Worst ever security flaw found in Diebold TS

Found on Open Voting Foundation on Sunday, 30 July 2006
Browse Politics

"This may be the worst security flaw we have seen in touch screen voting machines," says Open Voting Foundation president, Alan Dechert. Upon examining the inner workings of one of the most popular paperless touch screen voting machines used in public elections in the United States, it has been determined that with the flip of a single switch inside, the machine can behave in a completely different manner compared to the tested and certified version.

"Diebold has made the testing and certification process practically irrelevant," according to Dechert. "If you have access to these machines and you want to rig an election, anything is possible with the Diebold TS -- and it could be done without leaving a trace. All you need is a screwdriver." This model does not produce a voter verified paper trail so there is no way to check if the voter’s choices are accurately reflected in the tabulation.

"These findings underscore the need for open testing and certification. There is no way such a security vulnerability should be allowed. These systems should be recalled"

It's amazing that those machines are still in use with all those bugs.