300 online
 
Most Popular Choices
Share on Facebook 35 Printer Friendly Page More Sharing Summarizing
OpEdNews Op Eds   

2007 Technology Tests of Computerized Voting Systems

By       (Page 6 of 8 pages) Become a premium member to see this article and all articles as one long page.   5 comments

Rady Ananda
Message Rady Ananda
Become a Fan
  (2 fans)

Data and smart card passwords can now be set by election workers. The authentication protocol is not secure, allowing an attacker to create counterfeit, validating smart cards, including voter cards. 

There is no integrity protection of stored electronic ballots and ballots are stored sequentially.  This defeats voter privacy by allowing a voter’s selections to be tied to a voter’s name. 

Audit logs are not cryptographically protected and data transmitted over communication lines is neither authenticated nor encrypted. 

A custom, malicious bootloader is possible if the terminal is delivered to a polling place in “debug mode.”  If not in debug mode, an attacker can open the case and move a hardware switch to enable this attack.    An attacker can hide preloaded votes on a forged memory card that the terminal will recognize. 

FLORIDA: Software Review and Security Analysis of the Diebold Voting Machine Software Supplemental Report, Security and Assurance in Information Technology (SAIT) Laboratory Florida State University, August 2007.  

This report reflects the narrow investigative scope requested by FLDoS (Florida Department of State). These results are not comprehensive in any sense, nor is this report an endorsement of the system’s overall security. We examined only a small subset of the flaws from the SAIT Diebold Report.

All other flaws identified in that report remain in the code base, including vulnerability to a sleepover attack that may allow an intruder to manipulate vote computation or worse.

Significant, critical vulnerability remains in this code base independent of repairs documented in this report. 

Until voting systems are developed for “high assurance”, election officials face an unnecessarily high risk and must exercise significantly expanded election security procedures to mitigate known and unknown software vulnerability. 

The signature flaw was fixed.  This makes it much more difficult for preloaded votes to be hidden. 

(Note: Other flaws reported to have been fixed were not detailed above. ~ RA)  

KENTUCKY 2007 Voting Expert Letter to KY Attorney General, public version posted at Review of Diebold/Premier, Hart InterCivic, and ES&S. 

The review relies on the completeness and accuracy of the testing by the Independent Testing Authorities (ITA) for conformance to voluntary Federal guidelines (Voting systems Standards 2002). However, it has been well established that the ITAs do not adequately perform this role. 

The ITA reports used for Federal certification and included in the review packages used by the SBE certifiers are cursory…. (as) reinforced by the fact that none of the ITAs identified the flaws found by the California or Florida source code review teams. 

Because the ITA reports are of limited value, the quality examination of the machines as part of the certification processes is crucial, but it too can best be described as cursory. 

The security of all of the machines appears to be extremely dependent on their never coming in contact with malicious code, as once that occurs there are few defenses or recovery mechanisms. This is sometimes referred to as the “M&M model of security”: there is a hard crunchy exterior that protects a soft chewy interior. 

Next Page  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Rady Ananda Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

In 2004, Rady Ananda joined the growing community of citizen journalists. Initially focused on elections, she investigated the 2004 Ohio election, organizing, training and leading several forays into counties to photograph the 2004 ballots. She officially served at three recounts, including the 2004 recount. She also organized and led the team that audited Franklin County Ohio's 2006 election, proving the number of voter signatures did not match official results. Her work appears in three books.

Her blogs also address religious, gender, sexual and racial equality, as well as environmental issues; and are sprinkled with book and film reviews on various topics. She spent most of her working life as a researcher or investigator for private lawyers, and five years as an editor.

She graduated from The Ohio State University's School of Agriculture in December 2003 with a B.S. in Natural Resources.

All material offered here is the property of Rady Ananda, copyright 2006, 2007, 2008, 2009. Permission is granted to repost, with proper attribution including the original link.

"In a time of universal deceit, telling the truth is a revolutionary act." Tell the truth anyway.

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter

Name
Email
   (Opens new browser window)
 

To View Comments or Join the Conversation:

Tell A Friend