And Fall Of Palestine’s Socialists

When news reports alleged that the two cousins behind the Jerusalem synagogue attack on 18 November were affiliated with the Popular Front for the Liberation of Palestine, a level of confusion reigned. Why the PFLP? Why now? More>>

Valerie Morse: Key And NZ Police At G20: What A Contribution

While 200 New Zealand police officers are helping to repress protests outside of the G20 in Brisbane this week, John Key has been inside pushing the interests of giant multinational corporations to fast track the World Trade Organization (WTO) ... More>>

ALSO:

Gabriela Coutiño: Ayotzinapa Caravan Meets With EZLN In Oventic

In their visit to Zapatista Territory, parents of the 43 students disappeared from Ayotzinapa Guerrero, agreed with the Zapatista National Liberation Army (EZLN), to articulate a national grassroots movement that would question forced disappearances ... More>>

Ramzy Baroud: Talk Of A Third Intifada: Where To From Here, Palestine?

When a journalist tries to do a historian’s job, the outcome can be quite interesting. Using history as a side note in a brief news report or political analysis oftentimes does more harm than good. More>>

ALSO:

David Swanson: Who Says Ferguson Can't End Well

Just as a police officer in a heightened state of panic surrounded by the comfort of impunity will shoot an innocent person, the Governor of Missouri has declared a state of emergency preemptively, thus justifying violence in response to something ... More>>

Melanie Duval-Smith: Homeless Is Where The Heart Is

So, you are not allowed to feed the homeless on the streets of Florida. Last week, a 90 year old man and two Christian ministers were arrested for doing just that. I can hear the cries of the right wingers from here. “Not in our back yard”, ... More>>

John Chuckman: What We Truly Learned From the Great War and the Absurdity of Remembrance Day

No matter what high-blown claims the politicians make each year on Remembrance Day, The Great War was essentially a fight between two branches of a single royal family over the balance of power on the continent of Europe, British foreign policy holding ... More>>

Get More From Scoop

 
 
 
 
 
 
 
Top Scoops
Search Scoop  
 
 
Powered by Vodafone
NZ independent news