E-voting in the United States: A cautionary tale A presentation to the Workshop on Electronic Government and Electronic Voting, given at the National e-Science Centre, Edinburgh, 27th February 2006 By Andrew Gumbel I wanted to start this talk with an anecdote that would encapsulate the current problems of electronic voting in the United States. Perhaps inevitably, I found myself settling on a story from Florida. Florida is far from the only U.S. state with a reputation for dodgy electoral practices, but it is the place where the dysfunctions were first brought glaringly to public attention thanks to the protracted struggle between Al Gore and George W Bush for the state’s decisive 25 electoral votes in the 2000 presidential election. I’m sure you remember some of the details of that excruciating 36-day showdown: the infamous butterfly ballot in Palm Beach County, which proved so confusing that thousands of elderly Jewish voters belatedly discovered that they had voted for Pat Buchanan, a candidate they regarded as rabidly anti-Semitic; the manoeuvrings and barely concealed partisan prejudice of Katherine Harris, the Florida secretary of state who was both the arbiter of the election and also the co-chair of George Bush’s Florida campaign; and, of course, the inner workings of the Votomatic punch card machine, on which we all became instant experts thanks to television images of county officials staring through magnifying glasses at cardboard ballots whose detachable pieces – or chad -- had been left merely hanging, bulging or just barely dimpled. You are going to hear a whole lot more about Florida over the course of this presentation, but for now I want you to imagine a scene in the state capital, Tallahassee, from last December. The supervisor of elections in Leon County, which includes Tallahassee, is a man called Ion Sancho, and he is one of the best, most conscientious voting officials in the United States – one of the few who actually believes the process should be as open and accountable to the voters as possible. He also had the courage to invite a Finnish computer specialist called Harri Hursti to test Hursti’s claim that he had found a way of breaking with the county’s vote tabulation software in such a way as to change the outcome of any given vote without leaving any detectable trace. The system Hursti claimed to be able to circumvent was made by Diebold Election Systems, one of the leading manufacturers of voting equipment in the United States. Diebold’s tabulation software is used with both electronic touch screen voting systems, the most controversial of the new generation of voting machines in the United States, and also with optical scan machinery that reads hand-marked paper ballots. That’s the type of system deployed by Ion Sancho in Leon County. Harri Hursti has been somewhat vague about his hacking methodology, not least for security reasons, but we do know it involves 1 making changes to the memory card used to count up the votes on each optical scan reader with the aid of a commercially available agricultural scanning device. Anyway, last December, Sancho and seven other people gathered in a warehouse a few blocks from county election headquarters and held a little trial election. The question on the ballot, appropriately, was: “Can the votes of this Diebold system be hacked using the memory card?” Two people voted yes and the other six voted no. Their ballots were fed into the optical scan reader and transmitted to a tabulation device. The result then popped up: seven votes for yes, and just one vote for no. Supervisor Sancho immediately recognised the profound implications of this experiment. A disgruntled county employee or political operative with access to the voting machinery could fiddle with the results of an election and the election supervisor might never know. He has since ditched his Diebold system and is switching to another company. One might have thought the rest of the country would have followed suit, but that has been very far from the case. Diebold itself has proved entirely unapologetic and has even intimated in a lawyer’s letter that any security risks have been incurred by Sancho himself. The Florida secretary of state – no longer Katherine Harris, who has gone on to bigger and better things – has been similarly unperturbed by Hursti’s exposure of the security breach, saying only that if Ion Sancho has a problem with his Diebold machinery, that is something for him to sort out with Diebold. The fact that several other Florida counties are also Diebold clients and show no inclination to follow Sancho’s lead in dropping the company has been of absolutely no concern. This is something U.S. election officials do a lot when confronted with a seemingly intractable problem – delegate it down down to the next level of responsibility and hope it goes away. On the other side of the country, California’s top voting official spent several months last year considering whether to invite Hursti to try to hack into his state’s own Diebold voting equipment, in particular a new model touch screen called the TSx whose certification had been held up for three years because of gaping technical flaws and a documented history of Diebold lying about the machine’s state of readiness. Unaccountably, in the wake of the experiment in Leon County, Secretary of State Bruce McPherson’s decided to drop the idea of bringing in Hursti. Earlier this month, his own technical advisory panel warned him, based on its own analysis, that the memory cards were vulnerable to undetectable hack attacks. The panel found 16 different software problems that could permit hackers to “change vote totals, modify reports, change the names of candidates, change the races being voted” and even crash the machines altogether without so much as the need for a password. Three days after that report was issued, though, McPherson decided to allow the TSx to be used in this year’s mid-term elections, rationalising the problems as “manageable”. 2 From the perspective of this side of the Atlantic, all this must seem insane. By any measure of how one might responsibly develop and introduce electronic voting systems, it IS insane. The champions of e-voting in the United States would have us believe that the computerized machines represent a revolutionary leap forward in a country notoriously beleaguered by electoral corruption and cheating in the past. The machines are user-friendly, they argue, and function both flawlessly and at lightning speed – what is not to like? Unfortunately, this is little better than a fairy-tale version of what has really occurred, which is that private companies of dubious reputation have been allowed to go round, county by county, and sell machines that have been inadequately inspected if they have been inspected at all, are never publicly tested beyond a rudimentary pre-election exercise that does not come close to replicating the complexities of a typical multi-race election, and are virtually immune from closer scrutiny in case of questions about their proper functioning in a live election because their software is protected as a trade secret under U.S. law. I want to lay out some of the history of how e-voting has evolved in the United States, but first it’s worth pointing out a couple of things that make the conduct of U.S. elections both unique and uniquely dysfunctional among the world’s mature democracies. Ever since the first big push towards universal suffrage in the 1820s and 1830s, the system has been far too susceptible to the partisan interests of the major parties. In contrast to many European countries, or Canada or Australia, successive waves of reform in the 19th century failed to create a reliably honest class of election administrators, or even a reliable system of uniform rules by which they might be expected to operate. The United States has no central electoral commission or equivalent body, and Congress has absolutely no oversight over election rules or election machinery. Most decisions on election administration are made at county level, and since there are more than 4000 counties in the United States, the country effectively has more than 4000 electoral systems. Historically, the Republicans and Democrats have liked it this way, because it has given them scope to control the process in counties where they are predominant and, in certain circumstances, to sway the outcome of the vote. Election administration has been notoriously shoddy for as long as anyone can remember. In 1930, a report for the Brookings Institution in Washington found: “There is probably no other phase of public administration in the United States which is so badly managed as the conduct of elections….The truth of the matter is that the whole administration – organizations, laws, methods and procedures, and records – are, for most states, quite obsolete.” The culture has not changed significantly since – as attested by the long list of people indicted and sentenced on election fraud and embezzlement charges over the decades. Sometimes it is county officials who are indicted, and sometimes it is the representatives of voting machine manufacturers. Quite often, one party saves his skin by ratting out the other. Quite a few of them stay in the business even after they’ve been through the legal wringer. The other general observation I want to make is that, for the past hundred years, reformers in the United States have repeatedly made the mistake of thinking that what is needed to fix the electoral system is the right kind of voting machine. In my book I call this the fallacy of the technological fix. It’s a fallacy because the problem in the United 3 States is not and never has been the technology of voting; the problem is rather the nature of the two-party political system and the peculiarly elemental, vicious manner in which electoral contests are fought. Florida in 2000 was a classic example of the fallacy. Conventional wisdom at the time wanted to blame everything on the punch card machines, but the principal cause of the meltdown was the sheer determination of the Florida Republican Party, which controlled most of the key offices and most of the county governments in the state. Governor Jeb Bush wanted to make sure his brother George W. became the next president, no matter what. Even with lousy machines, there is no excuse for not recounting every vote. Every new generation of machine has been hailed as the miracle that will at last make elections fraud- and foolproof, and every time the initial optimism has given way to disappointment. That was true of the big, bulky lever machines first introduced in the 1890s, which were so disliked by the voters that 15 of the first 24 states to purchase them decided to ditch them again. If the lever machines returned in the 1930s and onwards, it was primarily because they made life easier for the election officials and, in some instances, for the corrupt politicians who understood how they could be used to throw the outcome of important close races. Earl Long, the notoriously corrupt governor of Louisiana in the 1950s, once boasted that with the right board of commissioners he could get his lever machines to sing “Home Sweet Home”. The Votomatic punch card machines that caused so much trouble in Florida were also greeted as a miracle in the early 1960s; one voting official in Georgia declared excitedly that deploying them was “as simple as stirring coffee with a spoon”. The Votomatic was the first machine in the United States to use electronic tabulation. And, within six years of its first deployment in 1964, some serious questions began to asked about the reliability of that tabulation software. A study commissioned by the city of St Louis in 1970 found that punchcard balloting was “more easily subject to abuse” than lever machines, because there was no way of making sure the counters had been set to read the cards correctly. “It is possible to write a program in such a way that no test can be made to assure that the program works the way it is supposed to work,” the accounting firm Price Waterhouse reported. “It is possible to have instructions in computer memory to call in special procedures from core, tape, or disk files to create results other than those anticipated.” The machinery suffered a number of breakdowns both big and small over the next several years, including one election in San Antonio, Texas in 1980 when the number of voters was mysteriously adjusted downwards by six-hundredths of a per cent between election night and the date of the official canvass. This led the San Antonio Express newspaper to suggest a wry new slogan for the universal suffrage movement: “One man, 0.9984 vote.” That same year, a withering critique of the Votomatic was penned by Michael Shamos, the Pennsylvania state voting equipment examiner, who ripped the system to shreds without even mentioning the chad problem that was to play such a prominent role in Florida in 2000. Not only were punch cards laughably passé in the computer industry, 4 Shamos wrote, but the machinery was cumbersome, easily prone to tampering and a security “nightmare”. Among other things, Shamos showed how arbitrary numbers could be entered into the machines’ counters, and also how an election fixer could change the vote totals by slipping in a rogue programming card – a sort of super-punch card that would superficially look not much different from an ordinary ballot. Shamos also pinpointed an enduring problem with the way computer voting equipment was bought and sold: the fact that systems are certified for use without any public authority having access to the programming software. “It is a complete mystery to me how a program can be ‘submitted’ for certification unless the examiners are permitted to inspect it,” Shamos wrote. In the 1980s, there was no requirement even to submit the software to a private testing lab, much less make it available to county and state authorities in case of operational controversy. Deborah Seiler, the head of California’s elections division who would later become a sales rep for Diebold, told the New York Times in 1985 that she had certified a number of systems without inspecting anything. “At this point,” she said, “we don’t have the capability or the standards to certify software, and I am not aware of any state that does.” Already at this early stage, voting rights campaigners were beginning to fret about the degree of public control being signed away to private vendor companies, an issue that remains equally pressing today. Not only did the manufacturers shroud their products in secrecy, they also became actively involved in running elections, because technophobic administrators in many places thought having them around would help prevent mistakes. That did not change when the Federal Election Commission finally published some minimal standards for electronic voting in 1990. As Mae Churchill of the Urban Policy Research Institute in California wrote to the FEC at the time: “The proprietary interests of voting system vendors have been allowed to drive the standards drafting procedure… The privatizing of elections is taking place without the consent or knowledge of the governed.” Two very dodgy elections in the 1980s highlighted some of the concerns about electronic voting systems. The first was a congressional election in Kanawha County, West Virginia, 1980. The powerful incumbent Democratic congressman, John Hutchinson, had been expected to trounce his Republican opponent by a double-digit margin. But the Republican, Mick Staton, was oddly confident that the polls were wrong and that he would finish ahead by five points. There was an inherent conflict of interest in the management of the race, since the county clerk was not only a Republican but was married to Staton’s single largest campaign contributor. Then, on election night, a young Republican state legislator called Walter Price saw some very odd things going on in the count room. According to an account he later gave under oath, Peggy Miller, the county clerk, got down on her knees four times during the night and, as she consulted notes on a clipboard, turned a key on the master computer, flipped some switches and turned the key back again. Price also saw Miller’s husband Steve enter the computer “cage”, pull a pack of what looked like computer punchcards out of his suit jacket and hand them to his wife. Peggy Miller ran these through the card reader, retrieved them, then handed them back to her husband. 5 When Staton was declared the winner by a five-point margin, exactly as he had predicted, Price became convinced he had been a witness to vote fraud and, despite his party affiliation, resolved to denounce it publicly. The Millers denied everything and, despite the legal challenge filed almost immediately against Staton, arranged for all materials relating to the election to be destroyed as soon as the West Virginia statutes allowed. In the absence of physical evidence, the prosecution never stood much chance, and the charges were eventually thrown out. The other dubious election took place in Florida in 1988, when the Democratic candidate for Senate, Buddy MacKay, was projected on election night to be the winner but ended up trailing his Republican rival, Connie Mack, by 34,500 votes out of more than 4 million. The odd thing here was that in four of state’s most heavily populated, most Democratic counties – covering Miami, Tampa, West Palm Beach and Sarasota – the drop-off between the number of people recording a vote for President and those voting for the Senate was a staggering, and utterly anomalous, 20 per cent. Translated into voter numbers, that meant as many as 200,000 votes entrusted to Votomatic punchcard machines vanished into the ether, votes that most likely would have broken heavily in MacKay’s favor. Election officials suggested that voters overlooked the Senate race because it was squeezed onto the bottom of the first page, beneath the list of candidates for President. That explanation did not hold, however, because a number of counties had the same ballot design but not the same problem. While Tampa had a dropoff rate of 25 per cent between the presidential and Senate race, next-door St Petersburg’s drop-off rate, with the same ballot, was just 1 per cent. MacKay, for one, became convinced the election had been stolen, and even did some research to figure out how – speculating that the machine could have been programmed, say, to miscount every tenth vote. One leading computer scientist, Peter Neumann of SRI International in California, confirmed that MacKay’s hunch was entirely plausible. “Remembering that these computer systems reportedly permit operators to turn off the audit trails and to change arbitrary memory locations on the fly,” he wrote about the Mack-MacKay race, “it seems natural to wonder whether anything fishy went on.” MacKay pressed to have the ballots examined and recounted, but under Florida law at the time recounts were left to the discretion of county canvassing boards. They all turned him down flat, on the grounds that he had no concrete evidence to establish a pattern of foul play. “It’s a real Catch-22 situation,” MacKay said. “You’ve got to show fraud to get a manual recount, but without a manual recount you can’t prove fraud.” Barely a month after the Mack-MacKay election, a company very interested in protecting the interests of electronic voting made a remarkable offer which it hoped would protect its evolving technology from the suspicion of foul play. The company was called Shoup, and it had been in the voting machine business from the very beginning – not always with a reputation for scrupulous honesty, to put it mildly. But Shoup didn’t want doubts about the Florida election to spoil the marketing of its Shouptronic, one of the first Direct Recording Electronic, or DRE, machines to be put into operation. So Shoup’s chief engineer, Robert Boram, wrote to the FEC’s Voting Equipment Standards 6 Advisory Committee to announce that the Shouptronic’s source code would henceforth be available for outside review. “The public interest served by securing public confidence in direct electronic voting systems takes precedence over the remote possibility that some competitor might gain access to our source code and thereby enhance their product’s marketability,” Boram wrote. “We would hope all vendors of all election systems using any form of computers would now open their source codes to outside review. Let’s put to rest the concerns raised as to the degree of reliability and integrity of computerized voting systems.” It’s a pity Boram’s sentiments weren’t echoed a decade later, when the DRE craze really took off. Back in the late 1980s, the technology was still too new, and the motivation to switch systems too lackluster, for his idea to take hold. Boram was refreshingly honest all round when it came to the realities of computer voting. He told a newspaper reporter in 1992 exactly why it was a mistake to rely on the internal audit mechanism of a DRE as opposed to an independently verifiable paper trail. “I could write a routine inside the system that not only changes the election outcome,” he said, “but also changes the images to conform to it.” If that wasn’t warning enough, election administrators should have paid attention to a lecture a few years earlier given by the computer scientist Ken Thompson, in which he demonstrated that a bug could be introduced into computer software independent of the source code. “The moral is obvious,” he concluded. “You can’t trust code that you did not totally create yourself… No amount of source-level verification or scrutiny will protect you from using untrusted code… A well installed microcode bug will be almost impossible to detect.” Such warnings went entirely unheeded, however. By the time of the 2000 election, the first touch screen DREs had been deployed, most notably in Riverside County, California, where the local registrar of voters, Mischelle Townsend, wasted little time gloating over the punch card mess in Florida. By her account, election night in Riverside had been “flawless” – a word of which she became inordinately fond over the next few years – and much of the rest of the country was inclined to believe her. Wired News, the journal of record of the then booming high-tech industry, initially touted her as some kind of prophet for the new millennium. In reality, though, election night in Riverside had been a near disaster. A couple of hours after the polls closed, the tabulation software overloaded and started deleting votes from the tallying system instead of adding them. The vendor company, Sequoia Pacific, had to send in an emergency resuscitation team, creating a delay of several hours. The system was eventually righted, at least according to Sequoia, but Riverside’s results were not published until two hours after neighboring San Bernardino County, then still using punch cards. In a down-ticket for a local school board, one candidate had been comfortably in winning position when the machines went down – and was reported as such in the next day’s Riverside Press Enterprise newspaper – only to find herself trailing when the count resumed, for no reason she could easily ascertain. Her demands for a full explanation met only with official intransigence. Townsend reacted to the setbacks simply by pretending they had not happened. 7 Her ruse worked, and soon many other counties wanted to follow her example. Theresa LePore, the architect of the infamous butterfly ballot in Palm Beach County, Florida, quickly persuaded her county commissioners to spend $14.4 million on their own Sequoia system. The new touchscreens were deployed in time for the March 2002 local elections and they, too, failed at the first hurdle. A well-respected former mayor of Boca Raton called Emil Danciu was flabbergasted to discover he had finished third in a race for a seat on the Boca Raton city council, since an opinion poll taken shortly before the election had put him seventeen points in the lead. Supporters began flooding his campaign office with stories that every time they tried to vote for him, the machine lit up the name of one of his opponents instead. Danciu also discovered that fifteen cartridges containing the vote totals from machines in his home precinct had been removed by a poll worker on election night, causing an unexpected delay in the final results. Some of the cartridges were subsequently found to be empty, for reasons that have never been adequately explained. Armed with a fistful of affidavits, Danciu sued for access to the Sequoia source code to see if it did not contain some fatal flaw. He was told, however, that the source code was considered a trade secret under Florida law, and that even LePore and her staff were not authorized to examine it on pain of criminal prosecution. His suit was thus thrown out, and he decided it would be futile even to appeal. Two weeks after the Danciu election, something even stranger happened. In the inland town of Wellington, a run-off election for mayor was decided by just four votes. Another seventy-eight votes, however, did not register on the machines at all. Since the run-off was the only race on the ballot, that meant – assuming for a moment the machines were not lying – that seventy-eight people had jumped in their cars, driven to the polls, not voted, and gone home again. The scenario beggared belief, but it was touted, with an absolutely straight face, by LePore. The response to the 2000 presidential fiasco was off to an unpromising start, to put it mildly. And it only got worse. In 12 of southern Florida’s most densely populated counties, officials were induced to buy a touch screen DRE system made by Election Systems and Software, or ES&S, the company that had previously operated the Votomatic punch card machines. ES&S’s DRE, the iVotronic, was still in development, but that inconvenient fact was hushed up, not least thanks to the efforts of Katherine Harris’s predecessor as secretary of state, Sandra Mortham, who found herself in the happy position of being chief lobbyist for both the Florida Association of Counties and ES&S itself. In other words, all she had to do was sell herself on the deal, and she picked up commissions from both ends. Disaster quickly ensued in Miami-Dade County, where ES&S had promised to add a third language, Creole, on top of English and Spanish, which were standard features. The company omitted to mention that the trilingual package would have be loaded separately via a dedicated flashcard that would drastically slow down each machine. When the iVotronics made their debut in the Democratic governor’s race primary in September 2002, they took so long to boot up the entire electoral machinery of Miami-Dade county ground to a halt. Many polling stations did not open until lunchtime, creating consternation from one end of the county to the other. To make matters worse, freak storms knocked out power to certain precincts for so long that the battery back-up on 8 many iVotronics ran out. Then, the tabulation machines went bananas. One Miami precinct reported 900 per cent turnout; another showed just one ballot cast out of 1,637 registered voters. Jeb Bush, the governor, was forced to declare a state of emergency in both MiamiDade and neighbouring Broward County, which had experienced similar problems, and extended the opening hours of polling stations by two hours. Lida Rodriguez-Taseff, a gutsy lawyer who founded the Miami-Dade Electoral Reform Coalition and quickly became a major thorn in ES&S’s side, remarked bitterly: “This was an invention that had never been tested. We were the guinea pigs.” The introduction of e-voting systems was equally troubled in other parts of the country, if not necessarily for the same reasons. Both Maryland and Georgia rushed into statewide buys of Diebold DREs in time for the 2002 election cycle, blithely ignoring advice from their own technical experts that the system was not read for prime time. Tom Iler, the information technology chief in Baltimore County, Maryland, protested vigorously, but to no avail. As he later commented to me: “You don’t want to be on the bleeding edge with critical systems… Why would anyone want to buy first-generation technology which is a lot more expensive than established technology, just to see it become obsolete very quickly?” In Georgia, just a few weeks after the Diebold purchase was approved, the voting terminals began demonstrating symptoms of serious malfunction. Rob Behler, an engineer working as a Diebold contractor at the company’s Georgia warehouse, later reported that 25-30 per cent of the machines were either crashing as they were being booted up or otherwise failing. In his account, which the company has never denied, Diebold came up with three successive software patches – one in June, one in July and one in August – to remedy the problem. The booting problem was solved by the time of the November election, but it appears that the patches were never submitted for certification – a basic requirement under state and federal law. On election day, the state had its share of machine malfunction – terminals freezing, screen alignments going out of whack, and so on. Most troublesome, however, were the results of the races for Governor and U.S. Senate, which suggested wild double-digit swings in favor of the Republican candidates from the final pre-election opinion polls. Sonny Perdue became the first Republican Governor to be elected in 144 years thanks to a sixteen point swing away from the Democratic incumbent, Roy Barnes. And Saxby Chambliss, the colorless Republican Senate candidate, pulled off an upset victory against the popular Vietnam War veteran Max Cleland, representing a nine-to-twelve point swing. Were these statistical anomalies, or was something fishier going on? In the absence of a paper backup, or of any hint of transparency from state officials, the question was for the most part unanswerable. As it later became clear, there were two fundamental problems with the touchscreen DREs. One was their vulnerability to software bugs, malicious code or hack attacks, as Ken Thompson and others had been warning for years. The other was that they were poorly programmed by their manufacturers and inadequately tested by government- 9 contracted laboratories charged with their certification. This was a well-kept dirty secret at the outset, making it all the easier for vendors to blindside political decision-makers with grandiose claims about the machines’ miracle-working powers. Because of the proprietary nature of the software, state and county officials had to take assurances about security almost entirely on trust. And take those assurances they did – because they badly wanted to believe in the new machines. But it did not take long for their flaws to start causing some serious embarrassment. In early 2003, the source code for the Diebold system was left lying around on an open FTP site and discovered by a voting rights activist in Washington state. She, in turn, arranged for the material to be posted on a website in New Zealand, where it was outside the remit of U.S. trade protection laws, and opened the way for a team of top computer scientists to examine the code. That team, led by Avi Rubin of Johns Hopkins University, tore through the code in one frenzied week and was left little short of stunned by what they found. Rubin and two of his graduate students discovered within half an hour that the password unlocking the system’s encrypted data was written directly into the source code. Not only did this mean that anyone with access to the source code had the means to break into the system at will. It also meant that every single Diebold machine was crackable by exactly the same means. As David Jefferson, an elections security expert at the Lawrence Livermore National Laboratory in California, later put it: “What [Diebold] did is create a big complex building, put locks on every door, use the same key for every lock, and then publish a picture of the key on the wall.” The full Hopkins/Rice report elaborated: “Cryptography, when used at all, is used incorrectly. In many places where cryptography would seem obvious and necessary, none is used. More generally, we see no evidence of disciplined software engineering processes… We also saw no evidence of any change-control process that might restrict a developer’s ability to insert arbitrary patches to the code. Absent such processes, a malevolent developer could easily make changes to the code that would create vulnerabilities to be later exploited on Election Day.” It was relatively straightforward, for example, to produce home-made replicas of the system’s voter smart cards and use them to cast multiple ballots. Insecurities in the data transmission system were potentially even more dangerous, especially if election results were sent by modem from the precinct to county headquarters. “Even unsophisticated attackers,” the report said, “can perform untraceable ‘man-in-the-middle’ attacks.” Diebold was left floundering by the report, as were the testing labs which had passed the software for federal certification. These labs were nominally independent, but in practice they had at least a financial interest in being solicitous toward the voting machine companies, since they were paid directly for their services and competed with each other for the work. All three operated under conditions of strict secrecy, which had the undeniable benefit of keeping sensitive software away from prying eyes but also made it impossible, barring leaks or court orders, to make even a minimal assessment of the labs’ competence. When Congress first mandated the Federal Election Commission to draw up minimum technical standards for electronic voting machines in the late 1980s it omitted to give any direction on how those standards should be tested and enforced. This 10 gaping administrative hole was eventually filled by the Election Center, a Houston-based non-partisan lobbying group representing state and local elections officials, which took it upon itself to accredit and oversee the labs, known as Independent Test Authorities, or ITAs. But the Election Center never wielded any formal congressional authority, giving rise to a deeply unsatisfactory situation in which the integrity of the country’s election machinery depended on a system that was both impenetrable and publicly unaccountable. Things grew only murkier as the FEC’s original 1990 standards were rendered obsolete by giant leaps forward in computer technology. Starting in late 1998, the FEC began developing a new set of standards to take account of the rise of the Internet, the growing sophistication of code-writing languages and encryption techniques, the proliferation of computer worms and viruses and other security liabilities. But when the new standards were published in 2002, the terms of their adoption became shrouded in ambiguity, not least because state and county agencies across the country were in the throes of a DRE-buying frenzy. No vendor wanted to review its entire product line while sales were so buoyant, and no elections official wanted to be left empty-handed for months on end after throwing tens of millions of dollars at a system that was supposed to be flawless anyway. So the Election Center and NASED, the National Association of State Election Directors, decided to fudge it. Any new product components, they said, would have to conform to the 2002 standards, but vendor companies would not be required to update entire systems from top to bottom. The question of what constituted a new product component was left distinctly vague. Did a patch on a software program qualify, for instance, or only a brand new software package? According to an official who helped draw up the FEC standards, the understanding was that the testing labs would have “a bit of leeway” to decide such questions for themselves. The practical consequence of that leeway has been that even now, in 2006, key components of computer voting systems are still meeting only the 1990 standards. The WinEDS program used in Sequoia’s tabulation software, for example, is still widely used, even though it is written in Visual Basic, a language known for its vulnerability to viruswriters. Had the 2002 standards been fully implemented, Sequoia would have been obliged to rewrite the program or scrap it. Perhaps the biggest problem with the whole set-up is how cozy the key players are with each other. The Election Center represents state and county officials who are clients of the machine vendors, and it also accredits testing labs who are clients of the machine vendors. If that isn’t already too close enough for comfort, the Center has also developed its own direct relationship with the vendors. In 2004, a tax filing surfaced showing that the Center had received annual donations of $10,000 from Sequoia over a four-year period. The Center’s executive director, R. Doug Lewis, acknowledged the payments, saying he had received other donations from ES&S and “probably” from Diebold as well. He didn’t show any sign of embarrassment about these ties; indeed, his organization appeared to be proud of them. At a national conference of county registrars organized in Washington in August 2004, the Election Center laid on a welcome reception sponsored by Diebold, a graduation luncheon and awards ceremony sponsored by ES&S and a dinner cruise on the Potomac and “monuments by night” tour co-sponsored by Sequoia. 11 Little wonder, given such clamorous conflicts of interest, if the system has failed so spectacularly. When the Hopkins/Rice report first came out, the man in charge of examining voting machinery in Iowa, a University of Iowa computer science professor called Doug Jones, was stunned to read about some of the encryption problems because he had found exactly the same flaws when he inspected the software as far back as 1996. In those days the company was still called I-Mark Systems, not Diebold, but the software architecture was one and the same. Jones had forwarded his discoveries to both I-Mark and the testing authority, Wyle Laboratories, believing that the software as it stood should not be allowed to come to market. But his concerns were ignored. In its certification report, Wyle went so far as to write: “This is the best voting system software we’ve ever seen.” More critical reports followed on from the one led by Avi Rubin, many of them commissioned by the states themselves. Maryland commissioned two. The first, by the computer risk assessment company SAIC International, identified three hundred and twenty-eight security weaknesses, twenty-six of them critical, plus a whole slew of other high-risk issues that would arise if the system were ever hooked up to a network. The second, conducted by several former members of the National Security Agency now working for a private consultancy, Raba Technologies, included a “Red Team” exercise to try to break into the system during a simulated election. Raba found that it took approximately twenty seconds to pick the two locks securing each of Maryland’s 16,0000 AccuVote-TS terminals, and that every one of the locks – 32,000 in all – was identical. “We could have done anything we wanted to,” one of the Red Team members, computer scientist William Arbaugh of the University of Maryland, said. “We could change the ballots [before the election] or change the votes during the election.” Another team member concurred: “Diebold basically had no interest in putting actual security in this system… It’s not like they did it wrong. It’s like they didn’t bother.” Amazingly, both Diebold and Linda Lamone, the state’s top elections official, took the Raba report as a vindication. That was because, in response to the question of whether the state could deploy the system for the March 2004 primary election, the report concluded that it could, albeit unsatisfactorily, as long as a number of mitigating steps were taken to address the security holes. The report made clear this was not a long-term solution, and urged further far-reaching corrective steps. Such misgivings were entirely absent, however, from the public statements given by Lamone or Diebold’s chief executive Bob Urosevich, who said Raba had confirmed “the accuracy and security of our voting systems as they exist today”. Far from being called on their remarks, Lamone and Urosevich set the tone for elections officials across the country who faced similar criticism over their e-voting systems. The attitude was: sweat out the crisis and, if necessary, deny the problem exists. Deny that security is an issue. Deny that any machine has ever been hooked up to a network. Insist that the software has been extensively tested in government laboratories, that DREs are “100 per cent accurate”, that elections involving them have always been “flawless”. Argue that those who want a voter-verified paper trail don’t appreciate the fact that a paper trail already exists, in the form of internal audit logs and other redundant 12 data stored in the machines. Point out that touchscreens are popular with voters, and are an essential tool for compliance with the Americans with Disabilities Act. In fact, insinuate that e-voting critics, aside from being conspiratorial scaremongers, are also fundamentally hostile to the interests of paraplegics, the deaf, the dumb or the blind. In short: take all the high emotion inherent in the accusation that American democracy is being undermined, and throw it right back in the faces of the accusers. That PR approach helped election officials muddle through the 2004 presidential election, if just barely in key battleground states like Ohio where foul play and underhand tactics were once again in evidence from the Republican Party which enjoyed political dominance in the state. DREs were used to count around 30 per cent of the vote in the Bush-Kerry election and although there were plenty of reports of deeply disturbing problems on a county by county basis – including one county in North Carolina which lost around 4,500 votes because of a tabulation software error -- they were given relatively little national publicity. If the Ohio vote had been as close as Florida four years earlier, one suspects the level of scrutiny would have been much higher. The PR approach in defence of electronic systems still holds today, even in the face of mounting disquiet about the safety and cost of America’s new voting systems. There have been pockets of resistance – most notably in California, which was the first of about 25 states to mandate an independently verifiable paper trail on its touch screen systems and called Diebold’s bluff on the development of its TSx model for three years – until the recent, highly questionable certification approval by Secretary of State Bruce McPherson. The federal government, meanwhile, came up with a lot of new rules and the promise of almost $4 billion in hard cash with the passage of the 2002 Help America Vote Act, some of which have made a material difference for the better. Provisional voting, for example, was an option in Florida in 2000; now it is mandatory everywhere, meaning that anyone initially found to be missing from the voter rolls can vote anyway and have his or her eligibility verified later. But the Act left a lot of the decisions on how to implement its modest reform program up to the states, which has led in turn to a lot of confusion and political manoevuring over the way in which provisional voting, for instance, should be organized. When it comes to electronic tabulation – covering optically scanned paper ballots as well as touch screens and other DREs – the Act failed to insist on a mandatory random manual recount of a small percentage of the ballots to verify that the tabulation software is working correctly. That’s a huge flaw in the system, as Harri Hursti’s hack attack experiment revealed. More generally, the Help America Vote Act did little or nothing to streamline voting practices and standards across jurisdictions. The Act established a new federal oversight body called the Election Assistance Commission. But the promised funding for the EAC did not materialise in a timely manner, leaving the body cash-strapped and near-helpless ahead of the 2004 presidential election and scarcely better off since. Last year, the EAC published a list of guidelines for the development and deployment of e-voting systems, which proved to be almost entirely useless. Not only had these systems largely been developed and sold already; the guidelines were also strictly voluntary, which meant counties and vendor companies could blithely ignore what few restrictions they imposed. 13 All of this has left voting reform advocates in the United States distinctly glum. Much of what I have laid out for you has not penetrated public debate to any great degree, for the rather sickeningly blinkered reason that any and all complaints about the electoral system have been interpreted through a partisan political prism. That is to say, the Republicans – who have dominated the past few election cycles -- have interpreted any criticisms as sour grapes by unsuccessful Democratic candidates and their supporters. Some grassroots Democrats, for their part, have made the mistake of accusing the Republicans of entering into a conspiracy with the voting machine companies to keep themselves in power indefinitely. The accusation is a mistake for two reasons – one because I don’t think it can be sustained by the facts, and two because it only perpetuates the partisan view of what should be an issue of deep concern to voters of any political persuasion. The partisan wrangling is also a more general evasion – an excuse for sympathisers of both parties to fail to recognise that the problem with the American electoral system is, and always has been, the corruption of the two-party system in and of itself. Over the past 30 years, that system has only deterioriated under the growing influence of corporate money, which has all but squeezed out meaningful policy debate in the run-up to elections and replaced it with a barrage of television advertising in which he who has the deepest pockets most often wins. As the comedian and now independent candidate for governor of Texas, Kinky Friedman, recently put it with his trademark caustic wit: in the United States, “a fool and his money are soon elected”. E-voting systems have been subject to the same systemic corruption: voting machine vendors sweet-talk underappreciated county election officials one by one, promise them the moon and then co-opt them into covering up the fact that they can’t deliver it. The problem is not necessarily with e-voting itself. One could, for exampl,e establish a national agency to impose rigorous standards and a much greater degree of uniformity on local decision-makers. Or one could, like Australia, develop an open source code that everyone would have the right to inspect and comment on. The problem, rather, is a political one. The United States has once again shown itself to be a trail-blazer and an example to the world. Only, in this case, the example it has set is how not to go about the computerisation of the mechanism at the heart of its democracy. 14