Premier Election Solutions: Difference between revisions
No edit summary |
Cyberbot II (talk | contribs) Rescuing 2 sources, flagging 0 as dead, and archiving 35 sources. (Peachy 2.0 (alpha 8)) |
||
Line 62: | Line 62: | ||
[[Avi Rubin]], Professor of Computer Science at [[Johns Hopkins University]] and Technical Director of the [[Information Security Institute]] has analyzed the source code used in these voting machines and reports "this voting system is far below even the most minimal security standards applicable in other contexts."<ref>[http://avirubin.com/vote.pdf Analysis of an Electronic Voting System] Retrieved February 15, 2012.</ref> Following the publication of this paper, the [[State of Maryland]] hired [[Science Applications International Corporation]] (SAIC) to perform another analysis of the Diebold voting machines. SAIC concluded “[t]he system, as implemented in policy, procedure, and technology, is at high risk of compromise.”<ref>[http://web.archive.org/web/20060827160641/http://www.dbm.maryland.gov/dbm_publishing/public_content/dbm_search/technology/toc_voting_system_report/votingsystemreportfinal.pdf Archived version of State of Maryland's Risk Assessment Report regarding Diebold AccuVote-TS Voting System and Processes.] Archived on August 27, 2006. Retrieved January 6, 2009.</ref> |
[[Avi Rubin]], Professor of Computer Science at [[Johns Hopkins University]] and Technical Director of the [[Information Security Institute]] has analyzed the source code used in these voting machines and reports "this voting system is far below even the most minimal security standards applicable in other contexts."<ref>[http://avirubin.com/vote.pdf Analysis of an Electronic Voting System] Retrieved February 15, 2012.</ref> Following the publication of this paper, the [[State of Maryland]] hired [[Science Applications International Corporation]] (SAIC) to perform another analysis of the Diebold voting machines. SAIC concluded “[t]he system, as implemented in policy, procedure, and technology, is at high risk of compromise.”<ref>[http://web.archive.org/web/20060827160641/http://www.dbm.maryland.gov/dbm_publishing/public_content/dbm_search/technology/toc_voting_system_report/votingsystemreportfinal.pdf Archived version of State of Maryland's Risk Assessment Report regarding Diebold AccuVote-TS Voting System and Processes.] Archived on August 27, 2006. Retrieved January 6, 2009.</ref> |
||
The company RABA did a security analysis of the Diebold AccuVote in January 2004 confirming many of the problems found by Avi Rubin and finding some new vulnerabilities.<ref>{{cite web|url= |
The company RABA did a security analysis of the Diebold AccuVote in January 2004 confirming many of the problems found by Avi Rubin and finding some new vulnerabilities.<ref>{{cite web|url=http://www.raba.com/press/TA_Report_AccuVote.pdf |title=Trusted Agent Report Diebold AccuVote-TS Voting System, RABA Innovative Solution Cell (RiSC) |publisher=Web.archive.org |date=March 25, 2004 |accessdate=November 22, 2011 |deadurl=yes |archiveurl=https://web.archive.org/20080512084047/http://www.raba.com/press/TA_Report_AccuVote.pdf |archivedate=May 12, 2008 }}</ref> |
||
In June 2005, the Tallahassee Democrat reported that when given access to Diebold optical scan vote-counting computers, Black Box Voting, a nonprofit election watchdog group founded by [[Bev Harris]], hired Finnish computer expert Harri Hursti and conducted a project in which vote totals were altered, by replacing the memory card that stores voting results with one that had been tampered with. Although the machines are supposed to record changes to data stored in the system, they showed no record of tampering after the memory cards were swapped. In response, a spokesperson for the Department of State said that, "Information on a blog site is not viable or credible."<ref>{{cite web|url=http://reclaimdemocracy.org/articles_2005/leon_florida_vote_test.php |title=Tests in Leon County, Florida, Demonstrate Ease of Vote Count Hacking |publisher=Reclaimdemocracy.org |date=June 4, 2005 |accessdate=November 22, 2011}}</ref> |
In June 2005, the Tallahassee Democrat reported that when given access to Diebold optical scan vote-counting computers, Black Box Voting, a nonprofit election watchdog group founded by [[Bev Harris]], hired Finnish computer expert Harri Hursti and conducted a project in which vote totals were altered, by replacing the memory card that stores voting results with one that had been tampered with. Although the machines are supposed to record changes to data stored in the system, they showed no record of tampering after the memory cards were swapped. In response, a spokesperson for the Department of State said that, "Information on a blog site is not viable or credible."<ref>{{cite web|url=http://reclaimdemocracy.org/articles_2005/leon_florida_vote_test.php |title=Tests in Leon County, Florida, Demonstrate Ease of Vote Count Hacking |publisher=Reclaimdemocracy.org |date=June 4, 2005 |accessdate=November 22, 2011}}</ref> |
||
Line 137: | Line 137: | ||
===Stephen Heller (whistleblower)=== |
===Stephen Heller (whistleblower)=== |
||
In January and February 2004, a [[whistleblower]] named Stephen Heller brought to light memos from [[Jones Day]], Diebold's attorneys, informing Diebold that they were in breach of [[California]] law by continuing to use illegal and uncertified software in California voting machines. [[California Attorney General]] [[Bill Lockyer]] filed civil and criminal suits against the company, which were dropped when Diebold settled out of court for $2.6 million. In February 2006, Heller was charged with three felonies for this action.<ref>{{cite news|url=http://articles.latimes.com/2006/mar/18/local/me-heller18|title=Whistle-Blower or Thief in Diebold Case?|last=So |first=Hemmy |date=March 18, 2006|publisher=[[The Los Angeles Times]]|accessdate=July 14, 2009}}</ref><ref>[http://www.hellerlegaldefensefund.com/oakland.html ]{{ |
In January and February 2004, a [[whistleblower]] named Stephen Heller brought to light memos from [[Jones Day]], Diebold's attorneys, informing Diebold that they were in breach of [[California]] law by continuing to use illegal and uncertified software in California voting machines. [[California Attorney General]] [[Bill Lockyer]] filed civil and criminal suits against the company, which were dropped when Diebold settled out of court for $2.6 million. In February 2006, Heller was charged with three felonies for this action.<ref>{{cite news|url=http://articles.latimes.com/2006/mar/18/local/me-heller18|title=Whistle-Blower or Thief in Diebold Case?|last=So |first=Hemmy |date=March 18, 2006|publisher=[[The Los Angeles Times]]|accessdate=July 14, 2009}}</ref><ref>[http://www.hellerlegaldefensefund.com/oakland.html ] {{wayback|url=http://www.hellerlegaldefensefund.com/oakland.html |date=20061228062312 }}</ref> On November 20, 2006, Heller made a plea agreement to pay $10,000 to Jones Day, write an apology, and receive three years probation.<ref>{{cite web|url=http://web.archive.org/web/20071128035035/http://da.co.la.ca.us/mr/112006b.htm |title=[dead-link] Los Angeles County District Attorney's Office statement regarding Stephen Heller's plea bargain |publisher=Web.archive.org |date=November 28, 2007 |accessdate=November 22, 2011}}</ref> |
||
===Diebold and Kenneth Blackwell's conflict of interest=== |
===Diebold and Kenneth Blackwell's conflict of interest=== |
Revision as of 19:35, 17 October 2015
Company type | Subsidiary |
---|---|
Industry | Electronic Voting hardware Consulting |
Founded | Ohio (January 22, 2002) |
Headquarters | North Canton, Ohio, U.S. |
Products | AccuVote-TSX, AccuVote-OS, AccuView Printer Module, Global Election Management System (GEMS), DIMS-NeT, ExpressPoll-2000, ExpressPoll-4000, VoteRemote Suite |
Parent | Dominion Voting Systems |
Website | Premier Election Solutions |
Premier Election Solutions, formerly Diebold Election Systems, Inc. (DESI),[1] was a subsidiary of Diebold that makes and sells voting machines.
In 2009, it was sold to competitor ES&S. Another subsidiary selling electronic voting systems in Brazil is Diebold-Procomp, with minor market share in that nation. In 2010, Dominion Voting Systems purchased the primary assets of Premier, including all intellectual property, software, firmware and hardware for Premier’s current and legacy optical scan, central scan, and touch screen voting systems, and all versions of the GEMS election management system from ES&S.
At the time ES&S spun off the company due to monopoly charges its systems were in use in 1,400 jurisdictions in 33 states and serving nearly 28 million people.[2]
History
Previously, DESI was run by Bob Urosevich, who worked in the election systems industry since 1976. In 1979, Mr. Urosevich founded American Information Systems. He served as the President of AIS, now known as Election Systems & Software, Inc. (ES&S), from 1979 through 1992. Bob's brother, Todd Urosevich, is Vice President, Aftermarket Sales with ES&S, DESI's chief competitor. In 1995, Bob Urosevich started I-Mark Systems, whose product was a touch screen voting system utilizing a smart card and biometric encryption authorization technology. Global Election Systems, Inc. (GES) acquired I-Mark in 1997, and on July 31, 2000 Mr. Urosevich was promoted from Vice President of Sales and Marketing and New Business Development to President and Chief Operating Officer. On January 22, 2002, Diebold announced the acquisition of GES, then a manufacturer and supplier of electronic voting terminals and solutions. The total purchase price, in stock and cash, was $24.7 million. Global Election Systems subsequently changed its name to Diebold Election Systems, Inc.
Premier Election Solutions, Inc. is currently run by David Byrd.[3]
Name change and acquisition
In 2006, Diebold decided to remove its name from the front of the voting machines for strategic reasons. CEO Thomas Swidarski announced he would decide in the beginning of 2007 if Diebold stays in the election business.[4] In August 2007 the company changed its name to "Premier Election Solutions" ("PES").
Acquisition by Election Systems & Software
Election Systems & Software (ES&S) acquired Premier Election Solutions on September 3, 2009. ES&S President and CEO Aldo Tesi said combining the two companies will result in better products and services for customers and voters. The sale did not affect the Brazilian division.[5]
Following the acquisition, the Department of Justice and 14 individual states launched investigations into the transaction on antitrust grounds.[6] In March 2010, the Department of Justice filed a civil antitrust lawsuit against ES&S, requiring it to divest voting equipment systems assets it acquired from Premier Election Solutions in order to restore competition.[7] The company then sold the assets to Dominion Voting Systems.
Acquisition by Dominion
Dominion Voting Systems acquired Premier on May 19, 2010.[8] "We are extremely pleased to conclude this transaction, which will restore much-needed competition to the American voting systems market and will allow Dominion to expand its capabilities and operational footprint to every corner of the United States," said John Poulos, CEO of Dominion. The transaction was approved by the Department of Justice and nine state attorneys general.[9]
Controversy
O'Dell's fundraising
In August 2003, Walden O'Dell, chief executive of Diebold, announced that he had been a top fund-raiser for President George W. Bush and had sent a get-out-the-funds letter to Ohio Republicans. In the letters he says he is "committed to helping Ohio deliver its electoral votes to the president next year."[10] Although he clarified his statement as merely a poor choice of words, critics of Diebold and/or the Republican party interpreted this as at minimum an indication of a conflict of interest, at worst implying a risk to the fair counting of ballots. He responded to the critics by pointing out that the company's election machines division is run out of Texas by a registered Democrat. Nonetheless, O'Dell vowed to lower his political profile lest his personal actions harm the company. O'Dell resigned his post of chairman and chief executive of Diebold on December 12, 2005 following reports that the company was facing securities fraud litigation surrounding charges of insider trading.[11]
Security and concealment issues
- For more information in the 2004 elections see: 2004 United States presidential election: Specific issues relating to Diebold machines and practices
Avi Rubin, Professor of Computer Science at Johns Hopkins University and Technical Director of the Information Security Institute has analyzed the source code used in these voting machines and reports "this voting system is far below even the most minimal security standards applicable in other contexts."[12] Following the publication of this paper, the State of Maryland hired Science Applications International Corporation (SAIC) to perform another analysis of the Diebold voting machines. SAIC concluded “[t]he system, as implemented in policy, procedure, and technology, is at high risk of compromise.”[13]
The company RABA did a security analysis of the Diebold AccuVote in January 2004 confirming many of the problems found by Avi Rubin and finding some new vulnerabilities.[14]
In June 2005, the Tallahassee Democrat reported that when given access to Diebold optical scan vote-counting computers, Black Box Voting, a nonprofit election watchdog group founded by Bev Harris, hired Finnish computer expert Harri Hursti and conducted a project in which vote totals were altered, by replacing the memory card that stores voting results with one that had been tampered with. Although the machines are supposed to record changes to data stored in the system, they showed no record of tampering after the memory cards were swapped. In response, a spokesperson for the Department of State said that, "Information on a blog site is not viable or credible."[15]
In early 2006, a study for the state of California corroborated and expanded on the problem;[16] on page 2 the California report states that:
"Memory card attacks are a real threat: We determined that anyone who has access to a memory card of the AV-OS, and can tamper it (i.e. modify its contents), and can have the modified cards used in a voting machine during election, can indeed modify the election results from that machine in a number of ways. The fact that the results are incorrect cannot be detected except by a recount of the original paper ballots" and "Harri Hursti's attack does work: Mr. Hursti's attack on the AV-OS is definitely real. He was indeed able to change the election results by doing nothing more than modifying the contents of a memory card. He needed no passwords, no cryptographic keys, and no access to any other part of the voting system, including the GEMS election management server."
A new vulnerability, this time with the TSx DRE machines, was reported in May 2006. According to Professor Rubin, the machines are "much, much easier to attack than anything we've previously said... On a scale of one to 10, if the problems we found before were a six, this is a 10. It's a totally different ballgame." According to Rubin, the system is intentionally designed so that anyone with access can update the machine software, without a pass code or other security protocol. Diebold officials said that although any problem can be avoided by keeping a close watch on the machines, they are developing a fix.[17]
Michael I. Shamos, a professor of computer science at Carnegie Mellon University who is a proponent of electronic voting and the examiner of electronic voting systems for Pennsylvania, stated "It's the most severe security flaw ever discovered in a voting system." Douglas W. Jones, a professor of computer science at the University of Iowa, stated "This is the barn door being wide open, while people were arguing over the lock on the front door." Diebold spokesman David Bear played down the seriousness of the situation, asserting that "For there to be a problem here, you're basically assuming a premise where you have some evil and nefarious election officials who would sneak in and introduce a piece of software. I don't believe these evil elections people exist."[18]
On October 30, 2006, researchers from the University of Connecticut demonstrated new vulnerabilities in Diebold AccuVote-OS optical scan voting terminal. The system can be compromised even if its removable memory card is sealed in place.[19]
On November 2, 2006, HBO premiered a documentary entitled "Hacking Democracy", concerning the vulnerability of electronic voting machines (primarily Diebold) to hacking and inaccurate vote totals. The company argued that the film was factually inaccurate and urged HBO to air a disclaimer explaining that it had not verified any of the claims.[20][21][22] However, corroboration and validation for the exploits shown in Hacking Democracy was published in a report for the state of California (see above).
In January 2007, a photo of the key used to open Diebold voting machines was posted in the company's website. It was found possible to duplicate the key based on the photo. The key unlocks a compartment which contains a removable memory card, leaving the machine vulnerable to tampering.[23]
A report commissioned by Ohio’s top elections official on December 15, 2007 has found that all five voting systems used in Ohio (made by Elections Systems and Software; Premier Election Solutions (formerly Diebold Election Systems); and Hart InterCivic) have critical flaws that could undermine the integrity of the 2008 general election.[24]
On July 17, 2008, Stephen Spoonamore made the claim that had "fresh evidence regarding election fraud on Diebold electronic voting machines during the 2002 Georgia gubernatorial and senatorial elections." Spoonamore is "the founder and until recently the CEO of Cybrinth LLC, an information technology policy and security firm that serves Fortune 100 companies." He claims that Diebold Election Systems Inc. COO Bob Urosevich personally installed a computer patch on voting machines in two counties in Georgia, and that the patch did not fix the problem it was supposed to fix.[25] Reports have indicated that then Georgia Secretary of State Cathy Cox did not know the patch was installed until after the election.[26]
States rejecting Diebold
In 2004, after an initial investigation into the company's practices, Secretary of State of California Kevin Shelley issued a ban on one model of Diebold voting machines in that state. California Attorney General Bill Lockyer, joined the state of California into a false claims suit filed in November 2003 by Bev Harris and Alameda County citizen Jim March. Here is a copy of the original lawsuit [27] and here is the article showing it became the California false claims suit:[28]
The suit charged that Diebold had given false information about the security and reliability of Diebold Election Systems machines that were sold to the state. To settle the case, Diebold agreed to pay $2.6 million and to implement certain reforms.[29] On August 3, 2007, California Secretary of State Debra Bowen decertified Diebold and three other electronic voting systems after a "top-to-bottom review of the voting machines certified for use in California in March 2007."[30]
In April 2007, the Maryland General Assembly voted to replace paperless touchscreen voting machines with paper ballots counted by optical scanners, effective in time for the 2010 general (November) elections. The law, signed by the Governor in May 2007, was made contingent on the provision of funding by no later than April 2008. The Governor included such funding in his proposed budget in January 2008,[31] but the funding was defeated by the state House in July 2008.[32]
In March 2009, California Secretary of State Debra Bowen decertified Diebold's GEMS version 1.18.19 after the Humboldt County Election Transparency Project discovered that GEMS had silently dropped 197 ballots from its tabulation of a single precinct in Eureka, California.[33] The discovery was made after project members conducted an independent count using the ballot counting program Ballot Browser.
Leaked memos
In September 2003, a large number of internal Diebold memos, dating back to 1999, were posted to the BlackBoxVoting.org web site, resulting in the site being shut down due to a Diebold cease and desist order. Later, other website organizations Why War? and the Swarthmore Coalition for the Digital Commons, a group of student activists at Swarthmore College posted the memos. U.S. Representative Dennis Kucinich, a Democrat from Ohio, placed portions of the files on his websites.[34] The full set of these internal memos is posted here: Original Diebold Memos—FULL SET [35]
Diebold attempted to stop the publication of these internal memos by sending cease-and-desist letters to each site hosting these documents, demanding that they be removed. Diebold claimed the memos as their copyrighted material, and asserted that anyone who published the memos online was in violation of the Online Copyright Infringement Liability Limitation Act provisions of the Digital Millennium Copyright Act found in §512 of the United States Copyright Act.
When it turned out that some of the challenged groups would not back down, Diebold retracted their threat. Those who had been threatened by Diebold then sued for court costs and damages, in OPG v. Diebold. This suit eventually led to a victory for the plaintiffs against Diebold, when in October 2004 Judge Jeremy Fogel ruled that Diebold abused its copyrights in its efforts to suppress the embarrassing memos.
Stephen Heller (whistleblower)
In January and February 2004, a whistleblower named Stephen Heller brought to light memos from Jones Day, Diebold's attorneys, informing Diebold that they were in breach of California law by continuing to use illegal and uncertified software in California voting machines. California Attorney General Bill Lockyer filed civil and criminal suits against the company, which were dropped when Diebold settled out of court for $2.6 million. In February 2006, Heller was charged with three felonies for this action.[36][37] On November 20, 2006, Heller made a plea agreement to pay $10,000 to Jones Day, write an apology, and receive three years probation.[38]
Diebold and Kenneth Blackwell's conflict of interest
Ohio State Senator Jeff Jacobson, Republican, asked Ohio Secretary of State Ken Blackwell, also a Republican, in July 2003 to disqualify Diebold's bid to supply voting machines for the state, after security problems were discovered in its software, but was refused.[39] Blackwell had ordered Diebold touch screen voting machines, reversing an earlier decision by the state to purchase only optical scan voting machines which, unlike the touch screen devices, would leave a "paper trail" for recount purposes. Blackwell was found in April 2006, to own 83 shares of Diebold stock, down from 178 shares purchased in January 2005, which he attributed to an unidentified financial manager at Credit Suisse First Boston who had violated his instructions to avoid potential conflict of interest, without his knowledge.[40] When Cuyahoga county's primary was held on May 2, 2006, officials ordered the hand-counting of more than 18,000 paper ballots after Diebold's new optical scan machines produced inconsistent tabulations, leaving several local races in limbo for days and eventually resulting in a reversal of the outcome of one race for state representative. Blackwell ordered an investigation by the Cuyahoga County Board of Elections; Ohio Democrats demanded that Blackwell, who was also the Republican gubernatorial candidate in 2006, recuse himself from the investigation due to conflicts of interest, but Blackwell did not do so.[41]
The Republican head of the Franklin County, Ohio Board of Elections, Matt Damschroder, said a Diebold contractor came to him and bragged of a $50,000 check he had written to Blackwell’s "political interests."[42]
See also
- Black Box Voting
- ChoicePoint
- Diebold
- Electoral fraud
- Electronic voting
- Hacking Democracy
- Voting machine
References
- ^ "Diebold Election Systems to Become Premier Election Solutions" (Press release). Diebold Election Systems, Inc. August 16, 2007. Retrieved December 21, 2009.
- ^ "Dominion Voting Systems, Inc. Acquires Premier Election Solutions Assets From ES&S". Benzinga.com. Retrieved November 22, 2011.
- ^ "Point-by-point Response to HBO Documentary" (PDF) (Press release). Diebold Election Systems, Inc. November 3, 2006. Archived from the original (PDF) on June 20, 2007. Retrieved March 30, 2007.
- ^ Barney Gimbel, Fortune writer-reporter (November 3, 2006). "Rage against the machine: Diebold struggles to bounce back from the controversy surrounding its voting machines (Fortune, 3. November 2006)". Money.cnn.com. Retrieved November 22, 2011.
- ^ "ES&S buys competitor". Omaha World-Herald (Omaha.com). Retrieved March 9, 2009.
{{cite web}}
: Italic or bold markup not allowed in:|publisher=
(help) - ^ Ben Klayman (December 19, 2009). "U.S. opens probe of Diebold unit sale -report". Thomson Reuters. Retrieved January 20, 2010.
- ^ United States Department of Justice (March 8, 2010). "Justice Department Requires Key Divestiture in Election Systems & Software/Premier Election Solutions Merger". Retrieved November 9, 2012.
- ^ "Dominion Voting Systems, Inc. Acquires Premier Election Solutions Assets From ES&S". Business Wire. May 20, 2010. Retrieved November 9, 2012.
- ^ http://www.dominionvoting.com/images/pdfs/DominionAcquiresPremierReleaseFinal4.pdf
- ^ Paul Krugman (December 2, 2003). "Hack The Vote". The New York Times. Retrieved June 21, 2012.
- ^ Lundin, Leigh (August 17, 2008). "Dangerous Ideas". Voting Fiasco, Part 279.236(a). Criminal Brief. Retrieved October 7, 2010.
- ^ Analysis of an Electronic Voting System Retrieved February 15, 2012.
- ^ Archived version of State of Maryland's Risk Assessment Report regarding Diebold AccuVote-TS Voting System and Processes. Archived on August 27, 2006. Retrieved January 6, 2009.
- ^ "Trusted Agent Report Diebold AccuVote-TS Voting System, RABA Innovative Solution Cell (RiSC)" (PDF). Web.archive.org. March 25, 2004. Archived from the original (PDF) on May 12, 2008. Retrieved November 22, 2011.
{{cite web}}
: Unknown parameter|deadurl=
ignored (|url-status=
suggested) (help) - ^ "Tests in Leon County, Florida, Demonstrate Ease of Vote Count Hacking". Reclaimdemocracy.org. June 4, 2005. Retrieved November 22, 2011.
- ^ "Security Analysis of the Diebold AccuBasic Interpreter"
- ^ Experts see new Diebold flaw: They call it worst security glitch to date in state's voting machines and a 'big deal' TMCnet.com, May 12, 2006
- ^ New Fears of Security Risks in Electronic Voting Systems New York Times, May 12, 2006. Also see Security Focus in depth four page report.
- ^ Security Assessment of the Diebold Optical Scan Voting Terminal (UConn VoTeR Center and Department of Computer Science and Engineering, University of Connecticut, October 30. 2006)
- ^ "Cease and Desist letter from Diebold Elections' President David Byrd" (PDF). Retrieved November 22, 2011.
- ^ Michael Janofsk (October 31, 2006). "Seattle PI story on the Diebold press release regarding 'Hacking Democracy'". Seattlepi.com. Retrieved November 22, 2011.
- ^ Clarke, Gavin (November 2, 2006). "Article from 'The Register' regarding Diebold's letters to HBO". Theregister.co.uk. Retrieved November 22, 2011.
- ^ Diebold shows how to make your own voting machine key.
- ^ Ohio Elections Official Calls Machines Flawed
- ^ "The Raw Story - GOP cyber-security expert suggests Diebold tampered with 2002 election". rawstory.com.
- ^ "The Raw Story - Documents show Georgia's Secretary of State knew of Diebold patch". rawstory.com.
- ^ "copy of case number RG031284"
- ^ "Vote machine maker settles over her whistle-blower suit"
- ^ Gimbel, Barney (November 3, 2006). "Rage against the machine". Fortune Magazine.
- ^ "Top-To-Bottom Review". California Secretary of State. August 3, 2007. Archived from the original on August 17, 2007. Retrieved August 10, 2007.
- ^ "TrueVote Applauds O'Malley For Funding Transition to Paper Ballot". VoteTrustUSA. January 16, 2008. Retrieved August 15, 2008.
- ^ Michael Hardy (July 16, 2008). "House defeats paper ballot funding". FCW.com. Retrieved August 15, 2008.[dead link]
- ^ "Withdrawal of Approval of GEMS 1.18.19" (PDF). State of California Secretary of State. March 30, 2009.[dead link]
- ^ "Kucinich Calls for Suspension of Electronic Voting," Common Dreams, April 23, 2004.
- ^ "Original Diebold Memos -- Full Set"
- ^ So, Hemmy (March 18, 2006). "Whistle-Blower or Thief in Diebold Case?". The Los Angeles Times. Retrieved July 14, 2009.
- ^ [1] Archived 2006-12-28 at the Wayback Machine
- ^ "[dead-link] Los Angeles County District Attorney's Office statement regarding Stephen Heller's plea bargain". Web.archive.org. November 28, 2007. Retrieved November 22, 2011.
- ^ "Voting Machine Controversy". Commondreams.org. August 28, 2003. Retrieved November 22, 2011.
- ^ "Improper stock buy reported". Vindy.com. April 4, 2006. Retrieved November 22, 2011.
- ^ Democrats want Blackwell to remove himself from election probe Canton Repository, May 9, 2006
- ^ "Vendor's donation questioned". Columbus Dispatch. July 16, 2005.[dead link]
External links
Research and reports
- Security Analysis of the Diebold AccuVote-TS Voting Machine, Princeton University
- Analysis of an Electronic Voting System, Avi Rubin at Johns Hopkins University
- The Case of the Diebold FTP Site by Douglas W. Jones, Professor of Computer Science at the University of Iowa
- [2][dead link] by Science Applications International Corporation
- Maryland Voting Systems Study, RTI International, December 2, 2010
- Top-to-Bottom Review of voting systems by the government of California
- Online Policy Group v. Diebold case file from Electronic Frontier Foundation
- Diebold takes down blackboxvoting.org, Egan Orion, The Inquirer, September 24, 2003
- Con Job at Diebold Subsidiary, Associated Press, Wired, December 17, 2003