Difference between revisions of "Premier Election Solutions"

From Wikispooks
Jump to navigation Jump to search
m
(→‎History: links, update video)
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{group
 
{{group
|wikipedia=
+
|wikipedia=https://en.wikipedia.org/wiki/Premier_Election_Solutions
 
|constitutes=company
 
|constitutes=company
 
|leaders=
 
|leaders=
 +
|cavdef=https://cavdef.org/w/index.php?title=Premier_Election_Solutions
 
|logo=
 
|logo=
|twitter=
 
 
|start=
 
|start=
 
|headquarters=
 
|headquarters=
 
|sourcewatch=http://www.sourcewatch.org/index.php/Premier_Election_Solutions
 
|sourcewatch=http://www.sourcewatch.org/index.php/Premier_Election_Solutions
 
}}
 
}}
'''Diebold Election Solutions''' was renamed '''Premier Election Solutions''', after multiple leaks and charges that their voting software was insecure.
+
'''Premier Election Solutions''', formerly named '''Diebold Election Systems, Inc'''. (DESI), was a major US elections vendor who was sold after multiple leaks and charges that their voting software was insecure.  
 +
 
 +
==History==
 +
Founded as Global Election Systems (GES), they were acquired by Diebold Inc., a banking and security corporation, in [[2002]]. Bad press led Diebold to change the name of its election division to Premier, and eventually sell it to ES&S.<ref>https://www.heise.de/news/Diebold-stoesst-Geschaeft-mit-Wahlmaschinen-ab-754649.html</ref> However, the [[Justice Department]] recognized this as a monopoly and forced [[ES&S]] to sell Premier in [[2010]]; it was acquired by [[Dominion]].<ref>https://www.justice.gov/opa/pr/justice-department-requires-key-divestiture-election-systems-softwarepremier-election</ref><ref>https://www.prlog.org/10691839-ess-completes-agreement-to-sell-premier-election-solutions-intellectual-property-and-other-assets.html</ref><ref>https://www.tmcnet.com/usubmit/2010/05/20/4800289.htm</ref>
 +
 
 
{{YouTubeVideo
 
{{YouTubeVideo
|align=left
+
|align=right
|code=aZws98jw67g
+
|caption=Princeton University Exposes Diebold Flaws
 +
|code=6-Qcvqxuy5o
 
}}
 
}}
 +
 
==Leaks==
 
==Leaks==
 
===2003===
 
===2003===
Sometime in the spring of 2003 an unknown hacker broke into Diebold computers and obtained a large portion of their email archives, which was posted online. The source code to their voting machines was also leaked. Researchers at [[Johns Hopkins University]] and [[Rice University]] published a damning critique of the products, based on an analysis of the software. They stated that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth.  
+
Sometime in the spring of [[2003]] an unknown hacker broke into Diebold computers and obtained a large portion of their email archives, which was posted online. The source code to their voting machines was also leaked. Researchers at [[Johns Hopkins University]] and [[Rice University]] published a damning critique of the products, based on an analysis of the [[software]]. They stated that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth.
 +
 
 +
==== Diebold Princeton analysis ====
 +
{{QB|
 +
Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss. We have constructed demonstration software that carries out this vote-stealing attack. Anyone who has physical access to a voting machine, or to a memory card that will later be inserted into a machine, can install said malicious software using a simple method that takes as little as one minute. In practice, poll workers and others often have unsupervised access to the machines. AccuVote-TS machines are susceptible to voting-machine viruses and computer viruses that can spread malicious software automatically and invisibly from machine to machine during normal pre and post-election activity. We have constructed a demonstration virus that spreads in this way, installing our demonstration vote-stealing program on every machine it infects. While some of these problems can be eliminated by improving Diebold's software, others cannot be remedied without replacing the machines' hardware. Changes to election procedures would also be required to ensure security.<ref>http://web.archive.org/web/20200906145401/https://jhalderm.com/pub/papers/diebold-ttbr07.pdf</ref><ref>https://www.princeton.edu/news/2006/09/13/researchers-reveal-extremely-serious-vulnerabilities-e-voting-machines</ref><ref>https://citp.princeton.edu/our-work/voting/videos/</ref>
 +
}}
 +
 
 
===2006===
 
===2006===
 
Another leak occurred in 2006.<ref>https://www.computerworld.com/article/2547648/security0/diebold-source-code-leaked-again.html</ref>
 
Another leak occurred in 2006.<ref>https://www.computerworld.com/article/2547648/security0/diebold-source-code-leaked-again.html</ref>
Line 23: Line 35:
 
==References==
 
==References==
 
{{reflist}}
 
{{reflist}}
{{Stub}}
 

Latest revision as of 16:50, 12 November 2024

Group.png Premier Election Solutions  
(CompanyCavdef SourcewatchRdf-entity.pngRdf-icon.png
Interest ofAthan Gibbs

Premier Election Solutions, formerly named Diebold Election Systems, Inc. (DESI), was a major US elections vendor who was sold after multiple leaks and charges that their voting software was insecure.

History

Founded as Global Election Systems (GES), they were acquired by Diebold Inc., a banking and security corporation, in 2002. Bad press led Diebold to change the name of its election division to Premier, and eventually sell it to ES&S.[1] However, the Justice Department recognized this as a monopoly and forced ES&S to sell Premier in 2010; it was acquired by Dominion.[2][3][4]

Princeton University Exposes Diebold Flaws

Leaks

2003

Sometime in the spring of 2003 an unknown hacker broke into Diebold computers and obtained a large portion of their email archives, which was posted online. The source code to their voting machines was also leaked. Researchers at Johns Hopkins University and Rice University published a damning critique of the products, based on an analysis of the software. They stated that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth.

Diebold Princeton analysis

Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss. We have constructed demonstration software that carries out this vote-stealing attack. Anyone who has physical access to a voting machine, or to a memory card that will later be inserted into a machine, can install said malicious software using a simple method that takes as little as one minute. In practice, poll workers and others often have unsupervised access to the machines. AccuVote-TS machines are susceptible to voting-machine viruses and computer viruses that can spread malicious software automatically and invisibly from machine to machine during normal pre and post-election activity. We have constructed a demonstration virus that spreads in this way, installing our demonstration vote-stealing program on every machine it infects. While some of these problems can be eliminated by improving Diebold's software, others cannot be remedied without replacing the machines' hardware. Changes to election procedures would also be required to ensure security.[5][6][7]

2006

Another leak occurred in 2006.[8]

Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.



References