(Bev's a DUer!)
http://www.buzzflash.com/interviews/03/09/29_harris.htmlSeptember 29, 2003
INTERVIEW ARCHIVES
Will the 2004 Election be Stolen With Electronic Voting Machines? An Interview with Bev Harris, Who Has Done the Groundbreaking Work on This Issue.
A BUZZFLASH INTERVIEW
BUZZFLASH: Electronic voting machines, including touch-screen voting, have been touted as the salvation of a fair voting process. Your tenacious research over the last year has shown that this idea may be the Trojan Horse of voting machine reform, allowing elections to be stolen more easily than in the past. What are the basic reasons that you argue that electronic voting machines pose a threat to democracy?
BEV HARRIS: Four reasons:
1. Secrecy: What has always been a transparent process, subjected to many eyes and belonging to all of us, has very recently become secretive and proprietary. This happened when voting systems, which should be considered part of the "public commons" were turned over to private companies. These companies now assert that the process underlying the vote must be held secret from the voters.
2. Ownership: When a system that belongs to the public becomes secret, it becomes doubly important to make sure we can completely trust those who run it. Voting machine companies are not required to tell us who owns them. Two of the top six firms have been foreign-owned: Election.com, owned by the Saudis until an acquisition by Accenture recently, and Sequoia, now owned by DeLaRue (Great Britain). Three of the top six firms have owners and/or directors who represent vested interests:
3. Disabling the safeguards: Voting systems have always had people trying to rig them, with varying degrees of success. What has changed is scale. Whereas it used to be that one had to run around bribing someone to shave the wheel on each lever machine, or collect up ballot boxes and stuff them in a trunk, nowadays a programmer can, essentially invisibly, create a back door into the vote system for millions of votes at once. Whereas vote-rigging has always required physical access before, modems and wireless communications devices now open up possibilities for remote vote rigging that no one can observe.
4. Secret certification and testing, which gives a passing grade to flaws -- The whole reason we are supposed to accept secret software and secret ownership is that, we're told, these systems go through extensive and rigorous certification and testing. However, this turns out not to be the case.
continued