Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Former Maryland delegate gets purported Diebold code
Baltimore Sun ^ | October 20, 2006 | Melissa Harris

Posted on 10/20/2006 10:30:44 AM PDT by Cincinatus' Wife

Diebold Election Systems Inc. expressed alarm and state election officials contacted the FBI yesterday after a former legislator received an anonymous package containing what appears to be the computer code that ran Maryland's polls in 2004.

Cheryl C. Kagan, a longtime critic of Maryland's elections chief, says the fact that the computer disks were sent to her - along with an unsigned note criticizing the management of the state elections board - demonstrates that Maryland's voting system faces grave security threats.

spokesman for Diebold, which manufactures the state's touch-screen voting machines, said the company is treating the software Kagan received as "stolen" and not as "picked up" at the State Board of Elections, as the anonymous note claimed. Lawyers for the company are seeking its return.

....Kagan, a former state Democratic delegate from Montgomery County who is now executive director of the Carl M. Freeman Foundation, said the disks were delivered to her office Wednesday.

An accompanying letter refers to the State Board of Elections and calls Kagan "the proud recipient of an 'abandoned baby Diebold source code' right from SBE accidentally picked up in this envelope, right in plain view at SBE. ... You have the software because you are a credible person who can save the state from itself. You must alert the media and save democracy."

(Excerpt) Read more at baltimoresun.com ...


TOPICS: Crime/Corruption; Front Page News; News/Current Events; Politics/Elections
KEYWORDS: electronic; polls; voting
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-68 next last
To: Vicomte13

"paper record of his own vote,"
That is exactly what I would like implemented. Vote with a secure electronic machine, which would produce one or more numbered written receipts. The voter would take away a receipt. If a particular election was legally protested, the judge could invite voters to bring in their copies for comparsion.


41 posted on 10/20/2006 11:46:16 AM PDT by gb63
[ Post Reply | Private Reply | To 40 | View Replies]

To: Retired Chemist
Wasn't it Democrats who demanded idiot proof voting machines?

Certainly was true here in Georgia.

42 posted on 10/20/2006 11:49:28 AM PDT by doodad
[ Post Reply | Private Reply | To 15 | View Replies]

To: Vicomte13
Who ever argues against having a paper record is either naive, or very intelligent and knows EXACTLY what he is doing.

But we sure got those lottery machines secured. Try going to the lottery office, and saying "I picked the winning numbers! Ticket? Oh, I don't have any sort of paper receipt...just trust me, I picked 'em!"
43 posted on 10/20/2006 11:54:49 AM PDT by beezdotcom
[ Post Reply | Private Reply | To 40 | View Replies]

To: ProtectOurFreedom

You are right, it does smell. I too wonder why the source ever left the testing centers; I smell 'Rat conspiracy.


44 posted on 10/20/2006 12:10:30 PM PDT by cinives (On some planets what I do is considered normal.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: GraniteStateConservative
The linked video should not stand as proof that the hack can be done. Note that they boot the machine with, supposedly, a memory card that loads the software. The machine must be left powered for the new 'ware to run, and rebooting the machine with the correct card will load the real software when the machine is rebooted. Unless, of course, the felon has "simply" opened the machine and replaced the boot eeprom with a fake copy.

The report mentioned in the video does state that there are security seals on the memory cards, locks, boards, and so forth but references another report that says that these seals are not always checked.

So the simple solution is to check the seals before an election, and always assure that the machine is booted with the correct card, then have its port sealed with a new security seal.

If there are questions, the malware will stay installed on either the tampered card or in the boot eeprom (unless it is bright enough to know that it has been moved to an FBI Forensic Computer Lab and deletes itself), and the forensic examiner will find it (if the operating system can boot it, a human can find it too). At that point, a criminal investigation begins. If the malware can be decompiled, the vote shifting algorithm can be determined and the vote count corrected. At worst, the machine's count can be discarded like badly voted paper ballots.

As for a virus spreading from machine to machine through a LAN, why then, let's install firewalls and virus checkers in the lan! And let's ask a third party virus company to make a virus/malware checker memory card for the voting machine while we are at it.

Where I vote, with paper ballots, the boxes all have seals.

Another thought- the video images offer no proof whatsoever that the voiceover is correct.

45 posted on 10/20/2006 12:19:11 PM PDT by DBrow
[ Post Reply | Private Reply | To 24 | View Replies]

To: Cincinatus' Wife

Indeed. Looking at two-year-old software of an active project is like looking at a photo album from the family vacation when you were six years old.


46 posted on 10/20/2006 12:23:41 PM PDT by jiggyboy (Ten per cent of poll respondents are either lying or insane)
[ Post Reply | Private Reply | To 8 | View Replies]

To: gb63
"the judge could invite voters to bring in their copies for comparsion."

Union bosses, too. Plus, I can tell the homeless guy that he gets his carton of smokes AFTER he comes out of the booth, and a certain Reverend can offer the Poke Chop Dinner to certain receipt holders, day of or after the election.

Making reciepts mandatory would sure make your investment in a vote more secure!

And, of course, the little printer and roll of tape could NEVER be duplicated outside the voting precinct, so if there were 10,000 votes cast and they all responded to the judges call, only 10,000 receipts would show up, and they'd all be originals.
47 posted on 10/20/2006 12:25:06 PM PDT by DBrow
[ Post Reply | Private Reply | To 41 | View Replies]

To: gb63
Don't I remember someone in Florida (?) having a ballot box in his car? Could be wrong....

You don't swing an election with one ballot box in the trunk of a car. You also have to consider how many poll wotkers knew about the ballot box in the trunk of the car.

Bussing is the most common form of election fraud. Bussing requires hundreds being bussed from precinct to precinct. If they haven't been able to catch any of those being bussed, how are they going to catch a couple of computer geeks?
.
48 posted on 10/20/2006 12:33:23 PM PDT by mugs99 (Don't take life too seriously, you won't get out alive.)
[ Post Reply | Private Reply | To 37 | View Replies]

To: DBrow

"could NEVER be duplicated outside"
It would be possible to print a PGP-type text at the bottom of each receipt, that would not be possible to generate outside the machine. It would be different for each receipt, but by court order could be de-encryted back to a known text verifying that it was an original from that machine at that time. There are many ways to secure electronic voting in the future that would eliminate dead and duplicate voters and other comman frauds. Of course, the examples of bribery you cited might remain.


49 posted on 10/20/2006 12:41:25 PM PDT by gb63
[ Post Reply | Private Reply | To 47 | View Replies]

To: gb63
iirc it was a ballot box, plus a voting machine.

Maybe two separate issues, but for sure one of the election officials got caught with a punchcard machine without valid reason for having one.

(unless it's valid to take handfuls of already-voted ballots and gang-punch them for Gore, which at the very least removes a Bush vote through overvote and at best adds a Gore Chad for an undervote, no change if it's already a Gore Chad)
50 posted on 10/20/2006 12:42:36 PM PDT by DBrow
[ Post Reply | Private Reply | To 37 | View Replies]

To: gb63

What about the princton professor that showed how to tamper a diebold machine

(had three George washington votes convert to 1 vote for Georges and two votes for Benedict Arnold)

On Fox and Friends, the professor said the malicious code was self erasing and undetectable.


51 posted on 10/20/2006 12:42:37 PM PDT by longtermmemmory (VOTE! http://www.senate.gov and http://www.house.gov)
[ Post Reply | Private Reply | To 29 | View Replies]

To: gb63

could be de-encryted back to a known text

Good idea. Very expensive to do a verification, but a good idea.

If we are to give reciepts, why not just abandon the concept of a secret vote? Like the Iowa Caucus, where you vote by standing with other supporters.

A ballot where you actually sign it, and maybe smear your thumbprint on the ballot too.


52 posted on 10/20/2006 12:45:52 PM PDT by DBrow
[ Post Reply | Private Reply | To 49 | View Replies]

To: longtermmemmory
the professor said the malicious code was self erasing

And how do you do that? Pretty neat trick, easy for a Princeton professor with an agenda to say, but let's see a real demo backed up by computer forensic experts and James Randi if he's available.

How does the malware know when to erase itself? Remember too, it was loaded from a bogus memory card. The card would need to know that it was about to be removed from the machine, signal the operating system, have sys delete the malware and correct CRC, then sys deletes the malware from within its own code space. Then does it recompile itself? Don't forget, it would have to secure-wipe the free space in memory too.

And if the malware resides in a eeprom on the motherboard, the motherboard would need to have an eeprom burner onboard for sys to instruct to reprogram the eeprom.

Sorry, the story borders on magic and does not pass the computer geek smell test.
53 posted on 10/20/2006 12:54:02 PM PDT by DBrow
[ Post Reply | Private Reply | To 51 | View Replies]

To: longtermmemmory

"What about the princton professor"
I saw the demo. If you are carrying out any demonstration, and you are allowed to control all factors, as was true in that case, you can always determine the final outcome. In a real case, the possible outcomes would be limited by secure procedures verifying disks and recorded results. In the long-term future, I think we will see increased electronic voting, with the ultimate goal being voting from computers at home.


54 posted on 10/20/2006 12:56:59 PM PDT by gb63
[ Post Reply | Private Reply | To 51 | View Replies]

To: DBrow
let's install firewalls and virus checkers in the lan! And let's ask a third party virus company to make a virus/malware checker memory card for the voting machine while we are at it.

I am proud to introduce the *NEW* ARMSF anti-viral and malware suite! For a mere $1.6 Billion (per precinct license), you can trust me that your vote will count (for whoever I decide to make it count). But hey, a mans gotta make a living.

Seriously, I think that a paper receipt deposited into a locked and sealed container at the precinct would be a good start.

55 posted on 10/20/2006 12:58:42 PM PDT by ARealMothersSonForever (We shall never forget the atrocities of September 11, 2001.)
[ Post Reply | Private Reply | To 45 | View Replies]

To: ARealMothersSonForever

"a paper receipt deposited into a locked and sealed container"
That's why I mentioned earlier having one or more receipts. Deposit one in a locked box and keep the other. In a contested precinct, first test the contents of the locked box. If not resolved, the judge could ask for local voters to report to a desk at the courthouse for comparsion.


56 posted on 10/20/2006 1:06:23 PM PDT by gb63
[ Post Reply | Private Reply | To 55 | View Replies]

To: ProtectOurFreedom

LOL! Probably Linux.


57 posted on 10/20/2006 1:09:31 PM PDT by roamer_1
[ Post Reply | Private Reply | To 2 | View Replies]

To: DBrow

It is on YouTube.

You do a search of Princeton and Diebold and it comes up and you can hear and see him explain it himself.


58 posted on 10/20/2006 1:24:18 PM PDT by longtermmemmory (VOTE! http://www.senate.gov and http://www.house.gov)
[ Post Reply | Private Reply | To 53 | View Replies]

To: Cincinatus' Wife

Here comes the CHAOS!!!


59 posted on 10/20/2006 1:47:17 PM PDT by Suzy Quzy
[ Post Reply | Private Reply | To 1 | View Replies]

To: longtermmemmory
I saw it, and read it too.

So it's true if it's on the news and YouTube? By that logic Bush had demolition charges planted in WTC! I saw it on YouTube and several college professors corroborated it!

Look at the video and look for visuals that prove what the voice is saying is true. The video stops and starts, while buttons are pressed, and after several more stops and starts, the paper tape comes up with numbers, that don't match the buttons that were pressed- but the stops and starts mean that the final result could be merely editing. Also, there are no visible security seals like a real fielded machine would have. The report is full of statements like "could be done", "may be done", "it is possible to..."

As for the magic code, find a description of any code that deletes itself without a trace, or human intervention. I know of no example, except for some LISP code, but deletion leaves a trace.
60 posted on 10/20/2006 1:54:56 PM PDT by DBrow
[ Post Reply | Private Reply | To 58 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-68 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson