Monday, October 24, 2016

Video: Hacking Democracy

How easy it is to hack the type of voting machine used in Springfield and throughout Vermont. A Florida county Supervisor of Elections leads the demonstration.

Is Vermont’s election safe from hackers?
HACKABLE: Vermont’s voting system is based on an optical scanning machine that has a reputation for being easy to hack.
Is Vermont’s election safe from hackers?
By Bruce Parker / September 16, 2016 / Vermont

Vermont’s secretary of state says the election system is secure after hackers breached databases in Arizona and Illinois, but the ballot-counting machine at the center of  the state’s voting process offers little reason for confidence.
Is Vermont’s election secure? The answer may come down to the optical scanners being prepared for use in hundreds of towns and polling places across the Green Mountain State.
Since the FBI informed state officials last month that foreign hackers compromised multiple state Board of Election systems, election chiefs in all 50 states have been working overtime to keep their voting systems protected from a hostile cyber attack.
On Aug. 31, Secretary of State Jim Condos announced that his staff found “no abnormal activity” as described in the FBI’s alert. He further said his office has “taken precautionary steps to safeguard our elections systems,” most notably data systems and the statewide voter checklist.
But FBI officials are preparing to announce more states whose systems were hacked,according to CBS News, and Homeland Security reportedly will provide detailed preventive measures to secure election systems.

Sign-up for our Vermont Watchdog email list to receive the latest news and in-depth coverage.

The flurry of activity has Condos worried.
Photo courtesy of state of Vermont
Photo courtesy of state of Vermont
HIGH ALERT: Vermont Secretary of State Jim Condos is watching for election tampering after an Aug. 18 alert from the FBI Cyber Division informed state election officials that hackers are targeting state Board of Elections systems.
“We really take this seriously. I think it’s important for Vermont voters to know that we are really well prepared and that we are taking precautionary steps to safeguard our election systems,” Condos told Watchdog in an interview Tuesday.
For most Vermont towns, digital security comes down to a ballot-counting optical scanner known as the AccuVote-OS. The unit, formerly made by Premier/Diebold, is now owned by Dominion Voting Systems.
In polling places across the state, Vermonters mark in ovals on paper ballots and feed them into the AccuVote-OS, which captures the vote in its memory card. The paper ballots drop into a storage box, where they are kept on hand in case of a contested election.
The machine’s all-important memory cards are managed by LHS Associates, of Salem, N.H. The company maintains custody over AccuVote-OS memory cards for all machines across New England.
“The machines we use are EAC certified. In fact, they have one of the highest certification levels from the Election Assistance Commission,” Condos said.
For anyone who has seen the AccuVote-OS hacked in various demonstrations over the past decade, such certifications offer little comfort. Security experts have demonstrated repeatedly that AccuVote-OS is shockingly easy to reprogram, and that the only way to verify its tallies is to conduct a hand-counted audit of the paper ballots.
In one demonstration by Princeton University computer science professor Edward Felten, a mock election between George Washington and Benedict Arnold doesn’t go well. While Washington gets three paper ballot votes and Arnold gets none, the optical scanning machine gives the infamous traitor a 2-1 victory. Malicious computer code surreptitiously added to the machine’s memory card switched the votes, and no one could have suspected it.
Hacking Democracy
In the the Emmy nominated HBO documentary “Hacking Democracy,” election specialists watch in stunned amazement as paper ballot votes fed into the optical scanner are reported incorrectly on the machine’s paper spool printout.
As seen in the video, Florida Leon County Supervisor of Elections Ion Sancho, along with five other individuals, vote “no” on a single ballot question, while two others vote “yes” — a 6-2 no vote on paper. What happens next is disturbing.
The elections supervisor inserts the AccuVote-OS’s detachable memory card into the slot, runs a “zero-total test tape” at the machine’s startup to show zero votes on the memory card, and inserts the eight paper ballots into the optical scanner. The result of the election according to the AccuVote-OS machine? A 7-1 yes vote, to the dismay of the observers. One woman breaks down in tears.
“If I had not seen what was behind this … I would have certified this election as a true and accurate result of a vote,” the elections supervisor says in the scene.
The machine not only switched the vote on the paper spool print-out, but on the memory card itself. The hack is known is cybersecurity circles as “the Hursti Hack,” named after the security expert who carried out the demonstration.
While the documentary was filmed in 2006, Felten, along with fellow Princeton professor Andrew Appel, told Politico last month that little has changed for digital vote-counting machines, and that stealing an election takes just seven minutes.
Condos, not a cybersecurity expert, nevertheless expressed confidence that the AccuVote machines are secure.
“Any of the videos that you probably looked at are old videos, from the standpoint of that was on a previous version of the memory card. The newer chips — and that’s what we have in Vermont — address many, if not all, of the issues that were raised at the time,” he said.
“Secondly, there is a chain of custody here. That’s the important piece. There is a chain of custody, and the chips come from the vendor who programs the chips but then gets them directly to the clerks.”
Town clerks are instructed to keep the memory cards “in their vaults under lock and key,” Condos said, and LHS Associates sends the cards less than four weeks out from the election “so they don’t get them way early.”
That means memory card tampering is unlikely to occur from election officials at polling places. But who monitors the third-party custodian of the all-important memory cards, LHS Associates?
“I can’t tell you if there’s someone from the federal government that goes in and checks it — I don’t know that,” Condos said. “But I know this LHS deals with, I think, pretty much all of New England using the same kind of machine.”
Why digital voting machines
According to Verified Voting, a non-partisan organization that promotes election transparency and verifiability, about 135 towns in Vermont use the AccuVote-OS optical scanner. Another 110 Vermont towns count paper ballots entirely by hand.
The digital tabulators became popular following the 2000 Bush-Gore election recount, when the “hanging chad” debacle of Florida’s manual punch-cards led Congress to pass the Help America Vote Act in 2002. Lawmakers appropriated $4 billion for all 50 states to upgrade systems to computerized voting machines.
Some states updated to paperless touch screen systems known as DREs, or direct recording electronic systems. Those machines are increasingly criticized because they leave no paper trail.
Five states — South Carolina, Delaware, Georgia, New Jersey and Louisiana — use DREs statewide without any paper trail. The swing states of Florida, Texas, Pennsylvania, Virginia, Tennessee and Indiana use DREs without paper trails in some locations.
But in Vermont, a paper ballot counted by an optical scanner allows for an audit of the vote tallies reported by the AccuVote-OS machines. Verification would require hand-counting paper ballots and comparing the results to tallies produced by the digital scanners.
Condos didn’t say if his office compares numbers reported by AccuVote-OS machines with a hand count of paper ballots, but he did mention an audit.
“Within 30 days of the general election we do a random audit where we are checking the entire election for that town, from president on down to justices of the peace. We do an audit to check the numbers of the audit versus the numbers of election night. We have several steps that we do, and we’re really confident our system is in pretty good shape.”
He stressed that the machines are not networked together, or to the Internet, making it impossible for an Internet-based hacker to infect all the machines at once using a programming virus. Only LHS has such access, through its custody of the memory cards sent to, and retrieved from, town clerks.
“For someone to go in to hack it they would have to break into a town clerk’s office, steal the chip, hack into it, put the chip back, and have it used,” Condos said.
Condos recognized the importance of a paper trail and said he was instrumental in keeping it in Vermont.
“Vermont was one of the leaders on this back in 2002, post Florida, and during the HAVA discussions,” he said. “We at that time put into statute — in fact, I was on the committee, and I think I made the motion — to require that there be a paper ballot at the end of the day. So, we always have the paper trail at the end of the day.”
In the documentary, Sanchos concludes that hand-counting paper ballots is necessary to audit the AccuVote-OS machines. He also said it’s necessary to keep a watch on the vendors who control the memory cards.
“I think we, as election officials, need to be a little bit more demanding from the vendors as to the technical specifications of this equipment. The vendors are driving the process of voting technology in the United States. I would much rather at this point, I think, focus on allowing citizens to select technology that satisfies their needs.”
Condos, Vermont’s chief elections officer, reiterated that he believes his machines are safe.
“We purchased new machines this past year as we increased the number of towns and have not had any problems with them,” he said.
“I’ve only been in office since 2011, but I was in the Legislature prior to that for eight years, and on the committee that oversaw the Secretary of State’s Office. To my knowledge, we’ve never had a problem.”
Contact Bruce Parker at

Vermont town clerk not told about vote tabulator machine vulnerabilities

By Bruce Parker / September 22, 2016 /  Vermont

SECURITY GAP: Vermont’s secretary of state is conducting a cybersecurity assessment of the state’s election data systems, but town clerks haven’t been notified about a well-known vulnerability related to AccuVote-OS machines.
Vote tabulation machines can be hacked to switch votes without officials knowing it, but one town clerk in Vermont says she’s never heard of the vulnerability and received no guidance from the Secretary of State’s office for how to spot it.
As states prepare for the upcoming presidential election, cyber attacks have federal and state leaders on high alert.
The FBI, CIA, NSA and Department of Homeland Security are investigating high-profile data breaches of state election systems, and secretaries of state in all 50 states are communicating with feds about how to prevent a hacked election.
So far, nine states have requested that Homeland Security scan their electronic election systems following cyber attacks on Arizona and Illinois. In Vermont, Secretary of State Jim Condos has been on the lookout for hacker IP addresses sent from the FBI in August.
Condos launched a cyber-risk assessment of all systems as early as 2013. That assessment involves “penetration testing” from an out-of-state company, in partnership with a Vermont contractor that has a Department of Defense security clearance.
But Vermont’s cybersecurity assessment appears to have overlooked at least one well-known vulnerability.

Sign-up for our Vermont Watchdog email list to receive the latest news and in-depth coverage.

According to computer science experts speaking out in high-profile interviews and online videos, AccuVote tabulators at the center of most state voting systems are easy to hack, and poll workers have no way of spotting it until after Election Day.
In this video, Princeton University computer science professor Edward Felten demonstrates how hackers can make AccuVote machines switch votes by putting malicious software on the unit’s removable memory card.
According to Felten, the hack is invisible to election officials — not even pre-election “logic and accuracy” tests can spot it.  That’s because hackers know how to program their code to switch votes on Election Day only, and to delete itself afterward.
Pam Kingman, town clerk in New Haven, says she is unaware of the machines’ vote-switching vulnerabilities.
“It’s my first time hearing about it,” Kingman told Vermont Watchdog.
It probably shouldn’t be.
Town clerks are the first line of defense against election fraud. These key election workers are trained to run a smooth election, and they learn important protocols to help prevent voter machine and ballot tampering.
New Haven, a small rural town of 1,300 registered voters, has one AccuVote-OS machine. It was purchased around 2008 with federal money appropriated by the Help America Vote Act.
Kingman says the maintenance of the machine, including programming of the all-important memory cards, is managed by a relatively unknown third-party company. LHS Associates, a private company located in Salem, N.H., programs memory cards for all AccuVote tabulator units in New England.
“They come every year, probably every six months. LHS does maintenance to it — batteries, checks everything,” she said.
The memory cards, which LHS provides to town clerks about four weeks before the election, are sent by certified mail and are to be placed in a secure vault.
Next, 10 days before the election — Oct. 29 this year — Kingman and other town clerks must test the memory cards using clearly marked official test ballots. If something goes wrong during the logic and accuracy test, the officials have time to get service from LHS and perform a retest.
“We run sample test ballots through the machine and then verify that it’s accurate,” Kingman said. “So, I’m sure if they weren’t accurate it would show on the test run, if something was amiss.”
Not so, according to Felten.
The Princeton professor says poll workers get a false sense of security from pre-election test runs, including the logic and accuracy testing. He says hackers can program malicious software to execute only after the tabulator is set into “election mode,” after logic and accuracy tests are conducted.
If the memory cards have been hacked, according to Felten, false tallies will be recorded on AccuVote’s internal memory, the removable memory card and the paper tape printout.
Felten warns that the scam can happen right under everyone’s noses: “When the election ends, the vote-stealing software can delete itself from the voting machine — no evidence remains that the machine was ever hijacked, no evidence remains that any votes were stolen. As far as anyone can tell, the election was conducted fairly. But the result is fraudulent.”
Discrepancies between machines and hand-counted ballots were reported in the New Hampshire Democratic primary in 2008. In 2007, Connecticut passed Senate Bill 1311 — Public Act 07-194 — to address troubling differences between machine counts and hand counts in multiple races. Bernie Sanders supporters routinely criticized AccuVote machines during this year’s Democratic primary.
Fortunately, a hack can be spotted after the election using a manual hand-count audit of paper ballots. If a hand-count doesn’t match the machine results, a cyber attack has occurred.
Surprisingly, Vermont’s AccuVote guidance regarding Election Daychain of custodyand logic and accuracy testing doesn’t tell town clerks how to conduct this important audit.
Condos nevertheless claims his office is conducting “a thorough cybersecurity assessment, including penetration testing for all data/systems.” He told Watchdog that the machines are safe from hackers since they are not connected to the Internet or to each other.
But Felten warned that a single hacker with access to memory cards can add malicious software to them, or insert a computer virus that spreads from one machine’s memory card to another machine.
When Watchdog asked Kingman how town clerks could defend against the possibility of hacked memory cards, she replied, “We’d have no control over it. We’re at the mercy of LHS, basically. We depend on them to program it.”
When Condos was asked who is conducting an assessment of LHS Associates, he replied: “I can’t tell you if there’s someone from the federal government that goes in and checks it — I don’t know that.”
Contact Bruce Parker at

Bruce Parker is a reporter and editor for His stories have been featured at, Bloomberg, Politico, The Daily Caller, the Washington Times, Human Events and Thomson, among other outlets. He can be reached at


  1. Ah yup, if we went back to putten them ballots in sap buckets like da old daze then da only hacking would be ma chopping wood for da stove to keep all yer voters arrses warm in town hall.

  2. chuck gregory10/26/16, 8:13 AM

    Forget voter ID. Here's where the real voter fraud comes in. One country clerk in Wisconsin manipulated the Scott Walker recall vote in his favor. It didn't require one fraudulent vote, just one criminal clerk.

  3. chuck gregory10/29/16, 11:45 AM

    At first, I thought this was just a random WatchDog piece meant to manipulate voters' emotions, but it turns out there is some orchestration involved:

    So, a logical question to ask is: besides Broughton, which other Koch brothers' billionaire henchmen are funding this fear mongering?


Please keep your comments polite and on-topic. No profanity

R E C E N T . . . C O M M E N T S

Video:   "He Ain't Heavy He's My Brother"

Sung by David Giardina
Springfield Vermont News is an ongoing zero-income volunteer hyperlocal news gathering project. No paid advertising is accepted on this site but any Springfield business willing to place a link to this news blog on their site will be considered for a free ad here. Businesses, organizations and individuals may submit write-ups and photos about any positive happenings here in Springfield that they are associated with and would be deemed newsworthy. Email the Editor at

Privacy statement: This blog does not share personal information with third parties nor do we store any information about your visit to this blog other than to analyze and optimize your content and reading experience through the use of cookies. You can turn off the use of cookies at anytime by changing your specific browser settings. We are not responsible for republished content from this blog on other blogs or websites without our permission. This privacy policy is subject to change without notice and was last updated on January 1, 2017. If you have any questions feel free to contact Springfield Vermont News directly here:

Pageviews past week

Sign by Danasoft - For Backgrounds and Layouts