Contributors
Links
Sunday, July 02, 2006
Study: All Electronic Voting Machines Vulnerable to Software Attacks
A major new report on electronic voting by the Brennan Center for Justice has concluded that the three most common types of electronic voting machines are all vulnerable to software attacks. We speak with the chair of the Brennan Center Task Force on Voting System Security.
With the mid-term elections less than five months away, the battle over Congress is heating up across the country. Will Democrats retake the House and Senate? Or will Republicans retain control? Everything comes down to one day in November, when millions of Americans cast their votes. But will your vote really count? Consider this: A single person with technical knowledge could alter the outcome of an election by tampering with the software used by electronic voting machines.
That's one of the findings of a major new report on electronic voting. The study conducted by the Brennan Center for Justice concluded that the three most common types of electronic voting machines are all vulnerable to software attacks that could threaten the integrity of a state or national election. The year-long study is considered the most comprehensive ever done on electronic voting.
Lawrence Norden, Associate Counsel with the Brennan Center for Justice. For the past year he has led the center's voting technology assessment project. He is the lead author of their new report "The Machinery of Democracy: Security, Accessibility, Usability, Cost."
* * * * * * * *
AMY GOODMAN: Lawrence Norden, the author of the report, joins us now. He is Associate Counsel with the Brennan Center for Justice. For the past year, he's led the Center’s voting technology assessment project. The report is called “The Machinery of Democracy: Security, Accessibility, Usability and Cost." Welcome to Democracy Now!
LAWRENCE NORDEN: Thanks very much for having me.
AMY GOODMAN: Your major findings are shocking. Go through them.
LAWRENCE NORDEN: Well, first of all, we did find that there are serious vulnerabilities in electronic voting machines. What we also found, importantly, was that there are relatively simple and straightforward ways to make those systems substantially more secure, to remedy the vulnerabilities that we found that we were most concerned about, but that unfortunately right now very few jurisdictions have those remedies in place.
JUAN GONZALEZ: Now, explain the vulnerabilities and also the different voting systems, different companies that produce them, in terms of what you found with each of them, if at possible.
LAWRENCE NORDEN: Sure. Something that was different about, I think, this report, as opposed to previous reports on electronic voting machines that have come out, is that we weren't looking at specific anecdotes or focusing on one particular vendor. What we were doing is looking at all of the major electronic voting systems. This is a new architecture. Something like 50% of Americans are voting on new machines over the past few years, and they require new security measures. So one of the systems that many people will be using across the country are what are called optical scan machines. These are machines where you fill in a ballot, as you might fill in in an SAT exam, and you then scan that ballot electronically. It’s read electronically, and the vote total is electronically recorded in the machine. And the other machine that many people are familiar with are the touch screens, the DREs. And these are like ATM machines or computer screens that a voter presses directly onto the machine to record her vote. Again, stored electronically. In some cases these have paper trails, where voters can check to see that their vote was recorded correctly. In other cases there are no paper records. What we found is that in all cases, for all of these systems, there are enough points of vulnerability, there is enough access, that somebody could insert a software-type program and reach enough machines, so that they could potentially change the votes on the machines, shut down the machines, do other things like this. Now, again, I want to emphasize that there are things that can be done to prevent this to make this much more difficult.
AMY GOODMAN: You talk about the wireless components of machines, that they're particularly vulnerable. What do you mean?
LAWRENCE NORDEN: Yeah. We found that wireless -- having a wireless component on a machine makes it much more vulnerable to attack. And the reason is that if there's a wireless component, somebody can walk into a polling place, any member of the public, if the wireless system is strong enough, even from outside of a polling place --
AMY GOODMAN: And explain what you mean by “wireless component.”
LAWRENCE NORDEN: A wireless component is a component that will receive a wireless signal from something like a PDA, a Blackberry or some other device like that, that many of us have, that can send a signal to another wireless device. And the problem with that is it makes it -- first of all, it allows a general member of the public to partake in the attack -- they don't need specific access to the machine -- and they can reach many more machines at once. Instead of having to somehow get to each machine separately, go to different polling places, they can very quickly target a number of machines. And one of the things that we found is the fewer people that you have that need to be involved in the attack, the easier it's going to be.
JUAN GONZALEZ: And do you have any sense of what percentage of machines, for instance, employ wireless technology around the country?
LAWRENCE NORDEN: Yeah. Right now there are still vendors that are manufacturing machines with wireless components. I should say this is a very small percentage now nationwide. Unfortunately, the standards for voting systems have not banned them, and only two states in the country are banning them. Our fear is that this will become more widespread. So we want to make sure that as soon as possible as many states as possible are saying wireless components can't be used.
AMY GOODMAN: Lawrence Norden, we only have a minute. Can you go through your recommendations?
LAWRENCE NORDEN: Sure. One of the most important recommendations that we make is that paper should be audited. There are 36 states now that have paper records. We're saying, unless you're look at them, unless you're checking the paper record against the electronic record, you're not offering that much more security. Another important recommendation: ban wireless components on voting machines, at least as they currently exist. And finally, something that's very important, we want to see counties performing their own programming on voting machines. The more centralized things like programming and creating ballot-definition files, the more likely that it's going to be easy to reach a lot of machines. We want localities to do those types of things.
AMY GOODMAN: Lawrence Norden, I want to thank you very much. We're going to post your report on our website at democracynow.org. Finally, the people on the Brennan Center Task Force, who came up with this report?
LAWRENCE NORDEN: Well, I think we had a great, very impressive taskforce. We had the leading officials, leading scientists and experts in the government, in academia, and in the private sector -- MIT, Stanford, the National Institute for Standards and Technology, Lawrence Livermore National Laboratory. We worked for about a year and a half putting this together, and I think it’s -- if people look at it, they'll see it's a very serious and thorough report.
AMY GOODMAN: Lawrence Norden is with the Brennan Center, Associate Counsel.
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2006
(1766)
-
▼
July
(134)
- New World Dis-Order
- Labor pains, huh?
- A World Gone Mad - New York TimesThe New York Time...
- Very informative interview by Terry Gross about Mi...
- Roberts and Alito Misled Us
- Clueless Condi
- The Grand Plan of the NeoCons, Up in Smoke.
- July 30, 2006Op-Ed ColumnistSame-Sex Marriage Wins...
- Report Retort
- The "Decider" Takes Charge
- The Passion of Mel
- Rattling the Sheeple
- Condoleezza Rice: Midwife From Hell
- Why is the US in Iraq?
- Just Hot Air?
- A scary survey for the GOP
- The ol' bait-n-switch move.
- Lamaze, anyone?
- Meanwhile, back in the "homeland"
- Even neoconservatives now accepting defeat in Irag
- Harper's: Former official says Bush mulling sendin...
- Q&A at the Pentagon
- The questions the Bush administration doesn't want...
- Zbig Brzeninski: Israel's Actions in Lebanon Essen...
- Five Myths That Sanction Israel's War Crimes
- Friendly Advice
- "Extreme Disaster"
- "Clean Break"
- Too High a Price
- Stumbling Into Armageddon
- War on Lebanon Planned for at least a year
- War Savages Everything
- Bush Doesn't Measure UP
- Veto This, George Boy!
- End the Suffering
- Willful Fantasies and Reality in Today's Mideast C...
- The American Ayatollah puts it in writing
- Chris Matthews takes on the Neocons!?
- Anatomy of a Murder
- The Immoral Veto
- Spying on Americans gets its day in court
- Leading to Low Ground - New York TimesThe New York...
- Heeeeere's Pat!
- Defending Bush's Veto, Rove Grossly Distorts Stem ...
- The lessons that haven't been learned
- Bush to stem cell community: Drop Dead
- Triumph of the Authoritarians
- Does Bush really think stem cell science is "murder"?
- Good thing we killed al-Zarqawi, huh?
- Feeding the Enemy - New York TimesThe New York Tim...
- The Progressive Web Exclusives
- Neocons Rise From Mideast Ashes
- FBI Sought Padilla's Help
- The Ugly Truth: Our President is an Imbecile
- Bush Administration Plans Medicare Changes - New Y...
- For Democrats, Wave Is Building
- Bush on the World Stage: While Events Heat Up, the...
- Militant Islam on the March
- Bush Vetoes, Pope Excommunicates on Stem Cells
- The Real Agenda
- Shrewd Israeli Objectives May Be to Curb US Deal-M...
- Wiretap Surrender
- Bush to Israel: Nothing
- $11 Million Every Hour
- Too Good for Marriage - New York TimesThe New York...
- Welcome to the Hornets' Nest
- Bush's Indifference Drives Conflict
- Why Democrats Don't "Count"
- Plame, Wilson file suit against Rove,Libby and Cheney
- U.S. accused of kidnappings in Iraq
- Electrocute Bill Keller! No, hang him!
- Passing the Buck
- Fw: Fix the U.S.- India Nuclear Deal - FCNL
- Bush Should Channel Nixon In North Korea
- Toying With Terror Alerts?
- Doctrinal Errors
- Lieberman Misses Point of Opponents
- A Maverick Media Mogul Takes on Mainstream Spinele...
- Novak: Fitzgerald knew, but I'm still not saying.
- Ee Ii Ee Ii Oo
- Deficit games
- Nice Work If You Can Get It . . .
- Zapatero snubs Pope at Mass for "the family"
- Blogger proves one red paper clip can indeed buy a...
- The Iraq report
- Legislating Under the Influence
- As seen on the roads...
- A Subpoena for Rumsfeld
- Demanding a Recount
- "Wasted Years"
- Following the Nixon Playbook
- 5 U.S. GIs charged in Iraq rape-slay case
- Israel Is Bogged Down in Gaza. Where is the U.S.?
- Shiite gunmen ambush Sunnis in Baghdad
- Mexico and Florida Have More In Common Than Heat
- Florida all over again?
- The state secrets that weren't secret
- Republican Fairy Tales
- Israel's failed-state strategy
- Republican Party Attempts to Prove Two Wrongs Do M...
-
▼
July
(134)
No comments:
Post a Comment