mardi 27 juin 2006

This November, the elections will be meaningless

They will be meaningless because we cannot have any confidence in the voting machines we use to vote. Already, serious questions have arisen about the recent special election in the 50th district in California, and today USA Today reports on the long-awaited analysis of DRE voting machines by the nonpartisan Brennan Center for Justice:

There are more than 120 security threats to the three most commonly purchased electronic voting systems, the study by the Brennan Center for Justice says. For what it calls the most comprehensive review of its kind, the New York City-based non-partisan think tank convened a task force of election officials, computer scientists and security experts to study e-voting vulnerabilities.

The study, which took more than a year to complete, examined optical scanners and touch-screen machines with and without paper trails. Together, the three systems account for 80% of the voting machines that will be used in this November's election.

While there have been no documented cases of these voting machines being hacked, Lawrence Norden, who chaired the task force and heads the Brennan Center's voting-technology assessment project, says there have been similar software attacks on computerized gambling slot machines.

"It is unrealistic to think this isn't something to worry about" in terms of future elections, he says.

[snip]

The new threat analysis does not address specific machines or companies. Instead, it "confirms the suspicions about electronic voting machines that people may have had from individual reports" of problems, Norden says.

Among the findings:

Using corrupt software to switch votes from one candidate to another is the easiest way to attack all three systems. A would-be hacker would have to overcome many hurdles to do this, the report says, but none "is insurmountable."

The most vulnerable voting machines use wireless components open to attack by "virtually any member of the public with some knowledge and a personal digital assistant." Only New York, Minnesota and California ban wireless components.

• Even electronic systems that use voter-verified paper records are subject to attack unless they are regularly audited.

• Most states have not implemented election procedures or countermeasures to detect software attacks.

"There are plenty of vulnerabilities that can and should be fixed before the November election," says David Jefferson, a Lawrence Livermore National Laboratory computer scientist who served on the task force. "Whether they will or not remains to be seen."


In the CA-50 election, emergency Town Halls have been set up to enlighten voters as to the many irregularities that took place, among them voting machines being taken home for days in advance of the election by poll workers.

This is a very real problem, folks, it is NOT theoretical. We have now had two questionable presidential elections, one midterm, and two special Congressional elections (the other being the Hackett/Schmidt House race, in which returns from Jean Schmidt's precinct were reported much later than every other precinct in the district) that are suspect. The stakes have never been higher than they are this fall, and yet we have a voting apparatus that is rife with real and potential corruption and a Washington Democratic Party that is either willfully ignorant, or just doesn't care.

If you don't care whether your vote is counted, and counted the way you cast it, who will?

Aucun commentaire:

Enregistrer un commentaire