There is no excuse for this

i-811209ec0bd4152ae30a20b62bdd974c-5-bt-cfg.jpg


There is no excuse for this. Thanks to the href="http://www.openvotingfoundation.org/index.html">Open
Voting Foundation, we now know that the Diebold TS (paperless
touch screen voting machine) can be booted from flash memory, bypassing
the BIOS that was tested and approved. This can be done without a
trace. There is no way to know after an election has been held, which
mode the machine was operating in.


The BIOS is the Basic Input-Output System, which is the first software
to load when the machine is booted.  It potentially could
control anything that happens after the bootup.  Most
computers have only one BIOS.  Some have two.
 Usually, the second is used as a backup.  That way,
you can upgrade the BIOS, and if the new one does not work, you can
easily go back to using the original one.  



Of course, the Help America Vote Act (HAVA) calls for all the software
to be tested and approved before it is put into a voting machine.
 It would make sense, then, to construct the machine in such a
way, that unapproved software cannot be installed.  At the
very least, the machine should be designed in such a way that it always
is possible to know what software was used.  But the Diebold
TS was designed in such a way that it would be simple to use unapproved
software, and to do so leaving no telltale evidence.



Presumably, once the machine has passed inspection, the BIOS would be
known to be good.  If you want to have a backup, fine, but it
should be possible to verify that both versions are identical.



The full size photo can be seen href="http://www.openvotingfoundation.org/5-bt-cfg.jpg">here.
The two Intel E28F640 chips on the board each hold 64MB of flash
memory. I assume that when the machine is booted normally, that memory
is ignored. When booted in the alternate mode, there is 128MB of memory
that comes into play. That is an awful lot of room to play with.
 Note that is also is possible to boot from an external flash
card, which could have much more memory on board.  Flash
memory can be erased easily; therefore, any tampering would be easy to
conceal.



In point of fact, the EPROM BIOS also could be erased. It is a bit more
of a production to  do so.  In order to do that, you
would have to remove the chip from the machine.  It would make
sense to either solder the chip directly onto the board, or to put some
kind of tamper-evident seal over it, so that it could not be removed
and reprogrammed without leaving some kind of evidence.



It makes sense to have a machine set up like the Diebold TS when prototyping.
If you want to test a new version of a BIOS, for example, it would be
very nice to have it set up that way.  But there is
absolutely no reason
to have such a configuration on a
machine that is intended for secure electronic voting. It is a huge
security flaw hole.  I won't
call it a flaw, because it is possible that it is a feature, not a bug.
 



There is no excuse for this.



Hat tip: rel="tag">John Conyers.


Tags

More like this

It's one of the grandest experiments in American democracy since the invention of the paper ballot, and nobody seems to care. Many municipalities are now moving towards electronic voting, and the results are starting to trickle in. So far, things have not gone well. (In fact, things went so badly…
I've not said anything on the subject of election fixing over the last few years. I've seen lots of allegations of vote fixing in Ohio and other states, but never paid much attention to them. It would take extraordinary audacity for anyone to actually fix election results in any major way and I've…
Linux is a common operating system, not least in its Android version, and it is universally assumed that a PC (or whatever "IBM compatible" is called these days) will be able to run it. In fact, machines that can’t run Linux are extremely rare since aficionados keep porting the open-source…
That is the conclusion of the most review review of the security of the Dielbold voting machines in California.  Most damning is the finding that many of the previously-reported vulnerabilities have not been fixed. face="Helvetica, Arial, sans-serif">...Although we present several previously…

This is truly frightening, and I appreciate efforts to make the public more generally aware of this easily corruptible system (appropriate for our politics though it may be). I looked on Open Voting Foundation's site, but couldn't find any information on how many of these new Diebold TS machines are in use, or where they might be located. Does anybody have information on this?

Kathleen Harris may have a chance after all. This looks like the end of a civilized process in this country. The trick is to manipulate the voting patterns in such a way that they still look plausible, perhaps not necessary in a country where it is believed that a large population in Palm Beach actually voted for Pat Buchannon.

By David Rippey (not verified) on 14 Aug 2006 #permalink