Diebold Compromised Its Own Voting Machine Security
A photo of the key on its Web site helped reproduce real duplicate keys that can open the controversial voting machines.
Chalk up another problem for embattled voting machine maker Diebold. This time, however, the culprit is Diebold itself.
The latest security lapse for Diebold is a product of the company's own marketing: A picture of a voting machine key on the Diebold Web site has been used to create real duplicate keys that can open Diebold's voting machines.
"Diebold's AccuVote-TS electronic voting machines have lousy security," security researcher J. Alex Halderman declared in a blog post on Tuesday.
The revelation follows other dilemmas for Diebold. Various media reports suggest malicious software can be installed on Diebold voting machines and the lock securing the machines can be opened with a simple hotel minibar key.
As detailed on Freedom to Tinker, Ross Kinard, a contributor to technology podcast Sploitcast, used blank keys from Ace Hardware, a drill, three cabinet locks as guides, and a file to create three keys that matched the key pictured on Diebold's site. Kinard then sent the keys to Halderman, who had a Diebold machine he had acquired in the course of his security research. Two of the three hand-filed keys opened the Diebold machine.
Diebold did not immediately reply to a request for comment.
Halderman reported that on Thursday Diebold removed the picture of the key from its site. He offers this damning assessment of the security of the company's voting machines: "Security experts advocate designing systems with 'defense in depth,' multiple layers of barriers against attack. The Diebold electronic voting systems, unfortunately, seem to exhibit 'weakness in depth.' If one mode of attack is blocked or simply too inconvenient, there always seems to be another waiting to be exposed."
The Business of Going DigitalDigital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
What The Business Really Thinks Of IT: 3 Hard TruthsThey say perception is reality. If so, many in-house IT departments have reason to worry. InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business views IT's performance in delivering services - and, more important, powering innovation. The news isn't great.