> ... they print a "zero tape at the beginning of the voting day and
> then a "final tally" tape at the end. And the vote counts have to
> match meters on the front of the machines ...

This is the answer I got from my polling place in Montgomery county,
MD in 2004.  Sure, if the number of total votes recorded by the
machines match the number of voters who walked in, that simply
means there hasn't been an electronic equivalent of ballot box
stuffing.

That does _not_ mean that those black box voting machines didn't
incorrectly recorded voters' choices.  And, there's no way to
audit that fact without voters' choices being recorded in a medium
that could be hand counted (ie: voter verified paper records).
If they can't re-count without using the same (suspected) machines,
then I don't trust that system.


> While I have my own doubts about the programming of the machines,
> I think that the actual vote count is relatively secure.

Why should we believe the election officials or the black box
manufacturers that the count is accurate?  The officials can test
the machines before the election day for various scenarios.  The
manufacturer can have various internal quality testing.  Yet, it
only takes one not-so-honest programmer to do something like the
following to skew the tallies on the election day.

  if (today = election_day)  #easy to predict in the US
      if ( 8am < time < 5pm)
          magik_min = RANDOM_NUMBER (3 to 53)
          if ( magik_min < time_minutes < magik_min+4 )
              do { display voter's selection
                   screw the voter and add votes to Party_X
                  }
          end-if
      end-if
  end-if


The election officials won't catch this in their testing before
the election day.  How do we know the manufacturer's QA is
good enough?  If the HW are standard components and the software
is open, then others can do code audits.

Moreover, who knows if there are bugs that get triggered by a
specific sequence of events (ie: insert card; remove card; insert
card; touch screen; remove card; insert card; vote for the first
office; remove card; (ie: voting not completed) next person insert
card ... bug got triggered and the internal counters got totally
messed up)  If the machine is a sealed black box, how do we know
there's no bug like that?  Or even more weird ones?  If the software
is open, then code audits might catch it and the bug could be fixed.


> There has been much made about voter fraud and draconian identity
> schemes imposed to prevent it, but I think the problem posed by
> hacked voting machine software is orders of magnitude more serious
> and has been paid little or no attention (the denials of the
> machine vendors notwithstanding).

A well thought-out process would require election officials to reset
the machines (wipe their programs clean) and install the latest
software just before the election begins.  Of course, proprietary
machine manufacturers would object to election officials being able
to have access to the internals.


As others have pointed out, punch card machines or optical scanners
would make much better, simple yet effective, mechanized voting
systems.  However, the counting part of even those systems could be
influenced just as above.  So, their codes must also be audited.
Moreover, the election results should be randomly audited against
the paper records to make sure nothing funny actually happened.
Just having the paper records is not sufficient.


And, we've spent how many billions of dollars (supposedly) to bring
democracy to Iraq?  Why can't the federal government spend just a
tiny fraction of that money to bring a single, standard voting
system to our own country?


************************************************************************
* ==> QUICK LIST-COMMAND REFERENCE - Put the following commands in  <==
* ==> the body of an email & send 'em to: [EMAIL PROTECTED] <==
* Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name
* Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST
* Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L
* New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress
* Need more help? Send mail to: [EMAIL PROTECTED]
************************************************************************
* List archive from 1/1/2000 is on the MARC http://marc.info/?l=computerguys-l
* List archive at www.mail-archive.com/computerguys-l@listserv.aol.com/
* RSS at www.mail-archive.com/computerguys-l@listserv.aol.com/maillist.xml
* Messages bearing the header "X-No-Archive: yes" will not be archived
************************************************************************

Reply via email to