{"id":656,"date":"2006-09-19T03:30:57","date_gmt":"2006-09-19T03:30:57","guid":{"rendered":"https:\/\/www.docbug.com\/blog\/archives\/656"},"modified":"2006-09-19T03:30:57","modified_gmt":"2006-09-19T03:30:57","slug":"diebolds-accuvote-ts-voting-machine","status":"publish","type":"post","link":"https:\/\/www.docbug.com\/blog\/archives\/656","title":{"rendered":"Diebold&#8217;s AccuVote-TS Voting Machine"},"content":{"rendered":"<p>A few days ago <a href=\"http:\/\/www.freedom-to-tinker.com\/?p=1063\">Ed Felton announced<\/a> he and his students had released a <a href=\"http:\/\/itpolicy.princeton.edu\/voting\/\">detailed security analysis of the Diebold AccuVote-TS voting machine<\/a>. The <a href=\"http:\/\/itpolicy.princeton.edu\/voting\/summary.html\">executive summary<\/a> and\/or <a href=\"http:\/\/itpolicy.princeton.edu\/voting\/videos.html\">demonstration video<\/a> is well worth a look, and the <a href=\"http:\/\/itpolicy.princeton.edu\/voting\/ts-paper.pdf\">full research paper<\/a> is a must-read for anyone interested in computer security.<\/p>\n<p>By later that day, the president of <a href=\"http:\/\/www.diebold.com\/dieboldes\/\">Diebold Election Systems<\/a> had issued a <a href=\"http:\/\/www.diebold.com\/dieboldes\/pdf\/princetonstatement.pdf\">rebuttal<\/a>. I&#8217;m a security dabbler, not an expert, but to my semi-trained eye the rebuttal looks like a bunch of smoke. I&#8217;m looking forward to hearing the Princeton authors&#8217; response <b><i>[Update 9\/22: posted <a href=\"http:\/\/www.freedom-to-tinker.com\/?p=1065\">here<\/a>]<\/i><\/b>, but while I&#8217;m waiting for that here&#8217;s my own take on it:<\/p>\n<blockquote>\n<p>September 13, 2006 \u2013 \u201cThree people from the Center for Information Technology Policy and Department of Computer Science at Princeton University today released a study of a Diebold Election Systems AccuVote-TS unit they received from an undisclosed source. The unit has security software that was two generations old, and to our knowledge, is not used anywhere in the country.<\/p>\n<\/blockquote>\n<p>If they really believe their current systems are secure, they should put their machines up for independent external review so groups like Felton&#8217;s wouldn&#8217;t have to rely on leaked code and old machines for testing. I also notice this rebuttal nowhere says &#8220;yes, those <i>were<\/i> security flaws in the machines we distributed back in 2002, but we&#8217;ve fixed them since then.&#8221; And many (though not all) of the security problems cited in the report are inherent in the system&#8217;s basic architecture \u2014 it&#8217;ll take more than a software update to fix them.<\/p>\n<blockquote>\n<p>Normal security procedures were ignored. Numbered security tape, 18 enclosure screws and numbered security tags were destroyed or missing so that the researchers could get inside the unit.<\/p>\n<\/blockquote>\n<p>The main attack the Princeton paper talks about is one where a criminal (possibly working as a poll worker) infects the memory card used to set the list of races and candidates with a virus, or alternatively substitutes the real memory card with an infected one. Then the virus is automatically loaded onto the machine when the election parameters are set \u2014 <i>before<\/i> any numbered security tape is placed. Security tape only protects from a voter trying to infect a machine on election day, not from a substitute when the machines are still being configured for the next day&#8217;s election.<\/p>\n<blockquote>\n<p>A virus was introduced to a machine that is never attached to a network.\u201d<\/p>\n<\/blockquote>\n<p>Remember before the Internet, when viruses were things that were transmitted from floppy to floppy? That&#8217;s what this virus does. And the election definition files and software upgrades are both transmitted via these memory cards, so if an infected machine gets a definition update then any machine that gets the update from that same card afterwards will also get the virus.<\/p>\n<blockquote>\n<p>\u201cBy any standard &#8211; academic or common sense &#8211; the study is unrealistic and inaccurate.\u201d<\/p>\n<\/blockquote>\n<p>I suppose that could be, but he&#8217;s said nothing to make me think it&#8217;s the case.<\/p>\n<blockquote>\n<p>\u201cThe current generation AccuVote-TS software \u2013 software that is used today on AccuVote-TS units in the United States &#8211; features the most advanced security features, including Advanced Encryption Standard 128 bit data encryption, Digitally Signed memory card data, Secure Socket Layer (SSL) data encryption for transmitted results, dynamic passwords, and more.\u201d<\/p>\n<\/blockquote>\n<p>None of these security measures matter for the attacks described in the report. To give an analogy, the Princeton report was all about how Diebold keeps leaving the windows wide open, and this paragraph is bragging about how strong the deadbolt is on the front door.<\/p>\n<blockquote>\n<p>\u201cThese touch screen voting stations are stand-alone units that are never networked together and contain their own individual digitally signed memory cards.\u201d<\/p>\n<\/blockquote>\n<p>This is the first statement that addresses anything in the Princeton report, as the machine they studied did not have digitally-signed memory cards. Assuming he&#8217;s not just, well, lying out his ass, that&#8217;d help against <i>one<\/i> of the attacks they mention. However, as the report points out in section 5.1, there are still many other attacks that are inherent in the design of the Diebold system&#8217;s basic architecture that can&#8217;t be fixed with simple software modifications like this. For example, a criminal could replace the EPROM chip on the motherboard directly.<\/p>\n<blockquote>\n<p>\u201cIn addition to this extensive security, the report all but ignores physical security and election procedures. Every local jurisdiction secures its voting machines &#8211; every voting machine, not just electronic machines. Electronic machines are secured with security tape and numbered security seals that would reveal any sign of tampering.\u201d<\/p>\n<\/blockquote>\n<p>Actually, they talk about the physical security and election procedures at length in their report. For example, they point to a <a href=\"http:\/\/bocc.cuyahogacounty.us\/GSC\/pdf\/esi_cuyahoga_final.pdf\">recent study of the AccuVote DRE election processes<\/a> showing that more than 15% of polling places reported at least one problem with seals (see <a href=\"http:\/\/bocc.cuyahogacounty.us\/GSC\/pdf\/esi_cuyahoga_final.pdf\">Figure III-16, p. 67<\/a>). They also point out the difficulty in dealing with an attack where a voter simply unlocks the machine and does nothing more than <i>break the seal<\/i>, in an attempt to invalidate votes cast in a district that tends to favor his opponent. And, just to add insult to injury, Felton today posted that the lock on the Diebold voting machines can be <a href=\"http:\/\/www.freedom-to-tinker.com\/?p=1064\">opened by a hotel minibar key<\/a>. Some physical security.<\/p>\n<blockquote>\n<p>\u201cDiebold strongly disagrees with the conclusion of the Princeton report. Secure voting equipment, proper procedures and adequate testing assure an accurate voting process that has been confirmed through numerous, stringent accuracy tests and third party security analysis.\u201d<\/p>\n<\/blockquote>\n<p>&#8220;Third party&#8221; in this case still means companies hired by the manufacturer, and reporting directly to the manufacturer. The system isn&#8217;t made available for truly independent security analysis.<\/p>\n<blockquote>\n<p>\u201cEvery voter in every local jurisdiction that uses the AccuVote-TS should feel secure knowing that their vote will count on Election Day.\u201d<\/p>\n<\/blockquote>\n<p>Translation: nothing to see here, please pay no attention to the huge gaping hole in our security and our reputation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few days ago <a href=\"http:\/\/www.freedom-to-tinker.com\/?p=1063\">Ed Felton announced<\/a> he and his students had released a <a href=\"http:\/\/itpolicy.princeton.edu\/voting\/\">detailed security analysis of the Diebold AccuVote-TS voting machine<\/a>. The <a href=\"http:\/\/itpolicy.princeton.edu\/voting\/summary.html\">executive summary<\/a> and\/or <a href=\"http:\/\/itpolicy.princeton.edu\/voting\/videos.html\">demonstration video<\/a> is well worth a look, and the <a href=\"http:\/\/itpolicy.princeton.edu\/voting\/ts-paper.pdf\">full research paper<\/a> is a must-read for anyone interested in computer security.<\/p>\n<p>By later that day, the president of <a href=\"http:\/\/www.diebold.com\/dieboldes\/\">Diebold Election Systems<\/a> had issued a <a href=\"http:\/\/www.diebold.com\/dieboldes\/pdf\/princetonstatement.pdf\">rebuttal<\/a>. I&#8217;m a security dabbler, not an expert, but to my semi-trained eye the rebuttal looks like a bunch of smoke. I&#8217;m looking forward to hearing the Princeton authors&#8217; response <b><i>[Update 9\/22: posted <a href=\"http:\/\/www.freedom-to-tinker.com\/?p=1065\">here<\/a>]<\/i><\/b>, but while I&#8217;m waiting for that here&#8217;s my own take on it:<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[15],"tags":[],"class_list":["post-656","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/posts\/656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/comments?post=656"}],"version-history":[{"count":0,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/posts\/656\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/media?parent=656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/categories?post=656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/tags?post=656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}