

















































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
This document, courtesy of black box voting, outlines various methods of manipulating elections through vulnerabilities in vote authentication, casting, data transfer, consolidation, reporting, final canvass, district mapping, ballot access, voter registration, and ballot design. It emphasizes the importance of building an attack tree to analyze real systems and procedures, and identifies specific attack vectors such as miscalibrating touchscreens, pre-stuffing ballot boxes, and creating false poll tapes.
Typology: Exams
1 / 57
This page cannot be seen from the preview
Don't miss anything!
Our brothers died for this
Voting Rights Act of 1965: Meant toreverse the disenfranchisement ofminority voters. Key portions of thisAct are set to expire in August 2007.
March 30, 1870: 15
th
Amendment
passed, giving men of color theright to vote
Throughout our history
Our ancestors came for this
Between 1892 and 1924 over22 million people camethrough Ellis Island and thePort of New York, many ofthem seeking citizenship.
Currently, approximately
13 percent of the U.S.
population is Latino.
Election Security Issues Are RealWhen dealing with public officials:
For more background onvendor dependency, seevideo in Black Box Votingdocument archives: “Vendorsare like family”
It’s not about BushBOTH PARTIES obstructing & denyingIt’s not about being “nonpartisan”It’s about defining problem accuratelyIt’s not about the presidential electionIt’s supervisors, primaries, judges…The mechanics are a patchwork: not uniform
Traditional targets
for election
manipulation
:
County supervisors, commissioners, whoallocate construction projects and approve land use; Sheriffs, who
control contraband &
also affect zoning
decisions (traffic
control study sign-off). These local races were
probably the first
beneficiaries of voting machine manipulation.
Identify attack categories
Improving Election Integrity
Data consolidation (central tabulation)
Voter registration
Ballot design & printing
Improving Election Integrity
Vote casting
Data / ballot transfer- Create report falsifying program in memory card- Remote attackData consolidation(central tabulation)
Ballot design, print
Vote suppression- Ditch absentee ballots at mail processing centerVote authentication
Improving Election Integrity
Miscalibrate touch-screens
(Sequoia touch-screens):
How to Pre-Stuff the Ballot Box
(Diebold precinct-based optical scan)
Voting
Machine
GEMS
Voting
Machine
Voting
Machine
Don’t look at me
Voting
Machine
Voting
Machine
Voting
Machine
GEMS
How to Pre-Stuff the Ballot Box
Proof of Concept:Harri Hursti onDiebold opticalscan machine.May 26, Leon County, FL
Most people are familiar with the odometer in a
car, which “rolls over to zero” after 99,
miles. The rollover point in Diebold precinct-
based optical scans is 65,535 votes.