{"id":485,"date":"2011-09-30T07:00:50","date_gmt":"2011-09-30T07:00:50","guid":{"rendered":"http:\/\/savingtherepublic.com\/blog\/?p=485"},"modified":"2011-09-30T07:00:50","modified_gmt":"2011-09-30T07:00:50","slug":"8th-grade-education-and-10-part-all-you-need-to-hack-these-voting-booths","status":"publish","type":"post","link":"http:\/\/savingtherepublic.com\/blog\/2011\/09\/8th-grade-education-and-10-part-all-you-need-to-hack-these-voting-booths\/","title":{"rendered":"8th Grade Education and $10 Part: All You Need to Hack These Voting Booths"},"content":{"rendered":"<div id=\"container\">\n<div id=\"centered\">\n<div id=\"article\">\n<div>\n<h1><span class=\"Apple-style-span\" style=\"font-size: 16px; line-height: 24px; color: #444444;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"voter machine\" src=\"https:\/\/i0.wp.com\/www.theblaze.com\/wp-content\/uploads\/2011\/09\/Snapz-Pro-XScreenSnapz0275.jpg?resize=283%2C337\" alt=\"\" width=\"283\" height=\"337\" data-recalc-dims=\"1\" \/><\/span><\/h1>\n<h1><\/h1>\n<h1><\/h1>\n<h1><span class=\"Apple-style-span\" style=\"font-size: 16px; line-height: 24px; color: #444444;\">Voting stations will need to take extra precautions with the election of 2012 as a national laboratory has shown just how easy it can be to hack into an electronic voting booth.<\/span><\/h1>\n<p>In fact, <a href=\"http:\/\/www.salon.com\/news\/politics\/elections\/2011\/09\/27\/votinghack\/\" target=\"_blank\">Salon<\/a> reports that all it really takes is about $10.50 and an 8th grade science education. The Vulnerability Assessment Team at Argonne National Laboratory, a lab run through the Department of Energy, was able to demonstrate three simple \u00e2\u20ac\u0153man in the middle attacks\u00e2\u20ac\u009d on touchscreen Direct Recording Electronic (DRE) voting systems, like Diebold voting machines and Sequoia Voting Systems.<\/p>\n<p>Watch the hacking demonstration:<br \/>\n<object width=\"560\" height=\"315\" classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" codebase=\"http:\/\/download.macromedia.com\/pub\/shockwave\/cabs\/flash\/swflash.cab#version=6,0,40,0\"><param name=\"src\" value=\"http:\/\/www.youtube.com\/v\/DMw2dn6K1oI?version=3&amp;hl=en_US\" \/><param name=\"allowscriptaccess\" value=\"always\" \/><param name=\"allowfullscreen\" value=\"true\" \/><\/object><\/p>\n<p>In this hack, the voter still casts their vote and approves it as correct, but the information is intercepted by the hacker through the device they installed, which Salon notes didn\u00e2\u20ac\u2122t require any special soldering. In terms of getting inside the machine to place the device, it\u00e2\u20ac\u2122s as easy as \u00e2\u20ac\u0153picking the rudimentary lock,\u00e2\u20ac\u009d according to Salon.<\/p>\n<p>As the researchers say, voting officials should shift their focus from just cyber attacks to those that are a bit more straightforward. Salon continues:<\/p>\n<blockquote><p>Voting machine companies and election officials have long sought to protect source code and the memory cards that store ballot programming and election results for each machine as a way to guard against potential outside manipulation of election results. But critics like California Secretary of State Debra Bowen have pointed out that attempts at \u00e2\u20ac\u0153security by obscurity\u00e2\u20ac\u009d largely ignore the most immediate threat, which comes from election insiders who have regular access to the e-voting systems, as well as those who may gain physical access to machines that were not designed with security safeguards in mind.<\/p>\n<p>&nbsp;<\/p>\n<p>\u00e2\u20ac\u0153This is a fundamentally very powerful attack and we believe that voting officials should become aware of this and stop focusing strictly on cyber [attacks],\u00e2\u20ac\u009d says Vulnerability Assessment Team member John Warner. \u00e2\u20ac\u0153There\u00e2\u20ac\u2122s a very large physical protection component of the voting machine that needs to be addressed.\u00e2\u20ac\u009d<\/p><\/blockquote>\n<p><a href=\"http:\/\/news.cnet.com\/8301-27080_3-20113063-245\/e-voting-machines-vulnerable-to-remote-vote-changing\/#ixzz1ZKikIuR2\" target=\"_blank\">CNET<\/a> reports on the potential for safeguarding these machines:<\/p>\n<blockquote><p>While it would be relatively easy to make this type of attack more difficult to do by making modifications to the voting machine, stopping the attack cold would require more effort and a \u00e2\u20ac\u0153careful examination of the security protocols used,\u00e2\u20ac\u009d he said.<\/p>\n<p>Johnston and his team did the research on their own time, as \u00e2\u20ac\u0153a kind of Saturday afternoon project,\u00e2\u20ac\u009d he said. \u00e2\u20ac\u0153There\u00e2\u20ac\u2122s not a lot of funding out there to study voting machine problems.\u00e2\u20ac\u009d<\/p><\/blockquote>\n<p>Salon reports that Sean Flaherty, a policy analyst for <a href=\"http:\/\/VerifiedVoting.org\/\" target=\"_blank\">VerifiedVoting.org<\/a> as saying that about a third of voters will use a machine similar to the ones Argonne tested.<\/p>\n<p><a href=\"http:\/\/www.zdnet.com\/blog\/government\/four-outrageous-political-stories-that-will-make-you-scream\/10919\" target=\"_blank\">ZDNet <\/a>notes controversy over the potential hackability for these types of voting machines a few years ago and the conflict of interest that arose during the George W. Bush administration since Diebold had been one of Bush\u00e2\u20ac\u2122s top fundraisers. ZDNet continues with the fact that Diebold changed its name to Premier Election Solutions, which is now owned by Election Systems &amp; Software. In 2008, <a href=\"http:\/\/news.cnet.com\/8301-13578_3-10080863-38.html?tag=mncol;txt\" target=\"_blank\">CNET<\/a> reported some states reverting back to paper voting systems due to hacking concerns.<\/p>\n<p>[H\/T <a href=\"http:\/\/capitolfax.com\/2011\/09\/29\/ok-i-wasnt-paranoid-until-i-read-this-story-diebold-voting-machines-can-be-hacked-by-remote-control\/\" target=\"_blank\">Capitol Fax<\/a>]<br \/>\n<a href=\"http:\/\/www.theblaze.com\/stories\/8th-grade-education-and-10-part-all-you-need-to-hack-these-voting-booths\/\">From TheBlaze<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Voting stations will need to take extra precautions with the election of 2012 as a national laboratory has shown just how easy it can be to hack into an electronic voting booth. In fact, Salon&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_options":[]},"categories":[12,15,14],"tags":[578,579,577],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/posts\/485"}],"collection":[{"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/comments?post=485"}],"version-history":[{"count":0,"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/posts\/485\/revisions"}],"wp:attachment":[{"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/media?parent=485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/categories?post=485"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/tags?post=485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}