Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

New York Times -- Black Box Voting study "biggest ever"

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU
 
kster Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-12-06 06:36 PM
Original message
New York Times -- Black Box Voting study "biggest ever"
Black Box Voting study hits the New York Times

New Fears of Security Risks in Electronic Voting Systems

http://www.nytimes.com/2006/05/12/us/12vote.html?ex=114 ...

..."It's the most severe security flaw ever discovered in a voting system," said Michael I. Shamos, a professor of computer science at Carnegie Mellon University who is an examiner of electronic voting systems for Pennsylvania, where the primary is to take place on Tuesday.

Officials from Diebold and from elections' offices in numerous states minimized the significance of the risk and emphasized that there were no signs that any touch-screen machines had been tampered with. But computer scientists said the problem might allow someone to tamper with a machine's software, some saying they preferred not to discuss the flaw at all for fear of offering a roadmap to a hacker.

"This is the barn door being wide open, while people were arguing over the lock on the front door," said Douglas W. Jones, a professor of computer science at the University of Iowa, a state where the primary is June 6.

<snip>

The new concerns about Diebold's equipment were discovered by Harri Hursti, a Finnish computer expert who was working at the request of Black Box Voting Inc., a nonprofit group that has been critical of electronic voting in the past. The group issued a report on the findings on Thursday.

<snip>

As word of Mr. Hursti's findings spread, Diebold issued a warning to recipients of thousands of its machines, saying that it had found a "theoretical security vulnerability" that "could potentially allow unauthorized software to be loaded onto the system."

<snip>

Aviel Rubin, a professor of computer science at Johns Hopkins University, did the first in-depth analysis of the security flaws in the source code for Diebold touch-screen machines in 2003. After studying the latest problem, he said: "I almost had a heart attack. The implications of this are pretty astounding."


Posted by: patriothackd

http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=203x427619

Printer Friendly | Permalink |  | Top
Botany Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-12-06 06:53 PM
Response to Original message
1. Way to come late to the party, NY Times.
I think you might want to get on that Lindbergh flying across the atlantic story.


http://gregpalast.com/detail.cfm?artid=501&row=0

On November 11 2001, a week after TomPaine.com published it, I received an e-mail from The New York Times Washington Bureau. Hot on the investigation of the veracity of the vote, The Times reporter asked me pointed questions:

Question #1: Are you a "sore loser"?

Question #2: Are you a "conspiracy nut"?

There was no third question. Investigation of the vote was, for The Times at any rate, complete. The next day, the paper's thorough analysis of the evidence yielded this front-page story, "VOTE FRAUD THEORIES, SPREAD BY BLOGS, ARE QUICKLY BURIED."
Printer Friendly | Permalink |  | Top
 
kster Donating Member (1000+ posts) Send PM | Profile | Ignore Sat May-13-06 12:24 AM
Response to Reply #1
5. But now the vote fraud theories, Come back to haunt them........ nt
Printer Friendly | Permalink |  | Top
 
Patsy Stone Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-12-06 07:21 PM
Response to Original message
2. Well...
no DUH! :eyes:

Better late than never?
Printer Friendly | Permalink |  | Top
 
faithnotgreed Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-12-06 10:08 PM
Response to Original message
3. so whats the special occasion
they decide to report this now?
Printer Friendly | Permalink |  | Top
 
Steve A Play Donating Member (638 posts) Send PM | Profile | Ignore Sat May-13-06 03:54 AM
Response to Reply #3
7. It's because of this
:toast:

http://www.bbvforums.org/forums/messages/1954/27675.html?1147493263

Posted on Thursday, May 11, 2006 - 12:34 pm:

Due to the nature of this report it is distributed in two different versions. Details of the attack are only in the restricted distribution version considered to be confidential. Fewer than 50 words have been redacted in the version below.

Overview

Note: Please refrain from speculation or public discussion of inappropriate technical details.


This document describes several security issues with the Diebold electronic voting terminals TSx and TS6. These touch-pad terminals are widely used in US and Canadian elections and are among the most widely used touch pad voting systems in North America. Several vulnerabilities are described in this report.

One of them, however, seems to enable a malicious person to compromise the equipment even years before actually using the exploit, possibly leaving the voting terminal incurably compromised.

These architectural defects are not in the election-processing system itself. However, they compromise the underlying platform and therefore cast a serious question over the integrity of the vote. These exploits can be used to affect the trustworthiness of the system or to selectively disenfranchise groups of voters through denial of service.

http://www.blackboxvoting.org/BBVtsxstudy.pdf (327 KB)

Critical Security Alert: Diebold TSx and TS6 voting systems
by Harri Hursti, for Black Box Voting, Inc.



Three-layer architecture, 3 security problems

Each can stand alone or combine for 3-layer offense in depth

As an oversimplification, the systems in question have three major software layers: boot loader, operating system and application program. As appropriate for current designs, the first two layers should contain all hardware specific implementations and modifications, while the application layer should access the hardware – the touch pad, memory card, the network etc. – only via services and functions provided by the operating system and therefore be independent of the hardware design. Whether the architecture in question follows these basic guidelines is unknown.

Based on publicly available documentation, source code excerpts and testing performed with the system, there seem to be several backdoors to the system which are unacceptable from a security point of view. These backdoors exist in each of these three layers and they allow the system to be modified in extremely flexible ways without even basic levels of security involved.

In the worst case scenario, the architectural weaknesses incorporated in these voting terminals allow a sophisticated attacker to develop an "offense in depth" approach in which each compromised layer will also become the guardian against clean-up efforts in the other layers. This kind of deep attack is extremely persistent and it is noteworthy that the layers can conceal the contamination very effectively should the attacker wish that. A quite natural strategy in these types of situations is to penetrate, modify and make everything look normal.

Well documented viral attacks exist in similar systems deploying interception and falsification of hash-code calculations used to verify integrity in the higher application levels to avoid detection. The three-level attack is the worst possible attack. However, each layer can also be used to deploy a stand-alone attack. The TSx systems examined appear to offer opportunities for the three-level attack as well as the stand-alone attacks.

It is important to understand that these attacks are permanent in nature, surviving through the election cycles. Therefore, the contamination can happen at any point of the device's life cycle and remain active and undetected from the point of contamination on through multiple election cycles and even software upgrade cycles.

Here is a rough analogy:

- The application can be imagined as written instructions on a paper. If it is possible to replace these instructions, as it indeed seems, then the attacker can do whatever he wishes as long as the instructions are used.

- The operating system is the man reading the instructions. If he can be brainwashed according to the wishes of the attacker, then even correct instructions on the paper solve nothing. The man can decide to selectively do something different than the instructions. New paper instructions come and go, and the attacker can decide which instructions to follow because the operating system itself is under his control.

- The boot loader is the supreme entity that creates the man, the world and everything in it. In addition to creating, the boot loader also defines what is allowed in the world and delegates part of that responsibility to the operating system. If the attacker can replace the boot loader, trying to change the paper instructions or the man reading them does not work. The supreme entity will always have the power to replace the man with his own favorite, or perhaps he just modifies the man’s eyes and ears: Every time the man sees yellow, the supreme being makes him think he is seeing brown. The supreme entity can give the man two heads and a secret magic word to trigger switching the heads.

In the world of the Diebold touch-screen voting terminals, all of these attacks look possible.

The instructions (applications and files) can be changed. The man reading the files (Windows CE Operating System and the libraries) can be changed. Or the supreme entity (boot loader) can be changed, giving total control over the operating system and the files even if they are "clean software."

Specific conceptual information is contained in the report, with details and filenames in the high-security version which is being delivered under cryptographic and/or personal signature controls to the EAC, Diebold CEO Tom Swidarski and CERT.

1) Boot loader reflashing
2) Operating system reflashing
3) Selective file replacement


In addition, the casing of the TSx machines lack basic seals and security, and within the casing additional exploitations are found.

Conclusions and Recommendations

Because there is no way of having chain of custody or audit trail for machines, the machines need to be reflashed with a known good version (assessing the risks potentially inherited). Ideally this should be done by the proper governmental authorities rather than being outsourced.

After that, extensive chain of custody management has to be established to make sure that machines do not potentially get recontaminated. Less than five minutes is required for contamination.

The bootloader needs to be re-engineered.

The cases need to be properly and permanently sealed.

Further study is warranted around these issues and others in the May 15, 2006 Supplemental Report for the Emery County TSx study.

While these flaws in design are not in the vote-processing system itself, they potentially seriously compromise election security. It would be helpful to learn how existing oversight processes have failed to identify this threat.

A secondary report will be released on May 15, 2006. This report contains approximately 12 other areas of secondary concern to the problems described in this initial report.

PERMISSION TO REPRINT GRANTED, WITH LINK TO http://www.blackboxvoting.org
Printer Friendly | Permalink |  | Top
 
faithnotgreed Donating Member (1000+ posts) Send PM | Profile | Ignore Sat May-13-06 08:34 PM
Response to Reply #7
11. thanks steve - very good news
Printer Friendly | Permalink |  | Top
 
tinfoilinfor2005 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-12-06 10:12 PM
Response to Original message
4. Gees, Andy, you are taking your own sweet time up there in heaven...
but apparently you know something we don't. :)
Printer Friendly | Permalink |  | Top
 
snowbear Donating Member (1000+ posts) Send PM | Profile | Ignore Sat May-13-06 02:42 AM
Response to Original message
6. Awesome article ... kudos to blackbox...
And for sharing this!
Printer Friendly | Permalink |  | Top
 
Steve A Play Donating Member (638 posts) Send PM | Profile | Ignore Sat May-13-06 03:59 AM
Response to Reply #6
8. It's getting lots of attention from the 'Main Stream Media'
Utah Elections Officials Downplay Security Threat - KCPW, UT - 4 hours ago
Major Security Hole In Voting Machines - Judicial Watch, District of Columbia - 5 hours ago
States Beef Up E-Voting Security After Report on Weaknesses - TechNewsWorld, CA - 5 hours ago
States Beef Up E-Voting Security After Report on Weaknesses - E-Commerce Times - 5 hours ago
Voting machine flaw: threat or not? - SC Magazine, UK - 5 hours ago
Pa., other states mandate more security for some voting machines - NEPA News, PA - 8 hours ago
Voting machine security flaws uncovered - ZDNet - 9 hours ago
New Fears of Security Risks in Electronic Voting Systems - New York Times, United States - 10 hours ago
New fears of security risks in e-voting systems - CNET News.com, CA - 13 hours ago
Experts see new Diebold flaw: They call it worst security glitch - TMCnet - 17 hours ago
New Fears Of Security Risks In Computerized Voting System - Free Internet Press, NY - 19 hours ago
Diebold voting machines raise red flags in 3 states - Akron Beacon Journal, OH - 19 hours ago
Experts see new Diebold flaw - Baltimore Sun, United States - 19 hours ago
Volusia still lacks way to verify votes - Daytona Beach News-Journal, FL - 19 hours ago
High-Tech Voting Machines Stir Debate Over Security - New York Times, United States - 22 hours ago
Counties warned of security glitch in machines - Pittsburgh Post Gazette, PA - 22 hours ago
Voting machine tampering feared - The Tribune-Democrat, PA - 22 hours ago
Kern's Voting Machines Directed To Undergo Additional Security - TurnTo23.com, CA - May 11, 2006
Problem With Electronic Voting Machines? - WNEP-TV, PA - May 11, 2006
Security concerns over electronic voting machines - KGET 17, CA - May 11, 2006
Problem With Electronic Voting Machines? - WNEP-TV, PA - May 11, 2006
PA, CA, and IA Require More E-Voting Security - MIT Technology Review, MA - May 11, 2006
California, Iowa and Pennsylvania Order More E-Voting Security - California Chronicle, CA - May 11, 2006
New Diebold machine glitch worst of all - Inside Bay Area, CA - May 11, 2006
Three states mandate more security for Diebold e-voting machines - WVLT, TN - May 11, 2006
Pa., other states mandate more security for some voting machines - phillyBurbs.com, PA - May 11, 2006
Pa., other states mandate more security for some voting machines - Penn Live, PA - May 11, 2006
3 states mandate more security for Diebold e-voting machines - Worcester Telegram (subscription), MA - May 11, 2006
Directives issued for voting machines - Monterey County Herald, CA - May 11, 2006
3 states mandate more security for Diebold e-voting machines - San Jose Mercury News, USA - May 11, 2006
3 states mandate more security for Diebold e-voting machines - Grand Forks Herald, ND - May 11, 2006
3 states mandate more security for Diebold e-voting machines - San Luis Obispo Tribune, CA - May 11, 2006
3 states mandate more security for Diebold e-voting machines - Akron Beacon Journal, OH - May 11, 2006
3 states mandate more security for Diebold e-voting machines - Press-Enterprise (subscription), CA - May 11, 2006
3 states mandate more security for Diebold e-voting machines - Charlotte Observer, NC - May 11, 2006
3 states mandate more security for Diebold e-voting machines - Kansas.com, KS - May 11, 2006
3 states mandate more security for Diebold e-voting machines - Duluth News Tribune, MN - May 11, 2006
3 states mandate more security for Diebold e-voting machines - Fort Wayne News Sentinel, IN - May 11, 2006
3 states mandate more security for Diebold e-voting machines - Miami Herald, FL - May 11, 2006
Three states mandate more security for Diebold e-voting machines - WREG, TN - May 11, 2006
Three states mandate more security for Diebold e-voting machines - Team 4 News, TX - May 11, 2006
Three states mandate more security for Diebold e-voting machines - KLAS-TV, NV - May 11, 2006
Hacker's Report Due This Week - KCPW, UT - May 11, 2006
Iowa mandates more security for Diebold e-voting machines - WHO-TV, IA - May 10, 2006
Iowa mandates more security for Diebold e-voting machines - WQAD, IL - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WLBT-TV, MS - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WAVY-TV, VA - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KTVQ-TV, MT - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KRTV, MT - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KTRE, TX - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KAJ News, MT - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KLFY, LA - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KXLF-TV, MT - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KOLD-TV, AZ - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WKYT, KY - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KTVO, MO - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KLTV, TX - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KPLC-TV, LA - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WSTM-TV, NY - May 10, 2006
Three states mandate more security for Diebold e-voting machines - Providence Eyewitness News, RI - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KAIT, AR - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KRON 4, CA - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KPAX-TV, MT - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KXAN-TV, TX - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KVOA.com, AZ - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KBZK-TV, MT - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WBOC TV 16, MD - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KWWL, IA - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WLUC-TV, MI - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WHBF, IL - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WHO-TV, IA - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KRIS-TV, TX - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WALB-TV, GA - May 10, 2006
Three states mandate more security for Diebold e-voting machines - Fox 12 Boise, ID - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KFVS, MO - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KVIA, TX - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WTVM, GA - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WLNS, MI - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WBAY, WI - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WANE, IN - May 10, 2006
Three states mandate more security for Diebold e-voting machines - Eyewitness News, RI - May 10, 2006
Three states mandate more security for Diebold e-voting machines - KESQ, CA - May 10, 2006
Three states mandate more security for Diebold e-voting machines - WISH, IN - May 10, 2006
Voting glitch said to be 'dangerous' - The Argus, CA - May 10, 2006
3 states mandate more security for Diebold e-voting machines - Wilkes Barre Times-Leader, PA - May 10, 2006
3 States Order More E-Voting Security - Houston Chronicle, United States - May 10, 2006
3 States Order More E-Voting Security - Examiner.com, CA - May 10, 2006
3 states order more e-voting security - Times Picayune, LA - May 10, 2006
3 states mandate more security for Diebold e-voting machines - TMCnet - May 10, 2006
3 states order more e-voting security - TheNewsTribune.com (subscription), WA - May 10, 2006
3 States Order More E-Voting Security - San Francisco Chronicle, USA - May 10, 2006
3 states order more e-voting security - Kansas City Star, MO - May 10, 2006
3 states order more e-voting security - Fort Worth Star Telegram, TX - May 10, 2006
3 States Order More E-Voting Security - Forbes - May 10, 2006
3 states order more e-voting security - Monterey County Herald, CA - May 10, 2006
3 states order more e-voting security - Belleville News-Democrat, IL - May 10, 2006
3 states order more e-voting security - Biloxi Sun Herald, USA - May 10, 2006
3 States Order More E-Voting Security - Guardian Unlimited, UK - May 10, 2006
3 states order more e-voting security - The State, SC - May 10, 2006
3 states order more e-voting security - Contra Costa Times, CA - May 10, 2006


:)
Printer Friendly | Permalink |  | Top
 
kster Donating Member (1000+ posts) Send PM | Profile | Ignore Sat May-13-06 11:28 AM
Response to Reply #8
10. Thats quite the list
Edited on Sat May-13-06 11:29 AM by kster
Glad to see they are coming out of hibernation.
Printer Friendly | Permalink |  | Top
 
pnwmom Donating Member (1000+ posts) Send PM | Profile | Ignore Sat May-13-06 11:06 AM
Response to Original message
9. Isn't it about time we stopped discounting everything BBV
does because of the personal issues a number of DU'ers had with Bev Harris? It certainly sounds like she may have some kind of personality disorder, based only on what I hear on DU. (I know none of the people involved.) But that doesn't mean she or her group is incapable of some good work.

And this article might be the start of a sea-change in public opinion, for which we could thank BBV.
Printer Friendly | Permalink |  | Top
 
McCamy Taylor Donating Member (1000+ posts) Send PM | Profile | Ignore Sat May-13-06 10:06 PM
Response to Original message
12. Fort Worth Star Telegram FINALLY admits E-vote problems exist!!!!
I have written so many letters to the editor which these guys have completely ignored. I knew that would have to give in, finally, even though they absolutely positively did not want to. Halleluejah!

Here is my letter to the editor.

"I was not sure that I would live to see this day. It only took your newspaper---what?----four years to notice that electronic voting is riddled with problems. Welcome to reality. It is an uncomfortable place to live. Never-never Land was a lot more pleasant, I am sure. However, on the plus side, you will find more stories worth reporting now that you have joined the rest of us in the real world."
Printer Friendly | Permalink |  | Top
 
Steve A Play Donating Member (638 posts) Send PM | Profile | Ignore Sat May-13-06 11:31 PM
Response to Reply #12
13. Great letter!
Perhaps they may even print this one! :toast:
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Mon Apr 29th 2024, 10:27 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC