Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Voting machine fails inspection
CNet News.com ^ | July 24, 2003 | Staff Writer

Posted on 07/24/2003 6:18:07 PM PDT by Monitor

University researchers delivered a serious blow to the current crop of electronic voting systems in an analysis of one such system's source code in which they concluded that a voter could cast unlimited ballots without detection.

Using an earlier version of the source code that powers machines manufactured by Diebold Election Systems, the security experts--three from Johns Hopkins University and a colleague from Rice University--performed an audit and found numerous security holes.

"Our analysis shows that this voting system is far below even the most minimal security standards applicable in other contexts," said the researchers in a paper published Wednesday on the Internet, concluding that "as a society, we must carefully consider the risks inherent in electronic voting, as it places our very democracy at risk."

The criticisms echo a fundamental issue that many security researchers have raised with most current systems: there is no way to verify that a vote was correctly recorded and no permanent record is kept.

The issues also come as direct recording electronic (DRE) voting systems are taking off. In the 2002 election, 19.6 percent of the electorate could have cast an electronic vote, up from 7.9 percent in 1996, according to Election Data Services.

Diebold, the parent company of the election systems maker, assailed the researchers for using code that was out of date and never actually used in an election. Moreover, the company took issue with the reports focus on only the software and not the other security measures that the company uses.

"While respecting the report, we reserve judgment on the researcher's fundamental conclusions," the company stated in a release. "Our election systems products and services undergo a series of certification processes, which are conducted by federal, state and local officials, including logic and accuracy testing, and represent a sequence of security layers."

The researchers were only able to see the source code to Diebold's system because the company accidentally left the file on an Internet server in January. Manufacturers typically require that security experts sign a nondisclosure agreement before auditing the code.

Several issues became evident when the code was audited, said Avi Rubin, an associate professor of computer science at Johns Hopkins University and one of the authors of the paper.

For one, the manufacturer chose Windows CE as the operating system--a bad choice from a security standard, Rubin said. "Windows has a long history of new releases of patch just about every week," he said. "You can't run voting machines on Windows."

Moreover, the smartcards used by the system to limit a voter to a single vote could be duplicated. By bringing a stack of valid cards to the voting booth, a person could cast several votes.

Rubin warned that other systems are likely to have similar problems and of a similar magnitude.

Yet, not everyone is worried.

David Heller, the project manager for Maryland's voting system implementation, adopted a wait-and-see attitude. The state announced Monday that it had signed a $55.6 million deal with Diebold for the company to provide Maryland's voting systems.

"We are going to analyze the report and make intelligent decisions," he said. "We have been using the systems now for a year and a half. We've had great success in dealing with them."

Heller explained that the aspects of the system not analyzed by the researchers do make a difference. On election day for example, human election workers would count the number of votes cast at each terminal and retain receipts that would tie people to a specific machine (but not to their actual vote). If the voting machine's tally doesn't match the operator's count, then the votes on that machine would be thrown out and those voters allowed to recast their ballots.

"If there is a failure or a compromise of one unit, we know who voted on that unit," Heller said. "We don't know how they voted, but we know who voted."

Still, the researchers argued that the software needs to be secure to prevent abuse of the election process.

Tadayoshi Kohno, a researcher at Information Security Institute at Johns Hopkins University and an author of the paper, said the secrecy that surrounds the creation and certification of electronic voting machines almost ensures that the systems will not be programmed securely.

"Independent security researchers need to verify and look at the source code of electronic voting systems," he said. "There are no easy fixes. I think that as a society, we are moving too fast toward electronic voting and we need to rethink things more thoroughly."


TOPICS: Politics/Elections
KEYWORDS: electronic; fraud; vote; voting

1 posted on 07/24/2003 6:18:07 PM PDT by Monitor
[ Post Reply | Private Reply | View Replies]

To: Monitor
I'm surprised the "University researchers" didn't just keep this little tidbit to themselves.
2 posted on 07/24/2003 6:19:22 PM PDT by lambo
[ Post Reply | Private Reply | To 1 | View Replies]

To: Monitor
bump
3 posted on 07/24/2003 6:29:39 PM PDT by RippleFire
[ Post Reply | Private Reply | To 1 | View Replies]

To: Monitor
Houston, we have a problem. We have a main bus B overvote.
4 posted on 07/24/2003 6:34:59 PM PDT by steveegg (Uday and Qusay are now reunited with their daddy; confirmation that Saddam is also there pending)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Monitor
Why would anyone trust any voting system which does not produce some sort of unalterable record?
5 posted on 07/24/2003 6:48:10 PM PDT by supercat (TAG--you're it!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: supercat
Right on.
6 posted on 07/24/2003 6:52:34 PM PDT by just mimi
[ Post Reply | Private Reply | To 5 | View Replies]

To: Monitor
Diebold ... assailed the researchers for using code that was out of date and never actually used in an election. Moreover, the company took issue with the reports focus on only the software and not the other security measures that the company uses.
Hmmm ... this kind of casts a little doubt on the opening line of this story:

    University researchers delivered a serious blow ...

7 posted on 07/24/2003 6:58:17 PM PDT by _Jim (First INDICT the ham sandwhich ... the next step is to CONVICT it ...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Monitor
"We are going to analyze the report and make intelligent decisions," he said. "We have been using the systems now for a year and a half. We've had great success in dealing with them."

I voted in Maryland (Rat state infamous for corruption)last fall. I remember being very leery of the CD used to activate the machine for each voter. No one there could tell me how it made sure each voter only voted once.

8 posted on 07/24/2003 7:00:30 PM PDT by Freee-dame
[ Post Reply | Private Reply | To 1 | View Replies]

To: Monitor
which of course means the machine is headed for Broward County
9 posted on 07/24/2003 7:01:01 PM PDT by joesnuffy (Moderate Islam Is For Dilettantes)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Freee-dame
Where in Maryland? I voted in Howard County, where optically-read paper ballots are used -- these act as the hard copies.
10 posted on 07/24/2003 7:12:18 PM PDT by expatpat
[ Post Reply | Private Reply | To 8 | View Replies]

To: expatpat
these act as the hard copies.

But do they actually count the hard copies or do they save them in case of a court challenge? They probably use the computer totals unless challenged and what they don't tell you here or almost anywhere else is that there is a modem in these voting machines so they can get a count even before the polls close. And as everyone knows but no one wants to think about, modems work in both directions. They can fiddle with the counts while the voting is still going on.

11 posted on 07/24/2003 8:13:48 PM PDT by IncredibleHulk
[ Post Reply | Private Reply | To 10 | View Replies]

To: joesnuffy
No CA!
12 posted on 07/24/2003 11:14:46 PM PDT by quietolong
[ Post Reply | Private Reply | To 9 | View Replies]

To: IncredibleHulk
I'm sure they use the optical count, and save the hard copies for challenges. The existence of the latter discourages the kind of games you talk about (vs. the systems that don't have copies, which are the subject of the article), but of course all systems can be subject to fraud.
13 posted on 07/25/2003 10:06:39 AM PDT by expatpat
[ Post Reply | Private Reply | To 11 | View Replies]

To: lambo
It would not make any difference if the scientists had spoken up or not. The politicians and groups advocating them are probably getting a piece of the action on the purchase of the machines or consulting.
14 posted on 08/27/2003 11:47:21 PM PDT by BJungNan
[ Post Reply | Private Reply | To 2 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson