[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Gaetz Resigns 'Effective Immediately' After Trump AG Pick; DC In Full Blown Panic

MAHA MEME

noone2222 and John Bolton sitting in a tree K I S S I N G

Donald Trump To Help Construct The Third Temple?

"The Elites Want To ROB Us of Our SOVEREIGNTY!" | Robert F Kennedy

Take Your Money OUT of THESE Banks NOW! - Jim Rickards

Trump Taps Tulsi Gabbard As Director Of National Intelligence

DC In Full Blown Panic After Trump Picks Matt Gaetz For Attorney General

Cleveland Clinic Warns Wave of Mass Deaths Will Wipe Out Covid-Vaxxed Within ‘5 Years’

Judah-ism is as Judah-ism does

Danger ahead: November 2024, Boston Dynamics introduces a fully autonomous "Atlas" robot. Robot humanoids are here.

Trump names [Fox News host] Pete Hegseth as his Defense secretary

Lefties losing it: Trump’s YMCA dance goes viral

Elon Musk: "15 Products You'll Stop Buying After You Know What They're Made Of"

Walmart And Other Major Retailers Canceling Billions In Orders Amid Fears Of A Dark Winter Ahead

Joe and Jill Biden deliver final 'kick' against Kamala Harris on election day

Relative importance of carbon dioxide and water in the greenhouse effect: Does the tail wag the dog?

Fired FEMA Employee Speaks Out, Says It Was Not Isolated Incident: Colossal Event Of Avoidance

Judge Merchan Hands Trump Historic Victory Donald Receives Stay on Felony Conviction

PNut the Squirrel was marked for death and decapitation from the start as rabies test results are negative

Yemeni forces strike military base in Tel Aviv with hypersonic ballistic missile

SheÂ’s lying. The FEC shows the payment

Speaker Johnson Orders Entire Biden Administration to Preserve and Retain All Records and Documents

Boeing has given up on diversity.

Trump Targeting up to 100,000 Deep Staters for Absolute Exile From DC

FBI Execs Rush to Retire After Trump Victory Leaves Them Shell-Shocked.

Witness to Tragedy: Huge Financial Incentives Led Hospitals to Use COVID Treatments That Killed Patients

‘Knucklehead’: Tim Walz returns to Minnesota ‘defeated'

Study Confirms the Awesome Destructive Power of Sugar in Utero Originally published via Armageddon Prose:

Ukraine mobilizing mentally challenged and deaf people lawmaker


Science/Tech
See other Science/Tech Articles

Title: Princeton scientists create vote-stealing program for Diebold AccuVote
Source: kos
URL Source: http://www.dailykos.com/story/2006/9/13/174653/746
Published: Sep 14, 2006
Author: Jules Siegel
Post Date: 2006-09-14 02:00:08 by Morgana le Fay
Keywords: None
Views: 41
Comments: 2

This is a press release, so let's give it some press, in full.

For immediate release: September 13, 2006

Media contact: Teresa Riordan, (609) 258-9754, triordan@princeton.edu; Steven Schultz, (609) 258-3617, sschultz@princeton.edu

Researchers reveal 'extremely serious' vulnerabilities in e-voting machines

In a paper published on the Web today, a group of Princeton computer scientists said they created demonstration vote-stealing software that can be installed within a minute on a common electronic voting machine. The software can fraudulently change vote counts without being detected.

"We have created and analyzed the code in the spirit of helping to guide public officials so that they can make wise decisions about how to secure elections," said Edward Felten, the director of the Center for Information Technology Policy, a new center at Princeton University that addresses crucial issues at the intersection of society and computer technology.

The paper appears on the Web site for the Center for Information Technology Policy.

* Jules Siegel's diary :: :: *

The researchers obtained the machine, a Diebold AccuVote-TS, from a private party in May. They spent the summer analyzing the machine and developing the vote-stealing demonstration.

"We found that the machine is vulnerable to a number of extremely serious attacks that undermine the accuracy and credibility of the vote counts it produces," wrote Felten and his co-authors, graduate students Ariel Feldman and Alex Halderman.

In a 10-minute video on their Web site, the researchers demonstrate how the vote-stealing software works. The video shows the software sabotaging a mock presidential election between George Washington and Benedict Arnold. Arnold is reported as the winner even though Washington gets more votes. (The video is edited from a longer continuously shot video; the long single-shot version will be available for downloading from the center's site as well.)

The researchers also demonstrate how the machines "are susceptible to computer viruses that can spread themselves automatically and invisibly from machine to machine during normal pre- and post-election activity."

Felten said that policy-makers should be concerned about malicious software infecting the Diebold AccuVote-TS and machines like it, from Diebold and other companies. "We studied these machines because they were available to us," the researchers wrote in their Web posting. "If we had gotten access to another kind of machine, we probably would have studied it instead."

Felten said, "There is reason for concern about other machines as well, even though our paper doesn't directly evaluate them. Jurisdictions using these machines should think seriously about finding a backup system in time for the November elections."

Felten, a professor of computer science and public affairs who is known for his groundbreaking work in computer security, said that some of the problems discussed in the paper cannot be fixed without completely redesigning the machine.

Other problems can be fixed by addressing software or electronic procedures. "But time is short before the next election," he said.

According to the researchers' paper, the Diebold machine they examined and another newer version are scheduled to be used in 357 U.S. counties representing nearly 10 percent of all registered voters. About half those counties, including all Maryland and Georgia, will use the exact machine examined by Felten's group.

Felten said that, out of security concerns, the Diebold machine infected with the vote-stealing software has been kept under lock and key in a secret location.

"Unfortunately election fraud has a rich history from ballot stuffing to dead people voting," he said. "We want to make sure this doesn't fall into the wrong hands. We also want to make sure that policy-makers stay a step ahead of those who might create similar software with ill intent."

Princeton's Center for Information Technology Policy includes members from diverse departments, including computer science, economics, electrical engineering, operations research and financial engineering, sociology and the Woodrow Wilson School of Public and International Affairs.

More information can be found on the Princeton Engineering News Web site.

News from PRINCETON UNIVERSITY Office of Communications 22 Chambers St. Princeton, New Jersey 08542 Telephone (609) 258-3601; Fax (609) 258-1301

From the full paper:

Main Findings

The main findings of our study are:

1. Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss. We have constructed demonstration software that carries out this vote-stealing attack.

2. Anyone who has physical access to a voting machine, or to a memory card that will later be inserted into a machine, can install said malicious software using a simple method that takes as little as one minute. In practice, poll workers and others often have unsupervised access to the machines.

3. AccuVote-TS machines are susceptible to voting-machine viruses--computer viruses that can spread malicious software automatically and invisibly from machine to machine during normal pre- and postelection activity. We have constructed a demonstration virus that spreads in this way, installing our demonstration vote-stealing program on every machine it infects.

4. While some of these problems can be eliminated by improving Diebold's software, others cannot be remedied without replacing the machines' hardware. Changes to election procedures would also be required to ensure security.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: Morgana le Fay (#0)

Phoney elections=phony voting machines



***LEAP***

"I tell you, freedom and human rights in America are doomed. The U.S. Government will lead the American people, and the West in general, into an unbearable hell and choking life.
-- Osama bin Laden
"A prohibition law strikes at the very principles upon which our govt was founded."
- Lincoln
All our liberties are due to men who, when their conscience has compelled them, have broken the laws of the land.
--William K Clifford

IndieTX  posted on  2006-09-14   9:54:04 ET  Reply   Trace   Private Reply  


#2. To: Morgana le Fay (#0)

http://www.huffingtonpost.com/marty-kaplan/how-to-hack-a-diebold-vot_b_26301.html

How to Hack a Diebold Voting Machine

"If there’s another 9/11 or a major war in the Middle-East involving a U.S. attack on Iran, I have no doubt that there will be, the day after or within days an equivalent of a Reichstag fire decree that will involve massive detentions in this country."

- Daniel Ellsberg Author, Pentagon Papers

robin  posted on  2006-09-14   10:38:35 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]