29.03.2013 Views

How to Steal an Election by Hacking the Vote - repo.zenk-securit...

How to Steal an Election by Hacking the Vote - repo.zenk-securit...

How to Steal an Election by Hacking the Vote - repo.zenk-securit...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

http://arstechnica.com/articles/culture/evoting.ars<br />

inserted. The newly infected machines would in turn infect o<strong>the</strong>r cards, which would<br />

infect o<strong>the</strong>r machines, <strong>an</strong>d so on. In this way, <strong>the</strong> vote stealing "Prince<strong>to</strong>n virus"<br />

could travel across <strong>an</strong> entire precinct or county, given enough time.<br />

The viral nature of <strong>the</strong> Prince<strong>to</strong>n attack is one way <strong>to</strong> commit wholesale undetectable<br />

vote fraud, but <strong>the</strong>re are o<strong>the</strong>rs that are even more efficient <strong>an</strong>d require no physical<br />

access <strong>to</strong> a machine at <strong>an</strong>y point. Specifically, if <strong>an</strong>y one of <strong>the</strong> institutions<br />

responsible for loading software on<strong>to</strong> <strong>the</strong> Accu<strong>Vote</strong> (or <strong>an</strong>y o<strong>the</strong>r DRE for that<br />

matter) has been compromised, ei<strong>the</strong>r <strong>by</strong> <strong>an</strong> internal mole or <strong>an</strong> outside cracker who<br />

has hacked in<strong>to</strong> <strong>the</strong> comp<strong>an</strong>y's internal network, <strong>the</strong>n something like <strong>the</strong> Prince<strong>to</strong>n<br />

virus could be pl<strong>an</strong>ted in <strong>the</strong> firmware, operating system, or system software build<br />

that goes on machines across <strong>an</strong> entire county or state.<br />

In o<strong>the</strong>r words, you know how Apple just accidentally shipped a few thous<strong>an</strong>d iPods<br />

with a Windows virus embedded in <strong>the</strong>m? If you replace "Apple" with "Diebold" <strong>an</strong>d<br />

"iPod" with "Accu<strong>Vote</strong>," <strong>the</strong>n you've got a recipe for wholesale election <strong>the</strong>ft.<br />

Think about that for a moment, <strong>an</strong>d let it sink in. To have confidence in <strong>the</strong> results of<br />

<strong>an</strong> election using DREs, you no longer have <strong>to</strong> put your trust solely in <strong>the</strong> <strong>securit</strong>y<br />

practices at <strong>the</strong> Board of <strong>Election</strong>s. Now, you have <strong>to</strong> have confidence in <strong>the</strong> <strong>securit</strong>y<br />

of <strong>the</strong> DRE vendor's corporate networks, <strong>an</strong>d in <strong>the</strong>ir hum<strong>an</strong> resources departments,<br />

<strong>an</strong>d in <strong>the</strong> <strong>securit</strong>y practices <strong>an</strong>d personnel of <strong>an</strong>yone else who <strong>to</strong>uches <strong>the</strong> software<br />

that goes in<strong>to</strong> a DRE (i.e. a third-party software vendor).<br />

To give you some perspective on <strong>the</strong> level of <strong>securit</strong>y at voting machine comp<strong>an</strong>ies,<br />

<strong>the</strong>re have been actual incidents that involve intruders breaking in<strong>to</strong> <strong>the</strong> internal<br />

networks of three DRE vendors <strong>an</strong>d gaining access <strong>to</strong> sensitive information:<br />

1. A hacker penetrated <strong>Vote</strong>Here's intr<strong>an</strong>et in 2003.<br />

2. Diebold was also <strong>the</strong> victim of a hacker in 2003, in a highly publicized<br />

intrustion in which thous<strong>an</strong>ds of internal comp<strong>an</strong>y emails were s<strong>to</strong>len <strong>an</strong>d<br />

made public.<br />

3. ES&S was burglarized in 2003, <strong>an</strong>d sensitive information, including voting<br />

software, was s<strong>to</strong>len. The comp<strong>an</strong>y didn't notify <strong>the</strong> public until three years<br />

later.<br />

Figure 6 gives you a visual breakdown of <strong>the</strong> three main institutions that contribute<br />

layers <strong>to</strong> <strong>the</strong> Accu<strong>Vote</strong>'s software stack: <strong>the</strong> county Board of <strong>Election</strong>s, Diebold, <strong>an</strong>d<br />

Microsoft. Again, one well-placed bad apple in <strong>an</strong>y one of those institutions, or <strong>an</strong><br />

unauthorized intruder with access <strong>to</strong> <strong>the</strong> right network, could steal a state-wide<br />

election in Georgia, Maryl<strong>an</strong>d, or <strong>an</strong>y o<strong>the</strong>r county or precinct that relies on <strong>the</strong><br />

Accu<strong>Vote</strong> TS.<br />

Copyright © 1998-2006 Ars Technica, LLC<br />

12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!