Last week, the D.C. Board of Elections and Ethics opened a new Internet-based voting system for a weeklong test period, inviting computer experts from all corners to prod its vulnerabilities in the spirit of “give it your best shot.” Well, the hackers gave it their best shot — and midday Friday, the trial period was suspended, with the board citing “usability issues brought to our attention.”
Here’s one of those issues: After casting a vote, according to test observers, the Web site played “Hail to the Victors” — the University of Michigan fight song.
Stenbjorn said a Michigan professor whom the board has been working with on the project had "unleashed his students" during the test period, and one succeeded in infiltrating the system.
The fight song is a symptom of deeper vulnerabilities, says Jeremy Epstein, a computer scientist working with the Common Cause good-government nonprofit on online voting issues. "In order to do that, they had to be able to change anything they wanted on the Web site," Epstein said.
Because of the hack, Stenbjorn said Monday, a portion of the Internet voting pilot -- which was expected to be rolled out this month -- is being temporarily scrapped.
The program, called "digital vote by mail," is intended to allow military or overseas voters to cast secure absentee ballots without having to worry whether the mail would get them back to elections officials before final counting. Those voters, about 900 of them, still will be able to receive blank ballots via the Internet for the Nov. 2 general election, but they will not be allowed to submit their completed ballots via the DVM system, Stenbjorn says. Instead, they'll have to put them in the mail or send them unsecured via e-mail or fax.
Stenbjorn says he hopes that the Web-voting system's security vulnerabilities will be addressed in time for a D.C. Council special election expected next spring. The board has spent about $300,000 in federal grant money on the project.
A D.C. Council hearing on elections issues, which will include the Internet voting test, is set for Friday.
This blog is intended to [ARCHIVE] for all eternity. To also be used to report and reintroduce the idea of keeping the record available to as many people as possible. Comments that were "of the time".
October 6, 2010
Iran Say it Has Captured “Western Spies” Involved in Nuclear Cyberattack
Late last month it was revealed that Iran’s first nuclear plant underwent a shocking and sophisticated cyberattack which was designed to break its fuel enrichment centrifuges. The Stuxnet worm reportedly succeeded in temporarily hindering plant operations, infecting hundreds of plant computers. However, the worm turned out to be overly virulent, spreading to thousands of other plant computers worldwide and drawing attention. Israel is suspected of the attack, according to a senior source quoted in a report by The New York Times.
Now Iran’s intelligence minister, Heydar Moslehi, who accused western “spy services” of the attack, has claimed on Iranian state television and the Mehr news service that his forces had captured “several spies”.
He accused western nations (presumably the U.S. and Europe) of engaging in “destructive activities of the arrogance in cyberspace”.
Now Iran’s intelligence minister, Heydar Moslehi, who accused western “spy services” of the attack, has claimed on Iranian state television and the Mehr news service that his forces had captured “several spies”.
He accused western nations (presumably the U.S. and Europe) of engaging in “destructive activities of the arrogance in cyberspace”.
Subscribe to:
Posts (Atom)