Times: Feinstein Bill is Bad – First, do no harm!

Update: Senator Feinstein replies to The Times with letter to the editor – that is, with excuses to counter the substance of objections to the bill <read>

Another right on editorial from the New York Times, A Bad Electronic Voting Bill <read>

Some have faith in the “‘hearings” held last week, that were packed with those who may well have written the bill. At least one paper agrees with us and VerifiedVoting.org. From the Times:

Congress has stood idly by while states have done the hard work of trying to make electronic voting more reliable. Now the Senate is taking up a dangerous bill introduced by Senators Dianne Feinstein, Democrat of California, and Robert Bennett, Republican of Utah, that would make things worse in the name of reform. If Congress will not pass a strong bill, it should apply the medical maxim: first, do no harm.

Voters cannot trust the totals reported by electronic voting machines; they are too prone to glitches and too easy to hack. In the last few years, concerned citizens have persuaded states to pass bills requiring electronic voting machines to use paper ballots or produce voter-verifiable paper records of every vote. More than half of the states now have such laws.

There is still a need for a federal law, so voting is reliable in every state. A good law would require that every vote in a federal election produce a voter-verifiable paper record, and it would mandate that the paper records be the official ballots. It would impose careful standards for how these paper ballots must be “audited,” to verify that the tallies on the electronic machines are correct.

The Feinstein-Bennett bill does none of these. It would permit states to verify electronic voting machines’ results using electronic records rather than paper. Verifying by electronic records — having one piece of software attest that another piece of software is honest — is not verifying at all. The bill is also vague about rules for audits, leaving considerable room for mischief. The timeline also is unacceptable. States might be able to use unreliable machines through 2014 or longer.

This bill goes out of its way to placate voting machine manufacturers and local election officials, two groups that have consistently been on the wrong side of electronic voting integrity. Reform groups like Verified Voting, which have done critical work in the states, say they were not allowed to provide input.

The bill would do some good things, including reducing the conflicts of interest that plague the process for certifying voting machines. But the damage it would do is much greater.

Ms. Feinstein introduced a better bill last year, which would have required a paper record of every vote, but she could not get enough support to pass it. If Congress cannot pass a good bill, it should let the states continue to do the hard work — and be prepared to explain to voters why it cannot muster the will to protect the integrity of American elections.

There is still time to call and e-mail our senators. Remember Dodd is on the Committee <e-mail action>

Connecticut Fails Lastest Holt Standard

Hats off again to Representative Rush Holt. Once again he offers emergency legislation to protect our vote. Even this streamlined bill is unlikely to pass. We admire Representative Holt for not giving up. We encourage him to persevere until we have election integrity. Meanwhile Senator Feinstein supports a phony, star-wars expensive, delaying plan. Here in Connecticut, the law our Secretary of the State calls the “strongest” and “toughest” falls far short of the minimum Holt bill standards. <read>

The bill would authorize funding for states that conduct audits that meet basic minimum requirements, including the use of a random selection, the requirement that audits be conducted with independence, at least a 2 percent audit sample, and public observation. All ballots must be included in the audit and they must begin within 48 hours and be completed prior to certification of the result. Only about a dozen states currently conduct audits.


Random Selection:
Connecticut has it but the random selection of races is not always required to be public.

Independence: In Connecticut all decisions are made by the Secretary of the State and counting is done by local officials – this completely fails independence.

All Ballots Included: In Connecticut, hand counted ballots, central count absentee ballots, and provisional ballots are excluded. In addition districts with recounts or contests are excluded.

Begin within 48 hours: By law Connecticut audits cannot begin until after 336 hours.

Lou Dobbs Gets It – Deseret News Does Not

We don’t always agree with Lou Dobbs, but he has nailed it on electronic voting and the Feinstein/Bennett bill. Amazingly the Senator goes against her state and also claims she really cannot do anything but this “compromise” bill. She could do nothing, it would be much much better than this bill.

Video: <watch>

Meanwhile in a story we should expect more of by Deseret News <read>

Civil rights groups, state voting officials and computer experts all praised Wednesday a bill

This is hand-picked computer experts out of the mainstream and some advocates accepting large donations from voting machine vendors. Watch Lou Dobbs for a summary that fits more with what mainstream computer experts would all say, if any were invited to the hearing.

“The legislation allows for innovation and experimentation. The legislation sets objectives but does not dictate how the objective is to be achieved,” he said.

This is a star-wars like program of technology that does not exist being funded, aiming cash at vendors, destined to destroy democracy. Be skeptical very skeptical.

More details in our recent post.

The Times, they are a Learning

A new editorial on the New York Times lays out the case for election integrity and credibility in: A Tale of Three (Electronic Voting) Elections <read>

Electronic voting has made great strides in reliability, but it has a long way to go. When reformers push for greater safeguards, they often argue that future elections could produce the wrong result because of a computer glitch or be stolen through malicious software. That’s being too nice.

There have already been elections in which it is impossible to be certain that the right candidate was declared the winner. Here are three such races. It is not just remarkable that these elections were run so badly, but also that the flaws are still common — and could easily create havoc in this fall’s voting.

They provide three examples and three lessons. The first and third of which we have not learned well enough in Connecticut

Lesson: Electronic voting makes large-scale vote theft easy. A patch slipped onto voting machines or centralized vote tabulators can change an election’s outcome. Every piece of software must be scrutinized by neutral experts. If there is not enough time, election officials need a backup plan, such as conducting voting entirely on paper ballots…

Lesson:
Electronic voting machines must produce a voter-verifiable paper trail for each vote so voters can see that their choices register properly. In a disputed election, the paper, not the machine tallies, should decide who wins…

Lesson: Paper ballots alone are not enough. There must be strong audit laws that mandate comprehensive hand recounts when an election is close.

After the 2000 election debacle, Americans demanded a better system of voting. What we have gotten is new technology with different flaws. If the presidential race is close, this year’s “hanging chad” could be a questionable result on electronic voting machines that cannot be adequately investigated.

Partisan Consultant Behind The Congressional Firewall

Should partisan consultants be totaling our elections? Be provided access behind our firewalls? Managing data for congressional committees? Especially committees involved in voting technology?

Bob Fitrakis, The Free Press: Behind the firewall: Bush loyalist Mike Connell controls Congressional secrets as his email sites serve Karl Rove <read>

One has to wonder about the implications of the premier partisan campaign IT man, steadfastly loyal to the country’s most well-known security-industrial complex and CIA family, serving as the man behind the U.S. Congress’ firewall…

SourceWatch notes that Connell developed the websites for the House Intelligence, Judiciary, Financial Services, Ways and Means, and Administration Committees. According to SourceWatch, Connell teamed up with R. Rebecca Donatelli, Chair of the D.C.-based Campaign Solutions, to form Connell Donatelli Inc. (CD Inc.) as a specialized online advertising agency in July 2004. One of CD, Inc.’s first activities was to become the registrant, administrator and tech organizer for the anti-Kerry group Swiftboat Veterans for Truth’s website swiftboatvetsfortruth.org…

Connell also handled the IT system work for the Bush-Cheney Re-election Campaign and worked for Secretary of State J. Kenneth Blackwell in designing the system that allowed the real time outsourcing of Ohio’s presidential vote count to a Chattanooga, Tennessee server site.

Feinstein to Voters: Waste $, jeopardize Democracy.

Update: Take Action: E-Mail our Senators to oppose S. 3212 <read and send> This is especially important because Senator Dodd is on the committee and the hearing is this week!

The well intentioned but flawed 2002 Help America Vote Act launched the large scale move to electronic voting. Many states have paperless DREs (Touch Screens), some have paper trails of questionable value, and others like Connecticut have true paper ballots with inadequate chain-of-custody and inadequate post-election audits. What could possibly make things worse? The answer is the latest bill from the U.S. Senate, the folks who brought us HAVA. The bill, S. 3212, would add costs and subtract safety

As we stated when the bill was outlined by Senators Feinstein and Bennett, the primary minor benefit of the bill would be to unite voting integrity advocates in opposition. Our friends at Verified Voting have produced an analysis of the bill <read>

A number of troubling provisions require us to urge opposition to S. 3212:

1. S.3212 allows “independent” vote records that would exist only in computer memory to be used to verify electronic vote totals.

2. The non-paper verification methods allowed by S. 3212 would increase the costs and burdens of conducting elections without the benefit of increased confidence and auditability.

3. Language in the bill would exempt from any verification requirement those paperless voting systems purchased before January 1, 2009 to meet HAVA’s accessibility requirements. This would leave millions of voters (particularly those with disabilities) dependent on insecure paperless electronic machines for the foreseeable future.
Continue reading “Feinstein to Voters: Waste $, jeopardize Democracy.”

Audio: Voice Of The Voters – Connecticut Update

Update: Audio is now available of the Nutmeg State update on Voice of the Voters. The Connecticut segment is about 2/3 of the way through just after the weekly update by John Gideon <Audio>

We look forward to more state updates over the coming weeks. So far, Connecticut is the best of the litter. but sadly that only serves to show how far the whole Nation has to go and the risks to democracy we face in November.

Summary report prepared before the broadcast:
Continue reading “Audio: Voice Of The Voters – Connecticut Update”

Witness To A Crime

I have just completed reading Witness To A Crime, by Richard Hayes Phillips. The result of three years of persistent, detailed investigation of the 2004 election in Ohio. This book proves several times over that the election was stolen.

From the book:

“it is unlikely that 14 voters in one precinct in inner-city Cleveland were wavering between John Kerry and Michael Peroutka, and decided to vote for both candidates, thus spoiling their own ballots. It is also unlikely that 14 voters made identical mistakes on their on their ballots. It is more likely that these 14 ballots were punched in advanced…

“In these fourteen precincts, there were 1780 gay-friendly Bush voters and 360 straight ticket gay-friendly Republicans, or the ballots are not real.”

I choose these samples as they give a flavor of the information covered in the book. There are lot of details, there are a lot of numbers, but there are also two stranger than fiction stories: 1) The story of detailed review of reported statistics which don’t add up to anything but fiction along with details only available because a team of researchers copied and photographed ballots in order as they were stored. 2) The story of election officials giving contradictory explanations, false information, destruction of records by “mistake”, delaying records requests, and otherwise obstructing the investigation.
Continue reading “Witness To A Crime”

Debunking Pre-Election Testing Myths

We have said it here as one of our Ten Myths:

Myth #6 – Memory card errors cannot affect the outcome of our elections because election officials conduct pre-election testing of our electronic voting systems.
Reality

  • Pre-election testing of electronic voting systems will detect only basic errors such as junk memory cards, wrong candidates, and machines that simply don’t work. Pre-election testing cannot detect all errors and programming attacks.
  • Computer science tells us it is impossible to test completely. Recent academic reports outline many ways that clever programming can circumvent detection during basic pre-election testing.
  • Don’t take our word for it. An OpEdNews article covers the issue and the myth in more detail. Don’t take their word for it. They have a list of fifty studies including the one from UConn which we highlighted in testimony to the legislature.

    From OpEdNews, Debunking Pre-Election Testing Myths:

    Debunking myths can be a full time job in the election integrity world. Someone recently asserted:

    “As for vote switching, not sure how many times I have to tell you, the election goes thru a logic and accuracy test that proves the votes are counted correctly. There is no vote switching … on ES&S machines. Not sure where you get this information. You shouldn’t believe everything you hear.”

    Malware can easily defeat pre-election testing and certification processes: logic and accuracy tests cannot “prove” that software is free of malicious code. Assertions that no vote switching has ever been shown to have occurred on an ES&S system or any other computerized voting system is explained by the fact that malware (malicious software code) can be self-erasing.

    Tampering Questions: Georgia 2002, Ohio 2004

    The Raw Story: GOP cyber-security expert suggests Diebold tampered with 2002 election

    Georgia 2002
    (When surprising results gave the Governorship to Sonny Purdue and Max Cleland lost his re-election to the Senate):

    Spoonamore received the Diebold patch from a whistleblower close to the office of Cathy Cox, Georgia’s then-Secretary of State. In discussions with RAW STORY, the whistleblower — who wishes to remain anonymous for fear of retaliation — said that he became suspicious of Diebold’s actions in Georgia for two reasons. The first red flag went up when the computer patch was installed in person by Diebold CEO Bob Urosevich, who flew in from Texas and applied it in just two counties, DeKalb and Fulton, both Democratic strongholds. The source states that Cox was not privy to these changes until after the election and that she became particularly concerned over the patch being installed in just those two counties.

    Ohio 2004 (The decisive electoral votes to George Bush):

    At the Ohio press conference yesterday, the former McCain adviser said Michael Connell, of the Republican Internet development firm New Media Communications, had designed a system that made possible the real-time “tuning” of election tabulators once Ohio Secretary of State Kenneth Blackwell had outsourced the hosting of vote counting on the same server which hosted GOP campaign IT systems. He said he didn’t believe Connell was behind the alleged fraud, but that he should be considered a key witness.

    BradBlog: GOP Operatives Leading Data Security Expert Joins Press Conference, Case, Notes Fraudulent Patterns That Should Have Triggered Investigation

    This case has the potential to put some of the most powerful people in the country in jail, according to Arnebeck, as he was joined by a well-respected, life-long Republican computer security expert who charged that the red flags seen during Ohio’s 2004 Presidential Election would have been cause for “a fraud investigation in a bank, but it doesn’t when it comes to our vote.”

    “In the 2004 election, from my perspective, on any of the programs we run for any of my credit card clients, the results from the 14 counties, those are the sort of results that would instantaneously launch a credit card fraud investigation or a banking settlement investigation.”

    Spoonamore’s reference to the “14 counties” refers to the so-called “Connelly Anomaly” in which down-ticket candidates got more votes than John Kerry.

    The name comes from the candidacy of C. Ellen Connelly, an African-American woman who was running for the Ohio Supreme Court in 2004. She was endorsed by pro-choice and civil rights groups, and was relatively unknown to Ohio voters, in addition to being vastly outspent by her opponent in the campaign. Yet, somehow, Connelly got scores of thousands more votes than did John Kerry at the very top of the ticket.