Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

One Man, One Vote...One Machine, One Million Votes (Diebold security flaw)

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU
 
ProSense Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-11-06 09:56 PM
Original message
One Man, One Vote...One Machine, One Million Votes (Diebold security flaw)
Edited on Thu May-11-06 09:58 PM by ProSense
Security and Privacy Blog
Gregg Keizer Keeps You Up To Date

One Man, One Vote...One Machine, One Million Votes

Who would have thought we'd be looking back on chads, as in "chads, hanging" with fond memories?

Researchers have pegged a new bug in a widely-used electronic voting system as the "worst ever."

Great.

And I thought it was bad because a worm might hit Microsoft Exchange any day now...

It gets better. It's not really a bug, see, it's a feature. At least that's how it looks to Diebold Election Systems, the Ohio-based maker of the gizmos. The security hole was installed so updates could be quickly deployed. Here, however, "hole" sounds like "backdoor."

And according to several computer researchers -- as reported by yesterday's Oakland Tribune, which broke the story -- the backdoor can be accessed by anyone armed "with a common computer component and knowledge of Diebold systems," then used "to load almost any software without a password or proof of authenticity and potentially without leaving telltale signs of the change."

more...

http://techsearch.cmp.com/blog/archives/2006/05/one_man_one_vot.html?loc=security_and_privacy




Diebold voting machine spurs security concerns

Thursday, May 11, 2006
Dan Goodin
Associated Press

San Francisco- Officials overseeing elections in three states have directed local authorities to take additional security measures with a popular type of electronic voting machine to prevent election fraud.

California, Iowa and Pennsylvania issued the voting directives in recent weeks after researchers discovered a feature that could allow someone to load unauthorized software on Diebold Election Systems computerized machines.

Diebold is a unit of Green, Ohio-based Diebold Inc.

A hacker theoretically could use the software to rig or sabotage an election or to perform some other unauthorized function, said Michael Shamos, a computer science professor at Carnegie Mellon University.

"It's worse than a hole," said Shamos, who has been briefed on the vulnerability of the Diebold machines. "It's a deliberate feature that was added by Diebold that we all believe is unwise."

In the wake of the ballot-tabulating problems that plagued the 2000 presidential election, electronic voting has become a flash point for many people concerned about fair elections. Critics charge that electronic voting machines are too susceptible to fraud and error to be trusted and should not replace traditional balloting until proper safeguards are installed.

http://www.cleveland.com/news/plaindealer/index.ssf?/base/news/1147347050148670.xml&coll=2




Scientists call Diebold security flaw 'worst ever'

Critics say hole created for upgrades could be exploited by someone with nefarious plans

By Ian Hoffman, STAFF WRITER

Computer scientists say a security hole recently found in Diebold Election Systems' touch-screen voting machines is the "worst ever" in a voting system.
Election officials from Iowa to Maryland have been rushing to limit the risk of vote fraud or disabled voting machines since the hole was reported Wednesday.

Scientists, who have conferred with Diebold representatives, said Diebold programmers created the security hole intentionally as a means of quickly upgrading voting software on its electronic voting machines.

The hole allows someone with a common computer component and knowledge of Diebold systems to load almost any software without a password or proof of authenticity and potentially without leaving telltale signs of the change.

"I think it's the most serious thing I've heard to date," said Johns Hopkins University computer science professor Avi Rubin, who published the first security analysis of Diebold voting software in 2003. "Even describing why I think it's serious is dangerous. This is something that's so easy to do that if the public were to hear about it, it would raise the risk of someone doing it. ... This is the worst-case scenario, almost."

more...

http://www.insidebayarea.com/oaklandtribune/localnews/ci_3809493



Printer Friendly | Permalink |  | Top
neoblues Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-11-06 09:59 PM
Response to Original message
1. When will we have had enough?
Enough so we finally really do something about this? If we don't we won't win.
Printer Friendly | Permalink |  | Top
 
valerief Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-11-06 10:00 PM
Response to Original message
2. Those kooky scientists. Don't they know Diebold voting
machines are part of the faith-based initiatives? We must have faith they won't be tampered with.
Printer Friendly | Permalink |  | Top
 
ProSense Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-11-06 10:14 PM
Response to Original message
3. ''It's a deliberate feature that was added by Diebold...
Thursday, May 11, 2006

PA, CA, and IA Require More E-Voting Security

The three states have mandated redundant security procedures for Diebold e-voting machines.

By Associated Press

SAN FRANCISCO (AP) -- Officials overseeing elections in three states have directed local authorities to take additional security measures with a popular type of electronic voting machine to prevent election fraud.

California, Iowa and Pennsylvania issued the voting directives in recent weeks after researchers discovered a feature that could allow someone to load unauthorized software on Diebold Election Systems computerized machines.

A hacker theoretically could use the software to rig or sabotage an election or to perform some other unauthorized function, said Michael Shamos, a computer science professor at Carnegie Mellon University.

''It's worse than a hole,'' said Shamos, who has been briefed on the vulnerability of the Diebold machines. ''It's a deliberate feature that was added by Diebold that we all believe is unwise.''

more...

http://www.technologyreview.com/read_article.aspx?id=16840
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 30th 2024, 02:08 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC