Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Newly released video shows how easily electronic voting machines can be hacked, Pried Open

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU
 
debbierlus Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-09-08 03:37 PM
Original message
Newly released video shows how easily electronic voting machines can be hacked, Pried Open
I will say it, AGAIN. DU needs a HOME PAGE election fraud voting link. After two stolen elections, you would think this stuff would
be given more credence. Obama also needs to lead on this issue. The conventional wisdom is 'well, it might discourage voters, if they think there vote won't count. But, if their votes DON'T count, we won't have much to lose, now will we?


http://rawstory.com/news/2008/Video_shows_how_electronic_voting_machines_0909.html

Test of company's software recently double-counted thousands of votes
A newly released video depicts an eerie scenario in which voting machines produce an XXXXXX result for the ballot position of US senator after a vote is placed and then replaces the XXXXXX with an individual's name.

Though it appears to be part of an eerie low-budget sci-fi thriller, the producers weren't B-movie conspiracy theorists. Instead, they were students from the University of Santa Barbara's Security Group, participating in a project commissioned by the California Secretary of State.

Why the video was posted now despite the fact that the project took place last year remains unknown. It may have its roots in a legal threat issued by the voting machines' manufacturer in March. In a sharply worded letter to a Princeton research team that had audited their machines before, Edwin Smith, the VP for "Compliance/Quality/Certification," said that the publication of any security audit of "Sequoia software its behavior" would force the company to "take appropriate steps" through its "retained counsel."

In the film, included below, students demonstrate uploading a virus-like program to a voting terminal by inserting a data card and pressing a key. They then proceed through the voting process -- selecting candidates and approving ballot issues. Following their votes, the machine spits out a paper receipt.

The receipt correctly displays the student's choices. But a moment later, it spits out a second receipt, topped "VOID," which has replaced the student's senatorial selection with XXXXXX. The following receipt replaces XXXXXX with James P. 'Jim' Gray.

The student project also reveals the system's vulnerability to hacking the machines' internal workings. One student is able to slip one of the virus-implanting cards into a theoretically "sealed" machine simply by peeling back the flap.
Sealed machines opened up in seconds
A physically sealed machine is opened and hacked in just 18 seconds.

A second machine is unscrewed in less than a minute.

A piece of sheet metal holding on the door is removed in several minutes with a simple Phillips head screwdriver.

It's possible the letter from Sequoia's Smith has succeeded in keeping some audits of the company's software off the national radar. In his letter to the Princeton professors who'd planned an audit of the company's voting machines, the firm all but threatens a lawsuit.

"As you have likely read in the news media, certain New Jersey election officials have stated that they plan to send to you one or more Sequoia Advantage voting machines for analysis," Smith writes. "I want to make you aware that if the County does so, it violates their established Sequoia licensing Agreement for use of the voting system. Sequoia has also retained counsel to stop any infringement of our intellectual properties, including any non-compliant analysis. We will also take appropriate steps to protect against any publication of Sequoia software, its behavior, reports regarding same or any other infringement of our intellectual property."

Sequoia reemerged in the news late last month after votes were double counted during a test in Florida. Yesterday, the company blamed the glitch on "operator error."

"Procedures by the poll workers and the Supervisor's office staff proved to be good," Sequoia asserted. "The hardware and software performed as it should. The accuracy will be confirmed at a later date. The reason that the vote totals doubled in these 40 precincts was due to an inadvertent operator error.

The California students' video was picked up Tuesday by the blog BoingBoing.

Printer Friendly | Permalink |  | Top
debbierlus Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Sep-09-08 03:45 PM
Response to Original message
1. These posts always drop like stones....
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sun May 05th 2024, 12:28 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC