MULEGEEK TECHNOLOGIESMULEGEEK TECHNOLOGIES
  • 4G
  • 5G
  • Broadcast
  • Education
  • Mobile
  • streaming
  • Software
Facebook Twitter Instagram
Facebook Twitter Instagram
MULEGEEK TECHNOLOGIESMULEGEEK TECHNOLOGIES
  • 4G

    Colorado Opens Doubleheader Weekend by Hosting Swarm Friday

    February 2, 2023

    BSNL Offers Cheapest Postpaid Plan at Rs 199: Check Benefits

    January 31, 2023

    Lamar County Sheriff Inmate Booking Report || Jan. 30, 2023

    January 30, 2023

    Cohere Technologies Receives Funding From Bell Ventures for

    January 30, 2023

    With 5.7% CAGR, Enterprise WLAN Market Size Worth USD 9.59

    January 30, 2023
  • 5G

    Sunil Mittal lauds focus on 5G tech in this year’s Budget

    February 2, 2023

    iQOO 11 5G Review: Does It End Your Quest for the Ultimate Smartphone?

    January 31, 2023

    BSNL moves into the private 5G network space – Developing Telecoms

    January 30, 2023

    Oppo Reno8 T 5G and Enco Air3 set to launch on February 3 in India

    January 30, 2023

    Mafab Communications targets infrastructure sharing to push 5G service

    January 30, 2023
  • Broadcast

    2 former Tigers players joining TV broadcast team in 2023

    February 2, 2023

    Longtime Hawaii sports broadcaster Jim Leahey dies at 80

    January 31, 2023

    BBC Arabic Radio Airs Final Broadcast After 85 Years

    January 30, 2023

    Gracey swaps W Series for SailGP broadcast role

    January 30, 2023

    Lte And 5G Broadcast Market Analysis by Growth Facts and Revenue Figures over 2023 – 2032

    January 30, 2023
  • Education

    How technology will transform global education in 2023

    January 27, 2023

    MassBay Community College Offering Free Computer & Technology Education and Training to Unemployed and Underemployed Workers

    January 27, 2023

    Need to focus on reshaping technology education, says CM Naveen Patnaik

    January 26, 2023

    Tech ed students make cornhole sets for Winter Regatta – WJFW-TV

    January 26, 2023

    Ontario updating curriculum for computer, technological education

    January 24, 2023
  • Mobile

    Nova Labs Launches New IoT Integration Arm, 1663™

    February 2, 2023

    Reforms to enable speedy 5G roll outs, help consumers, Telecom News, ET Telecom

    January 31, 2023

    NXP Semiconductor delivers mixed results as mobile and IoT chip demand falters

    January 31, 2023

    Aalto University starting a new doctoral program with Nokia

    January 30, 2023

    ROSALIND FRANKLIN UNIVERSITY ANNOUNCES $1 MILLION IN NEW FUNDING FROM NORTHSHORE UNIVERSITY HEALTH SYSTEM TO EXPAND MOBILE CLINIC COMMUNITY OUTREACH

    January 30, 2023
  • streaming

    Buy or Bootleg: Save Your Favorite Streaming Media by Any Means Necessary

    February 2, 2023

    'The Adam Project' stands out amongst streaming duds – ECM Publishers

    January 31, 2023

    ‘Kidding’ Removed From Showtime Streaming — Full List of Removed Shows

    January 31, 2023

    ‘WWE Monday Night RAW’ (1/30/23) free live stream: How to watch Season 31, Episode 5 online without cable

    January 30, 2023

    Southwest’s Loss, Comcast’s Growth, and Netflix’s Strategy

    January 30, 2023
  • Software

    Azentio Software recognized as a Notable Vendor in Leading Research Firm’s Digital Banking Engagement Platforms Report

    January 31, 2023

    Hackers Use TrickGate Software to Deploy Emotet, REvil, Other Malware

    January 30, 2023

    Updates To ezPaycheck Software Enables Trucking Companies Start Payroll, Mid-Year Easily

    January 30, 2023

    Major government tech contractors use monopolistic vendor-lock to drive revenue: study

    January 30, 2023

    Calibrite launches brand new monitor calibration software suite

    January 29, 2023
MULEGEEK TECHNOLOGIESMULEGEEK TECHNOLOGIES
Home»Software»Voting software vulnerable in at least 16 states
Software

Voting software vulnerable in at least 16 states

By mulegeek-June 1, 2022No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

ATLANTA (AP) – Electronic voting machines from a leading vendor used in at least 16 states have software vulnerabilities that leave them susceptible to hacking if unaddressed, the nation’s leading cybersecurity agency says in an advisory sent to state election officials.

The U.S. Cybersecurity and Infrastructure Agency, or CISA, said there is no evidence the flaws in the Dominion Voting Systems’ equipment have been exploited to alter election results. The advisory is based on testing by a prominent computer scientist and expert witness in a long-running lawsuit that is unrelated to false allegations of a stolen election pushed by former President Donald Trump after his 2020 election loss.

The advisory, obtained by The Associated Press in advance of its expected Friday release, details nine vulnerabilities and suggests protective measures to prevent or detect their exploitation. Amid a swirl of misinformation and disinformation about elections, CISA seems to be trying to walk a line between not alarming the public and stressing the need for election officials to take action.

CISA Executive Director Brandon Wales said in a statement that “states’ standard election security procedures would detect exploitation of these vulnerabilities and in many cases would prevent attempts entirely.” Yet the advisory seems to suggest states aren’t doing enough. It urges prompt mitigation measures, including both continued and enhanced “defensive measures to reduce the risk of exploitation of these vulnerabilities.” Those measures need to be applied ahead of every election, the advisory says, and it’s clear that’s not happening in all of the states that use the machines.

University of Michigan computer scientist J. Alex Halderman, who wrote the report on which the advisory is based, has long argued that using digital technology to record votes is dangerous because computers are inherently vulnerable to hacking and thus require multiple safeguards that aren’t uniformly followed. He and many other election security experts have insisted that using hand-marked paper ballots is the most secure method of voting and the only option that allows for meaningful post-election audits.

“These vulnerabilities, for the most part, are not ones that could be easily exploited by someone who walks in off the street, but they are things that we should worry could be exploited by sophisticated attackers, such as hostile nation states, or by election insiders, and they would carry very serious consequences,” Halderman told the AP.

Concerns about possible meddling by election insiders were recently underscored with the indictment of Mesa County Clerk Tina Peters in Colorado, who has become a hero to election conspiracy theorists and is running to become her state’s top election official. Data from the county’s voting machines appeared on election conspiracy websites last summer shortly after Peters appeared at a symposium about the election organized by MyPillow CEO Mike Lindell. She was also recently barred from overseeing this year’s election in her county.

One of the most serious vulnerabilities could allow malicious code to be spread from the election management system to machines throughout a jurisdiction, Halderman said. The vulnerability could be exploited by someone with physical access or by someone who is able to remotely infect other systems that are connected to the internet if election workers then use USB sticks to bring data from an infected system into the election management system.

Several other particularly worrisome vulnerabilities could allow an attacker to forge cards used in the machines by technicians, giving the attacker access to a machine that would allow the software to be changed, Halderman said.

“Attackers could then mark ballots inconsistently with voters’ intent, alter recorded votes or even identify voters’ secret ballots,” Halderman said.

Halderman is an expert witness for the plaintiffs in a lawsuit originally filed in 2017 that targeted the outdated voting machines Georgia used at the time. The state bought the Dominion system in 2019, but the plaintiffs contend that the new system is also insecure. A 25,000-word report detailing Halderman’s findings was filed under seal in federal court in Atlanta last July.

U.S. District Judge Amy Totenberg, who’s overseeing the case, has expressed concern about releasing the report, worrying about the potential for hacking and the misuse of sensitive election system information. She agreed in February that the report could be shared with CISA, which promised to work with Halderman and Dominion to analyze potential vulnerabilities and then help jurisdictions that use the machines to test and apply any protections.

Halderman agrees that there’s no evidence the vulnerabilities were exploited in the 2020 election. But that wasn’t his mission, he said. He was looking for ways Dominion’s Democracy Suite ImageCast X voting system could be compromised. The touchscreen voting machines can be configured as ballot-marking devices that produce a paper ballot or record votes electronically.

In a statement, Dominion defended the machines as “accurate and secure.”

Dominion’s systems have been unjustifiably maligned by people pushing the false narrative that the 2020 election was stolen from Trump. Incorrect and sometimes outrageous claims by high-profile Trump allies prompted the company to file defamation lawsuits. State and federal officials have repeatedly said there’s no evidence of widespread fraud in the 2020 election — and no evidence that Dominion equipment was manipulated to alter results.

Halderman said it’s an “unfortunate coincidence” that the first vulnerabilities in polling place equipment reported to CISA affect Dominion machines.

“There are systemic problems with the way election equipment is developed, tested and certified, and I think it’s more likely than not that serious problems would be found in equipment from other vendors if they were subjected to the same kind of testing,” Halderman said.

In Georgia, the machines print a paper ballot that includes a barcode — known as a QR code — and a human-readable summary list reflecting the voter’s selections, and the votes are tallied by a scanner that reads the barcode.

“When barcodes are used to tabulate votes, they may be subject to attacks exploiting the listed vulnerabilities such that the barcode is inconsistent with the human-readable portion of the paper ballot,” the advisory says. To reduce this risk, the advisory recommends, the machines should be configured, where possible, to produce “traditional, full-face ballots, rather than summary ballots with QR codes.”

The affected machines are used by at least some voters in at least 16 states, and in most of those places they are used only for people who can’t physically fill out a paper ballot by hand, according to a voting equipment tracker maintained by watchdog Verified Voting. But in some places, including all of Georgia, almost all in-person voting is on the affected machines.

Georgia Deputy Secretary of State Gabriel Sterling said the CISA advisory and a separate report commissioned by Dominion recognize that “existing procedural safeguards make it extremely unlikely” that a bad actor could exploit the vulnerabilities identified by Halderman. He called Halderman’s claims “exaggerated.”

Dominion has told CISA that the vulnerabilities have been addressed in subsequent software versions, and the advisory says election officials should contact the company to determine which updates are needed. Halderman tested machines used in Georgia, and he said it’s not clear whether machines running other versions of the software share the same vulnerabilities.

Halderman said that as far as he knows, “no one but Dominion has had the opportunity to test their asserted fixes.”

To prevent or detect the exploitation of these vulnerabilities, the advisory’s recommendations include ensuring voting machines are secure and protected at all times; conducting rigorous pre- and post-election testing on the machines as well as post-election audits; and encouraging voters to verify the human-readable portion on printed ballots.

___

This story has been corrected to reflect that Tina Peters has been barred from overseeing this year’s election in her county, not from running for secretary of state.

Copyright 2022 The Associated Press. All rights reserved.

cybersecurity Dominion Voting Systems georgia U.S. Cybersecurity and Infrastructure Agency voting machines voting software
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
mulegeek-
  • Website

Related Posts

Azentio Software recognized as a Notable Vendor in Leading Research Firm’s Digital Banking Engagement Platforms Report

January 31, 2023

Hackers Use TrickGate Software to Deploy Emotet, REvil, Other Malware

January 30, 2023

Updates To ezPaycheck Software Enables Trucking Companies Start Payroll, Mid-Year Easily

January 30, 2023

Leave A Reply Cancel Reply

Categories
  • 4G
  • 5G
  • Broadcast
  • Education
  • Mobile
  • Software
  • streaming

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Nova Labs Launches New IoT Integration Arm, 1663™

February 2, 2023

Buy or Bootleg: Save Your Favorite Streaming Media by Any Means Necessary

February 2, 2023

Colorado Opens Doubleheader Weekend by Hosting Swarm Friday

February 2, 2023

Sunil Mittal lauds focus on 5G tech in this year’s Budget

February 2, 2023
Facebook Twitter Instagram Pinterest
  • About Us
  • Cookies policy
  • Terms of services
  • Contact us
  • DIsclaimer
© 2023Designed by mulegeek.

Type above and press Enter to search. Press Esc to cancel.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT