{"id":9,"date":"2007-01-26T09:34:36","date_gmt":"2007-01-26T14:34:36","guid":{"rendered":"http:\/\/blog.kim.thewei.com\/2007\/01\/26\/steal-an-election-courtesy-diebold\/"},"modified":"2015-04-06T07:45:47","modified_gmt":"2015-04-06T12:45:47","slug":"steal-an-election-courtesy-diebold","status":"publish","type":"post","link":"https:\/\/thewei.com\/kimi\/steal-an-election-courtesy-diebold\/","title":{"rendered":"Steal an election, courtesy Diebold"},"content":{"rendered":"<p>Princeton University researchers show how easy it is to steal votes using Diebold software in an electronic voting machine. In this <a href=\"http:\/\/itpolicy.princeton.edu\/voting\/videos\/ts-voting.wmv\"> fascinating video<\/a>, we see how a substitute memory card can be installed <strong>in under a minute<\/strong> containing software which steals votes from one candidate and gives them to another &#8211; and then deletes itself so the vote-stealing cannot be detected.<\/p>\n<p>Full story and research data at <a href=\"http:\/\/itpolicy.princeton.edu\/voting\/\">http:\/\/itpolicy.princeton.edu\/voting\/<\/a><\/p>\n<p>The fastest and easiest way to insert the contaminated memory card in a Diebold machine is by opening the machine&#8217;s security door with a key. Installing a card with the vote-stealing software takes less than a minute. The very same security door key is used in every Diebold voting machine, so there are thousands of keys in circulation, and, &#8220;any locksmith will make a copy.&#8221; But just in case a malicious hacker didn&#8217;t have free access to a copy of his own, Diebold posted a picture of the key on its website. It&#8217;s easy to get 3D keys made from the picture. It&#8217;s been done. Diebold removed the picture of the key from its website but <a href=\"http:\/\/digg.com\/politics\/Diebold_Posts_Image_of_Master_Key_to_Website_Hackers_Make_Real_Master_Key\">Digg reports<\/a> you can still see a screenshot of it on the <a href=\"http:\/\/www.bradblog.com\/?p=4066\">Brad Blog<\/a>.<\/p>\n<p>Hard to believe and perhaps just a wee bit scary? Well, errrr . . .  yes, especially considering that Diebold recently <a href=\"http:\/\/investor.news.com\/Engine?Account=cnet&#038;PageName=NEWSREAD&#038;ID=3817458&#038;Ticker=DBD&#038;SOURCE=CLTU14909012007-1\">  received certification<\/a> from Homeland Security to provide security integration devices to the USA federal government.<\/p>\n<p>Update 06 April 2015: Here&#8217;s a report from 2011 on how easy it is to h<a href=\"http:\/\/www.salon.com\/2011\/09\/27\/votinghack\/\">ack Diebold voting machines remotely<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Princeton University researchers show how easy it is to steal votes using Diebold software in an electronic voting machine. In this fascinating video, we see how a substitute memory card can be installed in under a minute containing software which steals votes from one candidate and gives them to another &#8211; and then deletes itself &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/thewei.com\/kimi\/steal-an-election-courtesy-diebold\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Steal an election, courtesy Diebold&#8221;<\/span><\/a><\/p>\n","protected":false},"author":28,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[4,5],"tags":[],"class_list":["post-9","post","type-post","status-publish","format-standard","hentry","category-digital-life","category-government-trade"],"jetpack_publicize_connections":[],"_links":{"self":[{"href":"https:\/\/thewei.com\/kimi\/wp-json\/wp\/v2\/posts\/9","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thewei.com\/kimi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thewei.com\/kimi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thewei.com\/kimi\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/thewei.com\/kimi\/wp-json\/wp\/v2\/comments?post=9"}],"version-history":[{"count":3,"href":"https:\/\/thewei.com\/kimi\/wp-json\/wp\/v2\/posts\/9\/revisions"}],"predecessor-version":[{"id":6768,"href":"https:\/\/thewei.com\/kimi\/wp-json\/wp\/v2\/posts\/9\/revisions\/6768"}],"wp:attachment":[{"href":"https:\/\/thewei.com\/kimi\/wp-json\/wp\/v2\/media?parent=9"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thewei.com\/kimi\/wp-json\/wp\/v2\/categories?post=9"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thewei.com\/kimi\/wp-json\/wp\/v2\/tags?post=9"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}