How to Rig an Election
By Victoria Collier, Harper's Magazine
It was a hot summer in 1932 when Louisiana senator Huey "Kingfish" Long arranged to rig the vote on a number of amendments to his state's constitution that would be advantageous to his financial interests. Long was no stranger to rigged votes. This time around, however, the fix delivered by his machine was blatant and sloppy: his favored amendments won unanimously in sixteen New Orleans precincts and garnered identical vote totals in twenty-eight others.
Eugene Stanley, the incorruptible district attorney for Orleans Parish, presented evidence of fraud to a grand jury. Louisiana's attorney general, the less morally encumbered Gaston Porterie, stepped in to sabotage the case for Long. Nonetheless, two judges demanded a recount, at which point Governor O. K. Allen obliged Long by declaring martial law. Intimidated jurors found themselves sorting ballots under the supervision of National Guardsmen, who stood by to "protect" them with machine guns.
When this effort failed, another grand jury was convened. Their eventual finding of a massive conspiracy led to the indictment of 513 New Orleans election officials. Once again, Long used his famous powers of persuasion. At his behest, the Louisiana legislature modified the state's election law, giving ex post facto protection to the defendants. Election rigging, Long might have quipped, had become downright exhausting. But it worked.
From the earliest days of the republic, American politicians (and much of a cynical populace) saw vote rigging as a necessary evil. Since the opposition was assumed to be playing equally dirty, how could you avoid it? Most Americans would probably have confessed to a grudging admiration for New York City's Tammany Hall machine, which bought off judges, politicians, and ward captains, ensured the suppression of thousands of votes, and controlled Democratic Party nominations for more than a century.
By the beginning of the last century, however, sentiment had begun to shift. In 1915, the Supreme Court ruled that vote suppression could be federally prosecuted. In Terre Haute, Indiana, more than a hundred men had already been indicted for conspiring to fix the 1914 elections for mayor, sheriff, and circuit judge. The incumbent sheriff and judge went to jail for five years, and Mayor Donn M. Roberts spent six years in Leavenworth.
Roberts and his gang, declared the New York Times, had failed to grasp that "what is safe and even commendable one year may be dangerous and reprehensible the next." Almost overnight, commonplace corruption had become unacceptable, and vote rigging a serious crime. It took a strongman like Huey Long to remain an exception to the rule. But the overall trajectory seemed to point toward reform, accountability, and security. In 1920, the Nineteenth Amendment was passed, seventy-two years after Elizabeth Cady Stanton first demanded women's suffrage - the right that would, in Stanton's words, "secure all others." By the 1960s, Northern Democrats abandoned their Southern allies and pushed to end the mass suppression of black votes below the Mason–Dixon line. With the Voting Rights Act of 1965, many Americans began to believe that the bad old days of stolen elections might soon be behind us.
But as the twentieth century came to a close, a brave new world of election rigging emerged, on a scale that might have prompted Huey Long's stunned admiration. Tracing the sea changes in our electoral process, we see that two major events have paved the way for this lethal form of election manipulation: the mass adoption of computerized voting technology, and the outsourcing of our elections to a handful of corporations that operate in the shadows, with little oversight or accountability.
This privatization of our elections has occurred without public knowledge or consent, leading to one of the most dangerous and least understood crises in the history of American democracy. We have actually lost the ability to verify election results.
The use of computers in elections began around the time of the Voting Rights Act. Throughout the 1980s and 1990s, the use of optical scanners to process paper ballots became widespread, usurping local hand counting. The media, anxious to get on the air with vote totals, hailed the faster and more efficient computerized count. In the twenty-first century, a new technology became ubiquitous: Direct Recording Electronic (DRE) voting, which permits touchscreen machines and does not require a paper trail. Old-school ballot-box fraud at its most egregious was localized and limited in scope. But new electronic voting systems allow insiders to rig elections on a statewide or even national scale. And whereas once you could catch the guilty parties in the act, and even dredge the ballot boxes out of the bayou, the virtual vote count can be manipulated in total secrecy. By means of proprietary, corporate-owned software, just one programmer could steal hundreds, thousands, potentially even millions of votes with the stroke of a key. It's the electoral equivalent of a drone strike.
Symbolically speaking, this era was inaugurated by Chuck Hagel, an unknown millionaire who ran for one of Nebraska's U.S. Senate seats in 1996. Initially Hagel trailed the popular Democratic governor, Ben Nelson, who had been elected in a landslide two years earlier. Three days before the election, however, a poll conducted by the Omaha World-Herald showed a dead heat, with 47 percent of respondents favoring each candidate. David Moore, who was then managing editor of the Gallup Poll, told the paper, "We can't predict the outcome."
Hagel's victory in the general election, invariably referred to as an "upset," handed the seat to the G.O.P. for the first time in eighteen years. Hagel trounced Nelson by fifteen points. Even for those who had factored in the governor's deteriorating numbers and a last-minute barrage of negative ads, this divergence from pre-election polling was enough to raise eyebrows across the nation.
Few Americans knew that until shortly before the election, Hagel had been chairman of the company whose computerized voting machines would soon count his own votes: Election Systems & Software (then called American Information Systems). Hagel stepped down from his post just two weeks before announcing his candidacy. Yet he retained millions of dollars in stock in the McCarthy Group, which owned ES&S. And Michael McCarthy, the parent company's founder, was Hagel's campaign treasurer.
Whether Hagel's relationship to ES&S ensured his victory is open to speculation. But the surprising scale of his win awakened a new fear among voting-rights activists and raised a disturbing question: Who controls the new technology of Election Night?
"Why would someone who owns a voting-machine company want to run for office?" asked Charlie Matulka, a Democrat who contested Hagel's Senate seat in 2002. Speaking at a press conference shortly before the election, he added: "Is this the fox guarding the henhouse?" A construction worker with limited funding and name recognition, Matulka was obviously a less formidable competitor than Nelson. Still, Hagel won an astonishing 83 percent of the vote - among the largest margins of victory in any statewide race in Nebraska's history. And with nearly 400,000 registered Democrats on the rolls, Matulka managed to scrape up only 70,290 votes.
Hagel had never actually disclosed his financial ties to ES&S, and Matulka requested an investigation by the Senate Ethics Committee. His request was rejected. Equally futile was his call for a hand count of the ballots, since a state law specified that recounts had to be conducted using the very same "vote-counting device" that was used to begin with - in this case, the ES&S optical scanners.
Meanwhile, the new millennium, far from delivering a democratic promised land, presented Americans with the debacle of the 2000 presidential election, whose fate hung absurdly on "hanging chads" - the little pieces of punched-out ballot so contentiously examined during the monthlong recount. Few Americans knew (and many still do not know) that a faulty computer memory card triggered this fiasco. Late on Election Night, Al Gore's total in Volusia County, Florida, suddenly dropped when one precinct reported 16,000 negative votes. Fox News was immediately prompted by Florida governor Jeb Bush to call the election for his brother. On his way to a 3 a.m. public concession, Gore changed course when a campaign staffer discovered that he was actually ahead in Volusia County by 13,000 votes.
But the damage was done. Gore was cast as a sore loser in a hostile media environment. His effort to obtain a recount was described by Sean Hannity on Fox News as an attempt to "steal the election." Meanwhile, George W. Bush invoked his duty to get on with the business of running the country. The rest, as they say, is history.
We are now in the midst of yet another election season. And as November 6 approaches, only one thing is certain: American voters will have no ability to know with certainty who wins any given race, from dogcatcher to president. Nor will we know the true results of ballot initiatives and referenda affecting some of the most vital issues of our day, including fracking, abortion, gay marriage, GMO-food labeling, and electoral reform itself. Our faith-based elections are the result of a new Dark Age in American democracy, brought on, paradoxically, by techological progress.
The spread of computerized voting has carried with it an enormous potential for electronic skulduggery. In 2003, Bev Harris, a citizen sleuth and the author of Black Box Voting: Ballot Tampering in the 21st Century, made a shocking and game-changing discovery: Diebold, then one of the primary manufacturers of voting machines, had left the 40,000 files that made up its Global Election Management System (GEMS) on a publicly accessible website, entirely unprotected. Diebold was never able to explain how its proprietary tabulation program ended up in such an exposed position. Harris downloaded the files, and programmers worldwide pounced, probing the code for weaknesses. "The wall of secrecy," said Harris, "began to crumble."
GEMS turned out to be a vote rigger's dream. According to Harris's analysis, it could be hacked, remotely or on-site, using any off-the-shelf version of Microsoft Access, and password protection was missing for supervisor functions. Not only could multiple users gain access to the system after only one had logged in, but unencrypted audit logs allowed any trace of vote rigging to be wiped from the record.
The public unmasking of GEMS by an average citizen (who was not a programmer herself) served as a belated wake-up call to the world's leading computer-security experts, who finally turned their attention to America's most widely used voting systems. Damning reports have since been issued by researchers from Johns Hopkins, Princeton, Rice, and Stanford Universities, the Brennan Center for Justice, and the Government Accountability Office (none of them institutions hospitable to "tinfoil hat" conspiracy theorists). Experts describe appalling security flaws, from the potential for system-wide vote-rigging viruses to the use of cheap, easily replicated keys - the same kind used on jukeboxes and hotel minibars - to open the machines themselves. In 2005, the nonpartisan Commission on Federal Election Reform, chaired by Jimmy Carter and James Baker, stated unequivocally that the greatest threats to secure voting are insiders with direct access to the machines: "There is no reason to trust insiders in the election industry any more than in other industries."
As recently as September 2011, a team at the U.S. Department of Energy's Argonne National Laboratory hacked into one of Diebold's old Accuvote touchscreen systems. Their report asserted that anyone with $26 in parts and an eighth-grade science education would be able to manipulate the outcome of an election. "This is a national security issue," wrote the Argonne team leader, Roger Johnston, using the sort of language that would normally set off alarm bells in our security-obsessed culture. Yet his warning has gone unheeded, and the Accuvote-TSX, now manufactured by ES&S, will be used in twenty states by more than 26 million voters in the 2012 general election.
Johnston's group also breached a system made by another industry giant, Sequoia, using the same "man in the middle" hack - a tiny wireless component that is inserted between the display screen and the main circuit board - which requires no knowledge of the actual voting software. The Sequoia machine will be used in four states by nearly 9 million voters in 2012.
Why did a physicist choose to hack into voting machines? "This was basically a weekend project," Johnston told me, expressing his amazement at the meager funding available to examine America's voting systems. "We did it because a lot of people looking at the machines are cybersecurity experts and programmers - and when you have a hammer, everything looks like a nail. They were largely looking at sophisticated, cyber-based attacks. But there are simple physical attacks, as we proved, that are easier to do and harder to prevent."