05.01.2017 Views

The_Guardian_-_2016-12-29

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

J Alex Halderman and Matt Bernhard, both of the University of Michigan, campaigned in favor of a<br />

recount of the US presidential election, which was eventually spearheaded by Jill Stein, the Green<br />

party candidate.<br />

What we know about Russia’s interference in<br />

the US election<br />

Read more<br />

Only the Wisconsin recount was substantially completed, with the recount in Michigan eventually<br />

stopped and a potential recount in Pennsylvania killed before it had even begun. But the researchers<br />

say the recounted counties and precincts were enough to give them confidence that Donald Trump is<br />

the genuine winner of the election.<br />

“<strong>The</strong> recounts support that the election outcome was correct,” Bernhard told the Chaos<br />

Communications Congress cybersecurity convention in Hamburg, where he and Halderman gave a<br />

talk summarising their findings.<br />

In Wisconsin, the only state where the recount was finished, Trump’s victory increased by 131 votes,<br />

while in Michigan, where 22 of 83 counties had a full or partial recount, incomplete data suggests<br />

was a net change of 1,651 votes, “but no evidence of an attack”, Bernhard said. “I can sleep at night<br />

knowing that Trump won the election.”<br />

But the experience of pushing for the recount hasn’t reassured Halderman and Bernhard that American<br />

democracy is safe. In fact, quite the opposite, said Halderman.<br />

“Along the way, we found that hacking an election in the US for president would be even easier than I<br />

thought.”<br />

His previous research had already demonstrated security vulnerabilities in every model of voting<br />

machine examined, for instance, which would enable an attacker to silently rewrite the electronic<br />

record of how many votes each candidate received. But only this election did he learn the extent of<br />

centralisation in the organisations that are in charge of maintaining and preparing the voting machines.<br />

In Michigan, for example, 75% of counties use just two companies, each around 20 employees large,<br />

to load their machines. Compromising those two companies would theoretically be enough to swing<br />

the vote in the state. “How central these points of attack are, that was news to me,” Halderman said.<br />

Similarly, Halderman’s previous research had demonstrated the importance of an auditable papertrail<br />

for electronic voting: either the physical ballot for a machine that scans ballot papers, or a<br />

countable receipt for a fully digital system. <strong>The</strong>oretically, the existence of that paper trail should<br />

provide a protection against attempts to centrally hack the vote.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!