August 25, 2019 | From Fox News
I may have the keys to open voting machines used in states across the country, and that is not a good thing.
I am not an election official. I am not a voting machine expert, operator, or otherwise affiliated with any federal, state or local government agency.
I am simply an investigative journalist who, upon learning that the types of keys used for these machines are apparently widely available for purchase on the Internet, was prudent enough to ask to take a few keys home as souvenirs from my recent trip to the DEF CON 27 Hacking Conference in Las Vegas.
JOIN US IN PRAYING FOR FAIR AND HONEST ELECTIONS. DOWNLOAD OUR PRAYER GUIDE AND BEGIN PRAYING AS THESE ISSUES ARE BEING WORKED ON!
Now, I have access to machines that have been used or are currently in-use in 35 different states. Swing-states, coastal icons and the heartland, experts say. The coolest and probably most disturbing SWAG ever, hands-down.
“These are the keys to the kingdom,” explains Harri Hursti, a hacker and data security expert with Nordic Innovation Labs. Hursti, who helped organize the DEF CON “Voting Village,” was speaking both literally and metaphorically, since some of these keys actually open the memory card enclosure on certain machines.
The problem, Hursti says, is that many of the locks used for these machines work with basic keys that can be easily replaced over time, or in the event they are lost. Some of the keys are so universal that they not only open voting machines, but also mini-bars and even some elevators.
Ordering what is effectively a skeleton key off of Amazon is not the kind of “hacking” you might think of at a place like DEF CON’s Voting Village, or when brainstorming the possible vulnerabilities of the supposedly secure equipment used in U.S. elections in general. But here we are.
Indeed, the types of keys I was shown at the DEF CON “Voting Village” are available on sites like Amazon, eBay and others, as Hursti suggested.
“This [machine] is used in 18 different states, many different swing-states. You can disrupt the ballot, you can make it say something it’s not supposed to say. And that’s undermining our democracy.”
Sure, I learned about plenty of other digital backdoors and other disturbing vulnerabilities concerning U.S. election equipment at DEF CON. Like the “hidden feature” that Hursti says was only recently discovered in a machine that’s been in use and under the microscope for more than a decade.
“A hidden feature that enables you to reopen the polls silently, and insert more ballots and print the new evidence of the election,” Hursti says. And despite believing that the manufacturers had learned from previously exposed vulnerabilities on that machine over the years, “these [newly discovered] features had been missed” the entire time, Hursti says.
I watched Hursti explain this new discovery to Rep. Eric Swalwell, D-Calif., one of the numerous lawmakers who attended this year’s DEF CON, and whose face seemed to drop upon learning of the new revelation. That’s likely because this particular machine has been in use in his home state of California for years.
That latter machine utilized a commonly available tablet with both forward and rear-facing cameras. A media representative for Election Systems & Software (ES&S), one of the companies behind that particular piece of equipment and others at DEF CON, said “voting machines don’t have cameras. Perhaps you are referencing our previous version of e-pollbook, used to check in and verify voters.”
Those tablets, they said, were only used “in certain states to speed up the voter check-in process,” and that their equipment “does not photograph voters or cast ballots, and there is no way the ballot can be tied to the voter at registration.”
You can decide how reassured you are by those statements if you ever find yourself staring a webcam in the face while checking-in on Election Day.
One voting machine was discovered to have a password of “1111.” Better than the voter ID machine with NO password.
And I watched as yet another voting machine was physically dismantled, memory card and all, with just fingernails and a ballpoint pen. Rachel Tobac, CEO of SocialProof Security, a company that specializes in “social engineering” and security assessments, walked me through that last process in less than 90 seconds. And this was only her second year of hacking voting machines.
In the “kids area” at DEF CON, known as the “r00tz Asylum,” children barely out of middle school had hacked a simulated campaign contributions website to reveal donations from a deep-pocket donor named “spaghetti.” Jokes aside, the power to change the names and amounts of political donations on official state websites is no laughing matter.
There were signs that some of the problems with U.S. election equipment are being addressed, like the significantly larger contingent of lawmakers at this year’s DEF CON, as well as election officials and even congressional staffers from both sides of the aisle. Or the fact that more than a dozen actual voting machines were available for tinkering at this year’s Voting Village, some of them by the manufacturers themselves.
Dominion Voting, another company that produces election equipment, “sent representatives and demo equipment to DEF CON this year in the hopes of finding more ways to work with researchers and white hat hackers,” according to a representative.
One prominent member of the hacking community at DEF CON told Fox that they felt as if the Voting Village’s “scorched earth” approach of dismantling voting machines in a public space may no longer be the best way to encourage a public dialogue with the companies behind the tech. That same person said it’s a very good sign that there were apparently representatives from at least one such company at DEF CON this year, with gear in tow. They also admitted that having election equipment that utilizes master keys sold on the Internet seems like an obvious and easily fixable problem.
There are also technological advancements being researched to try and make the voting system more secure, like a new $10 million machine funded by the DoD, and the concept of combining blockchain technology with paper ballots – a federal elections Frankenstein that is at least three elections away from becoming a possible reality, according to people working on the project.
“This [machine] is used in 18 different states, many different swing-states,” Tobac says. “You can disrupt the ballot, you can make it say something it’s not supposed to say. And that’s undermining our democracy,” she added.
(Excerpted from Fox News, article by Alex Diaz.)