How to Steal an Election by Hacking the Vote - repo.zenk-securit...
How to Steal an Election by Hacking the Vote - repo.zenk-securit...
How to Steal an Election by Hacking the Vote - repo.zenk-securit...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
http://arstechnica.com/articles/culture/evoting.ars<br />
inserted. The newly infected machines would in turn infect o<strong>the</strong>r cards, which would<br />
infect o<strong>the</strong>r machines, <strong>an</strong>d so on. In this way, <strong>the</strong> vote stealing "Prince<strong>to</strong>n virus"<br />
could travel across <strong>an</strong> entire precinct or county, given enough time.<br />
The viral nature of <strong>the</strong> Prince<strong>to</strong>n attack is one way <strong>to</strong> commit wholesale undetectable<br />
vote fraud, but <strong>the</strong>re are o<strong>the</strong>rs that are even more efficient <strong>an</strong>d require no physical<br />
access <strong>to</strong> a machine at <strong>an</strong>y point. Specifically, if <strong>an</strong>y one of <strong>the</strong> institutions<br />
responsible for loading software on<strong>to</strong> <strong>the</strong> Accu<strong>Vote</strong> (or <strong>an</strong>y o<strong>the</strong>r DRE for that<br />
matter) has been compromised, ei<strong>the</strong>r <strong>by</strong> <strong>an</strong> internal mole or <strong>an</strong> outside cracker who<br />
has hacked in<strong>to</strong> <strong>the</strong> comp<strong>an</strong>y's internal network, <strong>the</strong>n something like <strong>the</strong> Prince<strong>to</strong>n<br />
virus could be pl<strong>an</strong>ted in <strong>the</strong> firmware, operating system, or system software build<br />
that goes on machines across <strong>an</strong> entire county or state.<br />
In o<strong>the</strong>r words, you know how Apple just accidentally shipped a few thous<strong>an</strong>d iPods<br />
with a Windows virus embedded in <strong>the</strong>m? If you replace "Apple" with "Diebold" <strong>an</strong>d<br />
"iPod" with "Accu<strong>Vote</strong>," <strong>the</strong>n you've got a recipe for wholesale election <strong>the</strong>ft.<br />
Think about that for a moment, <strong>an</strong>d let it sink in. To have confidence in <strong>the</strong> results of<br />
<strong>an</strong> election using DREs, you no longer have <strong>to</strong> put your trust solely in <strong>the</strong> <strong>securit</strong>y<br />
practices at <strong>the</strong> Board of <strong>Election</strong>s. Now, you have <strong>to</strong> have confidence in <strong>the</strong> <strong>securit</strong>y<br />
of <strong>the</strong> DRE vendor's corporate networks, <strong>an</strong>d in <strong>the</strong>ir hum<strong>an</strong> resources departments,<br />
<strong>an</strong>d in <strong>the</strong> <strong>securit</strong>y practices <strong>an</strong>d personnel of <strong>an</strong>yone else who <strong>to</strong>uches <strong>the</strong> software<br />
that goes in<strong>to</strong> a DRE (i.e. a third-party software vendor).<br />
To give you some perspective on <strong>the</strong> level of <strong>securit</strong>y at voting machine comp<strong>an</strong>ies,<br />
<strong>the</strong>re have been actual incidents that involve intruders breaking in<strong>to</strong> <strong>the</strong> internal<br />
networks of three DRE vendors <strong>an</strong>d gaining access <strong>to</strong> sensitive information:<br />
1. A hacker penetrated <strong>Vote</strong>Here's intr<strong>an</strong>et in 2003.<br />
2. Diebold was also <strong>the</strong> victim of a hacker in 2003, in a highly publicized<br />
intrustion in which thous<strong>an</strong>ds of internal comp<strong>an</strong>y emails were s<strong>to</strong>len <strong>an</strong>d<br />
made public.<br />
3. ES&S was burglarized in 2003, <strong>an</strong>d sensitive information, including voting<br />
software, was s<strong>to</strong>len. The comp<strong>an</strong>y didn't notify <strong>the</strong> public until three years<br />
later.<br />
Figure 6 gives you a visual breakdown of <strong>the</strong> three main institutions that contribute<br />
layers <strong>to</strong> <strong>the</strong> Accu<strong>Vote</strong>'s software stack: <strong>the</strong> county Board of <strong>Election</strong>s, Diebold, <strong>an</strong>d<br />
Microsoft. Again, one well-placed bad apple in <strong>an</strong>y one of those institutions, or <strong>an</strong><br />
unauthorized intruder with access <strong>to</strong> <strong>the</strong> right network, could steal a state-wide<br />
election in Georgia, Maryl<strong>an</strong>d, or <strong>an</strong>y o<strong>the</strong>r county or precinct that relies on <strong>the</strong><br />
Accu<strong>Vote</strong> TS.<br />
Copyright © 1998-2006 Ars Technica, LLC<br />
12