Skip to main content

The ugly truth about voting security: States won’t fix it

posted onNovember 6, 2018
by l33tdawg
Arstechnica
Credit: Arstechnica

L33tdawg: If you're interested in voting machine security, you'll probably like this talk that's coming up in Dubai at the end of this month.

As those of you reading this from the US (hopefully) vote today, in all likelihood your vote will be counted correctly and you won't be turned away from the polls because someone hacked the voter registration data. Yet for a small but non-zero minority, something will go wrong that will stand in the way of their ability to cast a vote for the candidate of their choice. It could be a glitch in a voting machine interface that wasn't caught before they commit their ballot, voter registration data that has been flagged as incorrect or has been purged, or maybe a targeted robo-call that gives them bad information about the election.

There are lots of ways to manipulate the vote tally that go beyond exploiting a hiccup in an electronic voting machine. Denial of service attacks—on state or county servers, on the networks that connect precincts to election commissions, and on other vulnerable points in the network architecture—could disrupt voting itself or prevent votes from being properly counted. Tampering with voter registration data in advance of the election could cause voters to be forced to cast provisional ballots or exclude them from voting entirely. And then there's simply shoddy software implementation and aging hardware, which can cause an unintended denial of service.

Source

Tags

Security Industry News

You May Also Like

Recent News

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th