90 likes | 200 Vues
This article examines the significant security flaws present in current Direct Recording Electronic (DRE) voting systems. It discusses federal funding (HAVA) and issues with prominent DRE vendors like Diebold and ES&S. Case studies highlight severe voting discrepancies, including missing votes and malfunctioning machines. Key vulnerabilities such as hardcoded keys and lack of secure authentication are detailed, underscoring the need for improved voting technology and stringent certification processes. Ultimately, the analysis suggests that some inherent issues may necessitate exploring alternative voting methods.
E N D
Security flaws in existing voting systems by Slavik Krassovsky
Introduction • HAVA • $3.9 billion appropriated in states aid • DRE Vendors: • Diebold • ES&S • MicroVote • WINvote • Sequoia • Hart InterCivic
Certification process • Is done per FEC guidelines • ITAs • Ciber • Wyle • SysTest • Off-the-shelf hardware and software is exempt
Media reported problems • 01/04, Broward County, Florida: • 134 out of 10,844 votes are missing • 11/03, Boone County, Indiana: • 144,000 votes were cast but Boone County contains fewer than 19,000 • 01/04, Hinds County, Mississippi: • Machines stayed down all day
Diebold • Analyzed by researches: • Hardcoded DES key • No Smart card authentication • Unsecure smart card deactivation • Hardcoded PIN • Etc...
Attacks on the machine Undetectable rigging Attacks
Other problems • No way to verify that their votes were recorded correctly • No way to publicly count the votes • No meaningful recounts are possible
Conclusion • Some problems can be solved by strict certification • But some problems are inherent • It’s best to look for alternatives