Premier Election Solutions
Subsidiary | |
Industry | Electronic Voting hardware Consulting |
Founded | Ohio (January 22, 2002) |
Headquarters | North Canton, Ohio, U.S. |
Products | AccuVote-TSX, AccuVote-OS, AccuView Printer Module, Global Election Management System (GEMS), DIMS-NeT, ExpressPoll-2000, ExpressPoll-4000, VoteRemote Suite |
Parent | Dominion Voting Systems |
Website | Premier Election Solutions |
Premier Election Solutions, formerly Diebold Election Systems, Inc. (DESI),[1] was a subsidiary of Diebold that makes and sells voting machines.
In 2009, it was sold to competitor ES&S. Another subsidiary selling electronic voting systems in Brazil is Diebold-Procomp, with minor market share in that nation. In 2010, Dominion Voting Systems purchased the primary assets of Premier, including all intellectual property, software, firmware and hardware for Premier’s current and legacy optical scan, central scan, and touch screen voting systems, and all versions of the GEMS election management system from ES&S.
At the time ES&S spun off the company due to monopoly charges its systems were in use in 1,400 jurisdictions in 33 states and serving nearly 28 million people.[2]
History
Previously, DESI was run by Bob Urosevich, who worked in the election systems industry since 1976. In 1979, Mr. Urosevich founded American Information Systems. He served as the President of AIS, now known as Election Systems & Software, Inc. (ES&S), from 1979 through 1992. Bob's brother, Todd Urosevich, is Vice President, Aftermarket Sales with ES&S, DESI's chief competitor. In 1995, Bob Urosevich started I-Mark Systems, whose product was a touch screen voting system utilizing a smart card and biometric encryption authorization technology. Global Election Systems, Inc. (GES) acquired I-Mark in 1997, and on July 31, 2000 Mr. Urosevich was promoted from Vice President of Sales and Marketing and New Business Development to President and Chief Operating Officer. On January 22, 2002, Diebold announced the acquisition of GES, then a manufacturer and supplier of electronic voting terminals and solutions. The total purchase price, in stock and cash, was $24.7 million. Global Election Systems subsequently changed its name to Diebold Election Systems, Inc.[citation needed]
Premier Election Solutions, Inc. is currently run by David Byrd.[3]
Name change and acquisition
In 2006, Diebold decided to remove its name from the front of the voting machines for strategic reasons. CEO Thomas Swidarski announced he would decide in the beginning of 2007 if Diebold stays in the election business.[4] In August 2007 the company changed its name to "Premier Election Solutions" ("PES").
Acquisition by Election Systems & Software
Election Systems & Software (ES&S) acquired Premier Election Solutions on September 3, 2009. ES&S President and CEO Aldo Tesi said combining the two companies will result in better products and services for customers and voters. The sale did not affect the Brazilian division.[5]
Following the acquisition, the Department of Justice and 14 individual states launched investigations into the transaction on antitrust grounds.[6] In March 2010, the Department of Justice filed a civil antitrust lawsuit against ES&S, requiring it to divest voting equipment systems assets it acquired from Premier Election Solutions in order to restore competition.[7] The company then sold the assets to Dominion Voting Systems.
Acquisition by Dominion
Dominion Voting Systems acquired Premier on May 19, 2010.[8] "We are extremely pleased to conclude this transaction, which will restore much-needed competition to the American voting systems market and will allow Dominion to expand its capabilities and operational footprint to every corner of the United States," said John Poulos, CEO of Dominion. The transaction was approved by the Department of Justice and nine state attorneys general.[9]
Controversy
O'Dell's fundraising
In August 2003, Walden O'Dell, chief executive of Diebold, announced that he had been a top fund-raiser for President George W. Bush and had sent a get-out-the-funds letter to Ohio Republicans. In the letters he says he is "committed to helping Ohio deliver its electoral votes to the president next year."[10] Although he clarified his statement as merely a poor choice of words, critics of Diebold and/or the Republican party interpreted this as at minimum an indication of a conflict of interest, at worst implying a risk to the fair counting of ballots. He responded to the critics by pointing out that the company's election machines division is run out of Texas by a registered Democrat. Nonetheless, O'Dell vowed to lower his political profile lest his personal actions harm the company. O'Dell resigned his post of chairman and chief executive of Diebold on December 12, 2005 following reports that the company was facing securities fraud litigation surrounding charges of insider trading.[11]
Security and concealment issues
- For more information in the 2004 elections see: 2004 United States presidential election: Specific issues relating to Diebold machines and practices
Avi Rubin, Professor of Computer Science at Johns Hopkins University and Technical Director of the Information Security Institute has analyzed the source code used in these voting machines and reports "this voting system is far below even the most minimal security standards applicable in other contexts."[12] Following the publication of this paper, the State of Maryland hired Science Applications International Corporation (SAIC) to perform another analysis of the Diebold voting machines. SAIC concluded “[t]he system, as implemented in policy, procedure, and technology, is at high risk of compromise.”[13]
The company RABA did a security analysis of the Diebold AccuVote in January 2004 confirming many of the problems found by Avi Rubin and finding some new vulnerabilities.[14]
In June 2005, the Tallahassee Democrat reported that when given access to Diebold optical scan vote-counting computers, Black Box Voting, a nonprofit election watchdog group founded by Bev Harris, hired Finnish computer expert Harri Hursti and conducted a project in which vote totals were altered, by replacing the memory card that stores voting results with one that had been tampered with. Although the machines are supposed to record changes to data stored in the system, they showed no record of tampering after the memory cards were swapped. In response, a spokesperson for the Department of State said that, "Information on a blog site is not viable or credible."[15]
In early 2006, a study for the state of California corroborated and expanded on the problem;[16] on page 2 the California report states that:
"Memory card attacks are a real threat: We determined that anyone who has access to a memory card of the AV-OS, and can tamper it (i.e. modify its contents), and can have the modified cards used in a voting machine during election, can indeed modify the election results from that machine in a number of ways. The fact that the results are incorrect cannot be detected except by a recount of the original paper ballots" and "Harri Hursti's attack does work: Mr. Hursti's attack on the AV-OS is definitely real. He was indeed able to change the election results by doing nothing more than modifying the contents of a memory card. He needed no passwords, no cryptographic keys, and no access to any other part of the voting system, including the GEMS election management server."
A new vulnerability, this time with the TSx DRE machines, was reported in May 2006. According to Professor Rubin, the machines are "much, much easier to attack than anything we've previously said... On a scale of one to 10, if the problems we found before were a six, this is a 10. It's a totally different ballgame." According to Rubin, the system is intentionally designed so that anyone with access can update the machine software, without a pass code or other security protocol. Diebold officials said that although any problem can be avoided by keeping a close watch on the machines, they are developing a fix.[17]
Michael I. Shamos, a professor of computer science at Carnegie Mellon University who is a proponent of electronic voting and the examiner of electronic voting systems for Pennsylvania, stated "It's the most severe security flaw ever discovered in a voting system." Douglas W. Jones, a professor of computer science at the University of Iowa, stated "This is the barn door being wide open, while people were arguing over the lock on the front door." Diebold spokesman David Bear played down the seriousness of the situation, asserting that "For there to be a problem here, you're basically assuming a premise where you have some evil and nefarious election officials who would sneak in and introduce a piece of software. I don't believe these evil elections people exist."[18]
On October 30, 2006, researchers from the University of Connecticut demonstrated new vulnerabilities in Diebold AccuVote-OS optical scan voting terminal. The system can be compromised even if its removable memory card is sealed in place.[19]
On November 2, 2006, HBO premiered a documentary entitled "Hacking Democracy", concerning the vulnerability of electronic voting machines (primarily Diebold) to hacking and inaccurate vote totals. The company argued that the film was factually inaccurate and urged HBO to air a disclaimer explaining that it had not verified any of the claims.[20][21][22] However, corroboration and validation for the exploits shown in Hacking Democracy was published in a report for the state of California (see above).
In January 2007, a photo of the key used to open Diebold voting machines was posted in the company's website. It was found possible to duplicate the key based on the photo. The key unlocks a compartment which contains a removable memory card, leaving the machine vulnerable to tampering.[23]
A report commissioned by Ohio’s top elections official on December 15, 2007 has found that all five voting systems used in Ohio (made by Elections Systems and Software; Premier Election Solutions (formerly Diebold Election Systems); and Hart InterCivic) have critical flaws that could undermine the integrity of the 2008 general election.[24]
On July 17, 2008, Stephen Spoonamore made the claim that had "fresh evidence regarding election fraud on Diebold electronic voting machines during the 2002 Georgia gubernatorial and senatorial elections." Spoonamore is "the founder and until recently the CEO of Cybrinth LLC, an information technology policy and security firm that serves Fortune 100 companies." He claims that Diebold Election Systems Inc. COO Bob Urosevich personally installed a computer patch on voting machines in two counties in Georgia, and that the patch did not fix the problem it was supposed to fix.[25] Reports have indicated that then Georgia Secretary of State Cathy Cox did not know the patch was installed until after the election.[26]
States rejecting Diebold
In 2004, after an initial investigation into the company's practices, Secretary of State of California Kevin Shelley issued a ban on one model of Diebold voting machines in that state. California Attorney General Bill Lockyer, joined the state of California into a false claims suit filed in November 2003 by Bev Harris and Alameda County citizen Jim March. Here is a copy of the original lawsuit [27] and here is the article showing it became the California false claims suit:[28]
The suit charged that Diebold had given false information about the security and reliability of Diebold Election Systems machines that were sold to the state. To settle the case, Diebold agreed to pay $2.6 million and to implement certain reforms.[29] On August 3, 2007, California Secretary of State Debra Bowen decertified Diebold and three other electronic voting systems after a "top-to-bottom review of the voting machines certified for use in California in March 2007."[30]
In April 2007, the Maryland General Assembly voted to replace paperless touchscreen voting machines with paper ballots counted by optical scanners, effective in time for the 2010 general (November) elections. The law, signed by the Governor in May 2007, was made contingent on the provision of funding by no later than April 2008. The Governor included such funding in his proposed budget in January 2008,[31] but the funding was defeated by the state House in July 2008.[32]
In March 2009, California Secretary of State Debra Bowen decertified Diebold's GEMS version 1.18.19 after the Humboldt County Election Transparency Project discovered that GEMS had silently dropped 197 ballots from its tabulation of a single precinct in Eureka, California.[33] The discovery was made after project members conducted an independent count using the ballot counting program Ballot Browser.
Leaked memos
In September 2003, a large number of internal Diebold memos, dating back to 1999, were posted to the BlackBoxVoting.org web site, resulting in the site being shut down due to a Diebold cease and desist order. Later, other website organizations Why War? and the Swarthmore Coalition for the Digital Commons, a group of student activists at Swarthmore College posted the memos. U.S. Representative Dennis Kucinich, a Democrat from Ohio, placed portions of the files on his websites.[34] The full set of these internal memos is posted here: Original Diebold Memos—FULL SET [35]
Diebold attempted to stop the publication of these internal memos by sending cease-and-desist letters to each site hosting these documents, demanding that they be removed. Diebold claimed the memos as their copyrighted material, and asserted that anyone who published the memos online was in violation of the Online Copyright Infringement Liability Limitation Act provisions of the Digital Millennium Copyright Act found in §512 of the United States Copyright Act.
When it turned out that some of the challenged groups would not back down, Diebold retracted their threat. Those who had been threatened by Diebold then sued for court costs and damages, in OPG v. Diebold. This suit eventually led to a victory for the plaintiffs against Diebold, when in October 2004 Judge Jeremy Fogel ruled that Diebold abused its copyrights in its efforts to suppress the embarrassing memos.
Stephen Heller (whistleblower)
In January and February 2004, a whistleblower named Stephen Heller brought to light memos from Jones Day, Diebold's attorneys, informing Diebold that they were in breach of California law by continuing to use illegal and uncertified software in California voting machines. California Attorney General Bill Lockyer filed civil and criminal suits against the company, which were dropped when Diebold settled out of court for $2.6 million. In February 2006, Heller was charged with three felonies for this action.[36][37] On November 20, 2006, Heller made a plea agreement to pay $10,000 to Jones Day, write an apology, and receive three years probation.[38]
Diebold and Kenneth Blackwell's conflict of interest
Ohio State Senator Jeff Jacobson, Republican, asked Ohio Secretary of State Ken Blackwell, also a Republican, in July 2003 to disqualify Diebold's bid to supply voting machines for the state, after security problems were discovered in its software, but was refused.[39] Blackwell had ordered Diebold touch screen voting machines, reversing an earlier decision by the state to purchase only optical scan voting machines which, unlike the touch screen devices, would leave a "paper trail" for recount purposes. Blackwell was found in April 2006, to own 83 shares of Diebold stock, down from 178 shares purchased in January 2005, which he attributed to an unidentified financial manager at Credit Suisse First Boston who had violated his instructions to avoid potential conflict of interest, without his knowledge.[40] When Cuyahoga county's primary was held on May 2, 2006, officials ordered the hand-counting of more than 18,000 paper ballots after Diebold's new optical scan machines produced inconsistent tabulations, leaving several local races in limbo for days and eventually resulting in a reversal of the outcome of one race for state representative. Blackwell ordered an investigation by the Cuyahoga County Board of Elections; Ohio Democrats demanded that Blackwell, who was also the Republican gubernatorial candidate in 2006, recuse himself from the investigation due to conflicts of interest, but Blackwell did not do so.[41]
The Republican head of the Franklin County, Ohio Board of Elections, Matt Damschroder, said a Diebold contractor came to him and bragged of a $50,000 check he had written to Blackwell’s "political interests."[42]
See also
- Black Box Voting
- ChoicePoint
- Diebold
- Electoral fraud
- Electronic voting
- Hacking Democracy
- Voting machine
References
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ http://www.dominionvoting.com/images/pdfs/DominionAcquiresPremierReleaseFinal4.pdf
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Analysis of an Electronic Voting System Retrieved February 15, 2012.
- ↑ Archived version of State of Maryland's Risk Assessment Report regarding Diebold AccuVote-TS Voting System and Processes. Archived on August 27, 2006. Retrieved January 6, 2009.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ "Security Analysis of the Diebold AccuBasic Interpreter"
- ↑ Experts see new Diebold flaw: They call it worst security glitch to date in state's voting machines and a 'big deal' TMCnet.com, May 12, 2006
- ↑ New Fears of Security Risks in Electronic Voting Systems New York Times, May 12, 2006. Also see Security Focus in depth four page report.
- ↑ Security Assessment of the Diebold Optical Scan Voting Terminal (UConn VoTeR Center and Department of Computer Science and Engineering, University of Connecticut, October 30. 2006)
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Diebold shows how to make your own voting machine key.
- ↑ Ohio Elections Official Calls Machines Flawed
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ "copy of case number RG031284"
- ↑ "Vote machine maker settles over her whistle-blower suit"
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.[dead link]
- ↑ Lua error in package.lua at line 80: module 'strict' not found.[dead link]
- ↑ "Kucinich Calls for Suspension of Electronic Voting," Common Dreams, April 23, 2004.
- ↑ "Original Diebold Memos -- Full Set"
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ [1] Archived December 28, 2006 at the Wayback Machine
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Lua error in package.lua at line 80: module 'strict' not found.
- ↑ Democrats want Blackwell to remove himself from election probe Canton Repository, May 9, 2006
- ↑ Lua error in package.lua at line 80: module 'strict' not found.[dead link]
External links
Research and reports
- Security Analysis of the Diebold AccuVote-TS Voting Machine, Princeton University[dead link]
- Analysis of an Electronic Voting System, Avi Rubin at Johns Hopkins University
- The Case of the Diebold FTP Site by Douglas W. Jones, Professor of Computer Science at the University of Iowa
- [2][dead link] by Science Applications International Corporation
- Maryland Voting Systems Study, RTI International, December 2, 2010
- Top-to-Bottom Review of voting systems by the government of California
- Online Policy Group v. Diebold case file from Electronic Frontier Foundation
- Diebold takes down blackboxvoting.org, Egan Orion, The Inquirer, September 24, 2003
- Con Job at Diebold Subsidiary, Associated Press, Wired, December 17, 2003de:Diebold
- Articles with dead external links from January 2009
- Articles with dead external links from August 2010
- Articles with dead external links from October 2014
- Use mdy dates from October 2014
- Articles with unsourced statements from November 2015
- Official website not in Wikidata
- Articles with dead external links from November 2015
- 2004 United States election voting controversies
- Election technology companies
- Electronic voting
- Diebold