I Prayed have prayed

I may have the keys to open voting machines used in states across the country, and that is not a good thing.

I am not an election official. I am not a voting machine expert, operator, or otherwise affiliated with any federal, state or local government agency.

I am simply an investigative journalist who, upon learning that the types of keys used for these machines are apparently widely available for purchase on the Internet, was prudent enough to ask to take a few keys home as souvenirs from my recent trip to the DEF CON 27 Hacking Conference in Las Vegas.

JOIN US IN PRAYING FOR FAIR AND HONEST ELECTIONS. DOWNLOAD OUR PRAYER GUIDE AND BEGIN PRAYING AS THESE ISSUES ARE BEING WORKED ON!

Now, I have access to machines that have been used or are currently in-use in 35 different states. Swing-states, coastal icons and the heartland, experts say. The coolest and probably most disturbing SWAG ever, hands-down.

“These are the keys to the kingdom,” explains Harri Hursti, a hacker and data security expert with Nordic Innovation Labs. Hursti, who helped organize the DEF CON “Voting Village,” was speaking both literally and metaphorically, since some of these keys actually open the memory card enclosure on certain machines.

The problem, Hursti says, is that many of the locks used for these machines work with basic keys that can be easily replaced over time, or in the event they are lost. Some of the keys are so universal that they not only open voting machines, but also mini-bars and even some elevators.

Ordering what is effectively a skeleton key off of Amazon is not the kind of “hacking” you might think of at a place like DEF CON’s Voting Village, or when brainstorming the possible vulnerabilities of the supposedly secure equipment used in U.S. elections in general. But here we are.

Indeed, the types of keys I was shown at the DEF CON “Voting Village” are available on sites like Amazon, eBay and others, as Hursti suggested.

“This [machine] is used in 18 different states, many different swing-states. You can disrupt the ballot, you can make it say something it’s not supposed to say. And that’s undermining our democracy.”

— Rachel Tobac, CEO SocialProof Security

Sure, I learned about plenty of other digital backdoors and other disturbing vulnerabilities concerning U.S. election equipment at DEF CON. Like the “hidden feature” that Hursti says was only recently discovered in a machine that’s been in use and under the microscope for more than a decade.

“A hidden feature that enables you to reopen the polls silently, and insert more ballots and print the new evidence of the election,” Hursti says. And despite believing that the manufacturers had learned from previously exposed vulnerabilities on that machine over the years, “these [newly discovered] features had been missed” the entire time, Hursti says.

I watched Hursti explain this new discovery to Rep. Eric Swalwell, D-Calif., one of the numerous lawmakers who attended this year’s DEF CON, and whose face seemed to drop upon learning of the new revelation. That’s likely because this particular machine has been in use in his home state of California for years.

That latter machine utilized a commonly available tablet with both forward and rear-facing cameras. A media representative for Election Systems & Software (ES&S), one of the companies behind that particular piece of equipment and others at DEF CON, said “voting machines don’t have cameras. Perhaps you are referencing our previous version of e-pollbook, used to check in and verify voters.”

Those tablets, they said, were only used “in certain states to speed up the voter check-in process,” and that their equipment “does not photograph voters or cast ballots, and there is no way the ballot can be tied to the voter at registration.”

You can decide how reassured you are by those statements if you ever find yourself staring a webcam in the face while checking-in on Election Day.

One voting machine was discovered to have a password of “1111.” Better than the voter ID machine with NO password.

And I watched as yet another voting machine was physically dismantled, memory card and all, with just fingernails and a ballpoint pen. Rachel Tobac, CEO of SocialProof Security, a company that specializes in “social engineering” and security assessments, walked me through that last process in less than 90 seconds. And this was only her second year of hacking voting machines.

In the “kids area” at DEF CON, known as the “r00tz Asylum,” children barely out of middle school had hacked a simulated campaign contributions website to reveal donations from a deep-pocket donor named “spaghetti.” Jokes aside, the power to change the names and amounts of political donations on official state websites is no laughing matter.

There were signs that some of the problems with U.S. election equipment are being addressed, like the significantly larger contingent of lawmakers at this year’s DEF CON, as well as election officials and even congressional staffers from both sides of the aisle. Or the fact that more than a dozen actual voting machines were available for tinkering at this year’s Voting Village, some of them by the manufacturers themselves.

Dominion Voting, another company that produces election equipment, “sent representatives and demo equipment to DEF CON this year in the hopes of finding more ways to work with researchers and white hat hackers,” according to a representative.

One prominent member of the hacking community at DEF CON told Fox that they felt as if the Voting Village’s “scorched earth” approach of dismantling voting machines in a public space may no longer be the best way to encourage a public dialogue with the companies behind the tech. That same person said it’s a very good sign that there were apparently representatives from at least one such company at DEF CON this year, with gear in tow. They also admitted that having election equipment that utilizes master keys sold on the Internet seems like an obvious and easily fixable problem.

There are also technological advancements being researched to try and make the voting system more secure, like a new $10 million machine funded by the DoD, and the concept of combining blockchain technology with paper ballots – a federal elections Frankenstein that is at least three elections away from becoming a possible reality, according to people working on the project.

“This [machine] is used in 18 different states, many different swing-states,” Tobac says. “You can disrupt the ballot, you can make it say something it’s not supposed to say. And that’s undermining our democracy,” she added.

(Excerpted from Fox News, article by Alex Diaz.)

Comments (2) Print

Comments

Leave A Reply

Your email address will not be published.

Melody Frazier Morris
August 27, 2019

Father God,
Deliver us from evil! Have MERCY on our nation! May we have righteous leaders established in our elections; please give us a REVIVAL CHANGING HEARTS OF VOTERS SECURING THE POPULAR VOTE! FATHER, MAY THE ELECTORAL COLLEGE VOTE AS LED BY YOUR HOLY SPIRIT!
And may ROE vs WADE be overturned!!!!
IN THE MIGHTY NAME OF JESUS! Amen!

Rochelle
August 25, 2019

Father God, I pray that You will provide quick and dramatic solutions for honesty and integrity in our elections. I ask this in Jesus’ name who is the Truth. Amen.

Partner with Us

Intercessors for America is the trusted resource for millions of people across the United States committed to praying for our nation. If you have benefited from IFA's resources and community, please consider joining us as a monthly support partner. As a 501(c)3 organization, it's through your support that all this possible.

Dave Kubal
IFA President
Become a Monthly Partner

Share

Click below to share this with others

Log in to Join the Conversation

Log in to your IFA account to start a discussion, comment, pray, and interact with our community.