Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

BradBlog/John Gideon: Diebold's Deliberate Security Vulnerability

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Topic Forums » Election Reform Donate to DU
 
Wilms Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-11-06 11:10 PM
Original message
BradBlog/John Gideon: Diebold's Deliberate Security Vulnerability

DIEBOLD'S DELIBERATE SECURITY VULNERABILITY

EXPERTS AGREE: 'It's the Most Serious Security Breach Ever Discovered in a Voting System"

3 States Issue Mitigation Plans, Georgia Ignores The 'Black Hole', AP Ignores BRAD BLOG Reporting...

by John Gideon

5/11/2006

snip

This is a 'feature' that was knowingly installed by Diebold. It was not a mistake or something that was overlooked in the design of the software. It is not a 'bug', 'glitch', 'flaw', 'error in programming' or any other simplistic name. Michael Shamos, a Carnegie Mellon University computer science professor and veteran voting-systems examiner for the state of Pennsylvania has said this:

"It's the most serious security breach that's ever been discovered in a voting system. On this one, the probability of success is extremely high because there's no residue.... Any kind of cursory inspection of the machine would not reveal it."

Johns Hopkins University computer science professor Avi Rubin, who published the first security analysis of Diebold voting software in 2003 had this to say:

"I think it's the most serious thing I've heard to date. Even describing why I think its serious is dangerous. This is something that's so easy to do that if the public were to hear about it, it would raise the risk of someone doing it. ... This is the worst-case scenario, almost."


snip/links

http://www.bradblog.com/archives/00002814.htm

Printer Friendly | Permalink |  | Top
kster Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-11-06 11:18 PM
Response to Original message
1. Kick n Recommended ,,,
Printer Friendly | Permalink |  | Top
 
peacetalksforall Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-11-06 11:31 PM
Response to Original message
2. Everyone's got secrets. Are we falling apart instead of being united.
Our uniter and decider has stolen too much, lied too much, sneered too much and an xxxxxxxxxxx who lives to take revenge.
Printer Friendly | Permalink |  | Top
 
simonm Donating Member (386 posts) Send PM | Profile | Ignore Fri May-12-06 12:14 AM
Response to Original message
3. Release the Hack to the Public
That is the only way they will listen. Public exposure has been used many times with security exploits involving software like Microsoft Windows. The vendors cannot ignore a serious security flaw that is in the wild and nor can election supervisors.
Printer Friendly | Permalink |  | Top
 
EFerrari Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-12-06 12:44 AM
Response to Reply #3
4. That was my thought. Let's load PacMan or SOMETHING
on these POS vote eaters and let a precinct full of voters get an eyeful.
Printer Friendly | Permalink |  | Top
 
kster Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-12-06 12:50 AM
Response to Reply #4
5. PacMan Lets do it
Printer Friendly | Permalink |  | Top
 
EFerrari Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-12-06 01:07 AM
Response to Reply #5
8. LOL! Perfect!
:)
Printer Friendly | Permalink |  | Top
 
sofa king Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-12-06 01:06 AM
Response to Reply #3
7. Simonm, there's a security industry term for that, isn't there?
It's not hacktivism, and it's not grey-hatting. Does anyone know what I barely know what I'm talking about?
Printer Friendly | Permalink |  | Top
 
simonm Donating Member (386 posts) Send PM | Profile | Ignore Fri May-12-06 01:51 AM
Response to Reply #7
9. Full Disclosure Policies?
Edited on Fri May-12-06 01:52 AM by simonm
There are many kinds. Basically there is a set time limit till the exploit is released publicly. This gives the vendor time to fix their problem. In this case, I don't believe Diebold should have this opportunity since it is a built in feature and not a "glitch".

http://www.cert.org/kb/vul_disclosure.html

http://www.wiretrip.net/rfp/policy.html
Printer Friendly | Permalink |  | Top
 
druidity33 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-12-06 07:26 AM
Response to Reply #3
10. i work in a photo lab...
and deal with touchscreens all day long. Of the 6 of them in our store 4 of them need to be turned off in a specific way. I touch the top right hand corner of the screen and hold my finger down for 2 seconds and up pops the administrative menu... from there i can get to anything in the system. Customer orders and addresses, machine settings, the Delete All Orders button, etc... all just by knowing that i can press and hold on the top right corner of the screen... makes you think.

Also, when i was in high school (late 80's) i had a neighbor who programmed video games for Sega(?)... and he told me that EVERY video game had a backdoor. There was ALWAYS a secret combination of joystick/button presses that released the "deposit 25 cents" header and got you FREE GAMES until the machine was restarted. Course he never told me any of those combos, but he claimed to know a few...

:scared:
Printer Friendly | Permalink |  | Top
 
AuntiBush Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-12-06 12:55 AM
Response to Original message
6. How Brad hangs in there is simply Amazing.
Thank.You. Brad! K&R!
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 30th 2024, 02:34 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Topic Forums » Election Reform Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC