Coalition Releases 2nd Post-Election Audit Report <read>
Continue reading “Procedures Alone Insufficient For Effective Election Audits”
Coalition Releases 2nd Post-Election Audit Report <read>
Continue reading “Procedures Alone Insufficient For Effective Election Audits”
Press Release: American Statistical Association Calls for Audits to Increase Confidence in Electoral Outcomes, ASA Board adopts position on Electoral Integrity <release> . This should erase all lingering doubt on the part of legislators, election officials, and non-statisticians:
“Trustworthy elections demand integrity throughout the entire electoral process, from voting laws and regulations to details of implementation, including maintaining voter registration lists and a secure chain of custody for voted ballots. All processes and data of US elections should be subject to statistically sound, continuous-quality monitoring and improvement. Data releases should be comprehensive and timely and follow standardized, readily analyzable formats. It is critical that the integrity of central vote tabulations be confirmed by audits of voter-verified hard-copy records in order to provide high — and clearly specified — levels of confidence in electoral outcomes...
Certification of any electoral outcome should require substantiating evidence that the putative winner was the intended selection of the plurality of voters. Compelling statistical evidence of electoral failure should be accepted as a basis for judicial remedy.
This is in addition to an earlier statement covered here several months ago:
The American Statistical Association’s Science and Public Affairs Advisory Committee has recommended that post election audits have at least a 90% level of confidence.
Election officials need to make sure the person elected winner is the person the most voters want..Election results are most trustworthy when the entire election process can be audited, not just the vote counts…the audit should have the statistical power to trigger additional action at least nine out of 10 times when the wrong winner is declared.(emboldening added)
There should be no remaining question that statistical audits represent the only recognized mainstream scientific method for insuring effective audits and are a necessary component of audits that can provide true confidence in election results.
Last week Dr. Shvartsman of the UConn VoTeR Center released a report on Pre-Election testing of memory cards, that report showed 3.5% of the memory cards had “Junk Data” (the cards could not be read) and that many election officials had difficulty following pre-election testing procedures.
This week Dr. Shvartsman released another Post-Election study of 100 cards collected for evaluation after the election. These cards were not randomly selected. The results were similar to pre-election testing with more “Junk Data” cards at 8%. <read>
Once again we appreciate the work of the Secretary of the State’s Office and Dr. Shvartsman’s team in implementing this program. We have much sympathy for election officials who had difficulty complying with the program this time as procedures were added close to the election. We have no sympathy for LHS Associates. Two things seem clear:
The report was released at an 11:00am press conference at the Secretary of the State’s office. Also available at the conference was a yet to be posted analysis of the post-election audits by the VoTeR Center. The data presented was generally consistent with the data compiled and reported by the Coalition. We will cover that report when it is released in its final form.
At the request of the Secretary of the State, Dr. Alex Shvartsman and his team at the UConn VoTeR Center tested memory cards which were shipped to UConn by registrars across the state. <full report>
From the summary:
The total of 522 cards were received and tested by the VoTeR Center, out of which 378 cards were received before the election. Out of the total number of cards, 18 cards, or 3.5% were found to contain “junk” data, that is, they were unreadable, which is easily detected by the tabulators as such, and could not have been used in the election. The rest of the cards, or 96.6%, were found to have been properly programmed for election. These cards contained valid ballot data and the executable code on these cards was the expected code, with no extraneous data or code on the cards.
About half of the cards were found to have been tested and set for election-the intended state of the cards following the prescribed testing procedure. Most of the remaining cards were tested by the towns but not set for election; while this is not a problem, this suggested that the relevant towns/districts either misunderstood the instructions or did not follow the instructions. One card was found in the state set for election but with non-zero counters, indicating that the district tested he card in election mode and did not reset the card. This is a potentially problematic, but detectable situation, since proper procedures require that the “zero counter” report is produced at the start of the election
Full Disclosure: I played a role in suggesting this program to the Secretary of the State’s office at a meeting in October. Professor Michael Fisher of Yale and TrueVoteCT greatly improved on my suggestion. Continue reading “96.6% Of Memory Cards OK, Half Of Registrars Follow Last Minute Procedures”
Bev Harris has a new video on UTube showing the Hursti Hack in Florida with Ion Sancho and some testimony in New Hampshire by Hari Hursti and John Silvestro. John Silvestro is President of LHS Associates the Diebold distributor in that programs all our elections in Connecticut in secret in Massachusetts. Apparently in New Hampshire also uses LHS to program their elections. We take a few more precautions here but are subject to the same risks. <video>
Here is the accompanying article from BlackBoxVoting <read>
Update: Read more on Mr. Silvestro’s views of outsourcing <read>
My opinion is yes because I feel very confident that the process itself is better left in the private thing than it is in the public venue when I see the influence that each political party can put on people and make things happen in this country whether right or wrong, I mean if you think about it and I’d ask you the same way. Would you like politically connected people to vote parties, to be in charge of running you know the process of creating voting machines, counting ballots and you know would you like that? I don’t know…
Update: Food for thought from Brad Friedman <read>
NH Primary: Pre-Election Polls Wildly Different Than Results Announced for Clinton/Obama
Other Pre-Election Numbers, For Republicans and Rest of Dems, Nearly Dead on the Money…the pre-election pollster’s numbers (NOTE: that’s not Exit Polls, but Pre-Election Polls!) were dead-on, for the most part, on the Republican side, as well as on the Democratic side. Except in the do-or-die (for Hillary) Clinton v. Obama race. I’m watching MSNBC right now, and they all seem to agree that the results, for the moment, defy explanation.
While I have no evidence at this time — let me repeat, no evidence at this time — of chicanery, what we do know is that chicanery, with this particular voting system, is not particularly difficult. Particularly when one private company — and a less-than-respectable one at that, as I detailed in the previous post — runs the entire process.
I strongly suggest you go over to the original article at Brad Blog and at least read the graphs. The whole post is well worth reading. There are legitimate questions here which need answers, for instance: Why do journalists accept exit polls as explanations for why people voted a certain way but reject counter conclusions of those same exit polls? I will echo Brad that we don’t have enough data to determine answers here, nobody may ever have access to the necessary data such as original paper ballots under a reliable chain of custody. Let me also echo myself, the Carter-Baker Commission, and the Brennan Center for Justice that it only takes a very small number of people to change an electronic election – not a conspiracy. Yet, perhaps it would take a conspiracy to avoid a convincing analysis of the actual data.
Report recommends votes central count optical scan voting <read>
Update: The Free Press discusses the report and we point out implications for Connecticut. Read after the following update.
Update: Microsolve Executive Summary Report <read>
To summarize, if you are concerned about the safety of your medical records or credit card information – the threat to your right to choose your own government is much, much, much more vulnerable and real.
These vulnerabilities demonstrate the capability for attackers who gain access to specific components of the system to influ- ence and tamper with the confidentiality, integrity and availability of the elections process. Generally speaking, the vulnerabilities identified in the study stem largely from the lack of adoption of industry standard best practices that have been developed for the IT industry over the last several years…
MSI did not have access to the source code of the applications nor to any specific “insider information” other than data that was publicly available from the vendor and from the Interet. MSI was provided with access to the systems in an unrestricted manner for the purposes of testing. This access to he systems was used to identify the vulnerabilities of the system. Obviously, attackers would not be given such wide access to the systems in question, thus we take this intoconsideration when we discuss the identified issues. However, it should be noted that access could likely be obtained by determined and/or well-resourced attackers through a variety of means ranging from bribery and breaking-and-entering to social engineering and outright coercion. Histoy has shown that determined attackers often find powerful ways to gain access to their targets.
All three vendor systems reviewed have serious gaps in compliance with even the most basic set of in- formation security guidelines used by systems in industries such as finance, insurance, medical care, manufacturing, logistics and other global commerce. Given the extremely valuable data that these systems process and the fact that our very democracy and nation depend on the security of that data, much work remains to be done by all three vendors. Adoption of best practices and implementation of additional controls to create a defense-in-depth security posture are critical to enhance the security of these systems.
Continue reading “Ohio Report: Eliminate Precinct Count Optical Scan”
In August, the Secretary of the State of California decertified electronic voting equipment from Diebold, ES&S, and Sequoia. Her action was based on the Top-To-Bottom Review, which consisted of four reports on each vendor. Two of those reports, Documentation and Source Code were not released at the time. On October 5th, I highlited the Documentation Review. Today, I highlight the Source Code Review.
A Source Code Review sounds like and is a very techinical topic. However, this report is very educational and easy to read. Read the Executive Summary, read the Introduction, and more. I don’t expect everyone to read it completely, but please start and see if you agree that it is accessible and articulate. I cannot add to the report, however, I can provide some highlights and encourage you to go farther <the report>
From the executive summary:
Our analysis shows that the technological controls in the Diebold software do not provide sufficient security to guarantee a trustworthy election. The software contains serious design flaws that have led directly to specific vulnerabilities that attackers could exploit. These vulnerabilities include:
- Vulnerability to malicious software…
- Susceptibility to viruses…
- Vulnerability to malicious insiders…
Although we present several unpublished vulnerabilities, many of the weaknesses that we describe were first identified in previous studies…
we conclude tht the safest way to repair the Diebold system is to reengineer it so that it is secure by design.
Continue reading “Diebold Source Code – CA Top-To-Bottom Review”
It is funny to hear myself speak like radical on this issue. I’ve spent my life starting businesses and teaching in such radical institutions as Harvard Business School system and Wharton. Running businesses, starting businesses and teaching business school students. But when you are talking about privatizing elections you are really giving up the security we have that elections are unfettered and free.
Continue reading “Brad Blog Interviews Professor Steve Freeman”
Debra Bowen has recently released the “Documentation Assessment of the Diebold Voting Systems”. Having served as a software buyer and as a product manager, I can attest that software documentation is almost always an afterthought, usually poor, hard to keep up to date, and expensive to do well. Its also a very boring and mundane topic for the average software developer and untechnical user.
Yet, don’t overlook this report. There are Gems (no pun intended) and very valuable insights available from the report. Below are several excerpts to hopefully entice some to read at least a few pages of the report:
conscientious local election officials attempting to master the Diebold system will find the documentation presents numerous impediments to their managing the voting system correctly, in a manner that achieves high accuracy, security, and other core objectives…
Pursuant to the federal standards, Diebold submitted to CIBER [Independent Testing Authority] a set of voting system security policies…A comparative analysis shows that the security policies Diebold filed with CIBER were considerably more stringent and extensive than those it ultimately documented in Diebold’s product manuals..
Continue reading “Diebold Documentation – CA Top-To-Bottom Review”
A Washington Post articles describes a report watered down by the Election Assistance Commission. You will need a free password and Id to view the article.
Because my approach to election issues tends to be more closely aligned with Democrats, I was paired with a Republican co-author. To further remove any taint of partisanship, my co-author and I convened a bipartisan working group to help us. We spent a year doing research and consulting with leaders in the field to produce a draft report. What happened next seems inexplicable. After submitting the draft in July 2006, we were barred by the commission’s staff from having anything more to do with it…
Yet, after sitting on the draft for six months, the EAC publicly released a report — citing it as based on work by me and my co-author — that completely stood our own work on its head. (emboldening added)
As you may or may not know, Senator Dodd sits as Ranking Member on the Committee that created the Help America Vote Act and the Election Assistance Commission. Perhaps it would be a good time to drop Senator Dodd a note and ask for oversight and an investigation.