{"id":436,"date":"2003-08-14T13:43:37","date_gmt":"2003-08-14T17:43:37","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/longestnow\/2003\/08\/14\/fraud-in-modern-voting-cas-recall\/"},"modified":"2003-08-14T13:43:37","modified_gmt":"2003-08-14T17:43:37","slug":"fraud-in-modern-voting-cas-recall","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/longestnow\/2003\/08\/14\/fraud-in-modern-voting-cas-recall\/","title":{"rendered":"Fraud in Modern Voting:  CA&#8217;s Recall"},"content":{"rendered":"<p><a name='a195'><\/a><\/p>\n<p><P>Aaron Brown on the scary prospect of using <STRONG>Diebold <\/STRONG>electronic voting machines in the upcoming recall election in Berkeley:<\/P><br \/>\n<BLOCKQUOTE><br \/>\n<P><FONT size=\"1\">Berkeley uses the Diebold Accuvote DRE machine. Somehow the source code to these machines leaked onto the Internet&#8230; <\/FONT><A title=\"Avi Rubin, et. al.\"><FONT size=\"1\">several well-respected security researchers<\/FONT><\/A><FONT size=\"1\"> took a look at it, and <\/FONT><A href=\"http:\/\/avirubin.com\/vote.pdf\" title=\"vote.pdf\"><FONT size=\"1\">found it riddled with flaws<\/FONT><\/A><FONT size=\"1\">. Without any access to the code, <STRONG>voters <\/STRONG>could vote multiple times, view partial election results, or even <EM>close <\/EM>the polling station. Poll <STRONG>workers <\/STRONG>could do far more damage. And the machine doesn&#8217;t authenticate the remote server when reporting results, meaning that <STRONG>an ISP<\/STRONG> on the path between the voting machine and the backend vote tabulator could manipulate ballots, results, etc.&nbsp; <\/FONT><\/P><br \/>\n<P><FONT size=\"1\">Pretty damn scary.<BR><\/FONT><\/P><\/BLOCKQUOTE><br \/>\n<P>After Rubin&#8217;s paper came out, Diebold wrote a hasty hand-waving <A href=\"http:\/\/www.diebold.com\/followupstatement.pdf\">rebuttal<\/A>, and then spent some time publicly <STRONG>ridiculing <\/STRONG>the academics who wrote the paper, hoping to mollify their <STRONG>clients<\/STRONG>.&nbsp; As a result, they produced some incredible <A href=\"http:\/\/www.diebold.com\/dieboldcall&amp;post.pdf\">propaganda<\/A> which includes, among other gems (emphasis mine):<\/P><br \/>\n<BLOCKQUOTE><br \/>\n<P><FONT size=\"1\">It was most unusual to find the industry leader [Diebold] being discredited by a couple of Johns Hopkins University graduate students&#8230; [in] a report that directly contradicts information provided by Robyn M. Downs, elections administrator of Prince George&#8217;s County, Md., for a story on her implementation of electronic voting&#8230;.&nbsp; We believe Ms. Downs. <STRONG>Like most Black people in high-profile jobs, she is not in a position to make mistakes and survive<\/STRONG>.<\/FONT><\/P><\/BLOCKQUOTE><br \/>\n<P>I guess that settles it then.<\/P><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aaron Brown on the scary prospect of using Diebold electronic voting machines in the upcoming recall election in Berkeley: Berkeley uses the Diebold Accuvote DRE machine. Somehow the source code to these machines leaked onto the Internet&#8230; several well-respected security researchers took a look at it, and found it riddled with flaws. Without any access [&hellip;]<\/p>\n","protected":false},"author":135,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[216],"tags":[],"class_list":["post-436","post","type-post","status-publish","format-standard","hentry","category-fly-by-wire"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/longestnow\/wp-json\/wp\/v2\/posts\/436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/longestnow\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/longestnow\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/longestnow\/wp-json\/wp\/v2\/users\/135"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/longestnow\/wp-json\/wp\/v2\/comments?post=436"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/longestnow\/wp-json\/wp\/v2\/posts\/436\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/longestnow\/wp-json\/wp\/v2\/media?parent=436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/longestnow\/wp-json\/wp\/v2\/categories?post=436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/longestnow\/wp-json\/wp\/v2\/tags?post=436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}