- ‘Star Trek: Discovery’ delivers a powerfully political episode Thursday 8:30 PM
- Bowser is taking over Nintendo—and the memes make themselves Thursday 7:02 PM
- California aims to strengthen data breach notification law Thursday 5:37 PM
- Feds say college student operated drug business through gaming app Thursday 4:36 PM
- Trump is again using old videos to claim his border wall is ‘under construction Thursday 4:05 PM
- Laura Loomer led a second protest at Twitter yesterday Thursday 3:37 PM
- The eyes have it in these ‘Alita: Battle Angel’ memes Thursday 2:13 PM
- Facebook let advertisers target users interested in infamous Nazis Thursday 1:58 PM
- Dem senator promises to put net neutrality on the ‘political hot seat’ in coming months Thursday 1:28 PM
- Someone figured out that Toothless from ‘How to Train Your Dragon’ looks just like Bulbasaur Thursday 12:44 PM
- Disturbing Snapchat video shows 17-year-old throwing dog on trampoline Thursday 12:16 PM
- How to watch the new Bon Appetit channel for free Thursday 12:03 PM
- Eminem disses Netflix for canceling ‘The Punisher’ Thursday 11:50 AM
- Florida prisons sued for depriving inmates of music they paid for Thursday 11:36 AM
- Chris Hemsworth will become Hulk Hogan for Netflix biopic Thursday 11:29 AM
Hackers at a conference broke into U.S. voting machines in just 90 minutes
This is unsettling.
Hackers reportedly managed to penetrate multiple U.S. voting machines in a relatively short period of time at a conference in Las Vegas this week, a cautionary demonstration for people concerned with the integrity and security of American elections.
The group of hackers attending the annual DEF CON conference reportedly took just 90 minutes to compromise 30 different voting machines, breaking through different companies’ security measures, including Winvote, Diebold, and Sequoia. In some cases, the machines included external ports that could be used to plug in malware, while others―perhaps more concerning―had poorly secured Wi-Fi connectivity enabled, allowing the hackers to breach the systems remotely.
Jeff Braun, a cybersecurity expert at the University of Chicago, reportedly convinced the DEF CON conference to take up the demonstration, hoping to show whether voting machine companies’ assurances of security could be trusted. After the event concluded, he told the Register that the perils are obvious.
“Without question, our voting systems are weak and susceptible. Thanks to the contributions of the hacker community today, we’ve uncovered even more about exactly how,” Braun said.
“The scary thing is we also know that our foreign adversaries—including Russia, North Korea, Iran—possess the capabilities to hack them too, in the process undermining principles of democracy and threatening our national security.”
Election cybersecurity has been a hot topic in recent months, thanks to the U.S. intelligence community’s broad concurrence that the Russian government attempted to interfere in the presidential election. Specifically, it’s been widely alleged that Russia hacked the Democratic National Committee and the email account of Hillary Clinton’s campaign chairman John Podesta, in an attempt to funnel damaging information about her into the public consciousness.
It’s also been reported that Russian hackers accessed U.S. voting machines in 39 states in the run-up to the election, although there’s no evidence that any votes were changed.
Update 3:58pm CT, Aug. 1: Hackers discovered the records of 654,517 people in an ExpressPoll-5000 electronic voting machine at Voting Village, according to a Gizmodo report.
The records appear to be from people who voted in Shelby County, Tennessee, and contain names, addresses, dates of birth, political party affiliations, whether people voted absentee, and if they were asked to provide ID.
Security researcher Josh Palmer first discovered the database by simply removing the memory card from the voting machine and connecting it to a computer. Palmer told Gizmodo it was not encrypted and didn’t even have a password. The conference quickly confiscated the memory card to protect the more than 650,000 voters whose personal information was left unprotected. If Palmer had the card before an election, he said he could write a script “in seconds” that would make it appear as if all people already cast absentee ballots.
Chris Tognotti is a frequent contributor for the Daily Dot. He’s a news and current events writer based out of Berkeley, California, and a co-host of the podcast Now We Know. While he specializes in domestic politics and opinion writing, he’s also savvy on sports, video games, and film.