- Oprah says what was really on her mind while she ate bland chicken 1 Year Ago
- Democrats predicted to go in on net neutrality when they take House 1 Year Ago
- Holland Tunnel decorations are a real nightmare before Christmas Today 2:12 PM
- Amazon still won’t say whether ICE uses its facial recognition tech Today 1:13 PM
- Ninja to host Thursday Night Football Today 12:00 PM
- How to stream the NFL’s Week 15 for free Today 12:00 PM
- An undecorated room sets off a debate on Twitter Today 11:42 AM
- Netflix announces Taylor Swift ‘Reputation’ concert film Today 11:29 AM
- People are making memes out of these ‘leaked’ ‘Sonic the Hedgehog’ posters Today 11:12 AM
- How to watch the Liga MX final between Club América and Cruz Azul online for free Today 10:38 AM
- Parents shocked by KKK costumes in school play Today 10:11 AM
- Learn why light therapy is the key to keeping winter skin at bay Today 9:38 AM
- Laura Loomer says she’s been banned from GoFundMe Today 9:14 AM
- Here’s why we might not see the Defenders on Disney+ anytime soon Today 9:09 AM
- 23 smokin’ hot gifts for your stoner friend Today 8:49 AM
Hackers at a conference broke into U.S. voting machines in just 90 minutes
This is unsettling.
Hackers reportedly managed to penetrate multiple U.S. voting machines in a relatively short period of time at a conference in Las Vegas this week, a cautionary demonstration for people concerned with the integrity and security of American elections.
The group of hackers attending the annual DEF CON conference reportedly took just 90 minutes to compromise 30 different voting machines, breaking through different companies’ security measures, including Winvote, Diebold, and Sequoia. In some cases, the machines included external ports that could be used to plug in malware, while others―perhaps more concerning―had poorly secured Wi-Fi connectivity enabled, allowing the hackers to breach the systems remotely.
Jeff Braun, a cybersecurity expert at the University of Chicago, reportedly convinced the DEF CON conference to take up the demonstration, hoping to show whether voting machine companies’ assurances of security could be trusted. After the event concluded, he told the Register that the perils are obvious.
“Without question, our voting systems are weak and susceptible. Thanks to the contributions of the hacker community today, we’ve uncovered even more about exactly how,” Braun said.
“The scary thing is we also know that our foreign adversaries—including Russia, North Korea, Iran—possess the capabilities to hack them too, in the process undermining principles of democracy and threatening our national security.”
Election cybersecurity has been a hot topic in recent months, thanks to the U.S. intelligence community’s broad concurrence that the Russian government attempted to interfere in the presidential election. Specifically, it’s been widely alleged that Russia hacked the Democratic National Committee and the email account of Hillary Clinton’s campaign chairman John Podesta, in an attempt to funnel damaging information about her into the public consciousness.
It’s also been reported that Russian hackers accessed U.S. voting machines in 39 states in the run-up to the election, although there’s no evidence that any votes were changed.
Update 3:58pm CT, Aug. 1: Hackers discovered the records of 654,517 people in an ExpressPoll-5000 electronic voting machine at Voting Village, according to a Gizmodo report.
The records appear to be from people who voted in Shelby County, Tennessee, and contain names, addresses, dates of birth, political party affiliations, whether people voted absentee, and if they were asked to provide ID.
Security researcher Josh Palmer first discovered the database by simply removing the memory card from the voting machine and connecting it to a computer. Palmer told Gizmodo it was not encrypted and didn’t even have a password. The conference quickly confiscated the memory card to protect the more than 650,000 voters whose personal information was left unprotected. If Palmer had the card before an election, he said he could write a script “in seconds” that would make it appear as if all people already cast absentee ballots.
Chris Tognotti is a frequent contributor for the Daily Dot. He’s a news and current events writer based out of Berkeley, California, and a co-host of the podcast Now We Know. While he specializes in domestic politics and opinion writing, he’s also savvy on sports, video games, and film.