The Daily Sandwich

"We have to learn the lesson that intellectual honesty is fundamental for everything we cherish." -Sir Karl Popper

Name:
Location: Boston, Massachusetts, United States

...........................

Tuesday, July 25, 2006

Diebold long aware of security vulnerabilities

Another story courtesy of the Mysterious Cipher and Brad Blog. At the end of June, New York University's Brennan Center for Justice released a report stating that, given the terrible security of electronic voting machines, a single person versed in computer use alter the outcome of an election.

Now a group of computer science specialists write that Diebold, at least, was fully aware of the problems with their machines-- and ignored them.

Recently, computer security expert Harri Hursti revealed serious security vulnerabilities in Diebold's software. According to Michael Shamos, a computer scientist and voting system examiner in Pennsylvania, "It's the most severe security flaw ever discovered in a voting system."

Even more shockingly, we learned recently that Diebold and the State of Maryland had been aware of these vulnerabilities for at least two years. They were documented in analysis, commissioned by Maryland and conducted by RABA Technologies, published in January 2004. For over two years, Diebold has chosen not to fix the security holes, and Maryland has chosen not to alert other states or national officials about these problems.

Basically, Diebold included a "back door" in its software, allowing anyone to change or modify the software. There are no technical safeguards in place to ensure that only authorized people can make changes.

A malicious individual with access to a voting machine could rig the software without being detected. Worse yet, if the attacker rigged the machine used to compute the totals for some precinct, he or she could alter the results of that precinct. The only fix the RABA authors suggested was to warn people that manipulating an election is against the law.