{"id":356,"date":"2012-10-28T00:51:41","date_gmt":"2012-10-28T00:51:41","guid":{"rendered":"http:\/\/isensorlab.com\/forum\/?p=356"},"modified":"2015-03-26T14:08:01","modified_gmt":"2015-03-26T14:08:01","slug":"security-experts-say-new-electronic-voting-machines-can-be-hacked","status":"publish","type":"post","link":"https:\/\/isensoranalytics.com\/forum\/?p=356","title":{"rendered":"Security experts say new electronic voting machines can be hacked"},"content":{"rendered":"<p>Rapid advances in the development of cyberweapons and malicious software mean that electronic-voting machines used in the 2012 election could be hacked, potentially tipping the presidential election or a number of other races.<\/p>\n<p>Since the machines are not connected to the Internet, any hack would not be a matter of someone sneaking through cyberspace to change ballots. Rather, the concern is that an individual hacker, a partisan group, or even a nation state could infect voting machines by gaining physical access to them or by targeting the companies that service them.<\/p>\n<p>The 2010 discovery of the Stuxnet cyberweapon, which used a thumb drive to attack Iran&#8217;s nuclear facilities and spread among its computers, illustrated how one type of attack could work. Most at risk are paperless e-voting machines, which don\u2019t print out any record of votes, meaning the electronically stored results could be altered without anyone knowing they had been changed.<\/p>\n<p>In a tight election, the result could be the difference between winning and losing. A Monitor analysis shows that four swing states \u2013 Pennsylvania, Virginia, Colorado, and Florida \u2013 rely to varying degrees on paperless machines.<\/p>\n<p>&#8220;The risk of cyber manipulation of these machines is quite real,&#8221; says Barbara Simons, a computer researcher and author of &#8220;Broken Ballots,&#8221; a book documenting e-voting vulnerabilities. &#8220;Most people don&#8217;t understand that these computer-based voting machines can have software bugs or even election-rigging malicious software in them.&#8221;<\/p>\n<p>There are plenty of software vulnerabilities to exploit, says Matt Blaze, a computer scientist at the University of Pennsylvania in Philadelphia. In 2007, he was on a team investigating touch-screen and other voting systems for California and Ohio. The resulting study concluded  &#8220;virtually every important software security mechanism is vulnerable.&#8221;<\/p>\n<p>The paperless machines, however, stand out as particularly vulnerable.<\/p>\n<p>&#8220;If there&#8217;s no paper trail, you can have the corrupted software display on the voting-machine screen whatever you want to display \u2013 and then after the voter leaves, record something completely different inside,&#8221; says Richard Kemmerer, a computer scientist who heads the University of California, Santa Barbara, Computer Security Group.<\/p>\n<p>From the The Christian Science Monitor (http:\/\/s.tt\/1r7Gh)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rapid advances in the development of cyberweapons and malicious software mean that electronic-voting machines used in the 2012 election could be hacked, potentially tipping the presidential election or a number of other races. Since the machines are not connected to &hellip; <a href=\"https:\/\/isensoranalytics.com\/forum\/?p=356\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-356","post","type-post","status-publish","format-standard","hentry","category-featured"],"_links":{"self":[{"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/posts\/356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=356"}],"version-history":[{"count":2,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/posts\/356\/revisions"}],"predecessor-version":[{"id":586,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=\/wp\/v2\/posts\/356\/revisions\/586"}],"wp:attachment":[{"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isensoranalytics.com\/forum\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}