US Election Assistance Commission - Voluntary Voting System Guidelines Vote
EAC Home
Introduction
View Guidelines
View Comments
Glossary

View Comments

Section CommentsGeneral CommentsGlossary Comments
 
Name :   Stanley A. Klein
Organization :   N/A
Post Date :   9/30/2005

General Comments
Comment :  Threats: ... All threats  
to voting systems can be classified under one or more of these vulnerabilities.  

d) Voting phase
1) A voter is able to insert malicious code or otherwise tamper with the voting
device to cause or perform any of the items listed in a2.
2) An insider is able to insert code or otherwise tamper with, e.g., adjust, the
voting device or with any stored data that causes, performs, or allows any of
the items listed in a2
whether deliberately or inadvertently.
3) An eavesdropper is able to use compromising electromagnetic emissions to
identify or modify ballots cast by voters, with or without collusion of the
voters involved.
4) A voter, technician, poll worker or election official may be able to activate a
Trojan horse or other malicious code that has been previously installed, in
order to affect or manipulate ballot contents or vote.
5) An external device may be connected to the voting system through smart card
or other external interface and allow unintended actions to occur.