Skip the navigation

California report slams e-voting system security

Every tested machine had problems -- yes, every single one

By Robert McMillan
July 27, 2007 12:00 PM ET

IDG News Service - Researchers commissioned by the state of California have found security issues in every electronic voting system they tested, California Secretary of State Debra Bowen said Friday.

The report was published Friday as part of a complete review of the state's e-voting systems initiated earlier this year by Bowen's office.

Its findings were not encouraging for backers of e-voting.

"The security teams were able to bypass both physical and software security in every system they tested," Bowen said Friday during a conference call with media.

The report documents 15 security problems found in the devices. For example, researchers were able to exploit bugs in the Windows operating system used by the Diebold GEMS election management system to circumvent the system's audit logs and directly access data on the machine. They were able to get a similar level of access to Sequoia WinEDS data as well.

Testers were also able to overwrite firmware, bypass locks on the systems, forge voter cards, and even secretly install a wireless device on the back of a GEMS server.

Bowen is set to decide by Aug. 3 which systems will be certified for use in the 2008 presidential primaries. She declined to comment on how the report's findings will affect this decision until she has completely reviewed the report. "The severity of it, what it means ... that's a matter for us to investigate and pull apart and analyze between now and next Friday."

But she did acknowledge that the security problems found by researchers were important. "It's a big deal for many people in this country," she said. "We are a democracy and our very existence as a democracy is dependent on having voting systems that are secure, reliable and accurate."

California's review is the most thorough review of voting machine technology yet undertaken in the U.S.

A team of researchers assembled by the University of California has spent the past two months evaluating the security, accessibility and manufacturer documentation of voting machines. A "red team" of penetration testers attempted to gain access to the voting systems to see if they could disrupt an election or alter the results, while another team examined the source code to the machines.

Researchers examined devices manufactured by Diebold Election Systems Inc., Hart InterCivic Inc. and Sequoia Voting Systems Inc.

Representatives from Diebold and Sequoia said Friday that they needed more time to review the research before commenting in depth. "We are very anxious to review the findings," said Michelle Shafer, a Sequoia spokeswoman, via e-mail. "We will be providing our official response ... early next week."

She noted, however, that the "testing done during this Top to Bottom Review did not employ the processes and procedures used in the conduct of an actual election."

Reprinted with permission from IDG.net. Story copyright 2014 International Data Group. All rights reserved.
Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!