Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

FBI Probes Possible Voting Software Theft In Maryland.....

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU
 
babsbunny Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-20-06 03:24 PM
Original message
FBI Probes Possible Voting Software Theft In Maryland.....
http://www.rawstory.com/showarticle.php?src=http%3A%2F%2Fwww.washingtonpost.com%2Fwp-dyn%2Fcontent%2Farticle%2F2006%2F10%2F19%2FAR2006101901818_pf.html

Officials Probing Possible Theft of Voting Software in Md.
Ex-Delegate Says FBI Contacted Her About Disks She Received

By Cameron W. Barr
Washington Post Staff Writer
Friday, October 20, 2006; B01



The FBI is investigating the possible theft of software developed by the nation's leading maker of electronic voting equipment, said a former Maryland legislator who this week received three computer disks that apparently contain key portions of programs created by Diebold Election Systems.

Cheryl C. Kagan, a former Democratic delegate who has long questioned the security of electronic voting systems, said the disks were delivered anonymously to her office in Olney on Tuesday and that the FBI contacted her yesterday. The package contained an unsigned letter critical of Maryland State Board of Elections Administrator Linda H. Lamone that said the disks were "right from SBE" and had been "accidentally picked up."

Lamone's deputy, Ross Goldstein, said "they were not our disks," but he acknowledged that the software was used in Maryland in the 2004 elections. Diebold said in a statement last night that it had never created or received the disks.

The disks bear the logos of two testing companies that send such disks to the Maryland board after using the software to conduct tests on Diebold equipment. A Ciber Inc. spokeswoman said the disks had not come from Ciber, and Wyle Laboratories Inc. said it was not missing any disks.

Diebold spokesman Mark Radke and Goldstein said that the labels on the disks referred to versions of the software that are no longer in use in Maryland, although the Diebold statement said the version of one program apparently stored on the disks is still in use in "a limited number of jurisdictions" and is protected by encryption. The statement also said the FBI is investigating the disks' chain of custody.

Michelle Crnkovich, an FBI spokeswoman in Baltimore, said she had no knowledge of an investigation.

In an unrelated development, Maryland state auditors said in a report yesterday that the State Board of Elections is not properly controlling access to a new statewide database of registered voters or verifying what changes are made to it. The report comes at a time of heightened concern over the security and effectiveness of electronic voting systems.

Legislative auditor Bruce Myers said it was unusual to allow "across-the-board access" by local election officials to a sensitive database, but Lamone defended the board's practices. In a letter released with the Office of Legislative Audits report, she wrote that the board "is unaware of any allegations of the falsification of additions or deletions to the system."

The FBI investigation into the disks could focus further scrutiny on the security of Maryland's electronic voting system.

The disks delivered to Kagan's office bear labels indicating that they hold "source code" -- the instructions that constitute the core of a software program -- for Diebold's Ballot Station and Global Election Management System (GEMS) programs. The former guides the operation of the company's touch-screen voting machines; the latter is in part a tabulation program used to tally votes after an election.

Three years ago, Diebold was embarrassed when an activist obtained some of its confidential software by searching the Internet. The company vowed to improve its security procedures to prevent another lapse.

The release of such software poses a risk, computer scientists say, because it could allow someone to discover security vulnerabilities or to write a virus that could be used to manipulate election results.

In September, computer scientists at Princeton University who had obtained a Diebold voting machine demonstrated how a program they had created could secretly alter the votes cast on the machine. Diebold President Dave Byrd called the demonstration "unrealistic and inaccurate" and said it ignored the "physical security" measures used to safeguard voting machines.

The Washington Post obtained copies of the disks Wednesday and allowed Avi Rubin, a computer scientist at Johns Hopkins University, along with a colleague and a graduate student, to review the software on the condition that they make no copies of it.

"I would be stunned if it's not real," Rubin said.

Printer Friendly | Permalink |  | Top
KansDem Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-20-06 03:42 PM
Response to Original message
1. So where are these disks now?
Does the FBI have them? Do Rubin and his team have them? Will they be "locked up" as evidence while the "investigation" continues?

Will they be given back to Diebold?

The former guides the operation of the company's touch-screen voting machines; the latter is in part a tabulation program used to tally votes after an election.--I'm not a computer technician, but I wouldn't think software to simply tally votes would be all that complicated. I would think it wouldn't take too much time to see if the program was capable of "hanky-panky" like vote flipping...
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 09:26 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC