Source code to Diebold Election Systems voting machines has been leaked once again.On Wednesday, former Maryland state legislator Cheryl C. Kagan was anonymously given disks containing source code to Diebold’s BallotStation and Global Election Management System (GEMS) tabulation software used in the 2004 elections. Kagan, a well-known critic of electronic voting, is executive director of the Carl M. Freeman Foundation, a philanthropic organization based in Olney, Md.The disks were created and distributed by two federal voting machine testing labs run by Ciber and Wyle Laboratories. They had been testing systems on behalf of the state of Maryland, Diebold said in a statement. This is not the first time that Diebold source code has been leaked. In early 2003, Diebold critic Bev Harris uncovered similar source code while conducting research using Google’s search engine. Soon after, researchers at Johns Hopkins University and Rice University published a damning critique of Diebold’s products, based on an analysis of the software.They found, for example, that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth. Diebold says it has since introduced security enhancements to its products, but the fact that the company’s sensitive source code has again leaked out is not a good sign, according to Avi Rubin, a computer science professor with Johns Hopkins and one of the authors of the 2003 report.The first leak should have taught Diebold a lesson on securing its source code, he said. “You would think that given the amount of embarrassment that caused them, they would do a better job of protecting it.”Rubin, who was shown the latest source code by a reporter at The Washington Post, said it appeared to be “just another version” of the code that was published in 2003.The disks came with a letter that was highly critical of Maryland State Administrator of Elections Linda Lamone, Rubin said. “It read like it was from somebody with a very, very serious axe to grind,” he said. “It was one of the more outlandish things I’ve read.” Rubin’s comments on the source code leak can be found here.Rubin believes the disks were given to Kagan because of her past criticism of electronic voting machines. “I guess whoever did this knew she would pursue it doggedly, which she did.”Diebold said the source code was for BallotStation 4.3.15C, which is no longer being used in the United States, and for GEMS 1.18.19, which is being used in a “limited number of jurisdictions.” The FBI is investigating the leak, Diebold said.The leak comes just three weeks before elections in the United States, but Maryland Board of Elections Deputy Administrator Ross Goldstein expressed confidence in the Diebold voting machines. The leaked code was “not software that’s in use in this election,” he said. “The software now is different and has many more security features.”Diebold echoed Goldstein’s comments. “Voters and election officials can be confident that on Election Day, votes and vote totals will be safe, secure and accurate,” the company said.Kagan, however, wasn’t so sure, saying that the security of the source code raised concerns. “The idea that it could be that readily available and could be delivered to me and who knows who else around the state [is disturbing],” she said. “Who knows what any other people may be doing with it?” By Robert McMillan, IDG News Service (San Francisco Bureau)Keep checking in at our Security Feed for updated news coverage. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe