Too Much Work To Test E-Voting Machines For Security?

from the you-stop-when-it's-secure dept

As the problems with Maryland’s e-voting system keep getting attention, along with reports of just how hackable many of these machines are, it looks like one county in California just doesn’t want to bother with doing a full security test before approving the machines. They did have a test that just looked at the security of the voting process (which found some problems), but did not bother to test to see if the machines were hackable — which you would think would be a big deal. However, when challenged on this, the elections official stated: “I’m sure it’s true more testing could be done. I’m not sure where it ends.” This seems like an odd statement for someone in charge of running a fair election. First of all, the testing should never end. If there’s any vulnerability at all, they should want to know about it so that it can be corrected (or the machines can be scrapped). But, something as basic as testing to see if the machines can be hacked doesn’t seem like an extraordinary request — especially given all of the other reports of how easy it is to hack some e-voting machines. The response seems to be that the machines won’t be hackable because of security tape and tags — but it’s already been shown that (at least on other e-voting machines), they don’t do very much.


Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Too Much Work To Test E-Voting Machines For Security?”

Subscribe: RSS Leave a comment
11 Comments
Ajax 4Hire (profile) says:

Test, Test and more Test..

Never trust a system where the Designer says that there has been enough testing done.

As an Engineer, I can speak from the other side where marketing will joke its time to shoot the engineer and ship the product. You are never satisfied that the system has been fully tested, so the final, last test is to ship to the customer. The customer becomes the live tester.

Kevin says:

The response seems to be that the machines won’t be hackable because of security tape and tags — but it’s already been shown that (at least on other e-voting machines), they don’t do very much.

OK, so you put security tape and tags on the machines, the memory slots, etc, so that you can identify whether any of the machines have been tampered with. So what do you do when you detect tampering? You obviously can’t trust the votes on that machine anymore, so do you throw them all out? If you do, not only have you discarded the fraudulent votes, but you have also likely discarded a significant number of legitimate votes. Every person who used that machine to vote would have been disenfranchised.

More to the point, that’s an even easier way to throw an election than actually hacking the machine. A single person from Party A could conceivably work at a polling station (or vote at one) in a precinct that traditionally votes heavily for Party B, and by tampering with security tape create the appearance that votes have been manipulated. Using that method, they could conceivably get all of the votes of that precint thrown out, which could definitely throw an election one way or another, especially if such efforts are wide spread.

You can’t just say “that’s good enough.” The people who want to rig elections certainly don’t, and so like any other security effort it will require constant vigilance, testing, and improvement to prevent fraud.

SimonTek (profile) says:

OS voting machines

I think later this year, I will build a prototype voting machine, with a built in printer. Then have an open source project to set it up. I am tired of seeing security been a non-issue with the manufactures, I have worked on Diebold machines, I know I can build a better machine.

SimonTek at gmail dot com if you want to contact me on the idea.

JPP says:

Rolling Stone had an article about the company

that makes these machines. According to a former employee (who may or may not just be upset at his former employer), the CEO of the firm (I think that it was Diebold) spent the days before an election in Georgia conducting “emergency” patches to the software in precincts that tended to vote very democratic…oddly enough, at the end of the polling, those precincts happenned to be at 51%-55% republican….I’ll bet you can guess what political party the Pres of the company supports…Reaed the full story, You will want to puke.
http://www.rollingstone.com/politics/story/11717105/robert_f_kennedy_jr__will_the_next_election_be_hacked/print

Harsesus says:

Do something about it

With all the talk of how easy they are to hack, there needs to be a concerted effort to hack these machines, during a major election, by a group like black box voting, where everyones vote counts as “Nelson Mandella” or “Felix the Cat” or something absurd like that. A clear signal to everyone, these machines are a joke. Politicians don’t do anything unless there pushed to do it by there constituents. They know where there bread is truly buttered. Something like that would shock the public into an outcry, and the politicians would be forced to act.

Kelly says:

For the person who posted that there is no discernable difference btwn the Democrats and Republicans: You have not been paying attention and need to be more discerning.
Specifically germane to the point of vote scamming and deliberate obstruction of all Congressional attempts to ensure integrity in the vote count: Bills have been repeatedly introduced by Democrats in Congress to protect the vote, only to be repeatedly shot down by the Republicans. Look specifically at the obstruction by Congressman Ney, who has just been convicted of several counts of felony fraud and influence peddling arising from his intimate connection with Abramhoff. Ney personally led the effort to award $3.8 billions dollars for electronic voting, directly benefiting his Ohio patron Diebold.
For a brief but well articulated video presentation on the issue, featuring bi-partisan condemnations of the new electronic systems, go to this link and watch the video.
And then pass it on and get involved.
http://video.google.com/videoplay?docid=-2189785998591450323

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...