Electronic Vulnerability

CA Secretary of the State Decertifies E-Voting Machines

In a late night, 11:45pm, press conference Debra Bowen decertifies e-voting machines. Will allow one DRE per polling place, which must have paper ballot hand counted. BradBlog reports on the press conference. The CA Official site. Secretary of State Debra Bowen began her top-to-bottom review of the voting machines certified for use in California in […]

CA Software Reports Released – Diebold subtracts from democracy

Update: Talk of the Nation Interview – Red Team Leader    ” [relying on procedures] indicates a very high belief in human infalibility.” Executive Summary: Vulnerability to malicious software The Diebold software contains vulnerabilities that could allow an attacker to install malicious software on voting machines or on the election management system. Malicious software could cause […]

Is Diebold ineligible in NY?

Memo to Governor Spitzer: New York State Law Prohibits State from Entering into Contract with Any of the Vendors under Consideration New York State is enjoined from doing business with vendors who lack business integrity or whose past performance is wanting…none of the voting machine vendors New York is presently considering doing business with are […]

University of California Red Team Reports to the Secretary of State

This confirms earlier reports on Diebold Optical Scan equipment, including the University of Connecticut report. The vulnerabilities identified in this report should be regarded as a minimal set of vulnerabilities. We have pursued the attack vectors that seemed most likely to be successful. Other attack vectors not described here may also be successful and worth […]

University of Connecticut, Security Assessment of the Diebold Optical Scan Voting Terminal

In July, 2007 a similar report was released on the Diebold TSX, which demonstrated that that the state’s choice of Diebold Optical Scan was far superior to the Diebold DRE option, however, the October 2006 report is the one that applies to our voting systems. We identify a number of new vulnerabilities of this system […]