Diebold Voting Machine Security Hole... Again
The vulnerability, which is still being kept mostly secret, appears to let someone upload new software to the machines with just a few minutes at the machines -- potentially allowing them to change voting results on the machine. This is, clearly, a major issue -- and certainly not the first one found on Diebold machines. In the past, we've seen reports about weak security, putting ballots online and unprotected, a default easy password used on all machines across the country, reports of miscounts on the machines, evidence that Diebold employees purposely hid security problems, claims that Diebold made last minute changes to voting machine software (in violation of election laws), evidence that other machines were easily hacked and a number of other problems with both the machines and people who worked at Diebold (such as the convicted felons who ran the unit that wrote the voting machine software).
In some cases, even when serious issues have been shown, the company has publicly laughed them off and then made life difficult for elections officials who are required by law to buy electronic voting machines, by doing things like making them sign contracts that won't allow these types of security tests. In fact, the whole reason this new serious vulnerability came to light was because of a security test done on the machines for a county elections official in Utah in March. You remember... that was the case where Diebold claimed such tests were a violation of their warranty, and they demanded $40,000 to "recertify" the machines.