Elections Media ArticlesExcerpts of Key Elections Media Articles in Major Media
Below are key excerpts of revealing news articles on elections from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Elections Information Center.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
A North Carolina newspaper reports that "a systems software glitch in Craven County's electronic voting equipment is being blamed for a vote miscount that ... swelled the number of votes for president here by 11,283 more votes than the total number cast.
Early Thursday, as Broward County elections officials wrapped up after a long day of canvassing votes, something unusual caught their eye. Tallies should go up as more votes are counted. That's simple math. But in some races, the numbers had gone down. Officials found the software used in Broward can handle only 32,000 votes per precinct. After that, the system starts counting backward."
Thousands of new votes on some constitutional amendment questions were discovered early Thursday, potentially forcing a recount on the question of a South Florida vote on slot machines. As absentee ballot counting wound down after midnight in Broward County's elections warehouse, attorneys scrutinizing the close vote on Amendment Four noticed that vote totals changed in an unexpected way after 13,000 final ballots were counted. Election officials quickly determined the problem was caused by the Unity Software that pulls together votes from five machines tabulating absentee ballots. Because no precinct has more than 32,000 voters, the software caps the total votes at that number. From there, it begins to count backward. The glitch was discovered two years ago, and should have been corrected by software manufacturer ES&S of Omaha, Neb., according to Broward County Mayor Ilene Lieberman. "I was so angry last night," Lieberman said. She spoke to representatives from ES&S early Thursday morning, and later was having a spirited telephone conversation with Secretary of State Glenda Hood.
Sarpy County election officials are trying to figure out how they ended up with more votes than voters in the general election. Sarpy County borrowed the election equipment from Omaha-based Election Systems & Software. Its employees operated the machines that are now double-checking the ballots. No one is sure exactly what went wrong.
Note: What the article fails to mention is that with no paper trail, there is not way to know what happened. How is it possible we let our elections use machines that could not be audited or verified?
In LaPorte County, Indiana, a Democratic stronghold, electronic voting machines decided that each precinct only had 300 voters. "At about 7 p.m. Tuesday," according to this report, "it was noticed that the first two or three printouts from individual precinct reports all listed an identical number of voters. Each precinct was listed as having 300 registered voters. That means the total number of voters for the county would be 22,200, although there are more than 79,000 registered voters.
Voters nationwide reported some 1,100 problems with electronic voting machines on Tuesday, including trouble choosing their intended candidates. There were also several dozen voters in six states...who said the wrong candidates appeared on their touch-screen machine's checkout screen. In many cases, voters said they intended to select John Kerry...but when the computer asked them to verify the choice it showed them instead opting for President Bush. The reports did highlight computer scientists' concerns about touch screens, which they say are prone to tampering and unreliable unless they produce paper records for recounts. Roberta Harvey, 57, of Clearwater, Fla., said she had tried at least a half dozen times to select Kerry-Edwards when she voted Tuesday at Northwood Presbyterian Church. After 10 minutes trying to change her selection, the Pinellas County resident said she called a poll worker and got a wet-wipe napkin to clean the touch screen as well as a pencil so she could use its eraser-end instead of her finger. Harvey said it took about 10 attempts to select Kerry before and a summary screen confirmed her intended selection. The Election Protection Coalition received a total of 32 reports of touch-screen voters who selected one candidate only to have another show up on the summary screen, Cindy Cohn, legal director of the Electronic Frontier Foundation, a coalition member.
Concern over electronic voting technology was not assuaged Tuesday as glitches, confusion and human error raised a welter of problems across the country. Nearly one in three voters, including about half of those in Florida, were expected to cast ballots using ATM-style voting machines that computer scientists have criticized for their potential for software glitches, hacking and malfunctioning. In Volusia County, Fla., a memory card in an optical-scan voting machine failed Monday at an early voting site and didn't count 13,000 ballots. Most of the ATM-style machines, including all of Florida's, lack paper records that could be used to verify the electronic results in a recount. The Electronic Frontier Foundation's VerifiedVoting.org, which has been monitoring the implementation of e-voting machines in the U.S., warned on Monday that over 20 percent of the machines tested by observers around the country failed to record votes properly. "A request filed in King County, Washington...uncovered an internal audit log containing a three-hour deletion on election night; 'trouble slips' revealing suspicious modem activity; and profound problems with security, including accidental disclosure of critically sensitive remote access information to poll workers, office personnel, and even, in a shocking blunder, to Black Box Voting activists."
A team of former National Security Agency (NSA) computer experts conducted a weeklong exercise with six Diebold machines and a server. According to team leader Michael Wertheimer, the group uncovered "considerable security risks." They found that the smart cards used to provide supervisors with access to the machines could be easily hacked; the removable media containing voting information was protected by flimsy locks that the team picked in under a minute using bent paper clips. The paper clips weren't even necessary, since all 32,000 keys supplied by Diebold for the machines are identical, allowing any key to open all of the machines. On the software side, the most glaring weakness was in election headquarters servers: Dell PCs ran the Windows 2000 operating system without Microsoft's security upgrade patches, which left servers susceptible to viruses and worms, enabling a remote attacker to tamper with election systems by phone.
In South Carolina, officials bought machines too late for adequate testing. And on many of their onscreen ballots, the presidential contest included names of candidates from local elections. Several Texas counties are thousands of votes short because a bug in the software failed to record Spanish-language ballots. For hundreds of thousands of votes, there will be no paper record at all. In Colorado, a group of hackers is boasting that they stole a box of electronic smartcards used to activate e-voting machines and reprogrammed them to allow multiple votes, just for fun. In virtually every state, officials failed to invite outside technical experts to participate in the process of e-voting machine selection. Because none of the major vendors of e-voting machines release their code for security testing, states and counties are forced to trust vendors' own assessments of their machines' reliability.
According to the official website of the Secretary of State, the state of Wyoming produced a strange miracle by turning out 106% of registered voters for the 2004 elections! The percentage of registered voters who turn out to vote has been rising rapidly over the last 10 years. Could this have anything to do with the increase in electronic voting machines and the accompanying increased ease of elections fraud?
Two strange deaths dramatically changed the balance of power in U.S. government for two recent years. Democratic Senate candidate Mel Carnahan died in a private plane crash on Oct. 16, 2000, just three weeks before the 2000 elections. Mr. Carnahan went on to win the race as a dead man against his rival John Ashcroft. Carnahan's wife was appointed to fill his position, but as she was appointed rather than elected, her Senate term was limited to two years rather than the normal six. She lost her 2002 race to her Republican opponent. On Oct. 24, 2002, just two weeks before the 2002 elections, Democratic Senate candidate Paul Wellstone was killed in a plane crash. His wife died with him. Wellstone had been projected to win the election. There are many suspicious circumstances surrounding Wellstone's death. Isn't it quite a coincidence that these two Democratic candidates both died in plane crashes only two years apart, both just weeks before the elections? It's even more of a coincidence that both were very progressive Democrats. Wellstone was often labeled the most progressive member of Senate.
Some of electronic voting's loudest defenders have been state and local election officials. Many of those same officials have financial ties to voting machine companies. Former secretaries of state from Florida and Georgia have signed on as lobbyists for Election Systems and Software and Diebold Election Systems. When Bill Jones left office as California's secretary of state in 2003, he quickly became a consultant to Sequoia Voting Systems. His assistant secretary of state took a full-time job there. The list goes on. Even while in office, many election officials are happy to accept voting machine companies' largess. Forty-three percent of the budget of the National Association of Secretaries of State comes from voting machine companies and other vendors. State governments in a growing number of states...have pushed through much-needed laws that require electronic voting machines to produce paper records. But these groups have faced intense opposition from election officials [who] argued that voter-verifiable paper trails...are impractical. While they may sincerely think that electronic voting machines are so trustworthy that there is no need for a paper record of votes, their views have to be regarded with suspicion until their conflicts are addressed.
The three companies that certify the nation's voting technologies operate in secrecy, and refuse to discuss flaws in the machines to be used by nearly one in three voters in November. Federal regulators have virtually no oversight over testing of the technology. The certification process, in part because the voting machine companies pay for it, is described as obsolete by those charged with overseeing it. Despite concerns over whether the so-called touchscreen machines can be trusted, the testing companies won't say publicly if they have encountered shoddy workmanship. They say they are committed to secrecy in their contracts with the voting machines' makers — even though tax money ultimately buys or leases the machines. Michael Shamos, a Carnegie Mellon computer scientist and electronic voting expert, told lawmakers in Washington, D.C. "I find it grotesque that an organization charged with such a heavy responsibility feels no obligation to explain to anyone what it is doing." The system for "testing and certifying voting equipment in this country is not only broken, but is virtually nonexistent," Shamos added. More than a decade ago, the Federal Election Commission authorized the National Association of State Election Directors to choose the independent testers. On its Web site, the association says the three testing outfits "have neither the staff nor the time to explain the process to the public, the news media or jurisdictions."
This fall, 30 percent of us will cast our votes by touching a screen on a computerized voting machines. The good news is, these machines don't have any of the problems of paper ballots. The bad news is, they may have much worse problems all their own. [California] Secretary of State Kevin Shelley: "There was a wholesale breakdown in the election last March in...San Diego. Untold thousands of individuals were turned away and denied their right to vote because the voting equipment couldn't start." So many of the machines malfunctioned or ran unapproved software that Shelley took the extraordinary step of decertifying them. Then there's the software worry. Avi Rubin, a computer-science professor at Johns Hopkins University, spent two weeks analyzing the software from the world's biggest voting-machine company, Diebold Election Systems, which has over 50 percent of the market. "We found all kinds of problems in the code," he said. "Upon looking at the source code for Diebold, it was pretty clear that this was a real amateur job. The concern I have is that those machines will be programmed from the start to favor one candidate over another," says Rubin. A Diebold plot to rig the elections? Where did that idea come from? The rumors began with this letter from Diebold's CEO, Wally Odell, who was moonlighting as a Republican fundraiser. In his invitation to a benefit for Bush last August, he wrote, "I am committed to helping Ohio deliver its electoral votes to the president." But Rubin says he is not accusing Diebold of rigging elections. "I'm just saying that they could do it and that we shouldn't allow our elections to be under control of vendors when there are ways of designing voting machines such that the vendors don't have the control of them."
Charlie Matulka, who lost to Senator Chuck Hagel of Nebraska [in 2002], does not trust the results in his election. Most of the votes were cast on paper ballots that were scanned into computerized vote-counting machines, which happen to have been manufactured by a company Mr. Hagel used to run. Mr. Matulka, suspicious of Senator Hagel's ties to the voting machine company, demanded a hand recount of the paper ballots. Nebraska law did not allow it, he was informed. In his primary race in 1996, Mr. Hagel, who had lived in Virginia for 20 years, beat the state attorney general by nearly two to one. In the general election, he defeated the governor, who had been elected two years earlier in a landslide. In 2002, against Mr. Matulka, he won more than 80 percent of the vote. What gets conspiracy theorists excited is not just Mr. Hagel's prodigious wins, but his job before jumping into the 1996 race: heading American Information Systems, the manufacturer of the machines that count 85 percent of Nebraska's votes. Rob Behler ... who helped prepare Georgia's machines for the 2002 election, says secret computer codes were installed late in the process. Votes ''could have been manipulated,'' he says, and the election thrown. Among the growing ranks of electronic-voting skeptics ... Mr. Hagel's wins in 1996 and 2002 have taken on mythic status. The problem is, there is no way to prove the right man was elected. A healthy democracy must avoid even the appearance of corruption. [The] Nebraska elections fail this test.
Note: For more clear evidence Hagel was directly involved in voting machine manipulation which lead to an illegal victory for him, click here and here.
Two convicted felons' roles in running elections in King County have raised new questions about the adequacy of safeguards to protect the integrity of elections. County election officials were unaware of convicted embezzler Jeffrey W. Dean's criminal background when he was named in 1999 to lead an outside team that would design a computer system for managing elections. Dean, who used his computer savvy to cover up his embezzlement of $465,341 from a Seattle law firm in the 1980s, was given keys to the election offices on the fifth floor of the King County Administration Building. And he had unrestricted access to the elections office's high-security computer room where votes are tallied. Dean, 60, has not been involved in King County elections since 2002, but John L. Elder, 48, a convicted drug dealer who was imprisoned with Dean at the Cedar Creek Corrections Center and worked with Dean on county contracts, supervises the printing of ballots and the sorting and mailing of absentee ballots. Dean...put his computer expertise and his election savvy to work when Global Election Systems asked him for help. Dean, whose family business, Spectrum Print and Mail Services had been doing printing and mailing for King County elections for several years, was familiar with the county's voter-registration data. In 1988 [a] law firm confronted Dean over accounting discrepancies. According to Barry Wolf, a partner in the now-defunct Culp firm...Dean disguised his thefts by altering computer records. Dean was [later] appointed to the Global board of directors and named senior vice president with an annual salary of $144,000. When Diebold completed its purchase of Global in January 2002, Diebold reviewed employees' backgrounds and learned of Dean's and Elder's convictions. Dean lost his job but stayed on as a consultant on the Voter View project. Diebold Election Systems marketing director Mark Radke said Dean left the company because he wasn't needed. Radke declined to say whether Dean's criminal past played a role in his departure.
It probably means little now to Howard Dean, but CNN's top executive believes his network overplayed the infamous clip of Dean's "scream" after the Iowa caucuses. "It was a big story, but the challenge in a 24-hour news network is that you try to keep all of your different viewers throughout the day informed without overdoing it," said Princell Hair, CNN's general manager. The media explosion turned the former Democratic presidential front-runner into a punch line and arguably hastened his campaign's free fall. It's also an instructive look at how television news and entertainment works today. "It was totally unfair," said Joe Trippi, who lost his job as Dean's campaign manager in the fallout. Trippi accepts that the footage was newsworthy, but he figured it was a one-day story. Instead, CNN cable and broadcast news networks aired Dean's Iowa exclamation 633 times — and that doesn't include local news or talk shows — in the four days after it was made. "It shouldn't be an anvil that you keep hammering to destroy his candidacy," Trippi said. The cable news networks ran and reran the video. They analyzed it. They ran footage of the late-night comedians joking about it. They played the instant Internet songs that sampled Dean's shout. Virtually overnight, the "I Have a Scream" speech became legend. It took on such a life, said Paul Slavin, senior vice president of ABC News, that "the amount of attention it was receiving necessitated more attention." Neither Slavin nor Mark Lukasiewicz, NBC News executive producer in charge of political coverage, believe the coverage was overdone. Roger Ailes, Fox News chairman, told ABC News it was "overplayed a bit."
Note: If the above link fails, click here for the full article and more.
Concerned citizens have been warning that new electronic voting technology being rolled out nationwide can be used to steal elections. Now there is proof. When the State of Maryland hired a computer security firm to test its new machines, these paid hackers had little trouble casting multiple votes and taking over the machines' vote-recording mechanisms. Computer-security experts [who tried] to foil the safeguards and interfere with an election...were disturbingly successful. It was an "easy matter," they reported, to reprogram the access cards used by voters and vote multiple times. They were able to attach a keyboard to a voting terminal and change its vote count. And...they were able to change votes from a remote location. The Maryland study shows convincingly that more security is needed for electronic voting, starting with voter-verified paper trails. Maryland's 16,000 machines all have identical locks on two sensitive mechanisms, which can be opened by any one of 32,000 keys. The security team had no trouble making duplicates...although that proved unnecessary since one team member picked the lock in "approximately 10 seconds." Diebold, the machines' manufacturer, rushed to issue a self-congratulatory press release with the headline "Maryland Security Study Validates Diebold Election Systems Equipment." The study's authors were shocked to see their findings spun so positively. In Boone County, Ind., last fall...an electronic system initially recorded more than 144,000 votes in an election with fewer than 19,000 registered voters. Given the growing body of evidence, it is clear that electronic voting machines cannot be trusted until more safeguards are in place.
Note: How is Diebold able to brag about its success when the tests clearly fairled.Why didn't this news make front page headlines?
Diebold, Inc. is one of the largest distributors of electronic voting machines. There are no proven cases of fraud or miscounting with Diebold machines as yet. However...these systems provide no "barometer for judging accuracy," says computer science professor Edward Felten. He contends that since all tallying takes place inside the system, voters have no way of knowing if their vote was truly registered. "A programmer could put malicious code in the software, or there could be a bug." On July 30, Diebold agreed. The company posted on their homepage that "a combination of malevolent insiders and unscrupulous voters could tamper with [election] results." But company spokespeople say any machines would be susceptible to that level of fraud. Therefore, they say, their technology can not be expected to guard against it. Diebold has used copyright laws to quash internal memos and e-mails admitting to security flaws and refuses to make their voting machine software code available for independent inspection. Ina Fairfax, Va. school board election. Some voters noticed "when they pushed the button for a given candidate an X would appear over the candidate's name and then later disappear," Felten said. After testing, it was found that about 10 percent of votes were being invisibly dropped. And, according to an Associated Press story published in December, Diebold's staff might include characters willing to engage in malicious actions. Jeffrey Dean, a chief programmer for the company, has spent time in a Washington, D.C., jail for embezzlement and tampering with computer files.
At least five convicted felons secured management positions at a manufacturer of electronic voting machines, according to critics demanding more stringent background checks for people responsible for voting machine software. Voter advocate Bev Harris alleged Tuesday that managers of a subsidiary of Diebold Inc., one of the country's largest voting equipment vendors, included a cocaine trafficker, a man who conducted fraudulent stock transactions, and a programmer jailed for falsifying computer records. The programmer, Jeffrey Dean, wrote and maintained proprietary code used to count hundreds of thousands of votes as senior vice president of Global Election Systems Inc. Diebold purchased GES in January 2002. According to a public court document released before GES hired him, Dean served time in a Washington correctional facility for stealing money and tampering with computer files in a scheme that "involved a high degree of sophistication and planning." The former GES is Diebold's wholly owned subsidiary, Global Election Management Systems, which produces the operating system that touch-screen voting terminals use. Computer programmers say software bugs, hackers or electrical outages could cause more than 50,000 touch-screen machines used in precincts nationwide to delete or alter votes.
Note: Why was this not reported in the top media in front page headlines?
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.