Kennedy recounts how computer scientists at Johns Hopkins and Rice universities conducted an analysis of the Diebold voting machine software source code in July 2003. "This voting system is far below even the most minimal security standards applicable in other contexts… (it is) unsuitable for use in a general election," the scientists concluded.
"With electronic machines, you can commit wholesale fraud with a single alteration of software," Avi Rubin told Kennedy. He is a computer science professor at Johns Hopkins who received $US7.5 million from the National Science Foundation to study electronic voting. "There are a million little tricks when you build software that allow you to do whatever you want. If you know the precinct demographics, the machine can be programmed to recognize its precinct and strategically flip votes in elections that are several years in the future. No one will ever know it happened."
Electronic voting machines not only break down frequently, their security and integrity is also easily compromised, says Kennedy:
"In October 2005, the US Government Accountability Office issued a damning report on electronic voting machines. Citing widespread irregularities and malfunctions, the government's top watchdog agency concluded that a host of weaknesses with touch-screen and optical-scan technology 'could damage the integrity of ballots, votes and voting-system software by allowing unauthorized modifications'…Locks protecting computer hardware were easy to pick. Unsecured memory cards could enable individuals to 'vote multiple times, change vote totals and produce false election reports.'
An even more comprehensive report released in June by the Brennan Center for Justice, a nonpartisan think tank at the New York University School of Law, echoed the GAO's findings. The report - conducted by a task force of computer scientists and security experts from the government, universities and the private sector - was peer-reviewed by the National Institute of Standards and Technology. Electronic voting machines widely adopted since 2000, the report concluded, "pose a real danger to the integrity of national, state and local elections." While no instances of hacking have yet been documented, the report identified 120 security threats to three widely used machines - the easiest method of attack being to utilize corrupt software that shifts votes from one candidate to another.
There is no evidence that the voting machine malfunctions, flaws and security risks identified in the 2004 ballot have been fully corrected in time for the 2008 vote. This calls into question whether the 4 November ballot will reflect the will of the American people.
As Kennedy concludes:
"You do not have to believe in conspiracy theories to fear for the integrity of our electoral system: The right to vote is simply too important - and too hard won - to be surrendered without a fight. It is time for Americans to reclaim our democracy from private interests."
To contact Peter Tatchell and for more information about his human rights campaigns visit www.petertatchell.net
First posted in The Independent, UK
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).