US Election Assistance Commission - Voluntary Voting System Guidelines Vote
EAC Home
Introduction
View Guidelines
View Comments
Glossary

View Comments

Section CommentsGeneral CommentsGlossary Comments
 
Name :   Stanley A. Klein
Organization :   N/A
Post Date :   9/30/2005

General Comments
Comment :  Threats: ... All threats  
to voting systems can be classified under one or more of these vulnerabilities.  

b) InterElection
Maintenance phase
1) An insider (election official or voting system technician) inserts malicious
code into the software having an effect similar to that identified in a2.
2) Someone who has illegally gained access to the voting systems (who is not an insider) modifies the devices. (This could also be true at any of the other points, but is most likely to happen during the months between elections where
controlled access to the systems may be lax.)