TheBlaze has recently written about the claims some have made about voter fraud, but hacking of electronic voting machines is also an almost annual election story. In fact, the Vulnerability Assessment Team (VAT) at Argonne National Laboratory (ANL) is called upon almost every election season to talk about how easy it is to take control of some of these voting machines.
Roger Johnston, the head of the VAT, told Popular Science recently that funding to study election security is hard to come by. For this reason, Johnston said he and his team conducted experiments to hack electronic voting machines as a “Saturday afternoon type of project.” This is also why awareness of the situation is important to the team as well.
On the Vulnerability Assessment Team’s portion of ANL’s website, they state:
We believe that too often election officials assume (incorrectly) that: the bad guys have to attack the computer/microprocessor or cyber parts of the machine–which requires real smart people; that “certification” of machines is some kind of silver bullet against vote tampering; that adhesive label seals are good at detecting tampering and that they will be blatantly ripped open by an attacker and that they require almost no training to use; that you should get your security advice from manufacturers of voting machines, locks, and seals; that piling on lots of security features leads to good security; that “security by obscurity” (keeping secrets) is how you get good security; that a chain of custody is a piece of paper on which people scribble their initials or signatures; that hundreds of voting machines have to be compromised for the bad guys to succeed; that vote tamperers are only interested in getting their candidate to win the election; and that physical and cyber security are easy.
What the team has demonstrated several times is that non-cyber attacks are possible and relatively simple to conduct on voting machines. Johnston described one – a man-in-the-middle attack — to Popular Science. He explained that it involves putting an electronic device into the voting machine, which lets the hacker control voting by tampering with the machine’s electronic communications. Johnston said “we can do this because most voting machines, as far as I can tell, are not encrypted.”
The hack — which costs between $10 to $26 for the parts and uses a Phillips screwdriver and an Allen wrench — is demonstrated below:
Johnston said the microprocessor that would be inserted to hack the machine can be found at stores like Radio Shack.
“I’ve been to high school science fairs where the kids had more sophisticated microprocessor projects than the ones needed to rig these machines,” he said.
Read more: http://www.theblaze.com/stories/yikes-expert-shows-security-vulnera...
Tags:
Herta, please take the opportunity to vote, and if you are concened take your video equipped camera or phone with you and record everything you do from the moment you enter the ...booth,,,whatever.. and definitely your touching of all the buttons on the display that you touch.. do not be dissuaded by the monitors,,, it might later show you what you asked for when you voted and what the machine did for you, and...and it will be a good video to show your grandchildren what you did in 2012 to vote. before the ......
Herta, Others may do it for you with your camera. It will only take one good video to bring out a storm of truth. and a .... Recount or whatever... try.
"Destroying the New World Order"
THANK YOU FOR SUPPORTING THE SITE!
© 2024 Created by truth. Powered by