Learn How Vulnerable Electronic Voting Really Is
Undergraduate and graduate students in an advanced computer security course at Rice University in Houston are learning hands-on just how easy it is to wreak havoc on computer software used in today's voting machines.
In 2006, electronic voting machines accounted for 41 percent of the tallied U.S. votes.
His research involves computer security and the issues of building secure and robust software systems for the Internet.
Click read more for further information.
Undergraduate and graduate students in an advanced computer security course at Rice University in Houston are learning hands-on just how easy it is to wreak havoc on computer software used in today's voting machines.
As part of his advanced computer science class, Rice University Associate Professor and Director of Rice's Computer Security Lab Dan Wallach tests his students in a unique real-life experiment: They are instructed to do their very best to rig a voting machine in the classroom.
Here's how the experiment works:
Wallach splits his class into teams. In phase one, the teams pretend to be unscrupulous programmers at a voting machine company. Their task: Make subtle changes to the machines' software – changes that will alter the election's outcome but that cannot be detected by election officials.
In the second phase of the experiment, the teams are told to play the part of the election's software regulators. Their task is to certify the code submitted by another team in the first phase of the class.
"What we've found is that it's very easy to insert subtle changes to the voting machine," Wallach said. "If someone has access and wants to do damage, it's very straightforward to do it."
The good news, according to Wallach, is "when looking for these changes, our students will often, but not always, find the hacks."
"While this is a great classroom exercise, it does show how vulnerable certain electronic voting systems are," Wallach said. "If someone had access to machines and had the knowledge these students do, they surely could rig votes."
Even though students were often able to find the other team's hacked software bugs, Wallach said that in real life it would probably be too late.
"In the real world, voting machines' software is much larger and more complex than the Hack-a-Vote machine we use in class," he said. "We have little reason to believe that the certification and testing process used on genuine voting machines would be able to catch the kind of malice that our students do in class. If this happened in the real world, real votes could be compromised and nobody would know."
Wallach hopes that by making students aware of this problem, they will be motivated to advocate changes in America's voting system to ensure the integrity of everyone's vote.
In 2006, electronic voting machines accounted for 41 percent of the tallied U.S. votes. Fifty percent were cast on paper, and 9 percent "other," including New York's lever machines.
Dan Wallach is an associate professor in the Department of Computer Science at Rice University in Houston and associate director of ACCURATE (A Center for Correct, Usable, Reliable, Auditable and Transparent Elections, multi-institution voting research center funded by the National Science Foundation.). His research involves computer security and the issues of building secure and robust software systems for the Internet.
Source: <a href="http://campusmixxer.com/Rice_University/post:hack-a-vote-students-learn-how-vulnerable-electronic-voting-really-is/">Rice University
ghost 16 years ago
I went to a Linux convention in Phoenix, ABLE conf, and one of the presenters was a representative from Black Box Voting, which is an advocacy group for more transparent voting tallies. He showed us the program from the electronic voting from a rural county in Arizona, and that the program put the encrypted password inside the database. Good enough for your average computer user, I guess, but not for us. He had a copy of the program, and did a dummy file with a simple password, opened up the file in Access (yes, it used Access - FAIL!), copied it over into the other, and opened up the encrypted database. It took less then 5 minutes. Now tell me that's not crap! They also find companies that have unlicensed software manipulating the voter data, and even a machine that couldn't deliver an accurate count with a specified test data. It couldn't add 1 + 1!
Check them out: http://blackboxvoting.org/
ghost 16 years ago
yups. watch the documentry "hacking democracy". Is it really that hard to do small things like print a receipt? I don't think voting machines should be government regulated… Also, the counties could be submitted to the public. There would be a lot of interesting data mining things you could do with that data, and it would be counted arbitrarily.