
As WND reported in January, a hacker, using a photograph of keys to a Diebold touch-screen voting system available on the company's website, successfully duplicated two that were capable of opening the electronic balloting device now used in many states for elections. Concerns over the security of Sequoia's voting systems increased last October when it was revealed the federal government was investigating whether anti-American Venezuelan President Hugo Chavez controlled Smartmatic, owner of Sequoia Voting Systems, the company that operates electronic voting machines in 17 states. UC researchers in the California test "were able to bypass physical and software security in every machine they tested," said Bowen. . . . However, Seiler, a former Diebold sales representative, said the study did not go far enough and insisted researchers did not look for malicious code already embedded in the software that could be used to change votes. Ken Karan, co-founder of Psephos, a voting-rights advocate group long critical of San Francisco's use of Diebold's equipment, felt vindicated with the new findings.
"It appears to me the veneer of security has evaporated," he said. Despite the review being conducted under favorable conditions for the hacker teams, Bishop said he was surprised by the voting systems' weak physical and electronic security measures. His researchers were able to find their way into the systems through high-tech equipment in election headquarters and through the machines in the polling places. "The vendors appeared to have designed systems that were not high assurance (of security)," he told the Chronicle. "The security seems like it was added on." . . . [Read More] Editor Comment: Thanks for the lead on this story from RicGator's Blog
Tags: elections, fraud, voting, voting machines, voting rights To share or post to your site, click on "Post Link". Please mention / link to the ARRA News Service. Thanks!
0 comments:
Post a Comment