Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

"Pull the Plug" - Forbes.com warns about Diebold

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU
 
kansasblue Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Aug-24-06 09:45 PM
Original message
"Pull the Plug" - Forbes.com warns about Diebold
Edited on Thu Aug-24-06 10:30 PM by kansasblue
You don't like hanging chads? Get ready for cheating chips and doctored drives.

we should not rely on computers alone to count votes in public elections. The people who program them make mistakes, and, safeguards aside, they are more vulnerable to manipulation than most people realize. Even an event as common as a power glitch could cause a hard disk to fail or a magnetic card that holds votes to permanently lose its data. The only remedy then: Ask voters to come back to the polls. In a 2003 election in Boone County, Ind., DREs recorded 144,000 votes in one precinct populated with fewer than 6,000 registered voters. Though election officials caught the error, it's easy to imagine a scenario where such mistakes would go undetected until after a victor has been declared.




http://www.forbes.com/free_forbes/2006/0904/040.html?partner=yahoomag
Printer Friendly | Permalink |  | Top
petersjo02 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Aug-24-06 09:47 PM
Response to Original message
1. How about including some of the highlights?
Otherwise a pretty meaningless post.
Printer Friendly | Permalink |  | Top
 
alittlelark Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Aug-24-06 09:49 PM
Response to Original message
2. The first 4 paragraphs say a lot...
<snip>I am a computer scientist. I own seven Macintosh computers, one Windows machine and a Palm Treo 700p with a GPS unit, and I chose my car (Infiniti M35x) because it had the most gadgets of any vehicle in its class. My 7-year-old daughter uses e-mail. So why am I advocating the use of 17th-century technology for voting in the 21st century--as one of my critics puts it?

The 2000 debacle in Florida spurred a rush to computerize voting. In 2002 Congress passed the Help America Vote Act, which handed out $2.6 billion to spend on voting machines. Most of that cash was used to acquire Direct Recording Electronic voting machines.

Yet while computers are very proficient at counting, displaying choices and producing records, we should not rely on computers alone to count votes in public elections. The people who program them make mistakes, and, safeguards aside, they are more vulnerable to manipulation than most people realize. Even an event as common as a power glitch could cause a hard disk to fail or a magnetic card that holds votes to permanently lose its data. The only remedy then: Ask voters to come back to the polls. In a 2003 election in Boone County, Ind., DREs recorded 144,000 votes in one precinct populated with fewer than 6,000 registered voters. Though election officials caught the error, it's easy to imagine a scenario where such mistakes would go undetected until after a victor has been declared.

Consider one simple mode of attack that has already proved effective on a widely used DRE, the Accuvote made by Diebold (nyse: DBD - news - people ). It's called overwriting the boot loader, the software that runs first when the machine is booted up. The boot loader controls which operating system loads, so it is the most security-critical piece of the machine. In overwriting it an attacker can, for example, make the machine count every fifth Republican vote as a Democratic vote, swap the vote outcome at the end of the election or produce a completely fabricated result. To stage this attack, a night janitor at the polling place would need only a few seconds' worth of access to the computer's memory card slot. <snip>






I'm pleasantly shocked to see it!!!!

Printer Friendly | Permalink |  | Top
 
Benhurst Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Aug-24-06 09:57 PM
Response to Original message
3. Recommended: #3.
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Thu Aug-24-06 10:01 PM
Response to Original message
4. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
DemInDistress Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Aug-24-06 10:02 PM
Response to Original message
5. let me kick this up ...and recommended
more from the story: One might argue that one way to prevent this attack is to randomize the precinct numbers inside the software. But that's an argument made in hindsight. If the defense against the attack is not built into the voting system, the attack will work, and there are virtually limitless ways to attack a system. And let's not count on hiring 24-hour security guards to protect voting machines.

DREs have a transparency problem: You can't easily discover if they've been tinkered with. It's one thing to suspect that officials have miscounted hanging chads but something else entirely for people to wonder whether a corrupt programmer working behind the scenes has rigged a computer to help his side
Printer Friendly | Permalink |  | Top
 
texpatriot2004 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Aug-24-06 10:36 PM
Response to Original message
6. interesting from Forbes...glad to hear them speak the truth nt
Printer Friendly | Permalink |  | Top
 
SoCalDem Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Aug-24-06 11:10 PM
Response to Reply #6
7. Just having it both ways..
they know it's safe to raise questions NOW, because with weeks until the election, there's little that can be done..so of course they can afford to speak up.. ZOnce the election is over, and IF dems win, they will just refer to this article as a harbinger of "cheating" that may have occurred..:grr:

Printer Friendly | Permalink |  | Top
 
AntiFascist Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Aug-25-06 01:21 AM
Response to Original message
8. K&R, even though the publication is run by a PNAC signor n/t
Printer Friendly | Permalink |  | Top
 
blue cat Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Aug-25-06 06:28 AM
Response to Original message
9. He gives the example of dems stealing
votes from repugs. Please leave comment. I left one saying that the republicans already stole elections with Diebold, where was your concern then?
Printer Friendly | Permalink |  | Top
 
leftchick Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Aug-25-06 06:35 AM
Response to Original message
10. this is an excellent article
lays it all out there....

<snip>

Consider one simple mode of attack that has already proved effective on a widely used DRE, the Accuvote made by Diebold (nyse: DBD - news - people ). It's called overwriting the boot loader, the software that runs first when the machine is booted up. The boot loader controls which operating system loads, so it is the most security-critical piece of the machine. In overwriting it an attacker can, for example, make the machine count every fifth Republican vote as a Democratic vote, swap the vote outcome at the end of the election or produce a completely fabricated result. To stage this attack, a night janitor at the polling place would need only a few seconds' worth of access to the computer's memory card slot.

Further, an attacker can modify what's known as the ballot definition file on the memory card. The outcome: Votes for two candidates for a particular office are swapped. This attack works by programming the software to recognize the precinct number where the machine is situated. If the attack code limits its execution to precincts that are statistically close but still favor a particular party, it goes unnoticed.

One might argue that one way to prevent this attack is to randomize the precinct numbers inside the software. But that's an argument made in hindsight. If the defense against the attack is not built into the voting system, the attack will work, and there are virtually limitless ways to attack a system. And let's not count on hiring 24-hour security guards to protect voting machines.

DREs have a transparency problem: You can't easily discover if they've been tinkered with. It's one thing to suspect that officials have miscounted hanging chads but something else entirely for people to wonder whether a corrupt programmer working behind the scenes has rigged a computer to help his side.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 26th 2024, 11:03 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC