How A $15 Device Can Hack The US Presidential Election

Posted: Oct 18 2016, 5:35am CDT | by , in News | Latest Political News

 
How a $15 Device can Hack the US Presidential Election
Credit: Getty Images

Don't Miss: This How to find Fingerlings in Stock

During its "Hack the Vote" election simulation, cyber security firm Symantec has revealed three easy ways an attacker with the right level of intelligence and motivation could impact the US presidential election and it will cost just $15.

To analyze the ecosystem of an election -- from electronic voting machines to data transfers, vote tabulation and broadcasting the results -- the company tested the actual direct-recording electronic (DRE) voting machines and other equipment to simulate a real-world voting system.

According to the general process, voters use a chip card to cast their vote. Once someone has voted, the same card is re-used by the next voter.

"Just like credit cards, these cards are essentially a computer with its own RAM, CPU and operating system. Which means they can be exploited like any computing device," the company said in a statement.

"In examining the election process for vulnerabilities, we discovered that there's an opportunity for a hacker to modify the code put on a voter's chip card. Anyone who knows how to program a chip card and purchases a simple $15 Raspberry Pi-like device, could secretly reactivate their voter card while inside the privacy of a voting booth," added Symantec.

The card can be faked in two different ways -- one, reset the card to allow someone to vote multiple times using the same chip card and second, programming the card to allow multiple vote casting.

"There was no form of encryption on the internal hard drive of the voting machines we purchased, which were running an outdated operating system to display the ballots and record votes," Symantec found.

The second method to influence the votes is tampering with tabulation.

All the votes are registered in the voting and attackers could compromise the integrity of the voting data by manipulation of cartridges as these storage cartridges function like a USB drive which stores data in plain text with no embedded encryption.

Thirdly, by propagating misinformation on social media networks, a hacktivist or attacker could also change voter behavior.

Symantec said that these vulnerabilities can easily be fixed by installing security software at all points of the process.

Holiday Gift Guides and Deals

Get your Holiday gifting inspired by Best Toy Gifts with High STEM Value and the Top 10 toy gifts under $10 if you are on budget. The most popular Holiday 2017 toy list include Fingerlings, Crate Creatures and more. Don't miss the new Holiday deals on Amazon Devices, including $29.99 Fire tablet.

This story may contain affiliate links.

This free App Solves You Holiday Shopping Problem


Download the free Tracker app now to get in-stock alerts on Fingerling, Luvabella, SNES Classic and more.

Latest News

Comments

The Author

<a href="/latest_stories/all/all/59" rel="author">IANS</a>
The Indo-Asian News Service (IANS) was established in 1986, initially to serve as an information bridge between India and its thriving Diaspora in North America. Now IANS is a full-fledged wire agency, putting out news 24x7 from around the world.

 

 

Advertisement

comments powered by Disqus