{"id":4909,"date":"2007-08-03T10:39:03","date_gmt":"2007-08-03T17:39:03","guid":{"rendered":"http:\/\/www.bradblog.com\/?p=4909"},"modified":"2007-08-04T04:16:16","modified_gmt":"2007-08-04T11:16:16","slug":"ca-source-code-report-diebold-voting-machines-can-be-hacked-with-virus-by-single-person-affecting-entire-election","status":"publish","type":"post","link":"https:\/\/bradblog.com\/?p=4909","title":{"rendered":"CA Source Code Report: Diebold Voting Machines Can Be Hacked With Virus by Single Person, Affecting Entire Election"},"content":{"rendered":"<p><i>Blogged by Brad from deep in the heart of <strike>Diebold Country<\/strike> Texas&#8230;<\/i><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/BradBlog.com\/Images\/Diebold_DavidBear_Failure.jpg\" hspace=\"6\" vspace=\"3\" border=\"0\" align=\"right\">The <a href=\"http:\/\/www.sos.ca.gov\/elections\/elections_vsr.htm\" rel=\"noopener\">Source Code Review sections<\/a> of CA SoS Debra Bowen&#8217;s independent &#8220;Top-to-Bottom Review&#8221; of voting machines were released yesterday after being scrubbed of some of the more dangerous, specific &#8220;road-maps&#8221; for hackers.<\/p>\n<p>As expected, the reports are exceedingly troubling and damaging to the entire failed e-voting industry and Diebold, once again, is shown for the menace to democracy that its once-good name has now come to signify.<\/p>\n<p><a href=\"http:\/\/www.pcworld.com\/article\/id,135461-c,onlinesecurity\/article.html\" rel=\"noopener\">As reported by <i>PCWorld<\/i>&#8230;<\/a><\/p>\n<div class=\"media\">Diebold Election Systems Inc. voting machines are not secure enough to guarantee a trustworthy election, and an attacker with access to a single machine could disrupt or change the outcome of an election using viruses, according to a review of Diebold&#8217;s source code.<\/p>\n<p>&#8220;The software contains serious design flaws that have led directly to specific vulnerabilities that attackers could exploit to affect election outcomes,&#8221; read the University of California at Berkeley report, commissioned by the California Secretary of State as part of a two-month &#8220;top-to-bottom&#8221; review of electronic voting systems certified for use in California.<\/p>\n<p>The assessment of Diebold&#8217;s source code revealed an attacker needs only limited access to compromise an election.<\/p>\n<p>&#8220;An attack could plausibly be accomplished by a single skilled individual with temporary access to a single voting machine. The damage could be extensive &#8212; malicious code could spread to every voting machine in polling places and to county election servers,&#8221; it said.<br \/>\n&#8230;<br \/>\n&#8220;A virus could allow an attacker who only had access to a few machines or memory cards, or possibly to only one, to spread malicious software to most, if not all, of a county&#8217;s voting machines,&#8221; the report said.<\/p><\/div>\n<p>Voting machine &#8220;sleepovers,&#8221; anyone? (Yes, we&#8217;re talking to you Mikel Haas, Deborah Seiler, and Michael Vu in San Diego!)<\/p>\n<p>And finally, there&#8217;s this &#8212; bolding added so it can be seen easier by members of CONGRESS&#8230;<\/p>\n<div class=\"media\"><b>The report warned that a paper trail of votes cast is not sufficient to guarantee the integrity of an election using the machines.<\/b><\/div>\n<p>Got that, Mr. Holt and Ms. Feinstein?<\/p>\n<p>And with that, we eagerly await Bowen&#8217;s fateful decisions, due today, on what to do with California&#8217;s electronic voting systems. She may choose to do a) nothing, b) decertify, or c) recertify with new conditional security elements. Today is Judgement Day. Stay tuned&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Blogged by Brad from deep in the heart of Diebold Country Texas&#8230; The Source Code Review sections of CA SoS Debra Bowen&#8217;s independent &#8220;Top-to-Bottom Review&#8221; of voting machines were released yesterday after being scrubbed of some of the more dangerous, specific &#8220;road-maps&#8221; for hackers. As expected, the reports are exceedingly troubling and damaging to the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":""},"categories":[21,3,28],"tags":[],"coauthors":[],"class_list":["post-4909","post","type-post","status-publish","format-standard","hentry","category-california","category-dieboldpremier","category-election-reform"],"acf":[],"_links":{"self":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/posts\/4909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4909"}],"version-history":[{"count":0,"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/posts\/4909\/revisions"}],"wp:attachment":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4909"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcoauthors&post=4909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}