Voting Machine Technology Tom Trumpbour Computer Software Consultant United States.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Electronic Voting Systems
PC Encryption installation progress/password screen Includes comments from: Encryption team Sarah Deane Tony Stieber Selected people who took part in the.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
1099 Pro, Inc. – Software for Pro Enterprise Edition Features.
The Citizen in Government Electing Leaders ~~~~~ The Right to Vote
Registration Must register at least 25 days before the election You can register by mail, or at post offices, DMVs, libraries, and schools Must submit.
Analysis of an Electronic Voting System
By Varun Jain. Introduction  Florida 2000 election fiasco, drew conclusion that paper ballots couldn’t be counted  Computerized voting system, DRE (Direct.
Charlie Daniels Arkansas Secretary of State HAVA Compliant Voting Systems Security Considerations General Recommendations to Enhance Security and Integrity.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Chapter 9 A Installing Linux. Synopsis What is needed. How to access the BIOS and boot a CD/DVD. How to repartition the hard drive. The Linux installation.
Electronic Voting Network Security 1 Edward Bigos George Duval D. Seth Hunter Katie Schroth.
Voting Machines Failing the World *Voting machines around the world are failing in Colorado as well as 34 other states. *This could be crucial in the upcoming.
Presentation by Christine McElroy
Electronic Voting Linh Nguyen. Electronic Voting  Voting Technologies  The Florida 2000 Election  Direct Recording Electronic Devices (DREs)‏ - Diebold.
Voting Machines Failing the World The true issue for these electronic voting machines is that the government has not been a full out supporter of this.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Backup and Recovery Part 1.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Guide to the Voting Action Planner Voting is the way we elect government officials, pass laws and decide on issues…
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Election Administration. Ensuring legitimacy of the government Legitimacy: acceptance of the right of public officials to hold office and to promulgate.
October 22, 2008 CSC 682 Security Analysis of the Diebold AccuVote – TS Voting Machine Feldman, Halderman and Felten Presented by: Ryan Lehan.
Staying Safe Online Keep your Information Secure.
6.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 6: Administering User Accounts.
1/28/2010 Network Plus Windows Networking Network Identification Identifies name and type of network. Installed adapters –Performed during Windows installation.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Installing and Configuring IIS. Reliable IIS 6.0 uses a new request-processing architecture and application-isolation environment that enables individual.
Troubleshooting Windows Vista Security Chapter 4.
Digital Democracy: A look at Voting Machines Presented by Justin Dugger April 2003.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
NIST Voting Data Formats Workshop Gaithersburg October, 2009 Parker Abercrombie EML for Open Voting.
2007 NAGRA Annual Conference June 10-13, 2007 Electronic Bingo Card-minding Devices.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Slide 1 ASP Authentication There are basically three authentication modes Windows Passport Forms There are others through WCF You choose an authentication.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Against E-Voting Ryan Egan, Amber Jones, Alyssa Sankin, Page Stephens, Amber Straight, Philip Sugg, and Diana Troisi Direct recording electronic (DRE)
Election Technology and Problems in the Field
Political Process 3.6 Politics and Government. E- voting Electronic voting systems for electorates have been in use since the 1960s when punched card.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Computer main parts HARDWARE It corresponds to all physical and tangible parts of a computer: your electrical, electronic, electromechanical and mechanical.
# 1 Introduction & Operating Systems Introduction & Operating Systems What is a computer ? What is an operating system? What is a GUI? What is cheating?
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Install, configure and test ICT Networks
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
Stuff to memorise… "A method tells an object to perform an action. A property allows us to read or change the settings of the object."
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Stuff to memorise… "A method tells an object to perform an action. A property allows us to read or change the settings of the object."
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
E-Voting Application using Internal Vtoken Bowo Prasetyo Isolated e-Voting System in a Precinct Secured with Vote Sealing and Paper Audit Trail December.
Module Overview Installing and Configuring a Network Policy Server
E-voting …and why it’s good..
Improving Reliability of Direct Recording Electronic Voting Systems
Texas Secretary of State Elections Division
Lesson 16-Windows NT Security Issues
Essential Question What are the procedures for voting?
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Voting Machine Technology Tom Trumpbour Computer Software Consultant United States

History of Voting Machines Uniform Paper Ballots Voters make choices in private by marking boxes, then dropping ballot in sealed box First uniform paper ballots were used in Victoria Australia in Were used in the US for the first time in the State of New York in Currently less than 2 percent of voting in the US

History of Voting Machines Mechanical Lever Machines Lever closes privacy curtain which initializes for voter; horizontal levers are turned which are finalized when opening privacy curtain with lever. Counts with dials which move 1/10 th for each digit. First used in Lockport, New York in 1892 Every major US city used by 1930’s Over half of US votes by 1960’s; now 20%

History of Voting Machines Punchcards Voters punch holes in cards which are put in ballot box and later computer tabulated at precinct. First used in Georgia in 1964 Two types: votematic (names correspond to numbers) and datavote (names next to holes to be punched) In 1996 used by estimated 37 percent of US

History of Voting Machines Optical Scan Much like tests taken with number 2 pencils where one blackens the choice and is later tabulated by a machine Began use in the early 1980’s but exact origin unknown Used by about 24 percent of US by late 1990’s

History of Voting Machines Direct Recording Electronic (DRE) Like lever machines, most do not currently rely on paper. End user touches screen or push buttons. Stores results to memory, disk or smart card. Began use in the 1970’s By late 1990’s used by about 8 percent of the US. Today over 25 percent. Bulk of this talk will concentrate on DRE’s

Voting Machine Reliability Statistics Residual vote for machines from Optically Scanned1.3% Lever Machines1.4% Paper Ballots1.5% Punch Card2.5% DRE2.7%

Diebold Code on Public FTP Site Code was discovered on Diebold’s ftp site January 2003 While Diebold officials seemed un- concerned about proprietary code on the Internet, they took it off upon discovery Diebold has not taken action about mirrored code available publicly

Code Highlights The code is for the terminal voting machines, AccuVote-TS and not the GEMS back-end management system Code was written in C++, which if not in tight control, is vulnerable to buffer overflow attacks The terminals are configured under several Microsoft Windows environments (i.e. 95)

Design Summary The ballot is configured and stored to a file which can be installed by removable media or via an outside connection System is initialized and voters vote with smart cards, to be reset after voting Ender or administrator smart card gives ok to send results to be tallied at GEMS

Vulnerabilities CE mounting drive as directory-take out drive and just create directory One can program a smart card-as multiple voters or for administrative functions Encryption not used or used properly. Reporting to GEMS does not use any encryption

Vulnerabilities Phone lines, Internet, wireless all ways for man-in-the-middle attacks No change control process to prevent coders from adding malicious code Two methods for DoS attacks: Admin or ender card and ballot definition from remote Pin numbers are unprotected, stored on card Password and key are hard coded in source

Vulnerabilities Fail back to use manufacturer’s default password on smart card Configuration is done in the clear within the registry; i.e. terminal serial and COM port Candidate order on ballot matters The database is MS Access; not very robust like SQL Server or Oracle Database design lacks referential integrity

Vulnerabilities Code Samples SMC_ERROR CCLXSmartCard::Open(CCardReader* pReader) {... [removed code]... // Now initiate access to the card // If failed to access the file then have unknown card if (SelectFile(0x3d40) != SMC_OK) st = SMC_UNKNOWNCARD; // Else if our password works then all done else if (Verify(0x80, 8, {0xed, 0x0a, 0xed, 0x0a, 0xed, 0x0a, 0xed, 0x0a}) == SMC_OK) st = SMC_OK; // Else if manufactures password works then try to change password else if(Verify(0x80, 8, {0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08}) == SMC_OK) { st = ChangeCode(8, {0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08}, 8, {0xed, 0x0a, 0xed, 0x0a, 0xed, 0x0a, 0xed, 0x0a}); // Else have a bad card } else st = SMC_BADCARD; return st; }

Vulnerabilities Code Samples Audit Log Encryption: #define DESKEY ((des_key*)"F2654hD4") DesCBCEncrypt((des_c_block*)tmp, (des_c_block*) record.m_Data, totalSize, DESKEY, NULL, DES_ENCRYPT);

Vulnerablilites Code Comments /* *Parse the file until the EOF Token. If we get too many errors *at this level, we abort. */ /* A simple token is anything that starts with a character that *cannot be part of an identifier. Here we do a brute force *search of every sub-string starting with this character up *to 9 characters in length. * XXX Why the magic 9??? */

Vulnerablilites Code Comments /*XXX Okay, I don't like this one bit. Its really tough to tell where m_AudioPlayer should live. CBallotWnd is not bad, since that is where it is used most, and CBallotWnd is always around when you need to play audio. Its also the only window that is (currently) interested in OnAudioFinished messages. *Except* it seems, the CLanuageSelDlg. The solution chosen is to construct the CBallotWnd early and fire up VIBS with InitAudio(). Its probably fair to ask why CInstructionDlg is a child of CBallotDlg but not CLanguageSelDlg. CBallotDlg might be a better place for m_AudioPlayer. A reorganization might be in order here. */ { /* XXX ERROR ERROR ERROR */

Web Resources