58 online
 
Most Popular Choices
Share on Facebook 13 Printer Friendly Page More Sharing
OpEdNews Op Eds   

Papering over OptiScam Problems

By       (Page 2 of 9 pages) Become a premium member to see this article and all articles as one long page.   9 comments
Message Rady Ananda
Become a Fan
  (2 fans)

A Pattern of Obfuscation 

Back in the ’70s and ’80s, the Collier brothers endured the same media and judicial blackout of this issue when trying to expose these problems.  In Votescam, they report that in 1989, the New York Times finally revealed problems associated with computerized vote tabulation: 

Some critics of computerized vote counting worry about the potential for ‘trapdoors,’ ‘time bombs,’ and ‘Trojan Horses…’  Once inside the system, (a hacker) could program the computer to count votes for one candidate as votes for another.  

In that 1989 New York Times article, Princeton University computer scientist Howard J. Strauss explained:  

Writing the ‘source code’ for one of these vote counting systems, a programmer could insert a ‘Trojan Horse’ that might not appear for years. 

Suppose I wanted to throw the 1992 presidential nomination to (Mario Cuomo, for example). I write the code so that every time the name comes up in the primaries, he receives a certain number of votes. 

Today’s computer scientists have the same exact criticism for using software in public elections.  They take it even further: because there can be a million lines of code, opening up the source code for review in no way guarantees that problems will be discovered. 

The 2006 Princeton study of touch screen systems reiterated the same complaints: 

Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss.

Anyone who has physical access to a voting machine, or to a memory card that will later be inserted into a machine, can install said malicious software using a simple method that takes as little as one minute. In practice, poll workers and others often have unsupervised access to the machines. 

One has to wonder why the U.S. government would give states $3.9 billion to buy easily compromised voting systems, a vulnerability known for decades.   

Expert Studies Condemn Optical Scan Election Systems 

Last month, I quoted several computer experts who studied the machines in use today and urge all Americans to read this 20-page summary. By no means do I cover all the reports that have come out in the last ten years, but all experts who study these systems agree: they are subject to easy manipulation.  Use your find command to search the annotation for the term, optical scan, and read how optical scan systems also fail democracy.   

Also note the paper by Ryan and Hoke that focuses on the GEMS tabulation system which is used in Diebold’s optical scan system.  Not only are optical scans vulnerable to hack, but apparently, they were designed that way. 

Many people, by now, have heard of California’s Top-To-Bottom Review of Diebold, Hart and Sequoia touch screens and optical scan systems.  Cleveland State University Center for Election Integrity Chief, Dr. Candice Hoke, summarized all the findings into a two page document.  In a personal email, she wrote: 

I was the team leader for the TTBR Diebold Documentation assessment. The TTBR study's lead scientists provided suggestions for this short summary but it is ultimately my work. To reduce over 500 pages to two pages, at least a few important findings – especially about design flaws not relating to security issues -- had to be sidestepped.

Next Page  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Rady Ananda Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

In 2004, Rady Ananda joined the growing community of citizen journalists. Initially focused on elections, she investigated the 2004 Ohio election, organizing, training and leading several forays into counties to photograph the 2004 ballots. She officially served at three recounts, including the 2004 recount. She also organized and led the team that audited Franklin County Ohio's 2006 election, proving the number of voter signatures did not match official results. Her work appears in three books.

Her blogs also address religious, gender, sexual and racial equality, as well as environmental issues; and are sprinkled with book and film reviews on various topics. She spent most of her working life as a researcher or investigator for private lawyers, and five years as an editor.

She graduated from The Ohio State University's School of Agriculture in December 2003 with a B.S. in Natural Resources.

All material offered here is the property of Rady Ananda, copyright 2006, 2007, 2008, 2009. Permission is granted to repost, with proper attribution including the original link.

"In a time of universal deceit, telling the truth is a revolutionary act." Tell the truth anyway.

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

To View Comments or Join the Conversation:

Tell A Friend