Why VVPAT ‘Paper Trails’ are Not Enough

UCONN Report demonstrates that during a sleepover VVPAT records can be set to misrepresent how votes will be tallied

Even if every single voter diligently checks his/her Voter Verified Paper Audit Trail (VVPAT) record.

Share article:

Guest Blogged by John Washburn

Currently, the public portions of the top to bottom review published by California last week have rightly been the subject of banner headlines. A report from the University of Connecticut, however, which was entitled “Integrity Vulnerabilities in the Diebold TSx Voting Terminal” and released a few days prior with not quite as much fanfare, provides an excellent counter to the oft-repeated vendor talking point that the California testing is similar to “giving keys to a thief.”

The University of Connecticut report is immune to this specious argument. The University of Connecticut team had no access to source code or any information which was not publicly available. These limitations are precisely what all three vendors defined as “realistic” in their testimony in California at the public hearing on Monday July, 30, 2007. Yet, under these vendor-approved conditions, the University of Connecticut found yet another set of new, serious, and election altering defects and was able to exploit them in a disturbingly effective manner.

The primary finding of the report is that in a “sleepover” situation where the TSx DRE is sent home with the poll worker days or in the case of San Diego weeks ahead of time, it is possible to alter the ballot definitions of the DRE. The alteration would create the behavior where the votes for two candidates are exchanged. Thus, the voter touches the screen next to name of John Smith, the screen lights up the selection for John Smith, the voter verifiable paper audit trail prints the name John Smith, but, nonetheless, the invisible electronic ballot accrues the vote to Pocahontas. Similarly, voters intending to vote for Pocahontas would have their votes accrue to John Smith. This is a straight up exchange of votes between two candidates.

The report also mentions how to suppress the display of a given candidate.

This exploit manipulates the ballot definition and nothing else. The successful exploits in the UCONN report take advantage of the fact that the ballot definition is split between the election database and the display portion stored the .XTR files, but without corresponding mechanisms to maintain referential integrity between the two halves of the ballot definition. The election database portion of the ballot definition controls how votes accrue to candidates based on the ballot line. The display portion of the ballot definition controls how names are printed on the screen and VVPAT record based on the ballot line. Both exploits introduce a referential integrity break between these two halves of the ballot definition.

In the example above, the election database has Pocahontas and Smith on ballot lines 5 and 20; respectively. By swapping the .XTR files, the display portion of the ballot definition has Pocahontas on ballot line 20 and Smith on ballot lines 5. Thus, a screen touch to ballot line 5 accrues a vote to the candidate assigned to ballot line 5. According the election database portion of the ballot definition, this is Pocahontas. The screen and VVPAT print the name associated with ballot line 5. According the display portion of the ballot definition (the .XTR files) this is Smith. Thus, both the screen and VVPAT say Smith, but the vote on the invisible electronic ballot actually accrues to Pocahontas.

    IF a VVPAT trail exists and,

      IF the VVPAT trail is undamaged
      and,

        IF an audit is actually performed, then, and only then,

          would a careful audit of the VVPAT audit trail discover this manipulation of
          the ballot definition.

The needed tools for either of these exploits are:

    1) A laptop with a PCMCIA card reader,
    2) One of the following three: a screw driver, lock picking skills, or a hotel mini-bar key, and
    3) The desire to “take one for the team” and commit a felony to further your candidate.

It must be stressed again that this all was discovered with nothing more than access to the DRE machine. This examination was under vendor-approved conditions. There was no access to any information an election official would not normally have or any information which a determined citizen could not find out during a DRE sleepover prior to an election.

The take away here is that if you can poison the well, the computer programming and/or configuration files in the DRE, everything which proceeds from the DRE is potentially corrupted as well. The UCONN report demonstrates the Diebold TSx DRE can produce consistent election records that are not accurate election records.

Share article:

Reader Comments on

Why VVPAT ‘Paper Trails’ are Not Enough

9 Comments

(Comments are now closed.)


9 Responses

  1. 1)
    bruce said on 8/2/2007 @ 10:32am PT: [Permalink]

    Thank you John for blogging this; this is especially noteworthy since -at least in San Diego- poll workers do not undergo background checks.

  2. 3)
    Catherine_a said on 8/2/2007 @ 2:30pm PT: [Permalink]

    Great report, John. And deeply disturbing.

    Thanks for such a clear description of the problem and the implications. Just think–millions could be spent “verifying” this system, source code, etc.–and yet just a small period of unsupervised time with one of the machines could turn around an entire election in some circumstances. And if you had access to several machines, or many machines (e.g. partisan poll workers), there’s no telling what might happen.

    Background checks would be no help. Most white-collar criminals appear quite respectable and probably wouldn’t have criminal records that would arouse suspicion.

  3. 4)
    John Washburn said on 8/2/2007 @ 3:03pm PT: [Permalink]

    The root cause of this exploit is found on page 4 in section 2.2.2
    Election Data and Database File Each candidate name (in an RTF file) is packaged with a 128 bit integrity check, however, these are not used correctly. [emphasis mine]

    Good, well implimented cryptography is hard to get right even for competent, experienced programmers.

    Bruce Schneier has an excellent article on this entitled: “Why Cryptography Is Harder Than It Looks”

  4. 5)
    Big Dan said on 8/2/2007 @ 7:15pm PT: [Permalink]

    “Thus, the voter touches the screen next to name of John Smith, the screen lights up the selection for John Smith, the voter verifiable paper audit trail prints the name John Smith, but, none the less, the invisible electronic ballot accrues the vote to Pocahontas.”

    I said this a couple of articles back. You touch a screen where it says “Kerry”, the inside electronics tabulate +1 for Bush, and the paper prints out that you voted for Kerry. Paper trails do not prove ANYTHING!

    There are THREE distinct things, unlike paper ballots. 1) the screen 2) the inside of the machine 3) the printout. THREE DIFFERENT THINGS!

    The screen isn’t the paper printout. The inside isn’t the screen, and the paper printout is not the inside electronics. You have to be an IDIOT not to realise this!

    Theoretically, 10 people can touch the screen where it says “Kerry”, it can print out 10 “Kerry” printout receipts, and register 10 votes for “Bush” inside!!!

    YOU DON’T KNOW WHAT’S GOING ON INSIDE THE MACHINE!

  5. 6)
    Big Dan said on 8/2/2007 @ 7:16pm PT: [Permalink]

    Furthermore, inside the machine you don’t even see any NUMBERS! It’s all electronics!

  6. 7)
    Chris Wilson said on 8/3/2007 @ 1:01pm PT: [Permalink]

    This is why Digital Pen Voting is such a great way to vote. See http://www.votingindustry.com for a Youtube video of this. It’s PAPER based, an unlike Optical Scan (that so many of you are enamored with), it SHOWS you how the machine has interpreted your results. With OpScan it sucks it in and you have NO IDEA what it did.

    The time is now for a new technology!!! View it!!

  7. 8)
    the_zapkitty said on 8/4/2007 @ 2:36am PT: [Permalink]

    … Chris Wilson gushed…

    “… it SHOWS you how the machine has interpreted your results.”

    No. It shows you what it wishes you to think it interpreted the results as.

    Then it tabulates your ballot as a straight-party ticket for the NeoPNAC Alliance.

    Upon the winning 98.6% of the popular vote the new Neo Project for the Neko American Century government of America then launches a pre-emptive strike by invading and occupying the Akihabara district in Japan… where it spends 9 billion dollars a month in Nekomimi Maid and Butler Cafes.

    Humor aside, you are obviously unclear on the concepts involved here… and in your position you can’t afford to be.

  8. 9)
    Chris Wilson said on 8/6/2007 @ 10:13am PT: [Permalink]

    By the way ZAPKITTY, it’s TRUE that it isn’t PROOF of how you voted. NOTHING (Let me repeat, NOTHING, does that). Not even hand counted paper ballots counted in the precinct will do that–think about it.
    But instead, dude, you are happy with optical scan systems that suck the paper in and you are DONE–no confirmation of how it was marked. Again, it isn’t PROOF. Nothing does that. By the way, I’ve been in this game for a LONG LONG time and I have worked in election offices and in the election vendor community. I know it inside and out, and you I’m afraid you are a Luddite. See my site for my qualifications; I know they are better than yours.
    C. Wilson http://www.votingindustry.com

(Comments are now closed.)


Please help The BRAD BLOG, BradCast and Green News Report remain independent and 100% reader and listener supported in our 23rd YEAR!!!

ONE TIME
any amount...

MONTHLY
any amount...

OR VIA SNAIL MAIL
Make check out to...
Brad Friedman/
BRAD BLOG
7095 Hollywood Blvd., #594
Los Angeles, CA 90028

RECENT POSTS

But Here’s Another Post That Comes AFTER the Stay-on-Top Test!

But is it really under the sticky post?

Trying Out Stay-on-Top Functionality

How does it work?

You tell me!

‘Dangerous Times’: Climate Scientist Warns Trump ‘Censorship’ Endangering National Security: ‘BradCast’ 3/6/2026

Guest: Dr. Peter Gleick; Also: Admin deported at least 50 legal Venezuelan migrants; Judge says South Sudan deportations violated court order

This is the Sub Sub title line. Have added it so that we can see how the spacing works everywhere with both sub headers...

TEST

Guest: Election expert Marilyn Marks on GA 2018 Lt. Gov. election contest as state moves to unverifiable barcoded ballots; Also: FL 2020 GOP power-grab update; IA Repubs vote to NOT count absentee ballots...

Investigators reportedly examining federal judge's long history of alleged domestic abuse, while Congressional impeachment looms...

The Attempted 2018 Voter Suppression Begins: ‘BradCast’ 8/20/2018

And other news, both good and bad, around the country and world, 78 days out from the midterm elections...

A New Test Post for Linux61

This is one of those famous sub-titles you've heard so much about, that have been so vexing

And this, believe it or not, is a sub-sub-title!...

Sunday ‘Cutting Corners’ Toons

THIS WEEK: Big Barbaric Bill ... Conman's Clowns ... Anti-Semitism ... In Memoriam ...

‘A World of Tyrants, Bribes, and Influence’: ‘BradCast’ 5/22/2025

Guests: Heather Digby Parton of Salon, 'Driftglass' of 'Pro Left Podcast'...

‘Green News Report’ – May 22, 2025

With Brad Friedman & Desi Doyen...

And Then They Came for Members of Congress…: ‘BradCast’ 5/20/2025

Guest: Attorney Keith Barber; Also: Noem doesn't know what Habeas Corpus means; Paramount owner wants CBS News to roll over to Trump...

‘Green News Report’ – May 20, 2025

With Brad Friedman & Desi Doyen...

Appeals Court Blocks Last Route for Voters to Challenge Violations of the Voting Rights Act: ‘BradCast’ 5/19/2025

Guest: Justin Levitt, former Dep. Asst. A.G. at DOJ; Also: Springsteen sounds alarm; Far-right loses in Romania; SCOTUS blocks Trump again...

Sunday ‘Now Hoarding’ Toons

THIS WEEK: From the Middle East ... to Capitol Hill ... and Across the MAGAVerse ...

Mad World: ‘BradCast’ 5/15/2025

Birthright citizenship and nationwide injunctions at SCOTUS; GOP tax and health care cuts in the House; Eliminating FEMA, dismantling NWS before hurricane season; Noem's surreal tattoo testimony; Souter's warning...

‘Green News Report’ – May 15, 2025

With Brad Friedman & Desi Doyen...

About Brad Friedman...

Brad is an independent investigative journalist, blogger and broadcaster.
Full Bio & Testimonials…
Media Appearance Archive…
Articles & Editorials Elsewhere…
Contact…
He has contributed chapters to these books…
…And is featured in these documentary films…

BRAD BLOG ON THE AIR!

THE BRADCAST on KPFK/Pacifica Radio Network (90.7FM Los Angeles, 98.7FM Santa Barbara, 93.7FM N. San Diego and nationally on many other affiliate stations! ALSO VIA PODCAST: RSS/XML feed | Pandora | TuneInApple Podcasts/iTunesiHeartAmazon Music

GREEN NEWS REPORT, nationally syndicated, with new episodes on Tuesday and Thursday. ALSO VIA PODCAST: RSS/XML feed | Pandora | TuneInApple Podcasts/iTunesiHeartAmazon Music

Media Appearance Archives…

AD
CONTENT

ADDITIONAL STUFF

Brad Friedman/
The BRAD BLOG Named...

Buzz Flash's 'Wings of Justice' Honoree
Project Censored 2010 Award Recipient
The 2008 Weblog Awards