Monday, July 31, 2006

"Worst ever security flaw found in Diebold voting machine"

Paul the Spud over at Shakey's Sis turned me on to this post at Brilliant at Breakfast. A definite 'must read'.

SACRAMENTO, CALIFORNIA -- "This may be the worst security flaw we have seen in touch screen voting machines," says Open Voting Foundation president, Alan Dechert. Upon examining the inner workings of one of the most popular paperless touch screen voting machines used in public elections in the United States, it has been determined that with the flip of a single switch inside, the machine can behave in a completely different manner compared to the tested and certified version.

The most serious issue is the ability to choose between "EPROM" and "FLASH" boot configurations. Both of these memory sources are present. All of the switches in question (JP2, JP3, JP8, SW2 and SW4) are physically present on the board. It is clear that this system can ship with live boot profiles in two locations, and switching back and forth could change literally everything regarding how the machine works and counts votes. This could be done before or after the so-called "Logic And Accuracy Tests".

A third possible profile could be field-added in minutes and selected in the "external flash" memory location, the interface for which is present on the motherboard.

So what does this mean to the layman? Well, you know those little "flash drives" that you use to copy files from one PC to another? If you don't, they are mini-hard drives housed in a casing about the length and width of a tongue depressor cut in half. They plug into the USB port of your PC and become just another drive that you can look at in Windows Explorer. What this means is that by opening up the PC that houses the voting machine software and flipping a switch, you can set the voting machine to boot from the internally-configured drive to an external flash drive instead. So someone could very easily plug in a flash drive and reboot the PC after the polls close to manipulate the totals, then shut it down and walk away.

This is not "vulnerability to hacking." This is "open to rigging" -- and Diebold isn't even trying very hard to hide the fact that their machines can be rigged, and that they are DESIGNED SPECIFICALLY for this purpose. Diebold makes most of the ATMs in this country, and I don't know about you, but I have never once had to deal with an ATM error. So it isn't that Diebold doesn't know how to make a secure machine running secure software.

This machine was developed EXACTLY according to spec. Now who gave them the specs?

It looks like they can either be shipped with the desired results already installed or the desired results can be added at any convenient time if your precinct's outcome comes down from Rove or the RNC too late for the factory to do it.

And you thought Mrs. Bowers was kidding about the Diebold Vote Correcting Machine™, eh?

No comments: