Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Voting System Hacks Prompt Push for Paper-Based Voting
Threaded  |  Newest First  |  Oldest First
cozmo__d
cozmo__d,
User Rank: Apprentice
8/8/2017 | 9:04:11 AM
Fodder
Why is this even a surprise to people, especially those of us in security? We all know that anything can be breached with unlimited physical access in a controlled environment. So do we call for companies world wide to shut down their computer networks and go back to paper and pen? No! Try hacking the voting machines remotely, or during election day with a ton of election officials around, or how about trying to breach physical security where the machines are stored and see if you can get anywhere. No, you take the absolute easiest way to hack something and then try to make a big deal out of it. Unreal.

When we do assessments for clients, and if we find that we can extract data from their servers, we do not recommend them going back to paper and pen. We give serious recommendations for remediation. Where are the recommendations for remediation here? The so called professionals there gave one recommendation, to go back to paper ballots. WOW!!! Just WOW!!! 

So with that advice, why don't we get rid of computers all together and go back to paper and pen? Why don't we give back our debit cards and go back to an all cash society? Why don't we get rid of computers from cars, since they can be hacked, and go back to cars with no computers? Why don't we give up our mobile phones and go back to land lines?

We, security professionals, are supposed to be innovative. 
alphaa10
alphaa10,
User Rank: Strategist
8/8/2017 | 4:18:32 PM
Re: Fodder
Remediation is the standard answer to most computer system issues, but with electronic voting machines, remediation must take a different form than tinkering with the hardware or code.

The paper audit trail, most experts on machine voting agree, is the safest, most reliable system available for maintaining integrity in our voting system. Two-factor authentication commonly uses different forms to establish authenticity, and paper offers a form sufficently different to frustrate both local and remote hacks.

Clearly, the convenience and speed of electronic voting tabulation is forfeited when there is no audit system offering reliability and authentication of results. For now, at least, paper audit remains the only answer commonly and readily available. 
REISEN1955
REISEN1955,
User Rank: Ninja
8/9/2017 | 8:31:17 AM
On Georgia
When the subject has come up in Georgia, the IT staffers in this state say the voting protocol is isolated from the internet.  For wht it is worth whether you believe or not, but generally a really good idea.
sighthndman
sighthndman,
User Rank: Apprentice
8/23/2017 | 5:22:33 PM
Re: Fodder
You might have to do some research to check my claims, but the voting system has been hacked many times in history, not just in America but worldwide. There's a famous LBJ quote, "If we count the votes, we'll win the election."

I don't know when actual physical voter fraud ended (that's something historians know). Dead voters don't vote until the vote counters count them, and they vote to make the totals add up. It's a pretty sophisticated system. But it only works if there aren't auditors, or maybe even observors, to keep the vote counters honest. Our system works because voters believe that vote counting fraud is small enough that it "usually" doesn't make a difference (that is, it's always somewhere else, and only a few places, and only a few votes in the House of Representatives, and "we" outvote "them").

So to protect the system, our only defense is to create an audit trail and have observors of the entire process. That means that we have to admit that the system is hackable and make it robust so that we can re-count the votes as needed (just as in the paper ballot days); allow for legal challenges as to which ballots were legally and/or legitimately cast (just as in the paper ballot days); allow for spoiled ballots (ditto); allow for potentially lost and/or rediscovered ballots (but at least not in the trunk of a car [we hope -- or is a lost and rediscovered thumb drive possible? -- politics guarantees full employment for lawyers]); and who knows what else? An armed citizen insurrection to guarantee public counting of ballots (Athens, TN, 1946)?
theb0x
theb0x,
User Rank: Ninja
8/10/2017 | 5:05:59 PM
Paper-Based Voting
Paper based voting is not a solution or really even a preventative measure / mitigation technique to the issue at hand. Are we forgetting that Hacks are not limited to realm of the digital world? 

Ballots boxes can be physically compromised, votes can be forged, altered, and miscounted.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file