Diebold e-voting flaws could compromise elections
Vendor must must fix optical scan machines by mid-August, say Florida officials
Optical scan voting devices slated to be used in presidential primary elections in Florida next year are significantly flawed and could compromise the outcome of the contest, according to a report released yesterday by Secretary of State Kurt Browning.
The report (download PDF) was compiled by researchers at Florida State University who were hired by Browning in May to conduct an independent review of optical scan and touch-screen devices made by Diebold Election Systems, one of the largest voting machine vendors in the country and a major supplier of gear to Florida.
The report cited a number of security gaps in the Diebold systems.
For example, it said, Diebold's Accuvote OS optical scan machine is vulnerable to vote manipulation by illicitly inserting a preprogrammed memory card into a voting terminal. The report said that the card could be coded to flip votes from one candidate to another without detection.
In a letter (download PDF) sent to Diebold Election Systems President David Byrd on Tuesday, Browning said that the vulnerabilities cited in the report must be fixed by Aug. 17 or the vendor's certification would be denied.
Browning cited a number of changes that must be made, including security upgrades that would prevent the surreptitious insertion of preloaded memory cards.
This was a fairly routine test of a new version of the optical scan system, said Mark Radke, director of marketing at Allen, Texas-based Diebold.
This is a way for the state to proactively catch and address any security issues. "We have received the summary," Radke said. "There are a few items to tighten as far as security goes, and those are being developed. These are minor changes to the system, and we expect those changes to be submitted by the August deadline."
A spokesman for Browning stated on Wednesday that Diebold had made assurances that the flaws would be addressed and that he was confident the vendor would in fact do so. And, as some of the problems have to do with voting processes, not technology, Browning would issue special advisories to election officials to address those procedural gaps.
Browning also said he intends to have the Florida State researchers conduct similar studies of machines from other voting system vendors, including Elections Systems & Software Inc. "We expect all voting systems to be certified and complete by the end of the year," he said.
Read more about Government IT in Computerworld's Government IT Topic Center.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Accelerating Speed to Market in the Highly Competitive Automotive Industry
- This White Paper discusses how an Enterprise Project Portfolio Management solution optimizes project analysis, management, reporting and risk mitigation processes to accelerate new... All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- HR and Finance Were made for Each Other View now >>
- The Value of Human Capital for Finance Professionals View now >>
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.