Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Princeton prof hacks e-vote machine
Associated Press via Yahoo News ^ | September 13, 2006 | Chris Newmarker

Posted on 09/14/2006 1:47:32 PM PDT by WmShirerAdmirer

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-86 next last
To: ARealMothersSonForever

I'm not swayed by your anecdote. I described the system I saw and wanted to know what's wrong with it and how could it be hacked. The paper ballot system has been rife with fraud for as long as I know. Are you saying the Riverside County method is more corrupt than the paper system?


61 posted on 09/15/2006 6:23:27 AM PDT by osideplanner
[ Post Reply | Private Reply | To 50 | View Replies]

To: Mariner
Personally, I think electronic voting machines will be our eventual undoing.

Electronic voting could be useful if it were done with the current technology for security. Diebold didn't even do something as simple as what every TiVO does, which is use cryptographic keys to verify the validity of the software being loaded onto it. That would have stopped Felten cold.

Just think of how rediculous it is. TiVO, a friggin' entertainment-related company, thinks more about security than Diebold, which is involved in who will run the country.

62 posted on 09/15/2006 6:26:13 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 26 | View Replies]

To: antiRepublicrat
Ha, ha! Little you know about how to "hack" the old punch-card systems.

Remember, when they "count" the machines kick out certain cards to the reject bin. That's where you find the incomplete or "hanging" chads ~ so you take those cards, face and stack them, then run a straightened coat-hanger down through the whole depth at the location you want.

That way your guy gets all the loose votes. If there was actually a valid vote for someone else, that vote will be spoiled.

Anyone trying the equivalent with an electronic voting machine would need to run a coathanger through the innards and risk getting turned into a crispy critter at the buss.

63 posted on 09/15/2006 6:30:59 AM PDT by muawiyah
[ Post Reply | Private Reply | To 60 | View Replies]

To: osideplanner
Someone please explain the problem to me.

Here's the problem if you were using the Diebold machines. One staffer at any one location managed to get a minute alone with a machine and infected it. The votes on that machine are now modified. The card from that machine is then collected with the others, and fed into the main machine. Whenever that first machine's card is inserted, the main machine is infected, and all of the votes from the district can be modified without a trace.

64 posted on 09/15/2006 6:31:26 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 39 | View Replies]

To: antiRepublicrat
Dibold is not involved in running the country, nor are they concerned with the security of the software.

Government is.

Dibold sold them what they asked for.

65 posted on 09/15/2006 6:32:25 AM PDT by muawiyah
[ Post Reply | Private Reply | To 62 | View Replies]

To: sgtbono2002
I am no computer expert , but I feel the only way one of these machines could be tampered with is at the electoral office before their introduction to the precinct.

It seems you have a different machine than this flawed Diebold one that will be used in thousands of polling stations across the country.

66 posted on 09/15/2006 6:33:19 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 42 | View Replies]

To: WmShirerAdmirer
I just don't understand why machines that don't have a paper trail as a means of verification have become the norm in some states. It is just asking for contested elections and prevailing doubts on close elections.
67 posted on 09/15/2006 6:37:09 AM PDT by pepperdog
[ Post Reply | Private Reply | To 1 | View Replies]

To: antiRepublicrat

thanx


68 posted on 09/15/2006 6:37:29 AM PDT by osideplanner
[ Post Reply | Private Reply | To 64 | View Replies]

To: DouglasKC
Democrats are deathly afraid of electronic voting precisely because it makes it much morbe difficult to rig votes.

Apparently not. Depending on the voting procedures in a precinct, one lone Dim operative with one minute alone with a machine can turn a Republican district Democrat. That's a lot easier than rigging thousands of paper ballots, and only requires one person.

69 posted on 09/15/2006 6:38:40 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 54 | View Replies]

To: CharlesWayneCT
All you need is a...

That's the problem. "All you need is" many things that Diebold doesn't do.

Of course, I presume Diebold simply fixes the software holes to prevent this stuff.

Nope. Some internal Diebold memos were leaked a while back, and Diebold tried to have them suppressed. The memos showed that there are flaws in the system, and Diebold just doesn't care.

70 posted on 09/15/2006 6:41:25 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 55 | View Replies]

To: hoosierham

Your systems sounds like ours. I really like it. There are three verifications, the number of ballots issued, the paper tape generated when the ballot is input to the machine, and finally the ballot itself. This system is very simple, very quick and voter friendly. Why anyone would go to an unverifiable system is simply stupid and makes me wonder about their intent.


71 posted on 09/15/2006 6:47:10 AM PDT by pepperdog
[ Post Reply | Private Reply | To 52 | View Replies]

To: muawiyah
nor are they concerned with the security of the software.

That's obvious. Me buying a book at Amazon has more inherent security, yet that's not really an important thing on a grand scale compared to, say, who will be the next leader of the free world. It's kind of obvious to this programer that you might just want to up your security on the system when programming for something so sensitive.

Dibold sold them what they asked for.

Yes, sad. OTOH, in some cases governments asked for accountability and code visibility, and Diebold sued, and won, to avoid the laws. Diebold also violated other laws relating to certification of the machines, like installing software after the certification.

72 posted on 09/15/2006 6:47:10 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 65 | View Replies]

To: muawiyah
That's where you find the incomplete or "hanging" chads ~ so you take those cards, face and stack them, then run a straightened coat-hanger down through the whole depth at the location you want.

How long do you think it would take to find and alter 5,000 votes? It takes about a minute with these machines using a lock pick and a flash card.

73 posted on 09/15/2006 6:49:14 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 63 | View Replies]

To: antiRepublicrat
one lone Dim operative with one minute alone with a machine can turn a Republican district Democrat.

And you honestly think that something like this would go by untraceable and unnoticed? Um, ok.

74 posted on 09/15/2006 7:05:24 AM PDT by VeniVidiVici (Rabid ethnicist.)
[ Post Reply | Private Reply | To 69 | View Replies]

To: VeniVidiVici
And you honestly think that something like this would go by untraceable and unnoticed?

The modification can easily be done unnoticed. It is traceable only if the software on each machine is later audited, but then the actual vote count could never be known.

Given 10 minutes I could come up with the basic concept for a hardware/software/procedure system that is basically far superior to what Diebold has spent years developing.

75 posted on 09/15/2006 7:26:30 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 74 | View Replies]

To: antiRepublicrat
Apparently not. Depending on the voting procedures in a precinct, one lone Dim operative with one minute alone with a machine can turn a Republican district Democrat. That's a lot easier than rigging thousands of paper ballots, and only requires one person.

Well yeah, given a specific set of circumstances, having a high degree of technical knowledge AND outdated software, then yeah, it's possible. It's much easier for some dem hack to falsify thousands of paper ballots. They've been doing it in Wayne County (Detroit) Michigan for years and it's pretty much down to a sloppy science.

76 posted on 09/15/2006 11:00:40 AM PDT by DouglasKC
[ Post Reply | Private Reply | To 69 | View Replies]

To: antiRepublicrat

I think they are all pretty much alike. I really dont know. What i do know is that they are each a separate computer, not plugged into any system that sends or receives figures. The only connection with Marylands machines is the electric extension cord that supplies the power.


77 posted on 09/15/2006 2:27:43 PM PDT by sgtbono2002 (The fourth estate is a fifth column.)
[ Post Reply | Private Reply | To 66 | View Replies]

To: sgtbono2002
What i do know is that they are each a separate computer, not plugged into any system that sends or receives figures.

Read earlier posts about the sneakernet virus vector.

78 posted on 09/15/2006 3:02:23 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 77 | View Replies]

To: antiRepublicrat
Read earlier posts about the sneakernet virus vector.

Why doesn't someone build a machine that uses non-rewritable storage devices for the election parameters and the vote records? Consumables costs should still be less than when using paper ballots even if the parties went through the expense of using counterfeit-resistant seals to mark the legitimate media. Indeed, the ability to use higher quality seal markings than would be affordable for authenticating individual ballots would suggest that a properly designed device could be even more secure than using paper ballots (though obviously if dogs, dead people, etc. are allowed to vote an improved voting machine won't fix that).

OTPROM is cheap, readily available, and once a bit is written it generally cannot be altered without visibly physically damaging the chip. Some devices may be erased by high levels of radiation, but tamper-resistance seals could be constructed of a material that would by visibly changed by such an attack.

Any good reason not to do things that way?

79 posted on 09/15/2006 4:44:47 PM PDT by supercat (Sony delenda est.)
[ Post Reply | Private Reply | To 78 | View Replies]

To: supercat
Why doesn't someone build a machine that uses non-rewritable storage devices for the election parameters and the vote records?

Good question. But the article isn't about all voting machines, just Diebold's extremely lax security in theirs.

80 posted on 09/15/2006 5:12:05 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 79 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-86 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson