How the GOP Wired Ohio's 2004 Vote Count for Bush to Win

A Republican computer data security expert tells how cyber-partisans could have stolen the 2004 election.

AlterNet | September 18, 2008
By Steven Rosenfeld

An election whistleblower who is a Republican, a nationally known data security and computer architecture expert, and an Ohio resident has filed a sworn affidavit in federal court that describes how Republican Party consultants in 2004 built an electronic vote counting network in Ohio that could have stolen votes to re-elect the president.

The whistleblower, Stephen Spoonamore, who has run or held senior technology positions in six technology companies, and whose clients have included MasterCard, American Express, NBC-GE, and federal agencies including the State Department and the Navy, said Mike Connell, a longtime Republican Party computer networking contractor, "agrees that the electronic voting systems in the US are not secure" and told Spoonamore in 2007 "that he (Connell) is afraid some of the more ruthless partisans of the GOP may have exploited systems he in part worked on for this purpose."

"Mr. Connell builds front end applications, user interfaces and web sites," Spoonamore said in his September 17, 2008 affidavit. "Knowing his team and their skills I find it unlikely they would be the vote thieves directly. I believe however he knows who is doing that work, and has likely turned a blind eye to this activity. Mr. Connell is a devout Catholic. He has admitted to me that in his zeal to 'save the unborn' he may have helped others who have compromised elections. He was clearly uncomfortable when I asked directly about Ohio 2004."

The affidavit, which goes onto describe how a statewide computer network and vote-counting system in part built by Connell's firms in 2004 could have been used to steal votes to re-elect George W. Bush in 2004's final battleground state. It was filed in a federal voting rights suit brought in 2006 that in part sought to preserve ballots from the 2004 presidential election.

After a federal judge ordered those records be preserved, Jennifer Brunner, the Ohio Secretary of State elected in November 2006, discovered that ballots and other records that could determine the accuracy of the 2004 vote count had been destroyed in 56 of Ohio's 88 counties. Brunner is a Democrat; her Republican predecessor, Ken Blackwell, was targeted in the lawsuit. Brunner has since sought to delay action in the case until after the 2008 presidential election.

The Ohio Southern District Court granted a stay, or delay, to the state. However lawyers for aggrieved 2004 voters who brought the lawsuit, filed Spoonamore's declaration to argue the stay be lifted for just Connell, so he can be questioned under oath about the digital vote counting network he build in 2004.

These lawyers, notably Cliff Arnebeck of Coumbus, Ohio, and Spoonamore, believe that Republican partisans could have tapped into a key node in vote-counting networks where county-level results are compiled into state results. At that point, they believe software was used that told the vote-counting mechanism to limit the votes awarded to the Democratic presidential candidate, John Kerry, and to shift or add votes to the total for George W. Bush.

"I have followed with interest the security issues involved with electronic voting in United States," Spoonamore's affidavit said. "My understanding of the vulnerabilities of American elections to fraudulent manipulation is based upon conversations with professionals in election administration working within state governmental structures as well as information technology specialists working in private industry a contract basis for state governments."

On Election Night in 2004, the Ohio Secretary of State's website posting the official Ohio election results was hosted on Republican-controlled servers in Chattanooga, Tennessee, which also were home to many other Republican websites. According to Spoonamore this set-up "modified" more typical electronic vote counting networks, where local precincts would record individual votes and then send them to county tabulators, which in turn would send the countywide counts to a statewide tabulator.

"The vote tabulation and reporting system, as modified at the direction of Mr. (Kenneth J.) Blackwell (Ohio's former Secretary of State, a Republican and co-chair of the president's re-election campaign in Ohio in 2004), allowed the introduction of a single computer in the middle of the pathway," he said. "This computer located at a company principally managing IT Systems for GOP campaign and political operations (Computer C) received all information from each county computer (Computer A) BEFORE it was sent onward to Computer B (Ohio's statewide vote count tabulator)."

Spoonamore's affidavit discusses several scenarios how data containing vote totals could have been intercepted and modified. However, he believes the vote counting server used by Ohio's former secretary of state to host the state's Election Night website was the most likely location where votes were held, reviewed and altered before presentation to the public and media. That conclusion is based on the fact that some counties were faxing their vote counts, which meant there was not uniformity in the counting process until the statewide tabulation stage.

"This centralized collection of all incoming statewide tabulations would make it extremely easy for a single operator, or a preprogrammed single 'force balancing computer' to change the results in any way desired by the team controlling Computer C -- in this case GOP partisan operatives," Spoonamore said. "Again, if this out of state system had ANY digital access to the Secretary of States system it would be cause for immediate investigation by any of my banking clients."

Spoonamore's declaration discusses how it is common in detecting electronic banking fraud to find the insertion of "man in the middle" attacks, where criminals insert a computer between a network's data transmission points. He further describes "force balancing," which he said is a feature of banking industry computers, such as ATMs, which balance sums in user's accounts after deposits and withdrawals. Spoonamore said Ohio's 2004 electronic voting tabulators, made by Diebold (now Premier Election Solutions), which also makes bank ATMs, contain software that add and subtract votes. He said the subtraction feature could only be used to delete votes.

"The Diebold system is riddled with exploitable errors," he said, citing a report on the Diebold's vote counting computers commissioned by former Maryland Gov. Robert Erlich, a Republican. "Many of these concerns are almost comical from the perspective of a computer architect. One example of this: The existence of negative fields being possible in some number fields. Voting machines as custom built computers which should be designed to begin at the number Zero, no votes, and advance only in increments of 1, one vote, until they max out at the most possible votes cast in one day … There is no possible legitimate reason that NEGATIVE votes should ever be entered. And yet these machines are capable of having negative numbers programmed in, injected, or preloaded."

If GOP cyber-partisans intercepted county vote totals and altered the statewide count reported to the public, Spoonamore said the hard drives in the county-level tabulators would contain records that would reveal that the statewide vote count was fraudulent.

"If this had happened, in order to cover up this fact, the hard drives of the county level tabulators would have to be pulled and destroyed, as they would have digital evidence of this hacking from Computer C," he said. "The efforts by the company in charge of these computers to pull out hard drives and destroy them in advance of the Green Party Recount from the 2004 election is a clear signal something was deliberately amiss with the county tabulators."

After the 2004 election, the Green and Libertarian Parties paid for a statewide recount where 3 percent of the vote in counties was to be examined. Green Party observers reported the company programming and servicing the county vote-count tabulators in 41 mostly rural Republican-majority counties, Triad Government Services, Inc., replaced hard drives before the recount was conducted. In Hocking County, when the Board of Election Deputy Director, Sherole Eaton questioned this and recounted the incident in sworn affidavits used in litigation, she subsequently was fired from her job.

David Cobb, the 2004 Green presidential candidate, raised hard disk incident when testifying at a congressional field hearing by the House Judiciary Committee's Democratic staff in Ohio in December 2004. Rep. John Conyers (D-MI), who now chairs the committee, asked the FBI to investigate at that time, but nothing came of the investigation.

According to previous statements by Spoonamore, the family that controls Triad and related sister companies, the Rapp family of Xenia, Ohio, are evangelical Republicans and GOP donors. Lawyers for the plaintiffs in the Lincoln Bronzeville litigation have previously stated that the 2004 Ohio presidential results only had to be altered in three southeastern counties -- Warren, Cleremont and Butler -- to increase George W. Bush's margin to re-elect him to a second term.

One Rapp family firm, Rapp Systems Corporation, sells commemorative editions of the Palm Beach County Florida "butterfly ballot" that confused elderly Democratic voters in 2000 who mistakenly voted for Pat Buchanan instead of Al Gore.

Apart from discussing the 2004 presidential election in Ohio, Spoonamore's affidavit also said that there is "no possible way" to make paperless electronic voting secure. That is because the voting systems are designed to mask the identity of voters, whereas in banking, each account holder is identified by several lawyers of secure authentication.

"In my opinion, there is NO POSSIBLE WAY to make a secure touch screen voting system," Spoonamore said. "None. Secure systems are predicated on establishing securely the identity of every user of the system. Voting is predicated on being anonymous. It is impossible to have a system that does both. It is possible to design relatively secure optical scan machines, but even these can be hacked in even the best of cases. In the case of optical scan (systems where hand-marked paper ballots are scanned by computer counters) you have the ability to recount manually the paper ballot itself, and the ability to spot check the machines for errors against a sample of hand recounting."

In November 2008, approximately 30 percent of the country will be using paperless electronic voting machines, according to VerifiedVoting.org. However, the vote counting landscape in some battleground states will not be the same in 2008 as it was in 2004. Lawyers and other election protection experts -- inside the Democratic Party and in outside non-partisan groups -- are developing numerous checks and balances to attempt to monitor the accuracy of the various stages of tabulating the vote count. These efforts are much more extensive and informed than in 2004.

In Ohio, for instance, Secretary of State Jennifer Brunner, has forced some of the state's cities to transition from paperless voting to optical scan system, as one response to problems associated with paperless voting. And just this week Brunner decided to allow observers from minor political parties, such as the Greens, to be observers inside polling places and at tabulation rooms in county Boards of Elections. Those observers will be able to track whether local vote totals are being accurately tallied for county-wide counts, which is where they believe vote totals were altered in 2004.

In other 2008 battleground states using paperless voting systems, such as Pennsylvania, there appear to be less-developed plans to monitor the various layers of voting process, although election integrity activists have been pushing for precincts to be supplied with paper ballots if there are machine malfunctions. The Democratic National Committee has extensively surveyed the voting systems in every county in the U.S., which they did not do in 2004, but party officials do not comment on their election protection plans.