--- Begin Message ---
Permission granted to copy, distribute, reprint, or cite if you
include the link http://www.blackboxvoting.org and credit source.
Voting system examiners in several states have reportedly
been prohibited from revealing voting system flaws to the
public due to nondisclosure agreements they signed with the
vendors.
With the future of democracy is at stake, just what agreements
were signed by examiners like Steve Freeman (CA), Brit Williams
(GA, MD, VA), Paul Craft (FL), Doug Jones (IA), and David
Jefferson (CA)?
Black Box Voting has learned that vendors have been requiring
nondisclosures to block release of information of critical importance
to the public. Secretaries of state have failed to protect their voting
system examiners, reportedly requiring administrative rules that
prevent proper analysis and evaluation of voting systems by state
examiners.
Black Box Voting has filed public records requests to obtain all
nondisclosure agreements signed by Paul Craft, David Drury,
David Jefferson, Steve Freeman, Doug Jones, Brit Williams, Merle
King, and Michael Shamos.
We have already obtained one of the Diebold nondisclosure
requirements. Diebold attempts to block everything that should
be revealed -- even if the contractor is served with a subpoena
or court order!
BLACK BOX VOTING IS INVESTIGATING THE FOLLOWING ISSUES:
1) Whether voting system examiners have been provided
with indemnification. Failure to provide indemnification allows the
vendor to sue the examiner for damages if the examiner happens
to discover or expose something harmful to the vendor.
2) Whether voting system examiners were protected by their
secretaries of state. It appears that secretaries of state have
left it to the scientists who examine voting software to negotiate
their own terms of engagement with vendors. Some scientists,
who understandably are not experts in intellectual property law,
have signed the agreements provided by vendor attorneys. These
agreements can later prove to be unduly restrictive, preventing the
examiner from revealing what he knows even to the secretary
of state.
3) Whether state voting system examiners were prohibited from
examining the testing reports provided by Ciber and Wyle, the
federal testing labs. Documents provided to Black Box Voting
by Joan Quinn, a citizen in Sacramento, Calif., indicate that
California examiner Steve Freeman may not have had access
to key portions of the federal testing reports when examining
voting systems for the state of California.
4) Whether examiners were prohibited from examining the
source code and/or testing the equipment themselves.
5) Whether examiners were prohibited from asking the vendors
follow up questions by rules or administrative procedures .
6) Whether examiners were ever prohibited by rules or administrative
procedures from communicating with others on voting system
panels or certification boards during deliberations over certification
recommendations, or during/after voting system examinations.
7) Whether examiners are ever allowed to examine escrowed
information -- source code and/or "penetration analysis"?
Black Box Voting has requested copies of the rules, escrow
procedures, and any indemnifications, nondisclosures or administrative
procedures that apply to the certification, examination and deliberation
process in Florida, Pennsylvania, Georgia, California, and Iowa.
PLEASE DO NOT LIMIT THESE IIMPORTANT INQUIRIES TO BBV EFFORTS
- Citizens are urged to gather evidence independently of Black Box
Voting, through Freedom of Information and public records requests,
to determine exactly what procedures, nondisclosures, restrictions,
rules and guidelines are in place for each state's voting system
examiners and certifiers.
- State senators and legislators, especially in the above-named
states, are urged to launch formal hearings, with subpoena power
and witnesses under oath, to investigate exactly what restrictions
were placed on voting machine examiners by vendors and
secretaries of state.
ANOTHER BREAKDOWN IN VOTER PROTECTION
Bruce Sims of San Diego, Calif. caught this problem:
According to 1990 FEC standards section 5.3, "Access Control",
voting machine manufacturers are required to provide federal
testing labs with a "penetration analysis" (hacking analysis). Did
Diebold, Sequoia and ES&S provide this to testing labs?
If so, why didn't the labs identify the massive Diebold holes
exploited by a Finnish security expert in the 2005 Black Box
Voting "Harri Hursti" projects, and by Dr. Herbert Thompson and
Black Box Voting with the Diebold GEMS central tabulator, and
by Jeremiah Akin with the Sequoia WinEDS central tabulator?
"All software (including firmware) for all voting systems SHALL
incorporate measures to prevent ... unauthorized operations by
ANY PERSON. Unauthorized operations include, but are not limited
to: MODIFICATION OF COMPILED OR INTERPRETED CODE..."
This is exactly the "unauthorized operation" that Hursti performed
in Leon County on May 26 and Dec 13 2005 in the Black Box Voting
projects. Thompson's Visual Basic GEMS hack was also an
"unauthorized operation" of the code, and the alterations in the
Sequoia WinEDS code demonstrated by Jeremiah Akin are also
"unauthorized operations."
When public officials and vendors explain to you that these hacks
are not relevant because they require inside access, note that this
FEC requirement applies to both outsiders and INSIDERS.
DID THE VENDOR EVER SUPPLY ACCURATE "PENETRATION ANALYSES?"
"The vendor shall provide a penetration analysis," the standards
say. Setting aside for the moment the sheer stupidity of relying
only on a profit-seeking vendors assessment of their own product
weaknesses, the Diebold memos show that Diebold knew that its
customized AccuBasic code could be altered to "do just about
anything." Therefore, unless Diebold identified this in the "penetration
analysis" it was supposed to provide to the labs, it was out of
compliance with FEC guidelines.
==============
From: Guy Lancaster
Date: Thu, 18 Nov 1999
"The 1.94w firmware does not keep a checksum on the Accu-Basic
report program stored on the memory card. It sounds like that area
has been corrupted on these but without a checksum, the Accu-Vote
doesn't recognize the fact and report the error..."
From: On Behalf Of Steve Knecht
Sent: Tuesday, February 05, 2002 9:54 AM
Subject: AccuVote Tapes Results Report
> could we get an AccuBasic Report Option that just printed out the
label and the ballots cast by precinct only for the zero and election
night report...
Reply: "We can do just about anything."
==============
So, Diebold knew that the AccuVote results reports could be
programmed to "do just about anything" and Diebold also knew
that "firmware does not keep a checksum on the Accu-Basic
report program stored on the memory card."
Did Diebold include this KNOWN information in its "penetration
analysis"?
If so, why are the testing labs (Ciber and Wyle) still in the
business of examining elections software?
If not, why is Diebold still in the elections business?
Not only is the memory card exploit findable and documented
in the public record (at least since 2003 when the Diebold
memos were released), but another "unauthorized operation,"
the use of a Visual Basic script to hack the GEMS central tabulator,
has been widely known for years. The use of the MS Access
database to perform unauthorized functions was publicly revealed
by Black Box Voting in July 2003, but was documented by Diebold
programmers back in Oct. 2001.
Aside from the memory card problems, were the GEMS penetration
points documented in the penetration test sent by Diebold to testing labs?
REGARDLESS, WHY DIDN'T STATE AND INDEPENDENT EXAMINERS
IDENTIFY THE PROBLEMS AND SPEAK UP?
Public records obtained by Joan Quinn reveal that California voting
system examiner Steve Freeman did a five-hour "security examination"
of GEMS after the exploit holes were documented publicly by Black Box
Voting -- yet he recommended certification of the system, even after a
critical protective measure for GEMS hacking was stripped out of the
Diebold central counting system.
What is in his report on this? Black Box Voting has requested a copy,
but due to the bizzaro-world nondisclosures, we believe we may be
turned down for "security" reasons (even though it was Black Box
Voting that first publicly identified the GEMS defects, on July 8, 2003!).
FEC standards:
"Such penetration analysis will be subject to strict confidentiality
and non-disclosure by the test authority. For security reasons, the
penetration analysis shall not be routinely distributed to the jurisdictions
that program elections. The penetration analysis, however, will be
part of the escrow deposit."
HOW MANY SECRETARIES OF STATE HAVE VIOLATED THEIR OWN
STATE ELECTION LAWS?
Many states have election laws that state something similar to this:
"systems be safe from 'fraud or manipulation'."
Let us examine for a moment the responsibility of secretaries of
state under their own legal responsibility to ensure that their voting
system is "safe from fraud or manipulation."
- If the FEC standards requires that the ITA-examined and
vendor-supplied "penetration analysis" be submitted into escrow,
does the secretary of state have a duty to examine the penetration
analysis?
- If a secretary of state authorizes a state examiner to look at
the system, does the secretary of state have a duty to enable said
examiner to conduct an unfettered examination, review federal
testing lab reports, including vendor's "penetration analysis" and
any testing lab comments on it?
- If so, does the secretary of state have an obligation to obtain the
report of his own state examiner?
WHY WOULD A SECRETARY OF STATE HAVE THE CONTRACTOR
NEGOTIATE/SIGN THE NDA WITH THE VENDOR, RATHER THAN THE
SEC. STATE'S OFFICE?
If a nondisclosure is used at all, would not the correct party for
the nondisclosure agreement (NDA) be the secretary of state, with
the sec. state then invoking his own NDA on the state examiner?
In other words, it seems that a strange breach of duty may have
occurred in locations where state examiners were forced into
NDAs directly with vendors. Because the Secretary of State has
a fiduciary duty to the taxpayers to ensure that voting systems are
safe from manipulation, the examiner must be given free rein to
disclose any and all findings with the secretary of state.
Thus, any NDA should be between the secretary of state and the
vendor, with an employment or consultant's agreement executed
between the secretary of state and the examiner. It is the secretary
of state's duty to protect his own examiner from retaliation from
the vendor.
Instead, it appears, the secretaries of state have stepped aside,
have failed to provide examiners with the materials and access to
the voting system reasonably required to perform an examination,
have apparently failed to provide examiners with access to the
penetration analysis, have failed to protect examiners from legal
retaliation by the vendor, and therefore have failed to obtain the
necessary information to "ensure that the system is safe from
manipulation."
# # # # #
-Black Box Voting is a nonpartisan, nonprofit 501c(3) elections
watchdog group supported entirely by citizen donations.
To support our work, go to
http://www.blackboxvoting.org/donate.html or mail to
330 SW 43rd St Suite K PMB 547 Renton WA 98055
-Black Box Voting
,
To unsubscribe, send an email to: unsubscribe-160264@xxxxxxxxxx with the address: margitjo@xxxxxxx in the subject line.
--- End Message ---