They were disturbingly successful. It was an "easy matter," they reported, to reprogram the access cards used by voters and vote multiple times. They were able to attach a keyboard to a voting terminal and change its vote count. And by exploiting a software flaw and using a modem, they were able to change votes from a remote location.Memo to Chicken Little: Sometimes the sky really is falling. And sometimes democracy really is in peril, if not from malice then from malfeasance.
Critics of new voting technology are often accused of being alarmist, but this state-sponsored study contains vulnerabilities that seem almost too bad to be true. Maryland's 16,000 machines all have identical locks on two sensitive mechanisms, which can be opened by any one of 32,000 keys. The security team had no trouble making duplicates of the keys at local hardware stores, although that proved unnecessary since one team member picked the lock in "approximately 10 seconds." ...
The Maryland study confirms concerns about electronic voting that are rapidly accumulating from actual elections. In Boone County, Ind., last fall, in a particularly colorful example of unreliability, an electronic system initially recorded more than 144,000 votes in an election with fewer than 19,000 registered voters, County Clerk Lisa Garofolo said. Given the growing body of evidence, it is clear that electronic voting machines cannot be trusted until more safeguards are in place.
Sunday, February 01, 2004
How touching
Not long ago, Maryland decided to buy 16,000 touch-screen voting machines made by Diebold Election Systems. In response to concerns about possible vote theft, the state hired computer-security experts to see if they could disrupt a proper vote count. A New York Times editorial for January 31 has the result.
Labels:
Constitutional rights,
voting issues
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment