Scoop has an Ethical Paywall
Work smarter with a Pro licence Learn More
Top Scoops

Book Reviews | Gordon Campbell | Scoop News | Wellington Scoop | Community Scoop | Search


Buzzflash IV With Black Box Author Bev Harris

Will the 2004 Election be Stolen With Electronic Voting Machines? An Interview with Bev Harris, Who Has Done the Groundbreaking Work on This Issue.

September 29, 2003

BUZZFLASH: Electronic voting machines, including touch-screen voting, have been touted as the salvation of a fair voting process. Your tenacious research over the last year has shown that this idea may be the Trojan Horse of voting machine reform, allowing elections to be stolen more easily than in the past. What are the basic reasons that you argue that electronic voting machines pose a threat to democracy?

BEV HARRIS: Four reasons:

1. Secrecy: What has always been a transparent process, subjected to many eyes and belonging to all of us, has very recently become secretive and proprietary. This happened when voting systems, which should be considered part of the "public commons" were turned over to private companies. These companies now assert that the process underlying the vote must be held secret from the voters.

2. Ownership: When a system that belongs to the public becomes secret, it becomes doubly important to make sure we can completely trust those who run it. Voting machine companies are not required to tell us who owns them. Two of the top six firms have been foreign-owned:, owned by the Saudis until an acquisition by Accenture recently, and Sequoia, now owned by DeLaRue (Great Britain). Three of the top six firms have owners and/or directors who represent vested interests:

Advertisement - scroll to continue reading

Are you getting our free newsletter?

Subscribe to Scoop’s 'The Catch Up' our free weekly newsletter sent to your inbox every Monday with stories from across our network.

-- Election Systems & Software, the largest company. Main owner is a company owned by Senator Chuck Hagel's campaign finance director, Michael McCarthy. Hagel has owned shares in both the voting company itself and in the parent company run by his campaign finance director, and Hagel was the CEO and Chairman of the voting machine company while it built the machines that counted his votes.

-- Diebold, the second largest voting machine company. CEO is Wally O'Dell, who recently visited George W. Bush at his Crawford ranch along with an elite group of Bush supporters called the "Rangers" and "Pioneers.” Days later, he penned a letter to Ohio Republicans promising to help "deliver the votes" for Bush. O'Dell sponsored a $600,000 fund raiser for Dick Cheney in July. Diebold director W.H. Timken is also a Bush Pioneer.

-- VoteHere, the company striving to get its cryptography software into all the other companies' machines (already has a contract with Sequoia), has as its Chairman a close Cheney supporter and member of the Defense Policy Board, Admiral Bill Owens. Former CIA director Robert Gates, who heads the George Bush School of Business, is also a director.

-- Voting companies also have a somewhat incestuous group of key players -- Todd Urosevich and Bob Urosevich founded ES&S, but Todd now is an executive with ES&S while Bob is president of Diebold Election Systems. Sequoia and ES&S share software and optical scan machines.

3. Disabling the safeguards: Voting systems have always had people trying to rig them, with varying degrees of success. What has changed is scale. Whereas it used to be that one had to run around bribing someone to shave the wheel on each lever machine, or collect up ballot boxes and stuff them in a trunk, nowadays a programmer can, essentially invisibly, create a back door into the vote system for millions of votes at once. Whereas vote-rigging has always required physical access before, modems and wireless communications devices now open up possibilities for remote vote rigging that no one can observe.

-- The audit trail is being taken away: An audit is simply the act of comparing two independent data sets that are supposed to match. Probably the most important understory to the voting issue right now is this: The voting industry is spending literally millions of dollars, and going through amazing feats of contorted logic that can best be described as marketing gymnastics, to convince us that we should discontinue proper auditing. They want us to eliminate the ballot which you verify, and trust the secret system instead. Even with the optical scan machines, which retain a paper ballot, some states have passed laws to prevent us from looking at the paper ballot to use it for a proper audit.

-- Incorrect programming: One thing we've never had until we got electronic vote-counting (which includes touch screens and optical scan machines), is bad software programming. A lever machine can be tampered with, but you don't have any software programming errors with it. Incorrect software programming has now been identified in over 100 elections, often flipping the race to the wrong candidate, even when the election was not close.

No one knows how many elections have actually been misprogrammed, and as we eliminate paper ballots, no one will ever know. We do know that errors as high as 25 percent are not uncommon, and software programming errors have been documented as high as 100 percent, and in one small Iowa county, a single machine miscounted by 3 million votes.

Incorrect software programming can take two possible forms: Accidental or deliberate. Either one takes away our right to have our vote counted as we cast it.

4. Secret certification and testing, which gives a passing grade to flaws -- The whole reason we are supposed to accept secret software and secret ownership is that, we're told, these systems go through extensive and rigorous certification and testing. However, this turns out not to be the case.

First of all, the certification officials refuse to say what tests they do.

No one quite knows what the certifiers’ credentials are or why they keep hiring the same guy, and we’re not allowed to ask that question.

It turns out that the states generally do not look at the secret programs at all; they simply ask some routine questions and do a "Logic & Accuracy test" that does not detect fraud, and has proven to miss huge software programming errors quite often.

We now know that the certification process is fundamentally flawed. The recent report by Scientific Applications International Inc. (SAIC) on the security of the Diebold voting system identified 328 flaws, 26 of which it deemed “critical.” The examination was ONLY done because, quite by accident, we got access to the voting program files and a report was written that exposed problems. But what this illustrates about certification is simply this: It doesn’t work!

BUZZFLASH: How could a company steal votes for one party and we would never know about it?

BEV HARRIS: Given inside access, which is available to software engineers and support techs, anything is possible. In California, according to internal memos we have obtained written by Diebold support techs and software engineers, in some elections no one looked at the software code AT ALL, except for a couple of programmers out of Canada. This is because the software that was certified and approved, and supposedly frozen and held in escrow, was replaced with different software for elections. All of the companies seem to do this: They allow their techs, and sometimes even elections officials, to replace or “update” programs, and you can’t count on these “updates” being tested by anyone. In Georgia they did this repeatedly.

Let me explain just how disturbing this is: The Diebold software that has been certified includes something called “GEMS” version 1.11.14 and also GEMS version 1.17.17. However, according to company memos, they rewrote “the guts of the program” when they made GEMS version 1.14.xx and then made even more changes, significant changes, with GEMS version 1.15.xx. (The last two numbers vary; none of these were certified.) These changes were made by programmers in Vancouver, Canada and stuck on an unprotected web site, where support techs went and retrieved them and put them on machines used in elections in California.

The story gets odder. The Canadian office, where the programmers come from, employs only a few people. Key software engineers actually come from Russia, Czechoslovakia, Poland, and Hong Kong, and often speak imperfect English and seem blissfully unaware of U.S. election law. Who knows what is in these programs? What is the background of these people? You can do anything you want to an election, if you write the commands that tell the computer what to do.

Getting into specifics requires some geek-speak, which is beyond the scope of an introduction like this. Several chapters in our soon-to-be-released book, "Black Box Voting," discuss this in more depth.

BUZZFLASH: What are the names of the manufacturers of the electronic voting machines, and which one is the biggest?

BEV HARRIS: These are the key players:

-- Election Systems & Software (ES&S) – currently the largest
-- Diebold Election Systems – currently the fastest growing
-- Sequoia Voting Systems – Still controls a significant share of American voting machines.
-- Hart Intercivic – Like the others, their machines are not properly auditable.
-- VoteHere – This is a different kind of company. They have heavy ties to the defense industry. Their current focus is to get their encryption system into all the other manufacturers’ voting systems; their encryption concept is just another attempt to do an end run around an open transparent system with paper ballots.
-- Avante – This is a very interesting company, because it makes touch screens WITH a paper trail, and a secure ballot box is attached to every machine. Their machines have been used in Sacramento County and recently fared quite well in Connecticut.
-- AccuPoll – This is another company we should pay more attention to. It not only has touch screens with a voter verified paper ballot, but its software is also “Open source,” meaning anyone can examine it.

BUZZFLASH: You have charged that the owners of some of these companies have close connections with the Republican Party. The head of Diebold, for instance, publicly vowed to do everything possible to see that Bush wins in Ohio in 2004. Are you concerned that the Republican Party affiliation of some of these companies could result in voting results skewed toward the GOP, in short, as a result of manipulating the software?

BEV HARRIS: It’s a conflict of interest, just as having military defense contractors involved in our voting system is a conflict. “Conflict of interest” provides a motive to do something impure. Allowing secret code and combining it with conflict of interest is just playing with electoral fire.

BUZZFLASH: You have been the victim of having your website shut down by Diebold. Briefly, why did they shut down your site and how were they able to do that? You refer to their use of "DMCA" to get your ISPN to clear your website. What is DMCA? What is the difference between and

BEV HARRIS: The Digital Millennium Copyright Act (DMCA) laws, in the Internet world, are almost as controversial as the Patriot Act, because they tread on rights, contain draconian penalties, and can be abused in order to shut people up. What DMCA does is criminalize copyright issues. They were pushed in by the recording industry to prevent music piracy, but they have since been used for many other things.

The provision that was used against us was an abuse of the DMCA pull-down-demand- process. Using this, a company can claim they own copyright to something, write a letter to your Internet service provider (ISP), demand that the offending page be removed. The ISP must pull the page immediately or risk losing everything. These pull-downs almost always take place without a court order.

Now, in our case, Diebold didn’t even claim we had a copyrighted document on our site, they complained that we had a LINK to an unrelated site which, in turn, had LINKS to documents which they claimed copyright to. And in our case, our ISP overstepped its bounds. We do not know the extent to which it was pressured to do so by Diebold or whether there were other types of political pressure. Our ISP not only pulled the offending link, it pulled the page the link was on, then it pulled our whole site down, then it removed access to the files on our FTP site so that we couldn’t even relocate the files to another location. We have been told the site must remain down for 10 days, and we need to file a letter disputing their claim and bleed lawyer’s fees to litigate this. Fortunately, David Allen, who knows about these things, had a techie-to-techie conversation with a rep at the ISP, and they decided their attorney had been wrong and granted us access via FTP, though the site is still not up.

Now let me tell you what the Diebold didn’t want people to see: Memos leaked by an insider. It was not a Diebold page, it was an independent web site owned by someone else.

These memos show a pattern of allegedly breaking the law, starting with using uncertified software; Diebold insiders allegedly admit to doing “end runs” around the voting system, and in one of the most shocking sets of memos, they allegedly admit that a “replacement” set of vote totals was uploaded in Volusia County, Florida which took 16,022 votes away from Al Gore in Nov. 2000. The explanation for how a supposedly secure system can have replacement votes put on it, and the whereabouts of “card #3” which contained the second vote upload, are missing in action. (The votes were given back to Gore, but only because a Florida clerk noticed the tally going down and sent out an alert).

Now on the web sites: is owned by David Allen, my publisher, with Plan Nine Publishing. It contains breaking news stories, a generous archive of articles, and commentary. I own the domain name, but to be fair, a webmaster named Roxanne Jekot, of “Georgia hack challenge” fame, did all the work to create a very effective “self-serve” activism site, where people could go and get directly involved and post their work and set up meetings, both public and private. It is the .org site that was shut down, and I don’t know if I’ll set it up again; I don’t have the programming expertise to run it.

We are at “the tipping point” now. What brought us to this point, besides all the hard work by many people, was a kind of “drip,drip,drip” public education process, mostly using the Internet but also using radio quite a bit, and what has finally tipped things is the program files from the Diebold web site and the internal memos.

BUZZFLASH: Due to your work, states now seem to be reviewing electronic voting machines, but not necessarily doing anything about it? Is that accurate?

BEV HARRIS: We’re getting there. My skills are primarily in investigating, writing, and being a mouthpiece to get things into public attention. The set of skills for changing laws, getting injunctions, and confronting officials in an organized, systematic way is quite different. I have been eager to pass the torch, and I think we are at that point, and you will see citizens groups having a big impact in the very near future. The “Black Box Voting” book is designed to facilitate activism, because although we’ll start seeing action soon, we have a very long fight ahead of us. It’s a solid synopsis of what we know, to equip citizens to argue this issue persuasively.

BUZZFLASH: Okay, you've identified a problem that goes to the heart of how we choose our leaders in a democracy. You claim that the "salvation" of electronic voting is rife with potential for corruption? We are just over a year away from a national presidential election. Can anything be done in time to ensure an accurate vote count?

BEV HARRIS: It has to be. We should not do any more elections until we have trustworthy and fully auditable voting systems. The stakes are high and the timeline is short.

BUZZFLASH: You have described many of the relationships in the Black Box Voting industry as incestuous. Can you explain how a recent State of Maryland "investigation" into a touch-screen voting machine vendor illustrates that? [LINK]

BEV HARRIS: Yes. Check this out: The SAIC is charged with doing an “independent” investigation of the security of Diebold software. They then give us about 69 heavily redacted pages out of a 200-page report, and in this, they take whole sections of the voting system off the table for examination. Now, the SAIC has ties to the voting industry – specifically, Admiral Bill Owens is the Vice Chairman of the SAIC and he is the Chairman of VoteHere. SAIC has ties to the ITAA [LINK], and the ITAA just tried to thrust a $200,000 PR campaign on the voting industry to solve the “PR problem” caused by the Diebold revelations. And there’s more. You don’t even have time for how much more there is.

BUZZFLASH: You have a book coming out, "Black Box Voting." When is it going to be released? What does it cover? (We will be offering it as a BuzzFlash premium).

BEV HARRIS: Are you ready for this? Wednesday, Oct. 1, we will start releasing this book for free in electronic format. We know that some of the people most likely to be disenfranchised cannot afford a book, and we want the book to be available to everyone. We know that time is of the essence, and we want tools to be available to activists immediately. On Wednesday, we will release two chapters every two days in free electronic format until the book has been thoroughly propagated around the world. Then the paperback version will go to print. ([LINK], watch for the announcement at the top of the homepage)


* * *


BuzzFlash Note: We are offering Diebold's response to Harris's charges as they appeared in a Seattle Times article [LINK]:

Diebold has steadfastly maintained that its elections machinery and software are safe. The company's position was bolstered yesterday by Maryland Gov. Robert Ehrlich Jr., who released an independent review of Diebold's touch-screen machines and said that, if properly used, they "can contribute to one of the safest, most secure election systems available."

Harris' Web site was shut down by her Internet service provider late Tuesday after a Diebold attorney said she was violating the company's copyright by posting a link to a New Zealand site that contained 15,000 pieces of Diebold e-mail.

Harris earlier removed Diebold e-mail from her site,, in response to an earlier legal threat by the company. Her publisher's site,, which does not contain links to the memos, was operating yesterday. Harris said she plans to put her Web site back on the Internet as soon as possible.

Harris said the e-mail supports her claims that Diebold's high-tech voting systems are subject to abuse. She said she was "stunned" the company acknowledged the authenticity of the potentially damaging documents.

Harris said she posted the memos after they were provided to her by a Diebold insider. She called the company's claim of copyright infringement "a flat-out attempt to shut somebody up. ... I still have a mouth, Diebold. Cease and desist my mouth."

A call to Diebold's public-relations department yesterday was not returned. Company spokesman Mike Jacobsen, who is on leave, was reached at his home last night. He said the memos were stolen from Diebold and the company wants them back.

Jacobsen said Harris also stole company property when she circulated numerous company files she found on an unprotected Web site. The files included source code for the company's touch-screen voting machines, which have recently been bought by election officials in Georgia, Maryland and other states.

Diebold insists its machines meet the security requirements of national and state certification and has dismissed as flawed a critical analysis by software experts from Johns Hopkins and Rice universities. (One of the study's authors later acknowledged he was on an advisory committee to Bellevue election-software company VoteHere and held VoteHere stock options.)

* * ENDS * *

© Scoop Media

Advertisement - scroll to continue reading
Top Scoops Headlines


Join Our Free Newsletter

Subscribe to Scoop’s 'The Catch Up' our free weekly newsletter sent to your inbox every Monday with stories from across our network.