229 online
 
Most Popular Choices
Share on Facebook 3 Printer Friendly Page More Sharing Summarizing
General News   

Critical security alert: Three-level security flaws found in Diebold touch-screens

By Bev Harris, Black Box Voting  Posted by Joan Brunwasser (about the submitter)       (Page 2 of 3 pages) Become a premium member to see this article and all articles as one long page.   No comments
Author 79
Senior Editor

Joan Brunwasser
Follow Me on Twitter     Message Joan Brunwasser
Here is a rough analogy:

- The application can be imagined as written instructions on a paper.
If it is possible to replace these instructions, as it indeed seems,
then the attacker can do whatever he wishes as long as the
instructions are used.

- The operating system is the man reading the instructions. If he can
be brainwashed according to the wishes of the attacker, then even
correct instructions on the paper solve nothing. The man can decide to
selectively do something different than the instructions. New paper
instructions come and go, and the attacker can decide which
instructions to follow because the operating system itself is under
his control.

- The boot loader is the supreme entity that creates the man, the
world and everything in it. In addition to creating, the boot loader
also defines what is allowed in the world and delegates part of that
responsibility to the operating system. If the attacker can replace
the boot loader, trying to change the paper instructions or the man
reading them does not work. The supreme entity will always have the
power to replace the man with his own favorite, or perhaps he just
modifies the man's eyes and ears: Every time the man sees yellow, the
supreme being makes him think he is seeing brown. The supreme entity
can give the man two heads and a secret magic word to trigger
switching the heads.

In the world of the Diebold touch-screen voting terminals, all of
these attacks look possible.

The instructions (applications and files) can be changed. The man
reading the files (Windows CE Operating System and the libraries) can
be changed. Or the supreme entity (boot loader) can be changed, giving
total control over the operating system and the files even if they are
"clean software."

Specific conceptual information is contained in the report, with
details and filenames in the high-security version which is being
delivered under cryptographic and/or personal signature controls to
the EAC, Diebold CEO Tom Swidarski and CERT.

1) Boot loader reflashing
2) Operating system reflashing
3) Selective file replacement

In addition, the casing of the TSx machines lack basic seals and
security, and within the casing additional exploitations are found.

Conclusions and Recommendations

Because there is no way of having chain of custody or audit trail for
machines, the machines need to be reflashed with a known good version
(assessing the risks potentially inherited). Ideally this should be
done by the proper governmental authorities rather than being
outsourced.

After that, extensive chain of custody management has to be
established to make sure that machines do not potentially get
recontaminated. Less than five minutes is required for contamination.

The bootloader needs to be re-engineered.

The cases need to be properly and permanently sealed.

Further study is warranted around these issues and others in the May
15, 2006 Supplemental Report for the Emery County TSx study.

While these flaws in design are not in the vote-processing system
itself, they potentially seriously compromise election security. It
would be helpful to learn how existing oversight processes have failed
to identify this threat.

Next Page  1  |  2  |  3

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Joan Brunwasser Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Joan Brunwasser is a co-founder of Citizens for Election Reform (CER) which since 2005 existed for the sole purpose of raising the public awareness of the critical need for election reform. Our goal: to restore fair, accurate, transparent, secure elections where votes are cast in private and counted in public. Because the problems with electronic (computerized) voting systems include a lack of (more...)
 

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Follow Me on Twitter     Writers Guidelines

 
Contact EditorContact Editor
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter

Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Interview with Dr. Margaret Flowers, Arrested Tuesday at Senate Roundtable on Health Care

Renowned Stanford Psychologist Carol Dweck on "Mindset: The New Psychology of Success"

Howard Zinn on "The People Speak," the Supreme Court and Haiti

Snopes confirms danger of Straight Ticket Voting (STV)

Fed Up With Corporate Tax Dodgers? Check Out PayUpNow.org!

Literary Agent Shares Trade Secrets With New Writers

To View Comments or Join the Conversation:

Tell A Friend