Iranian, Chinese Computers Also Discovered to Have Been Hacking D.C. Internet Voting System

Iranian, Chinese Computers Also Discovered to Have Been Hacking D.C. Internet Voting System
Published on 10-11-2010

By Brad Friedman - BradBlog
http://www.blacklistednews.com/index.php?news_id=11001

A University of Michigan computer scientist and his team were not the only ones attempting to hack the Internet Vote scheme that Washington D.C. had planned to roll out for actual use with military and overseas voters in this November's mid-term election.

According to testimony given to a D.C. City Council committee last Friday by J. Alex Halderman, asst. professor of electrical engineering and computer science at University of Michigan, hackers from Iran and China were also attempting to access the very same network infrastructure, even as his own team of students had successfully done so, taking over the entirety of the Internet Voting system which had been opened for a first-of-its-kind live test.

[See our report last week on details of what had already been disclosed about Halderman's startling hack prior to last Friday's hearing.]

"While we were in control of these systems we observed other attack attempts originating from computers in Iran and China," Halderman testified. "These attackers were attempting to guess the same master password that we did. And since it was only four letters long, they would likely have soon succeeded."

In his stunning public testimony --- before a single member of the D.C. Board of Ethics and Elections (BoEE), and a nearly empty chamber --- Halderman explained how the team had, by the time they discovered their fellow intruders, already gained complete control of the system, it's encryption key and its passwords. The system was developed as part of an Internet Voting pilot program with the Open Source Digital Voting Foundation.

As The BRAD BLOG reported last week, Halderman's team was able to take over the system within 36 hours after it had gone live for testing. After having "found and exploited a vulnerability that gave [them] almost total control of the server software," his team was able to steal the encryption key needed to decode "secret" ballots; overwrite every single ballot cast on the test system; change the votes on those ballots to write-in candidates; discover who had already been voted for and the identities of the voters; install a script that would automatically change all votes cast in the future on the same system; install a backdoor to allow them to come back later; and then leave a "calling card" --- the University of Michigan fight song --- which was programmed to play in the voter's browser 15 seconds after each Internet ballot had been cast.

Read Full Article Here...
.

Views: 62

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted blog posts
yesterday
tjdavis posted a video

How Corporations Are Secretly Poisoning Our Food Supply

Dupont and 3M have been secretly poisoning America for decades. PFAs — also known as forever chemicals—are now in our food, water, clothes, and our blood. Th...
yesterday
Doc Vega posted a blog post

They Won’t Stop

 The demonically driven left will not stop. Makes no difference how much violence they call for or…See More
Wednesday
Doc Vega posted a blog post

What US Scientist unwittingly helped the Nazis devise the V-2 Missile?

  In the early 1920’s and leading up to World War II German technology outpaces the peace time…See More
Monday
tjdavis favorited Sandy's video
Monday
tjdavis posted a photo
Monday
Christopher Walker is now a member of 12160 Social Network
Oct 19
tjdavis posted videos
Oct 19
Burbia commented on tjdavis's photo
Thumbnail

Reflection

"Let's see if this goes past indictment."
Oct 18
Doc Vega commented on Doc Vega's blog post Something Watches From Out there in the Wilderness
"cheeki kea That's very interesting history. So many things about history that go ignored or…"
Oct 18
Burbia commented on Burbia's video
Oct 18
Burbia posted a video

Programmed To Kill/Satanic Cover-Up Part 433 (The Charlie Kirk Conspiracy Show)

https://www.programmedtokill.net/projects---- DISCLAIMER! ----Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair u...
Oct 18
cheeki kea commented on cheeki kea's photo
Thumbnail

American werewolf- 2018

"Yip I've looked again and this is what the creature looks like, even has stripes just like…"
Oct 18
cheeki kea commented on cheeki kea's photo
Thumbnail

American werewolf- 2018

"The mystery continues I guess. ( reminds me of something out of the under world )"
Oct 18
cheeki kea posted a photo
Oct 18
cheeki kea commented on Doc Vega's blog post Something Watches From Out there in the Wilderness
"Another fine story Doc V. I think it's Dogman the werewolf out there roaming around in high…"
Oct 18
Doc Vega posted blog posts
Oct 18
Doc Vega commented on Doc Vega's blog post What Four UFO Whistle Blowers All Suffered in Common?
"Less Prone Thanks for you comment Buddy! Dabbling in government kept secrets can cost you dearly. I…"
Oct 18
Burbia posted a blog post

Sebastion Piñera and 5G

 Sebastion Piñera “The start of the bidding process for the 5G network. Let’s listen to the threats…See More
Oct 18
tjdavis posted a photo
Oct 16

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted