American Samizdat

Friday, January 30, 2004. *
 
The New York Times reports of a new study handed to Maryland voting officials regarding Diebold e-voting security. The difference between this and earlier studies is that this is the first study of the Diebold systems under conditions found during an election. Four key findings:
  • There are numerous vulnerabilities through which these systems could be hacked.

  • Some of these can be addressed prior to the March primaries.

  • Some additional vulnerabilities can be address prior to the November general election.

  • Ultimately, Diebold election software has to be rewritten to meet industry security standards.
In his usual statement of denial, Bob Urosevich, president of Diebold Election Systems, said this report and another by the Science Applications International Corporation "confirm the accuracy and security of Maryland's voting procedures and our voting systems as they exist today." This however was hardly the tone expressed by several members of the "red team".

"We were genuinely surprised at the basic level of the exploits" that allowed tampering, said Michael Wertheimer, the Red Team leader and a former security expert for the National Security Agency. Referring to the inconsistent application of security, he added, "It's like washing your face and drying it with a dirty towel."

William A. Arbaugh, an assistant professor of computer science at the University of Maryland and a member of the Red Team exercise, said, "I can say with confidence that nobody looked at the system with an eye to security who understands security." He added, "It seemed everywhere we scratched, there was something that's pretty troubling."

[Additional coverage from the Washington Post.]

posted by Mischa Peyton at 2:38 AM
0 Comments:
Post a Comment





Site Meter



Creative Commons License