PDA

View Full Version : New Study Shows Massive Error Rates In E-Voting Machines




RonRules
03-23-2008, 10:16 PM
http://techdirt.com/articles/20080321/180302623.shtml

New Study Shows Massive Error Rates In E-Voting Machines
from the that-can-swing-an-election dept

Just as e-voting firm Sequoia is resisting having its machines reviewed independently, the Brookings Institute has put a bunch of e-voting machines to the test, and found error rates around 3% on some of the machines. These weren't errors due to software problems, but usability problems, where the design of the system resulted in people voting for a candidate they did not want. 3% is a huge number, and could easily change the results of an election. While the study found that people generally like e-voting technology, that still doesn't mean it's particularly effective. One other interesting part of the finding: when there was a voter-verified paper trail, it didn't cut down on errors. This suggests that many voters were either confused or didn't even bother to verify their vote. This should all be very worrisome. Even ignoring the technology problems that these machines have been shown to have, the fact that the design tends to create so many mistake votes should lead people to seriously question the use of e-voting machines.


You Rush Limbaugh listeners may remember that he had trouble voting and his machine froze up. That should have gotten more press, but I personally heard him say that.

RonRules
03-23-2008, 11:01 PM
http://voter.engr.uconn.edu/voter/Reports_files/seeA-tamperEVoting.pdf

In this paper we present a security assessment of the
Diebold AccuVote Optical Scan voting terminal (AV-OS),
a popular OS terminal currently in wide deployment anticipating
the 2008 Presidential elections. The assessment
is developed using exclusively reverse-engineering, without
any technical specifications provided by the machine
suppliers. We demonstrate a number of security issues
that relate to the machine’s proprietary language, called
AccuBasic, that is used for reporting election results.
While this language is thought to be benign, especially
given that it is essentially sandboxed by the firmware to
have only read access, we demonstrate that it is powerful
enough to (i) strengthen known attacks against the AV-OS
so that they become undetectable prior to elections (andthus significantly increasing their magnitude) or, (ii) to conditionally
bias the election results to reach a desired outcome.
Given the discovered vulnerabilities and attacks we
proceed to discuss how random audits can be used to validate
with high confidence that a procedure carried out by
special purpose devices such as the AV-OS has not been
manipulated. We end with a set of recommendations for the
design and safe-use of OS voting systems.

RonRules
03-23-2008, 11:03 PM
3.4. Lessons Learned
In this paper we have shown that the AV-OS system has
several serious vulnerabilities that can be used to alter election
results. Here we outline some particular shortcomings
and identify aspects that should be addressed to obtain a robust
OS voting terminal. We also note that a number of previous
works ([16, 17, 18] to name a few) addressed various
aspects of designing improved voting system machines.

RonRules
03-23-2008, 11:03 PM
It is clear from this work that security issues exist in the
AV-OS system, and any system with a similar architecture
will posses similar flaws unless proper security procedures
are put in place. Of particular interest is the flexibility of
attacks through the bytecode, despite having no ability to
write to the internal storage. The ability to modify the layout
and reporting functionalities is essential to make such
a system flexible enough to be practical. However, in addition
to authentication mechanisms, verification that these
components are behaving properly should be a mandatory
requirement.

Lois
03-24-2008, 11:05 AM
Thanks for posting this information. If only somebody would take it seriously. :rolleyes:

amy31416
03-24-2008, 11:11 AM
I doubt that they are errors, as in inadvertent.

kimo
03-24-2008, 11:13 AM
Thanks for posting this information. If only somebody would take it seriously. :rolleyes:

Nobody give a shit about it. I have few post about vote fraud on this boards.
..well, rather to discuss "foundations". So i would rather too given "normal" circumstances..