You are viewing an obsolete version of the DU website which is no longer supported by the Administrators. Visit The New DU.
Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Reply #15: Debugging Election Codes [View All]

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Topic Forums » Election Reform Donate to DU
Melissa G Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-11-08 03:14 PM
Response to Reply #2
15. Debugging Election Codes
Debugging Election Codes By Paul Spinrad
Are electronic voting machines secure?
No, says EECS professor David Wagner.

Before Congress passed the Help America Vote Act (HAVA) in 2002, voting machines were a low-profit niche product. But HAVA allocated more than $3.8 billion in federal funds to upgrade voting systems nationwide and to be spent within three years. It was a bonanza for voting machine vendors, who convinced most counties to replace their old, low-status paper-based systems with shiny new touchscreens. But they are not secure, and thanks to a report co-authored by Wagner, California now leads a growing multi-state movement to eliminate their potential threat to democracy and ensure accurate elections in the future.


EECS professor David Wagner considers the security issues for voting machines. Photo credit: Peg Skorpinski The machines were questioned almost immediately by grassroots activists like Bev Harris, whose Black Box Voting blog gathered news and focused concern about the machines’ trustworthiness. Soon, researchers and hackers discovered that, among other vulnerabilities, voting machines could be opened with ordinary keys from hotel mini-bars, and their vote counts could then be changed undetectably by simply swapping out their memory cards. In other words, any poll worker, driver, night watchman or other individual with unsupervised access to the machines could throw the results of a close election.

Wagner, a computer security expert, explains that the main problem with current voting machines is that they are built on top of standard, non-secure computer hardware and operating systems. To ensure proper security for something as important as a voting machine, the security must be designed into the system from the ground up. Superficially, voting machines seem like ATMs, which are a solved problem; ATMs handle huge numbers of interactions, dispense paper receipts and can be audited. But what makes voting machines much more difficult, Wagner explains, is the secret ballot. A trustworthy electronic voting system must break the link between the voter and votes in a way that cannot be reversed.
http://innovations.coe.berkeley.edu/vol2-issue3-mar08/electioncodes
Printer Friendly | Permalink |  | Top
 

Home » Discuss » Topic Forums » Election Reform Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC