Posted on 10/23/2006 7:18:25 PM PDT by wouldntbprudent
What will happen in November? Are electronic voting machines secure? One need not believe in a vast plot to rig the elections to take those questions seriously and to be pessimistic about the answers.
When Princeton researchers announced in September that the Diebold Accuvote TS voting machine software was vulnerable to tampering, it was the first time that independent computer scientists had confirmed the weaknesses long suspected in techie circles. A few days later, in a minute-and-a-half segment on Fox News, Professor Edward Felten demonstrated just how easy it would be to steal an election (to which the blonde and tanned anchors responded with the canned surprise you'd expect from a demonstration of a new food processor).
(Excerpt) Read more at cbsnews.com ...
Where I am, we have electronic voting machines that also print out everything that is chosen. (The voter can watch to check.) It seems like the best of both worlds - quick returns and a paper trail.
And I've used the mechanical push-lever machines here in New York State for years, and they didn't 'develop a problem' until Pataki and Giuliani and then Bloomberg were elected and then re-elected .... /shrug
Well, hell! All this time I've been worried about the 'Rats taking back Congress! Turns out I had nothing to fear-we're gonna STEAL it! How cool! I'll sleep SO much better tonight!
ANYTHING to keep the 'Rats outta power!
Went to vote this morning, and the machines were down. I don't worry about elections being stolen, just the normal problems with machines and computers. I don't understand why they cannot have a machine/computer voting system in which, when you indicate you are finished, it not only records your vote, it also gives you a slip of paper that you can check (like a reciept). Then, you could slip that into a ballot box, so that if they had to do a recount, they could use those little paper ballots.
susie
Oh, darn, I thought I was having an original idea! Doh! ;)
susie
They lied!!! I saw this segment!!! Diebold had on an engineer that had a machine and stated that the new firmware they use in the machines now, secures holes in previous software versions. They have created safety valves that open up if certain watermarks are not present in the firmware upload. Any attempt at tampering with the firmware will render the machine useless, but not before making a mirror file of the original votes logged.
LLS
Six Flags couldn't have come up with a more severe roller coaster ride, ehhh ?
it also gives you a slip of paper that you can check (like a reciept). Then, you could slip that into a ballot box, so that if they had to do a recount, they could use those little paper ballots.
They do except you can only view it through a window,
and is rolled up on a spool. All voting machines in california should have this now.
It sounds like a good option. Of course, I would like to go back to the old paper ballots, but I think that's because I'm getting old...
susie
The level of security on the Diebold machines is shameful. There are thousands of keys to the machine in circulation (the security is slightly better than a suitcase lock, but not by much). Someone with a key to a machine and a suitably-formatted memory card can do whatever they want with the software in the machine. Their software can if desired alter votes and then erase any trace of itself.
Any machine used for voting should have all code and parameters stored on a medium that can be read out in its entirety without running any code thereon, and can be protected against alteration from before the time it's read by both parties before the election until after the time it's read by both parties after the election. One of many simple and fundamental security principles that Diebold completely failed to grasp (that a mini-bar key can open the machines is just the icing on the cake).
"And as if the Rats are not the king of stealing elections. They do know of what they speak!"
While that may be true. The premice of the article is also true. These machines are a bad idea.
How about get rid of the untraceable electronic crap and the confidence comes back?
Yeah, just like the new version of Windows is secure -- LOL.
How were they deceptive? I'll admit that at the time the report was written, they may have underplayed the fact that attacking the machine requires physically opening it. Given, however, that the machine can be opened with a mini-bar key, that doesn't seem like much of an omission by the researchers.
Certainly Diebold claims that the security holes are fixed, but from what I can tell they are not fixed in any way that would prevent someone with inside knowledge from hacking the machines in such a way as to fake vote totals and then remove all trace of the hack.
There are some simple principles that can and should be applied that would make an attack very difficult even by someone with full inside knowledge. So far as I can tell, Diebold has made no effort to make their machines secure against insider attacks. Why?
If it's rolled up on a spool, how do they prevent reconstruction of the order in which votes were cast?
I don't trust e-voting. Too easy to manipulate. Personally, I would much rather punch a paper ballot.
In the meantime, the states can simply inform their citizens that they must apply due diligence when punching holes in their ballots and any malformed ballots, if questioned, will be discarded. The hanging chad and butterfly ballot debacles were just evidence that some people don't need to be voting.
That nutter needs a straitjacket.
The Ohio Diebold machines have paper trail stored in them.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.