Diebold Voting machine vulnerabilities

Freedom to tinker brings us this BIG problem. I guess what concerns me most about this, is the way I see it, voter fraud has pretty much gone on since there have been elections. Let’s face it, there is always someone, acting officially or not that will jockey for the best advantage for their candidate. If that means “helping” someone cast a ballot, or contesting a hanging chad… it cuts both ways, no party has clean hands in this. (Even if it’s something that is done by someone acting on their own, I would say it reflects back on the party.) Anyway… up until know I’ve seen voter fraud as something that is hard to really successfully accomplish on a VERY large scale, AND with assurance of results. With electronic voting machines, I’m afraid there may be a revolution in MASS voter fraud.

The article above tells of a discovery of a problem with Diebold voting machines that essentially means, anyone with common hardware and a few minutes with a voting machine could tamper wiht the software in such a way that it might not appear to have been tampered with, software updates may appear to be installed with no problems, yet it would perhaps miscount votes. The report is from blackboxvoting.org and some details have been redacted they’re considered so severe.

There are more worrisome possibilities than just the installation of malicious software on the voting machines. It appears as though affected machines would be hard to sniff out as well.

Since I first did an early voting day and saw the network cables running from the “new” machines out and to the library’s network hub I wondered how easy it would be for someone to wreck havoc with the system. Anyway, here is freedom to tinker’s take on where this puts us…

Election officials are in a very tough spot with this latest vulnerability. Since exploiting the weakness requires physical access to a machine (although access to one machine could result in successful attacks against many machines), physical security is of the utmost importance. All Diebold Accuvote machines should be sequestered and kept under vigilant watch. This measure is not perfect because it is possible that the machines are already compromised, and if it was done by a clever attacker, there may be no way to determine whether or not this is the case. Worse yet, the usual method of patching software problems cannot be trusted in this case.

Where possible, precincts planning on using these machines should consider making paper backup systems available to prepare for the possibility of widespread failures on election day. The nature of this technology is that there is really no remedy from a denial of service attack, except to have a backup system in place. While voter verified paper trails and proper audit can be used to protect against incorrect results from corrupt machines, they cannot prevent an attack that renders the machines non-functional on election day.

Using general purpose computers as voting machines has long been criticized by computer scientists. This latest vulnerability highlights the reasoning behind this position. This attack is possible due to the very nature of the hardware on which the systems are running. Several high profile studies failed to uncover this. With the current technology, there is no way to account for all the ways that a system might be vulnerable, and the discovery of a problem of this magnitude in the midst of primary season is the kind of scenario we have feared all along.

Afraid there’s not much good news in this one….. I personally liked the idea of printed paper ballots (think bubble test where you fill in the bubble for the correct answer…) with a machine that scans and gives immediate feedback, you have a receipt and hopefully verification that the optical scanner has read it correctly.

Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove Desktop Security 2010 | Desktop Security 2010 Removal Guide Desktop Security 2010 is a rogue antivirus application. It is a successor to Total PC Defender and installs on your pc without permission through the use of malware. Once on your system it will create numerous files that it then finds during scheduled scans and it claims these files are......
  • Sony's OTHER DRM software uninstaller will be pulled According to zdnet.com, Sony and SunnComm are pulling the OTHER DRM uninstaller from the web and it will be replaced with a safer version of the uninstaller. Researchers blogging at freedom-to-tinker.com had detailed serious vulnerabilities in the uninstaller for the DRM software made by SunnComm (called MediaMax). The companies say......
  • Network Security guide for the home or small business network - Part 16 - Learn about the enemy I remember I had a geography teacher once that was a former Marine and he said when he was growing up it was the height of the cold war and geography was interesting to him from a "know your enemy" point of view. That's a good concept to apply to......
Blog Traffic Exchange Related Websites
  • How Software Can Help Determine Coin Collection Value Everywhere you turn things are going high tech. Cars have navigation systems in them which will tell you where to turn. Phones can tell you where the nearest hot spot is. Your computer can tell you what your coin collection value is. This last one is something which even many......
  • Prevention Registry Error Software A registry error is one of the most ordinary reasons of computer irritation as they can stop applications from working correctly and build common constancy problems.The main reasons of a registry error choice from damage done by difficult software like viruses and malware to inappropriate removing of software and even......
  • How to Remove Antivirus 2009, Spyware Guard 2008 and Other Malware My wife, kids, and I spent this past Christmas at my parents' house. It wasn't long after we arrived before I gravitated to their computer to check my email, read the news, check the stock market, etc. Much to my dismay, I found a barrage of malware, spyware, and......
www.pdf24.org    Send article as PDF   

Similar Posts

See what happened this day in history from either BBC Wikipedia
Amazon Logo

Comments are closed.

Switch to our mobile site