Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

NEWLY DISCOVERED DIEBOLD THREAT DESCRIBED AS 'N ATIONAL SECURITY RISK'

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Topic Forums » Election Reform Donate to DU
 
Amaryllis Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-05-06 06:28 PM
Original message
NEWLY DISCOVERED DIEBOLD THREAT DESCRIBED AS 'N ATIONAL SECURITY RISK'
Edited on Fri May-05-06 06:48 PM by Amaryllis
NEWLY DISCOVERED DIEBOLD THREAT DESCRIBED AS 'MAJOR NATIONAL SECURITY RISK'!
Systems in Question Were Used Last Week in Ohio Primary, Soon in Pennsylvania, So 'Serious' Few Details Are Being Released
All Diebold Touch-Screen Machines, In All States, Said to be Affected by 'Horrifying' Vulnerability, Systems 'Sequestered' in PA

We've been getting reports since last night and all morning today concerning the story we posted yesterday about the Pennsylvania state warning issued about a "security vulnerability" in all Diebold touch-screen electronic voting machines.

That warning, which has now brought a lock-down on all Diebold systems in PA, where early voting is about to begin prior to their upcoming May 16th primary election, was reported by the Morning Call yesterday. The warning says the serious security vulnerability could allow ''unauthorized software to be loaded on to the system."

Details about the warning are still sketchy as those in the know have acknowledged that the problem is so serious, they are hoping to keep the info under wraps until mitigation steps can be taken to safeguard systems.

The BRAD BLOG has been told on the record, however, by one person involved in the matter, that the vulnerability is a "major national security risk."

We have been able to get further quotes, details and information from a number of officials, both on the record and off, in Pennsylvania, elsewhere around the country and at the federal level, as well as from those involved in the discovery of the problem...

COMPLETE STORY:
http://www.bradblog.com/archives/00002787.htm


On edit: Didn't know Brad had already posted in GD. Here's the link to K and R:
http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=102x2266430
Printer Friendly | Permalink |  | Top
AndyA Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-05-06 06:35 PM
Response to Original message
1. WOW! This may be the break we've been waiting for!!
That's all I can say:

WOW!
Printer Friendly | Permalink |  | Top
 
IndyOp Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-05-06 06:35 PM
Response to Original message
2. This is good to post in ER - It is already on Greatest page
Brad posted it in GD...

Could be exciting! :bounce:

:hi:
Printer Friendly | Permalink |  | Top
 
xchrom Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-05-06 06:45 PM
Response to Original message
3. hot damn!
oh this is good!
Printer Friendly | Permalink |  | Top
 
Kurovski Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-05-06 07:23 PM
Response to Original message
4. Off to the Greatest Page you go.
'Horrifying' is a word I haven't seen used in regard to Diebold, but it may just be the best adjective yet.
Printer Friendly | Permalink |  | Top
 
yourout Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-05-06 07:35 PM
Response to Original message
5. my guess is it has either a wireless adaptor or IR port in the hardware...
likely purposely hidden. Or X10 communication based hardware to allow tampering via the power grid.
Printer Friendly | Permalink |  | Top
 
Mr_Jefferson_24 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-05-06 07:39 PM
Response to Original message
6. Vulnerability by design...
...they merely let Neocon operatives in on the flaws and let them do the rest. It's how the '04 Presidential election was stolen and many midterm elections in '02, and how Hackett was "officially" defeated by Schmidt in Ohio in '05.

These machines have to go! No compromise.
Printer Friendly | Permalink |  | Top
 
no_hypocrisy Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-05-06 07:51 PM
Response to Original message
7. Someone please explain to me why
voting districts don't return to the machines used pre-Diebold if there is even a suggestion of vulnerability and susceptibility of corruption?
Printer Friendly | Permalink |  | Top
 
Kip Humphrey Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-05-06 08:05 PM
Response to Original message
8. What is it we've been saying since 2004???



Printer Friendly | Permalink |  | Top
 
Donailin Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-05-06 08:12 PM
Response to Original message
9. Maybe a democrat hacked into the tabulators
and completely fucked their shit up tp prove once and for all that those machines can be. . . HACKED INTO BY ANYONE!


Printer Friendly | Permalink |  | Top
 
satya Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-05-06 08:14 PM
Response to Original message
10. Reminds me of the CERT Alert issued 9/04 re: GEMS Central Tabulators
http://www.us-cert.gov/cas/bulletins/SB04-252.html#diebold

GEMS Central Tabulator Vote Database Vote Modification

Diebold
GEMS Central Tabulator 1.17.7, 1.18

A vulnerability exists due to an undocumented backdoor account, which could a local or remote authenticated malicious user modify votes.

No workaround or patch available at time of publishing.

We are not aware of any exploits for this vulnerability.

Printer Friendly | Permalink |  | Top
 
Steve A Play Donating Member (638 posts) Send PM | Profile | Ignore Fri May-05-06 10:31 PM
Response to Original message
11. More from Black Box Voting.org
http://www.bbvforums.org/forums/messages/1954/27634.html?1146885047

Posted on Friday, May 05, 2006 - 08:10 pm:

This week, the state of Pennsylvania sequestered all Diebold touch-screens to implement an emergency security measure. Several more states are expected to follow Pennsylvania.

The state of Utah has known that a critical security risk exists in its Diebold TSx touch-screens, but chose to punish the courageous public official responsible for identifying the defect instead of taking any efforts to learn what the problem is and correct it.

Below is a link to the security alert faxed to the Utah Lt. Governor, state elections director, Emery County attorney and Emery County commissioners on March 24.

application/octet-streamDiebold TSx warning
An Open Letter To The Administrators Of The Emery County Government.doc (35.3 k)


Shoot the messenger

Utah officials ignored the warning entirely, and instead flew Diebold attorneys to Emery County on the governor's airplane, where the Diebold lawyers were allowed to sit into a private executive session. In this session, a decision appears to have been made to block Emery County Elections director Bruce Funk from executing his duties.

In Utah, the law requires that any employment decision be publicly noticed (it was not) and the county attorney is the designated counsel for county elections officials (County Attorney David Blackwell chose to side with Diebold against Bruce Funk). According to a tape recording of the public portion of the meeting, Bruce Funk repeatedly requested an attorney, but this was denied to him.

Funk was an eye witness to the security testing by Harri Hursti and Security Innovation, Inc. He knew first-hand that the machines represented a significant security risk. County commissioners told him he was going to be required to use the machines anyway, Diebold refused to provide a letter in writing indicating that machines it sold weren't used or loaded with inappropriate software; Diebold then told Emery County that it was going to cost $40,000 to check over the machines (the Diebold contract limits them to charging just over $1200 per day, Emery County has just 40 machines, and re-flashing all machines with a new system takes no more than 10 minutes per machine). Funk was told that he would not be permitted to watch Diebold technicians work on the machines, and they had already "visited" his machines while he was out of town for a day.

Legal issues

Because Funk was denied a lawyer, he didn't know that a little-known 1929 law in Utah was sometimes used by public officials to browbeat each other out of office. If certain public officials gang up and intimidate another public official, threatening punitive measures and dire consequences, urging resignation, if the targeted official tenders even a tentative and conditional resignation, under some interpretations that is held to stick. Diebold and the county succeeded in browbeating Funk into temporary submission; he quickly notified them in writing that he had no intention of resigning, so they locked him out of his office.

Black Box Voting has assisted Funk in securing qualified legal counsel and is underwriting the public policy legal actions to defend Funk against Diebold's actions -- ironically, with Diebold's own money, won in a Diebold false claims suit in California. A $76,000 fee was paid to Black Box Voting founder Bev Harris, and was subsequently contributed as a restricted donation for public interest litigation. The Diebold money is now helping support the fight by whistleblower Stephen Heller, who is facing retaliatory action by Diebold's attorneys. Diebold false claim funds are also underwriting legal actions to help Bruce Funk fight Diebold's retaliation.

In Funk's case, the lack of public notice and failure to put his employment matter on the agenda likely outweighs the 1929 law, as does the county's refusal to provide him with counsel, failure to allow him to sit in on the private meeting with Diebold lawyers concerning his employment, and insistence that he take responsibility for elections held on machines he knew to be insecure.

To date, Emery County has refused to provide Funk with either a transcript or a tape or their behind-closed-doors meeting with Diebold attorneys.

Diebold's behavior is even more problematic

Experts for the state of California and the state of Pennsylvanie have now confirmed the seriousness of the vulnerabilities discovered in Emery County. Diebold was cornered by Pennsylvania voting system examiner Michael Shamos, and was given the choice of telling the truth or lying. Shamos had already sequestered one of the machines and was prepared to examine it himself it Diebold lied. Only after this did Diebold admit to knowing about the security vulnerability, which is designed into the system.

Black Box Voting is completing reports with Harri Hursti and subsequently with Security Innovation (which will serve as peer review for Hursti Report II). The Hursti Report on findings from Emery County will detail multiple back doors built into the system. This report will be released to the public in redacted form on May 10. The unredacted version will be provided to federal and state regulators, including the Dept. of Homeland Security's "CERT" alert system.

Letter to Utah officials

Here is a quote from the preliminary information which Utah officials chose to ignore (except for locking Mr. Funk out of his office):
quote:

To: Gary Herbert, Lt. Governor of the state of Utah
Cc: David Blackwell, Emery County Attorney
Bruce Funk, Emery County Elections
Emery County Commissioners
Michael Cragun, Utah State Elections Director

Mar. 24, 2006

Dear Sirs,

This is a formal notification that a security defect was found in the Diebold TSx system in Emery County, Utah by professional security experts from Security Innovation, Inc. and Mr. Harri Hursti. Because of the severity of the defects, the formal reports are being prepared with sufficient precision to garner the attention of the appropriate authorities with jurisdiction over this matter. These authorities, of course, include each of you who are receiving this notice, in addition to federal authorities in the general area of computer security.

...

The security problems found in Emery County present potentially catastrophic security defects for upcoming elections. The issue extends outside of Emery County to additional states. The identified security vulnerability appears to be:

1) Persistent, with the ability to survive through multiple elections;

2) Difficult to detect, not only for elections official but also for security experts and even for Diebold technicians;

3) Flexible, in that the exploit can selectively affect any particular election, candidate or ballot question;

4) Accessible, in that no password, supervisor access or special equipment is needed to invoke the exploit;

5) Difficult to eradicate with any patch, reinstallation, or cleaning procedure;

6) Likely to be exploited, because the skills needed to exploit the hole are possessed by many programmers and the information needed to conduct the exploit is generally available to the public. The time needed to exploit the security hole is in the range of a week’s planning time and 60 seconds for execution.


A pattern of security failures

The testing in Emery County follows another set of tests by Black Box Voting in Leon County, Florida, which documented security flaws in the GEMS central tabulator and the Diebold AccuVote optical scan system.

A pattern of retaliation by Diebold

Like Bruce Funk, Leon County Supervisor of Elections Ion Sancho faced retaliation by Diebold and other voting companies. Diebold refused to honor its contract with Sancho, forcing him out of HAVA compliance. The only other authorized vendors then blackballed Sancho, refusing to sell to him.

The Florida Attorney General is now investigating Diebold, ES&S and Sequoia for collusion and antitrust violations.

Diebold has also been participating in orchestrated smear campaigns against Black Box Voting and its founder, Bev Harris, using fake Internet "screen names," identity theft (posing as board members of Black Box Voting to post defamation), organizing fake news Web sites smearing election integrity advocates in general and Black Box Voting/Bev Harris specifically. Some Diebold employees tag-team with the Diebold smear squad to point elections officials toward the cyberlibel. The Diebold Internet smear squad also includes an individual from North Carolina.

Black Box Voting, together with a team of volunteer researchers, has now obtained documents and photographs which directly tie these Internet libel campaigns to Diebold. A more detailed article on the Diebold Internet smearing, accompanied by documents and photographs, will be published here after the dust has settled on the Diebold touch-screen security failures.

PERMISSION TO REPRINT GRANTED, WITH LINK TO http://www.blackboxvoting.org
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sat May 04th 2024, 12:55 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Topic Forums » Election Reform Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC