Federal Agency Faults Voting Machines
Federal Agency Says Paperless Electronic Voting Machines Can't Be Made Secure
The Associated Press
WASHINGTON - Paperless electronic voting machines in widespread use across the country may be vulnerable to errors or sabotage and cannot be made secure, a draft report by a federal agency said.
The report by researchers at the influential National Institute of Standards and Technology said the paperless voting machines essentially notebook computers programmed to display ballot images and record voter choices "in practical terms cannot be made secure."
"Many people, especially in the computer engineering and security community, assert that the (voting machines) are vulnerable to undetectable errors as well as malicious software attacks," the report said.
A key weakness is that there is no audit mechanism or paper trail to verify election results other than what the machine itself reports, the report said.
"Potentially, a single programmer could 'rig' a major election," the report said.
After examining the issue, including volunteering as election workers at polling sites, NIST researchers said in their report that they concluded that they not know how to write "testable requirements" to make the machines secure and it is their recommendation that the machines "in practical terms cannot be made secure."
Many states bought the paperless electronic voting machines with money provided by Congress after the 2000 presidential election, whose disputed results went all the way to the Supreme Court.
Gail Porter, NIST's public affairs director, emphasized that the draft report is a "discussion document" whose conclusions and recommendations could change.
(Click here for the rest.)
The Associated Press
WASHINGTON - Paperless electronic voting machines in widespread use across the country may be vulnerable to errors or sabotage and cannot be made secure, a draft report by a federal agency said.
The report by researchers at the influential National Institute of Standards and Technology said the paperless voting machines essentially notebook computers programmed to display ballot images and record voter choices "in practical terms cannot be made secure."
"Many people, especially in the computer engineering and security community, assert that the (voting machines) are vulnerable to undetectable errors as well as malicious software attacks," the report said.
A key weakness is that there is no audit mechanism or paper trail to verify election results other than what the machine itself reports, the report said.
"Potentially, a single programmer could 'rig' a major election," the report said.
After examining the issue, including volunteering as election workers at polling sites, NIST researchers said in their report that they concluded that they not know how to write "testable requirements" to make the machines secure and it is their recommendation that the machines "in practical terms cannot be made secure."
Many states bought the paperless electronic voting machines with money provided by Congress after the 2000 presidential election, whose disputed results went all the way to the Supreme Court.
Gail Porter, NIST's public affairs director, emphasized that the draft report is a "discussion document" whose conclusions and recommendations could change.
(Click here for the rest.)
0 Comments:
Post a Comment
<< Home