Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo


Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

A new study commissioned by the Maryland legislature states that electronic voting machines bought by the state from Diebold for $55 million have such poor software and physical security that an election could be disrupted or even stolen, according to the New York Times. The study represents the first hands-on effort to hack these machines under conditions found in an election. The team, from consulting firm RABA Technologies in Columbia, MD, did say that the weaknesses could be addressed–at least preliminarily–in time for the state’s primary elections in March.

This is only one in a series of reports attacking the security of electronic voting machines, particularly those manufactured by Diebold Election Systems. Diebold’s machines are used statewide in Georgia as well as in several populous counties in Califonia, Texas, and Ohio. Stanford computer scientist David Dill, who is among the security experts asking for more stringent regulation of this new technology, explains his concerns in this TR interview.

0 comments about this story. Start the discussion »

Reprints and Permissions | Send feedback to the editor

From the Archives


Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me