E-voting vendor: Programming errors caused dropped votes
Premier Election Solutions says problem was logic error in GEMS code
IDG News Service - A major electronic voting system vendor has changed its story in an attempt to explain how its machines dropped hundreds of votes in Ohio's March primary elections, saying it was a programming error, not the fault of antivirus software.
E-voting machines from Premier Election Solutions Inc., formerly called Diebold Election Systems, dropped hundreds of votes in 11 Ohio counties during the primary election, as the machine's memory cards uploaded to vote-counting servers. Premier originally blamed conflicts caused by antivirus software from McAfee Inc., but the company this week said a logic error in the machines' GEMS source code was responsible for the problem.
"We now have reason to believe that the logic error in the GEMS code can cause this event when no such antivirus program is installed on the server," Premier President Dave Byrd wrote in a Tuesday letter to Ohio Secretary of State Jennifer Brunner. "We are indeed distressed that our previous analysis of this issue was in error."
Numerous tests by voting authorities had failed to identify the logic error before Ohio discovered the dropped votes, Byrd wrote.
The antivirus software could trigger the error, but it wasn't the underlying problem, said Premier spokesman Chris Riggall. Premier's earlier analysis "was not complete," he said.
Premier also released a product advisory notice on Tuesday, telling users of its e-voting machines running some versions of the GEMS software how to avoid lost votes. Poll workers need to check the vote-counting servers to see if all memory cards are shown as uploaded, the company said in the advisory.
Premier has also developed a fix for the logic error and is now testing it, Riggall said. The company has submitted a version of the GEMS software for federal certification, and Premier will submit the bug fix as part of that process. But the fixed version of the software won't be certified by federal elections officials before November's election, he said.
Tests by Brunner's office and Butler County voting officials had dismissed Premier's earlier claim that antivirus software was the cause of the problem. Officials in Brunner's office discovered the dropped votes in other counties after voting officials in Butler County found about 150 dropped votes. The votes were eventually counted in the March primaries, according to Brunner's office.
"It is the dedication of board officials such as those at the Butler County Board of Elections, who went above and beyond the call of duty, that gives me confidence that preparation with our local partners will lead to a successful November election," Brunner said in a statement.
Brunner's office is working with Ohio counties to identify and guard against the problem in the November general elections, her office said in a memo. About half of Ohio's 44 counties use Premier e-voting machines.
Voting tech 2008
- Election Day: Live blog
- Top 20 Election Day sites, tools
- E-voting groups keeping tabs on a handful of states
- Opinion: Will your vote count?
- Q&A: Felten on e-voting and what can go wrong
- Are design issues to blame for vote 'flipping' in touch-screen machines?
- E-voting vendor: Programming errors caused dropped votes
- Voting groups release guidelines for e-voting checks
- Todd Weiss: Election Tech blog
- Agility & Scalability for Oracle EBS R12 and RAC on VMware vSphere 5 This white paper outlines extensive performance and scalability testing of Oracle EBS applications on a Vblock™ Systems with vSphere 5.
- Oracle and VCE: The Next Step in Integrated Computing Platforms In this ESG Lab review you will learn how a VCE system driven by Oracle, delivers the perfect blend of high performance and...
- Migrate Oracle Apps from RISC/UNIX to Virtualized x86 Ready to move Oracle to a virtualized environment? This brief explains how true converged infrastructure can help you migrate from a RISC/UNIX environment...
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their... All Network Hardware White Papers | Webcasts