Watch the Video: DEF CON Hackers Got Into Many Voting Machines and an E-Poll Book

How long will defenders of America’s electronic voting systems ignore the present danger hacking presents to U.S. elections?

After numerous reports that hackers attending last weekend’s DEF CON 25 conference breached a variety of voting machines, defenders of the systems heaped scorn on the news, saying the one machine that was breached had been taken out of use more than a year ago. They also said the machines had to be taken apart to access key components, suggesting that was an unlikely scenario.

"What is with @thehill clickbait? This story about WinVote machines -- used in few VA counties & decertified in 2015,” tweeted Michael McDonald, a University of Florida political scientist who is among the nation’s most-quoted experts on voter turnout trends. 

They are wrong to think the hacking stopped there. The WINvote, which has been decertified, was hacked within minutes of the doors opening. But over the course of the next three days, hackers penetrated or found major security flaws in every machine present. Many of those machines are in use in multiple states, including swing states like Wisconsin and Florida.DEF CON hackers said they took complete control of an e-poll book, a type of election equipment in use in dozens of states where voters arrive at precincts, sign in and receive their ballots. That is exactly the type of equipment that was likely breached in at least one state in 2016.

They also found major security flaws in the Sequoia AVC Edge, in use in 13 states and the AccuVote TSX, in use in 19 states. A different version of the AccuVote was used recently in Georgia's $50 million congressional election.

Hackers then went to work on the iVotronic, currently in use in 18 states. With one button they were able to bypass the first security screen and gain access to the admin screen. They found the password through Google. The password turns out to be svcsvc. Now in control of the admin screen and the password, it is likely they could go further in the near future.

Although data on some machines was accessed by taking the machine apart, it is important to remember that many individuals and salespeople working with vendors likely have access to these machines in similar conditions. Machines also are stored overnight in people's homes. Hackers found unencrypted code in plain text that they said would be a piece of cake to modify.

Machine usage according to Verified Voting.

#story_page_ below_article

Understand the importance of honest news ?

So do we.

The past year has been the most arduous of our lives. The Covid-19 pandemic continues to be catastrophic not only to our health - mental and physical - but also to the stability of millions of people. For all of us independent news organizations, it’s no exception.

We’ve covered everything thrown at us this past year and will continue to do so with your support. We’ve always understood the importance of calling out corruption, regardless of political affiliation.

We need your support in this difficult time. Every reader contribution, no matter the amount, makes a difference in allowing our newsroom to bring you the stories that matter, at a time when being informed is more important than ever. Invest with us.

Make a one-time contribution to Alternet All Access, or click here to become a subscriber. Thank you.

Click to donate by check.

DonateDonate by credit card
Donate by Paypal

Don't Sit on the Sidelines of History. Join Alternet All Access and Go Ad-Free. Support Honest Journalism.