Spotlight: U.S. voting system vulnerabilities raise concern as hackers break into mock sites

    Source: Xinhua| 2018-08-13 21:28:52|Editor: xuxin
    Video PlayerClose

    LAS VEGAS, the United States, Aug. 12 (Xinhua) -- Following the world's largest yearly hacking conventions Black Hat and DEFCON held in Las Vegas this week, the United States has only about 90 days left to get ready for the 2018 midterm elections.

    Amid the growing debate over whether electronic voting machines (EVMs) are hackable or not, there is increasing concern about how vulnerable the systems could be to cyber-attack.

    WORST VOTING MACHINE

    At Black Hat USA 2018, security researcher Carsten Schuermann discovered the results of a forensic analysis of eight WinVote voting machines that had been used in Virginia elections for more than a decade.

    The associate professor at IT University of Copenhagen noted there are actually two problems with insecure voting machines. The first is obvious: The systems can be easily hacked.

    "But the other threat is equally important and equally dangerous, and that is the threat of an alleged cyber attack -- when people claim there was a cyber attack when there actually wasn't," said Schuermann at the conference.

    Schuermann said such allegations can disrupt elections and damage the credibility of voting results.

    The WinVote voting machine was used extensively in Virginia elections during 2004 and 2015. It has been dubbed the worst voting machine ever.

    It runs Windows XP, service pack 0. It is by default wifi enabled. It uses WEP security and all WinVote machines appear to use the same password "abcde."

    "That's not a very secure password," said Schuermann.

    Several States still use voting machines similar to the WinVote.

    INFORMATION THREAT

    Now in its second year, organizers of "The Vote Hacking Village" at the DEFCON, which takes place immediately following Black Hat in Las Vegas every year, have packed a conference room at Caesars Palace with voting machines.

    The Voting Village has invited attendees to study and identify vulnerabilities in election equipment used around the United States as well as other nations.

    This year's Voting Village featured hands-on experience with at least nine types of voting equipment, almost all of which are in use in elections today.

    Thousands of hackers, over 100 election officials, and about 50 kids identified and exploited various vulnerabilities within the election ecosystem, according to DEFCON.

    After a few hours attack on the first day of the course, one hacker was essentially able to turn a voting machine into a jukebox, making it play music and display gifs.

    Hackers were also discovering 1,784 files, including mp3s of Chinese pop songs, hidden among the operating system files of another voting machine.

    The Voting Village has dramatically expanded this year to include not only more machines but also end-to-end voting infrastructure including a voter registration database and election reporting websites.

    "Election cybersecurity has been a national concern since 2016," an organizer told Xinhua. "These hacks can root out weaknesses in voting machines."

    Some officials that have flown to the event are becoming increasingly concerned about information threat of November's midterm elections.

    In recent months, U.S. Congress has failed to pass various bills that would fund election security and infrastructure improvements ahead of the midterms.

    CHILDREN'S PLAY

    How vulnerable is the U.S. electronic voting system?

    At the DEFCON event, nearly 40 child hackers were taking part in a contest to hack the mock versions of election board websites, and most of them were able to tamper with vote tallies. Some were even able to change candidates' names.

    The quickest hacker was an 11-year-old boy, who was able to access a replica of the Florida state election website and change voting results found there in less than 10 minutes, the organizers confirmed on Sunday.

    But the U.S. National Association of Secretaries of State (NASS) criticized creating mock election office networks and voter registration databases for participants to defend and/or hack as "unrealistic".

    "Our main concern with the approach taken by DEFCON is that it utilizes a pseudo environment which in no way replicates state election systems, networks or physical security, " the organization said in a statement.

    One election machine manufacturer, Election Systems and Software (ES&S), has also raised some questions about the value of the Voting Village.

    "We at the Voting Village, along with our counsel, remain confident that our activities are lawful and are happy to address any of ES&S's legal concerns directly," DEFCON said in a statement.

    TOP STORIES
    EDITOR’S CHOICE
    MOST VIEWED
    EXPLORE XINHUANET
    010020070750000000000000011100001373875731
    主站蜘蛛池模板: 国产va免费精品高清在线观看| 女人自慰AA大片| 亚洲日本中文字幕天天更新| 美女露内裤扒开腿让男生桶| 欧美重口绿帽video| 国产乱子伦一区二区三区| 884aa在线看片| 成人黄色电影在线观看 | 91九色精品国产免费| 成人h在线播放| 亚洲精品无码专区在线| 色偷偷亚洲第一综合网| 国产精品免费一区二区三区| gta5圣堂酒店第三辆车在哪里| 日日碰狠狠添天天爽不卡| 伊人中文字幕在线观看| 视频在线观看国产| 国产精品久久久久久麻豆一区| fuqer2018| 成年美女黄网站小视频| 久草热久草视频| 欧美日韩精品福利在线观看| 公交车老师屁股迎合我摩擦 | 亚洲精品无码人妻无码| 精品日韩欧美一区二区三区在线播放| 国产成人亚洲综合无码| 4hu四虎永久免在线视| 天天躁狠狠躁夜躁2021| 中文字幕永久视频| 日韩在线免费视频| 亚洲免费在线看| 永久免费无码网站在线观看| 免费观看日本污污ww网站一区| 2015日韩永久免费视频播放| 婷婷色在线播放| 久久99热成人精品国产| 最近中文字幕mv手机免费高清| 亚洲欧美在线视频| 狠狠色丁香婷婷久久综合蜜芽| 国产成人久久综合二区| 2018国产大陆天天弄|