Most Popular Choices
Share on Facebook 37 Printer Friendly Page More Sharing Summarizing
OpEdNews Op Eds   

2007 Technology Tests of Computerized Voting Systems

By       (Page 8 of 8 pages) Become a premium member to see this article and all articles as one long page.   5 comments

Rady Ananda
Message Rady Ananda
Become a Fan
  (2 fans)

By adding extra security measures against the over-emphasized threat posed by outsiders, one can actually increase the risk posed by insiders.

For example, today’s mobile phones often combine a processor, execution memory and tamper-resistant key storage to make sure only the manufacturer (who has the cryptographic signing keys) can update the software. These mechanisms can sometimes still be circumvented, but at least they offer a layer of security that is completely absent in the Nedap ES3B.  But by adding ‘security’ in this way, the device could also resist any attempts to independent inspectors to see what code it is actually running. 

UCONN University of Connecticut Security Assessment of Diebold Optical Scan system, 2006 Abstract:

We identify a number of new vulnerabilities of this system which, if exploited maliciously, can invalidate the results of an election process utilizing the terminal.  

An Accu-Vote Optical Scan can be compromised with off-the-shelf equipment in a matter of minutes even if the machine has its removable memory card sealed in place. The basic attack can be applied to effect a variety of results, including entirely neutralizing one candidate so that their votes are not counted, swapping the votes of two candidates, or biasing the results by shifting some votes from one candidate to another.  

Such vote tabulation corruptions can lay dormant until Election Day, thus avoiding detection through pre-election tests. 

UCONN University of Connecticut Security Assessment of Diebold Touch Screen (TSx) system, 2007. 

The attacks presented in this report were discovered through direct experimentation with the voting terminal and without access to any internal documentation or the source code from the manufacturer. 

We present two attacks based on these vulnerabilities: one attack swap the votes of two candidates and another erases the name of one candidate from the slate.

These attacks do not require the modification of the operating system of the voting terminal, and can be launched in a matter of minutes, requiring only a computer with the capability to mount a PCMCIA card file system (a default capability in current operating systems). 

Security problems are present in the system despite the fact that a cryptographic integrity check appears to be employed in the voting system’s memory card.

Next Page  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Rady Ananda Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

In 2004, Rady Ananda joined the growing community of citizen journalists. Initially focused on elections, she investigated the 2004 Ohio election, organizing, training and leading several forays into counties to photograph the 2004 ballots. She officially served at three recounts, including the 2004 recount. She also organized and led the team that audited Franklin County Ohio's 2006 election, proving the number of voter signatures did not match official results. Her work appears in three books.

Her blogs also address religious, gender, sexual and racial equality, as well as environmental issues; and are sprinkled with book and film reviews on various topics. She spent most of her working life as a researcher or investigator for private lawyers, and five years as an editor.

She graduated from The Ohio State University's School of Agriculture in December 2003 with a B.S. in Natural Resources.

All material offered here is the property of Rady Ananda, copyright 2006, 2007, 2008, 2009. Permission is granted to repost, with proper attribution including the original link.

"In a time of universal deceit, telling the truth is a revolutionary act." Tell the truth anyway.

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter

Name
Email
   (Opens new browser window)
 

To View Comments or Join the Conversation:

Tell A Friend