Inside A U.S. Election Vote Counting Program
By Bev Harris*
* Bev Harris is the Author
of the soon to be published book " Black Box Voting:
Ballot Tampering In The 21st Century "
http://www.blackboxvoting.com>
http://www.blackboxvoting.com
*** NEW *** FOLLOW UP STORY
Bald-Faced Lies About Black Box Voting Machines
and
The Truth About the Rob-Georgia FileIMPORTANT
NOTE: Publication of this story marks a watershed in American political history. It is offered freely for publication in full or part on any and all internet forums,blogs and noticeboards. All other media are also encouraged to utilise material. Readers are encouraged to forward this to friends and acquaintances in the United States and elsewhere.CONTENTS
Introduction
Part 1 - Can the votes be changed?
Part 2 - Can the password be bypassed?
Part 3 – Can the audit log be altered?
*************
According to election industry officials, electronic voting systems are absolutely secure, because they are protected by passwords and tamperproof audit logs. But the passwords can easily be bypassed, and in fact the audit logs can be altered. Worse, the votes can be changed without anyone knowing, even the County Election Supervisor who runs the election system.
The computer programs that tell electronic voting machines how to record and tally votes are allowed to be held as "trade secrets." Can citizen's groups examine them? No. The companies that make these machines insist that their mechanisms are a proprietary secret. Can citizen's groups, or even election officials, audit their accuracy? Not at all, with touch screens, and rarely, with optical scans, because most state laws mandate that optical scan paper ballots be run through the machine and then sealed into a box, never to be counted unless there is a court order. Even in recounts, the ballots are just run through the machine again. Nowadays, all we look at is the machine tally.
Therefore, when I found that Diebold Election Systems had been storing 40,000 of its files on an open web site, an obscure site, never revealed to public interest groups, but generally known among election industry insiders, and available to any hacker with a laptop, I looked at the files. Having a so-called security-conscious voting machine manufacturer store sensitive files on an unprotected public web site, allowing anonymous access, was bad enough, but when I saw what was in the files my hair turned gray. Really. It did.
The contents of these files amounted to a virtual handbook for vote-tampering: They contained diagrams of remote communications setups, passwords, encryption keys, source code, user manuals, testing protocols, and simulators, as well as files loaded with votes and voting machine software.
Diebold Elections Systems AccuVote systems use software called "GEMS," and this system is used in 37 states. The voting system works like this:
Voters vote at the precinct, running their ballot through an optical scan, or entering their vote on a touch screen.
After the polls close, poll workers transmit the votes that have been accumulated to the county office. They do this by modem.
At the county office, there is a "host computer" with a program on it called GEMS.
GEMS receives the incoming votes and stores them in a vote ledger. But in the files we examined, which were created by Diebold employees and/or county officials, we learned that the Diebold program used another set of books with a copy of what is in vote ledger 1. And at the same time, it made yet a third vote ledger with another copy.
Apparently, the Elections Supervisor never sees these three sets of books. All she sees is the reports she can run: Election summary (totals, county wide) or a detail report (totals for each precinct). She has no way of knowing that her GEMS program is using multiple sets of books, because the GEMS interface draws its data from an Access database, which is hidden.
And here is what is quite odd: On the programs we tested, the Election summary (totals, county wide) come from the vote ledger 2 instead of vote ledger 1, and ledger 2 can be altered so it may or may not match ledger 1.
Now, think of it like this: You want the report to add up only the actual votes. But, unbeknownst to the election supervisor, votes can be added and subtracted from vote ledger 2. Official reports come from vote ledger 2, which has been disengaged from vote ledger 1.
If one asks for a detailed report for some precincts, though, the report comes from vote ledger 1. Therefore, if you keep the correct votes in vote ledger 1, a spot check of detailed precincts (even if you compare voter-verified paper ballots) will always be correct.
And what is vote ledger 3 for? For now, we are calling it the "Lord Only Knows" vote ledger.
*************
Detailed Examination Of Diebold GEMS Voting Machine Security ( Part 1)
Here's what we're going to do: We'll go in and run a totals report, so you can see what the Election Supervisor sees. Then we'll tamper with the votes. I'll show you that our tampering appears in Table 2, but not Table 1. Then we'll go back and run another totals report, and you'll see that it contains the tampered votes from Table 2. Remember that there are two programs: The GEMS program, which the Election Supervisor sees, and the Microsoft Access database that stores the votes, which she cannot see.
Let's run a report on the Max Cleland/Saxby Chambliss race. (This is an example, and does not contain the real data.) Here is what the Totals Report will look like in GEMS:![]()
As it stands, Cleland is stomping Chambliss. Let's make it more exciting.
The GEMS election file contains more than one "set of books." They are hidden from the person running the GEMS program, but you can see them if you go into Microsoft Access.
You might look at it like this: Suppose you have votes on paper ballots, and you pile all the paper ballots in room one. Then, you make a copy of all the ballots and put the stack of copies in room 2.
You then leave the door open to room 2, so that people can come in and out, replacing some of the votes in the stack with their own.
You could have some sort of security device that would tell you if any of the copies of votes in room 2 have been changed, but you opt not to.
Now, suppose you want to count the votes. Should you count them from room 1 (original votes)? Or should you count them from room 2, where they may or may not be the same as room 1? What Diebold chose to do in the files we examined was to count the votes from "room2."
Illustration:
If an intruder opens the GEMS program in Microsoft Access, they will find that each candidate has an assigned number:![]()
One can then go see how many votes a candidate has by visiting "room 1" which is called the CandidateCounter:![]()
In the above example, "454" represents Max Cleland and "455" represents Saxby Chambliss.
Now let's visit Room2, which has copies of Room1. You can find it in an Access table called SumCandidateCounter:![]()
Now let's put our own votes in Room2. We'll put Chambliss ahead by a nose, by subtracting 100 from Cleland and adding 100 to Chambliss. Always add and delete the same number of votes, so the number of voters won't change.![]()
Notice that we have only tampered with the votes in "Room 2." In Room 1, they remain the same. Room 1, after tampering with Room 2:
![]()
Now let's run a report again. Go into GEMS and run the totals report. Here's what it looks like now:![]()
Now, the above example is for a simple race using just one precinct. If you run a detail report, you'll see that the precinct report pulls the untampered data, while the totals report pulls the tampered data. This would allow a precinct to pass a spot check.
*************
Detailed Examination Of Diebold GEMS Voting Machine Security ( Part 2)
CAN THE PASSWORD BE BYPASSED?
At least a dozen full installation versions of the GEMS program were available on the Diebold ftp site. The manual, also available on the ftp site, tells that the default password in a new installation is "GEMSUSER." Anyone who downloaded and installed GEMS can bypass the passwords in elections. In this examination, we installed GEMS, clicked "new" and made a test election, then closed it and opened the same file in Microsoft Access.
One finds where they store the passwords by clicking the "Operator" table.![]()
Anyone can copy an encrypted password from there, go to an election database, and paste it into that.
Example: Cobb County Election file
One can overwrite the "admin" password with another, copied from another GEMS installation. It will appear encrypted; no worries, just cut and paste. In this example, we saved the old "admin" password so we could replace it later and delete the evidence that we'd been there. An intruder can grant himself administrative privileges by putting zeros in the other boxes, following the example in "admin."![]()
How many people can gain access? A sociable election hacker can give all his friends access to the database too! In this case, they were added in a test GEMS installation and copied into the Cobb County Microsoft Access file. It encrypted each password as a different character string, however, all the passwords are the same word: "password." Password replacement can also be done directly in Access. To assess how tightly controlled the election files really are, we added 50 of our friends; so far, we haven't found a limit to how many people can be granted access to the election database.![]()
Using this simple way to bypass password security, an intruder, or an insider, can enter GEMS programs and play with election databases to their heart's content.
*************
Detailed Examination Of Diebold GEMS Voting Machine Security ( Part 3)
CAN THE AUDIT TRAIL BE ALTERED?
Britain J. Williams, Ph.D., is the official voting machine certifier for the state of Georgia, and he sits on the committee that decides how voting machines will be tested and evaluated. Here's what he had to say about the security of Diebold voting machines, in a letter dated April 23, 2003:
"Computer System Security Features: The computer portion of the election system contains features that facilitate overall security of the election system. Primary among these features is a comprehensive set of audit data. For transactions that occur on the system, a record is made of the nature of the transaction, the time of the transaction, and the person that initiated the transaction. This record is written to the audit log. If an incident occurs on the system, this audit log allows an investigator to reconstruct the sequence of events that occurred surrounding the incident.
In addition, passwords are used to limit access to the system to authorized personnel."
Since Dr. Williams listed the audit data as the primary security feature, we decided to find out how hard it is to alter the audit log.
Here is a copy of a GEMS audit report.![]()
Note that a user by the name of "Evildoer" was added. Evildoer performed various functions, including running reports to check his vote-rigging work, but only some of his activities showed up on the audit log.
It was a simple matter to eliminate Evildoer. First, we opened the election database in Access, where we opened the audit table:![]()
Then, we deleted all the references to Evildoer and, because we noticed that the audit log never noticed when the admin closed the GEMS program before, we tidily added an entry for that.
![]()
Access encourages those who create audit logs to use auto-numbering, so that every logged entry has an uneditable log number. Then, if one deletes audit entries, a gap in the numbering sequence will appear. However, we found that this feature was disabled, allowing us to write in our own log numbers. We were able to add and delete from the audit without leaving a trace.
Going back into GEMS, we ran another audit log to see if Evildoer had been purged:
![]()
As you can see, the audit log appears pristine.
In fact, when using Access to adjust the vote tallies we found that tampering never made it to the audit log at all.
Although we interviewed election officials and also the technicians who set up the Diebold system in Georgia, and they confirmed that the GEMS system does use Microsoft Access, is designed for remote access, and does receive "data corrections" from time to time from support personnel, we have not yet had the opportunity to test the above tampering methods in the County Election Supervisor's office.
From a programming standpoint, there might be reasons to have a special vote ledger that disengages from the real one. For example, election officials might say they need to be able to alter the votes to add provisional ballots or absentee ballots. If so, this calls into question the training of these officials, which appears to be done by The Election Center, under the direction of R. Doug Lewis. If election officials are taught to deal with changes by overwriting votes, regardless of whether they do this in vote ledger 1 or vote ledger 2, this is improper.
If changing election data is required, the corrective entry must be made not by overwriting vote totals, but by making a corrective entry. When adding provisional ballots, for example, the proper procedure is to add a line item "provisional ballots," and this should be added into the original vote table (Table 1). It is never acceptable to make changes by overwriting vote totals. Data corrections should not be prohibited, but must always be done by indicating changes through a clearly marked line item that preserves each transaction.
Proper bookkeeping never allows an extra ledger that can be used to just erase the original information and add your own. And certainly, it is improper to have the official reports come from the second ledger, which may or may not have information erased or added.
But there is more evidence that these extra sets of books are illicit: If election officials were using Table 2 to add votes, for provisional ballots, or absentee voters, that would be in their GEMS program. It makes no sense, if that's what Diebold claims the extra set of books is for, to make vote corrections by sneaking in through the back door and using Access, which according to the manual is not even installed on the election official's computer.
Furthermore, if changing Table 2 was an acceptable way to adjust for provisional ballots and absentee votes, we would see the option in GEMS to print a report of both Table 1 totals and Table 2 so that we can compare them. Certainly, if that were the case, that would be in the manual along with instructions that say to compare Table 1 to Table 2, and, if there is any difference, to make sure it exactly matches the number of absentee ballots, or whatever, were added.
Using Microsoft Access was inappropriate for security reasons. Using multiple sets of books, and/or altering vote totals to include new data, is improper for accounting reasons. And, as a member of slashdot.org commented, "This is not a bug, it's a feature."
Purging voter lists is just the beginning: the U.S. has embraced a form of electronic voting that is unreliable, unverifiable and funded by the radical Christian right.
By Sandeep S. Atwal
ES&S, Diebold and Sequoia may not be household names like Enron or Arthur Andersen, but these three companies will decide America's next president. In the 2004 presidential election, the full effect of electronic voting will be felt for the first time and these are the companies that will report the majority of the results.
Despite assurances from the corporations that own these machines, the reliability of electronic voting is under intense criticism. One of the most comprehensive examinations of electronic voting fraud came from brothers James and Kenneth Collier. In their 1992 book Votescam: The Stealing of America, the brothers detailed the long history of voting fraud over the past twenty-five years with a special focus on voting machines. American politicians and large media outlets have ignored their book, and their charges remain unanswered.
Now, their concerns are being echoed by a new group of writers, journalists and activists who have raised alarming and explosive details about electronic voting in America. While academics such as Professors Rebecca Mercuri and David Dill and organizations like the Association for Computing Machinery have carefully documented how voting systems are vulnerable to fraudulent manipulation, journalists Lynn Landes, Jerry Bowles and Bev Harris are alerting Americans to an electronic coup d'etat in the making. If their charges are true, and there is little evidence to contradict their claims, George W. Bush has already won the 2004 election.
Florida's Folly Goes National
"Given the outcome of our work in Florida and with a new president in place, we think our services will expand across the country."
-- Martin L. Fagan, ChoicePoint Vice-President
To understand how George W. Bush will win the next presidential election, it helps to understand how he won the last one. While all public attention rested on hanging chads, butterfly ballots and a skewed recount in the wake of the 2000 Presidential election, the root of the problem has been overlooked. As investigative reporter Greg Palast uncovered, the state of Florida purged over 90,000 people from their list of eligible voters under the guise that they were felons. In fact, almost none of the disenfranchised voters were felons...but almost all were blacks or democrats.
Palast's investigation revealed that at the heart of this ethnic cleansing of voter lists was the creation of a new centralized database for the state of Florida. In 1999, the state fired the company they were paying to compile their "scrub" lists and gave the job to Database Technologies (DBT, now ChoicePoint). DBT, a private firm known to have strong Republican ties was paid $2.3 million to do the same job that had previously been done for $5,700.
The first list of felons from DBT included 8,000 names of felons from Texas supplied by George Bush's state officials. The state government said they were all felons, and thus barred from voting under federal law. Local officials complained about the list and DBT issued a new one, this time naming 58,000 felons. Palast discovered that the one county that went through the process of checking the new list name by name found it was 95% wrong.
Because of the way DBT compiled its erroneous list, Florida voters whose names were similar to out-of-state felons were barred from voting. An Illinois felon named John Michaels could knock off Florida voters John, Johnny, Jonathan or Jon R. Michaels.
DBT didn't get names, birthdays or social security numbers right, but they were matched for race, so a felon named Joe Green only knocked off a black Joe Green, but not a white person with the same name. There was no need to guess about the race of the disenfranchised: a voter's race is listed next to his or her name in many Southern states including Florida because racial ID is required by the Voting Rights Act of 1965.

DBT's fee of $2.3 million was supposed to include verification that the individuals on their list were actually felons, but Palast's investigation showed that DBT could not provide any evidence that they made a single phone call to verify the identity of the names scrubbed prior to the 2000 Presidential Election.
Unfortunately, nothing is preventing this purge from taking place again on a national scale. Due in large part to the attention paid to butterfly ballots and hanging chads in the fall of 2000, the new Help America Vote Act (HAVA) demands that every state replicate Florida's system of centralized, computerized voter files before the 2004 election, presumably to avoid the paper-ballot confusion of the Florida recount. Martin Luther King III and Greg Palast recently co-authored a piece on the dangers of such databases, recalling the Florida debacle. Their conclusion: "Jim Crow has moved into cyberspace -- harder to detect, craftier in operation, shifting shape into the electronic guardian of a new electoral segregation."
ChoicePoint already has contracts with numerous states to provide electronic voter lists purged of supposed felons. They are a natural choice as one of the U.S.'s largest database companies. ChoicePoint provides information on federal criminal records by district for 43 states and also provides online access to more than 63 million criminal records for all fifty states. Who better to provide HAVA-mandated voter lists to state governments?
You Voted Republican, Trust Us
"It's not the voting that's democracy, it's the counting."
-- Tom Stoppard, 1972
Purged voter lists are only one method of pre-determining the outcome of an election. An even more serious problem lies inside the voting machines themselves. While representatives of Diebold, ES&S and Sequoia herald the benefits of their systems, not everyone shares their enthusiasm. Dr. Rebecca Mercuri is an Assistant Professor of Computer Science at Bryn Mawr College and has been referred to as "the leading independent expert on electronic voting technology." Shortly before the 2000 Presidential election, Mercuri defended her Ph.D. dissertation on the subject of "Electronic Vote Tabulation: Checks and Balances" at the Engineering School of the University of Pennsylvania.
Mercuri's website is an astonishing checklist of the lack of safeguards and other failings that plague the current crop of electronic voting systems. One of Mercuri's primary concerns is that electronic systems provide no way for a voter, or election officials, to verify that a cast ballot corresponds to the vote being recorded. As Mercuri notes on her site, "Any programmer can write code that displays one thing on a screen, records something else, and prints yet another result." There is no known way to ensure that this is not happening inside of a voting system. Companies such as Diebold, ES&S and Sequoia, which manufacture the machines and provide the code that runs them, simply take a "trust us" approach.
Mercuri also reports that no electronic voting system has been certified to even the lowest level of the U.S. government or international computer security standards such as the ISO Common Criteria, nor are they required to comply with such standards. Thus, no current electronic voting system is secure by the U.S. government's own standards.
Electronic voting systems without individual printouts for examination by voters do not provide an independent audit trail. All voting systems can make mistakes and the ability to perform manual hand-counts of ballots is the only way to verify results. Computer glitches are already cropping up all across the United States. Numerous irregularities with electronic voting machines have already been reported:
Federally mandated voting machines, almost exclusively manufactured by ES&S, Diebold and Sequoia are being constructed and tested under obsolete FEC recommendations. The US has authorized spending of over four billion dollars on new voting equipment, but as Mercuri notes, "failed to require or enforce adequate security, usability, reliability, and auditability controls over the products being purchased." The numerous flaws cited above ably demonstrate Mercuri's point.
Her concerns are echoed by Professor David Dill from Stanford University. He has created a resolution warning of the dangers of electronic voting machines. "Do not be seduced by the apparent convenience of "touch-screen voting" machines, or the "gee whiz" factor that accompanies flashy new technology," he writes. "Using these machines is tantamount to handing complete control of vote counting to a private company, with no independent checks or audits. These machines represent a serious threat to democracy."
Chuck Hagel and Nebraska's Upset
"If you want to win the election, just control the machines."
-- Charlie Matulka, Nebraska Senatorial Candidate
Chuck Hagel first ran for the U.S. Senate in Nebraska in 1996. Electronic voting machines owned by Election Systems & Software (ES&S) reported that he had won both the primaries and the general election in unprecedented victories. His 1996 victory was considered one of the biggest upsets of that election. He was the first Republican to win a Nebraska senatorial campaign in 24 years and won virtually every demographic group, including many largely black communities that had never before voted Republican.
Six years later Hagel ran again against Democrat Charlie Matulka in 2002, and won in a landslide. He was re-elected to his second term with 83% of the vote: the biggest political victory in the history of Nebraska. Again, the votes were counted by ES&S, now the largest voting machine company in America.
While these victories could be dismissed simply as a Republican upset, a January 2003 article in the independent Washington paper The Hill revealed interesting details about Hagel's business investments and casts a different light on his election successes. Chuck Hagel was CEO of ES&S (then AIS) until 1995 and he is still a major stockholder of the parent company of ES&S, McCarthy & Company. Hagel resigned as CEO of ES&S to run for the Senate and resigned as president of the parent company McCarthy & Company following his election (where he remains a major investor).
Today, the McCarthy Group is run by Michael McCarthy, who happens to be Chuck Hagel's treasurer. Hagel's financials still list the McCarthy Group as an asset, with his investment valued at $1-$5 million. Campaign finance reports show that Michael McCarthy also served as treasurer for Hagel until December of 2002.
ES&S also has a connection to the Bush family. Jeb Bush's first choice as running mate in 1998 was Sandra Mortham who was a paid lobbyist for ES&S and received a commission for every county that bought its touch-screen machines.
The Hill's revelations of Hagel's conflict of interest was disturbing enough to cause Jan Baran, one of the most powerful Republican lawyers in Washington D.C., and Lou Ann Linehan, Senator Chuck Hagel's Chief of Staff, to walk into The Hill's offices to "discuss" the story. According to the author of the article, Alex Bolton, nothing similar had happened in the three-and-a-half years he's worked for the paper. It was, no doubt, a story Hagel would rather see go unreported.
Helping America Vote Right
"The Christian worldview is the answer. We need Christian statesmen who press for the Crown Rights of Jesus Christ in all areas of life. This isn't political salvation or an overnight fix. It will take decades of mobilization and confrontation to undo a century of godless socialism. It must be a grassroots movement that starts in individual families and churches and then moves outward to take dominion. It must encompass every area of life and not just the political arena. Finally, it must start soon, for there isn't much time left. The Florida elections have taught us that the Democrats with their liberal/socialistic worldview will stop at nothing to seize control of the government."
-- Dr. Val Finnell, published by the Chalcedon Institute
If the connections between Hagel and ES&S seem suspect, the origins of America's largest electronic voting machine companies may be just as distressing, especially for those who venerate the separation of church and state. The convoluted system of renaming and buyouts of America's voting system companies is a complicated story. However, once the various corporate trails have been followed, a disturbing picture comes into focus.
Brothers Bob and Todd Urosevich founded American Information Systems. Bob is currently president of Diebold and Todd Urosevich is Vice President, Aftermarket Sales of ES&S. (In 1999, American Information Systems, purchased Business Records Corp to become ES&S.)
American Information Systems (AIS) was primarily funded with money from Ahmanson brothers, William and Robert, of the Howard F. Ahmanson Co. The majority stake in ES&S is still owned by Howard F. Ahmanson and the Ahmanson Foundation
Howard Ahmanson belongs to Council for National Policy, a hard right wing organization and also helps finance The Chalcedon Institute. As the institute's own site reports, Chalcedon is a "Christian educational organization devoted to research, publishing, and promoting Christian reconstruction in all areas of life... Our emphasis on the Cultural or Dominion Mandate (Genesis 1:28) and the necessity of a return to Biblical Law has been a crucial factor in the challenge to Humanism by Christians in this country and elsewhere..." Chalcedon promotes Christian Reconstructionism, which mandates Christ's dominion over the entire world. The organization's purpose is to establish Old Testament Biblical law as the standard for society.
Solutions and Alternatives
Few individuals who are trying to alert citizens to the dangers of electronic voting are against computer voting unequivocally. Rather, the complaints focus on the lack of a verifiable paper trail and the inability of the public to examine the code that runs the machines. Professor Mercuri's October 2002 article, "A Better Ballot Box?" provides a solution to these concerns. She also poses a series of questions that she believes must be answered in order to allay security concerns. Mercuri's work is partly an attempt to design a machine in line with minimum standards set by the U.S. federal government, unlike the voting machines currently being installed across America.
The New York State Assembly recently passed legislation that specifically requires that machines "produce and retain a voter verified permanent paper record with a manual audit capacity" (but fails to mention the code that runs the machines). Rep. Rush Holt has introduced federal legislation, The Voter Confidence and Increased Accessibility Act of 2003 with similar aims. The measure would require all voting machines to produce an actual paper record by 2004 that voters can view to check the accuracy of their votes and that election officials can use to verify votes in the event of a computer malfunction, hacking, or other irregularity.
Other solutions exist to ensure the integrity of voting machines and address the concerns of people like Professor Mercuri. Jason Kitcat is the author of the Free e-democracy project, an open source project that builds Internet voting software. Likewise, Australia makes the code for their machines available online whereas American companies jealously guard the code that runs their machines. It seems a fair question, considering the list of problems that currently plague voting equipment: why are none of these alternatives being investigated?
The 2004 election will be the first to use nation-wide electronic voting. With the purging of voter lists, secrecy surrounding voting machines, the lack of a verifiable paper trail combined with voting machine companies with strong Republican ties and funding from the radical right, a Bush victory is all but inevitable. Welcome to the machines.
Update: Scoop.co.nz has the latest on an investigation by Bev Harris, revealing glaring holes in the U.S. election system. Her detailed account is a must-read.

Read all about it on your cellphone
Simply type
http://pfeeds.com/3f
into your wap enabled cellphone!
OUR LINKS TO OTHER GREAT SITES
Click here and you can also watch the Oklahoma State Senate live
Oklahoma Republican Party forum
Oklahoma Democratic Party Forum
New Orleans Gun Confistication"
The personal Blog of an Iraqi in Baghdad
News story about Baghdad blogger
Click here to submit your site to the search engines for free!
Visit the official J-accuse J-accuse BLOG
Click here for our feedback forum
Does your city or group have an upcoming meeting or event? If so please post it here so that other visitors may learn about it.
A member of Creditwrench BLOG FARMS
spaces.msn.com/members/creditwrench