California report slams e-voting system security
Every tested machine had problems -- yes, every single one
IDG News Service - Researchers commissioned by the state of California have found security issues in every electronic voting system they tested, California Secretary of State Debra Bowen said Friday.
The report was published Friday as part of a complete review of the state's e-voting systems initiated earlier this year by Bowen's office.
Its findings were not encouraging for backers of e-voting.
"The security teams were able to bypass both physical and software security in every system they tested," Bowen said Friday during a conference call with media.
The report documents 15 security problems found in the devices. For example, researchers were able to exploit bugs in the Windows operating system used by the Diebold GEMS election management system to circumvent the system's audit logs and directly access data on the machine. They were able to get a similar level of access to Sequoia WinEDS data as well.
Testers were also able to overwrite firmware, bypass locks on the systems, forge voter cards, and even secretly install a wireless device on the back of a GEMS server.
Bowen is set to decide by Aug. 3 which systems will be certified for use in the 2008 presidential primaries. She declined to comment on how the report's findings will affect this decision until she has completely reviewed the report. "The severity of it, what it means ... that's a matter for us to investigate and pull apart and analyze between now and next Friday."
But she did acknowledge that the security problems found by researchers were important. "It's a big deal for many people in this country," she said. "We are a democracy and our very existence as a democracy is dependent on having voting systems that are secure, reliable and accurate."
California's review is the most thorough review of voting machine technology yet undertaken in the U.S.
A team of researchers assembled by the University of California has spent the past two months evaluating the security, accessibility and manufacturer documentation of voting machines. A "red team" of penetration testers attempted to gain access to the voting systems to see if they could disrupt an election or alter the results, while another team examined the source code to the machines.
Researchers examined devices manufactured by Diebold Election Systems Inc., Hart InterCivic Inc. and Sequoia Voting Systems Inc.
Representatives from Diebold and Sequoia said Friday that they needed more time to review the research before commenting in depth. "We are very anxious to review the findings," said Michelle Shafer, a Sequoia spokeswoman, via e-mail. "We will be providing our official response ... early next week."
She noted, however, that the "testing done during this Top to Bottom Review did not employ the processes and procedures used in the conduct of an actual election."
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!