Forum Settings
       
Reply To Thread

This didn't inspire confidence...Follow

#1 Oct 07 2006 at 10:07 AM Rating: Excellent
Bad j00 j00
Avatar
***
2,159 posts
Some time ago I read this story about the Diebold voting machines. I didn't know much about the company other than they made voting machines and that there are a lot of concerns about them.

Then I goto my bank the other day.

They've replaced all their ATM machines with new ones. From diebold.

I usually use the ATMs for convenience. I walked right by them and went to a teller instead. Am I a bit paranoid? They say that they are replacing the machines for added security. I'm not quite sure why they needed all new machines for a metal guard, mirror and the bullshit "enhanced security" pin. I really don't trust the diebold name. For all I know, they're using an unsecured wi-fi network to transmit my pin to a central computer in the branch for verification. That's how confident I am in that name.

Edited, Oct 7th 2006 at 11:09am PDT by Nizdaar
#2 Oct 07 2006 at 1:23 PM Rating: Good
***
3,053 posts
After ignoring every study made on how easy the voting machines made by Diebold are to hack into, the Governor is telling everyone to use absentee ballots in November's election.

Diebold sold the state some ebooks to replace the thick books of register voters use on election day and they kept rebooting and one would say they already voted, while others showed one as not voted yet.

Add the fact that a lot of election judges had no to little training on the machines and others didn't even show up at all, our primary was a mess this year.

____________________________
In the place of a Dark Lord you would have a Queen! Not dark but beautiful and terrible as the Morn! Treacherous as the Seas! Stronger than the foundations of the Earth! All shall love me and despair! -ElneClare

This Post is written in Elnese, If it was an actual Post, it would make sense.
#3REDACTED, Posted: Oct 08 2006 at 2:37 AM, Rating: Sub-Default, (Expand Post) Ha-Hah + 1, for your Naivetie. Simple up or downs +1/2/3/4, I guess not ...
#4 Oct 09 2006 at 9:44 AM Rating: Good
*****
18,463 posts
ElneClare wrote:
After ignoring every study made on how easy the voting machines made by Diebold are to hack into, the Governor is telling everyone to use absentee ballots in November's election.

Diebold sold the state some ebooks to replace the thick books of register voters use on election day and they kept rebooting and one would say they already voted, while others showed one as not voted yet.

Add the fact that a lot of election judges had no to little training on the machines and others didn't even show up at all, our primary was a mess this year.

Really? I'll have to tell my folks back on the East coast. It's such a struggle to get my mother to even stop by the school, though. I don't see her going to the trouble.
#5 Oct 09 2006 at 11:09 AM Rating: Default
****
4,158 posts
Quote:
"DELAND, Fla., Nov. 11 - Something very strange happened on election night to Deborah Tannenbaum, a Democratic Party official in Volusia County. At 10 p.m., she called the county elections department and learned that Al Gore was leading George W. Bush 83,000 votes to 62,000. But when she checked the county's Web site for an update half an hour later, she found a startling development: Gore's count had dropped by 16,000 votes, while an obscure Socialist candidate had picked up 10,000--all because of a single precinct with only 600 voters."
- Washington Post Sunday , November 12, 2000 ; Page A22


For loadsa stuff concerning the voting machines supplied by Diebold, Bev Harris has done heaps of research into the subject. (Wich should be of MAJOR concern to all voters in the US.)

She was working with Scoop in new Zealand, and has exposed some remarkable flaws in a system that has led to some extremely questionable results in the last couple of US elections.

Scary reading.

Heres a couple of links ...
____________________________
"If you have selfish, ignorant citizens, you're gonna get selfish, ignorant leaders". Carlin.

#6 Oct 09 2006 at 11:14 AM Rating: Default
I wonder if insurance by the Fed for bank accounts (up to 200k I believe) would cover an ATM hustle? If your account is "hacked" and money stolen, I would think they would have to cover it. Maybe worth looking into. Still, doesn't help much when the rents due..."Oh yeah, the FDIC told me I should be getting the check in a few years, lots of paperwork apparently...just hang in there!".
#7 Oct 09 2006 at 6:00 PM Rating: Good
Encyclopedia
******
35,568 posts
Lol. I followed your links to this one detailing how easy it is to hack Diebold election machines.

God I love when people who have no clue how technology works try to explain it. Doubly so when they're doing so in such a conspiratorial manner. Um. Newsflash. If you have physical access to a system, you can hack it. If you have network access and the passwords and such, you can hack it. Nothing new here.

I particularly loved this bit about how anyone could "hack" the password on their database:

Quote:
16) Now, in Access, open the "joke" datafile (or whatever you called the one you created) the same way you did the Alameda file. (If you quit out of Access in the last step, no problem, fire it up again.)

17) Got the "joke" file up in MS-Access? Good - you'll see a number of different sub-areas within MS-Access, such as "ballot", "card", "region", etc. Find one called "Operator", and open it (double-click on it).

18) You'll see a "password". It won't be the password you typed in, it'll be "scrambled" (random combination of characters) - don't worry about it. Highlight that whole password with your mouse. Make sure you get the WHOLE thing, it might be longer than the "box" it's in and will scroll sideways, you'll have to drag sideways with the mouse to get the whole thing. Got it "highlighted"? Good. Under the "Edit" menu at the top, give a "Copy" command.

19) Close down the "joke" (or whatever filename you used) file, and in MS-Access pull up the Alameda database file. Again, open up the "operator" item and highlight the password for Admin. Highlight the whole thing - and then, under the "Edit" menu, hit "Paste". You'll see the characters change to what they were in the "joke" file.

Now under the "file" menu, do a "save" command.

Got a sick feeling in the gut yet?

20) Quit completely out of MS-Access, and fire up GEMS again (at Start-Programs-Global Election Management-GEMS). Click on the Alameda database. Hit "open". This time, for the "Admin" password, use the password you created and entered twice for the "joke" file - in my case, that would be "jokepass" without quotes.

And bingo…you're in. That is GEMS with the full datafile spread'n'ready before you. You successfully bypassed the GEMS password control system like a hot knife through butter. Note: if you were doing real dirty deeds, you'd save the old Alameda admin password off in a Notepad window or similar, and then when you're done "hacking", splice it back into the file. You would never know what the password really is, but once you were done the system's legitimate administrators would be able to use that correct password normally, without being "alerted to trouble" from their proper password not working.



Hah. I do that all the time to change root passwords when they get fogotten. Nothing new here. If you have access to write a file, you can change it's contents. Only a totally non-technical person would actually think this was unusual or represented any sort of significant security risk.

The key (as the writer mentions but dismisses) is physical security. The machines are assembled and installed at Diebold. Presumably, the account used for viewing results does not have write access to the database. Presumably, no account does except the database account, which requires a secured password to log in. So, the fact that a user can hack a database they created/copied by using MS-access is meaningless. If *I* create that database with my account, and then you log in with a different (non-admin) account, you wont be able to do what this person talks about.

Again. The security is in the whole system. Not one piece of software.


Kinda funny actually. The saddest part is that most people don't know enough about computer security to realize just how ridiculous this complaint is. You simply can't secure a computer system that tallies votes from remote sites any more then they have in this case. Demanding the impossible doesn't make it any less impossible...
____________________________
King Nobby wrote:
More words please
#8 Oct 10 2006 at 5:04 AM Rating: Good
***
3,053 posts
I have to run and catch my bus, so can't go hunting for the articles right now for you.

Expert from Johns hopkins look at this issuse and wrote a report on how easy the Diebolt voting machines are to hack into. Made the news over 2 years ago and from the reports I seen since, the issue of security still hasn't been fixed.
____________________________
In the place of a Dark Lord you would have a Queen! Not dark but beautiful and terrible as the Morn! Treacherous as the Seas! Stronger than the foundations of the Earth! All shall love me and despair! -ElneClare

This Post is written in Elnese, If it was an actual Post, it would make sense.
#9 Oct 10 2006 at 5:56 AM Rating: Excellent
Liberal Conspiracy
*******
TILT
gbaji wrote:
God I love when people who have no clue how technology works try to explain it.
I've seen enough written by professors of computer science at various universities to feel confident that the machines aren't as secure as you'd hope, given their importance.
Quote:
You simply can't secure a computer system that tallies votes from remote sites any more then they have in this case
That's as good an argument as any I've heard for ditching the machines.
____________________________
Belkira wrote:
Wow. Regular ol' Joph fan club in here.
#10 Oct 10 2006 at 6:30 AM Rating: Decent
gbaji wrote:
Presumably, the account used for viewing results does not have write access to the database. Presumably, no account does except the database account, which requires a secured password to log in. So bla bla bla...


- What did I say about presumption being the bother of all fuck-ups?
- It's the mother of all fuck-ups, you tit!
- Brother, mother, any other sucker. Doesn't make any difference, they are still fucking voting machines, and they still count fucking votes!
____________________________
My politics blog and stuff - Refractory
#11 Oct 11 2006 at 1:11 PM Rating: Good
Encyclopedia
******
35,568 posts
RedPhoenixxxxxx wrote:
gbaji wrote:
Presumably, the account used for viewing results does not have write access to the database. Presumably, no account does except the database account, which requires a secured password to log in. So bla bla bla...


- What did I say about presumption being the bother of all fuck-ups?
- It's the mother of all fuck-ups, you tit!
- Brother, mother, any other sucker. Doesn't make any difference, they are still fucking voting machines, and they still count fucking votes!


Except that those are presumptions you absolutely have to make when you discuss computer security issues. Because without those restrictions then anyone can "hack" anything on any computer. The cornerstones of computer security (if you can't have physical/network security which is 99% of the time) are authentication and authorization. Both have to be present for any real security to exist.

What the article essentially argues is that if you don't enforce the authentication half of security, your files wont be secure! Um... Shocker!!! Duh...


Heh. Joph. I've yet to ever meet a professor of CS who knew half as much as the average working IT security pro. While there are a few who know their stuff, the vast majority simply don't. Most of them are engineering (more often CompSci, which is *not* the same thing) professors who teach in the CS departments today, not because they have specific knowlege of the field, but because their degrees are closest. It does not surprise me at all that there are many CS professors who don't understand real computer security enough to recognize the silliness of most of the issues with the Diebold machines.
____________________________
King Nobby wrote:
More words please
#12 Oct 11 2006 at 1:20 PM Rating: Excellent
Liberal Conspiracy
*******
TILT
As much fun as it might be to debate credentials with you, I've been bless with the foresight to realize the futility of the act. Therefore, I'll defer to my second point which is that, if this is as secure as you can make an electronic voting machine then it would seem to be an excellent argument for not abandoning paper ballots, be they punch-hole or merely a paper trail via voting receipt.

The Diebold argument would be pretty much moot if the machines all gave a receipt which could be visually confirmed and dropped into a separate lockbox, to be counted if needed.
____________________________
Belkira wrote:
Wow. Regular ol' Joph fan club in here.
#13 Oct 11 2006 at 3:02 PM Rating: Good
Encyclopedia
******
35,568 posts
Jophiel wrote:
As much fun as it might be to debate credentials with you, I've been bless with the foresight to realize the futility of the act. Therefore, I'll defer to my second point which is that, if this is as secure as you can make an electronic voting machine then it would seem to be an excellent argument for not abandoning paper ballots, be they punch-hole or merely a paper trail via voting receipt.


Yes an no. The question is: "Are they *less* secure then the paper ballots?". And the answer to that really is, no. What I just said about authentication and physical access applies just as much to a paper ballot system. If I've physically got a box of ballots in my hand/car/whatever, I can change those ballots or add more pretty easily. With the electronic voting machines, you also need physical access and time *and* you've got to be savvy enough to do it *and* the system itself has to not have been secured at all.

The article is equivalent to saying that if you take a box of ballots home with you where you can spend the time needed in private to open up the box and change the contents, then you could "hack" the ballot process.

Again. Duh...

Quote:
The Diebold argument would be pretty much moot if the machines all gave a receipt which could be visually confirmed and dropped into a separate lockbox, to be counted if needed.


The newer machines do. This was one of my first complaints about the voting machines from day one (when they were testing them out about 4 years ago). They've since added paper printers that record each vote (with voter information stripped out so you just see the tallys change over time). They're currently having problems with paper jams with those systems (but no more I'd assume then with any other spool type printing system). But they're definately adding the paper trail system
____________________________
King Nobby wrote:
More words please
#14 Oct 11 2006 at 3:07 PM Rating: Good
Imaginary Friend
*****
16,112 posts
Computer voting is bad. It adds unneeded and dangerous variables period


Why do they even want them? Just so we can be all "hi-tech" and look cool Smiley: rolleyes
____________________________
With the receiver in my hand..
#15 Oct 11 2006 at 5:34 PM Rating: Good
Encyclopedia
******
35,568 posts
Kelvyquayo wrote:
Computer voting is bad. It adds unneeded and dangerous variables period


Why do they even want them? Just so we can be all "hi-tech" and look cool


Part of it is cost savings. It's a heck of a lot cheaper to tally the votes by computer then via card reading machines. Cheaper on paper as well (which is likely the reason why the initial versions did not include any paper trail, they were trying to eliminate the paper from the process afterall).

Another part is accuracy. At the end of the day, a certain percentage of the votes in any election are always lost due to damage ballots crumpling in the reader, mispunched ballots, rainwater getting into the box, crash while transporting the ballots, and any of a zillion other things that happen between the time you walk into the booth to vote and the vote actually gets counted.

The voting machines eliminate the majority of the things that cause votes to get lost. Obviously, they can add some new ways for those votes to get lost, but the idea is that as the technology is developed and refined, we'll end up losing vewer votes in elections, meaning that the election results are more accurate then they'd be if we used paper ballots.


And I really think that most of the people criticizing the process aren't considering that we're not creating something in a vacuum. We're replacing another system. A consideration of the security of electronic voting machines must take into account the current security of the paper ballot process. People seem to complain about the voting machines because they aren't "perfect", but neither is the system of paper ballots. Nothing is perfect. No election counting methodology is immune to tampering. The objective is to make it harder to tamper, more accurate, and cheaper. Which the Diebold voting machines do.

The fact is that you have to have much greater access to the Diebold machines in order to tamper with the votes inside then you need with a ballot box in order to do the same thing. The votes are stored on memory cards which are handled using the same physical methodology as locked ballot boxes (boxes locked with a seal affixed, two people handling the box at all times, etc). Any tampering must be done either at the final location where the votes are tallied centrally, or at the balloting place itself by inserting false voting information into the cards themselves.

In neither of those two areas are the electronic voting machines any more vulnerable then paper ballots. Until that box is locked and sealed, anyone with physical access to it can "stuff" the box with extra votes (which is where we get the term "stuffing the ballot box", right?). A similar amount of physical access would be required to change or add votes to an electronic machine at the ballot location (unless you think hooking up serial cables and hacking the machine is harder to spot then dumping extra pieces of paper into the box was...). At the central terminal, there is absolutely no difference. Paper ballots are fed into a machine that counts them then transmits the totals to computer. Electronic ballot cards collected from the voting machiens are read by a maching that counts then and tranmits the totals to the same computer. No change of security. If someone has the ability to hack into the tallying system without being detected he could change the votes no matter what method is used at the balloting place.


I've spent a good amount of time discussing this with other IT security types. While the security model isn't perfect, the general conclusion is that it's at worse identially insecure to using paper ballots, and at best significantly more secure. That's a "win" all around.
____________________________
King Nobby wrote:
More words please
#16 Oct 11 2006 at 7:48 PM Rating: Good
Imaginary Friend
*****
16,112 posts
And as one IT person to another; You know the more **** you add, the more **** goes wrong. While adding technology may in some cases make things run more smooth and efficient; I personally don't think that this is something to gamble on until the bugs are worked out. Namely the Bush Administration but you knew I was going to say thatSmiley: grin

It puts too many differnt hands on it and not enough hands that are really knowledgable about such things. You KNOW how stupid people are.
____________________________
With the receiver in my hand..
#17 Oct 11 2006 at 8:22 PM Rating: Excellent
Liberal Conspiracy
*******
TILT
For all the good it does, technology begets problems. Furthermore, the problems that arise aren't anything easily fixable, particularly by the average voting booth volunteer. Take, for instance, the problems detailed in this fellow's blog. As an aside, unless anyone has specific information to discredit his credentials, he seems like a fellow who knows his stuff when it comes to electronics and security.

These simply are not problems that arise with a paper system. I won't say that the paper system is perfect or that it can not be tampered with but things such as "make sure the results aren't available to be physically tampered with" are the same weather it's a box of paper ballots or a glorified laptop containing the election results. This discounts accidental issues such as software glitches, power surges or whatever other technical issues that can potentially mess with or erase voting records. Yeah, someone can spill their coffee onto some ballots. the result of that happening isn't anywhere near as damaging as losing the results on a memory card due to technical failure.

As for whether or not Diebold machines now all produce paper ballots, I couldn't say because I haven't read anything to that effect. According to this column (which links back to the blog), 27 states now require a paper ballot -- barely more than half. I know its a state issue, but I'm really amazed that the other 23 states haven't followed suit.

I'm not entirely against electronic voting. If nothing else, an electronic vote, with a paper ballot receipt, ensures that we have two (presumably accurate) tallies of the votes and gives us one to match against the other if questions arise. But pure electronic measures just don't seem like the answer right now and paper ballot systems are not used nationwide.
____________________________
Belkira wrote:
Wow. Regular ol' Joph fan club in here.
#18 Oct 11 2006 at 8:49 PM Rating: Good
Imaginary Friend
*****
16,112 posts
Maryland Motor Vehicle Administration was still running Windows NT servers and 98 workstations until a couple years ago.Smiley: thumbsup
____________________________
With the receiver in my hand..
#19 Oct 12 2006 at 8:42 AM Rating: Good
***
3,053 posts
Joph, thanks you for the link to Dr Rubin's blog. It was his study that I was refering to in my earlier post.

I vote in Baltimore City, where most of the election judges are seniors who have no or little experience with computers. So was worry even as I was walking to my poling place.

Jonwin and I had bother received new voting cards with information on the fact that our poling site was now moved from the church to a local elementary school 2 blocks farther from where we live. Since I never am sure how my legs will feel on election day, the poling place was an issue if I had to make use a wheelchair. At the church the handicap entrance was in the back and one had to go though the ally litter with trash to reach it. This seem less of a problem at the new poling place, as long as one didn't have to use the sidewalk between the senior housing and the school, as they are in bad shape.

When I got to the new poling place, I notice fight off that there were problems with the electronic poling books, that replaced the old binders of resister voters. The 3 voters in front of me all had been directed to see if the ebooks at the next table show them as not voted yet, Since the machines had crashed.

From Dr Rubin's blog I now have a since of what was going on to cause the problem I was seeing there.

1. Was a problem with the cards crashing the ebooks.

2. I did not see any cables running from one table to the other being used for the ebooks. Since they were suppose to all be hooked up to a hub, I now wonder if they had set them up wrong, like I heard of at other poling places afterwards in the newspaper.

This is the first election year that Baltimore City has been forced by the state to use the Diebold machines, instead of the electronic machines they had used the last 3 elections.

At this point I am going to ask for an absentee ballot be sent to me, for the general election, as it is the only way it looks like I can be sure that my vote is counted correctly. Plus the one time I didn't make it to the polls was 8 years ago, when I was in too much pain to walk the 5 blocks to vote that in that primary.

Edit to add link to video of another study done at Princeton Univ. Seems it only takes a minute to add code that can effect the vote total and then delete itself.

Edited, Oct 12th 2006 at 10:07am PDT by ElneClare
____________________________
In the place of a Dark Lord you would have a Queen! Not dark but beautiful and terrible as the Morn! Treacherous as the Seas! Stronger than the foundations of the Earth! All shall love me and despair! -ElneClare

This Post is written in Elnese, If it was an actual Post, it would make sense.
#20 Oct 12 2006 at 9:57 AM Rating: Decent
Scholar
****
4,593 posts
Those machines are a VERY bad idea. I mean...what are you going to do if aliens blast us with an EMP on election day?

Seriously though. There is no absolutely secure way to take votes. If it can be made it can be tampered with or replaced.

My idea:

Give everyone a set of colour coordinated balls etched with their name and a candidates name. Make these balls destructable in some easy fashion (melt in the microwave or something). You choose the ball that matches your chosen candidate and nuke the rest. Walk to voting place throw your ball in the bucket and you're all set.

They just poor the balls into a counting machine that checks the colour, name of the person who's ball it was (to catch duplicates in which case the person would be sent a secondary set of balls and their original balls put in the microwave), name of the candidate (Redundancy: determined by the colour, but just to make sure the ball wasn't painted in some way it's also printed on the ball) and seperates them into clear sealed (read: welded clear plastic) buckets that are then weighed on the same mechanical scale.

Whoever has the most balls wins :)

Oh, and they should have 5 year old colour blind kids handling the balls because 5 year olds don't care who wins and can't read the names if they did.

Edit: EMP pulse = Electromagnetic pulse pulse.

Edited, Oct 12th 2006 at 10:59am PDT by Yodabunny
#21 Oct 12 2006 at 4:14 PM Rating: Good
Encyclopedia
******
35,568 posts
Yodabunny wrote:
Give everyone a set of colour coordinated balls etched with their name and a candidates name. Make these balls destructable in some easy fashion (melt in the microwave or something). You choose the ball that matches your chosen candidate and nuke the rest. Walk to voting place throw your ball in the bucket and you're all set.

They just poor the balls into a counting machine that checks the colour, name of the person who's ball it was (to catch duplicates in which case the person would be sent a secondary set of balls and their original balls put in the microwave), name of the candidate (Redundancy: determined by the colour, but just to make sure the ball wasn't painted in some way it's also printed on the ball) and seperates them into clear sealed (read: welded clear plastic) buckets that are then weighed on the same mechanical scale.


I like that he with the most balls wins... :)

The problem is that we have to have a "semi-anonymous" vote. You need to be able to total up the votes for each candidate or initiative on the ballot, but not be able to connect individuals to the votes after the fact (so that there's no fear of reprisals based on how people voted). The ball system wouldn't work since each person's name is on the ball. Also, don't you vote for more then one thing in an election? How many balls do you get? Which color means what in which catagory? What about elections where I vote for the two candidates in a set that I want? It's just not that simple...

It sounds like the number one problem they're having isn't with the voting machines themselves, but with the process of verifying that each person only votes once. Not surprising since it almost sounds like they spent all their time and effort on the voting machines with the voter counting process somewhat of an afterthought. I'm not sure why they can't just separate the two entirely. It's not like crossing names off a list wasn't working well previously. The savings isn't in that part of the process, but in the ballot counting part. Why introduce a far more complex and error-prone component into a part of the election process that isn't already expensive and inaccurate?

I think the voting machines are useful, and while not perfect, are a good replacement for the paper ballot system. I'm not sure about the electronic voter sign-in thingies though. Should just scrap them for the moment and get the voting machines working properly. Maybe down the line when they can devote more time to the systems, they can re-address them.

One of the first things you learn in engineering is *when* to make a change. If the thing you're building doesn't improve the process in anyway, you shouldn't do it. In the case of the voting machines themselves, the long term benefits of getting an electronic voting system working is very valuable. Most of the errors and problems we have with elections occur as a result of using paper ballots. Electronic ballots have the potential to fix those errors, and be much cheaper in the long run. Thus, even if there are some problems initially, it's worth making the change. I'm not sure the same can be said for the check in process though. Again. It's not like the binder with the list of names that you checked off when you handed people their ballots (or cards with the electronic systems) wasn't working just fine before. It's not like you save a ton on paper or anything, so I'm not sure why they bothered to change that process except for the pure fact of changing it "cause electronic is better!"...
____________________________
King Nobby wrote:
More words please
#22 Oct 14 2006 at 8:06 PM Rating: Default
Check out the big brain on Nizdaar! You're one hell of an observant mother focker. That's right, because of the metric 's-y-s-t-e-m, by democratic voting procedure, ATMs give out *pretend* "money".
Reply To Thread

Colors Smileys Quote OriginalQuote Checked Help

 

Recent Visitors: 276 All times are in CST
Anonymous Guests (276)