|
|
|
|
Deception Dollars t-shirts Sections
911 Main
- About - GFP HOF - My GFP - Older Stuff - Past Polls - Submit Story - Video - mp3 - SGTV SGTV/INN
Watch SGTV, our TV show, every Thursday on MNN webcast, 8 PM EST Watch INN World Report, our new cooperation partner, every Friday (Repeats on Saturday + Sunday) on Free Speech TV, MNN and many other Public Access Channels, 6 PM EST. INN is also our new breaking news partner. Their news shows incl. Interview Highlights with John Pilger, Joe Conason, Michael Meacher, Bev Harris, Cynthia McKinney, Sander Hicks and many others... 911 Encyclopedia
Ewing2001 Has compiled a comprehensive list of links an articles pertaining to 911. This is required reading for anyone interested in understanding that horrid day ESPECIALLY since the presstitutes refuse to their job.
Mike Malloy pulls no punches with the FLYING MONKEY RIGHT. If you want to hear a REAL liberal tell it like it is don't miss his show! Listen Daily 9pm to 12pm One Year Later
Tune in to get a liberal helping of the TRUTH. Peter Werbe stands up to the neo-cons and for liberal cause daily while keeping us all informed on the daily events that are shaping our world. Listen Daily 2pm till 5pm Liberal Talk Radio In Florida! Spread the word. Tell your friends to listen in. Call the station every Saturday and give them your supportive comments (239-732-9369). Call The Guy James Show live on the air (239-530-1660). The Randi Rhodes Show Books
All Books
Greg Palast: Updated: with %40 more pages than the hard cover.
Alex Jones Video
Global Outlook
Michel Chossudovsky's Magazine on 911 and Post-911 Analysis Issue No.5-out now:Bush's "Project for a New American Century" Was 9/11 a Hoax? Diving up the Spoils of War Website Topics of the month: Was Kelly assassinated for "pulling the plug" The Forged Intelligence on Iraq Who's Who on the 9/11 "Independent" Commission Hot ranking thread: CIA closed friend with the finanzsystem of Al-Quida!
Counterpunch
|
Voting Machines: Diebold's security lack revealedposted by ewing2001 on Thursday August 07, @02:12AMfrom the Wired dept. Scandal continues: Maryland Governor Orders Voting System Security Study (WP 08/07) New Security Woes for E-Vote FirmWired -
Following an embarrassing leak of its proprietary software over a file transfer protocol site last January, the inner workings of Diebold Election Systems have again been laid bare. A hacker has come forward with evidence that he broke the security of a private Web server operated by the embattled e-vote vendor, and made off last spring with Diebold's internal discussion-list archives, a software bug database and more software.
The unidentified attacker provided Wired News with an archive containing 1.8 GB of files apparently taken March 2 from a site referred to by the Ohio-based company as its "staff website." Representatives of Diebold Election Systems, one of the largest electronic voting systems vendors with more than 33,000 machines in service around the country, said the company is still investigating the security breach and reviewing the contents of the archive. Director of Communications John Kristoff said the stolen files contained "sensitive" information, but he said Diebold is confident that the company's electronic voting system software has not been tampered with. "Thus far we haven't seen anything that would be of use to anyone trying to affect the outcome of an election," he said. But experts said the appearance of the archive of purloined files from the staff site raises new questions about Diebold's attention to the security of its intellectual property. "They claim they keep everything secure, but this shows the lax nature of their procedures. This just blatantly flies in the face of good security," said Rebecca Mercuri, a computer science professor at Bryn Mawr College who opposes the use of electronic voting systems. The anonymous attacker said he broke into the Diebold staff site, which was located at https://staff.dieboldes.com, after reading in January about how unauthorized outsiders had copied source code and documentation from an insecure FTP site operated by the company at the Internet address ftp://ftp.gesn.com. "In a few short minutes I had access to their replacement for the FTP site, their 'secure' web," wrote the hacker. Last month, researchers at Johns Hopkins University used source code from the FTP site to publish an analysis of what they claimed were serious security problems in Diebold's AccuVote-TS voting terminal. Diebold attempted last week to rebut (PDF) the researchers' charges. The archive of internal Diebold Election Systems mailing lists taken from the staff site includes thousands of messages dating from January 1999 through March 2003. The lists contained internal company discussions of product support issues, new software announcements and general company announcements. "We do not believe there is any real security threat, but perception matters a great deal in this business!" wrote Pat Green, Diebold Election Systems' director of research and development, in a Feb. 7 message to the company's "support" discussion list. Green was announcing the temporary shutdown of the Diebold staff site. Two days before, on Feb. 5, activist Bev Harris detailed in an article at New Zealand news site called Scoop how she had freely accessed thousands of files from Diebold's FTP server. The hacker did not reveal how he subsequently breached the security of the Diebold staff site, which used SSL encryption. The file archive included source code to a login page that included a March 2 welcome message to one of the firm's election support specialists, suggesting the attacker may have compromised the employee's account. Judging from internal mailing list discussions, Diebold management was either unaware of proper information security practices, or chose to ignore them out of expediency, experts said. "There is no sane reason to put the corporate jewels on an Internet-facing server. They were basically asking to be hacked," said Jeff Stutzman, CEO of ZNQ3, a provider of information security services. "This is the kind of behavior you expect of a startup company that's only concerned about selling their first product." But Kristoff said the staff server housed only compiled, executable programs, and not the raw source code to Diebold's election systems. He said it was "an oversight" that source code was available to the public from the FTP server in January. The Diebold discussion-list archives included other warnings of potential security problems. In May 2000, Diebold Election Systems' systems engineer manager Talbot Iredale posted a message to the support list chiding employees for placing software files on the special "customer" section of the FTP site without password-protecting them. That section of the site was created for delivering program updates and other files to election officials and other customers. "This potentially gives the software away to whom ever (sic) wants it," wrote Iredale. On Dec. 2 last year, Diebold Election Systems' webmaster Joshua Gardner announced to the list that the FTP site finally was being eliminated and replaced by the staff site. Gardner explained that the FTP site had been "accessible to the outside world with no restrictions on access, and no provisions for logging user activity. FTP was a security risk, and I have shut it down for this reason." Yet nearly eight weeks later, Internet users apparently still were able to access the FTP site without a password and to download proprietary software and manuals. Kristoff said Diebold has shut down the FTP and staff sites, and the company no longer provides customers or field personnel with access to Diebold software over the Internet. Instead, software and proprietary data has been distributed by CD-ROM since January, he said. Even if unauthorized individuals were able to access and modify voting system source code, some e-voting experts downplay the impact of such theoretical threats. After the earlier problems at Diebold's FTP site, Brit Williams of the Center for Election Systems at Kennesaw State University published a report last April noting (PDF) that some states, such as Georgia, carefully review source code prior to use in electronic voting systems. But Stutzman said Diebold's Internet security problems necessitate that the company hire a "Big Five-caliber" firm to conduct a thorough inspection of its software code, and to insure that malicious outsiders have not tampered with it. "To gain credibility back, they … have to do a line-by-line audit to make sure that their intellectual property is still sound," said Stutzman. Related Stories:
Ehrlich Orders Voting System Security StudyWP Thursday, August 7, 2003; Page B01
Maryland Gov. Robert L. Ehrlich Jr. (R) yesterday asked a contractor with expertise in computer security to review the electronic voting machines that the state recently agreed to purchase for up to $55 million and plans to put in every precinct before the 2004 election. The review comes two weeks after computer scientists at Johns Hopkins University said the voting system was so flawed that a 15-year-old hacker could tap into the software and tamper with election results. Based on Ehrlich's request, Science Applications International Corp. will write a risk assessment of the possibility of election fraud after examining the hardware and software of the touch-screen machines manufactured by Ohio-based Diebold Election Systems Inc. SAIC also will review state and local election procedures to evaluate the security of the entire voting system, state officials said. "Government has no more fundamental obligation than to ensure the integrity of the democratic election process," Ehrlich said in a statement. The governor's spokeswoman, Shareese N. DeLeaver, said: "The state will take whatever steps are necessary to ensure that these machines are checked, remedied, and any errors found are minimized to ensure voter confidence on Election Day. If [SAIC researchers] find there are no concerns, the sale will go forward. If not, then we'll go back to the drawing board and renegotiate."
< 9/11 Report - The real Saudi Ties are U.S. Ties | After 9/11: Pentagon met with Iran-Contra Figure > |
Global Free Press Login
Related Links
| ||||
|
||||||
[ home | contribute story | older articles | past polls | faq | authors | preferences ]
FAIR
USE NOTICE: This
site contains copyrighted material the use of which has not always been
specifically authorized by the copyright owner. We are making such material
available in our efforts to advance understanding of environmental, political,
human rights, economic, democracy, scientific, and social justice issues,
etc. We believe this constitutes a 'fair use' of any such copyrighted material
as provided for in section 107 of the US Copyright Law. In accordance with
Title 17 U.S.C. Section 107, the material on this site is distributed without
profit to those who have expressed a prior interest in receiving the included
information for research and educational purposes. For more information
go to: http://www.law.cornell.edu/uscode/17/107.shtml
If you wish to use copyrighted material from this site for purposes
of your own that go beyond 'fair use', you must obtain permission from the
copyright owner.
Powered by daVinci Interactive and Slashcode
Add
GFP to your PALM via AvantGo
Add GFP HeadLines to your site XML
or RDF
Questions or Comments
Regarding This Site
webmaster@globalfreepress.com