by Farhad Manjoo
This story is being reprinted with permission, as it first appeared on salon.com (Please visit www.salon.com for more salon.com content.)
A few weeks after Election Night 2002, Roxanne Jekot, a computer programmer who lives in Cumming , Ga. , began fearing demons lingering in the state's voting machines. The midterm election had been a historic one: Georgia became the first state to use electronic touch-screen voting machines in every one of its precincts. The 51-year-old Jekot, who has a grandmotherly bearing but describes herself as a "typical computer geek," was initially excited about the new system. "I thought it was the coolest thing we could have done," she says.
But the election also brought sweeping victories for Republicans, including, most stunningly, one for Sonny Perdue, who defeated Roy Barnes, the incumbent Democrat, to become Georgia 's first Republican governor in 135 years, while Rep. Saxby Chambliss upset Vietnam veteran Sen. Max Cleland. The convergence of these two developments — the introduction of new voting machines and the surprising GOP wins — began to eat away at Jekot. Like many of her fellow angry Democrats on the Internet discussion forums she frequented, she had a hard time believing the Republicans had won legitimately. Instead, Jekot began searching for her explanation in the source code used in the new voting machines.
What she found alarmed her. The machines were state-of-the-art products from an Ohio company called Diebold. But the computer code — which a friend of Jekot's had found on the Internet — was anything but flawless, Jekot says. It was amateurish and pocked with security problems.
"I expected sophistication and some fairly difficult to understand advanced coding," Jekot said one evening this fall at a restaurant near her home. But she saw "a hodgepodge of commands thrown all over the source code" — an indication, she said, that the programmers were careless. Along with technical commands, Diebold's engineers had written English comments documenting the various functions their software performed — and these comments "made my hair stand on end," Jekot said. The programmers would say things like "this doesn't work because that doesn't work and neither one of them work together." They seemed to know that their software was flawed.
To Jekot, there appeared to be method in the incompetence. Professional programmers could not be so sloppy; it had to be deliberate. "They specifically opened doors that need not be opened," Jekot said, suggesting the possibility that Diebold wanted to leave its voting machines open to fraud. And, ominously, the electronic voting systems used in Georgia, like most of the new machines installed in the United States since the 2000 election, do not produce a "paper trail" — every vote cast in the state's midterm election was recorded, tabulated, checked and stored by computers whose internal workings are owned by Diebold, a private corporation.
Jekot was particularly alarmed — and outraged — to learn that company CEO Walden O'Dell is one of the GOP's biggest fundraisers in his home state of Ohio and nationally. Right after the Georgia elections, an O'Dell e-mail began making the rounds of Web logs and other Internet sites that were tracking the Diebold security flaws, in which the CEO bragged that he's "committed to helping Ohio deliver its electoral votes to the president next year." What better way to deliver electoral votes for President Bush, some reasoned, than to control the equipment Americans use to cast their ballots?
Contradicting the conspiracy theory, however, is the fact that the transition to touch-screen machines in Georgia was proposed and championed by Democrats; the state's elected Democrats remain the machines' fiercest defenders. It is an irony of this story, then, that while Roxanne Jekot and her friends claim that Republicans rigged the 2002 election, it is for Democrats — or, for one Democrat in particular, Georgia Secretary of State Cathy Cox — that they reserve their contempt.
"I believe that the 2002 election in Georgia was rigged," Jekot insists. "I don't believe that Saxby Chambliss or Sonny Perdue won their races legally."
No Proof -- Despite Jekot's technical expertise, officials in Georgia consider her theories baseless. Roy Barnes, the defeated Democratic governor, says that blaming his loss on voting machines is "ridiculous." And, to be sure, there is no evidence proving malfeasance, and there probably never will be. The trouble is, the state cannot furnish any definitive evidence to show that the 2002 election was not fraudulent. Proving that the machines didn't malfunction, or that they weren't hacked, is impossible. And since scores of computer scientists say that voting systems are vulnerable to attack, and because activists have raised legitimate concerns about election equipment vendors' politics and processes, Jekot's fears have come to seem, to many, entirely reasonable.
Even a self-described arch-conservative, former Diebold systems manager Rob Behler, says the company failed to test its troubled equipment adequately — and it balked when he warned them of widespread problems with the machines. Last summer, computer scientists at Johns Hopkins University and Rice University found major security flaws in the Diebold machines, concluding that the Georgia system falls "far below even the most minimal security standards." And in January, experts at RABA Technologies, a consulting firm in Maryland , discovered additional failures in that state's Diebold systems. Internal Diebold e-mail shows that company engineers knew about the problems and in some instances chose to ignore them.
Some elections officials are beginning to see the profound dangers inherent in this process; California Secretary of State Kevin Shelley has ordered that all systems in his state implement a paper record by 2006. Activists hailed Shelley's decision as evidence that he understands the fundamental principle at stake: Elections should be sacrosanct.
But on Election Day this November, more than 20 percent of American voters will cast their ballots on paperless electronic machines; voters across the nation will encounter them during the primaries. Critics of touch-screen systems point to the controversy surrounding the vote in Georgia as a sign of things to come nationally. If there's an upset in a close presidential race, will we be able to trust it? Ironically, the paperless systems were supposed to restore trust in a democracy that saw the presidency hang by a few thousand chads in Florida three years ago. In Georgia , and increasingly across the nation, they're in danger of doing quite the opposite.
Many in Georgia dismiss Jekot and her Web-based acolytes as blinded partisans, conspiracy nuts or even "wack-jobs."
But even if you dismiss Jekot as a wack-job, you still have to deal with her friends. Jekot represents only the most strident dissidents in an emerging national movement aimed at slowing the spread of the kind of touch-screen systems that were first used in Georgia . While the movement counts as members some of the shrillest partisans on the Web, it also includes some of the most well-regarded computer scientists in the world — and together, these groups have been unexpectedly successful in changing the national perceptions of touch-screen machines.
Until just about a year ago, these systems were considered the natural replacement to the punch-card machines that so roiled the last presidential election. The new machines are easy to maintain, they can accommodate multiple languages, they can be used by people with disabilities and they have the backing of influential groups like the League of Women Voters and the ACLU. The Help America Vote Act of 2002, which doled out a total of $650 million in federal money to state and local officials who upgrade their aging voting systems, has already prompted dozens of counties and a handful of states to deploy the touch-screen systems.
The activists have upended the process. Fear of the voting machines is now a red-meat issue not just for online lefties but also for libertarians, for many on the right and, increasingly, for the establishment. National newspapers run Op-Eds on the issue, network news features the movement's proponents and public officials like Shelley, in California , have been pressed to change their positions on the systems.
Elections Up for Grabs -- If you spend much time in the world of the activists, you'll understand why the issue has not gone away. In the fall, I sat with Jim March, an anti-Diebold tech expert in Sacramento , Calif. , while he showed me on his home PC how to steal an election. March, an ardent libertarian whose apartment is decorated with political posters — "Politicians Prefer an Unarmed Populace," one announces — spent months investigating security flaws in touch-screen systems. Thanks to his network of fellow geek-activists, he'd found flaws in the system Diebold used to tally election results, a program called GEMS. The GEMS software runs on a standard PC that's usually housed in a county election office. The system stores its votes in a format recognizable by Microsoft Access, a common office database program. If you've got a copy of Access and can get physical access to the county machine — or, some activists say, if you get the county's number and call into the machine over a phone line — the vote is yours to steal.
While I sat at his computer, March helped me open a file containing actual results from a March 2002 primary election held in San Luis Obispo County , Calif. — a file that March says would be accessible to anyone who worked in the county elections office on Election Day. Following March's direction, I changed the vote count with a few clicks. Then, he explained how to alter the "audit log," erasing all evidence that we'd tampered with the results. I saved the file. If it had been a real election, I would have been carrying out an electronic coup. It was chilling.
The person who discovered the problems with the GEMS program — she's singularly responsible for almost every bit of attention recently paid to electronic voting machines, and for almost every juicy detail uncovered about the vote in Georgia — is a middle-aged publicist-turned-investigative-journalist in Seattle named Bev Harris. In late 2002, after reading some claims on the Web that the election equipment firms were being infiltrated by foreign nationals, Harris decided, almost on a lark, to investigate the matter.
Harris had no journalistic experience, but she'd always harbored fantasies of uncovering something big. She turned out to be exceptionally talented at reporting. Within a few weeks of her investigation, she'd dug up many compelling nuggets. She found, for instance, that in the early 1990s, before he was elected to office, Sen. Chuck Hagel, the Nebraska Republican, served as the president of American Information Systems, the company that built most of the voting machines used in his state. Harris also discovered that Diebold, the firm that produced the machines used in Georgia , had left the software used to run its systems on a public server online. Harris downloaded these files and looked through them. She saw that she had the company's source code as well as several other curiously named files — one, for example, was called "rob-georgia.zip."
Before Bev Harris found the files used in Georgia , the software in the machines had essentially been secret. Although the code had been reviewed by government testing authorities, nobody outside those labs had been allowed to see the programs, which is a standard provision in most electronic voting systems. When the computing public got a peek at the files, experts were not kind.
In July, a team of four computer scientists at Johns Hopkins University and Rice University announced that they'd uncovered major security flaws in the machines used in Georgia 's elections. "Our analysis shows that this voting system is far below even the most minimal security standards applicable in other contexts," the team wrote. Diebold has long boasted that votes in its system are stored in an encrypted manner, hidden to anyone who didn't have a valid password; the computer scientists found that Diebold's programmers left the "key" to decrypt the votes written into the code, which is a bit like locking your door and placing the key on the welcome mat. The Hopkins and Rice scientists also said that they saw no adequate mechanism to prevent voters from casting multiple ballots, viewing partial election results or terminating an election early.
On Jan. 19, a team of computer scientists working with RABA Technologies set up a red-team exercise — a one-day attempt to hack into Diebold machines configured as they would be on Election Day. They were successful. In a short time, the hackers managed to guess the passwords securing the voting system, allowing them to cast multiple ballots. They found that with a standard lock-pick set, they could inconspicuously open up each machine — sometimes in less than 10 seconds — and remove or attach various pieces of hardware, letting them erase or change electronic ballots. They concluded that Diebold's touch-screen machines contain "considerable security risks," and they suggested not only that Maryland put in place stringent safeguards before its March 2 primary but that the state also overhaul its system before the presidential election this November.
Diebold fiercely disputes that its technology is vulnerable to attacks. Mark Radke, a spokesman for Diebold, says that the RABA study pointed out some areas in which Maryland could improve its voting procedures, and he's pleased that Maryland is instituting those changes. As for the Hopkins study, Radke says the scientists who looked at the system erred in their assessment by examining only a small bit of the code and by neglecting the "checks and balances" that occur in an actual election. He pointed to a study of the company's system that was performed by Science Applications International Corp., a consulting firm, at the behest of the state of Maryland . The SAIC report gives Diebold a clean bill of health, and Georgia officials say it proves their system is safe.
There is no evidence that someone tampered with the votes in Georgia . But certainly it is not beyond the bounds of possibility that someone could do so in the future. The history of American democracy is replete with allegations of vote fixing and stolen elections — from Rutherford Hayes' disputed victory over Samuel Tilden in 1876 to Illinois in 1960 (there were vote fraud allegations against both Richard Nixon and John F. Kennedy) to the Florida debacle in 2000. Leaving the security of such a crucial government function in the hands of private companies motivated primarily by a desire to make a quick buck seems like a loopy idea to many people. And the more one listens to the activists' complaints about how Diebold does business, the more one comes to understand their worries about election security.
Bev Harris says that in August, a former employee at Diebold handed her a trove of documents from the company, representing years of discussions on an internal company Web site. In the memos, Diebold programmers seem to acknowledge security holes in their system, and they appear to discuss methods of evading testing authorities. In one e-mail, Ken Clark, a programmer at the company, acknowledges that vote data can be viewed with Microsoft Access, but he says that fixing the problem will be difficult, and it would be easier to feel out the testing labs and "find out what it is going to take to make them happy." In another e-mail, Clark recommends to his co-workers that if the state of Maryland — which has also purchased the company's touch-screen machines — decides to require a paper trail in its voting systems, the company should exact a high price for the required upgrades. Diebold should charge Maryland "out the yin," Clark wrote. In yet another e-mail, Clark does an impression of how voters in Georgia might react to touch-screen machines: "Yer votin' thingamajig sure looks purdy," he writes. (Calls to Clark were routed to Diebold's P.R. office. While the company concedes that the memos are authentic, it disputes Harris' claim that the files came from a Diebold employee. Instead, says Mark Radke, Diebold's computers were hacked. The firm initially threatened to sue people who posted the files on the Web, but it has backed off that threat.)
In the spring of 2003, Harris received an e-mail that read, "I think I may be the Rob in rob-georgia." The message was from Rob Behler, a laid-off telecom worker who found a contract job at Diebold's Atlanta warehouse in the summer before the midterm election. Behler, a friendly fellow in his thirties who speaks with a disarming Southern drawl, paints a disastrously unflattering picture of the company that provided his state with its voting equipment. He told Harris that his time at Diebold was marked by confusion and chaos, a month of 16-hour days in which he did nothing but fix broken machines, broken management techniques and deal with incompetent people.
On his first day on the job, Behler, who had never worked on election systems before, was promoted to a manager's position and put in charge of the team assembling, testing and deploying all of the voting machines in the state. He says that when he checked the machines that employees had been assembling for months, he discovered that large numbers of them were defective.
During the few weeks that followed, Behler spent his time fixing the machines. He says that each time he discovered a new problem with the systems, he would call up the tech experts at Diebold, and they would determine a way to fix it. The programmers would put a file on the company server — a file like rob-georgia.zip — and Behler would download it to his laptop, store it on a memory card, then install the memory card on the touch-screen machines. The process steered clear of any certification authorities; no independent body was checking to see what was being installed on the system.
Indeed, Behler remembers a conference call with Diebold executives in which they specifically discussed what to tell Georgia authorities if Diebold engineers were caught installing software on the machines. "Can't we just tell them we're updating?" Behler wondered in the meeting. "They're like, 'No, no, no, no, no, you can't do that. It has to be certified.' And I say, 'Oh? So we don't want them to know that we're fixing a problem?' So I was like, 'OK — we can tell them that we're doing a quality check and that we're making sure that they're all the same.' And that's exactly what we did."
Mark Radke of Diebold says, "All I can tell you about these situations is that before the units are deployed they are fully tested, and that final testing was proof positive about how those units were going to function."
The Georgia secretary of state's office dismisses most of Behler's claims. Chris Riggall, press secretary to Cathy Cox, the secretary of state, says that at some point before the 2002 election, Diebold did discover that Windows CE, the version of the Microsoft Windows operating system that runs on the touch-screen machines, needed to be upgraded. But this was a one-time fix that Cox was fully aware of, he said. This fix was not formally certified by state and federal testing authorities, as Georgia law requires. But Riggall says that the state's testing experts determined that because the upgrade was only to the Windows operating system and not to the other software in the touch-screen machine, it did not need to be certified. The election was fast approaching, Riggall said, and there simply was no time for certification. Doing it this way was "not our preferred best option," he wrote in an e-mail, "but nevertheless justifiable under the circumstances." As for Behler's claim that the software was downloaded from Diebold's publicly accessible server, Riggall says that's not true: "No, we never used that site during any aspect of the 2002 elections."
Behler, who has seven children, is a conservative. One night this fall, standing outside his five-bedroom house in one of Atlanta's affluent northern suburbs, he described his politics in detail — why he favored the ban on late-term abortions, why he considers the minimum wage a foolish idea, why he prefers George W. Bush to Bill Clinton, and why, despite what he knows of working at Diebold, he does not believe that the 2002 election in his state was rigged. For one thing, he doesn't consider the GOP's wins very surprising; to him, the Republicans running that year were fine candidates. Still, he does believe the Diebold flaws are an open invitation to election mischief for partisans on either side of the political spectrum.
Building a Paper Trail -- The movement to challenge electronic voting is not confined to Georgia , or to those who worry about the 2002 election results. David Dill, a computer scientist at Stanford University , has been among the one or two activists most responsible for the shift. Dill says that when he first heard that systems were being installed in Georgia and in some of California 's largest counties — including his own, Santa Clara — he initially figured "that somebody was minding the store and making sure that the equipment is somehow trustworthy."
Then he did some research into how the systems were designed and implemented, and "I began to feel that maybe that wasn't true," he says. Dill says that he was particularly annoyed that election officials seemed to ignore the concerns of computer security experts, who've warned of the dangers of electronic voting for decades. So early in 2003, Dill posted a petition online demanding that all computerized voting equipment produce what he called a "voter-verifiable audit trail."
The audit trail (an idea that was first developed by Rebecca Mercuri, a computer scientist who has long studied the voting systems and is now a research fellow studying transparency in computational systems at Harvard's Kennedy School) works as follows: When a voter casts a ballot on a touch-screen machine, she'll be presented with a paper version of her votes to look over. Once she approves this paper ballot, it becomes the official record of her vote (she is not allowed to remove the paper ballot from the voting precinct). If there is a question about the accuracy of the electronic count, election officials would be required to manually count the paper ballots; if there's a discrepancy between the two counts, the manual count would be considered the official result of the election. Thousands of computer scientists have signed Dill's demand; attaining it nationally has become the paramount goal for the critics of the touch-screen systems.
"It's not just one computer scientist whining about this," Dill says. "It's a lot of very reputable people who are willing to say that as far as they can see, this voter-verifiable audit trail idea is the only way you can conceive the necessary level of confidence in the equipment."
Kevin Shelley's decision, in late November, to require a paper trail in California 's electronic voting machines was gutsy — and some say precipitous. No paper-equipped touch-screen system has ever been used in a real election in the state, and a few election experts have expressed serious concerns about the viability of such a machine. Ted Selker, a computer scientist at MIT who has studied election procedures, fears that the paper trail would be prone to accidents and attacks: Paper ballots are tricky to count accurately by machine, are almost impossible and time-consuming to count by hand, and, of course, they can easily be tampered with. It's not clear how the paper ballots would be made accessible to the blind, either, and nobody knows how much upgrading to the paper system would cost. Selker, who worked on a landmark study of the 2000 election, says that millions of votes each year are lost because of faulty registration databases, flawed ballot design and poorly trained poll workers. Spending money on a paper trail rather than to fix these known problems, he says, is a waste.
Officials in Shelley's office acknowledge the concerns with paper, but they insist that voting firms will overcome them. Most major voting companies, including Diebold, already say they can build systems that include a paper trail. "Our perspective is that voter confidence is paramount in terms of the election process," Tony Miller, an attorney in Shelley's office, says. "Even if this costs a few thousand dollars, the cost of democracy is not necessarily cheap and it shouldn't be the determining factor."
David Dill describes Shelley's decision as "the biggest breakthrough that the paper trail movement has had to date," and he says that he's certain "it will affect the attitude of people in other states." He was right: In December, Nevada also acted to require paper receipts. Dill also has high hopes for the Voter Confidence and Increased Accessibility Act of 2003, a bill introduced in Congress by Rep. Rush Holt, a New Jersey Democrat, which would require a paper trail nationally. Three Democrats in the Senate — Barbara Boxer, Hillary Clinton and Bob Graham — have each proposed companion legislation.
But officials who've already invested in paperless machines will have a hard time joining the paper-trail bandwagon. In Georgia , for instance, Cathy Cox is sticking by her decision. In a speech to the state's political scientists in November, she assailed the critics who've lately attacked touch-screen voting systems, saying they "approach the issue of election technology as if on a mission to save humanity from the scourge of a worldwide conspiracy." But Cox, it should be noted, is massively invested in the reliability of the Diebold systems she purchased, having staked her political career — and the millions it cost to purchase them — on the new system.
The people who insist that Georgia 's 2002 election was stolen may well be wrong. But the attention that they are focusing on voting machines is anything but misplaced. An election has to be above suspicion, even above the suspicion of some of the most suspicious people in a democracy. Says California 's Tony Miller: "If people don't have confidence in the voting systems being used, then they lose faith in the voting process itself."
Farhad Manjoo is the business and technology editor for Salon.com.
Publication date: 02/19/04