Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Government Politics

Researchers Crack Every Certified CA Voting Machine 154

ewhac writes "The San Francisco Chronicle is reporting that computer security researchers throughout the University of California system managed to crack the security on every voting machine they tested that has been approved for use in the state. The researchers are unwilling to say how vulnerable the machines are, as the tests were conducted in an environment highly advantageous to the testers. They had complete access to the devices' source code and unlimited time to try and crack the machines. No malicious code was found in any of the machines, but Matt Bishop, who led the team from UC Davis, was surprised by the weakness of the security measures employed. The tests were ordered by Secretary of State Debra Bowen, who has until Friday of next week to decide whether to decertify any of the machines for use in the upcoming Presidential primary election."
This discussion has been archived. No new comments can be posted.

Researchers Crack Every Certified CA Voting Machine

Comments Filter:
  • by seanadams.com ( 463190 ) * on Saturday July 28, 2007 @07:05AM (#20021749) Homepage
    So before, the only people who probably knew how to crack these would have been the people who designed them, plus whoever else had access to the source code, plus probably a whole bunch of administrators who would have access to the data files during the election.

    Now, as if that's not bad enough, in addition to all of them we have a whole team of hackers who have proven that they know SPECIFICALLY how to do it. And by the way, they hacked both the voting machines themselves AND the back-end remote machines that do the tabulating.

    And those facts are all public knowledge now!

    So if these machines were merely "ridiculously" insecure to begin with, now they're just split wide open like a dvda. Yay democracy. What exactly does Ms Bowen need until next Friday to fucking think about?

    And please, can we quit calling them "computer security researchers"? What's wrong with hackers? When did we start on the euphemism treadmill [wikipedia.org]?
  • Ooh, Shiney! (Score:4, Insightful)

    by pipingguy ( 566974 ) * on Saturday July 28, 2007 @07:07AM (#20021755)
    If voting is the core of a democracy then the transparency of the process MUST be paramount. Chuck out the whole concept of voting if average citizens have to understand and correctly interpret the latest whiz-bang technology.
  • by fastest fascist ( 1086001 ) on Saturday July 28, 2007 @07:21AM (#20021797)
    Considering how strong the push for voting machines is, you'd think there's something terribly wrong with paper ballots. What is it? To me, they seem to work fine, and knowing the system for counting the votes doesn't let you compromise the impartiality of the system. What benefit do these voting machines offer that justifies the risks?
  • Re:Ooh, Shiney! (Score:3, Insightful)

    by fl!ptop ( 902193 ) on Saturday July 28, 2007 @07:25AM (#20021815) Journal

    Chuck out the whole concept of voting if average citizens have to understand and correctly interpret the latest whiz-bang technology
    i'm not sure the average citizens need to understand more than 'press here for candidate a', 'press here for candidate b' (obvious side-discussion regarding knowledge empowering voters to select better candidates avoided here), but those who make decisions about what procedures and machines are used to ensure the votes are tallied fairly have to consider it. poll workers are volunteers, have direct access to the machines, and are probably the weakest point of resistance to those who are truly motivated to throw an election, for reasons that are nefarious or otherwise.
  • Voting machines (Score:3, Insightful)

    by saibot834 ( 1061528 ) on Saturday July 28, 2007 @07:31AM (#20021827)
    "Voting machines are the non-solution of a non-existing problem" (not my quote, I heard it somewhere).

    The quote is completely right.
    a) What is wrong with pen&paper voting?
    b) Voting machines do not solve any problems: If we say for example a) was about the money: Voting machines cost all-in-all more money than pen&paper voting.
  • by fl!ptop ( 902193 ) on Saturday July 28, 2007 @07:37AM (#20021863) Journal

    What benefit do these voting machines offer that justifies the risks?

    the push (in the u.s.) for electronic voting machines seems to have been made after the 2000 election recount fiasco. need i mention the words, "hanging chad?" i don't think you can have one of those with an electronic machine. besides, paper ballots are easy to invalidate. remember the pictures on the news of people holding them up to the light, and others handling stacks of paper ballots? one small wire shoved through a stack like that can cause an 'overvote' which would invalidate all of them.

    i would guess the main benefits are, in a recount scenario, to prevent having hundreds of people handle paper ballots. the avenues of interpretation are too numerous (hanging chads, pregnant chads, swinging chads, etc.) with paper. with a computer, there is no doubt, it's either a 0 or a 1.

  • by Lockejaw ( 955650 ) on Saturday July 28, 2007 @07:46AM (#20021905)

    And please, can we quit calling them "computer security researchers"? What's wrong with hackers? When did we start on the euphemism treadmill?
    When the media decided that a "hacker" is someone who secretly breaks into your computer and fills it full of spam and child porn. So we needed a word for people who break into computers without being secretive about it and don't fill it with bad stuff.
  • by fastest fascist ( 1086001 ) on Saturday July 28, 2007 @07:49AM (#20021917)
    Hm, well, to do the old "over-here-they-do-it-better", over here ballots are counted manually, and the results after a nationwide vote are available withing a few hours of the closing of polls. While I live in a much smalled country than the USA is, I don't think the percentage of people who vote is any higher over there, and thus the amount of vote counters required per capita shouldn't be, either. If it takes weeks, hire more people, or perhaps people who can count, if that is the problem.
  • Security is tough. (Score:3, Insightful)

    by fishthegeek ( 943099 ) on Saturday July 28, 2007 @08:00AM (#20021951) Journal
    The only secure machine is one that is OFF. If it isn't off then I'm always going to bet on the hacker. IANAP, but I feel very sorry for the challenges that programmers face. They have to review and analyze code for bugs, flaws, and features, they have bosses that demand profit and features. Those 1337 boys only need to find one flaw, the programmers have to find and fix all of them. I'm not surprised at all that all of the machines were cracked, given a high enough profile, the right conditions, and a motivated h4x0r any system is vulnerable.
  • Re:Ooh, Shiney! (Score:5, Insightful)

    by rbarreira ( 836272 ) on Saturday July 28, 2007 @08:02AM (#20021963) Homepage
    Winston Churchill has the solution:

    The best argument against democracy is a five minute conversation with the average voter. -- Winston Churchill.
  • by chris_sawtell ( 10326 ) on Saturday July 28, 2007 @08:07AM (#20021997) Journal
    From the article:-

    Letting the hackers have the source codes, operating manuals and unlimited access to the voting machines "is like giving a burglar the keys to your house,'' said Steve Weir, clerk-recorder of Contra Costa County and head of the state Association of Clerks and Election Officials.
    This is simply not true! The analogue in the real world of locks and keys is that you have given a burgler the design blueprints of the lock. NOT the code combination or the key lever settimgs. The demonstrated ignorance of the said Steve Weir about secure computing begs the question "How did he get appointed to his positions?"
  • by Ambiguous Puzuma ( 1134017 ) on Saturday July 28, 2007 @08:29AM (#20022091)
    And if the seal is tampered with, what then? It seems like an easy way to quickly invalidate a whole bunch of votes in districts that are likely to favor your opponent.
  • by TapeCutter ( 624760 ) on Saturday July 28, 2007 @09:08AM (#20022361) Journal
    "with a computer, there is no doubt, it's either a 0 or a 1." - Maybe I'm feeding a troll but here goes anyway...

    Speaking as degree qualified programmer with 20yrs experience, I don't trust the machines and TFA clearly demonstrates why.

    My number one reason for distrusting computerised systems is that they enable "wholesale fraud" with a single point attack, it might be "unlikely" but it is a technical possibility that the result of the whole election could be predetermined and the "race fix" can be implemented by one person sitting at a desk. Worse still it's a technical possibility that a "fix" can be done in such a way that it is undetectable after the fact.

    Contrast that risk with old-fashioned paper and international observers. With that system the best a cheat can hope for is "retail fraud" - some stuffed boxes over here, the senator's hound dogs voting over there, ect. Fraud and corruption are a fact of life, nowhere on the planet can they be totally eliminated from such high stakes "games" as national elections.

    The traditional paper system with it's well-known and thouroughly tested procedures minimizes the risk of a "fixed race" simply because of the fact that it is much more difficult and requires a hell of a lot more people to get away with "wholesale fraud". Speed is not a big issue since there are plenty of counters in the form of eager voulenteers from the various parties. And it's crucial to security that you pair off "opposing counters" since they also embody the imporatnt "checks and balances" of watching each other like hawks and arguing so loudly about something as mundane as "hanging chads" that even I remeber it and I live 10,000 miles away!
  • Fraud (Score:4, Insightful)

    by WindBourne ( 631190 ) on Saturday July 28, 2007 @10:11AM (#20022789) Journal
    Paper elections can and has been taken over. I am not so sure at this time if any in the USA are, but Texas, Florida, and Chicago had a LONG TIME well deserved voting fraud issues. That is why EVERY box has 2 or more ppl going over the vote, with each person coming from 1 of the 2 major parties (interestingly, they are not required to have a person from all parties that are running candidates, just from the major parties). The current elections since 2000 (probably before), have shown how easy it is for general election fraud. In particular, in Florida, the gov. was not allowing votes from anybody with the same name as criminals in high democrat counties only. In ohio, they had 3 ppl (democrats) certify an election by picking certain boxes, counting them before hand, and then using those for their "random" tests. They were suppose to pick a number of random boxes and check their results as well the count. They just did not feel like doing it.

    There are VERY good reasons for going to computers. Sadly, not only has the computers obviously not been designed and built well, but the vetting process in nearly all states has left a LOT to be desired. In nearly all cases, the groups have been willing to accept systems that several major companies thrust on us. What fascinated me, and should have been of interest to all the groups, is that NONE of these major machines wanted back-up paper system added in. In ALL cases, it would be their paper (i.e. get to gouge), and of course, they would be required to have somebody around to handle things (at least at the county level). This would be a recurring revenue stream for them. And yet, they fought it esp. diebold. That should be making ALL of those groups nervous, and instead it takes a judge to be looking at this issue.

    The computer systems ARE the right idea. The choice and implementation have been disasters. Welcome to Amerika.
  • by Skapare ( 16644 ) on Saturday July 28, 2007 @10:54AM (#20023113) Homepage

    Paper ballots do have their problems. People don't always mark them consistently. Sometimes they mark one candidate then try to rub it out and mark another. The paper ballot was hard to read by electronic means and manual counting was too time consuming to get the quick results most people wanted.

    Punch cards that people have to do the punching on don't always get punched right (remember the hanging chad problem). Sometimes people start to punch one hole, and realize they are in the wrong hole or change their mind real fast and try to punch another instead. Sometimes 2 or more holes are punched. Sometimes holes are punched partially. In most cases people could check, but they don't, or don't really know they should.

    Computer voting was intended to eliminate these things. But that's its fundamental misguidance. Instead, it should be used to enhance them and correct the issues.

    Voting station computers should do nothing more than assist a voter in creating a reliably readable paper ballot. The voting station should not be networked, and not even have any storage space. It would be an embedded machine booted from flash that is hardware wired to be unwritable, or booted from a CDROM or equivalent. It should boot very fast (embedded developers know how to do this and bring a minimal system and application up in a second). It should be rebooted between each voter.

    The voting station would have a simple single sheet printer and an LCD flat screen with touch sensors. The voter would "touch" their votes and always have the ability to go back, or even jump around randomly to various offices/issues to vote on. Once done, the voter can press the "I am finally done" button to print the choices on paper.

    What is printed on the paper is a combination of scannable text and bar codes with strong checksums (SHA1). The text shall be human readable (although in big elections some people might need optical reading assistance). Visually impaired people can ask for a poll worker to read back their ballot to them.

    The next step is the paper ballot is taking to the reading station. The ballot is read in by another computer with a scanner. This computer scans the text and reduces it to a set of simple vote codes. These vote codes are checksummed and that is compared against the bar codes. If there is a mismatch, probably a scanner error took place, or the ballot was damaged or smudged. It flashes and beeps a warning the the ballot is not readable. This may require the voter to re-do another ballot (this one is marked as bad and the voter is given another sheet and front-of-line access to a voting station).

    The scanner keeps tallies and may send results to a central office. Larger voting places may have more than one scanner and tallies will be done by a central computer. The paper ballot is then inserted UNFOLDED into a locked box.

    The voter gets a receipt for having voted, but does NOT get a copy of what votes they made. If they want to remember their own votes, they must make their own notes themselves. The reason for this is that no voter should have any official statement of who they voted for to ensure no voter can "prove" to someone else who they voted for. This has been a long time standard to impede vote buying/selling, and should not change.

    The computers that tally the votes could give nearly instant 100% results shortly after polls close. But that's not the end of it. Those results are not certified. The voting officials will, in the next few days, monitor the process if re-scanning all the paper ballots to ensure the results are consistent. If they are satisfied of this, then they certify the election results. If there are any issues, then the paper ballots can be manually checked.

    This process is still paper based, and still just as auditable and recountable as any paper based system. It gains the avantages of consistency in the marking of ballots. Instead of being hand marked, they are "computer marked" (in a way that humans c

  • by mithras invictus ( 1084169 ) on Saturday July 28, 2007 @10:56AM (#20023133)
    How could this have been modded "insightful"?

    Aren't you glad it is public knowledge now how rediculously insecure those machines are? These machines should never have been used and the people you call "hackers" have done what the government should have done BEFORE using them for black-box voting.
    Are you advocating security though obscurity where the safety of the democratic process depends on a small group of people we trust not to abuse their position? I'd much rather have a verifiable solution.

    I say someone in the government is finally doing the right thing here.
  • Hacking??? (Score:5, Insightful)

    by cluckshot ( 658931 ) on Saturday July 28, 2007 @11:25AM (#20023341)

    Since I have on my computer the software for many of the major voting machine companies and I worked reviewing it for one of our big US States, (Not California) I might have a thing or two to say on the issue.

    The first thing to understand is that the audits under the voluntary national standard for voting machine software do nothing about securing a ballot. The next thing to understand is that the public authorities don't want secure software on voting machines. -As politely as it can be said- Who in the hell do you think steals elections? --- Not the voters I can assure you! It is election officials. Next you have to understand that the purpose of modern voting machines isn't to prevent errors, it is to eliminate any evidence that they happened. Next you have to understand that some company or another wants to sell all the machines to run the election and that they don't want the election officials to be able to buy machines by another brand without having to go to the cost of ripping out the entire system by its roots and halting the whole world. In short they want to hold the political agents hostage to their company and make them pay through the nose on every election. How else does a scanner machine which might be worth $200 become a machine worth $30,000?

    Now that we have identified the motives in play here and there may be a few more nasty habits around like companies wanting to control political events..... Lets get down to the brass tacks here! Any election system worth anything should have some of the following attributes and possibly some more.

    (1) It must be machine independent. So that any device that fails can be easily replaced.

    (2) It must be transparent in its software where anyone can see the code and see that it does what it says.

    (3) It must be receipt based where it can be checked by additional 3rd party methods. Recounting must be possible and not just memory buffer checks.

    (4) It should be isolated from external attack only reporting via network and protected from intrusion by device isolation. This means no USB drives and no standard internet connections etc.

    (5) It must be custody of data prevented from having the political authorities being able to destroy the evidence of an election fraud.

    Making elections report totals quickly accurately and with receipts and such is no problem. Technically this is very easy. I probably could write in a few days the structure and code it in a matter of months myself. I would get nowhere because the political leaders would find their methodology of stealing elections in great trouble. Unless the voters rise up and get really angry on this one, expect the development of a silent dictatorship in which you hold elections and keep on loosing to the powers that be. (Maybe it already is here????)

  • by sconeu ( 64226 ) on Saturday July 28, 2007 @11:27AM (#20023361) Homepage Journal
    I wouldn't.

    If I *had* to, I'd have the computer be the means of *printing* a ballot only. It wouldn't tabulate.

    It would then print a ballot that was both human and machine readable (OCR font anyone?).

    That ballot would be placed in a box, and counted.

Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.

Working...