EFFECTED USERS: Every breathing American.
Hair of fire 5 of 5
SUMMARY: Election is here – lots to consider. One thing you should not worry about is the voting machine itself
In August, 2020, Wired Magazine reporter Lily Hay Newman wrote this in her article entitled: Voting Machine Makers Are Finally Playing Nice With Hackers
For years, voting machines were a black box, even as more and more states replaced old analog marking systems with computerized options. The Digital Millennium Copyright Act even made it illegal for security researchers to probe voting machines for potential vulnerabilities, which only changed in 2016 with a DMCA exception for voting machine security research.
That paved the way for the program known as the Voting Village, which launched in 2017 as a way for researchers to get their hands on voting machines, likely for the first time, and start hacking them. Part of the Defcon security conference, the Voting Village has also served as a sort of town hall for debate and innovation in voting security. In 2018, ES&S sent a letter to customers downplaying the importance of the Voting Village and its findings: “Attendees will absolutely access some voting systems internal components because they will have full and unfettered access to a unit without the advantage of trained poll workers, locks, tamper-evident seals, passwords, and other security measures that are in place in an actual voting situation.”
Here with me to talk about this today is Jonathan Couch (Kooch).
Jonathan Couch is SVP of Strategy of ThreatQuotient, and has over 20 years of experience in information security, information warfare and intelligence collection. He has served in the Air Force at the NSA, Air Force Information Warfare Center, and various commercial organizations.
Q: What are the different approaches to attacking election results through election machines?
- Mass Influence by an adversary.
- Local Influence: (Not including Social Media), or a person physically local attack
- Supply chain attack.
Things that prevent mass hacking: No internet connection
It would take an army attackjing multiple machines in multiple counties.
Comparing voting security to nuclear security: high tech (technology) to low tech (guards and fences)