voting

Electronic voting machines easily hacked, demonstrates Princeton professor

Thursday, September 14, 2006 by: NaturalNews
Tags: electronic voting machines, voting fraud, political elections

eTrust Pro Certified

Most Viewed Articles
Popular on Facebook
CDC issues flu vaccine apology: this year's vaccine doesn't work!
Tetanus vaccines found spiked with sterilization chemical to carry out race-based genocide against Africans
Biologist explains how marijuana causes tumor cells to commit suicide
Companies begin planting microchips under employees' skin
NJ cops bust teenagers shoveling snow without a permit
Russia throws down the gauntlet: energy supply to Europe cut off; petrodollar abandoned as currency war escalates
McDonald's in global profit free fall as people everywhere increasingly reject chemically-altered toxic fast food
Chemotherapy kills cancer patients faster than no treatment at all
U2's Bono partners with Monsanto to destroy African agriculture with GMOs
FDA targets Dr. Bronner's Magic Soaps for sharing health benefits of coconut oil
Why flu shots are the greatest medical fraud in history
Flu vaccine kills 13 in Italy; death toll rises
600 strains of an aerosolized thought control vaccine already tested on humans; deployed via air, food and water
The 21 curious questions we're never allowed to ask about vaccines
Italian court rules mercury and aluminum in vaccines cause autism: US media continues total blackout of medical truth
CDC admits it has been lying all along about Ebola transmission; "indirect" spread now acknowledged
Whooping cough outbreak at Massachusetts high school affected only vaccinated students
Orthorexia Nervosa - New mental disorder aimed at people who insist on eating a clean diet

Delicious
(NaturalNews) Voting machines have caused controversy due to studies that say they are vulnerable to hacking and vote tampering, but Princeton University computer science professor Edward Felten and two graduate students, Ariel Feldman and Alex Halderman, have escalated these doubts by actually obtaining a commonly used electronic voting machine and hacking it.

Felten and his students acquired a Diebold AccuVote-TS from an undisclosed source and extensively tested the vulnerabilities of the machine. They found that by opening a locked panel in the back -- which one of the team picked in about 10 seconds -- and accessing the memory card slot and power button, they could alter votes made on the machine, crash it, and even piggyback malicious software to other networked voting machines. The team even developed software that would cover their tracks, hiding evidence of tampering from even comprehensive forensic study.

A spokesperson for the machine's manufacturer -- Diebold Inc.'s Diebold Election systems of Allen, Texas -- said Felten's report ignored new software and security measures that the company implements to prevent exactly the hacking the Princeton researchers simulated.

"I'm concerned by the fact we weren't contacted to educate these people on where our current technology stands," said Mark Radke, marketing director for Diebold.

Radke also questioned why Felten did not subject his paper to peer review before it was published on the university's web site, as is the standard for scientific research of this nature. Felten responded that he and his colleagues felt time was of the essence, due to the imminent midterm elections in November.

Estimates suggest about 80 percent of U.S. voters will use some form of electronic voting machine in the midterm elections, which will determine the makeup of the House, 33 Senate seats, and 36 governorships. The AccuVote TS is one of the most commonly used voting machines in the United States, along with its newer counterpart, the AccuVote-TSx. Felten admitted he was unable to obtain the TSx model for testing, but was sure much of the vulnerabilities he and his students uncovered would still apply.

"I think there are many people out there who have the type of technical ability to carry out the sort of attacks we describe here," Felten said.

Felten said the vulnerabilities he and his team found can be overcome with improved software and better protection for the memory card and power switch. He also suggested use of paper receipts that voters could verify.

According to Radke, Diebold has already put many of these strategies into practice.

###

Join over four million monthly readers. Your privacy is protected. Unsubscribe at any time.
comments powered by Disqus
Take Action: Support NaturalNews.com by linking back to this article from your website

Permalink to this article:

Embed article link: (copy HTML code below):

Reprinting this article:
Non-commercial use OK, cite NaturalNews.com with clickable link.

Follow Natural News on Facebook, Twitter, Google Plus, and Pinterest

Colloidal Silver

Advertise with NaturalNews...

Support NaturalNews Sponsors:

Advertise with NaturalNews...

GET SHOW DETAILS
+ a FREE GIFT

Sign up for the FREE Natural News Email Newsletter

Receive breaking news on GMOs, vaccines, fluoride, radiation protection, natural cures, food safety alerts and interviews with the world's top experts on natural health and more.

Join over 7 million monthly readers of NaturalNews.com, the internet's No. 1 natural health news site. (Source: Alexa.com)

Your email address *

Please enter the code you see above*

No Thanks

Already have it and love it!

Natural News supports and helps fund these organizations:

* Required. Once you click submit, we will send you an email asking you to confirm your free registration. Your privacy is assured and your information is kept confidential. You may unsubscribe at anytime.