PC World - Electronic voting systems have drawn fire from courts, lawmakers and citizens groups -- and now they're under attack by hackers.
It's an organized assault, too. E-voting technology expert Rebecca Mercuri, a Harvard research fellow who has been outspoken in her opposition to such systems, has issued a "Hack the Vote" challenge, trying to illustrate what she calls the systems' unreliability and vulnerability.
She unveiled the so-called Mercuri Challenge at the recent Black Hat Briefings and Defcon 12 security conferences.
Mercuri suggested that electronic voting machines be hacked during their pre-election testing so officials will abandon them before an actual election. "People in the election community say this technology is bulletproof," Mercuri says. "It's not."
She especially opposes use of electronic voting technology in its current state, which doesn't allow for a verifiable backup. "I'm not asking anyone to break any laws. We just want the opportunity to hack e-voting systems to prove that it can or cannot be done," she says.
Mercuri says the likeliest e-voting fraud would involve unauthorized remote access to voting machines, when a hacker manipulates results; or backdoor access to voting systems by workers with approved access but their own agenda. She described her concerns at a Defcon keynote address, "Hack the Vote."
As part of her challenge, Mercuri is calling on e-voting system vendors VoteHere Inc. and Advanced Voting Solutions to provide any challengers with "full specifications" of their voting systems for review. The first person to change vote tallies without being detected can claim $10,000 from a separate challenge.
The $10,000 is being offered by noted e-voting proponent and Carnegie Mellon University computer scientist Michael Shamos. His $10,000 bet, the Direct-Recording Electronic Hacking Challenge, contends that no one can hack into a DRE voting machine undetected.
"It is impossible to tamper with e-voting systems without being detected," he said in a telephone interview countering Mercuri's claims. Shamos says no one has ever taken him up on the challenge because, as he puts it, "the fundamental system is unhackable."
Shamos recently added another twist to his challenge. Takers must fork over $5,000 to be held in escrow for Shamos. If the contestant fails to tamper with the e-voting results undetected, Shamos keeps the $5,000.
Both Shamos and Mercuri acknowledge that they are using the same vehicle while on opposite sides of the e-vote debate. Mercuri says her public challenge is meant to draw attention to Shamos's DRE Hacking Challenge.
However, a growing number of e-voting naysayers agree with much of what Mercuri claims. For example, in April, California banned the use of touch-screen voting machines in
- 10 Hot Big Data Startups to Watch
- 11 Unique Uses for Google Glass, Demonstrated by Celebs
- How to Export Your Google Reader Account
- How to Better Engage Millennials (and Why They Aren't Really so Different)
- Telltale signs of ATM skimming
- 20 security and privacy apps for Androids and iPhones
- Big screen con artists: 7 great movies about social engineering
The Pentagon's cybersecurity budget through 2018 is $23 billion to protect critical infrastructure and develop cyberattack capabilities. Although America and Chinese presidents discussed cybersecurity and cyber espionage, China is hitting back about US nation state hacking. Those cyberattacks could be from elite cyberwarfare warriors working in a secret NSA office called Tailored Access Operations (TAO); it has been successfully hacking China for nearly 15 years.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Federal IT Innovation Caught in a Catch-22
- Fed resources shoring up old infrastructure, holding back new technologies.
- Top Three Reasons Why Customers Deploy EMC VNX with EMC VPLEX
- What if you could build a cost effective, continuously available storage infrastructure? Learn the top reasons users are deploying EMC VNX with EMC...
- Clearing the Clouds for Midmarket Businesses
- The 10-point checklist included in this expert brief has been developed to help small and midsize businesses select the cloud model and cloud...
- Perforce Case Study
- Learn how EMC cost-effectively transformed their infrastructure and improved storage performance by 60% by unifying storage, deploying virtualization and leveraging Flash to meet...
- Data Center Transformation: Balancing user demands with IT mandates
- There's a flood of user requirements, computing trends, and new technologies driving the need for you to look closely at your IT infrastructure. All Government IT White Papers
- Williams & Fudge on Transforming IT with EMC
- Watch Williams & Fudge Data Center Director Phillip Reynolds discuss why this accounts receivable management firm turned to EMC.
- The Success Network: Driving Business Forward
- The communications and connectivity infrastructure of your organization is the focus of this KnowledgeVault Exchange, sponsored by Comcast Business.
- Advanced Voice Solutions for Your Business
- How can hosted business class voice services help mid-sized business be more agile, competitive and ready for growth?
- Bring Mobile Innovation to your Enterprise.
- With the mobility revolution well underway, CIO's and Line of Business owners are faced with the struggle to develop a winning mobile strategy.
- Innovation in the Cloud
- Managing HR and financial information in the modern business requires efficient business practices and technology. All Government IT Webcasts