Researchers commissioned by the State of California have found security issues in every electronic voting system they tested, California Secretary of State Debra Bowen said Friday.
The report was published late Friday as part of a complete review of the state's e-voting systems initiated earlier this year by Bowen's office.
Its findings were not encouraging for backers of e-voting.
"The security teams were able to bypass both physical and software security in every system they tested," Bowen said Friday during a conference call with media.
The report documents 15 security problems found in the devices. For example, researchers were able to exploit bugs in the Windows operating system used by the Diebold GEMS election management system to circumvent the system's audit logs and directly access data on the machine. They were able to get a similar level of access to Sequoia WinEDS data as well.
Testers were also able to overwrite firmware, bypass locks on the systems, forge voter cards, and even secretly install a wireless device on the back of a GEMS server.
Bowen is set to decide by Aug. 3 which systems will be certified for use in the 2008 presidential primaries. She declined to comment on how the report's findings will affect this decision until she has completely reviewed the report. "The severity of it, what it means ... that's a matter for us to investigate and pull apart and analyze between now and next Friday."
But she did acknowledge that the security problems found by researchers were important. "It's a big deal for many people in this country," she said. "We are a democracy and our very existence as a democracy is dependent on having voting systems that are secure, reliable and accurate."
California's review is the most thorough review of voting machine technology yet undertaken in the U.S.
A team of researchers assembled by the University of California has spent the past two months evaluating the security, accessibility and manufacturer documentation of voting machines. A "red team" of penetration testers attempted to gain access to the voting systems to see if they could disrupt an election or alter the results, while another team examined the source code to the machines.
Researchers examined devices manufactured by Diebold Election Systems Inc., Hart InterCivic Inc. and Sequoia Voting Systems Inc.
Representatives from Diebold and Sequoia said Friday that they needed more time to review the research before commenting in depth. "We are very anxious to review the findings," said Michelle Shafer, a Sequoia spokeswoman, via e-mail. "We will be providing our official response ... early next week."
She noted, however, that the "testing done during this Top to Bottom Review did not employ the processes and procedures used in the conduct of an actual election."
Another vendor, Election Systems & Software Inc. (ES&S) was so late in providing access to their products that their systems will be evaluated at a later date, Bowen said.
The ES&S systems are used by Los Angeles County, and Bowen wouldn't say whether the absence of ES&S from the report might leave the county without certified voting systems in February.