Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

There is Nothing Wrong with the touch-screen vote machines

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU
 
LibertyorDeath Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:07 PM
Original message
There is Nothing Wrong with the touch-screen vote machines

There is Nothing Wrong with the touch-screen vote machines

When the vote is switched it is ALWAYS from Dem to Repub

The machines are working as programed.




Printer Friendly | Permalink |  | Top
KittyWampus Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:08 PM
Response to Original message
1. meanwhile ACORN ACORN ACORN
Printer Friendly | Permalink |  | Top
 
LibertyorDeath Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:20 PM
Response to Reply #1
9. Someone needs to Smack Lou Dobbs & CNN

hard about their ACORN fetish!
Printer Friendly | Permalink |  | Top
 
Matariki Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:08 PM
Response to Original message
2. Indeed. From the companies who make perfectly fine ATM machines
You know damn well it's not some sort of 'accident'.
Printer Friendly | Permalink |  | Top
 
LibertyorDeath Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:13 PM
Response to Reply #2
7. I use Diebold ATM's all the time

Never had a problem not one single problem in all the years

I've used them.

The touchscreen voting system by Diebold works as programed. IMO

and always in the Republicans favor.

Printer Friendly | Permalink |  | Top
 
Sebastian Doyle Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:52 PM
Response to Reply #7
14. Wouldn't surprise me if their ATM's are doing something screwy too.
Maybe the reason why all the banks are failing is those Diebold ATM's are skimming money from the accounts directly into Repuke party treasuries.

Remember that Superman movie where Richard Pryor programmed the bank computer to transfer all the half-cents to a different account?
Printer Friendly | Permalink |  | Top
 
fascisthunter Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:09 PM
Response to Original message
3. GOP=Election Fraud
ACORN is their diversion....
Printer Friendly | Permalink |  | Top
 
AlCzervik Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:09 PM
Response to Original message
4. we have the fill in bubble ballots where i vote but we used to have punch cards
those i miss.
Printer Friendly | Permalink |  | Top
 
EFerrari Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:10 PM
Response to Original message
5. Exactly.
Printer Friendly | Permalink |  | Top
 
TexasObserver Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:11 PM
Response to Original message
6. I hope you're being facetious.
Edited on Sat Oct-18-08 04:13 PM by TexasObserver


Printer Friendly | Permalink |  | Top
 
LibertyorDeath Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:14 PM
Response to Reply #6
8. 100%

Printer Friendly | Permalink |  | Top
 
Inuca Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:22 PM
Response to Original message
10. And on a serious and more encouraging note
the Diebold touch screen on which I voted in the primary HAD a paper trail. Each screen was printed on a roll of paper similar to store cash registers and you could verify it before moving to the next screen. Must also add though that the little window through which you could verify the printed record was not at all obvious, but it was there.
Printer Friendly | Permalink |  | Top
 
LibertyorDeath Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:40 PM
Response to Reply #10
11. Better than not having it

"the Diebold touch screen on which I voted in the primary HAD a paper trail"

Printer Friendly | Permalink |  | Top
 
quantass Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:51 PM
Response to Reply #10
13. Sadly the machine can just print out what you want to see but store the opposite...
Not sure if one can veirfy there cast vote online when you get home because although you can compare the printout with what is on screen it certainly doesnt mean that is waht is stored in memory.
Printer Friendly | Permalink |  | Top
 
Inuca Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 06:56 PM
Response to Reply #13
23. True, but it means there is a paper trail
So:
1. it's verifiable
2. much less likely to have hanky-panky with the machine when it is known that there is a way to verify
Printer Friendly | Permalink |  | Top
 
99th_Monkey Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:50 PM
Response to Original message
12. Dupe ~ Deleted
Edited on Sat Oct-18-08 04:55 PM by Impeachment_Monkey
Printer Friendly | Permalink |  | Top
 
99th_Monkey Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:52 PM
Response to Original message
15. There really IS nothing wrong with these machines ...
... that a sledge hammer wouldn't fix.

Remember that guy in '04 who thrashed his Diebold voting machine with a metal sculpture of a black cat?
Printer Friendly | Permalink |  | Top
 
althecat Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 04:56 PM
Response to Original message
16. Excellent post.......
:kick:

Nothing wrong with em at all.... queuing is good for community spirit. Since Ohio in 2004 there have been demonstrably more decent parties throughout Cuyahoga county.
Printer Friendly | Permalink |  | Top
 
LibertyorDeath Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 05:03 PM
Response to Reply #16
17. I heard you can request a paper ballot in Ohio this year

Do you know if this is true?
Printer Friendly | Permalink |  | Top
 
althecat Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 05:06 PM
Response to Reply #17
18. Why... there is nothing wrong with the machines....
What do you want paper for?
Printer Friendly | Permalink |  | Top
 
d_b Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 05:36 PM
Response to Reply #18
19. lol
said the poll woman with the michelle bachman stare.
Printer Friendly | Permalink |  | Top
 
LibertyorDeath Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 08:28 PM
Response to Reply #18
24. They are programed to steal votes
Democratic votes

and that's exactly what they do.

So technically they are working as programed.

Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 05:39 PM
Response to Original message
20. Some studies on electronic voting:
Examples of Voting System Vulnerabilities and Problems
• Cast ballots, ballot definition files, and audit logs
could be modified.
• Supervisor functions were protected with weak
or easily guessed passwords.
• Systems had easily picked locks and power
switches that were exposed and unprotected.
• Local jurisdictions misconfigured their
electronic voting systems, leading to
election day problems.
• Voting systems experienced operational
failures during elections.
• Vendors installed uncertified electronic
voting systems.
Source: GAO analysis of recent reports and studies.

http://www.gao.gov/highlights/d05956high.pdf

Security Analysis of the Diebold AccuVote-TS Voting Machine
Ariel J. Feldman, J. Alex Halderman, and Edward W. Felten — September 13, 2006

Abstract This paper presents a fully independent security study of a Diebold AccuVote-TS voting machine, including its hardware and software. We obtained the machine from a private party. Analysis of the machine, in light of real election procedures, shows that it is vulnerable to extremely serious attacks. For example, an attacker who gets physical access to a machine or its removable memory card for as little as one minute could install malicious code; malicious code on a machine could steal votes undetectably, modifying all records, logs, and counters to be consistent with the fraudulent vote count it creates. An attacker could also create malicious code that spreads automatically and silently from machine to machine during normal election activities — a voting-machine virus. We have constructed working demonstrations of these attacks in our lab. Mitigating these threats will require changes to the voting machine's hardware and software and the adoption of more rigorous election procedures.
Full research paper (Workshop version )

http://itpolicy.princeton.edu/voting/

Study: Hackers Could Change E-Voting Machine Results

By Erika Morphy
TechNewsWorld
07/30/07 12:35 PM PT

University researchers have demonstrated multiple ways of compromising all three of the electronic voting machine systems certified for use in California. The hacks could result in hijacking machines and altering election results, they claim. Although the system vendors have issued a detailed rebuttal of the study, critics are calling for an investigation into the e-voting certification process.

A test of three electronic voting systems certified for use in California has uncovered serious security flaws. Researchers at the University of California conducted the tests at the behest of Secretary of State Debra Bowen under a US$1.8 million contract.

Their mission was to try to compromise the integrity of the voting systems provided by Diebold Elections Systems, Hart Intercivic and Sequoia Voting Systems. They not only succeeded in breaching all of the systems, but also concluded there were likely more security problems that they did not have time to explore during the limited time frame of the study.


Three Vendors, Numerous Failures

What they did find was worrisome enough.

-snip

http://www.technewsworld.com/story/58572.html



Pull The Plug
Aviel Rubin 09.04.06, 12:00 AM ET



-snip


Consider one simple mode of attack that has already proved effective on a widely used DRE, the Accuvote made by Diebold (nyse: DBD - news -people ). It's called overwriting the boot loader, the software that runs first when the machine is booted up. The boot loader controls which operating system loads, so it is the most security-critical piece of the machine. In overwriting it an attacker can, for example, make the machine count every fifth Republican vote as a Democratic vote, swap the vote outcome at the end of the election or produce a completely fabricated result. To stage this attack, a night janitor at the polling place would need only a few seconds' worth of access to the computer's memory card slot.

Further, an attacker can modify what's known as the ballot definition file on the memory card. The outcome: Votes for two candidates for a particular office are swapped. This attack works by programming the software to recognize the precinct number where the machine is situated. If the attack code limits its execution to precincts that are statistically close but still favor a particular party, it goes unnoticed.

One might argue that one way to prevent this attack is to randomize the precinct numbers inside the software. But that's an argument made in hindsight. If the defense against the attack is not built into the voting system, the attack will work, and there are virtually limitless ways to attack a system. And let's not count on hiring 24-hour security guards to protect voting machines.

DREs have a transparency problem: You can't easily discover if they've been tinkered with. It's one thing to suspect that officials have miscounted hanging chads but something else entirely for people to wonder whether a corrupt programmer working behind the scenes has rigged a computer to help his side.



Aviel Rubin, professor of computer science at Johns Hopkins University and author of Brave New Ballot: The Battle To Safeguard Democracy In The Age Of Electronic Voting.

-snip

http://www.forbes.com/forbes/2006/0904/040.html?partner=alerts&_requestid=2972



Voting Technology

After the 2000 election and the passage of the Help America Vote Act of 2002, states moved to modernize election administration by retiring antiquated lever and punch-card voting machines and implementing new electronic voting machines. Electronic voting machines have not been the panacea to vote-counting woes that many had hoped they would be. Until recently, there has been surprisingly little empirical study on electronic voting systems in the areas of security, accessibility, usability, and cost. The result is that jurisdictions are making purchasing decisions and are adopting laws and procedures that do little to promote these goals.

In 2006, the Brennan Center released two comprehensive, empirical analyses of electronic voting systems in the United States, The Machinery of Democracy: Protecting Elections in an Electronic World and The Machinery of Democracy: Voting System Security, Accessibility, Usability, and Cost. The Brennan Center continued its study of electronic voting security in Post-Election Audits: Restoring Trust in Elections. Since the Brennan Center initiated its study of electronic voting, it has been called upon to provide expert testimony before Congress and to assist election officials in developing procedures that promote secure and reliable voting systems.

-snip

http://www.brennancenter.org/content/section/category/voting_technology/




The Evaluation & Validation of Election-Related Equipment, Standards & Testing report, known as EVEREST, is a comprehensive review of voting systems revealing startling findings on voting machines and systems used in Ohio and throughout the country. The Ohio study tested the systems for:
- risks to vote security,
- system performance, including load capacity,
- configuration to currently certified systems specifications, and
- operations and internal controls that could mitigate risk.

The $1.9 million study, paid for using federal funds, was structured to allow two teams of scientists, corporate and academic, to conduct parallel assessment of the security of the state’s three voting systems - Election Systems & Software (ES&S), Hart Intercivic and Premier Election Solutions (formerly Diebold) - in both voting and board of elections environments. Separate research was conducted on each voting system’s performance, configuration and operations and internal controls management. A bipartisan team of 12 election board directors and deputy directors advised the study and evaluated all reports, participating with the secretary in making recommendations for change.

-snip

http://www.sos.state.oh.us/SOS/elections/voterInformation/equipment/VotingSystemReviewFindings.aspx
Printer Friendly | Permalink |  | Top
 
1776Forever Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 05:40 PM
Response to Original message
21. Heard that! I lived near the guy that first testified on this in Florida - Clint Curtis .. Link..
http://www.bradblog.com/?p=3648

The guy has ran twice now against Feeney (one of the Repub's that went with Abramoff and Delay to the golf outing in Scotland in 2003). I wish him the best! He has been relentless in getting the word out even to his own safety!

Here's more on Feeney's trip:

http://tpmmuckraker.talkingpointsmemo.com/archives/003092.php
Printer Friendly | Permalink |  | Top
 
Kurovski Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-18-08 05:47 PM
Response to Original message
22. There is nothing wrong that a sledgehammer and prison time won't fix.
But you are of course 100% correct, and so you get a K&R.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 26th 2024, 02:21 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC