The Truth will prevail, but only if we demand it from Congress!

9-11 Inside Job and Neocons Hacked 2004

SCROLL DOWN

Home ] 9-11 Inside Job ] Federal Reserve ] Hacking Elections ] Iraq War ] Fake War on Terror ] New World Order ] Media ] Peak Oil-Petro Euros ] Fascism in U.S. ] Editorials ] About Us ] Links ] Contact Us ]

 

Home
Up

 

Why do Diebold's Touch-Screen Voting Machines Have Built-In

Wireless Infrared Data Transfer Ports?

 Brads Blog

IrDA Protocol Can 'Totally Compromise System' Without Detection, Warns Federal Voting Standards Website

So far, no state or federal authority -- to our knowledge -- has dealt with this alarming security threat.

We hate to pile on... (Or do we?) But, really, with all the recent discussion of California Sec. of State Bruce McPherson's mind-blowing about-face re-certification of Diebold -- against state...

We hate to pile on... (Or do we?)

But, really, with all the recent discussion of California Sec. of State Bruce McPherson's mind-blowing about-face re-certification of Diebold -- against state law, we hasten to add -- this may be a good time to point out one small item that we've been meaning to mention for a while.

As Jody Holder's recent comment points out, McPherson's silly "conditions" for re-certification of Diebold in California require a few much-less-than-adequate knee-jerk "safe guards" towards protection of the handling of the hackable memory cards in Diebold's voting machines. (Here's McP's full "Certificate of Conditional Certification").

Never mind, as Holder mentions, that the protective seals to be required are easily peeled away without tearing. Or that such voting machines have been stored in poll workers houses for weeks leading up to an election. More to the point, for the moment, there are ways to manipulate the information on those memory cards even without removing them or breaking the seals. This is more of a concern than ever, since it was recently proven, by the now-infamous Harri Hursti hack in Leon County, FL, that changing the information on the memory cards can force election results to be flipped...without a trace being left behind.

On that note, here's the little item we've been meaning to point out. It's a photograph from the side of a Diebold AccuVote TSx touch-screen voting machine:

Now we have no idea what that "IrDA" port is meant to be used for with a touch-screen voting machine, but we do know that the IrDA (Infrared Data Association) is an Infrared port used for wireless connection between two devices. We used to have one on the back of our notebook and desktop computers which we used to keep the two systems synched up via wireless data transfers over that Infrared port.

A few election watchdog groups, including some members of the National Institute of Standards and Technology (NIST) who works with the federal authorities on these matters, have issued warnings about the IrDA port and protocols on voting machines. However, little -- if anything -- seems to have been done to mitigate the rather obvious security threat posed, as far as we can tell.

Here's how a page at Microsoft.com, last updated December 4, 2001, explains cable-free Infrafred data transfer on the Microsoft Windows CE operating system (the operating system which happens to be used in Diebold's AccuVote touch-screen voting machines -- like the one pictured above)...

Imagine the following scenario: Two notebook computers are placed beside each other. A computer icon appears on both desktops with the name of the peer computer below it. Open one of the icons to display a folder with the contents of the peer computer's desktop. Drag-and-drop between your desktop and the open folder to move files between the two computers.

·  Imagine that the only configuration that this application required to be installed or used was the ability for the user to enable or disable it. Imagine that multiple such applications could be running at the same time without interfering with each other.

·  Imagine that this application could run on 23 million existing notebook computers at a transfer speed of 115Kbps, and on 14 million existing notebook computers at 4MBps. Imagine that all applications, regardless of the speed of the underlying hardware, would work with all other applications at a common fastest speed.

·  Imagine that the other notebook computer in this example was a digital still camera, a handheld personal computer, a data capture device or a device that supports electronic commerce.

·  As a bonus, assume that the two computers do not need to be cabled together.

This application is currently possible under Microsoft® Windows® CE and the Windows family of operating systems. The underlying technology is based on inexpensive, widely available short-range infrared transceivers that adhere to the Infrared Data Association (IrDA) standards. IrDA standards (available from the IrDA at http://www.irda.org) also enable non-Windows devices to talk to Windows-based applications.



There ya go.

The issue of the IrDA port on touch-screen voting machines hasn't been much discussed as far as we can tell. VotersUnite.org issued an alert mentioning it, with a photograph (seen at right), back on October 26, 2004. The alert warned:

3) A dangerous port on the Diebold touch screen!!

This from TrueVoteMD: Diebold AccuVote TS electronic voting machines have an infrared (IrDA) port installed. This is a remote communication port through which another remote device could communicate with the touch screen and change either its data or its software or both.

If your county uses Diebold touch screens, let your county officials and election judges know that it is crucial to cover the IR port with opaque tape.



The National Institute for Standards and Technology (NIST) -- who works with the federal Election Assistance Commission (EAC) to develop and recommend guidelines for electronic voting machines -- issued a similar warning [PDF] about the Infrared ports on voting machines in a report which warned "The use of short range optical wireless," like infrared, "particularly on Election Day should not be allowed."

As mentioned, since touch-screen machines have been stored at poll workers' houses and other unsecured locations prior to Election Day, and since data can be transferred to the machines and their memory cards via Infrared -- even without removing the cards or breaking their protective seals -- the IrDA ports would seem to be a tremendous concern.

The NIST report discusses such concerns and some of the troubling security issues with IrDA protocols:

How Secure is IrDA

IrDA does not provide encryption at the Physical Layer, and depends on the end systems to implement security if any.
...
With optical, it is possible for a session to be ‘hijacked’ unless strong authentication measures are implemented between communicating systems. When a session is hijacked, a foreign device masquerades as a trusted system that is authorized to exchange data. Because the system has no way to distinguish the masquerader from the authorized system, it will accept anything from it as if [sic] was authorized.



The undated report -- from the EAC's own standards body, NIST -- then goes on to describe how simple and readily available IrDA software drivers are to obtain for use with UNIX and most Windows Operating Systems, including Windows CE. As well, it points out that such software could add executable code to the machines on, or prior to, Election Day and could then delete itself after ithe code has completed its main purpose [emphasis ours]:

IrDA Software

IrDA software drivers are available form [sic] a number of sources for use with UNIX, Windows and other Operating Systems (OS). Most versions of MS Windows come with support for IrDA already included. This is true of the MS Windows CE operating system as well as Windows XP. Microsoft also provides a free IrDA driver which can be downloaded from it web site. Other suppliers of IrDA systems (e.g., Ericsson) offer their own drivers including source code (Texas Inurnments [sic]).

With the source code available, an interrupt handler (executable code) could easily be added. For example, when the voting terminal receives a special bit configuration (caused by holding down multiple keys concurrently) that is outside the usually accepted range, a special interrupt could be generated invoking a handler that could be programmed to perform any desired function. This would require a small amount of code and could easily be hidden; such code would be difficult to discover.

If such code was installed in the driver, which is considered to be Commercial-Off-The-Shelf (COTS) [even if compiled and installed by the voting system manufacturer] it would not be examined by the ITAs [the federal Independent Testing Authorities].

Code in such a handler could be designed to place the voting terminal in a mode where it downloads and install [sic] an executable module, thus allowing unapproved logic to be added to the voting machine while in use on Election Day. Obviously this executable could perform any function the programmer desired including deleting itself when finished. The only recourse is to disallow communications with the voting terminal during use. It might be augured [sic] that such code could be added the day before Election Day.



Obviously, that last paragraph is very troubling. But also note the section about COTS.

The source code for that "Commercial-Off-The-Shelf" software is what Diebold recently argued that they couldn't provide to North Carolina after they changed their law to require all voting machine vendors to submit such code in order to receive state certification. Diebold went to state court arguing they shouldn't be forced to supply the source code for COTS software. Eventually, they lost that battle, and notified North Carolina they preferred to pull out of the state entirely (if the state wouldn't change the law for them) rather than complying with the state law requiring the submission of all such source code.

And another comment posted to NIST's voting website [PDF] by James C. Johnson on October 5, 2005, also discusses the concern, revealing that the use of the IrDA protocols could be used at any time, even after final "Logic and Accuracy" tests have been performed, and thus "totally compromising the system":

In Diebold System's AccuVote TS systems these [IrDA] ports are supported using Microsoft's Windows CE with Winsock. This makes the application interface easy to program to, and all required drivers are already installed in the OS.

It is interesting that the VVSG [Voluntary Voting System Guidelines] currently under development, while mentioning this technology does nothing to restrict or prevent its use, not even on Election Day.

It is understandable that communications technology be used for pre election preparation, but is totally irresponsible and inexcusable to allow it to be used during an election. The presence of this technology makes it possible to upload to the voting system anything that is desired after the final "Logic and Accuracy" test have been performed, thus totally compromising the system.



Perhaps some of you have additional thoughts on this matter. Like why such a port would be needed, or even present, on a touch-screen voting machine at all. And why the existence of such a port -- to our knowledge -- has hardly been discussed at all in conjuction with these machines. Especially in light of the now-infamous Leon County, FL "hack test" proving that executable code can be added to Diebold's memory cards resulting in a completely flipped election...as we've said...without a trace being left behind.

 

Blogged by Brad on 2/22/2006 @ 12:06pm PT...