Yes, US Voting Machines Are Vulnerable To Hacking

It's not a hypothetical security problem and Russian hackers have already successfully undermined democratic processes in Ukraine. 

In 2014, as Ukraine prepared for a crucial vote to decide the Presidency, government cyber experts found Russian hackers had breached its election computing infrastructure.

The hackers knocked out the entire system that tallied the votes. The attack was detected and repaired, but then, just as the vote results were about to roll out, a virus was found that would have called the election for radical nationalist Dmytro Yarosh.

In reality, Dmytro Yarosh received 0.7% of the vote.  The virus would have forced the election software to declare him the winner with 37% to Petro Poroshenko's 29%. One Russian media outlet reported those numbers anyway.

Poroshenko won the election by a wide margin, but it was a narrow victory over the hackers.

Hackers Look West

When Dan Wallach testified before the US House Committee on protecting the 2016 US Presidential election, he cited the Russian attack in Ukraine as a precedent and a warning. "Like the Ukrainians in 2014," he said, "we face similar vulnerabilities today."

Dan Wallach is a computer security expert at Rice University who specializes in electronic voting systems. For years, Dan and a group of computer science colleagues have been raising the alarm about the hackability of US electronic voting machines.  

"It's unfortunately easy to compromise the machines to tamper with the votes.", he’s said.

He says it's been a problem for years. But this year is different. US security experts and the FBI believe Russian actors are behind last summer's hack on the Democratic National Committee, as well as the hacked e-mails from the Clinton campaign published by Wikileaks a week ago.

"A foreign nation state appears to have a strong interest in the outcome of our election," Dan Wallach said on CBC Day 6. "And as a security engineer researcher I see it as my obligation to do my best to prevent that."

Paper Comes Back

The touch screen voting machines that Wallach and his colleagues have been flagging are still in use, but they are in decline.  Reports of lost votes and long lines at the polls eroded the public's trust in the technology.

"All of the touch screen voting machines that are in use today in the US were analyzed about a decade ago in state commission studies in California, Ohio and Florida," Wallach says.  "And what we found then is still true today … these machines have unacceptable security."

"It's unfortunately easy to compromise the machines to tamper with the votes," Wallach says. He was asked if they are more vulnerable than a personal smartphone.

"The issue," he said, "is comparing voting machines to paper, right?  It's incredibly difficult for a hacker on the other side of the planet to change a piece of printed paper."

A printed ballot in lieu of a purely electronic transaction could make the difference between an attempt to steal the election and a full scale theft.

Wallach has been involved in designing voting machines that have both an electronic interface and a printed tally, which would help officials reconstruct a vote if the poll were compromised.

Databases Are Vulnerable

But even if voting were done exclusively with paper and pencils, a malicious attack could still disenfranchise millions. "The top of my concerns is that the voters show up at the polls and their names aren't in the voter registration system," says Wallach. He says hackers could create chaos by removing groups of voters from the database, targeting them using the same demographics as social scientists.

"Somebody from overseas can do the same thing. They can say, people in this neighborhood are likely to vote this way, people in that neighborhood are likely to vote that way. Let's remove just these people from the rolls and that could create long lines and a giant mess trying to disentangle it on Election Day." 

Wallach says the threat of destabilization is galvanizing to all Americans. "The notion that it's not a hypothetical security problem but rather it's something that is being actively attacked by a foreign adversary, no matter what your partisanship, no matter who you prefer for President, you want the next American President to be elected by the American people."

CBC

 

« Europol Warning: Crypto-Ransomware Threat
Smartphone “Video Jacking” From Power Sockets »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Site24x7

Site24x7

Site24x7 is an AI-powered observability platform for DevOps and IT operations.

Cybereason

Cybereason

Cybereason provides attack protection with cutting edge EDR and XDR, and industry recognized consulting services to support organizations throughout any stage of the incident lifecycle.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

Muninn

Muninn

At Muninn (aka Wehowsky), we specialize in mitigating potential risks within your network, providing one of the leading network detection and response (NDR) solutions on the market.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

GCHQ Apprenticeships

GCHQ Apprenticeships

GCHQ, the UK intelligence and security organisation, offers a unique three-year Cyber Security Degree Apprenticeship with employment on successful completion.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

Ascent Cyber

Ascent Cyber

Ascent Cyber provide simple and stress-free solutions to protect your business and its customers from the worries and costs of cybercrime.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

CodeHunter

CodeHunter

CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.

Advania UK

Advania UK

Advania are one of Microsoft’s leading partners in the UK, specialising in Azure, Security, Dynamics 365 and Microsoft 365.

ThoughtSol

ThoughtSol

Thoughtsol help brands grow through Digital Transformation enabling them to leverage the power of IT for an all-embracing impact on their businesses.