Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

"Diebold Compromised Its Own Voting Machine Security"
Information Week ^ | 25 January 2007 | Thomas Claburn

Posted on 01/26/2007 3:03:07 AM PST by lifelong_republican

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-57 last
To: lifelong_republican

But they have thousands, maybe tens of thousands, of people counting. Which makes it likely somebody will bribe people to volunteer as counters and cheat. Video won't help that, there's too many different counters to keep track of and someone could doctor it.

So I'm proposing we have 5 people. TOTAL. 5 trusted people, to count all the ballots. For a presidential election, that's 120 million ballots, if a counter can do 1 a second, that's 3.8 years (because each counter has to look at all the ballots.

Sure, if you want to get more counters, you could do that quicker, but every time you bring more people into the process, you make it more likely that George Soros can bribe enough counters to throw the election.

BTW, remember that those same 120 million voters also voted for a dozen other elections, all of which have to be counted.

Last thing, and I'm done. As you may know, there are two small towns in New Hampshire that have town meetings to cast their presidential ballots, they vote on paper, and they count the votes right at midnight. So they are the first to report.

In 2004, here is the newspaper report of their vote:
HART’S LOCATION, N.H. - The nation’s first Election Day votes were cast and counted just after midnight Tuesday in this mountain hamlet, with President Bush and John Kerry each receiving 15 votes. Ralph Nader received one.

HERE is their official results:
Bush-16, Kerry-14, Nader-1.

Turns out they miscounted the ballots, and only caught the error the next day.

When a town can't manually count 31 ballots without making a mistake, what chance is there that you could count 120 million ballots and get a better result than we get with flawed electronic equipment?

Would you ever count a million pennies by hand?


41 posted on 01/26/2007 9:02:21 AM PST by CharlesWayneCT
[ Post Reply | Private Reply | To 27 | View Replies]

To: lifelong_republican
"what is being used where you vote now?"

I have been away from the US for the last 2 years.
When I last voted in rural Tennessee, 2004, the county had the same machines as I worked on in Memphis back in the 60s, except these were manual power with a long lever that you pulled to close the curtains and to reset the vote levers when you exited.
In the city, most were the same, but motor driven.
42 posted on 01/26/2007 9:52:12 AM PST by AlexW (Reporting from Bratislava, Slovakia)
[ Post Reply | Private Reply | To 37 | View Replies]

To: lifelong_republican
An oldie but a goodie...

I agree with Mr. Schneier completely on how electronic voting machines should work. 

November 10, 2004

The Problem with Electronic Voting Machines

In the aftermath of the U.S.’s 2004 election, electronic voting machines are again in the news. Computerized machines lost votes, subtracted votes instead of adding them, and doubled votes. Because many of these machines have no paper audit trails, a large number of votes will never be counted. And while it is unlikely that deliberate voting-machine fraud changed the result of the presidential election, the Internet is buzzing with rumors and allegations of fraud in a number of different jurisdictions and races. It is still too early to tell if any of these problems affected any individual elections. Over the next several weeks we'll see whether any of the information crystallizes into something significant.

The U.S has been here before. After 2000, voting machine problems made international headlines. The government appropriated money to fix the problems nationwide. Unfortunately, electronic voting machines -- although presented as the solution -- have largely made the problem worse. This doesn’t mean that these machines should be abandoned, but they need to be designed to increase both their accuracy, and peoples’ trust in their accuracy. This is difficult, but not impossible.

Before I can discuss electronic voting machines, I need to explain why voting is so difficult. Basically, a voting system has four required characteristics:

  1. Accuracy. The goal of any voting system is to establish the intent of each individual voter, and translate those intents into a final tally. To the extent that a voting system fails to do this, it is undesirable. This characteristic also includes security: It should be impossible to change someone else’s vote, ballot stuff, destroy votes, or otherwise affect the accuracy of the final tally.
  2. Anonymity. Secret ballots are fundamental to democracy, and voting systems must be designed to facilitate voter anonymity.
  3. Scalability. Voting systems need to be able to handle very large elections. One hundred million people vote for president in the United States. About 372 million people voted in India’s June elections, and over 115 million in Brazil’s October elections. The complexity of an election is another issue. Unlike many countries where the national election is a single vote for a person or a party, a United States voter is faced with dozens of individual election: national, local, and everything in between.
  4. Speed. Voting systems should produce results quickly. This is particularly important in the United States, where people expect to learn the results of the day’s election before bedtime. It’s less important in other countries, where people don’t mind waiting days -- or even weeks -- before the winner is announced.

Through the centuries, different technologies have done their best. Stones and pot shards dropped in Greek vases gave way to paper ballots dropped in sealed boxes. Mechanical voting booths, punch cards, and then optical scan machines replaced hand-counted ballots. New computerized voting machines promise even more efficiency, and Internet voting even more convenience.

But in the rush to improve speed and scalability, accuracy has been sacrificed. And to reiterate: accuracy is not how well the ballots are counted by, for example, a punch-card reader. It’s not how the tabulating machine deals with hanging chads, pregnant chads, or anything like that. Accuracy is how well the process translates voter intent into properly counted votes.

Technologies get in the way of accuracy by adding steps. Each additional step means more potential errors, simply because no technology is perfect. Consider an optical-scan voting system. The voter fills in ovals on a piece of paper, which is fed into an optical-scan reader. The reader senses the filled-in ovals and tabulates the votes. This system has several steps: voter to ballot to ovals to optical reader to vote tabulator to centralized total.

At each step, errors can occur. If the ballot is confusing, then some voters will fill in the wrong ovals. If a voter doesn’t fill them in properly, or if the reader is malfunctioning, then the sensor won’t sense the ovals properly. Mistakes in tabulation -- either in the machine or when machine totals get aggregated into larger totals -- also cause errors. A manual system -- tallying the ballots by hand, and then doing it again to double-check -- is more accurate simply because there are fewer steps.

The error rates in modern systems can be significant. Some voting technologies have a 5% error rate: one in twenty people who vote using the system don’t have their votes counted properly. This system works anyway because most of the time errors don’t matter. If you assume that the errors are uniformly distributed -- in other words, that they affect each candidate with equal probability -- then they won’t affect the final outcome except in very close races. So we’re willing to sacrifice accuracy to get a voting system that will more quickly handle large and complicated elections. In close races, errors can affect the outcome, and that’s the point of a recount. A recount is an alternate system of tabulating votes: one that is slower (because it’s manual), simpler (because it just focuses on one race), and therefore more accurate.

Note that this is only true if everyone votes using the same machines. If parts of town that tend to support candidate A use a voting system with a higher error rate than the voting system used in parts of town that tend to support candidate B, then the results will be skewed against candidate A. This is an important consideration in voting accuracy, although tangential to the topic of this essay.

With this background, the issue of computerized voting machines becomes clear. Actually, “computerized voting machines” is a bad choice of words. Many of today’s voting technologies involve computers. Computers tabulate both punch-card and optical-scan machines. The current debate centers around all-computer voting systems, primarily touch-screen systems, called Direct Record Electronic (DRE) machines. (The voting system used in India’s most recent election -- a computer with a series of buttons -- is subject to the same issues.) In these systems the voter is presented with a list of choices on a screen, perhaps multiple screens if there are multiple elections, and he indicates his choice by touching the screen. These machines are easy to use, produce final tallies immediately after the polls close, and can handle very complicated elections. They also can display instructions in different languages and allow for the blind or otherwise handicapped to vote without assistance.

They’re also more error-prone. The very same software that makes touch-screen voting systems so friendly also makes them inaccurate. And even worse, they’re inaccurate in precisely the worst possible way.

Bugs in software are commonplace, as any computer user knows. Computer programs regularly malfunction, sometimes in surprising and subtle ways. This is true for all software, including the software in computerized voting machines. For example:

In Fairfax County, VA, in 2003, a programming error in the electronic voting machines caused them to mysteriously subtract 100 votes from one particular candidates’ totals.

In San Bernardino County, CA in 2001, a programming error caused the computer to look for votes in the wrong portion of the ballot in 33 local elections, which meant that no votes registered on those ballots for that election. A recount was done by hand.

In Volusia County, FL in 2000, an electronic voting machine gave Al Gore a final vote count of negative 16,022 votes.

The 2003 election in Boone County, IA, had the electronic vote-counting equipment showing that more than 140,000 votes had been cast in the Nov. 4 municipal elections. The county has only 50,000 residents and less than half of them were eligible to vote in this election.

There are literally hundreds of similar stories.

What’s important about these problems is not that they resulted in a less accurate tally, but that the errors were not uniformly distributed; they affected one candidate more than the other. This means that you can’t assume that errors will cancel each other out and not affect the election; you have to assume that any error will skew the results significantly.

Another issue is that software can be hacked. That is, someone can deliberately introduce an error that modifies the result in favor of his preferred candidate. This has nothing to do with whether the voting machines are hooked up to the Internet on election day. The threat is that the computer code could be modified while it is being developed and tested, either by one of the programmers or a hacker who gains access to the voting machine company’s network. It’s much easier to surreptitiously modify a software system than a hardware system, and it’s much easier to make these modifications undetectable.

A third issue is that these problems can have further-reaching effects in software. A problem with a manual machine just affects that machine. A software problem, whether accidental or intentional, can affect many thousands of machines -- and skew the results of an entire election.

Some have argued in favor of touch-screen voting systems, citing the millions of dollars that are handled every day by ATMs and other computerized financial systems. That argument ignores another vital characteristic of voting systems: anonymity. Computerized financial systems get most of their security from audit. If a problem is suspected, auditors can go back through the records of the system and figure out what happened. And if the problem turns out to be real, the transaction can be unwound and fixed. Because elections are anonymous, that kind of security just isn’t possible.

None of this means that we should abandon touch-screen voting; the benefits of DRE machines are too great to throw away. But it does mean that we need to recognize its limitations, and design systems that can be accurate despite them.

Computer security experts are unanimous on what to do. (Some voting experts disagree, but I think we’re all much better off listening to the computer security experts. The problems here are with the computer, not with the fact that the computer is being used in a voting application.) And they have two recommendations:

  1. DRE machines must have a voter-verifiable paper audit trails (sometimes called a voter-verified paper ballot). This is a paper ballot printed out by the voting machine, which the voter is allowed to look at and verify. He doesn’t take it home with him. Either he looks at it on the machine behind a glass screen, or he takes the paper and puts it into a ballot box. The point of this is twofold. One, it allows the voter to confirm that his vote was recorded in the manner he intended. And two, it provides the mechanism for a recount if there are problems with the machine.
  2. Software used on DRE machines must be open to public scrutiny. This also has two functions. One, it allows any interested party to examine the software and find bugs, which can then be corrected. This public analysis improves security. And two, it increases public confidence in the voting process. If the software is public, no one can insinuate that the voting system has unfairness built into the code. (Companies that make these machines regularly argue that they need to keep their software secret for security reasons. Don’t believe them. In this instance, secrecy has nothing to do with security.)

Computerized systems with these characteristics won’t be perfect -- no piece of software is -- but they’ll be much better than what we have now. We need to start treating voting software like we treat any other high-reliability system. The auditing that is conducted on slot machine software in the U.S. is significantly more meticulous than what is done to voting software. The development process for mission-critical airplane software makes voting software look like a slapdash affair. If we care about the integrity of our elections, this has to change.

Proponents of DREs often point to successful elections as “proof” that the systems work. That completely misses the point. The fear is that errors in the software -- either accidental or deliberately introduced -- can undetectably alter the final tallies. An election without any detected problems is no more a proof the system is reliable and secure than a night that no one broke into your house is proof that your door locks work. Maybe no one tried, or maybe someone tried and succeeded...and you don’t know it.

Even if we get the technology right, we still won’t be done. If the goal of a voting system is to accurately translate voter intent into a final tally, the voting machine is only one part of the overall system. In the 2004 U.S. election, problems with voter registration, untrained poll workers, ballot design, and procedures for handling problems resulted in far more votes not being counted than problems with the technology. But if we’re going to spend money on new voting technology, it makes sense to spend it on technology that makes the problem easier instead of harder.

 

43 posted on 01/26/2007 10:10:59 AM PST by zeugma (If the world didn't suck, we'd all fall off.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JenB

That's my point. The paper ballot that is reviewed by the voter is the ballot that is counted. Not some phantom electronic record. In addition that paper ballot can be produced in such a way that it is both easy for the voter to review and for a machine to read for the official vote tally and recount if required.

The electronic record could be used as a cross check against the official paper ballot count to see if a recount might be warranted. But the paper ballot remains the primary official record which has been verified by the voter at the time he or she voted.


44 posted on 01/26/2007 2:17:28 PM PST by DB
[ Post Reply | Private Reply | To 30 | View Replies]

To: lifelong_republican
"The electronic 'voting' systems involve computers and networks, and there are reliability and security issues with the processors as well as with the direct, wireless, and internet connections used with them."

Sorry, I was in a hurry yesterday, and did not elaborate.

Electronic machines do not have to, and should not connect to the internet. They have been made too complicated.
Simple desktop computer technology of the 80s is more then enough to make a reliable vote tabulating machine.
When the polls close, it should take nothing more then a phone call to give the results, followed by a paper certification delivered to the election office.

The real vote problem is that the PC crowd has made it so hard to challenge illegal voters.
This is nothing new, as we know that dead people in Chicago put JFK in office.

In my area, it was no problem. The poll workers knew me, and were opening the book to my records as I walked in the door.
In big cities, however, it amazes me that anyone can walk in off the street and say he is "John Brown" and not have to show any ID.
There seems to be no system to purge dead people, or those that move away, and a deliberate attempt to let leftist scum
vote with just a wink and a nod.
45 posted on 01/27/2007 12:27:48 AM PST by AlexW (Reporting from Bratislava, Slovakia)
[ Post Reply | Private Reply | To 34 | View Replies]

To: Gritty

The electronics make it much easier for the corrupt Democrats to rig elections and get away with it.


46 posted on 01/27/2007 3:54:07 AM PST by lifelong_republican (Valid Elections: The Idea of America)
[ Post Reply | Private Reply | To 39 | View Replies]

To: relictele

A lot of seniors don't normally use computers and shouldn't be forced to do it to vote, especially when the computers are so unreliable.


47 posted on 01/27/2007 3:55:43 AM PST by lifelong_republican (Valid Elections: The Idea of America)
[ Post Reply | Private Reply | To 40 | View Replies]

To: CharlesWayneCT

It's far easier to secure physical ballots than electronics, and it's beneficial to Americans to give them added incentives to participate in the vote-counting process. The physical ballots allow for audits and recounts where the electronics do not.


48 posted on 01/27/2007 3:57:15 AM PST by lifelong_republican (Valid Elections: The Idea of America)
[ Post Reply | Private Reply | To 41 | View Replies]

To: AlexW

Thanks for your descriptions. Those seem to be the same lever machines formerly used in PA, too.

There are probably now electronics in that polling place.


49 posted on 01/27/2007 3:59:14 AM PST by lifelong_republican (Valid Elections: The Idea of America)
[ Post Reply | Private Reply | To 42 | View Replies]

To: zeugma; All

Thank you so much for your excellent reference!


50 posted on 01/27/2007 4:02:44 AM PST by lifelong_republican (Valid Elections: The Idea of America)
[ Post Reply | Private Reply | To 43 | View Replies]

To: AlexW

Your comments are interesting. The 'voting' systems use wireless and other internet connections, and I agree with you that they shouldn't.

The unreliability and vulnerability problems exist even before the connectivity is considered.

Voter ID doesn't matter at all, now, since the electronics can be manipulated even if all the voters are identified correctly, though.


51 posted on 01/27/2007 4:05:29 AM PST by lifelong_republican (Valid Elections: The Idea of America)
[ Post Reply | Private Reply | To 45 | View Replies]

To: lifelong_republican

Diebold says that a seal would have to be broken after the machine was opened with the master key. But why bother with a key at all then, why not just the seal?

Of course a machine turning up with a broken seal would invalidate all the votes it took, suggesting a means of sabotaging votes if not garnering fraudulent votes.


52 posted on 01/27/2007 4:11:24 AM PST by HiTech RedNeck
[ Post Reply | Private Reply | To 1 | View Replies]

To: lifelong_republican
Noting that anyone opening a device with a duplicated key would have to break a seal on the machine to access the lock, Radke said the unauthorized entry would be detected.

"These are people that don't have election experience making some of these comments," he said.


Of course, it would be noticed, but that little fact is ignored by those afraid of technology.
53 posted on 01/27/2007 4:17:22 AM PST by Reform4Bush
[ Post Reply | Private Reply | To 1 | View Replies]

To: HiTech RedNeck

Thank you. You make an excellent point. There is no way to show that evidence of tampering didn't result in tampering.


54 posted on 01/27/2007 4:31:18 AM PST by lifelong_republican (Valid Elections: The Idea of America)
[ Post Reply | Private Reply | To 52 | View Replies]

To: lifelong_republican
The electronics make it much easier for the corrupt Democrats to rig elections and get away with it.

Unquestionably!

They don't leave "hanging chads" when punching through a stack of a hundred punch cards.

55 posted on 01/27/2007 6:27:16 AM PST by Gritty (One misconception about us is we're godless and don't have any values - Howard Dean)
[ Post Reply | Private Reply | To 46 | View Replies]

To: lifelong_republican
Thank you so much for your excellent reference!

Any time. Mr. Schneier wrote the book "Applied Cryptography", which is the bible for folks who are looking for a start in anything crypto-related. I respect his opinion on security, especially where it concerns computers a lot.

56 posted on 01/27/2007 2:38:51 PM PST by zeugma (If the world didn't suck, we'd all fall off.)
[ Post Reply | Private Reply | To 50 | View Replies]

To: Reform4Bush

Those who point out the flaws in the electronic 'voting' systems are anything but afraid of the technology.


57 posted on 01/29/2007 4:31:36 PM PST by lifelong_republican (Valid Elections: The Idea of America)
[ Post Reply | Private Reply | To 53 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-57 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson