g r o t t o 1 1

Peeve Farm
Breeding peeves for show, not just to keep as pets
Brian Tiemann
Silicon Valley-based purveyor of a confusing mixture of Apple punditry and political bile.

btman at grotto11 dot com

Read These Too:

InstaPundit
USS Clueless
James Lileks
Little Green Footballs
As the Apple Turns
Entropicana
Cold Fury
Capitalist Lion
Red Letter Day
Eric S. Raymond
Tal G in Jerusalem
Secular Islam
Aziz Poonawalla
Corsair the Rational Pirate
.clue
Ravishing Light
Rosenblog
Cartago Delenda Est

« ? Blogging Brians # »





Book Plugs:


Buy 'em and I get
money. I think.
BSD Mall


Amazon Honor System Click Here to Pay Learn More



 11/8/2004 - 11/11/2004
 11/1/2004 -  11/7/2004
10/25/2004 - 10/31/2004
10/18/2004 - 10/24/2004
10/11/2004 - 10/17/2004
 10/4/2004 - 10/10/2004
 9/27/2004 -  10/3/2004
 9/20/2004 -  9/26/2004
 9/13/2004 -  9/19/2004
  9/6/2004 -  9/12/2004
 8/30/2004 -   9/5/2004
 8/23/2004 -  8/29/2004
 8/16/2004 -  8/22/2004
  8/9/2004 -  8/15/2004
  8/2/2004 -   8/8/2004
 7/26/2004 -   8/1/2004
 7/19/2004 -  7/25/2004
 7/12/2004 -  7/18/2004
  7/5/2004 -  7/11/2004
 6/28/2004 -   7/4/2004
 6/21/2004 -  6/27/2004
 6/14/2004 -  6/20/2004
  6/7/2004 -  6/13/2004
 5/31/2004 -   6/6/2004
 5/24/2004 -  5/30/2004
 5/17/2004 -  5/23/2004
 5/10/2004 -  5/16/2004
  5/3/2004 -   5/9/2004
 4/26/2004 -   5/2/2004
 4/19/2004 -  4/25/2004
 4/12/2004 -  4/18/2004
  4/5/2004 -  4/11/2004
 3/29/2004 -   4/4/2004
 3/22/2004 -  3/28/2004
 3/15/2004 -  3/21/2004
  3/8/2004 -  3/14/2004
  3/1/2004 -   3/7/2004
 2/23/2004 -  2/29/2004
 2/16/2004 -  2/22/2004
  2/9/2004 -  2/15/2004
  2/2/2004 -   2/8/2004
 1/26/2004 -   2/1/2004
 1/19/2004 -  1/25/2004
 1/12/2004 -  1/18/2004
  1/5/2004 -  1/11/2004
12/29/2003 -   1/4/2004
12/22/2003 - 12/28/2003
12/15/2003 - 12/21/2003
 12/8/2003 - 12/14/2003
 12/1/2003 -  12/7/2003
11/24/2003 - 11/30/2003
11/17/2003 - 11/23/2003
11/10/2003 - 11/16/2003
 11/3/2003 -  11/9/2003
10/27/2003 -  11/2/2003
10/20/2003 - 10/26/2003
10/13/2003 - 10/19/2003
 10/6/2003 - 10/12/2003
 9/29/2003 -  10/5/2003
 9/22/2003 -  9/28/2003
 9/15/2003 -  9/21/2003
  9/8/2003 -  9/14/2003
  9/1/2003 -   9/7/2003
 8/25/2003 -  8/31/2003
 8/18/2003 -  8/24/2003
 8/11/2003 -  8/17/2003
  8/4/2003 -  8/10/2003
 7/28/2003 -   8/3/2003
 7/21/2003 -  7/27/2003
 7/14/2003 -  7/20/2003
  7/7/2003 -  7/13/2003
 6/30/2003 -   7/6/2003
 6/23/2003 -  6/29/2003
 6/16/2003 -  6/22/2003
  6/9/2003 -  6/15/2003
  6/2/2003 -   6/8/2003
 5/26/2003 -   6/1/2003
 5/19/2003 -  5/25/2003
 5/12/2003 -  5/18/2003
  5/5/2003 -  5/11/2003
 4/28/2003 -   5/4/2003
 4/21/2003 -  4/27/2003
 4/14/2003 -  4/20/2003
  4/7/2003 -  4/13/2003
 3/31/2003 -   4/6/2003
 3/24/2003 -  3/30/2003
 3/17/2003 -  3/23/2003
 3/10/2003 -  3/16/2003
  3/3/2003 -   3/9/2003
 2/24/2003 -   3/2/2003
 2/17/2003 -  2/23/2003
 2/10/2003 -  2/16/2003
  2/3/2003 -   2/9/2003
 1/27/2003 -   2/2/2003
 1/20/2003 -  1/26/2003
 1/13/2003 -  1/19/2003
  1/6/2003 -  1/12/2003
12/30/2002 -   1/5/2003
12/23/2002 - 12/29/2002
12/16/2002 - 12/22/2002
 12/9/2002 - 12/15/2002
 12/2/2002 -  12/8/2002
11/25/2002 -  12/1/2002
11/18/2002 - 11/24/2002
11/11/2002 - 11/17/2002
 11/4/2002 - 11/10/2002
10/28/2002 -  11/3/2002
10/21/2002 - 10/27/2002
10/14/2002 - 10/20/2002
 10/7/2002 - 10/13/2002
 9/30/2002 -  10/6/2002
 9/23/2002 -  9/29/2002
 9/16/2002 -  9/22/2002
  9/9/2002 -  9/15/2002
  9/2/2002 -   9/8/2002
 8/26/2002 -   9/1/2002
 8/19/2002 -  8/25/2002
 8/12/2002 -  8/18/2002
  8/5/2002 -  8/11/2002
 7/29/2002 -   8/4/2002
 7/22/2002 -  7/28/2002
 7/15/2002 -  7/21/2002
  7/8/2002 -  7/14/2002
  7/1/2002 -   7/7/2002
 6/24/2002 -  6/30/2002
 6/17/2002 -  6/23/2002
 6/10/2002 -  6/16/2002
  6/3/2002 -   6/9/2002
 5/27/2002 -   6/2/2002
 5/20/2002 -  5/26/2002
 5/13/2002 -  5/19/2002
  5/6/2002 -  5/12/2002
 4/29/2002 -   5/5/2002
 4/22/2002 -  4/28/2002
 4/15/2002 -  4/21/2002
  4/8/2002 -  4/14/2002
  4/1/2002 -   4/7/2002
 3/25/2002 -  3/31/2002
 3/18/2002 -  3/24/2002
 3/11/2002 -  3/17/2002
  3/4/2002 -  3/10/2002
 2/25/2002 -   3/3/2002
 2/18/2002 -  2/24/2002
 2/11/2002 -  2/17/2002
  2/4/2002 -  2/10/2002
 1/28/2002 -   2/3/2002
 1/21/2002 -  1/27/2002
 1/14/2002 -  1/20/2002
  1/7/2002 -  1/13/2002
12/31/2001 -   1/6/2002
12/24/2001 - 12/30/2001
12/17/2001 - 12/23/2001
Thursday, November 11, 2004
12:04 - IANA-Security-Expert

(top) link
Apparently the stink over Diebold voting system software is making a new set of rounds. I had an e-mail forwarded to me with a request for a voice-of-reason commentary from a technical perspective; the problem is that I don't know my facts well enough to be sure my response held water.

Here's the original e-mail, in part:

News Update from Citizens for Legitimate Government
November 10, 2004
http://www.legitgov.org/

http://www.legitgov.org/index.html#breaking_news

Diebold Source Code!!! --by ouranos (dailykos.com) "Dr. Avi Rubin is
currently Professor of Computer Science at John Hopkins University. He
'accidentally' got his hands on a copy of the Diebold software
program--Diebold's source code--which runs their e-voting machines.
Dr. Rubin's students pored over 48,609 lines of code that make up this
software. One line in particular stood out over all the rest:
#defineDESKEY((des_KEY8F2654hd4" All commercial programs have
provisions to be encrypted so as to protect them from having their
contents read or changed by anyone not having the key... The line that
staggered the Hopkins team was that the method used to encrypt the
Diebold machines was a method called Digital Encryption Standard
(DES), a code that was broken in 1997 and is NO LONGER USED by anyone
to secure programs. F2654hd4 was the key to the encryption. Moreover,
because the KEY was IN the source code, all Diebold machines would
respond to the same key. Unlock one, you have them ALL unlocked. I
can't believe there is a person alive who wouldn't understand the
reason this was allowed to happen. This wasn't a mistake by any
stretch of the imagination."

That site (legitgov.org) is quite an eye-popper. (Check it out and see... whoof.) That in itself makes one wonder, as does the fact that I couldn't find this topic as a front-page post in any of the past three days at DailyKos.com; but we're talking about the specific charge here of the DES encryption being intentionally crippled. So here's my response that I sent:

Apparently the "F2654hd4" thing is legit. There has been commentary on this for a while now, dating back to at least February of this year.

One has to look, though, at what exactly the risks are that are involved with this code. What we're talking about is, essentially, broken encryption. A malicious outsider, in order to change voting results, would have to simultaneously gain control of all the voting machines in the country-- note, by the way, that these are not networked or available via the Internet or anything-- and install some kind of output-modifying Trojan.

I appeal once more to Occam's Razor: if someone were so nefarious as to hijack all these voting machines (which are hardly used in a large portion of the US-- their deployment is still quite limited, and mostly in urban areas that turned out blue anyway), why would they allow voting to be so close? What good is an evil genius plan to subvert technology if it's no more effective than a lurid headline on Election Eve?

The main reason I have a hard time taking any of this stuff seriously is that the final popular vote turned out to pretty closely reflect the pre-election polls, or actually to be rather closer than most (which showed a pretty consistent Bush lead by 4-5%). If there were a huge discrepancy, or a reversal in outcome from the polls to the election, then it would be suspicious. But if the election is one data point, the polls are a whole bunch more, and they all would seem to agree. To suggest that the election results were wrong is to suggest that the polls were also similarly wrong, and necessarily for quite different reasons. To suggest that the tampering occurred in Ohio suggests that whoever did the tampering knew beforehand that Ohio would be the deciding state, just as with Florida in 2000. Too much implausibility.

Now, you'll get no argument from me that voting machines are a big risk to the very core of our democracy. Any security expert would be horrified at the very *concept* of voting machines, simply because they have no paper trail, no way for the voter to audit them. At my polling place, they activated a card with my voter ID on it, which I stuck into the machine to start the process; when it was done, it told me it had written out the data to the machine's internal hard drive and to internal paper tape. But how do I know what it's written? It's not like I have a punch-card in my hand where I can line up the holes and tell what number I punched out, or a box with a #2 pencil X in it next to the name of my guy. It's all faith with these machines: faith that the names I voted for are the ones that are eventually, after many transformations of physical media and data transmission and encoding, reported to the registrar. There is no assurance of this. None.

However, suppose you're in the shoes of a voter action group after 2000, incensed over hanging chads and the impression that human interaction-- biased or incompetent election officials-- presented an unfair risk to your PAPER ballots, by inadvertently "losing" them, leaving boxes of them in trunks of cars, outright making up numbers for the final tally, et cetera. What kind of voting-machine reform are you going to push for? A return to *more* dependence on paper and human interaction, like in the good old days? Or would you want to latest and greatest cutting-edge technology, one that's seen as a closed black box that humans can't tamper with?

It's that latter impulse that has ended up rushing machines like the Sequoia/Diebold ones onto the market before they'd been properly subjected to auditing. It's possible that the DES flaw shown in the code is the result of just some sloppy programmer's coding, putting in a hard-wired key so that early development testing would work, and then later forgetting to take it out. I know I've done stuff like that in my own code, especially when I'm on a deadline.

But let's be clear about this: the risk of voting machines is in their insidiously reassuring black-box nature. They *seem* like they're immune to human interaction, when in fact they could be little more than interactive Flash games that report nothing at all to anybody, while assuring voters that they voted. It's a far more complex charge to level, and far, far less likely, that there was any kind of malicious tampering that leveraged a flaw in the encryption algorithm to oh-so-subtly tweak the numbers in certain districts so that the results, uh, turned out all over the map, resulting in a very nearly half-and-half split outcome. Again: if you have to assume that the perpetrator is both an evil genius and an incompetent fool, it's not a plausible theory, especially if the results can be explained equally well by NO malfeasance on anybody's part.

I don't like the idea of electronic voting machines becoming the norm in our elections. It reduces accountability and verifiability to an unacceptable degree, for a much less (I think) important increase in convenience for the vote-counters assuming all works correctly. But if they're going to be adopted whether we like it or not, then they MUST be subject to source auditing at the public level. I think that's probably coming in the next few years; certainly the outcries I'm seeing seem to demand it. In the meantime, we have to remember that the results, to be frank, seem to reflect everybody's expected outcome more than any evidence of tampering.

Let's focus on getting these things right so we don't have to go through this again the next time around.

Now, I don't know enough about DES to know how seriously to take these claims. I was quite surprised to see terms being thrown around like "F2654hd4 was the key to the encryption", which sounded incredibly bogus to me; but I googled it and found six pages of scholarly papers on DES and security breakage, many focusing on voting machine software, presumably this same problem. Apparently it's been floating around for some time now, but Snopes has nothing on it.

So what I'm wondering is, what kind of official statements have been made about this, from Diebold or anyone else up the responsibility chain? What's the current analysis from the security-nerd community? Is there any evidence of any kind of preplanned plot to subvert the electoral process inherent in this, or is it a red herring that causes us to lose sight of the real gotchas of dependence on electronic voting? The above Occam's-Razor arguments for skepticism aside, what's the response to this development?

It's best we get this question out into the open, if purely in the interest of pushing for whatever kind of accountability in electronic voting can be gleaned.

UPDATE: Here's the original analysis of the code, from last June, by Avi Rubin et al. Whatever the implications, it seems this has been under discussion for some time. As this guy says, "One thing I’m still not clear about: Are these polling machines actually getting used yet?" If it's the one I voted on, I guess; but I know that those machines were connected to each other only by a daisy-chained power cord. No UTP cable. These things weren't on the Internet, that much is for damn sure.

UPDATE: Frank J's all over this, of course.


Back to Top


© Brian Tiemann