Hackers Discover Chinese Music Hidden in US Voting Machine Software

Las Vegas, NV – The Voting Machine Hacking Village at this year’s DEFCON 26 hacking conference was crowded with hackers of all ages proving just how vulnerable the US voting system is to data tampering.

Hackers demonstrated that practically anyone with a screw driver, flash card, and willpower can easily hack into, and alter results from, Diebold Express Poll 5000 voting machines. In theory, any willing person could just walk into a voting booth, unscrew the side panel, access the memory card, place a new one into the machine, reboot the machine and use the default root password (“password“) to access the admin panel. Even some children managed to hack into and alter a simulated election results website in a matter of minutes.

In a more bizarre twist, Harri Hursti, co-organizer of Voting Hacking Village, told Unicorn Riot that hackers who had accessed one voting machine found Chinese music hidden in WinVote software. Hursti stated the hackers also confirmed that the Chinese music was on all the WinVote election booth software of the same model. Previously, WinVote was certified as meeting the Voting Systems Standards of 2002. Thousands of machines running WinVote software were used during elections in multiple US states as recently as 2014.

Unicorn Riot talked with Hursti about the Voting Machine Hacking Village, and what it seeks to expose about the sorry state of election security in the US.

Hackers were also able to tamper with the election results by altering the tallies into the billions (though that would be obvious), and even rewrite party names as well as the names of candidates (see below).

At the HOPE (“Hackers on Planet Earth“) conference earlier this summer, Unicorn Riot attended a talk by researchers at Nordic Innovation Labs who had run the Vote Hacking Village at DEFCON. They demonstrated by anyone could easily conceal voting machine tampering by easily ordering new seals. Looking back on the impact of their December 2007 report, spanning 316 pages with two or three vulnerabilities per page, the panelists said that very few of the documented problems had been solved since it was published.


To help our volunteer operated, horizontally organized, non-profit media organization, please consider becoming a monthly sustainer with tax-deductible micro-donations:

supportourworknew

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>