Stories
Slash Boxes
Comments

SoylentNews is people

posted by mrpg on Wednesday July 18 2018, @12:31PM   Printer-friendly
from the idiocracy++ dept.

Submitted via IRC for Sulla

The nation's top voting machine maker has admitted in a letter to a federal lawmaker that the company installed remote-access software on election-management systems it sold over a period of six years, raising questions about the security of those systems and the integrity of elections that were conducted with them.

In a letter sent to Sen. Ron Wyden (D-OR) in April and obtained recently by Motherboard, Election Systems and Software acknowledged that it had "provided pcAnywhere remote connection software ... to a small number of customers between 2000 and 2006," which was installed on the election-management system ES&S sold them.

The statement contradicts what the company told me and fact checkers for a story I wrote for the[sic] New York Times in February. At that time, a spokesperson said ES&S had never installed pcAnywhere on any election system it sold. "None of the employees, ... including long-tenured employees, has any knowledge that our voting systems have ever been sold with remote-access software," the spokesperson said.

[...] Election-management systems are not the voting terminals that voters use to cast their ballots, but are just as critical: they sit in county election offices and contain software that in some counties is used to program all the voting machines used in the county; the systems also tabulate final results aggregated from voting machines.

Software like pcAnywhere is used by system administrators to access and control systems from a remote location to conduct maintenance or upgrade or alter software. But election-management systems and voting machines are supposed to be air-gapped for security reasons—that is, disconnected from the internet and from any other systems that are connected to the internet. ES&S customers who had pcAnywhere installed also had modems on their election-management systems so ES&S technicians could dial into the systems and use the software to troubleshoot, thereby creating a potential port of entry for hackers as well.

[...] In 2006, the same period when ES&S says it was still installing pcAnywhere on election systems, hackers stole the source code for the pcAnyhere software, though the public didn’t learn of this until years later in 2012 when a hacker posted some of the source code online, forcing Symantec, the distributor of pcAnywhere, to admit that it had been stolen years earlier. Source code is invaluable to hackers because it allows them to examine the code to find security flaws they can exploit. When Symantec admitted to the theft in 2012, it took the unprecedented step of warning users to disable or uninstall the software until it could make sure that any security flaws in the software had been patched.

Around this same time, security researchers discovered a critical vulnerability in pcAnywhere that would allow an attacker to seize control of a system that had the software installed on it, without needing to authenticate themselves to the system with a password. And other researchers with the security firm Rapid7 scanned the internet for any computers that were online and had pcAnywhere installed on them and found nearly 150,000 were configured in a way that would allow direct access to them.

Source: Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States

[20180718_130441 UTC; Updated to add: description of election management systems, stolen source code, and report of a critical vulnerability.]


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Thursday July 19 2018, @01:05PM

    by Anonymous Coward on Thursday July 19 2018, @01:05PM (#709353)

    No kidding. The Detroit Free Press [freep.com] explains how things are supposed to go:

    A paper ballot is given to each voter. Voters feed their completed ballot into an opti-scan machine when they're finished. At the end of the night, workers count the number of ballots handed out during the day and compare that number to the number on the machines. If the numbers don't match, the operation is shut down until the discrepancy is resolved.

    Greg Palast [gregpalast.com] tells how it actually went:

    Susan, a systems analyst who took part in the hand recount initiated by Jill Stein, told me, "I saw a lot of red ink. I saw a lot of checkmarks. We saw a lot of ballots that weren't originally counted, because those don't scan into the machine." [...] An astonishing 87 machines broke down in Detroit, responsible for counting tens of thousands of ballots. Many more were simply faulty and uncalibrated. [...] I met with [a voter] who, on Election Day, joined a crowd waiting over two hours for the busted machine to be fixed. [...] Detroit is bankrupt, so every expenditure must be approved by [state officials... The city clerk said] "No money was appropriated by the state."