Comments
Voting System Hacks Prompt Push for Paper-Based Voting
Oldest First  |  Newest First  |  Threaded View
cozmo__d
100%
0%
cozmo__d,
User Rank: Apprentice
8/8/2017 | 9:04:11 AM
Fodder
Why is this even a surprise to people, especially those of us in security? We all know that anything can be breached with unlimited physical access in a controlled environment. So do we call for companies world wide to shut down their computer networks and go back to paper and pen? No! Try hacking the voting machines remotely, or during election day with a ton of election officials around, or how about trying to breach physical security where the machines are stored and see if you can get anywhere. No, you take the absolute easiest way to hack something and then try to make a big deal out of it. Unreal.

When we do assessments for clients, and if we find that we can extract data from their servers, we do not recommend them going back to paper and pen. We give serious recommendations for remediation. Where are the recommendations for remediation here? The so called professionals there gave one recommendation, to go back to paper ballots. WOW!!! Just WOW!!! 

So with that advice, why don't we get rid of computers all together and go back to paper and pen? Why don't we give back our debit cards and go back to an all cash society? Why don't we get rid of computers from cars, since they can be hacked, and go back to cars with no computers? Why don't we give up our mobile phones and go back to land lines?

We, security professionals, are supposed to be innovative. 
alphaa10
0%
100%
alphaa10,
User Rank: Strategist
8/8/2017 | 4:18:32 PM
Re: Fodder
Remediation is the standard answer to most computer system issues, but with electronic voting machines, remediation must take a different form than tinkering with the hardware or code.

The paper audit trail, most experts on machine voting agree, is the safest, most reliable system available for maintaining integrity in our voting system. Two-factor authentication commonly uses different forms to establish authenticity, and paper offers a form sufficently different to frustrate both local and remote hacks.

Clearly, the convenience and speed of electronic voting tabulation is forfeited when there is no audit system offering reliability and authentication of results. For now, at least, paper audit remains the only answer commonly and readily available. 
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
8/9/2017 | 8:31:17 AM
On Georgia
When the subject has come up in Georgia, the IT staffers in this state say the voting protocol is isolated from the internet.  For wht it is worth whether you believe or not, but generally a really good idea.
theb0x
100%
0%
theb0x,
User Rank: Ninja
8/10/2017 | 5:05:59 PM
Paper-Based Voting
Paper based voting is not a solution or really even a preventative measure / mitigation technique to the issue at hand. Are we forgetting that Hacks are not limited to realm of the digital world? 

Ballots boxes can be physically compromised, votes can be forged, altered, and miscounted.
sighthndman
50%
50%
sighthndman,
User Rank: Apprentice
8/23/2017 | 5:22:33 PM
Re: Fodder
You might have to do some research to check my claims, but the voting system has been hacked many times in history, not just in America but worldwide. There's a famous LBJ quote, "If we count the votes, we'll win the election."

I don't know when actual physical voter fraud ended (that's something historians know). Dead voters don't vote until the vote counters count them, and they vote to make the totals add up. It's a pretty sophisticated system. But it only works if there aren't auditors, or maybe even observors, to keep the vote counters honest. Our system works because voters believe that vote counting fraud is small enough that it "usually" doesn't make a difference (that is, it's always somewhere else, and only a few places, and only a few votes in the House of Representatives, and "we" outvote "them").

So to protect the system, our only defense is to create an audit trail and have observors of the entire process. That means that we have to admit that the system is hackable and make it robust so that we can re-count the votes as needed (just as in the paper ballot days); allow for legal challenges as to which ballots were legally and/or legitimately cast (just as in the paper ballot days); allow for spoiled ballots (ditto); allow for potentially lost and/or rediscovered ballots (but at least not in the trunk of a car [we hope -- or is a lost and rediscovered thumb drive possible? -- politics guarantees full employment for lawyers]); and who knows what else? An armed citizen insurrection to guarantee public counting of ballots (Athens, TN, 1946)?


New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17182
PUBLISHED: 2018-09-19
An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations...
CVE-2018-17144
PUBLISHED: 2018-09-19
Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash.
CVE-2017-3912
PUBLISHED: 2018-09-18
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
CVE-2018-6690
PUBLISHED: 2018-09-18
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.
CVE-2018-6693
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...