Source:
The BRAD BLOGEXCLUSIVE: ES&S TOUCH-SCREEN VOTING SYSTEMS FOUND VULNERABLE TO 'SERIOUS' VIRAL VOTE-FLIPPING ATTACK; U.S. ELECTIONS ASSISTANCE COMMISSION REFUSES TO ISSUE WARNING
Scientific Report Finds 'Serious Security Vulnerability' Similar to 'Princeton Diebold Virus Hack' in Widely Used iVotronic System, Allowing a Single Person to Change Election Results Across Entire County Without Detection
Despite GAO Confirmed Mandate to Serve as Info 'Clearinghouse', Embattled EAC Says They Will Take No Action to Alert Elections Officials, Public-- By Michael Richardson and Brad FriedmanWhile revelations surrounding the mysterious 18,000 "undervotes" in the November 2006 U.S. House election between Christine Jennings and Vern Buchanan in Florida's 13th Congressional district continue to inform the nation about the dangers of electronic voting machines, new information has recently come to light exposing a shocking lack of responsible oversight by those entrusted with overseeing the certification of electronic voting systems at the federal level.
An investigation into what may have gone wrong in Sarasota's contested FL-13 U.S. House Election between Chrstine Jennings and Vern Buchanan has revealed a serious security vulnerability on all versions of the iVotronic touch-screen voting system widely used across the country. The iVotronic is a Direct Recording Electronic (DRE) touch-screen voting machine manufactured by Elections Systems & Software, Inc. (ES&S), the nation's largest distributor of such systems.
The vulnerability is said to allow for a single malicious user to introduce a virus into the system which "could potentially steal all the votes in that county, without being detected," according to a noted computer scientist and voting system expert who has reviewed the findings.
And yet, despite their federal mandate to serve as a "clearinghouse" to the nation for such information, a series of email exchanges between an Election Integrity advocate and officials at the U.S. Elections Assistance Commission (EAC), has revealed that the federal oversight body is refusing to notify states of the alarming security issue.
The recent email conversation shows that even in light of the EAC's review of the warning from the computer scientist who characterized the "security hole" as severe, needing to be "taken very seriously," and among the most serious ever discovered in a voting system, the EAC is unwilling to take action.
Recent reports by the Government Accountability Office (GAO) have taken the EAC to task for a failure to meet their legislated mandate for informing the public and elections officials about such matters. However, a review of the email communications to and from the EAC's Jeannie Layson, show that the federal body is steadfast in their refusal to take action to alert either elections officials or the public about the security risk recently discovered by a team of eight noted computer scientists.
The EAC's current Chairwoman, Executive Director, Director of Voting System Certification and other top officials at both the National Association of State Election Directors (NASED) and even the GAO were included in the series of email communications, The BRAD BLOG has learned.
The vulnerability was initially discovered by a panel of scientists convened by the State of Florida to study the possible causes for the FL-13 election debacle. The team's discovery revealed a design issue in the widely used iVotronic system could allow for a viral attack, by a single individual, which could then spread unnoticed throughout the electronic election infrastructure of an entire county.
A similar vulnerability was found in DRE touch-screen system made by Diebold last Summer by a team of computer scientists at Princeton University.
Attempts to seek information about EAC plans to notify other states and local jurisdictions who use the same vulnerable voting systems as the ones in FL-13 have been met with an astounding refusal, troubling denial, buck-passing, and a lack of accountability by the federal commission of Presidential-appointees.
Election integrity watchdog John Gideon, a frequent BRAD BLOG contributer and the Co-Director and Information Manager for VotersUnite.org, says that the security flaw pertains to "every ES&S iVotronic voting machine used in the US and overseas." A total of eight separate versions of the system --- without and without so-called "voter verified paper audit trail" (VVPAT)" printers --- all currently approved as qualified at the federal level, are affected, he explained...
COMPLETE EXCLUSIVE REPORT:http://www.bradblog.com/?p=4396Read more:
http://www.bradblog.com/?p=4396