Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Diebold voting machines vulnerable to remote tampering via man-in-the-middle attack

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » General Discussion Donate to DU
 
DainBramaged Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 10:27 AM
Original message
Diebold voting machines vulnerable to remote tampering via man-in-the-middle attack
Researchers at the Department of Energy's Argonne National Laboratory have demonstrated an electronic "man in the middle" attack that allows remote tampering with the Diebold AccuVote voting system. Argonne's Vulnerability Assessment Team has previously exposed the same sort of vulnerability in Sequoia AVC machines in 2009, and believe the attack could be used against a wide range of voting machines.

The attack requires tampering with voting machine hardware, and allows for votes to be changed as the voter prepares to commit them. But the devices require no actual changes to the hardware—the hardware required to make the attacks can be attached and removed without leaving any evidence that it had ever been there. The electronics in the demonstrated attack are simply jacked in between two components on the Diebold's printed circuit board using existing connectors.

VAT team leader Roger Johnston said in a video posted by Brad Friedman of the voting watchdog site The Brad Blog that the physical security measures taken to protect voting machines in many states are inadequate to protect them from pre-Election Day tampering. "They're often kept a week or two before elections in a school or church basement,"Johnston said. And the modifications can be made without picking locks or breaking seals on the devices.

Diebold has a shaky security history. In 2004, Johns Hopkins University computer science professor Avi Rubin and a team of researchers revealed a broad set of cyber vulnerabilities in the AccuVote system. In the past, there have been suggestions that Diebold itself tampered with elections in Georgia in 2002.

http://arstechnica.com/business/news/2011/09/diebold-voting-machines-vulnerable-to-remote-tampering-via-man-in-the-middle-attack.ars
Printer Friendly | Permalink |  | Top
polichick Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-28-11 10:38 AM
Response to Original message
1. The fact that Diebold machines are still legal after what happened to Kerry's votes in Ohio says...
...everything you need to know about our "two party" system.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 18th 2024, 09:50 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » General Discussion Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC