Discussion: File-Sharing Software On State Election Servers Could Expose Them To Intruders

A feature, not a bug.

The FTP server in Wisconsin required a password. Kentucky’s didn’t.

Bradford Queen, a spokesman for Kentucky’s secretary of state, declined to say if running an FTP server was problematic.

This is actually how a lot of “hacking” gets accomplished. To stupidity and beyond!

6 Likes

Since the article didn’t mention, FTP stands for File Transfer Protocol. And any operating system or sysadmin worth its salt has this service disabled by default.

9 Likes

I swear that they told us that our evoting machines are never on the internet and can’t be accessed. I hope that’s true.

4 Likes

This is up or downstream of the voting machines. So, potentially a bigger problem.

computer servers that powered Kentucky’s online voter registration and Wisconsin’s reporting of election results

6 Likes

It’s not just that the files can be accessed (which is after all what FTP is for). If they’re using FTP outgoing, it’s possible/plausible that they’re using it incoming, which would mean that an attacker could (re)place files on the serve. If the FTP server is not fully up to date, it could also have vulnerabilities that would let an attacker gain control of that machine and potentially other machines on the state’s internal networks. There’s no transparency about any of this, so it’s tempting to assume the worst.

8 Likes

Yeah I got that it was servers. I just guess I’m not tech savvy enough to know how that impacts a closed voting system.

I think I get it now. Thanks.

1 Like

As someone pointed out in 2016…

Electronic voting machines are not ‘connected’ to the internet - they are ‘loaded’ with the ballot by the various entities in charge of the machines. This ballot is prepared by local entities - because while it may be a ‘national’ election - local entities need to add local elections and ballot measures.

So somewhere in a local office - a person is preparing the ballot to be loaded onto the machine.

They use a computer to do that.

THAT computer IS ‘connected to the internet’.

SO it’s possible to penetrate the local election office computers that prepare the ballot - and initiate a virus.

THAT virus - travels to the voting machine - via the thumbdrive or however the slate is loaded onto the machine.

So yeah - take heart - eVoting machines are ‘not’ connected to the internet.

This is what keeps me awake at night.

7 Likes

That’s all possible. but it would be far more effective to hack the statewide results rather than hundreds of county election boards. That why this is so dangerous, it makes election fraud much much easier than it was previously.

7 Likes

Thanks for that - sorta. hahahaha

1 Like

A huge problem. If you wanted to suppress the votes of, say, a predominantly minority district, you hack your way into the server that maintains those voter registration data, change a few flags, and bob’s your uncle, 20 - 40% of those registered voters are suddenly unregistered.

6 Likes

Pros and Cons to both approaches. (I mean that in the worst possible way)

An attack directly on a statewide results is easier - yes - only one target.

But an attack on the software IN the machine would be harder to find. A single line of code could be written to change ‘every fifth vote’ for this candidate - to that candidate for instance. Hell it could even stop doing it after a certain time.

Recall that the machines from the 2018 election were NEVER forensically examined. They never opened the machines to check to see if the code had been altered. They were only ‘cursorily’ inspected. “A vote for X shows up as X - okay, it’s working”

There’s a reason why there was never a deep dive into the code after the elections. “There is no evidence results were changed.” - Well, no there is no evidence. You don’t get evidence if you don’t look for it. And to be fair ‘evidence of tally being changed’ - is a bit of a misnomer.

We see reports now of votes being ‘flipped’ by machines in Texas. And the state is doing… what, about it?

Lest we forget.

1

7 Likes

True. And while it’s a problem, the irony is that because we have a bunch of state elections, not a real national one, the way to “hack” a national election is to hack the media. Which is precisely what the Russians came up with.

5 Likes

“FTP is a 40-year-old protocol that is insecure and not being retired quickly enough,” said Joseph Lorenzo Hall, the chief technologist at the Center for Democracy and Technology in Washington, D.C., and an advocate for better voting security.

Today’s geek trivia: The File Transfer Protocol (FTP) is actually even older than Mr. Hall thinks. It is literally one of the oldest protocols on the Internet, first documented in 1971.

No, that’s not a typo.

Nineteen seventy one. Nixon’s first term. It was one of the first major protocols defined on the ARPAnet, so FTP predates the Internet as we know it.

And yeah, it is quite insecure by today’s standards.

10 Likes

Hacking social media is one way - some would say the easiest. It’s the one that seems most apparent - at this time.

But the fact that they DID breach local/state election offices ‘without apparently changing voter roles’ - means they were moving on more than one front. Like any self respecting intelligence agency would do.

6 Likes

Quite insecure? I think any protocol that:

a) Typically has anonymous access enabled by default
b) Sends username and password in plain text

Is as insecure as can be imagined.

2 Likes

When I saw “FTP” my first thought was “Welcome to 1996.” I wonder if they have GOPHER enabled on their network.

6 Likes

I remember it from when I was a freshman in college, and we were literally using punch cards to program in FORTRAN.

ETA: At least in some cases, “security” was the necessity of calling the computer operators on the other end to have them manually set up the connection to your machine.

2 Likes

Thank you!

2 Likes