[ISN] Test shows voter fraud is possible
InfoSec News
isn at c4i.org
Mon Jun 6 12:21:57 EDT 2005
http://www.tallahassee.com/mld/tallahassee/news/local/11811936.htm
By Tony Bridges
DEMOCRAT STAFF WRITER
June 04, 2005
All it takes is the right access.
Get that, and an election worker could manipulate voting results in
the computers that read paper ballots - without leaving any digital
fingerprints.
That was the verdict after Leon County Elections Supervisor Ion Sancho
invited a team of researchers to look for holes in election software.
The group wasn't able to crack the Diebold system from outside the
office. But, at the computer itself, they changed vote tallies,
completely unrecorded.
Sancho said it illustrates the need for tight physical security, as
well as a paper trail that can verify results, which the Legislature
has rejected.
Black Box Voting, the non-profit that ran the test and published a
report on the Internet, pointed to the findings as proof of an
elections system clearly vulnerable to corruption.
But state officials in charge of overseeing elections pooh-poohed the
test process and dismissed the group's report.
"Information on a blog site is not viable or credible," said Jenny
Nash, a spokeswoman for the Department of State.
It went like this:
Sancho figured Leon County's security could withstand just about any
sort of probing and wanted to prove it.
He went to one of the most skeptical - and vocal - watchdogs of
election procedures. Bev Harris, founder of Black Box Voting, had
experience with voting machines across the country.
She recruited two computer-security experts and made the trip to
Tallahassee from her home in Washington state three times between
February and late May.
Leon County is one of 30 counties in Florida that use Diebold optical
scanners. Voters darken bubbles on a sheet of paper, sort of like
filling in the answers on the SAT, and the scanners read them and add
up the numbers.
So the task was simple. Get in, tamper with vote numbers, and get out
clean.
They made their first attempts from outside the building. No success.
Then, they sat down at the vote-counting computers, the sort of access
to the machines an employee might have. For the crackers, security
protocols were no problem, passwords unnecessary.
They simply went around them.
After that, the security experts accomplished two things that should
not have been possible.
They made 65,000 votes disappear simply by changing the real memory
card - which stores the numbers - for one that had been altered.
And, while the software is supposed to create a record whenever
someone makes changes to data stored in the system, it showed no
evidence they'd managed to access and change information.
When they were done, they printed the poll tapes. Those are paper
records, like cash register tape, that show the official numbers on
the memory cards.
Two tapes, with different results. And the only way to tell the fake
one?
At the bottom, it read, "Is this real? Or is it Memorex?"
"That was troubling," Sancho said.
Leon County more secure
A disaster?
Not exactly.
In Leon County, access to the machines is strictly controlled, limited
to a single employee. The memory cards are kept locked away, and
they're tracked by serial number.
Those precautions help prevent any tampering.
"You've got to have security over the individual who's accessing the
system," Sancho said. In fact, "you've got to have good security and
control over every step of this process."
The trouble is, not every county is as closely run.
In Volusia County, her group has found what they think was memory-card
tampering during the 2000 election. More than 16,000 votes for Al Gore
vanished.
Harris said her research turned up memos - obtained from the elections
supervisor's office - that blamed the failure on an extra memory card
that showed up, and disappeared, without explanation.
She believes that was an attempt to change the outcome of the
election, but one carried out clumsily. The test in Leon County proved
it was possible, if done by more experienced computer programmers, she
said.
So what does the Department of State say?
Nash, the spokeswoman, said that the Diebold systems were designed to
be used in secure settings, and that, by giving the testers direct
access to the computers, Sancho had basically allowed them to bypass
security.
In other words, not much of a test.
Except that the security experts were given only as much opportunity
as any other election worker would have. Less so, considering that
Sancho did not provide them with passwords or any other way to
actually get into the programming.
As for the exact vulnerabilities that Harris reported - and Sancho
confirmed - Nash said no one from the state could comment, since they
hadn't been present at the test.
She added later that Sancho could request help from state certifiers
if he had concerns, but had not asked yet.
To read the entire report, visit www.BlackBoxVoting.org.
Ion Sancho, supervisor of elections, will post a summary of the test
results this weekend at www.leonfl.org/elect/
More information about the ISN
mailing list