Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Worst Ever Security Flaw Found In Diebold TS Voting Machine
The Open Voting Foundation ^ | JULY 31, 2006 | OPEN VOTING FOUNDATION

Posted on 07/31/2006 11:03:20 AM PDT by rit

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-103 next last
To: rit

"Those who cast the votes decide nothing. Those who count the votes decide everything" -- Josef Stalin

How to Hack the Vote

REQUIREMENTS:

Windows-based PC with 150megs free disk space and 128megs RAM (minimum)

A copy of MS Access

The GEMS software

A Sample Election Database

Ready? Now read! http://www.chuckherrin.com/hackthevotedemo.htm


41 posted on 07/31/2006 11:43:00 AM PDT by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dead
Diebold shmiebold. Real voting reform:

Valid picture ID, confirming citizenship and eligibility to vote at that location.
Dip your finger in ink before voting.
Long prison term for individual voter fraud.
Death penalty for systemic fraud.

I agree.

42 posted on 07/31/2006 11:43:54 AM PDT by VeniVidiVici (Rabid ethnicist.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: rit
If democrats were smart enough to punch a hole in a card across from the name they wish to vote for we wouldn't have this mess!
43 posted on 07/31/2006 11:44:06 AM PDT by TexasCajun
[ Post Reply | Private Reply | To 1 | View Replies]

To: Defiant

"Is it as bad as the security flaws in the old ballot boxes that hold paper ballots?"

Pretty tough since they were counted in the precinct by 3 people and had to math and poll watchers were allowed.

The results were phoned in, posted outside the polling place, and the ballots returned to the Register of Voters.

As far as i'm concerned it was the most secure system and also the results were in earlier than any current system.


44 posted on 07/31/2006 11:47:57 AM PDT by dalereed
[ Post Reply | Private Reply | To 25 | View Replies]

To: slightlyovertaxed
That said, you have a strong point, though isn't that sort of pressure from an employer illegal?

Of course it is. And that, like gun control laws, is adequate to make sure it never happens. ;-)

I like the idea of a voter verified paper trail, in fact I think electronic voting is a scam unless it has one. But the voter shouldn't leave the polling place with a receipt indicating how he voted.

I think the ideal solution would be to use the technology to eliminate the logistical risks of punch card voting (hanging, dimpled, pregnant, swinging door, etc., chads) but to then print a paper ballot which clearly shows the votes in human readable form. Once the voter verifies that the paper accurately reflect his vote, he then takes it and places it in a traditional ballot box. Then there aren't two tallies vying for acceptance and the vote is still auditable. This isn't rocket science. I can't imagine why this is so confusing to people.

45 posted on 07/31/2006 11:48:50 AM PDT by Still Thinking (Quis custodiet ipsos custodes?)
[ Post Reply | Private Reply | To 32 | View Replies]

To: ritewingwarrior
"how some poll workers were permitted to take the machines home "That must've been in Philadelphia, where 105% of the registered voters vote in every Presidential election....they are VERY "civic-minded".....
46 posted on 07/31/2006 11:51:35 AM PDT by traditional1
[ Post Reply | Private Reply | To 27 | View Replies]

To: slightlyovertaxed

Why? Because my union boss would love to see such a reciept from me.

Others would pay money to get such a reciept from me.

Other than that, how would you use voting reciepts? In a contested election, have everyone show up with their reciept for a show-of-hands count? Everybody who voted for Kerry on the left of the football field, Kucinich in the middle, and Bush on the right...


47 posted on 07/31/2006 11:58:50 AM PDT by DBrow
[ Post Reply | Private Reply | To 11 | View Replies]

To: rit

48 posted on 07/31/2006 12:00:04 PM PDT by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Tijeras_Slim

"and it could be done without leaving a trace"
But I thought everyone was saying that they voted for McKinney but the machine voted for the White Male Jew (SARCASM).
How come if it can be done without leaving a trace, everyone keeps catching them...


49 posted on 07/31/2006 12:01:58 PM PDT by Holicheese (Stanley Cup's new home IS North Carolina!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Calpernia

http://www.freerepublic.com/focus/f-news/1675203/posts?page=41#41

An analysis on Hacking the Vote from post 41 done by Johns Hopkins University


http://www.eff.org/Activism/E-voting/20030724_evote_research_report.pdf

Excerpt:

System overview

Although the Diebold code is designed to run on a DRE device (see pdf for Figure 1, A Diebold DRE Voting Machine), one can run it on a regular Microsoft Windows computer (during our experiments we compiled and ran the code on a Windows 2000 PC).

In the following we describe the process for setting up and running an election using the Diebold system.
Although we know exactly how the code works from our analysis, we must still make some assumptions about the external processes at election sites. In all such cases, our assumptions are based on the way the Diebold code works, and we believe that our assumptions are reasonable. There may, however, be additional administrative procedures in place that are not indicated by the source code. We first describe the architecture at a very high level, and then, in Section 2.1 we present an overview of the code. Since the Diebold code can be run both on DRE devices and PCs, we shall refer to a device running the vote collection software as a voting terminal.

SETTING UP

. Before an election takes place, one of the first things the election officials must do is specify the political offices and issues to be decided by the voters along with the candidates and their party affiliations.
Variations on the ballot can be presented to voters based on their party affiliations. We call this data a ballot
definition. In the Diebold system, a ballot definition is encoded as the file election.edb and stored on a
back-end server.

Shortly prior to the election, the voting terminals must be installed at each voting location. In common
usage, we believe the voting terminals will be distributed without a ballot definition pre-installed. Instead,
a governmental entity using Diebold voting terminals has a variety of choices in how to distribute the ballot
definitions. They may be distributed using removable media, such as floppy disks or storage cards. They may also be transmitted over the Internet or a dial-up connection. This provides additional flexibility to the election administrator in the event of last-minute changes to the ballot.

THE ELECTION

. Once the voting terminal is initialized with the ballot definitions, and the election begins, voters are allowed to cast their votes. To get started, however, the voter must have a voter card. The voter card is a memory card or smartcard; i.e., it is a credit-card sized plastic card with a computer chip on it that can store data and, in the case of the smartcard, perform computation. We do not know exactly how the voter gets his voter card. It could be sent in the mail with information about where to vote, or it could be given out at the voting site on the day of the election. To understand the voting software itself, however, we do not need to know what process is used to distribute the cards to voters.

The voter takes the voter card and inserts it into a smartcard reader attached to the voting terminal. The
terminal checks that the smartcard in its reader is a voter card and, if it is, presents a ballot to the voter on the
terminal screen. The actual ballot the voter sees may depend on the voter’s political party, which is encoded
on the voter card. If a ballot cannot be found for the voter’s party, the voter is given a nonpartisan ballot.
At this point, the voter interacts with the voting terminal, touching the appropriate boxes on the screen
for his or her desired candidates. Headphones are available for visually-impaired voters to privately interact
with the terminal. Before the ballots are committed to storage in the terminal, the voter is given a final
chance to review his or her selections. If the voter confirms this, the vote is recorded on the voting terminal
and the voter card is “canceled.” This latter step is intended to prevent the voter from voting again with the
same card. After the voter finishes voting, the terminal is ready for another voter to use.

REPORTING THE RESULTS

. A poll worker ends the election process by inserting an administrator card or an ender card (a special card that can only be used to end the election) into the voting terminal.

Upon detecting the presence of such a card (and, in the case of the administrator card, checking a PIN entered by
the card user), the poll worker is asked to confirm that the election is finished. If the poll worker agrees, then
the voting terminal enters the post-election stage and can transmit its results to the back-end server.

As we have only analyzed the code for the Diebold voting terminal, we do not know exactly how the back-end server tabulates the final results it gathers from the individual terminals. Obviously, it collects all the votes from the various voting terminals. We are unable to verify that there are checks to ensure, for example, that there are no more votes collected than people who are registered at or have entered any given polling location.

More more at PDF file


50 posted on 07/31/2006 12:13:56 PM PDT by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 41 | View Replies]

To: rit
Thanks for posting a press release from an organization whose very existence is predicated on finding flaws in the electronic voting process.

Immutable law of security #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.

Same applies to touch-screen voting machines.
51 posted on 07/31/2006 12:14:52 PM PDT by Doohickey (I am not unappeasable. YOU are just too easily appeased.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Darkwolf377
lol

I've solved this stupid problem 50 times and they've yet to implement my coding suggestions.

52 posted on 07/31/2006 12:19:50 PM PDT by txhurl
[ Post Reply | Private Reply | To 14 | View Replies]

To: Bob J
Voting machines manufactured for the DNC is all.

The head of Diebold is a serious Bush supporter.

53 posted on 07/31/2006 12:20:16 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 5 | View Replies]

To: traditional1
They don't like to use fingers on the touch screen, lest the fingerprints match on the screens at ten different polling places?

Another reason the dims do not like the touch screens and leaving fingerprints, is one day they will tie the touchscreens into the national database looking for criminals.

I remember a few years ago, the mayor of Atlanta, a democrat, used to throw parties at his house. His security force outside would routinely check the license tags of his guests. And guess what, they found some who had problems with the law. Guess what, the mayor ordered a stop to the license tag checks of his guests. Guess what, the mayor is now in jail for corruption.

54 posted on 07/31/2006 12:20:28 PM PDT by rawhide
[ Post Reply | Private Reply | To 18 | View Replies]

To: txflake
They don't get it, we have a foolproof way of stealing the elections: The Republican name has a blinking light next to it. None of these welfare-sucking morons can resist a blinking light--just stand outside any package store with a Keno game inside.

"Oooohhhh, pretty light, I'm going to press THIS button!"

Helpful Dem Poll Worker:"Did you vote for the Democrat?"

"Pretty light!" (clapping)

55 posted on 07/31/2006 12:23:37 PM PDT by Darkwolf377 (http://www.dansimmons.com/news/message/2006_04.htm)
[ Post Reply | Private Reply | To 52 | View Replies]

To: L98Fiero
Yeah, breaking in there doing that without screwing something else up is so much easier than stuffing a paper ballot box.

Yes it is. You're a Dim election worker in there with all the machines before the polls open up. All you need is a few minutes alone with the machines to corrupt thousands of votes.

Diebold is really pathetic with this. The technology definitely exists to easily make an electronic voting system that no voter or precinct worker could mess with, yet Diebold comes out with this crap. There's far better security technology protecting your last iTunes purchase.

56 posted on 07/31/2006 12:23:56 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 9 | View Replies]

To: Still Thinking
"Imagine the local union boss threatenting people with loss of their union ticket unless they showed up with a straight Democratic receipt within 72 hours of election day!"

Anything like that ever happens to me, they'll need a new union boss within 72 hours of election day.
57 posted on 07/31/2006 12:23:59 PM PDT by Old Student (WRM, MSgt, USAF(Ret.))
[ Post Reply | Private Reply | To 22 | View Replies]

To: rit

So they have produced a manual on how to throw elections, Huh?


58 posted on 07/31/2006 12:24:55 PM PDT by Toby06 (True conservatives vote based on their values, not for parties.)
[ Post Reply | Private Reply | To 1 | View Replies]


Diebold Inc's products primarily include self-service banking products and automated teller machines, RemoteTeller System, vaults, safe deposit boxes and safes, drive-up banking equipment, and electronic voting systems.

The Diebold Bombshell
(Originally appeared on OpEdNews.com. Authors David Dill, Doug Jones and Barbara Simons have given permission for reposting.)

Most computer scientists have long viewed Diebold as the poster child for all that is wrong with touch screen voting machines. But we never imagined that Diebold would be as irresponsible and incompetent as they have turned out to be.

Recently, computer security expert Harri Hursti revealed serious security vulnerabilities in Diebold's software. According to Michael Shamos, a computer scientist and voting system examiner in Pennsylvania, "It's the most severe security flaw ever discovered in a voting system."

Even more shockingly, we learned recently that Diebold and the State of Maryland had been aware of these vulnerabilities for at least two years. They were documented in analysis, commissioned by Maryland and conducted by RABA Technologies, published in January 2004. For over two years, Diebold has chosen not to fix the security holes, and Maryland has chosen not to alert other states or national officials about these problems.

Basically, Diebold included a "back door" in its software, allowing anyone to change or modify the software. There are no technical safeguards in place to ensure that only authorized people can make changes.

A malicious individual with access to a voting machine could rig the software without being detected. Worse yet, if the attacker rigged the machine used to compute the totals for some precinct, he or she could alter the results of that precinct. The only fix the RABA authors suggested was to warn people that manipulating an election is against the law.

Typically, modern voting machines are delivered several days before an election and stored in people's homes or in insecure polling stations. A wide variety of poll workers, shippers, technicians, and others who have access to these voting machines could rig the software. Such software alterations could be difficult to impossible to detect.

Diebold spokesman David Bear admitted to the New York Times that the back door was inserted intentionally so that election officials would be able to update their systems easily. Bear justified Diebold's actions by saying, "For there to be a problem here, you're basically assuming a premise where you have some evil and nefarious election officials who would sneak in and introduce a piece of software... I don't believe these evil elections people exist."

While Diebold's confidence in election officials is heartwarming, Diebold has placed election officials in an awkward position, with no defense against disgruntled candidates or voters questioning the results of an election. The situation is even worse for those states and localities using Diebold touch-screen machines that have no voter-verified paper records to recount.

Diebold voting machines have been certified to be in compliance with 2002 Voting System Standards, as required by the Help America Vote Act. These standards prohibit software features that raise any doubt "that the software tested during the qualification process remains unchanged and retains its integrity." We must ask, how did software containing such an outrageous violation come to be certified, and what other flaws, yet to be uncovered, lurk in other certified systems?

There have been many significant problems - some resulting in lost votes - involving paperless voting machines produced by other vendors. Recognizing the intrinsic risks of paperless voting machines, the Association for Computing Machinery issued a statement saying that each voter should be able "to inspect a physical (e.g., paper) record to verify that his or her vote has been accurately cast and to serve as an independent check on the result." Without voter-verified paper records of all the votes, and without routine spot audits of these records, no currently available voting system can be trusted. With such records, even when machines do not function correctly, each voter can make sure that his or her vote has been correctly recorded on paper.

Our democracy depends on our having secure, reliable, and accurate elections.

David L. Dill is a Professor of Computer Science at Stanford University and the founder of VerifiedVoting.org. Doug Jones is an Associate Professor of Computer Science at the University of Iowa.

Barbara Simons is retired from IBM Research and a former ACM President. Jones and Simons are writing a book on voting machines to be published by PoliPoint Press.

59 posted on 07/31/2006 12:27:01 PM PDT by Calpernia (Breederville.com)
[ Post Reply | Private Reply | To 50 | View Replies]

To: rit
I used to work as an engineer on electronic gaming machines (i.e. poker, slots, etc.) and we had a maintenance setting (by flipping switches) loaded by our test disk (Flash) where we would run a plethora of diagnostic simulations.

The machines were not shipped with the flash disk PLUS the hacker would have to know the programming and access codes to get in.

Of course, the states with gambling are more concerned with the gaming machines than the voting ones. The former gets them money and the latter gets them fired.
60 posted on 07/31/2006 12:35:59 PM PDT by RetiredSWO
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-103 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson