A Hackathon Reveals Most Any Hacker Can Break Into Election Equipment

DEFCON hackers find it’s really easy to hack U.S. voting machines.

From July 27-30, 25,000 hackers — yes, you read that right — convened in Las Vegas for the DEFCON hacking conference. One of the topics under discussion was the security of U.S. voting systems, especially apt in light of ongoing investigations into possible Russian hacking of the American electoral system during the 2016 presidential election. At the conference, there was a gathering of voting hardware called “Voting Village” for hackers to check out and hack into, if they could. In September, DEFCON published the startling results of the Voting Village experiment at VerfiedVoting.org: Every single piece of voting hardware was successfully breached. The report was co-authored by DEFCON’s founder Jeff Moss.


Douglas E. Lute, former U.S. ambassador to NATO, and retired Lieutenant General of the U.S. Army wrote the preface to DEFCON’s report, explaining why he’s getting involved in electoral security:

The answer is simple: last year’s attack on America’s voting process is as serious a threat to our democracy as any I have ever seen in the last 40+ years — potentially more serious than any physical attack on our Nation. Loss of life and damage to property are tragic, but we are resilient and can recover. Losing confidence in the security of our voting process — the fundamental link between the American people and our government – could be much more damaging. In short, this is a serious national security issue that strikes at the core of our democracy. 

In fact, what happened at Voting Village was even worse that it seems, since the hackers didn’t even possess the resources and tools a real-world hacker might have, such as “source code, operational data or other proprietary information,” according to the report. And it didn’t require any special skill, either; hackers of all levels broke in just fine.

Most of the equipment was purchased on eBay, though DEFCON has a special allowance that allows it to buy machines for research. Most current voting machines are made by just four manufacturers. All in all, there were 25 machines in Voting Village, including these:

  • AVS WinVote DRE (software version 1.5.4 / hardware version N/A) 
  • Premier AccuVote TSx DRE (TS unit, model number AV - TSx, firmware 4.7.8) 
  • ES&S iVotronic DRE (ES&S Code IV 1.24.15.a, hardware revision 1.1)
  • PEB version 1.7c - PEB - S 
  • Sequoia AVC Edge DRE (version 5.0.24) 
  • Diebold Express Poll 5000 electronic pollbook (version 2.1.1)
  • The DEFCON report reveals how stunningly weak the U.S. voting system is, with bold text added for emphasis:

    The first voting machine to fall — an AVS WinVote model — was hacked and taken control of remotely in a matter of minutes, using a vulnerability from 2003, meaning that for the entire time this machine was used from 2003-2014 it could be completely controlled remotely, allowing changing votes, observing who voters voted for, and shutting down the system or otherwise incapacitating it.

    That same machine was found to have an unchangeable, universal default passwordfound with a simple Google search — of “admin” and “abcde.

    Virginia has decertified the AVS Winvote. (VERFIEDVOTING) 

    An “electronic poll book”, the Diebold ExpressPoll 5000, used to check in voters at the polls, was found to have been improperly decommissioned with live voter file data still on the system; this data should have been securely removed from the device before reselling or recycling it. The unencrypted file contained the personal information — including home residential addresses, which are very sensitive pieces of information for certain segments of society including judges, law enforcement officers, and domestic violence victims — for 654,517 voters from Shelby County, Tennessee, circa 2008.

    As important as the integrity of our election system is, the truth is it’s a patchwork of rules and systems individually acquired and operated by each state in accordance with the first clause in Article 1, Section 4 of the U.S. Constitution.

    Local politicians have been able to, for example, maintain their hold on power by preventing their opponents’ constituency from voting. This has been done through literacy tests at the polling place, as well with the distribution of misleading information that’s prevented voters from successfully casting ballots. Today, photo IDs are required in some states that make voting harder for certain groups — often, the only photo ID available locally is a drivers license — disproportionately affecting students, the poor, and the elderly. And there’s always the question of incompetence that can result in ballots that make no sense to local voters or even to election officials during counting. Congress has modified national election laws only a few times to rectify egregious abuses, such as with the passage of the Voting Rights Act in 1965 and the National Voter Registration Act of 1993.

    All of which is to say that each state decides not only how its citizens will vote, but what kind of electoral machinery will be used. Whether or not the state has the requisite expertise or personnel on hand to select the best equipment, operate it, and keep it up-to-date and secure, that’s the way it works. Budgetary considerations at times drive state election officials simply to find and take the best deal available — regardless of potential conflicts of interest or other considerations — or force them to keep machines in service long after they should be de-certified and decommissioned. States don’t have the resources to thoroughly research the source of their machines’ components either, meaning that, as DEFCON notes, “the extensive use of foreign-made computer parts… within the machines opened up a serious set of concerns that are very relevant in other areas of national security and critical infrastructure: the ability of malicious actors to hack our democracy remotely, and well before it could be detected. “

    Election consultant Pam Smith tells Who.What.Why, “The very notion that local election officials would be able to protect themselves, when they are underfunded and under-resourced, is almost laughable.”

    Five states — Delaware, Georgia, Louisiana, New Jersey and South Carolina — have chosen to forgo paper backups of voters’ choices, and nine others are partially paperless. Paper backup is a critical line of defense when dealing with otherwise completely electronic Direct Recording Electronic (DRE) machines, viewed by cybersecurity experts as the most vulnerable systems, not to mention likely to experience occasional operational failures.

    The now-established certainty that Russia compromised our electoral systems in the elections of 2016 — though the full effect of their incursions is not yet known as of this writing — makes it clear that in our interconnected world, electoral security needs to be considered an issue of national security and no longer left to individual states. As Lute writes, “First, Russia has demonstrated successfully that they can use cyber tools against the US election process. This is not an academic theory; it is not hypothetical; it is real. This is a proven, credible threat. Russia is not going away. They will learn lessons from 2016 and try again. Also, others are watching. If Russia can attack our election, so can others: Iran, North Korea, ISIS, or even criminal or extremist groups.” Gen. Michael Hayden has said he suspects Russia’s Vladimir Putin must be pleased: "He wants to bring us down in the eyes of ourselves and of his people.”

    Some state-level politicians will undoubtedly be reluctant to cede control over their election systems; we can expect to hear concerns voiced about “big government” whether in the context of it being an too-powerful controlling force on one hand, or, on the other, being incapable of doing it competently. There are currently state-level efforts under way to address the gaping security holes, and we can, at the very least, encourage these endeavors. 

    But belief in our democracy is something we’re on the verge of losing altogether. Even before the 2016 election, doubt was in the air.



    Since then faith in the honesty of U.S. elections has dropped precipitously.


    Given how unlikely it is that hackers bent on destruction have slacked off, though, the sooner we can secure our systems, the better. It may be something only the Federal government can do. We’ll have to watch closely from here on in.

    How to vaccinate the world’s most vulnerable? Build global partnerships.

    Pfizer's partnerships strengthen their ability to deliver vaccines in developing countries.

    Susan Silbermann, Global President of Pfizer Vaccines, looks on as a health care worker administers a vaccine in Rwanda. Photo: Courtesy of Pfizer.
    • Community healthcare workers face many challenges in their work, including often traveling far distances to see their clients
    • Pfizer is helping to drive the UN's sustainable development goals through partnerships.
    • Pfizer partnered with AMP and the World Health Organization to develop a training program for healthcare workers.
    Keep reading Show less

    Who believes fake news? Study identifies 3 groups of people

    Then again, maybe the study is fake news too.

    ANGELA WEISS/AFP/Getty Images
    Surprising Science
    • Recent research challenged study participants to pick real news headlines from fake ones.
    • The results showed that people prone to delusional thinking, religious fundamentalists, and dogmatists tended to believe all news, regardless of plausibility.
    • What can you do to protect yourself and others from fake news?
    Keep reading Show less

    A new study says alcohol changes how the brain creates memories

    A study on flies may hold the key to future addiction treatments.

    Scott Barbour/Getty Images
    Mind & Brain
    • A new study suggests that drinking alcohol can affect how memories are stored away as good or bad.
    • This may have drastic implications for how addiction is caused and how people recall intoxication.
    • The findings may one day lead to a new form of treatment for those suffering from addiction.
    Keep reading Show less

    4 reasons why Apple, Facebook and other tech stocks are plunging

    The so-called FAANG companies have lost more than $700 billion in market value since October.

    (Photo credit should read BERTRAND GUAY/AFP/Getty Images)
    Politics & Current Affairs
    • The shares of major tech companies were performing exceptionally well earlier this year, but those gains got nearly erased on Monday.
    • Overvaluation, the U.S.-China trade war and recent privacy concerns surrounding tech companies are among the reasons for the drops.
    • Apple and Facebook have been hit the hardest in recent weeks, thanks in part to a few major reports from news outlets.
    Keep reading Show less