With the 2006 midterms over, the impetus for fixing security vulnerabilities with electronic voting machines may be shoved to the back burner. But now’s the time for both parties to admit they have a problem and do something about fixing it — well before the 2008 presidential election.
Thousands of problems with e-voting machines were reported last week. Data is still being collected, so nobody knows for sure how many computer malfunctions and other glitches occurred — such as cutting off a candidate’s name (Virginia), an entire race (Kentucky), electronic activators that didn’t work (Florida), machines that couldn’t be zeroed out (Pennsylvania) and pre-marked electronic ballots (New Jersey). In some states, voting hours had to be extended because technical malfunctions forced harried election officials to resort to paper ballots.
The most troubling were numerous reports of “vote flipping” — in which the voter selects one candidate, but the voting machine records a vote for the opposing candidate. “There were hundreds of reports of vote flipping in 2004,” Stanford computer scientist David Dill told The Examiner. “I said at a press conference at the time that this needed to be investigated, but we are facing the same problem this year.”
Even without such obvious malfunctions, however, one cannot reasonably conclude e-voting machines are accurately recording votes. “All [e-voting systems] are vulnerable to hacking,” Dr. Dill said. “But you can’t tell it happened just by looking at it.” In fact, a team led by Princeton computer expert Edward Felton was able to replace the memory card of a Diebold voting machine, a brand used extensively in Maryland, in less than a minute without leaving a trace. One doctored memory card can spread a vote-altering virus from a personal laptop to Diebolds across the state.
“The testing and certification process is not catching all the problems,” said Courtenary Strickland Bhatia, president of Verified Voting, a group Dill founded to focus attention on the hidden, but well-documented vulnerability to vote tampering on proprietary voting systems that are not open to public scrutiny.
Twenty-eight states now require a paper backup of each vote but Virginia and Maryland aren’t among those states. Thus, true recounts in photo-finish contests are currently impossible in Virginia and Maryland.
A third of the people voting in this year’s midterms cast votes on touch screen machines known to be susceptible to hacking, despite a year-long study released in June by the Brennan Center for Justice at the NYU School of Law that identified120 potential security problems with machines currently in use. The study recommended “automatic random audits of voter-verified paper records.” Computer science experts at some of the nation’s top universities, including Johns Hopkins, concur. So why aren’t we doing it?
Before last Tuesday’s election, Sen. Dianne Feinstein, D-Calif., said she would pursue congressional hearings on electronic voting no matter which party won. She should be held to her promise.

