If you want to read a technical report done by a crack team paid to experimentally hack a Diebold touchscreen system early this year, go here.
Elsewhere, some call it "editing" an election rather than hacking, because if you can gain Supervisor status, you can just type in new numbers for vote totals.
In addition, the experts note that Diebold's machines, which were astonishingly adopted by the State of Maryland after they commissioned and (I guess?) read the report, HAVE CODE FOR WEIGHTED BALLOTS.
These are some notes I took from the technical report.
<
http://www.raba.com/press/TA_Report_AccuVote.pdf> Trusted Agent Report
Diebold AccuVote-TS Voting System
January 20, 2004
Prepared by RABA Innovative Solution Cell (RiSC)Dr. Michael A. Wertheimer, Director
<
http://www.raba.com/press/TA_Report_AccuVote.pdf> When a Supervisor Card is inserted into an AccuVote-TS Terminal, a 4-digit PIN is requested. Given the PIN, one has the ability, e.g., to end the election, clear the vote counts, or vote multiple times. note, page 17
page 18 -- with a keyboard attached to the terminal, an attacker can overwrite the results for a voting terminal. This would elevate the attacker to a Supervisor status, without needing even a smart card.
Removing the PCMCIA card enabled the attacker to switch the names of two candidates. The voter would think s/he was voting for Candidate A, but would actually be voting for Candidate B.
Page 20 Remove the test recording software from the Accu-Vote TS Terminal that allows the keyboard exploit. It serves no valid function.
Page 20 The current version of the GEMS software still contains many of the vulnerabilities widely published on the Internet. It was disappointing to see that no obvious attention was paid to addressing these weaknesses....One vulnerability, for which a patch was made available in July 2003, allows a remote attacker to get complete control of the machine....By successfully directing Canvas at the GEMS modem interface,
the team was able to remotely upload, download, and execute files with full system administrator privileges. All that was required was a valid phone number for the GEMS server.Exact quote, page 20
"The team demonstrated the following vulnerabilities:
1. The GEMS server lacks several critical security updates from Microsoft. As a result,
the team successfully exploited a well-known vulnerability using a software product
known as Canvas27. This vulnerability, described in a security advisory from
Microsoft28 for which a patch was made available on July 16, 2003, allows a remote
attacker to get complete control of the machine. Since this is the same weakness that
the August 11, 2003 “Blaster” worm exploited, it means that if the GEMS server was
exposed to an environment where “Blaster” was propagating, it might have been
infected. By successfully directing Canvas at the GEMS modem interface, the team
was able to remotely upload, download and execute files with full system
administrator privileges. All that was required was a valid phone number for the
GEMS server.
2. Modify GEMS software and/or election database on LBE (local board of elections) server. Given physical access to the server, one can insert a CD that will automatically upload malicious software, modify or delete elections, or reorder ballot definitions. The problem is that the server enables the "autorun" feature."
3. Exploit the USB port in the rear of the device.
4. ... the database files that contain the election definition (and results) are neither encrypted nor authentication protected. Results can be modified at will. In addition, ballot definitions can be altered so that the mapping between candidates and their "ordinal numbers" can be changed. A sophisticated user can automate this procedure requiring only a few minutes access to the server.
Page 23 re Diebold "We feel that a pervasive code rewrite would be necessary to instantiate the level of best practice security necessary to eliminate the risks we have outlined in the previous sections. Our analysis lacked the time and resources to determine if Diebold has the expertise to accomplish this task."
Under General Recommendations
Page 24
7.
GEMS and AccuVote-TS software contain code for "weighted ballots." This does not have any apparent use for Maryland elections; vendor should provide plausible scenario for weighted ballots in a general election; if none can be provided, this code should be removed.
~~~~~~~~~~~~~~~~~~~~~~~
If that's too geeky for you, here's a plain language newspaper version of the test, definitely worth a read.
Md. computer testers cast a vote: Election boxes easy to mess with
----------------------------------------------------------------
By Stephanie Desmon
Sun Staff (Maryland)
January 30, 2004
<
http://www.sunspot.net/news/local/bal-te.md.machine30jan30,0,4050694.story?coll=bal-local-headlines>For a week, the computer whizzes laid abuse - both high- and low-tech -on the six new briefcase-sized electronic voting machines sent over by the state.
One guy picked the locks protecting the internal printers and memory cards. Another figured out how to vote more than once - and get away with it.
Still another launched a dial-up attack, using his modem to slither through an electronic hole in the State Board of Elections software. Once inside, he could easily change vote totals that come in on Election Day. "My guess is we've only scratched the surface," said Michael A. Wertheimer, who spent 21 years as a cryptologic mathematician at the National Security Agency. He is now a director at RABA Technologies in Columbia, the firm that the state hired for about $75,000 to look at Maryland's new touch-screen voting machines scheduled to be unveiled in nearly every precinct in Maryland for the March 2 primary.
The state has no choice but to use its $55 million worth of AccuVote-TS machines made by Diebold Election Systems for the primary. The old optical scanners are gone. Yesterday, Wertheimer calmly presented his eight-member team's findings to committees in the House and Senate, explaining the weaknesses they discovered and a plan for how to plug many of the cracks, at least in the short run.
MORE