A Single Person Could Swing an Election

Status
Not open for further replies.

Desertdog

Member
Joined
Dec 26, 2002
Messages
1,980
Location
Ridgecrest Ca
A Single Person Could Swing an Election
Electronic Systems' Weaknesses May Be Countered With Audits, Report Suggests

By Zachary A. Goldfarb
Special to The Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2006/06/27/AR2006062701451.html

To determine what it would take to hack a U.S. election, a team of cybersecurity experts turned to a fictional battleground state called Pennasota and a fictional gubernatorial race between Tom Jefferson and Johnny Adams. It's the year 2007, and the state uses electronic voting machines.

Jefferson was forecast to win the race by about 80,000 votes, or 2.3 percent of the vote. Adams's conspirators thought, "How easily can we manipulate the election results?"

The experts thought about all the ways to do it. And they concluded in a report issued yesterday that it would take only one person, with a sophisticated technical knowledge and timely access to the software that runs the voting machines, to change the outcome.

The report, which was unveiled at a Capitol Hill news conference by New York University's Brennan Center for Justice and billed as the most authoritative to date, tackles some of the most contentious questions about the security of electronic voting.

The report concluded that the three major electronic voting systems in use have significant security and reliability vulnerabilities. But it added that most of these vulnerabilities can be overcome by auditing printed voting records to spot irregularities. And while 26 states require paper records of votes, fewer than half of those require regular audits.

"With electronic voting systems, there are certain attacks that can reach enough voting machines . . . that you could affect the outcome of the statewide election," said Lawrence D. Norden, associate counsel of the Brennan Center.

With billions of dollars of support from the federal government, states have replaced outdated voting machines in recent years with optical scan ballot and touch-screen machines. Activists, including prominent computer scientists, have complained for years that these machines are not secure against tampering. But electronic voting machines are also much easier to use for disabled people and those who do not speak English.

Voting machine vendors have dismissed many of the concerns, saying they are theoretical and do not reflect the real-life experience of running elections, such as how machines are kept in a secure environment.

"It just isn't the piece of equipment," said David Bear, a spokesman for Diebold Election Systems, one of the country's largest vendors. "It's all the elements of an election environment that make for a secure election."

"This report is based on speculation rather than an examination of the record. To date, voting systems have not been successfully attacked in a live election," said Bob Cohen, a spokesman for the Election Technology Council, a voting machine vendors' trade group. "The purported vulnerabilities presented in this study, while interesting in theory, would be extremely difficult to exploit."

At yesterday's news conference, the push for more secure electronic voting machines, which has been popular largely on the left side of the political spectrum since the contested outcome of the 2000 presidential election in Florida, picked up some high-profile support from the other side.

Republican Reps. Tom Cole (Okla.) and Thomas M. Davis III (Va.), chairman of the House Government Reform Committee, joined Rep. Rush D. Holt (D-N.J.) in calling for a law that would set strict requirements for electronic voting machines. Howard Schmidt, former chief of security at Microsoft and President Bush's former cybersecurity adviser, also endorsed the Brennan report.

"It's not a question of 'if,' it's a question of 'when,' " Davis said of an attempt to manipulate election results.
 
Of course there is the non high-tech way. Take a long gun and get rid of the opposition.

The point I am making here is that you can make up all sorts of ways in which election results can be changed/fixed.
 
But electronic voting machines are also much easier to use for disabled people and those who do not speak English.

Since all American citizens should be proficient in English, the machines should only communicate instructions in English.

Actually, they should be banned entirely, for reasons already mentioned. Too impersonal to be trusted.
 
Jim March: Electronic voting makes it WAY too easy.

Couldn't Agree more Jim, & BTW, you might find it interesting that Idaho is even seeing the Diebold POS's beginning to appear now....
 
ahem.


UPDATE ballots SET candidate="A" where candidate="B"

commit.

{my SQL's rusty as heck...}

Whoa! Looky here! A unanimous landslide!

That being said, secure databasing with full accountability audit trails and cryptographic tamperproofing have been around for ages.

We call them banking systems.

That such safeguards are absent speaks of professional negligence, malpractice, and high bufoonery.
 
Desertdog,

I heard on the radio that in CA, if the number of absentee ballots will not change the outcome, ie, winner has won by more votes than there are absentee ballots, the absentee ballots are not even opened.

Any truth to this?
 
I heard on the radio that in CA, if the number of absentee ballots will not change the outcome, ie, winner has won by more votes than there are absentee ballots, the absentee ballots are not even opened.
Perhaps if there was only one issue/race on the ballot. That is not usually the case.
 
I heard on the radio that in CA, if the number of absentee ballots will not change the outcome, ie, winner has won by more votes than there are absentee ballots, the absentee ballots are not even opened.

Any truth to this?
I don't know if it is true or not. With all the items on the ballots out here I don't see how they could not count the absentee ballots as there should be several items they could change.
 
Status
Not open for further replies.
Back
Top