(forwarded)

Subject: [GPM] Black Box Voting

Inside A U.S. Election Vote Counting Program
Tuesday, 8 July 2003, 6:20 pm
Article: Bev Harris  

Inside A U.S. Election Vote Counting Program 

By Bev Harris*
* Bev Harris is the Author of the soon to be published book " Black Box Voting: Ballot 
Tampering In The 21st Century "
http://www.blackboxvoting.com

A Diebold touchscreen voting machine
Makers of the walk right in, sit right down, replace ballot tallies with your own GEMS 
vote counting program.

IMPORTANT NOTE: Publication of this story marks a watershed in American political 
history. It is offered freely for publication in full or part on any and all internet 
forums, blogs and noticeboards. All other media are also encouraged to utilise 
material. Readers are encouraged to forward this to friends and acquaintances in the 
United States and elsewhere.

CONTENTS
Introduction
Part 1 - CAN THE VOTES BE CHANGED?
Part 2 - CAN THE PASSWORD BE BYPASSED?
Part 3 ? CAN THE AUDIT TRAIL BE ALTERED?

See Also Companion Article For Wider Background?
Sludge Report #154 ? Bigger Than Watergate!
http://www.scoop.co.nz/mason/stories/HL0307/S00064.htm


*************

Introduction
For both optical scans and touch screens operating using Diebold election systems, the 
voting system works like this:

Voters vote at the precinct, running their ballot through an optical scan, or entering 
their vote on a touch screen.

After the polls close, poll workers transmit the votes that have been accumulated to 
the county office. They do this by modem.

At the county office, there is a "host computer" with a program on it called GEMS. 

GEMS receives the incoming votes and stores them in a vote ledger. But then, we found, 
it makes another set of books with a copy of what is in vote ledger 1. And at the same 
time, it makes yet a third vote ledger with another copy.

The Elections Supervisor never sees these three sets of books. All she sees is the 
reports she can run: Election summary (totals, county wide) or a detail report (totals 
for each precinct). She has no way of knowing that her GEMS program is using multiple 
sets of books, because the GEMS interface draws its data from an Access database, 
which is hidden.

And here is what is quite odd: On the programs we tested, the Election summary 
(totals, county wide) come from the vote ledger 2 instead of vote ledger 1. 

Now, think of it like this: You want the report to add up ONLY the ACTUAL votes. But, 
unbeknownst to the election supervisor, votes can be added and subtracted from vote 
ledger 2, so that it may or may not match vote ledger 1. Her official report comes 
from vote ledger 2, which has been disengaged from vote ledger 1.

If she asks for a detailed report for some precincts, though, her report comes from 
vote ledger 1. Therefore, if you keep the correct votes in vote ledger 1, a spot check 
of detailed precincts (even if you compare voter-verified paper ballots) will always 
be correct.

And what is vote ledger 3 for? For now, we are calling it the "Lord Only Knows" vote 
ledger.

>From a programming standpoint, there might be reasons to have a special vote ledger 
>that disengages from the real one. From an accounting standpoint, using multiple sets 
>of books is NOT OKAY. From an accounting standpoint, the ONLY thing the totals report 
>should add up is the original votes in vote ledger 1. Proper bookkeeping NEVER allows 
>an extra ledger that can be used to just erase the original information and add your 
>own. And certainly, it is improper to have the official reports come from the second 
>ledger, the one which may or may not have information erased or added.


*************
Detailed Examination Of Diebold GEMS Voting Machine Security ( Part 1) 


CAN THE VOTES BE CHANGED?
Let's go into the GEMS program and run a report on the Max Cleland/Saxby Chambliss 
race. (This is an example, and does not contain the real data.) Here is what the 
Totals Report will look like in GEMS: 


 
CLICK FOR BIG VERSION
http://www.scoop.co.nz/stories/images/gems/CLEL3.jpg 
As it stands, Cleland is stomping Chambliss. Let's make it more exciting. 

The GEMS election file contains more than one "set of books." They are hidden from the 
person running the GEMS program, but you can see them if you go into Microsoft Access. 

You might look at it like this: Suppose you have votes on paper ballots, and you pile 
all the paper ballots in room one. Then, you make a copy of all the ballots and put 
the stack of copies in room 2. 

You then leave the door open to room 2, so that people can come in and out, replacing 
some of the votes in the stack with their own. 

You could have some sort of security device that would tell you if any of the copies 
of votes in room 2 have been changed, but you opt not to. 

Now, suppose you want to count the votes. Should you count them from room 1 (original 
votes)? Or should you count them from room 2, where they may or may not be the same as 
room 1? What Diebold chose to do in the files we examined was to count the votes from 
"room2." 

Illustration: 

If an intruder opens the GEMS program in Microsoft Access, they will find that each 
candidate has an assigned number: 



http://www.scoop.co.nz/stories/images/gems/CANDNUM.jpg 
One can then go see how many votes a candidate has by visiting "room 1" which is 
called the CandidateCounter: 



http://www.scoop.co.nz/stories/images/gems/ROOM1.jpg 
In the above example, "454" represents Max Cleland and "455" represents Saxby 
Chambliss. 

Now let's visit Room2, which has copies of Room1. You can find it in an Access table 
called SumCandidateCounter: 



http://www.scoop.co.nz/stories/images/gems/ROOM2.jpg 
Now let's put our own votes in Room2. We'll put Chambliss ahead by a nose, by 
subtracting 100 from Cleland and adding 100 to Chambliss. Always add and delete the 
same number of votes, so the number of voters won't change. 



Notice that we have only tampered with the votes in "Room 2." In Room 1, they remain 
the same. Room 1, after tampering with Room 2: 


 
http://www.scoop.co.nz/stories/images/gems/ROOM1.jpg 
Now let's run a report again. Go into GEMS and run the totals report. Here's what it 
looks like now: 


 
CLICK FOR BIG VERSION 
http://www.scoop.co.nz/stories/images/gems/CLEL4.jpg 
Now, the above example is for a simple race using just one precinct. If you run a 
detail report, you'll see that the precinct report pulls the untampered data, while 
the totals report pulls the tampered data. This would allow a precinct to pass a spot 
check. 


*************
Detailed Examination Of Diebold GEMS Voting Machine Security ( Part 2) 


CAN THE PASSWORD BE BYPASSED?
At least a dozen full installation versions of the GEMS program were available on the 
Diebold ftp site. The manual, also available on the ftp site, tells that the default 
password in a new installation is "GEMSUSER." Anyone who downloaded and installed GEMS 
can bypass the passwords in elections. In this examination, we installed GEMS, clicked 
"new" and made a test election, then closed it and opened the same file in Microsoft 
Access. 

One finds where they store the passwords by clicking the "Operator" table. Anyone can 
copy an encrypted password from there, go to an election database, and paste it into 
that. 

Example: Cobb County Election file


 
http://www.scoop.co.nz/stories/images/gems/PW-1.jpg
One can overwrite the "admin" password with another, copied from another GEMS 
installation. It will appear encrypted; no worries, just cut and paste. In this 
example, we saved the old "admin" password so we could replace it later and delete the 
evidence that we'd been there. An intruder can grant himself administrative privileges 
by putting zeros in the other boxes, following the example in "admin." 


 
CLICK FOR BIG VERSION
http://www.scoop.co.nz/stories/images/gems/PW-3.jpg
How many people can gain access? A sociable election hacker can give all his friends 
access to the database too! In this case, they were added in a test GEMS installation 
and copied into the Cobb County Microsoft Access file. It encrypted each password as a 
different character string, however, all the passwords are the same word: "password." 
Password replacement can also be done directly in Access. To assess how tightly 
controlled the election files really are, we added 50 of our friends; so far, we 
haven't found a limit to how many people can be granted access to the election 
database. 


 
CLICK FOR BIG VERSION
http://www.scoop.co.nz/stories/images/gems/PW-FRND.JPG
Using this simple way to bypass password security, an intruder, or an insider, can 
enter GEMS programs and play with election databases to their heart's content. 


*************
Detailed Examination Of Diebold GEMS Voting Machine Security ( Part 3) 


CAN THE AUDIT TRAIL BE ALTERED?
Britain J. Williams, Ph.D., is the official voting machine certifier for the state of 
Georgia, and he sits on the committee that decides how voting machines will be tested 
and evaluated. Here's what he had to say about the security of Diebold voting 
machines, in a letter dated April 23, 2003:

"Computer System Security Features: The computer portion of the election system 
contains features that facilitate overall security of the election system. Primary 
among these features is a comprehensive set of audit data. For transactions that occur 
on the system, a record is made of the nature of the transaction, the time of the 
transaction, and the person that initiated the transaction. This record is written to 
the audit log. If an incident occurs on the system, this audit log allows an 
investigator to reconstruct the sequence of events that occurred surrounding the 
incident.

In addition, passwords are used to limit access to the system to authorized personnel."

Since Dr. Williams listed the audit data as the primary security feature, we decided 
to find out how hard it is to alter the audit log.

Here is a copy of a GEMS audit report. 


 
CLICK FOR BIG VERSION
http://www.scoop.co.nz/stories/images/gems/AUDIT-1.JPG
Note that a user by the name of "Evildoer" was added. Evildoer performed various 
functions, including running reports to check his vote-rigging work, but only some of 
his activities showed up on the audit log. 

It was a simple matter to eliminate Evildoer. First, we opened the election database 
in Access, where we opened the audit table:


 
CLICK FOR BIG VERSION
http://www.scoop.co.nz/stories/images/gems/AUDIT-2.JPG
Then, we deleted all the references to Evildoer and, because we noticed that the audit 
log never noticed when the admin closed the GEMS program before, we tidily added an 
entry for that.


 
CLICK FOR BIG VERSION
http://www.scoop.co.nz/stories/images/gems/AUDIT-3.JPG
Access encourages those who create audit logs to use auto-numbering, so that every 
logged entry has an uneditable log number. Then, if one deletes audit entries, a gap 
in the numbering sequence will appear. However, we found that this feature was 
disabled, allowing us to write in our own log numbers. We were able to add and delete 
from the audit without leaving a trace. 

Going back into GEMS, we ran another audit log to see if Evildoer had been purged:


 
CLICK FOR BIG VERSION
http://www.scoop.co.nz/stories/images/gems/AUDIT-4.JPG
As you can see, the audit log appears pristine.

In fact, when using Access to adjust the vote tallies we found that tampering never 
made it to the audit log at all.

A curious plug-in was found in the GEMS program, called PE Explorer. Presumably, this 
is used to do security checks. Another function, though, is to change the date and 
time stamp:



http://www.scoop.co.nz/stories/images/gems/datetime.JPG
Although we interviewed election officials and also the technicians who set up the 
Diebold system in Georgia, and they confirmed that the GEMS system does use Microsoft 
Access, is designed for remote access, and does receive "data corrections" from time 
to time from support personnel, we have not yet had the opportunity to test the above 
tampering methods in the County Election Supervisor's office. 

We used an actual data file, labeled "Cobb County" for much of our testing. 


*** ENDS ***

Reply via email to