US Election Assistance Commission - Voluntary Voting System Guidelines Vote
EAC Home
Introduction
View Guidelines
View Comments
Glossary

View Comments

Section CommentsGeneral CommentsGlossary Comments
 
Name :   Stanley A. Klein
Organization :   N/A
Post Date :   9/30/2005

General Comments
Comment :  Threats: ... All threats  
to voting systems can be classified under one or more of these vulnerabilities.  

c) Election Setup phase
1) An insider inserts code into the software and/or data into the election setup that
causes item (a) of a2
to be part of the election setup or to be introduced later
and allows the remaining items of a2
to be performed later.