Diebold’s Latest Security Debacle
Posted on Jan 24, 2007
It turns out Diebold uses a universal key to access its voting machines, meaning that anyone who has one, a minute of free time and a little know-how can steal an election without a trace. What’s worse, the company made an image of the key available on its website, allowing at least one viewer to produce multiple working copies.
It was revealed in the course of last summer’s landmark virus hack of a Diebold touch-screen voting system at Princeton University that, incredibly, the company uses the same key to open every machine. It’s also an easy key to buy at any office supply store since it’s used for filing cabinets and hotel mini-bars! That is, if you’re not a poll worker who already has one from the last time you worked on an election (anybody listening down there in San Diego?)
The Princeton Diebold Virus Hack, if you’ve been living in a cave, found that a single person with 60 seconds of unsupervised access to the system who either picked the lock (easy in 10 seconds) or had a key, could slip a vote-swapping virus onto a single machine which could then undetectably affect every other machine in the county to steal an entire election.
But the folks at Princeton who discovered the hack (after our own organization, VelvetRevolution.us, gave them the Diebold touch-screen machine on which to perform their tests) had resisted showing exactly what the key looked like in order to hold on to some semblance of security for Diebold’s Disposable Touch-Screen Voting Systems.
But guess what? Diebold didn’t bother to even have that much common sense.
This idiotic company has had a photograph of the stupid key sitting on their own website’s online store!