Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

8th Grade Education and $10 Part: All You Need to Hack These Voting Booths
The Blaze ^ | 30 September 2011 | Liz Klimas

Posted on 09/30/2011 1:36:03 AM PDT by Watchdog85

Voting stations will need to take extra precautions with the election of 2012 as a national laboratory has shown just how easy it can be to hack into an electronic voting booth.

In fact, Salon reports that all it really takes is about $10.50 and an 8th grade science education. The Vulnerability Assessment Team at Argonne National Laboratory, a lab run through the Department of Energy, was able to demonstrate three simple “man in the middle attacks” on touchscreen Direct Recording Electronic (DRE) voting systems, like Diebold voting machines and Sequoia Voting Systems.

In this hack, the voter still casts their vote and approves it as correct, but the information is intercepted by the hacker through the device they installed, which Salon notes didn’t require any special soldering. In terms of getting inside the machine to place the device, it’s as easy as “picking the rudimentary lock,” according to Salon.

As the researchers say, voting officials should shift their focus from just cyber attacks to those that are a bit more straightforward. Salon continues:

Voting machine companies and election officials have long sought to protect source code and the memory cards that store ballot programming and election results for each machine as a way to guard against potential outside manipulation of election results. But critics like California Secretary of State Debra Bowen have pointed out that attempts at “security by obscurity” largely ignore the most immediate threat, which comes from election insiders who have regular access to the e-voting systems, as well as those who may gain physical access to machines that were not designed with security safeguards in mind.

This is a fundamentally very powerful attack and we believe that voting officials should become aware of this and stop focusing strictly on cyber [attacks],” says Vulnerability Assessment Team member John Warner. “There’s a very large physical protection component of the voting machine that needs to be addressed.”

CNET reports on the potential for safeguarding these machines:

While it would be relatively easy to make this type of attack more difficult to do by making modifications to the voting machine, stopping the attack cold would require more effort and a “careful examination of the security protocols used,” he said.

Johnston and his team did the research on their own time, as “a kind of Saturday afternoon project,” he said. “There’s not a lot of funding out there to study voting machine problems.”

Salon reports that Sean Flaherty, a policy analyst for VerifiedVoting.org as saying that about a third of voters will use a machine similar to the ones Argonne tested.

ZDNet notes controversy over the potential hackability for these types of voting machines a few years ago and the conflict of interest that arose during the George W. Bush administration since Diebold had been one of Bush’s top fundraisers. ZDNet continues with the fact that Diebold changed its name to Premier Election Solutions, which is now owned by Election Systems & Software. In 2008, CNET reported some states reverting back to paper voting systems due to hacking concerns.


TOPICS: Crime/Corruption; Government; Politics/Elections; Unclassified
KEYWORDS: demsshoein; fraud; votetampering
Head's up it's gonna be a bumpy ride for 2012 election.
1 posted on 09/30/2011 1:36:11 AM PDT by Watchdog85
[ Post Reply | Private Reply | View Replies]

To: Watchdog85

Watch the hacking demonstration:

http://www.youtube.com/watch?v=DMw2dn6K1oI&feature=player_embedded


2 posted on 09/30/2011 1:37:13 AM PDT by Watchdog85
[ Post Reply | Private Reply | To 1 | View Replies]

To: Watchdog85

I’m all for technology.

But votes need to be on paper with a paper trail.


3 posted on 09/30/2011 1:41:19 AM PDT by DB
[ Post Reply | Private Reply | To 1 | View Replies]

To: DB
I agree. They need to have a paper trail. The electronics results need to match up with a paper trail. Why can these machines print out the voter's choices which they can review as they leave, then drop the paper into a lock box on the way out of the precinct?
4 posted on 09/30/2011 2:06:41 AM PDT by rawhide
[ Post Reply | Private Reply | To 3 | View Replies]

To: Watchdog85

That’s why the left isn’t worried about 2012 as I stated a couple of years ago, “We have already had or last free election”.


5 posted on 09/30/2011 3:30:43 AM PDT by stockpirate (Why are homosexuals so hetro-phobic?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Watchdog85

Maybe I don’t have an 8th grade edumakashun, but wouldn’t you need either an I/O plug, or a wireless card, built into the voting machine to hack it???? Sounds verrry verrry fishy to me, kinda like setting up an excuse for a verrry large loss for the commies.... doesn’t make sense, and as Judge Judy says, if it doesn’t make sense, then it isn’t true....


6 posted on 09/30/2011 4:21:23 AM PDT by joe fonebone (Project Gunwalker, this will make watergate look like the warm up band......)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Watchdog85

Biggest BS story of the month.

No-one’s hacking in. You need physical access to the machine before and after the vote, time to install and extract it with the machine dismantled, and no-one to detect it in between. It’d be a lot easier to show up with a truck full of punch cards.


7 posted on 09/30/2011 4:36:21 AM PDT by dangus
[ Post Reply | Private Reply | To 1 | View Replies]

To: joe fonebone
Maybe I don’t have an 8th grade edumakashun, but wouldn’t you need either an I/O plug, or a wireless card, built into the voting machine to hack it???? Sounds verrry verrry fishy to me, kinda like setting up an excuse for a verrry large loss for the commies.... doesn’t make sense, and as Judge Judy says, if it doesn’t make sense, then it isn’t true....

That is precisely how the attack works, and the problem is that accessing the guts of the machine is so easy that the attack itself is relatively trivial. It appears that, essentially, the attacker takes an integrated circuit piece that contains the logic and the processor needed to tamper with the voting results and plugs it in between the wire that comes from the touchscreen and the socket on the machine's own logic and processing equipment. The attacker's IC logic/processing unit would then see all of the traffic passing from the touchscreen - the user interface - to the voting machine's own processors and would be able to manipulate those results so that the voting machine's processors would get the tainted vote. The attacker's equipment would then intercept the confirmation code sent back from the voting machine's processor and would replace that with its own version of the confirmation code that would "confirm" to the user that the vote they thought they cast was accepted when, in fact, it wasn't.

basically, what makes this attack so easy is that it is apparently just a matter of picking a simple little flange lock and then using pre-existing IC attachments to put the attacker's IC unit into place. If both the lock were harder to pick, the unit itself had tamper-resistant seals, and the entire exposed surface of the voting machine's hardware was solidstate with no plugs available for easy attachment of illicit hardware, this attack would be significantly harder. As it is, any poll watcher/election official who is in reality a plant or mole could, without too much risk of detection, open a voting machine and install the attack device in a matter of seconds, with no-one the wiser.

This isn't fishy, it's scary.
8 posted on 09/30/2011 4:37:12 AM PDT by Oceander (Not voting is tantamount to voting for Obama)
[ Post Reply | Private Reply | To 6 | View Replies]

To: joe fonebone

No, it’s not a software hack. It’s a hardware hack. They’re actually talking about building a machine that doesn’t work right.


9 posted on 09/30/2011 4:40:31 AM PDT by dangus
[ Post Reply | Private Reply | To 6 | View Replies]

To: Watchdog85

The funny part of this is the mention of an 8th grade education......given that kids are graduating from high school and entering college like an assembly line gone astray, most of these kids can not even do basic Math 095 computations let alone write a proper paragraph......but yeah, let’s continue to hype the idiotic mention that anyone with an “8th grade education” can do such and such.... =.=


10 posted on 09/30/2011 4:54:16 AM PDT by cranked
[ Post Reply | Private Reply | To 1 | View Replies]

To: Oceander

“the attacker takes an integrated circuit piece that contains the logic and the processor needed to tamper with the voting results”

The source code (Also one would need to know what langauge it’s written in) and the EXPENSIVE software that would be needed to complete this task and I’m pretty sure that’s not easily availabe to an 8th grader.


11 posted on 09/30/2011 5:43:01 AM PDT by Garvin (When it comes to my freedom, there will be no debate. There will be a fight)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Watchdog85
Thanks for the post. My belief WRT electronic voting is that if it is to be used at all, the machines' architecture and circuitry along with the software all need to be "open source". I'm pretty conservative, but proprietary code and/or hardware strikes me as open-season for hackers. The article Watchdog85 cites is Exhibit 'A' in the case for "open source". Publish the machine specs and code and let all the techies review. The machines would be constructed with basic, off-the-shelf components. The operating system would be Linux (DSL would do) or FreeBSD. Just ramblin', folks.
12 posted on 09/30/2011 6:19:30 AM PDT by Montana_Sam (Truth lives.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Montana_Sam

I would agree with you on that one. Proprietary code is no less prone to being buggy than open-source - in fact it may be more prone to being buggy - and serious hackers/crackers have the tools to render proprietary code more or less open-source as far as they are concerned, so using an open-source solution that has been rigorously tested by all and sundry who want to take a shot at it is more likely to be safer, all things considered, than some niche piece of proprietary code which, because it isn’t going to be a widely-sold product, will not get a huge amount of development or testing resources thrown at it.


13 posted on 09/30/2011 6:23:03 AM PDT by Oceander (Not voting for the Republican Candidate is tantamount to voting for Obama)
[ Post Reply | Private Reply | To 12 | View Replies]

To: dangus
No-one’s hacking in. You need physical access to the machine before and after the vote, time to install and extract it with the machine dismantled, and no-one to detect it in between.

You mean like the close and unsupervised access as is common corrupt democrat precincts? Yeah, that's nothing to worry about.

14 posted on 09/30/2011 9:22:41 AM PDT by zeugma (Those of us who work for a living are outnumbered by those who vote for a living.)
[ Post Reply | Private Reply | To 7 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson