Politech mailing list archives
Risks and vulnerabilities of Ohio voting systems, via EFF
From: Declan McCullagh <declan () well com>
Date: Mon, 08 Dec 2003 09:49:24 -0500
--- Date: Fri, 5 Dec 2003 15:23:11 -0800 Mime-Version: 1.0 (Apple Message framework v553) Content-Type: text/plain; charset=US-ASCII; format=flowed Subject: Fwd: [E-S] [Fwd: Electronic Voting Device Information] From: Jason Schultz <jason () eff org> To: declan () well com Content-Transfer-Encoding: 7bit Message-Id: <FE504C18-2779-11D8-8824-000A959B27EE () eff org>Declan -- Thought you might enjoy this additional angle on e-voting security issues from one of our members.
[Forwarded with permission] Begin forwarded message:
From: "George Geczy" <george () dgtechnical com> Date: Thu Dec 4, 2003 11:03:09 PM US/Pacific To: <election () sos state oh us> Cc: <donna () eff org> Subject: Electronic Voting Device Information Reply-To: <george () dgtechnical com> TO: Ohio Secretary of State / Elections office CC: Electronic Frontier Foundation I read the recent press release and backup documentation on the review of Electronic Voting devices, released by the Ohio Secretary of State. I would like to thank you for posting the full report online. It is through such public scrutiny that online voting can truly become reliable. The Compuware report did, however, make a mistake in its view of certain security issues, and as I could not locate their email contact information maybe you could forward this to them for their future reviews. In their audit they declared the infrared interface used in systems such as the iVotronic to be secure as it is proprietary and "will not connect to a normal Windows, Linux or Mac machine". However, it is in fact very easy to reverse-engineer infrared communication. A device as simple as a "Palm Pilot" handheld computer can receive and transmit most custom infrared signals, and so the use of an infrared interface does NOT preclude hacking and unauthorized access through this method. In particular, if the data transmitted through the infrared port is not encrypted and properly keyed, it should be very simple to reverse-engineer the communications protocols between the PEB and the iVotronic. Given the Compuware report's comments on the lack of encryption and security in other elements of the system (such as writing to the memory card), it would seem that the iVotronic may be relying on a false sense of security in the use of an Infrared interface. The Compuware methodology heavily scrutinizes all other forms of interface to a voting unit (standard network connects and interface ports), but falls into this trap of not considering the infrared interface to be an at-risk port. Given the other security risks identified in the Compuware report, hacking an iVotronic could be as simple as walking into the voting booth using a correctly programmed Palm Pilot (a not at all unusual device among citizens) and using it to simulate a supervisory PEB access device. -- George Geczy. - George Geczy, Partner, dg technical consulting - Co-Chair, Hamilton Chamber Science & Technology Committee - Email: george () dgtechnical com Phone/Fax 905.304.9383
----------------------------------------------------------------------- Jason M. Schultz (415) 436-9333 x 112 Staff Attorney jason () eff org Electronic Frontier Foundation www.eff.org _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/)
Current thread:
- Risks and vulnerabilities of Ohio voting systems, via EFF Declan McCullagh (Dec 08)