Global Free Press

Deception Dollars

Live Free or DIE!
t-shirts
Sections
Main
SGTV/INN

MUST SEE: 911 Documentry

Watch SGTV, our TV show, every Thursday on MNN webcast, 8 PM EST

Watch INN World Report, our new cooperation partner, every Friday (Repeats on Saturday + Sunday) on Free Speech TV, MNN and many other Public Access Channels, 6 PM EST.

INN is also our new breaking news partner. Their news shows incl. Interview Highlights with John Pilger, Joe Conason, Michael Meacher, Bev Harris, Cynthia McKinney, Sander Hicks and many others...

911 Encyclopedia

Ewing2001 Has compiled a comprehensive list of links an articles pertaining to 911.

This is required reading for anyone interested in understanding that horrid day ESPECIALLY since the presstitutes refuse to their job.

more...

Search

9/11 News and GFP-911 Archive

 


Mike Malloy

Mike Malloy pulls no punches with the FLYING MONKEY RIGHT. If you want to hear a REAL liberal tell it like it is don't miss his show!

Listen Daily 9pm to 12pm

One Year Later



Peter Werbe

Tune in to get a liberal helping of the TRUTH. Peter Werbe stands up to the neo-cons and for liberal cause daily while keeping us all informed on the daily events that are shaping our world.

Listen Daily 2pm till 5pm


The Guy James Show

Liberal Talk Radio In Florida!

Spread the word. Tell your friends to listen in. Call the station every Saturday and give them your supportive comments (239-732-9369). Call The Guy James Show live on the air (239-530-1660).


The Randi Rhodes Show

more...


Internet Radio/Tv For Progressives

Books
All Books

Greg Palast:
The Best Democracy Money Can Buy

Updated: with %40 more pages than the hard cover.



War on Iraq: What Team Bush Doesn't Want You To Know
By William Rivers Pitt



The Greatest Sedition Is Silence:
Four Years in America

More...

 

 

Alex Jones Video

MUST SEE: Video

From infowars.com
psst... pass the word

Global Outlook

Michel Chossudovsky's Magazine on 911 and Post-911 Analysis

Issue No.5-out now:

Bush's "Project for a New American Century"

Was 9/11 a Hoax?

Diving up the Spoils of War

Website Topics of the month:

Was Kelly assassinated for "pulling the plug"

The Forged Intelligence on Iraq

Who's Who on the 9/11 "Independent" Commission

Hot ranking thread:

CIA closed friend with the finanzsystem of Al-Quida!


GLOBAL RESEARCH (CANADA) : FEATURE ARTICLES

25 November -  3 December 2003

Iraq: The Truth on the Convoy which was attacked while driving through Samara  

The Rise of a New Dictatorship in Iraq , Firas Al-Atraqchi

The FTAA Protests: This is What Democracy Looks Like in Miami, Al Crespo

Enforcing Globalization: New World Order Weapons, John Valleau

Police State in America: Bush’s Operation Clean Sweep: World War IV in 2004? John Stanton

Manipulating Pathologic Evidence: The David Kelly Story: Turning Murder into Suicide, Rowena Thursby

The Legend of 9/11: Coincidence or Conspiracy: The Tale of The Millennial Bomber, Chaim Kupferberg

Assassination of Reuters Cameraman, who had uncovered evidence of Mass US Casualties in Iraq, Felicity Arbuthnot

Legal Scam in Denmark: Danish government lawyers removed preconditions for invasion of Iraq, Coilín Oscar ÓhAiseadha

Le Général Franks doute que la Constitution survive à une attaque aux ADM (armes de destruction massive) , John O. Edwards

Who’s Holding All the Cards?... The Bipartisan War Agenda, Michel Chossudovsky & Ian Woods

Being "Against the War" is now a "Terrorist Act": FBI Targets Anti-War Activists

Counterpunch
(Open Headlines Popup Window)

Voting Machines: Diebold's security lack revealed

posted by ewing2001 on Thursday August 07, @02:12AM
from the Wired dept.

Scandal continues: Maryland Governor Orders Voting System Security Study (WP 08/07)

New Security Woes for E-Vote Firm

Wired -

Following an embarrassing leak of its proprietary software over a file transfer protocol site last January, the inner workings of Diebold Election Systems have again been laid bare.

A hacker has come forward with evidence that he broke the security of a private Web server operated by the embattled e-vote vendor, and made off last spring with Diebold's internal discussion-list archives, a software bug database and more software.

Advertisement

The unidentified attacker provided Wired News with an archive containing 1.8 GB of files apparently taken March 2 from a site referred to by the Ohio-based company as its "staff website."

Representatives of Diebold Election Systems, one of the largest electronic voting systems vendors with more than 33,000 machines in service around the country, said the company is still investigating the security breach and reviewing the contents of the archive.

Director of Communications John Kristoff said the stolen files contained "sensitive" information, but he said Diebold is confident that the company's electronic voting system software has not been tampered with.

"Thus far we haven't seen anything that would be of use to anyone trying to affect the outcome of an election," he said.

But experts said the appearance of the archive of purloined files from the staff site raises new questions about Diebold's attention to the security of its intellectual property.

"They claim they keep everything secure, but this shows the lax nature of their procedures. This just blatantly flies in the face of good security," said Rebecca Mercuri, a computer science professor at Bryn Mawr College who opposes the use of electronic voting systems.

The anonymous attacker said he broke into the Diebold staff site, which was located at https://staff.dieboldes.com, after reading in January about how unauthorized outsiders had copied source code and documentation from an insecure FTP site operated by the company at the Internet address ftp://ftp.gesn.com.

"In a few short minutes I had access to their replacement for the FTP site, their 'secure' web," wrote the hacker.

Last month, researchers at Johns Hopkins University used source code from the FTP site to publish an analysis of what they claimed were serious security problems in Diebold's AccuVote-TS voting terminal. Diebold attempted last week to rebut (PDF) the researchers' charges.

The archive of internal Diebold Election Systems mailing lists taken from the staff site includes thousands of messages dating from January 1999 through March 2003. The lists contained internal company discussions of product support issues, new software announcements and general company announcements.

"We do not believe there is any real security threat, but perception matters a great deal in this business!" wrote Pat Green, Diebold Election Systems' director of research and development, in a Feb. 7 message to the company's "support" discussion list. Green was announcing the temporary shutdown of the Diebold staff site.

Two days before, on Feb. 5, activist Bev Harris detailed in an article at New Zealand news site called Scoop how she had freely accessed thousands of files from Diebold's FTP server.

The hacker did not reveal how he subsequently breached the security of the Diebold staff site, which used SSL encryption. The file archive included source code to a login page that included a March 2 welcome message to one of the firm's election support specialists, suggesting the attacker may have compromised the employee's account.

Judging from internal mailing list discussions, Diebold management was either unaware of proper information security practices, or chose to ignore them out of expediency, experts said.

"There is no sane reason to put the corporate jewels on an Internet-facing server. They were basically asking to be hacked," said Jeff Stutzman, CEO of ZNQ3, a provider of information security services. "This is the kind of behavior you expect of a startup company that's only concerned about selling their first product."

But Kristoff said the staff server housed only compiled, executable programs, and not the raw source code to Diebold's election systems. He said it was "an oversight" that source code was available to the public from the FTP server in January.

The Diebold discussion-list archives included other warnings of potential security problems. In May 2000, Diebold Election Systems' systems engineer manager Talbot Iredale posted a message to the support list chiding employees for placing software files on the special "customer" section of the FTP site without password-protecting them. That section of the site was created for delivering program updates and other files to election officials and other customers.

"This potentially gives the software away to whom ever (sic) wants it," wrote Iredale.

On Dec. 2 last year, Diebold Election Systems' webmaster Joshua Gardner announced to the list that the FTP site finally was being eliminated and replaced by the staff site. Gardner explained that the FTP site had been "accessible to the outside world with no restrictions on access, and no provisions for logging user activity. FTP was a security risk, and I have shut it down for this reason."

Yet nearly eight weeks later, Internet users apparently still were able to access the FTP site without a password and to download proprietary software and manuals.

Kristoff said Diebold has shut down the FTP and staff sites, and the company no longer provides customers or field personnel with access to Diebold software over the Internet. Instead, software and proprietary data has been distributed by CD-ROM since January, he said.

Even if unauthorized individuals were able to access and modify voting system source code, some e-voting experts downplay the impact of such theoretical threats. After the earlier problems at Diebold's FTP site, Brit Williams of the Center for Election Systems at Kennesaw State University published a report last April noting (PDF) that some states, such as Georgia, carefully review source code prior to use in electronic voting systems.

But Stutzman said Diebold's Internet security problems necessitate that the company hire a "Big Five-caliber" firm to conduct a thorough inspection of its software code, and to insure that malicious outsiders have not tampered with it.

"To gain credibility back, they … have to do a line-by-line audit to make sure that their intellectual property is still sound," said Stutzman.


Related Stories:

Ehrlich Orders Voting System Security Study

WP Thursday, August 7, 2003; Page B01

Maryland Gov. Robert L. Ehrlich Jr. (R) yesterday asked a contractor with expertise in computer security to review the electronic voting machines that the state recently agreed to purchase for up to $55 million and plans to put in every precinct before the 2004 election.

The review comes two weeks after computer scientists at Johns Hopkins University said the voting system was so flawed that a 15-year-old hacker could tap into the software and tamper with election results.

Based on Ehrlich's request, Science Applications International Corp. will write a risk assessment of the possibility of election fraud after examining the hardware and software of the touch-screen machines manufactured by Ohio-based Diebold Election Systems Inc. SAIC also will review state and local election procedures to evaluate the security of the entire voting system, state officials said.

"Government has no more fundamental obligation than to ensure the integrity of the democratic election process," Ehrlich said in a statement.

The governor's spokeswoman, Shareese N. DeLeaver, said: "The state will take whatever steps are necessary to ensure that these machines are checked, remedied, and any errors found are minimized to ensure voter confidence on Election Day. If [SAIC researchers] find there are no concerns, the sale will go forward. If not, then we'll go back to the drawing board and renegotiate."

9/11 Report - The real Saudi Ties are U.S. Ties | After 9/11: Pentagon met with Iran-Contra Figure  >

Global Free Press Login
Nickname:

Password:

[ Create a new account ]

Related Links

Voting Machines: Diebold's security lack revealed | Login/Create an Account | Top | Search Discussion
Threshold:
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.

"The liberty of a democracy is not safe if the people tolerate the growth of private power to a point where it becomes stronger than their democratic State itself. That, in its essence, is Fascism — ownership of government by an individual, by a group or by any controlling private power."
-FDR

I'm not a robot like you. I don't like having disks crammed into me... unless they're Oreos, and then only in the mouth. -- Fry

[ home | contribute story | older articles | past polls | faq | authors | preferences ]

FAIR USE NOTICE: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml
If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.


Powered by daVinci Interactive and Slashcode

Add GFP to your PALM via AvantGo
Add GFP HeadLines to your site XML or RDF

Questions or Comments Regarding This Site
webmaster@globalfreepress.com