US Election Assistance Commission - Voluntary Voting System Guidelines Vote
EAC Home
Introduction
View Guidelines
View Comments
Glossary

View Comments

Section CommentsGeneral CommentsGlossary Comments
 
Name :   Stanley A. Klein
Organization :   N/A
Post Date :   9/30/2005

General Comments
Comment :  Threats: ... All threats
to voting systems can be classified under one or more of these vulnerabilities.

2) A programmer embeds code into the voting system software that directly or
indirectly (such as by allowing later introduction of malicious code) allows one
or more of the following to be done at a later time:
i) Recording a ballot different from the ballot displayed and entered by the
voter, either consistently or with intentional pseudorandomness.
ii) Modification of previously recorded votes or of vote totals
iii) Causing a machine to become inoperable for further voting
iv) Casting ballots that did not come from legitimate, authorized voters
v) Observing recorded votes or vote totals prior to the time authorized.
vi) Modifying audit trails
vii) Identifying ballots cast by specific voters, with or without collusion of
the voters involved.
viii) Causing a machine to fail completely or to incorrectly record votes either
generally or according to some logic.
ix) Disabling features required for enforcing legal requirements of the ballot
style or enabling features not permitted under legal requirements of the
ballot style.
x) Calculating vote totals inconsistent with legal requirements of a ballot
style.