I’m not a computer geek so I don’t know what to make of this story, but it sure sounds bad:

SACRAMENTO, CALIFORNIA — “This may be the worst security flaw we have seen in touch screen voting machines,” says Open Voting Foundation president, Alan Dechert. Upon examining the inner workings of one of the most popular paperless touch screen voting machines used in public elections in the United States, it has been determined that with the flip of a single switch inside, the machine can behave in a completely different manner compared to the tested and certified version.

“Diebold has made the testing and certification process practically irrelevant,” according to Dechert. “If you have access to these machines and you want to rig an election, anything is possible with the Diebold TS — and it could be done without leaving a trace. All you need is a screwdriver.” This model does not produce a voter verified paper trail so there is no way to check if the voter’s choices are accurately reflected in the tabulation.

Open Voting Foundation is releasing 22 high-resolution close up pictures of the system. This picture, in particular, shows a “BOOT AREA CONFIGURATION” chart painted on the system board.

The most serious issue is the ability to choose between “EPROM” and “FLASH” boot configurations. Both of these memory sources are present. All of the switches in question (JP2, JP3, JP8, SW2 and SW4) are physically present on the board. It is clear that this system can ship with live boot profiles in two locations, and switching back and forth could change literally everything regarding how the machine works and counts votes. This could be done before or after the so-called “Logic And Accuracy Tests”.

A third possible profile could be field-added in minutes and selected in the “external flash” memory location, the interface for which is present on the motherboard.

This is not a minor variation from the previously documented attack point on the newer Diebold TSx. To its credit, the TSx can only contain one boot profile at a time. Diebold has ensured that it is extremely difficult to confirm what code is in a TSx (or TS) at any one time but it is at least theoretically possible to do so. But in the TS, a completely legal and certified set of files can be instantly overridden and illegal uncertified code be made dominant in the system, and then this situation can be reversed leaving the legal code dominant again in a matter of minutes.

“These findings underscore the need for open testing and certification. There is no way such a security vulnerability should be allowed. These systems should be recalled”

More is explained in DocGonzo’s diary at Daily Kos.

(Cont.)

Geeks know that this insecurity means anyone can use a common keychain “thumbdrive” to start the machine, run any software they want to mess with its data, and walk away without leaving a trace. The thumbdrive can include big complex software to juggle voting data according to formulas that make the changes hard to detect. Those thumbdrives can be networked, even over mobile phones, to run districtwide or nationwide “tweaks” that don’t raise eyebrows too much when compared with overall voting patterns, exit polls, other evidence of the actual public will.

A bad guy can walk up to a machine after the votes are collected, reboot it from their keychain, cheat the election results, shut down and walk away in a few minutes. It might even be possible to start in a few seconds, shut down any displays, walk away while the cheat software works, then just return a few minutes later to unplug and get away.

As they say in the vernacular “Holy Hard Drive, Batman!” Looks like a big smoking gun to me. What say you more computer literate types?



















0 0 votes
Article Rating