Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

San Diego's Diebold Election Software 'Lost in Transit'

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
cascadiance Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-19-07 08:50 PM
Original message
San Diego's Diebold Election Software 'Lost in Transit'
Edited on Wed Dec-19-07 08:53 PM by calipendence
It seems like the corruption down here doesn't stop... Brad Blog just put up a report that the newer Diebold chips with security fixes that were FedExed to San Diego's Voter Registrar's office didn't arrive. There was an empty box instead. We need to make sure that we keep the voting machines OUT of this state for these coming elections! The crime syndicate knew they had to rev stuff to work around the new security that was forced onto them!

These are the chips for the optical scan machines that scan our newly mandated paper ballots! Perhaps we should now have a MANDATED hand count for every precinct using Diebold machines as a result and bill Diebold for the cost! If Diebold doesn't like it, tell them to sue Fedex for not securing their shipments properly!

From:
http://www.bradblog.com/?p=5462

BLOGGED BY John Gideon ON 12/19/2007 3:31PM
San Diego's Diebold Election Software 'Lost In Transit'
EPROM Chips Fed-Exed from CA Secretary of State Turn Up Missing, Package Arrives Empty
Police Are Investigating...


Guest Blogged by John Gideon of VotersUnite.org

Two shipping tubes sent from the California Secretary of State's office in Sacramento to the San Diego County Election Office arrived without their contents. The tubes left the SOS Office with more than 174 memory chips, or Erasable Programmable Read Only Memory (EPROM), containing firmware for the county's Diebold/Premier central-count optical scan voting machines.

The tubes arrived in San Diego but they were empty. The chips are now considered to be either lost or stolen.

WIRED's Kim Zetter reports today...

Two cardboard shipping tubes containing more than 174 EPROMs loaded with voting machine software were sent via Federal Express from the secretary of state's office in Sacramento last week to election officials in more than a dozen California counties that use optical-scan voting machines made by Diebold Election Systems. But two shipping tubes arrived empty to one county on Monday.

In San Diego County, one of the empty tubes arrived with no lid on the end of it to close the tube; the second tube had a lid, but it was loosely taped shut.


According to Zetter, the new firmware was being sent to San Diego following software and security modifications made following the state's recent "Top-to-Bottom Review" of e-voting systems. The packages were sent from the Secretary of State's office after being packaged by Diebold/Premier employees with SoS personnel standing witness.

New chips will now be sent and the state says the February primary will not be delayed by the issue. The California

...

Printer Friendly | Permalink |  | Top
Rex Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-19-07 08:51 PM
Response to Original message
1. Ooops...
Nothing to see here, go shopping. Thanks.
Printer Friendly | Permalink |  | Top
 
sam sarrha Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-19-07 09:26 PM
Response to Reply #1
5. i smell a medal of freedom.....
Printer Friendly | Permalink |  | Top
 
HysteryDiagnosis Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-19-07 09:00 PM
Response to Original message
2. Eproms are hardware, they need a file to be "burnt" into them in
order for them to be useful, the files that were burned into these chips exist though no one may want to talk about that reality. Yes, go shopping, nothing to see here.

http://www.usenix.org/events/evt07/tech/full_papers/feldman/feldman_html/
2.2 Injecting Attack Code

To carry out these attacks, the attacker must somehow install his malicious software on one or more voting machines. If he can get physical access to a machine for as little as one minute, he can use attacks discovered by Hursti <18> to install the software manually. The attacker can also install a voting machine virus that spreads to other machines, allowing him to commit widespread fraud even if he only has physical access to one machine or memory card.
2.2.1 Direct Installation

An attacker with physical access to a machine would have at least three methods of installing malicious software. The first is to create an EPROM chip containing a program that will install the attack code into the machine's flash memory, and then to open the machine, install the chip on its motherboard, and reboot from the EPROM.5

The second method is to exploit a back door feature in Diebold's code, first discovered by Hursti. This method allows the attacker to manually install attack software from a memory card. When the machine boots, it checks whether a file named explorer.glb exists on the removable memory card. If such a file is present, the machine boots into Windows Explorer rather than Diebold's BallotStation election software. An attacker could insert a memory card containing this file, reboot the machine, and then use Explorer to copy the attack files onto the machine or run them directly from the card. <18>

The third method exploits a service feature of the machine's bootloader, also discovered by Hursti. On startup, the machine checks the removable memory card for a file named fboot.nb0. If this file exists, the machine replaces the bootloader code in its on-board flash memory with the file's contents. An attacker could program a malicious bootloader, store it on a memory card as fboot.nb0, and reboot the machine with this card inserted, causing the Diebold bootloader to install the malicious software <18>. (A similar method would create a malicious operating system image.)

The first method requires the attacker to remove several screws and lift off the top of the machine to get access to the motherboard and EPROM. The other methods only require access to the memory card slot and power button, which are both behind a locked door on the side of the machine.6 The lock is easily picked—one member of our group, who has modest locksmithing skills, can pick the lock consistently in less than 10 seconds. Moreover, in their default configuration, all AccuVote-TS machines can be opened with the same key <4>, and copies of this key are not difficult to obtain. The particular model of key that the AccuVote-TS uses is identified by an alphanumeric code printed on the key. A Web search for this code reveals that this exact key is used widely in office furniture, jukeboxes, and hotel mini bars, and is for sale at many online retailers. We purchased copies of the key from several sources and confirmed that they all can open the machine.
Printer Friendly | Permalink |  | Top
 
sam sarrha Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-19-07 09:23 PM
Response to Original message
3. i have heard that that thae optical paper can be printed with ultra violet ink and it will trip the
results.. not sure if its true.., it was in a discussion last election
Printer Friendly | Permalink |  | Top
 
sam sarrha Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-19-07 09:25 PM
Response to Original message
4. hasn't California proved that all the different machines used there can be hacked.. ??
read an article just the other day about the third type failing
Printer Friendly | Permalink |  | Top
 
hunter Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-19-07 09:35 PM
Response to Original message
6. Okay. Right.
I hope somebody is watching. We wouldn't want any of the disappeared eproms showing up in these machines.

That's always been the problem -- it only takes a magician's sleight of hand to change the software or the votes.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 08:48 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC