35 online
 
Most Popular Choices
Share on Facebook 54 Printer Friendly Page More Sharing
Exclusive to OpEd News:
Sci Tech   

Debunking Pre-Election Testing Myths

By       (Page 2 of 3 pages) Become a premium member to see this article and all articles as one long page.   3 comments
Message Rady Ananda
Become a Fan
  (2 fans)

-- California Voting Systems Technology Assessment Advisory Board (VSTAAB), Security Analysis of the Diebold AccuBasic Interpreter, February 14, 2006  

7.  "[W]hile 'logic-and-accuracy testing' can sometimes detect flaws, it will never be comprehensive; important flaws will always escape any amount of testing." 

-- Wallach, Dan S. Testimony to National Institute of Standards and Technology and Election Assistance Commission Technical Guidelines Development Committee, September 20, 2004.  

8. "The current certification process may have been appropriate when a 900 lb lever voting machine was deployed. The machine could be tested every which way, and if it met the criteria, it could be certified because it was not likely to change. But software is different. The software lifecycle is dynamic...[Y]ou cannot certify an electronic voting machine the way you certify a lever machine.... [W]e absolutely expect that vulnerabilities will be discovered all the time.... 

"Software is designed to be upgraded, and patch management systems are the norm. A certification system that requires freezing a version in stone is doomed to failure because of the inherent nature of software." 

-- Rubin, Avi (Professor of Computer Science at Johns Hopkins University). Secretary Bowen's Clever Insight. Avi Rubin's Blog, August 7, 2007.     

9. "Flaws in the Optical Scan software enable an unofficial memory card to be inserted into an active terminal. Such a card can be preprogrammed to swap the electronically tabulated votes for two candidates, reroute all of a candidate's votes to a different candidate, or tabulate votes for several candidates of choice toward a different candidate. 

-- Gardner, Ryan, Alec Yasinsac, Matt Bishop, Tadayoshi Kohno, Zachary Hartley, John Kerski, David Gainey, Ryan Waalega, Evan Hollander, and Michael Gerke. Software Review and Security Analysis of the Diebold Voting Machine Software. Florida Dept. of State: Florida State University, Security and Assurance in Information Technology Laboratory, July 27, 2007. 

10. When discussing its study of ES&S systems (the iVotronic touch screen, and the M100 and the M650 optical scan systems), Project EVEREST researchers reported: 

"The second key finding of the review was the apparent vulnerability of the system to malware infection and manipulation. If a properly skilled and resourced attacker can gain access to any of several components in the system at any time during their life-cycle, there exists a large possibility that they could implement malicious programming (malware) into the system with little chance of detection. Once the malware was in place on the system, it could perform a variety of tampering and could likely spread from component to component throughout the system.  

"The ability of malware to affect the integrity and availability of the elections process is profound and disturbing, but the lack of capability to detect and report potential malware attacks against the system makes it the single largest threat." 

-- Ohio Secretary of State. Project EVEREST: ES&S System MicroSolved, Inc. Executive Summary Report. n.d. (December 2007).  

Assertions that no vote switching has ever been shown to have occurred on an ES&S system or any other computerized voting system is explained by the fact that malware can be self-erasing.  That's why computer experts are calling for "software independence" – we cannot rely on results reported by easily mutable software and must count the ballots by other means. 

11. "Of course, numerous studies have shown that currently deployed voting systems are susceptible to undetectable malicious attacks....  

"It is against this background-unreliability in the field; the prospect of undetectable, malicious attacks; and the inconclusiveness of post-election analysis in purely electronic systems-that the EAC should view the software independence requirement." 

-- Burstein, Aaron, and Joseph Lorenzo Hall. Public Comment on the Voluntary Voting System Guidelines, Version II (first round) Submitted to the U.S. Election Assistance Commission. National Science Foundation ACCURATE (A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections), May 5, 2008.     

Software is fragile and undetectably mutable.  Source code for voting systems is hundreds of thousands of lines in length.  This complexity increases opportunity for software failure, despite programmers' best intentions.  To assert that machines "do as they are told" ignores the reality that software is issued in versions because programmers understand fixes will have to be made once defects show up in the field where the software is used. 

12. "As an example, look at the way Apple distributes releases of the iPhone software.  The first release was 1.0.0.  Two minor version numbers.  When the first serious flaw was discovered, they issued a patch and called it version 1.0.1.  Apple knew that there would be many minor and some major releases because that is the nature of software.  It's how the entire software industry operates."  Rubin, supra 

Next Page  1  |  2  |  3

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Rady Ananda Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

In 2004, Rady Ananda joined the growing community of citizen journalists. Initially focused on elections, she investigated the 2004 Ohio election, organizing, training and leading several forays into counties to photograph the 2004 ballots. She officially served at three recounts, including the 2004 recount. She also organized and led the team that audited Franklin County Ohio's 2006 election, proving the number of voter signatures did not match official results. Her work appears in three books.

Her blogs also address religious, gender, sexual and racial equality, as well as environmental issues; and are sprinkled with book and film reviews on various topics. She spent most of her working life as a researcher or investigator for private lawyers, and five years as an editor.

She graduated from The Ohio State University's School of Agriculture in December 2003 with a B.S. in Natural Resources.

All material offered here is the property of Rady Ananda, copyright 2006, 2007, 2008, 2009. Permission is granted to repost, with proper attribution including the original link.

"In a time of universal deceit, telling the truth is a revolutionary act." Tell the truth anyway.

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

To View Comments or Join the Conversation:

Tell A Friend