Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Have y'all seen the Berkeley report on Diebold code yet?

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Topic Forums » Election Reform Donate to DU
 
garybeck Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 01:36 AM
Original message
Have y'all seen the Berkeley report on Diebold code yet?
Edited on Thu Mar-02-06 01:42 AM by garybeck
apologies if this is already posted, but I didn't see it on a search.

This has to be one of the most damning reports on Diebold ever.



Security Analysis of the Diebold AccuBasic Interpreter

David Wagner, David Jefferson, Matt Bishop
Voting Systems Technology Assessment Advisory Board (VSTAAB)
with the assistance of:
Chris Karlof, Naveen Sastry

University of California, Berkeley
February 14, 2006

1 Summary
This report summarizes the results of our review of some of the source code for the Diebold AV-OS
optical scan (version 1.96.6) and the Diebold AV-TSx touchscreen (version 4.6.4) voting machines.

<snip>

 Memory card attacks are a real threat: We determined that anyone who has access to a
memory card of the AV-OS, and can tamper it (i.e. modify its contents), and can have
the modi ed cards used in a voting machine during election, can indeed modify the election
results from that machine in a number of ways. The fact that the the results are incorrect
cannot be detected except by a recount of the original paper ballots.

 Harri Hursti's attack does work: Mr. Hursti's attack on the AV-OS is de nitely real. He was
indeed able to change the election results by doing nothing more than modifying the contents
of a memory card. He needed no passwords, no cryptographic keys, and no access to any
other part of the voting system, including the GEMS election management server.

 Interpreter bugs lead to another, more dangerous family of vulnerabilities: However, there is
another category of more serious vulnerabilities we discovered that go well beyond what Mr.
Hursti demonstrated, and yet require no more access to the voting system than he had. These
vulnerabilities are consequences of bugs|16 in all|in the implementation of the AccuBasic
interpreter for the AV-OS. These bugs would have no e ect at all in the absence of deliberate
tampering, and would not be discovered by any amount of functionality testing; but they
could allow an attacker to completely control the behavior of the AV-OS. An attacker could
change vote totals, modify reports, change the names of candidates, change the races being
voted on, or insert his own code into the running rmware of the machine.

 Successful attacks can only be detected by examining the paper ballots: There would be no
way to know that any of these attacks occurred; the canvass procedure would not detect any
anomalies, and would just produce incorrect results. The only way to detect and correct the
problem would be by recount of the original paper ballots, e.g. during the 1 percent manual
recount.

 The bugs are classic, and can only be found by source code review: Finding these bugs was only
possible through close study of the source code. All of them are classic security
aws, including buffer overruns, array bounds violations, double-free errors, format string vulnerabilities, and
several others. There may, of course, be additional bugs, or kinds of bugs, that we did not
find.



full report:
http://www.solarbus.org/election/docs/security_analysis_of_diebold.pdf

spread it around.

how could any election official use Diebold after reading this report?
Printer Friendly | Permalink |  | Top
Zinfandel Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 01:49 AM
Response to Original message
1. CA republican Gov. Musclehead will now be able to steal "reelection"....
Edited on Thu Mar-02-06 02:07 AM by Zinfandel
since the slimy Arnold appointed republican Bruce McPherson, CA Secretary of State... and republican McPherson quietly pushed through the Diebold machines on a Friday night of a three day week-end without the promised hearings...This of course is all Rove & White House sponsored tactics to steal the nations most populous democratic state for republican control!!!
Printer Friendly | Permalink |  | Top
 
AndyTiedye Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 02:10 AM
Response to Reply #1
3.  The Rethugs NEED Those Machinez…
…remember how their referenda went DOWN IN FLAMES in California last November.
They just couldn't steal enough votes to push them through.

They want to make it like Ohio, where Blackwell can make the results be anything he wants --
losing by a landslide 2-1 margin? No problem! Presto Changeo and the 'Thugs "won" by 2-1!



Printer Friendly | Permalink |  | Top
 
Nothing Without Hope Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 01:58 PM
Response to Reply #3
11. For the votes, it's not just the machines, voter registration purges
Edited on Thu Mar-02-06 02:04 PM by Nothing Without Hope
have also played a major role, and not just in Florida 2000 - READ THIS if you haven't already:

http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=132x2489123
title: Ohio '04 308,000 VOTERS CUT FROM THE ROLLS PRIOR TO THE VOTE

Read the whole Fitrakis/Wasserman article cited in the opening post. We have to fight the machines and we also have to fight the other routes to election fraud. Exposure and publicity is an important step for all of this.

Basically if the vote is too close to steal electronically without alerting voters that something is suspicious, they have to manipulate the vote in other ways too. Voter registration purging is one of those ways.

K & R - more visibility with 20 votes
Printer Friendly | Permalink |  | Top
 
nicknameless Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 08:41 PM
Response to Reply #11
24. They also prevented Dem voters in places like Broward County, FL
from receiving absentee ballots. 58 THOUSAND voters, in Broward alone, didn't receive their ballots.
Printer Friendly | Permalink |  | Top
 
Nothing Without Hope Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-04-06 02:29 AM
Response to Reply #24
33. No wonder they got their packed Supreme Court to shut down the
counting and the owned Corporate Press to suppress all news. The evidence of the stolen election just comes at you from every direction. I hope their arrogant assumption that they can keep this crime - like their others - buried proves to be spectacularly overconfident and that the American public finally sees the truth and acts on it.
Printer Friendly | Permalink |  | Top
 
kster Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 02:04 AM
Response to Original message
2. If you have a Voter Verified Paper Ballot that is scanned
Why not just hand count them also? I don't get this 1% stuff. The people who like speed in the count get it(optiscan) and the people who want accuracy, and don't give a shit how long it takes, so long as it is within reason also get it(hand count).

This way everyone gets their way, and the only time there is a problem is when the machine count and the hand count don't mesh.

It seems simple enough I just don't get what the problem is.
Printer Friendly | Permalink |  | Top
 
garybeck Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 11:27 AM
Response to Reply #2
7. how about this idea
use the damn machines to verify the hand count, not the other way around.
Printer Friendly | Permalink |  | Top
 
kster Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 12:01 PM
Response to Reply #7
8.  That would make to much sense
Why do you hate our election machine vendors. :rofl:
Printer Friendly | Permalink |  | Top
 
emlev Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 02:39 AM
Response to Original message
4. Interesting where this report comes from
I could use some help clarifying this.

I know David Jefferson was the head of the technology committee that reported to the CA Voting Systems and Procedures Panel, which reported to the CA Secretary of State. Now that the VSPP has been disbanded, I'm not up to date on what replaced it. Was it the VSTAAB?

Anyway, my understanding is that these are the "techies" who the SOS is supposed to be listening to about the voting machines. They work for the State, as I understand it.

Someone please correct me if I'm wrong here.

Garybeck, thanks for posting this.
Printer Friendly | Permalink |  | Top
 
Wilms Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 02:05 PM
Response to Reply #4
12. I think VSTAAB is correct?

And they are the "techies" who the SOS is supposed to be listening to.

And they told McPherson the machines have big problems.

They also answered McPherson's question that went something like, even if the machines are messed-up, what bandaid could be put on them.

They shouldn't have been asked that.

Printer Friendly | Permalink |  | Top
 
O.M.B.inOhio Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 07:07 AM
Response to Original message
5. kick
Printer Friendly | Permalink |  | Top
 
freedomfries Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 07:23 AM
Response to Reply #5
6. k & r
thanks for posting garybeck!
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 01:30 PM
Response to Original message
9. thank you forwarded around my neck of the woods. Gary...
:yourock:

ps thanks for the newsletter as well.
Printer Friendly | Permalink |  | Top
 
Amaryllis Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 01:50 PM
Response to Original message
10. It was posted the day it came out I think by Wilms or Nicknameless but
it never hurts to call it to people's attentiona again who haven't seen it.
Printer Friendly | Permalink |  | Top
 
file83 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 02:23 PM
Response to Original message
13. One Corporation is hijacking the entire nation.
They determine our representatives. They determine our leaders. They determine our laws.

One Corporation.

How weak is our Democracy when it can be held hostage by ONE Corporation?
Printer Friendly | Permalink |  | Top
 
garybeck Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 03:49 PM
Response to Reply #13
14. look deeper
who is funding the corporation?

where is the money flowing?

it's not Diebold per se that is doing this. they are the mechanism.

follow the money.
Printer Friendly | Permalink |  | Top
 
Amaryllis Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-03-06 01:36 AM
Response to Reply #14
29. Go here to follow the money: www.whoscounting.net
Printer Friendly | Permalink |  | Top
 
bleever Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 05:33 PM
Response to Original message
15. K&R
Printer Friendly | Permalink |  | Top
 
nicknameless Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 07:29 PM
Response to Original message
16. This report was released on Feb 17. There was quite a bit of discussion
earlier about it.

Did you also see that the Gems Tabulator wasn't covered AT ALL?!

Excerpt from page 6:

Our study does not constitute a comprehensive code review of the entire Diebold codebase. We had access to the full codebases for the AV-OS and AV-TSx, but we did not even attempt a comprehensive review of the entire codebase. Our attention was focused fairly narrowly on Diebold’s proprietary AccuBasic scripting language, the compiler for that language, the interpreter for its object code, the AccuBasic scripts themselves, and the related protocols and procedures, both for the AV-OS (optical scan) and AV-TSx (touchscreen) voting systems.

In particular, we did not have the source code for the Diebold GEMS election management system, and our security evaluation does not cover GEMS at all. It is widely acknowledged that a malicious person with unsupervised access to GEMS, even without knowing the passwords, can compromise GEMS and the election it controls. This report does not address those threats, however.

Our analysis was based only on reading the source code we were given. We did not have access to a real running system (although we were able to compile and execute modified versions of the compiler and interpreter on a PC). Nor did we have any manuals or other documentation beyond that present in the comments in the code itself. We had access to the source code for a period of approximately four weeks for this review.
Printer Friendly | Permalink |  | Top
 
Wilms Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 07:44 PM
Response to Reply #16
17. I didn't assume that it would have been.

Though it does seem logical to review the entire system.

Still, the aim of the study was to look at the interpreted code and memory card.

Printer Friendly | Permalink |  | Top
 
nicknameless Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 07:53 PM
Response to Reply #17
18. But GEMS is part of the Diebold system.
ITA didn't touch it either, did they?
How can they legally usher in the use of these vote-fraud machines, when one of the most widely-acknowledged problems isn't even addressed?
Printer Friendly | Permalink |  | Top
 
Wilms Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 08:03 PM
Response to Reply #18
19. For whatever it was worth, they had previously reviewed GEMS.

(Though we could ask which version.)

It was the memory cards that hadn't been reviewed. McPherson cited that as his reason for sending Diebold back to the ITA.

In that way, McPherson wasn't asking the ITA to review what they had already reviewed (however carelessly or not).

Printer Friendly | Permalink |  | Top
 
garybeck Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 08:09 PM
Response to Reply #19
20. about central tabulators...
if every precinct posts their results publicly BEFORE they are sent to the tabulator, doesn't that solve the problem?
Printer Friendly | Permalink |  | Top
 
Wilms Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 08:29 PM
Response to Reply #20
22. It would be nice. n/t
Printer Friendly | Permalink |  | Top
 
nicknameless Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 08:18 PM
Response to Reply #19
21. GEMS is wide open for fraud.
But then, what part of the Diebold system isn't.

I wonder too why this isn't being addressed:
http://www.democraticunderground.com/discuss/duboard.php?az=show_mesg&forum=203&topic_id=378552&mesg_id=378674

Hursti was surprised, upon reading the release notes for the new 1.96 series optical scan machine, that the newer versions are even less secure, making it easier to get into the memory card without inside access.

Recent testing by Black Box Voting and Hursti, proved that Diebold optical scan systems use a simply appalling mechanism which makes vote tampering relatively easy to do, yet very difficult to detect. This design is so obviously inappropriate that it should never should have been certified. It's ITA seal of approval and NASED certification indicates that the "experts" are either slipshod or not very expert.


So Diebold *is* making changes to their equipment. They're making them easier to hack -- and making it more difficult to detect any hacking.
Printer Friendly | Permalink |  | Top
 
nicknameless Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 08:38 PM
Response to Reply #19
23. But they had previously reviewed the memory cards too.
The cards were sent back because they never should have been certified in the first place (interpreted code).
Obviously, GEMS should not have been certified either.

TSx machines' crashing & freezing printers weren't addressed either.
It's all so slipshod and corrupt.
Printer Friendly | Permalink |  | Top
 
Wilms Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 08:46 PM
Response to Reply #23
25. I think your right.

ie: It had been tested, and McPherson was pointing to the interpreted code.

Fact is, he didn't ask them to re-look at anything else. I really didn't expect him to anymore than I expect him to send all the machines back, regardless of vendor.

Printer Friendly | Permalink |  | Top
 
Patsy Stone Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-02-06 11:18 PM
Response to Original message
26. Sadly
I can only recommend this thread once. :(

Printer Friendly | Permalink |  | Top
 
Ellipsis Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-03-06 01:31 AM
Response to Original message
27. K&R First time I've read the report.
...surprised this hasn't made a bigger splash.

It's all in there.



Printer Friendly | Permalink |  | Top
 
Wilms Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-03-06 01:34 AM
Response to Reply #27
28. And in here.
Printer Friendly | Permalink |  | Top
 
Amaryllis Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-03-06 01:37 AM
Response to Original message
30. Go here for a really good summary of the report by TrueVoteMD:
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-03-06 02:50 AM
Response to Original message
31. I believe this is called malicous firmware, it is hardware that executes a
program that is undectable.
Printer Friendly | Permalink |  | Top
 
AX10 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-03-06 08:51 PM
Response to Original message
32. KICK and recomended!
STOP DIEBOLD!
Printer Friendly | Permalink |  | Top
 
Ellipsis Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-07-06 12:21 AM
Response to Original message
34. kick
Printer Friendly | Permalink |  | Top
 
Ellipsis Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-23-06 12:25 AM
Response to Original message
35. re-kick
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sat May 04th 2024, 04:12 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Topic Forums » Election Reform Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC