• This is a political forum that is non-biased/non-partisan and treats every person's position on topics equally. This debate forum is not aligned to any political party. In today's politics, many ideas are split between and even within all the political parties. Often we find ourselves agreeing on one platform but some topics break our mold. We are here to discuss them in a civil political debate. If this is your first visit to our political forums, be sure to check out the RULES. Registering for debate politics is necessary before posting. Register today to participate - it's free!
  • Welcome to our archives. No new posts are allowed here.

Diebold E-Voting Source Code Leaked Again (1 Viewer)

cherokee

Devil Dog
Banned
DP Veteran
Joined
Aug 26, 2005
Messages
7,486
Reaction score
790
Gender
Undisclosed
Political Leaning
Undisclosed
For anyone who doesnt know if you have the sourse code for a program/system...... You own it.
You have an open door inside to do whatever you wish.

Source code to Diebold Election Systems voting machines has been leaked once again.

On Wednesday, former Maryland state legislator Cheryl C. Kagan was anonymously given disks containing source code to Diebold’s BallotStation and Global Election Management System (GEMS) tabulation software used in the 2004 elections. Kagan, a well-known critic of electronic voting, is executive director of the Carl M. Freeman Foundation, a philanthropic organization based in Olney, Md.

The disks were created and distributed by two federal voting machine testing labs run by Ciber and Wyle Laboratories. They had been testing systems on behalf of the state of Maryland, Diebold said in a statement.

This is not the first time that Diebold source code has been leaked. In early 2003, Diebold critic Bev Harris uncovered similar source code while conducting research using Google’s search engine.

Soon after, researchers at Johns Hopkins University and Rice University published a damning critique of Diebold’s products, based on an analysis of the software.

They found, for example, that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth.

Diebold says it has since introduced security enhancements to its products, but the fact that the company’s sensitive source code has again leaked out is not a good sign, according to Avi Rubin, a computer science professor with Johns Hopkins and one of the authors of the 2003 report.

link
http://www.cio.com/blog_view.html?CID=25984
 
This stuff is so secret and yet I find this on the web after searching for just a few minutes.
It doesn’t contain any real data that could be used in hacking…its just tech’s talking about bugs they have and are working thru but what it does give you is names and email addresses of the tech’s plus a server this info is stored on..I wonder what else is stored there?

http://scdc.sccs.swarthmore.edu/diebold/lists/bugtrack.w3archive/200112/threads.html#00056
 

Users who are viewing this thread

Back
Top Bottom