Hackers Breach U.S. Voting Machines in 90 Minutes in DEF CON Competition
Key Excerpts from Article on Website of Newsweek
Posted: August 6th, 2017
Hackers were able to successfully breach the software of U.S. voting machines in less than two hours at a competition in Las Vegas. The event exposed glaring deficiencies in the security of U.S. voting infrastructure. According to the Register, the hackers at the DEF CON conference Friday were given voting machines, and competed to access them by physically breaking them open and hacking them remotely. Some devices had remote ports, which could be used to insert devices with malicious software, others insecure WiFi connections, or outdated software such as Windows XP, rendering them exposed to hacking attacks. The machines, manufactured by companies including Diebold, Sequoia and Winvote equipment, were purchased over eBay or at government auctions. In June, the Intercept published leaked NSA documents showing that Russian agents hacked a U.S. voting systems manufacturer in the weeks leading to last year’s presidential election. NSA contractor Reality Leigh Winner, 25, was subsequently charged with removing classified material from a government facility and mailing it to a news outlet. “Without question, our voting systems are weak and susceptible. Thanks to the contributions of the hacker community today, we've uncovered even more about exactly how,” said Jake Braun, the Chief Executive Officer of Cambridge Global Advisors and Managing Director of Cambridge Global Capital, who designed the hacking competition.
Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting. Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.