Too Much Work To Test E-Voting Machines For Security?
from the you-stop-when-it's-secure dept
As the problems with Maryland's e-voting system keep getting attention, along with reports of just how hackable many of these machines are, it looks like one county in California just doesn't want to bother with doing a full security test before approving the machines. They did have a test that just looked at the security of the voting process (which found some problems), but did not bother to test to see if the machines were hackable -- which you would think would be a big deal. However, when challenged on this, the elections official stated: "I'm sure it's true more testing could be done. I'm not sure where it ends." This seems like an odd statement for someone in charge of running a fair election. First of all, the testing should never end. If there's any vulnerability at all, they should want to know about it so that it can be corrected (or the machines can be scrapped). But, something as basic as testing to see if the machines can be hacked doesn't seem like an extraordinary request -- especially given all of the other reports of how easy it is to hack some e-voting machines. The response seems to be that the machines won't be hackable because of security tape and tags -- but it's already been shown that (at least on other e-voting machines), they don't do very much.Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Reader Comments
Subscribe: RSS
View by: Time | Thread
Test, Test and more Test..
As an Engineer, I can speak from the other side where marketing will joke its time to shoot the engineer and ship the product. You are never satisfied that the system has been fully tested, so the final, last test is to ship to the customer. The customer becomes the live tester.
[ link to this | view in chronology ]
Doesn't really matter...
I'd like to see someone rig a voting machine for a Independent, then there would be a full investigation!
[ link to this | view in chronology ]
OK, so you put security tape and tags on the machines, the memory slots, etc, so that you can identify whether any of the machines have been tampered with. So what do you do when you detect tampering? You obviously can't trust the votes on that machine anymore, so do you throw them all out? If you do, not only have you discarded the fraudulent votes, but you have also likely discarded a significant number of legitimate votes. Every person who used that machine to vote would have been disenfranchised.
More to the point, that's an even easier way to throw an election than actually hacking the machine. A single person from Party A could conceivably work at a polling station (or vote at one) in a precinct that traditionally votes heavily for Party B, and by tampering with security tape create the appearance that votes have been manipulated. Using that method, they could conceivably get all of the votes of that precint thrown out, which could definitely throw an election one way or another, especially if such efforts are wide spread.
You can't just say "that's good enough." The people who want to rig elections certainly don't, and so like any other security effort it will require constant vigilance, testing, and improvement to prevent fraud.
[ link to this | view in chronology ]
leave them as is
[ link to this | view in chronology ]
OS voting machines
SimonTek at gmail dot com if you want to contact me on the idea.
[ link to this | view in chronology ]
Rolling Stone had an article about the company
http://www.rollingstone.com/politics/story/11717105/robert_f_kennedy_jr__will_the_next_electi on_be_hacked/print
[ link to this | view in chronology ]
Do something about it
[ link to this | view in chronology ]
Don't worry
At least it will be this year.
[ link to this | view in chronology ]
HTP
Okay, fucktard, yes, you, up there.... Get a clue, either put up or shut up. Build a better mouse trap and the world will beat a path to your door, right? In other words, quit whinning about it, and build one that is secure!!!
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]