Harry Hursti, Black Box Report Security Alert: July 4, 2005 Critical Security Issues with Diebold Optical Scan Design (1.94w), 2005, http://www.blackboxvoting.org/BBVtsxstudy.pdf
International Parliamentary Union, Free & Fair Elections, 2006
http://www.ipu.org/PDF/publications/Free&Fair06-e.pdf
Rebecca Mercuri, PhD., focused on electronic vote tabulating since 1989, Affidavit filed in Squire v. Geer, Franklin County (Ohio) Court of Appeals, 06APD-12-1285.
Princeton Study: Feldman, Ariel J., J.A. Halderman, and E.W. Felten, "Security Analysis of the Diebold AccuVote-TS Voting Machine," Center for Information Technology Policy and Dept. of Computer Science, Woodrow Wilson School of Public and International Affairs, Princeton University, 2006. http://itpolicy.princeton.edu/voting
RABA Technologies LLC. Trusted Agent Report: Diebold AccuVote-TS Voting System (report prepared for Department of Legislative Services, Maryland General Assembly, Annapolis, Md., January 2004). http://www.raba.com/press/TA_Report_AccuVote.pdf
Aviel Rubin, News article: "On My Mind: Pull The Plug," Forbes Magazine, 8/2006 http://www.forbes.com/forbes/2006/0904/040.html?partner=alerts&_requestid=2972
U.S. Commission on Federal Election Reform, 2006. News article: "Reversing Course on Electronic Voting: Some Former Backers of Technology Seek Return to Paper Ballots, Citing Glitches, Fraud Fears," Wall Street Journal, May 12, 2006.
click here
David Wagner, Ph.D., Computer Science Division, University of California, Berkeley. Written Testimony before the Committee on Science and Committee on House Administration U.S. House of Representatives, July 19, 2006.
ANNOTATIONS
BRENNAN CENTER, The Machinery of Democracy: Protecting Elections in an Electronic World, 2006 http://www.brennancenter.org/programs/downloads/Full%20Report.pdf
Studied 3 voting systems by type: DRE, DRE w/VVPAT, and Optical Scan. Brennan identified 120 vulnerability points.
Report is limited to identifying the least difficult way to alter results on a statewide basis. It is also limited to studying attacks that cannot be prevented by physical security and accounting measures taken by election officials. The analysis further assumed that certain fundamental physical security and accounting procedures were already in place.
Concluded that it would take only one person, with a sophisticated technical knowledge and timely access to the software that runs the voting machines, to change the outcome.
All three voting systems have significant security and reliability vulnerabilities, which pose a real danger to the integrity of national, state, and local elections.
Next Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).