With close votes apparently the norm for now and recounts causing all sorts of upheaval, one group has claimed that a certain electronic voting machine can easily be manipulated to change votes.
According to the Open Voting Foundation (OVF), Diebold’s TS voting machine has a major security flaw. (Note: The group and site are quite new. The link is to a press release on the home page, so it may move). OVF asserts that “with the flip of a single switch inside, the machine can behave in a completely different manner compared to the tested and certified version.”
OVF’s President has stated “Diebold has made the testing and certification process practically irrelevant,” … “If you have access to these machines and you want to rig an election, anything is possible with the Diebold TS — and it could be done without leaving a trace. All you need is a screwdriver.”
In addition, OVF claims that the model in question lacks a verified paper trial against which votes could be cross-checked. For those who want to see the innards of the machine OVF has posted pictures and the most important one is of the boot configuration.
Why does this matter? If this assertion is correct, “in the TS, a completely legal and certified set of files can be instantly overridden and illegal uncertified code be made dominant in the system, and then this situation can be reversed leaving the legal code dominant again in a matter of minutes” it appears that dead people can again vote and entire groups of votes can be excluded. As VerifiedVoting details the Help America Vote Act may have great potential to eliminate punch cards and other dubious voting systems but just because new technologies are available that does not mean that we should blindly assume the dangers of voter fraud and election rigging are gone. They may indeed simply be harder to detect.