Election Crime Bureau

Made possible by the Lindell Offense Fund

THE AUDIT IS THE HACK: How an NIH-Sponsored Patent Injects Fake Votes Into America’s Elections — And Calls It Security

To the casual observer, internet voting represents the ultimate convenience—a long-overdue modernization of democracy for the digital age. However, beneath the surface of user-friendly interfaces lies an “architectural” reality that has seasoned cybersecurity strategists deeply concerned. While software bugs can be patched and code can be refined, fundamental flaws in a system’s design are permanent vulnerabilities that “better code” simply cannot fix.
 
The technical architecture described in Patent US 7,549,049 reveals a blueprint for a system that is fundamentally incapable of being secured. This investigation distills the most impactful risks found within this design—risks that suggest the platform may be better suited for manipulating elections than securing them.

Before we get to a discussion of the technical risks, the patent merits asking a few non-technical questions:

  • Why is the National Institute for Health funding an election system patent for the Department of Defense?
  • Why are U.S. taxpayer funds expended on behalf of assets owned by a foreign business…a business incorporated in Bermuda to avoid paying U.S. taxes?
  • Why did inventors file patent paperwork AFTER the project that produced the invention was cancelled due to security vulnerabilities?
  • What prevents “fake voters” from being injected for fraudulent purposes using this invention?

The potential answers to these questions alone should set off alarm bells about the intent of this invention.  In fact, the volume of the alarm bells should be turned up a notch simply after reading the patent abstract.

"The present invention relates to a system and method for dynamically auditing of electronic elections using an electronic registration and voting system. In particular, the present invention provides false voting data associated with false voters to the voting systems, recovers voting records associated with the false voters, and compares the stored voting records to the original false voting data."

The patent literally promotes the injection of “false voting data associated with false voters to the voting systems”.  The inventors want us to believe that this “feature” actually enhances the security of internet-based voting systems.

United States Patent 7,549,049 Dynamic auditing of electronic elections

The core features of the invention are summarized in the following figure.

The Dynamic Election Auditing concept is riddled with security vulnerabilities.  Let’s now look at the technical risks one attack vector at a time.

Attack Vector 1: The Catastrophic Hub

Because the central server stores all voter identities, ballot definitions, and encryption keys, it represents a single point of catastrophic failure. Parties with administrative access could:
  • Alter Tabulation: Change results before Local Election Offices (LEOs) download ballots, as the central server manages decryption keys.
  • Modify Ballot Definitions: Silently change candidate order, remove candidates, or alter write-in options before voters download their ballots.
  • Ballot Substitution: Intercept and replace encrypted ballots during transfer to LEO computers.

Attack Vector 2: The "False Voter" Camouflage

The patent introduces “dynamic auditing” using fictitious test voter IDs to verify system functionality. However, the system is designed so that nothing identifies these as test IDs.
  • Indistinguishable Fraud: Insiders can create fictitious voter IDs and inject pre-specified ballot choices into a live election.
  • Lack of Systemic Audit: Test voter records are maintained manually and outside the system in election officials’ offices, leaving no digital audit trail to distinguish “legitimate” test injections from fraudulent ones.

Attack Vector 3: Route Hijacking at Scale (MITM)

Attackers positioned between the voter and the central server—utilizing DNS hijacking or BGP route injection—can manipulate the voting process without detection.
  • Ballot Manipulation: Present voters with a modified ballot while submitting a different choice to the server.
  • Credential Harvesting: Steal digital certificates for later unauthorized vote submission.
  • Selective Suppression: Delay or drop ballot submissions from specific geographic regions based on predicted voting patterns.

Attack Vector 4: Compromising the Public Key Infrastructure (PKI) Foundation

The security model relies on Public Key Infrastructure (PKI) and third-party digital certificates.
  • Authority Compromise: If the PKI authority is coerced or compromised, fraudulent certificates can be issued to impersonate voters or officials.
  • Key Substitution: The LEO’s public key is stored at the central facility; replacing it allows an attacker to become the only entity capable of decrypting ballots.

Attack Vector 5: Infiltrating the Edge (Trusted Agent Network)

For voters without existing digital signatures, the system uses a distributed “Trusted Agent Network.”
  • Vulnerability of Remote Nodes: These agents communicate via SSH from remote locations (e.g., field office laptops), which are significantly more vulnerable than hardened central servers.
  • Fictitious Issuance: Fraudulent agents can issue certificates to non-existent or deceased individuals, enabling the casting of fraudulent votes.

Attack Vector 6: The Anonymization Shuffle

The patent requires separating voter IDs from encrypted ballots to ensure anonymity before tabulation.
  • Association Swapping: During the separation window, an insider can link a voter’s choices to a different identity or substitute prepared encrypted files for legitimate ones.
  • Verification Gap: Once shuffled, there is no cryptographic mechanism for an LEO to verify that the ballots received are the ones actually submitted by voters.

The "Legal Cover" Mechanism

In case the aforementioned attack vectors were not concerning enough, it is important to note that the dividing line between legitimate use and fraudulent abuse is almost non-existent.  The patent’s provision for injecting false voting data for auditing purposes serves as a potent legal defense for manipulators. If an unauthorized injection is discovered, the actor could claim they were conducting legitimate audit testing under the patented methodology. The manual nature of test record-keeping makes it nearly impossible for forensic investigators to disprove such claims.

Chilling Similarities

The whistleblower testimony of a Senior Venezuelan Election Official asserts that elections in Venezuela were manipulated using what he referred to as a SAES data utility tool.  The similarities between the SAES data utility tool described in his testimony and the dynamic auditing system in patent US7549049 are substantial, structurally parallel, and deeply alarming.

"This is supposed to be a tool that — for its normal usage, it's supposed to allow you to test the integrity of the system. When it's misused, it can allow you to inject votes without people knowing you did so." He further stated that during audits, "you will be auditing only that which the company wants you to see"

Both systems are explicitly described as testing/auditing tools that can emulate voting machines and inject data into live election infrastructure. The confidential witness testified that SAES data utility “allows you to test the entire electoral system” and “allows you to emulate voting machines in order to then transmit the votes”. Patent US7549049’s audit mechanism (FIG. 9 / Claim 19) operates identically — it injects “false voters with predefined ballots” into the live system and compares results. Both were designed for integrity verification; both can be weaponized to produce false votes undetected.

FeatureSAES Data Utility (Testimony)US7549049 Dynamic Audit (Patent)
Primary purposeTest integrity of electoral systemDynamically audit electronic elections
MechanismEmulates voting machines, transmits votesInjects test voters with predefined ballots
Legitimate coverSystem integrity testingAudit mechanism
Abuse modeInject fictitious votes without detectionFalse voter injection indistinguishable from ballot stuffing
Audit evasionUses same system libraries to sign manipulated contentTest voters structurally identical to malicious injections
Detection difficulty“Undetectable” — uses official system credentialsNo anomaly threshold specified in any claim

The book Stolen Elections by Ralph Pezzullo asserts that the SAES architecture featuring the SAES Data Utility is found in electronic voting systems used across America.

Conclusion

There are significant non-technical and technical risks with the Dynamic Auditing “invention” analyzed in this post.  This technology reeks of a CIA tool that could be used to manipulate election outcomes.  If this tool has been used to manipulate elections abroad, what prevents them or other entities to leverage commercialized versions of this technology to manipulate elections in the U.S.?