570 online
 
Most Popular Choices
Share on Facebook 94 Printer Friendly Page More Sharing Summarizing
Exclusive to OpEd News:
OpEdNews Op Eds   

Electronic Voting & Fair Vote Counts: 15 Expert Reports

By       (Page 5 of 10 pages) Become a premium member to see this article and all articles as one long page.   2 comments

Rady Ananda
Message Rady Ananda
Become a Fan
  (2 fans)
In multi-precinct polling places, voters could vote on machines located in other precincts. Accordingly, ballots from a number of precincts appeared on the same VVPAT tape. VVPAT ballots, however, lack a header identifying the precinct. Without this information, it is not possible to conduct a precinct-level tally of the VVPAT ballots.

Consider that each machine has a printer and potentially multiple rolls of paper. Paper records of votes (the official records) may be lost without voters' awareness because of paper jams, paper not being loaded properly, ink issues, and other problems.

Lack of a standardized proven manual count process is likely to result in recount error and inefficiency.

ESI founder Steve Hertzberg spoke with wired.com's Kim Zetter in October, 2006. http://www.wired.com/news/technology/0,71999-0.html?tw=wn_politics_evote_5 Zetter writes:

Out of 467 touch-screen machines assigned to 145 precincts that ESI audited, officials could not locate 29 machines after the election, despite days of searching. And 24 machines that were found had no data on them. "All their paperwork says (the machines) were deployed to polling locations but we can't figure out why there's no election data on them," says ESI founder Steve Hertzberg. Cuyahoga County Board of Elections Director Michael Vu provided no explanation for the missing machines.


GOVERNMENT ACCOUNTABILITY OFFICE, 2005, Elections: Federal Efforts to Improve Security and Reliability of Electronic Voting Systems Are Under Way, but Key Activities Need to Be Completed http://www.gao.gov/new.items/d05956.pdf Voting system vulnerabilities and problems found include:

• Cast ballots, ballot definition files, and audit logs could be modified;
• Supervisor functions were protected with weak or easily guessed passwords;
• Systems had easily picked locks and power switches that were exposed and unprotected;
• Local jurisdictions misconfigured their electronic voting systems, leading to election day problems;
• Voting systems experienced operational failures during elections;
• Vendors installed uncertified software;
• Some electronic voting systems did not encrypt cast ballots or system audit logs, and it was possible to alter both without being detected;
• It was possible to alter the files that define how a ballot looks and works so that the votes for one candidate could be recorded for a different candidate.


HARRY HURSTI, BLACK BOX REPORT Security Alert: July 4, 2005 Critical Security Issues with Diebold Optical Scan Design (1.94w), 2005, http://www.blackboxvoting.org/BBVtsxstudy.pdf Some of the key findings include:

With this design, the functionality – the critical element to be certified during the certification process -- can be modified every time an election is prepared. Functionality is downloaded separately into each and every machine, via memory card, for every election. With this design, there is no way to verify that the certified or even standard functionality is maintained from one voting machine to the next.

Paper trail falsification – Ability to modify the election results reports so that they do not match the actual vote data 1.1) Production of false optical scan reports to facilitate checks and balances (matching the optical scan report to the central tabulator report), in order to conceal attacks like redistribution of the votes or Trojan horse scripts such as those designed by Dr. Herbert Thompson.(19)

Removal of information about pre-loaded votes 2.1) Ability to hide pre-loaded votes 2.2) Ability to hide a pre-arranged integer overflow

The exploits demonstrated in the false optical scan machine reports ("poll tapes") shown on page 16 do not change the votes, only the report of the votes. When combined with the Trojan horse attack demonstrated by Dr. Thompson, this attack vector maintains an illusion of integrity by producing false reports to match the contaminated central tabulator report. The exploit demonstrated in the poll tape with a true report containing false votes, example pre-stuffs the ballot box in such a way as to produce an integer overflow.

In this exploit, a small number of votes is loaded for one candidate, offset by a large number of votes for the opposing candidate such that the sum of the numbers, because of the overflow, will be zero. The large number is designed to trigger an integer overflow such that after a certain number of votes is received it will flip the vote counter over to begin counting from zero for that candidate.


INTERNATIONAL PARLIAMENTARY UNION, Free & Fair Elections, 2006, p. 157 presents a summary of the theory behind an observable vote count, and describes the benefits of a parallel election. http://www.ipu.org/PDF/publications/Free&Fair06-e.pdf

Finally, there is the count and, in appropriate cases, the transfer of power to the successful party in the election. Complementary to the principle of secret ballot is the integrity of the count, which looks both to ensure that the expressed wish of the elector is taken into account, and that the result declared corresponds with the totality of the votes cast.

Sometimes, the ballots will be counted on the spot, and at others, the ballot boxes are transported to central or regional counting stations. In either case, transparency of process is as valuable as accuracy in counting.

Next Page  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Rady Ananda Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

In 2004, Rady Ananda joined the growing community of citizen journalists. Initially focused on elections, she investigated the 2004 Ohio election, organizing, training and leading several forays into counties to photograph the 2004 ballots. She officially served at three recounts, including the 2004 recount. She also organized and led the team that audited Franklin County Ohio's 2006 election, proving the number of voter signatures did not match official results. Her work appears in three books.

Her blogs also address religious, gender, sexual and racial equality, as well as environmental issues; and are sprinkled with book and film reviews on various topics. She spent most of her working life as a researcher or investigator for private lawyers, and five years as an editor.

She graduated from The Ohio State University's School of Agriculture in December 2003 with a B.S. in Natural Resources.

All material offered here is the property of Rady Ananda, copyright 2006, 2007, 2008, 2009. Permission is granted to repost, with proper attribution including the original link.

"In a time of universal deceit, telling the truth is a revolutionary act." Tell the truth anyway.

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter

Name
Email
   (Opens new browser window)
 

To View Comments or Join the Conversation:

Tell A Friend