29.03.2013 Views

How to Steal an Election by Hacking the Vote - repo.zenk-securit...

How to Steal an Election by Hacking the Vote - repo.zenk-securit...

How to Steal an Election by Hacking the Vote - repo.zenk-securit...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

http://arstechnica.com/articles/culture/evoting.ars<br />

attacks that I just summarized, <strong>an</strong>d m<strong>an</strong>y more, have been implemented <strong>by</strong> multiple<br />

teams of <strong>securit</strong>y researchers. Just for kicks, take a break from reading <strong>an</strong>d go<br />

watch this little demonstration video.<br />

But before we talk in more detail about <strong>the</strong> Accu<strong>Vote</strong>, let's take a step back <strong>an</strong>d get<br />

a big-picture look at <strong>the</strong> kinds of new opportunities that <strong>the</strong> would-be election thief<br />

has at her disposal, th<strong>an</strong>ks <strong>to</strong> DREs.<br />

Bad apples <strong>an</strong>d barrel sizes, or how <strong>to</strong> do a lot with a little<br />

If we w<strong>an</strong>t <strong>to</strong> steal <strong>an</strong> election, <strong>the</strong>n ideally we w<strong>an</strong>t as few warm bodies in on <strong>the</strong><br />

scam as possible. All of <strong>the</strong> old-school election m<strong>an</strong>ipulation tricks, like voter<br />

intimidation, vote-buying, turn-out suppression, <strong>an</strong>d so on, require legions of<br />

volunteers who know exactly what's going on; but in <strong>the</strong> new era of electronic vote<br />

tampering, <strong>an</strong> election thief c<strong>an</strong> do a whole lot more with a whole lot less.<br />

<strong>Election</strong> <strong>securit</strong>y experts break down voting fraud types in<strong>to</strong> two main categories,<br />

based on how m<strong>an</strong>y bad apples it takes <strong>to</strong> swing <strong>an</strong> election: retail fraud <strong>an</strong>d<br />

wholesale fraud. Retail fraud is <strong>the</strong> kind of election fraud that's most familiar <strong>to</strong> us,<br />

because it has been around for <strong>the</strong> longest time. In general, retail fraud involves<br />

multiple bad apples at <strong>the</strong> precinct level, carrying out <strong>an</strong>y number of bad acts<br />

involving multiple voters <strong>an</strong>d voting machines. Some examples of retail fraud are<br />

ballot stuffing, restricting polling place access <strong>by</strong> me<strong>an</strong>s of intimidation, v<strong>an</strong>dalizing<br />

individual machines <strong>to</strong> make <strong>the</strong>m unusable, counterfeiting ballots, <strong>an</strong>d so on.<br />

Wholesale fraud is relatively new, <strong>an</strong>d it involves a single bad apple who c<strong>an</strong> affect<br />

<strong>an</strong> election's outcome at <strong>the</strong> precinct, county, <strong>an</strong>d state levels. (Actually, <strong>by</strong> this<br />

definition, wholesale fraud is as old as <strong>the</strong> poll tax. But let's stick <strong>to</strong> wholesale fraud<br />

involving electronic voting machines for now.) So with wholesale fraud, one bad<br />

apple c<strong>an</strong> affect different barrels of various sizes, depending where in <strong>the</strong> election<br />

process she's placed.<br />

The table below breaks down <strong>the</strong> newer types of fraud that electronic voting<br />

machines have made available <strong>to</strong> election thieves:<br />

Wholesale <strong>an</strong>d retail fraud<br />

Wholesale Retail<br />

Detectable • Altering <strong>the</strong> vote<br />

tabulation process<br />

• Altering <strong>the</strong> record of<br />

tabulated results<br />

Undetectable • Altering <strong>the</strong> vote<br />

tabulation process<br />

• Altering <strong>the</strong> vote<br />

recording process<br />

• Altering <strong>the</strong> record of<br />

votes<br />

• Multiple voting<br />

• Deleting votes<br />

• Disabling a machine<br />

• Invalidating all <strong>the</strong> votes<br />

on a machine<br />

• Altering <strong>the</strong> vote<br />

recording process<br />

• Altering <strong>the</strong> record of<br />

votes<br />

In this table, "detectable" denotes inst<strong>an</strong>ces of tampering <strong>an</strong>d fraud where we could<br />

potentially know that something went wrong with <strong>the</strong> vote, even if we're not sure<br />

Copyright © 1998-2006 Ars Technica, LLC<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!