Princeton University researchers show how easy it is to steal votes using Diebold software in an electronic voting machine. In this fascinating video, we see how a substitute memory card can be installed in under a minute containing software which steals votes from one candidate and gives them to another – and then deletes itself so the vote-stealing cannot be detected.
Full story and research data at http://itpolicy.princeton.edu/voting/
The fastest and easiest way to insert the contaminated memory card in a Diebold machine is by opening the machine’s security door with a key. Installing a card with the vote-stealing software takes less than a minute. The very same security door key is used in every Diebold voting machine, so there are thousands of keys in circulation, and, “any locksmith will make a copy.” But just in case a malicious hacker didn’t have free access to a copy of his own, Diebold posted a picture of the key on its website. It’s easy to get 3D keys made from the picture. It’s been done. Diebold removed the picture of the key from its website but Digg reports you can still see a screenshot of it on the Brad Blog.
Hard to believe and perhaps just a wee bit scary? Well, errrr . . . yes, especially considering that Diebold recently received certification from Homeland Security to provide security integration devices to the USA federal government.
Update 06 April 2015: Here’s a report from 2011 on how easy it is to hack Diebold voting machines remotely.
Hi.
Thanks for the comment on your page — blogs can seem like a ghost town of sorts sometimes.