How to Steal an Election by Hacking the Vote - repo.zenk-securit...
How to Steal an Election by Hacking the Vote - repo.zenk-securit...
How to Steal an Election by Hacking the Vote - repo.zenk-securit...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
http://arstechnica.com/articles/culture/evoting.ars<br />
attacks that I just summarized, <strong>an</strong>d m<strong>an</strong>y more, have been implemented <strong>by</strong> multiple<br />
teams of <strong>securit</strong>y researchers. Just for kicks, take a break from reading <strong>an</strong>d go<br />
watch this little demonstration video.<br />
But before we talk in more detail about <strong>the</strong> Accu<strong>Vote</strong>, let's take a step back <strong>an</strong>d get<br />
a big-picture look at <strong>the</strong> kinds of new opportunities that <strong>the</strong> would-be election thief<br />
has at her disposal, th<strong>an</strong>ks <strong>to</strong> DREs.<br />
Bad apples <strong>an</strong>d barrel sizes, or how <strong>to</strong> do a lot with a little<br />
If we w<strong>an</strong>t <strong>to</strong> steal <strong>an</strong> election, <strong>the</strong>n ideally we w<strong>an</strong>t as few warm bodies in on <strong>the</strong><br />
scam as possible. All of <strong>the</strong> old-school election m<strong>an</strong>ipulation tricks, like voter<br />
intimidation, vote-buying, turn-out suppression, <strong>an</strong>d so on, require legions of<br />
volunteers who know exactly what's going on; but in <strong>the</strong> new era of electronic vote<br />
tampering, <strong>an</strong> election thief c<strong>an</strong> do a whole lot more with a whole lot less.<br />
<strong>Election</strong> <strong>securit</strong>y experts break down voting fraud types in<strong>to</strong> two main categories,<br />
based on how m<strong>an</strong>y bad apples it takes <strong>to</strong> swing <strong>an</strong> election: retail fraud <strong>an</strong>d<br />
wholesale fraud. Retail fraud is <strong>the</strong> kind of election fraud that's most familiar <strong>to</strong> us,<br />
because it has been around for <strong>the</strong> longest time. In general, retail fraud involves<br />
multiple bad apples at <strong>the</strong> precinct level, carrying out <strong>an</strong>y number of bad acts<br />
involving multiple voters <strong>an</strong>d voting machines. Some examples of retail fraud are<br />
ballot stuffing, restricting polling place access <strong>by</strong> me<strong>an</strong>s of intimidation, v<strong>an</strong>dalizing<br />
individual machines <strong>to</strong> make <strong>the</strong>m unusable, counterfeiting ballots, <strong>an</strong>d so on.<br />
Wholesale fraud is relatively new, <strong>an</strong>d it involves a single bad apple who c<strong>an</strong> affect<br />
<strong>an</strong> election's outcome at <strong>the</strong> precinct, county, <strong>an</strong>d state levels. (Actually, <strong>by</strong> this<br />
definition, wholesale fraud is as old as <strong>the</strong> poll tax. But let's stick <strong>to</strong> wholesale fraud<br />
involving electronic voting machines for now.) So with wholesale fraud, one bad<br />
apple c<strong>an</strong> affect different barrels of various sizes, depending where in <strong>the</strong> election<br />
process she's placed.<br />
The table below breaks down <strong>the</strong> newer types of fraud that electronic voting<br />
machines have made available <strong>to</strong> election thieves:<br />
Wholesale <strong>an</strong>d retail fraud<br />
Wholesale Retail<br />
Detectable • Altering <strong>the</strong> vote<br />
tabulation process<br />
• Altering <strong>the</strong> record of<br />
tabulated results<br />
Undetectable • Altering <strong>the</strong> vote<br />
tabulation process<br />
• Altering <strong>the</strong> vote<br />
recording process<br />
• Altering <strong>the</strong> record of<br />
votes<br />
• Multiple voting<br />
• Deleting votes<br />
• Disabling a machine<br />
• Invalidating all <strong>the</strong> votes<br />
on a machine<br />
• Altering <strong>the</strong> vote<br />
recording process<br />
• Altering <strong>the</strong> record of<br />
votes<br />
In this table, "detectable" denotes inst<strong>an</strong>ces of tampering <strong>an</strong>d fraud where we could<br />
potentially know that something went wrong with <strong>the</strong> vote, even if we're not sure<br />
Copyright © 1998-2006 Ars Technica, LLC<br />
6