Politics &Science 15 Sep 2006 08:13 pm

Election Stealing Virus Study

A study released recently discusses even more attacks on Diebold Accu-Vote TS machines.

A great quote from the Princeton paper describing 3 types of attacks they identified:


The first method requires the attacker to remove several screws and lift off the top of the machine to get access to the motherboard and EPROM. The other methods only require access to the memory card slot and power button, which are both behind a locked door on the side of the machine. The lock is easily
picked—one member of our group, who has modest locksmithing skills, can pick the lock consistently in less than 10 seconds. Alternatively, this slot can be reached by removing screws and opening the machine. Some attackers will have access to keys that can open the lock—all AccuVote-TS machines in certain states use identical keys [24], there are thousands of keys in existence, and these keys can be copied at a hardware
or lock store.

A poll worker, election official, technician, or other person who had private access to a machine for as little as one minute could use these methods without detection. Poll workers often do have such access; for instance, in a widespread practice called “sleepovers,” machines are sent home with poll workers the night before the election [27].

(Via Ars Technica)

Subscribe to the comments through RSS Feed

Leave a Reply