Premier Election Solutions Explained

Premier Election Solutions
Type:Subsidiary
Former Name:Diebold Election Systems, Inc.
Foundation: (as Diebold Election Systems)
Ohio, U.S.
Location:North Canton, Ohio, U.S.
Industry:Electronic Voting hardware
Consulting
Products:AccuVote-TSX, AccuVote-OS, AccuView Printer Module, Global Election Management System (GEMS), DIMS-NeT, ExpressPoll-2000, ExpressPoll-4000, VoteRemote Suite
Fate:Acquired by Dominion Voting Systems
Homepage:Premier Election Solutions

Premier Election Solutions, formerly Diebold Election Systems, Inc. (DESI),[1] was a subsidiary of Diebold that made and sold voting machines.

In 2009, it was sold to competitor ES&S. In 2010, Dominion Voting Systems purchased the primary assets of Premier, including all intellectual property, software, firmware and hardware for Premier's current and legacy optical scan, central scan, and touch screen voting systems, and all versions of the GEMS election management system from ES&S.

At the time ES&S spun off the company due to monopoly charges its systems were in use in 1,400 jurisdictions in 33 states and serving nearly 28 million people.[2]

History

DESI was run by Bob Urosevich, starting in 1976. In 1979, Bob Urosevich founded, and served as the president (through 1992) of, American Information Systems, now known as Election Systems & Software, Inc. (ES&S), becoming a chief competitor to DESI. Todd Urosevich, Bob's brother, was vice president, aftermarket sales, of Election Systems & Software, Inc.

In 1995, Bob Urosevich started I-Mark Systems, whose product was a touch screen voting system utilizing a smart card and biometric encryption authorization technology. Global Election Systems, Inc. (GES) acquired I-Mark in 1997, and on 31 July 2000, Bob Urosevich was promoted from Vice President of Sales and Marketing and New Business Development, to president and chief operating officer. On January 22, 2002, Diebold announced the acquisition of GES, then a manufacturer and supplier of electronic voting terminals and solutions. The total purchase price, in stock and cash, was $24.7 million. Global Election Systems subsequently changed its name to Diebold Election Systems, Inc.

Name change

In late 2006, Diebold decided to remove its name from the front of the voting machines in what its spokesperson called "a strategic decision on the part of the corporation".[3] In August 2007 Diebold Election Systems changed its name to "Premier Election Solutions" ("PES").[1]

Acquisition by Election Systems & Software

Election Systems & Software (ES&S) acquired Premier Election Solutions on September 3, 2009. ES&S President and CEO Aldo Tesi said combining the two companies would result in better products and services for customers and voters.[4]

Acquisition by Dominion

Following the acquisition, the Department of Justice and 14 individual states launched investigations into the transaction on antitrust grounds.[5] In March 2010, the Department of Justice filed a civil antitrust lawsuit against ES&S, requiring it to divest voting equipment systems assets it acquired from Premier Election Solutions in order to restore competition.[6] The company sold the assets to Dominion Voting Systems.

Dominion Voting Systems acquired Premier on May 19, 2010.[7] "We are extremely pleased to conclude this transaction, which will restore much-needed competition to the American voting systems market and will allow Dominion to expand its capabilities and operational footprint to every corner of the United States," said John Poulos, CEO of Dominion. The transaction was approved by the Department of Justice and nine state attorneys general.[8]

Controversies

O'Dell's fundraising

In August 2003, Walden O'Dell, chief executive of Diebold, announced that he had been a top fundraiser for President George W. Bush and had sent a get-out-the-funds letter to Ohio Republicans. In the letters he said he was "committed to helping Ohio deliver its electoral votes to the president next year."[9] Although he clarified his statement as merely a poor choice of words, critics of Diebold and/or the Republican party interpreted this as at minimum an indication of a conflict of interest, at worst implying a risk to the fair counting of ballots. He responded to the critics by pointing out that the company's election machines division is run out of Texas by a registered Democrat. Nonetheless, O'Dell vowed to lower his political profile lest his personal actions harm the company. O'Dell resigned his post of chairman and chief executive of Diebold on December 12, 2005, following reports that the company was facing securities fraud litigation surrounding charges of insider trading.[10]

Security and concealment issues

In January 2003, Diebold Election Systems' proprietary software, and election files, hardware and software specifications, program files, voting program patches, on its file transfer protocol site, were leaked, later 7 August 2003 leaked to Wired (magazine).[11] [12] [13] [14] [15]

In 2004, Avi Rubin, a professor of computer science at Johns Hopkins University and Technical Director of the Information Security Institute, analyzed the source code used in these voting machines and reported "this voting system is far below even the most minimal security standards applicable in other contexts."[16] [17] Following the publication of this paper, the State of Maryland hired Science Applications International Corporation (SAIC) to perform another analysis of the Diebold voting machines. SAIC concluded "[t]he system, as implemented in policy, procedure, and technology, is at high risk of compromise."[18]

In January 2004, RABA Technologies, a security company in Columbia, Maryland, did a security analysis of the Diebold AccuVote, confirming many of the problems found by Rubin and finding some new vulnerabilities.[19] [20]

In June 2005, the Tallahassee Democrat reported that when given access to Diebold optical scan vote-counting computers, Black Box Voting, a nonprofit election watchdog group founded by Bev Harris, hired Finnish computer expert Harri Hursti and conducted a project in which vote totals were altered, by replacing the memory card that stores voting results with one that had been tampered with. Although the machines are supposed to record changes to data stored in the system, they showed no record of tampering after the memory cards were swapped. In response, a spokesperson for the Florida Department of State said, "Information on a blog site is not viable or credible."[21]

In early 2006, a study for the state of California corroborated and expanded on the problem;[22] on page 2 the California report states that:

"Memory card attacks are a real threat: We determined that anyone who has access to a memory card of the AV-OS, and can tamper it (i.e. modify its contents), and can have the modified cards used in a voting machine during election, can indeed modify the election results from that machine in a number of ways. The fact that the results are incorrect cannot be detected except by a recount of the original paper ballots" and "Harri Hursti's attack does work: Mr. Hursti's attack on the AV-OS is definitely real. He was indeed able to change the election results by doing nothing more than modifying the contents of a memory card. He needed no passwords, no cryptographic keys, and no access to any other part of the voting system, including the GEMS election management server."

A new vulnerability, this time with the TSx DRE machines, was reported in May 2006. According to Professor Rubin, the machines are "much, much easier to attack than anything we've previously said... On a scale of one to 10, if the problems we found before were a six, this is a 10. It's a totally different ballgame."[23] [24] According to Rubin, the system is intentionally designed so that anyone with access can update the machine software, without a pass code or other security protocol. Diebold officials said that although any problem can be avoided by keeping a close watch on the machines, they are developing a fix.[25]

Michael I. Shamos, a professor of computer science at Carnegie Mellon University who is a proponent of electronic voting and the examiner of electronic voting systems for Pennsylvania, stated "It's the most severe security flaw ever discovered in a voting system." Douglas W. Jones, a professor of computer science at the University of Iowa, stated "This is the barn door being wide open, while people were arguing over the lock on the front door." Diebold spokesman David Bear played down the seriousness of the situation, asserting that "For there to be a problem here, you're basically assuming a premise where you have some evil and nefarious election officials who would sneak in and introduce a piece of software. I don't believe these evil elections people exist."[26]

On October 30, 2006, researchers from the University of Connecticut demonstrated new vulnerabilities in Diebold AccuVote-OS optical scan voting terminal. The system can be compromised even if its removable memory card is sealed in place.[27]

On September 13, 2006, Director of the Center for Information and Technology Policy[28] at Princeton University, Professor Edward Felten, and graduate students Ariel Feldman and Alex Halderman discovered severe security flaws in a Diebold AccuVote-TS voting machine.[29] [30] Their findings claimed, "Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss."[31] [32] [33] [34] [35]

On November 2, 2006, HBO premiered a documentary entitled "Hacking Democracy", concerning the vulnerability of electronic voting machines (primarily Diebold) to hacking and inaccurate vote totals. The company argued that the film was factually inaccurate and urged HBO to air a disclaimer explaining that it had not verified any of the claims.[36] [37] [38] However, corroboration and validation for the exploits shown in Hacking Democracy was published in a report for the state of California (see above).

In January 2007, a photo of the key used to open Diebold voting machines was posted in the company's website. It was found possible to duplicate the key based on the photo. The key unlocks a compartment which contains a removable memory card, leaving the machine vulnerable to tampering.[39]

A report commissioned by Ohio's top elections official on December 15, 2007, found that all five voting systems used in Ohio (made by Elections Systems and Software; Premier Election Solutions (formerly Diebold Election Systems); and Hart InterCivic) have critical flaws that could undermine the integrity of the 2008 general election.[40]

On July 17, 2008, Stephen Spoonamore made the claim that he had "fresh evidence regarding election fraud on Diebold electronic voting machines during the 2002 Georgia gubernatorial and senatorial elections." Spoonamore is "the founder and until recently the CEO of Cybrinth LLC, an information technology policy and security firm that serves Fortune 100 companies." He claims that Diebold Election Systems Inc. COO Bob Urosevich personally installed a computer patch on voting machines in two counties in Georgia, and that the patch did not fix the problem it was supposed to fix.[41] Reports have indicated that then Georgia Secretary of State Cathy Cox did not know the patch was installed until after the election.[42]

States rejecting Diebold

In 2004, after an initial investigation into the company's practices, Secretary of State of California Kevin Shelley issued a ban on one model of Diebold voting machines in that state. California Attorney General Bill Lockyer, joined the state of California into a false claims suit filed in November 2003 by Bev Harris and Alameda County citizen Jim March.[43] [44]

The suit charged that Diebold had given false information about the security and reliability of Diebold Election Systems machines that were sold to the state. To settle the case, Diebold agreed to pay $2.6 million and to implement certain reforms.[45] On August 3, 2007, California Secretary of State Debra Bowen decertified Diebold and three other electronic voting systems after a "top-to-bottom review of the voting machines certified for use in California in March 2007."[46]

In April 2007, the Maryland General Assembly voted to replace paperless touchscreen voting machines with paper ballots counted by optical scanners, effective in time for the 2010 general (November) elections. The law, signed by the Governor in May 2007, was made contingent on the provision of funding by no later than April 2008. The Governor included such funding in his proposed budget in January 2008,[47] but the funding was defeated by the state House in July 2008.[48]

In March 2009, California Secretary of State Debra Bowen decertified Diebold's GEMS version 1.18.19 after the Humboldt County Election Transparency Project discovered that GEMS had silently dropped 197 ballots from its tabulation of a single precinct in Eureka, California.[49] The discovery was made after project members conducted an independent count using the ballot counting program Ballot Browser.

Leaked memos

In September 2003, a large number of internal Diebold memos, dating back to 1999, were posted to the BlackBoxVoting.org web site, resulting in the site being shut down due to a Diebold cease and desist order. Later, other website organizations Why War? and the Swarthmore Coalition for the Digital Commons, a group of student activists at Swarthmore College posted the memos. U.S. Representative Dennis Kucinich, a Democrat from Ohio, placed portions of the files on his websites.[50]

Diebold attempted to stop the publication of these internal memos by sending cease-and-desist letters to each site hosting these documents, demanding that they be removed. Diebold claimed the memos as their copyrighted material, and asserted that anyone who published the memos online was in violation of the Online Copyright Infringement Liability Limitation Act provisions of the Digital Millennium Copyright Act found in §512 of the United States Copyright Act.

When it turned out that some of the challenged groups would not back down, Diebold retracted their threat. Those who had been threatened by Diebold then sued for court costs and damages, in OPG v. Diebold. This suit eventually led to a victory for the plaintiffs against Diebold, when in October 2004 Judge Jeremy Fogel ruled that Diebold abused its copyrights in its efforts to suppress the embarrassing memos.

Stephen Heller

In January and February 2004, a whistleblower named Stephen Heller brought to light memos from Jones Day, Diebold's attorneys, informing Diebold that they were in breach of California law by continuing to use illegal and uncertified software in California voting machines. California Attorney General Bill Lockyer filed civil and criminal suits against the company, which were dropped when Diebold settled out of court for $2.6 million. In February 2006, Heller was charged with three felonies for this action.[51] [52] On November 20, 2006, Heller made a plea agreement to pay $10,000 to Jones Day, write an apology, and receive three years probation.[53]

Diebold and Kenneth Blackwell's conflict of interest

Ohio State Senator Jeff Jacobson, Republican, asked Ohio Secretary of State Ken Blackwell, also a Republican, in July 2003 to disqualify Diebold's bid to supply voting machines for the state, after security problems were discovered in its software, but was refused.[54] Blackwell had ordered Diebold touch screen voting machines, reversing an earlier decision by the state to purchase only optical scan voting machines which, unlike the touch screen devices, would leave a "paper trail" for recount purposes. Blackwell was found, in April 2006, to own 83 shares of Diebold stock, down from 178 shares purchased in January 2005, which he attributed to an unidentified financial manager at Credit Suisse First Boston who had violated his instructions to avoid potential conflict of interest, without his knowledge.[55] When Cuyahoga county's primary was held on May 2, 2006, officials ordered the hand-counting of more than 18,000 paper ballots after Diebold's new optical scan machines produced inconsistent tabulations, leaving several local races in limbo for days and eventually resulting in a reversal of the outcome of one race for state representative. Blackwell ordered an investigation by the Cuyahoga County Board of Elections; Ohio Democrats demanded that Blackwell, who was also the Republican gubernatorial candidate in 2006, recuse himself from the investigation due to conflicts of interest, but Blackwell did not do so.[56]

The Republican head of the Franklin County, Ohio Board of Elections, Matt Damschroder, said a Diebold contractor came to him and bragged of a $50,000 check he had written to Blackwell's "political interests."[57]

See also

External links

Research and reports

Notes and References

  1. Diebold Election Systems to Become Premier Election Solutions. Diebold Election Systems, Inc.. August 16, 2007. https://web.archive.org/web/20110606060738/http://www.prnewswire.com/news-releases/diebold-election-systems-to-become-premier-election-solutions-58271377.html . 2011-06-06. 2021-03-26 .
  2. Web site: Dominion Voting Systems, Inc. Acquires Premier Election Solutions Assets From ES&S . Benzinga.com . November 22, 2011.
  3. Web site: Barney Gimbel, Fortune writer-reporter . Rage against the machine: Diebold struggles to bounce back from the controversy surrounding its voting machines (Fortune, 3. November 2006) . Money.cnn.com . November 3, 2006 . November 22, 2011.
  4. Web site: ES&S buys competitor . https://archive.today/20120908014523/http://www.omaha.com/article/20090903/MONEY/909039985 . dead . September 8, 2012 . Omaha World-Herald (Omaha.com) . March 9, 2009 . mdy-all .
  5. News: U.S. opens probe of Diebold unit sale -report. 2010-01-20. Thomson Reuters. Ben Klayman. 2009-12-19.
  6. Web site: Justice Department Requires Key Divestiture in Election Systems & Software/Premier Election Solutions Merger . 2012-11-09 . . March 8, 2010.
  7. News: Dominion Voting Systems, Inc. Acquires Premier Election Solutions Assets From ES&S . May 20, 2010 . . 2012-11-09 .
  8. Web site: Archived copy . 2010-11-11 . dead . https://web.archive.org/web/20100704213440/http://dominionvoting.com/images/pdfs/DominionAcquiresPremierReleaseFinal4.pdf . July 4, 2010 . mdy .
  9. News: Hack The Vote . Paul Krugman . The New York Times . December 2, 2003 . June 21, 2012.
  10. Web site: Lundin. Leigh . Dangerous Ideas . Voting Fiasco, Part 279.236(a) . Criminal Brief . October 7, 2010 . August 17, 2008 .
  11. Web site: Manjoo . Farhad . An open invitation to election fraud . . https://web.archive.org/web/20031009131908/http://www.salonmag.com/tech/feature/2003/09/23/bev_harris/index_np.html . 2003-10-09 . 2003-09-23.
  12. News: McWilliams . Brian . New Security Woes for E-Vote Firm . . 2003-08-07 . https://web.archive.org/web/20031008132304/http://www.wired.com/news/privacy/0,1848,59925,00.html . 2003-10-08.
  13. News: Harris . Bev . Bev Harris . BREAKING NEWS: Voting System Integrity Flaw . 6 June 2021 . . 5 February 2003 . https://web.archive.org/web/20031002222108/http://www.scoop.co.nz/mason/stories/HL0302/S00036.htm . 2003-10-02 . Diebold Election Systems, which builds the AccuVote machines, both optical scan and touch-screen, was parking files on an unprotected public Internet location. Not a few files – thousands of files; election files, hardware and software specifications, program files, voting program patches – and sometimes, files with curious names..
  14. Web site: The research and activism arm of BlackBox Voting.com . BlackBoxVoting.org . https://web.archive.org/web/20030713155032/http://www.blackboxvoting.org/ . 2003-07-13.
  15. Web site: BlackBoxVoting.org . Diebold Demands Pull-Down of Black Box Voting . Talion.com: Red Dog Publicity & inexpensive PR support . https://web.archive.org/web/20030927011636/http://www.talion.com/blackboxvoting.org.htm . 2003-09-27 . 2003-09-26.
  16. Book: Kohno , T. . 10.1109/SECPRI.2004.1301313. 1081-6011 . 27–40. A. Stubblefield . A. D. Rubin . D. S. Wallach . IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004 . Analysis of an electronic voting system . 2004. 978-0-7695-2136-7. 10.1.1.100.4963 . 12203239 .
  17. Book: Rubin , Aviel David . Broadway. 978-0-7679-2210-4. Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting. 2006-09-05. 288. registration.
  18. https://web.archive.org/web/20060827160641/http://www.dbm.maryland.gov/dbm_publishing/public_content/dbm_search/technology/toc_voting_system_report/votingsystemreportfinal.pdf Archived version of State of Maryland's Risk Assessment Report regarding Diebold AccuVote-TS Voting System and Processes.
  19. Web site: Trusted Agent Report Diebold AccuVote-TS Voting System, RABA Innovative Solution Cell (RiSC) . March 25, 2004 . November 22, 2011 . dead . https://web.archive.org/web/20080512084047/http://www.raba.com/press/TA_Report_AccuVote.pdf . May 12, 2008 .
  20. News: Guernsey . Lisa . Holding the Vote-Counting Machines Accountable . 6 June 2021 . The New York Times . 2004-09-16 . What about other attempts at tampering? In a simulation last year, a team of experts with RABA Technologies, a security company in Columbia, Md., attempted to hack into the cards by guessing passwords. The team was able to gain access to the cards' contents after a few guesses and create a forged supervisor card. With such a card, a perpetrator could disable a touch-screen unit..
  21. Web site: Tests in Leon County, Florida, Demonstrate Ease of Vote Count Hacking . Reclaimdemocracy.org . June 4, 2005 . 17 September 2021.
  22. "Security Analysis of the Diebold AccuBasic Interpreter"
  23. Web site: . election hacking . . 6 June 2021 . 2021-03-18 . Useful tools and configuration files for injecting your own code into a Diebold AccuVote TSx system. To make use of these utilities you will need an OpenOCD compatible debugger such as the TinCanTools FlySwatter 2. You will also benefit from a PCMCIA to CompactFlash adapter and NE2000-based ethernet PCMCIA card. You need to ensure that you get a compatible card, you can then load your own EXE or ROM onto the Diebold AccuVote TSx system. You can also make use of the flash memory to make your adjustments ..
  24. Web site: Election Machine Hacking: Diebold AccuVote-TSx Runs 'Space Invaders' . . 6 June 2021 . 2019-10-24 .
  25. http://www.tmcnet.com/usubmit/2006/05/12/1647862.htm Experts see new Diebold flaw: They call it worst security glitch to date in state's voting machines and a 'big deal'
  26. https://www.nytimes.com/2006/05/12/us/12vote.html?_r=3&oref=slogin&oref=slogin&oref=slogin New Fears of Security Risks in Electronic Voting Systems
  27. http://voter.engr.uconn.edu/voter/Reports.html Security Assessment of the Diebold Optical Scan Voting Terminal
  28. Web site: Home . Center for Information Technology Policy . . 6 June 2021 . https://web.archive.org/web/20071031100349/https://citp.princeton.edu/ . 2007-10-31 . . live.
  29. News: Schulberg . Jessica . Good News For Russia: 15 States Use Voting Machines That Have Been Easily Hackable For More Than A Decade . 6 June 2021 . . 2017-07-17 . en.
  30. News: POTTER . NED . Elections Easy to Steal, Say Computer Scientists . 6 June 2021 . ABC News . September 15, 2006 . en .
  31. Ariel J. Feldman . J. Alex Halderman . Edward W. Felten . Security Analysis of the Diebold AccuVote-TS Voting Machine . . September 13, 2006 . 2007-05-07 . dead . https://web.archive.org/web/20070513135051/http://itpolicy.princeton.edu/voting/ts-paper.pdf . May 13, 2007.
  32. Web site: Feldman . Ariel J. . Halderman . J. Alex . Felten . Edward W. . Ariel J. Feldman . J. Alex Halderman . Edward Felten . Security Analysis of the Diebold AccuVote-TS Voting Machine . https://web.archive.org/web/20171212130414/http://citp.princeton.edu/research/voting/ . 2017-12-12 . live . Center for Information Technology Policy . 6 June 2021 . September 13, 2006.
  33. Web site: CITP Princeton . Security Demonstration of DieBold AccuVote-TS Electronic Voting Machine . https://ghostarchive.org/varchive/youtube/20211212/B8TXuRA4IQM. 2021-12-12 . live. . 6 June 2021 . en . 2016-11-30.
  34. Web site: CITP Princeton . Access to Diebold AccuVote-TS Electronic Voting Machine – close up . https://ghostarchive.org/varchive/youtube/20211212/BIBFEAGi9MA. 2021-12-12 . live. . 6 June 2021 . en . 2016-12-01.
  35. Web site: CITP Princeton . Access Diebold AccuVote-TS Electronic Voting Machine – angle view . https://ghostarchive.org/varchive/youtube/20211212/QfqBOo_JKc0. 2021-12-12 . live. . 6 June 2021 . en . 2016-12-01 .
  36. Web site: Cease and Desist letter from Diebold Elections' President David Byrd . November 22, 2011 . dead . https://web.archive.org/web/20111018001746/http://www.hackingdemocracy.com/downloads/hbo_letter.pdf . October 18, 2011 . mdy-all .
  37. Web site: Michael Janofsk . Seattle PI story on the Diebold press release regarding 'Hacking Democracy' . Seattlepi.com . October 31, 2006 . November 22, 2011.
  38. Web site: Clarke . Gavin . Article from 'The Register' regarding Diebold's letters to HBO . Theregister.co.uk . November 2, 2006 . November 22, 2011.
  39. http://www.freedom-to-tinker.com/?p=1113 Diebold shows how to make your own voting machine key
  40. Web site: Ohio Elections Official Calls Machines Flawed (Published 2007) . . https://web.archive.org/web/20210610082312/https://www.nytimes.com/2007/12/15/us/15ohio.html?_r=1 . 2021-06-10 . live .
  41. Web site: The Raw Story – GOP cyber-security expert suggests Diebold tampered with 2002 election. 2017-04-25 . dead . https://wayback.archive-it.org/all/20170425221956/http://www.rawstory.com/news/2008/Cybersecurity_expert_raises_allegations_of_2004_0717.html. rawstory.com.
  42. Web site: The Raw Story – Documents show Georgia's Secretary of State knew of Diebold patch. rawstory.com.
  43. "copy of case number RG031284 "
  44. "Vote machine maker settles over her whistle-blower suit"
  45. News: Gimbel . Barney . Rage against the machine . . November 3, 2006 .
  46. Web site: Top-To-Bottom Review . California Secretary of State . August 3, 2007 . https://web.archive.org/web/20070817120818/http://www.sos.ca.gov/elections/elections_vsr.htm . August 17, 2007 . August 10, 2007 .
  47. Web site: TrueVote Applauds O'Malley For Funding Transition to Paper Ballot . VoteTrustUSA . January 16, 2008 . August 15, 2008.
  48. Web site: House defeats paper ballot funding . FCW.com . Michael Hardy . July 16, 2008 . August 15, 2008 . dead . https://web.archive.org/web/20080804153308/http://www.fcw.com/online/news/153178-1.html . August 4, 2008 .
  49. Web site: Withdrawal of Approval of GEMS 1.18.19 . State of California Secretary of State . March 30, 2009 . dead . https://web.archive.org/web/20090627194219/http://www.sos.ca.gov/elections/voting_systems/premier/premier-11819-withdrawal-approval033009.pdf . June 27, 2009 .
  50. "Kucinich Calls for Suspension of Electronic Voting," Common Dreams, April 23, 2004.
  51. News: Whistle-Blower or Thief in Diebold Case?. So . Hemmy . March 18, 2006. The Los Angeles Times. July 14, 2009.
  52. http://www.hellerlegaldefensefund.com/oakland.html
  53. Web site: [dead-link] Los Angeles County District Attorney's Office statement regarding Stephen Heller's plea bargain |date=November 28, 2007 |access-date=November 22, 2011 |url-status=dead |archive-url=https://web.archive.org/web/20071128035035/http://da.co.la.ca.us/mr/112006b.htm |archive-date=November 28, 2007 ].
  54. Web site: Voting Machine Controversy . Commondreams.org . August 28, 2003 . November 22, 2011.
  55. Web site: Improper stock buy reported . Vindy.com . April 4, 2006 . November 22, 2011.
  56. https://web.archive.org/web/20070927192653/http://www.cantonrep.com/index.php?ID=285016&Category=13 Democrats want Blackwell to remove himself from election probe
  57. News: Vendor's donation questioned . Columbus Dispatch . July 16, 2005.
  58. News: Voting machine errors already roil Texas and Georgia races. Politico. November 5, 2018. Christan. Vasquez. Matthew. Choi.