Jump to content

Hursti Hack

From Wikipedia, the free encyclopedia
(Redirected from Susan Bernecker)

The Hursti Hack was a successful attempt to alter the votes recorded on a Diebold optical scan voting machine. The hack is named after Harri Hursti.

Participants

[edit]

The participants were:

Hacking a Diebold machine

[edit]
Actual paper tape from initial hack

In a series of four tests conducted in Feb., May, and Dec. 2005, Ion Sancho invited Black Box Voting to Tallahassee after an invitation to check the Diebold machines. Black Box Voting engaged the services of Dr. Herbert Hugh Thompson and Harri Hursti.[1] Dr. Thompson and Hursti believed they could change or hack vote totals without the system detecting entry. The first two projects targeted the computer program that adds up all the voting machine results and produces the final report. On Feb. 14 and again on May 2, Thompson successfully hacked the Diebold GEMS central tabulator and bypassed all passwords by using a Visual Basic script. This, however, would be detected in a vigilant environment if the supervisor of elections checks the poll tapes (voting machine results) against the central tabulator report.

For purposes of demonstration, an election was run using Leon High School as a model. The results of the first hack are shown below.

Leon High School (pre-hack)
Candidate Votes Percentage

Bud Baker 623 54.79%
Thomas Guthrie 192 16.89%
Nadiyah Smith 322 28.32%
Leon High School (post-hack)
Candidate Votes Percentage

Bud Baker 623 10.71%
Thomas Guthrie 192 3.30%
Nadiyah Smith 5000 85.98%

To show that both the results tapes and the central tabulator could be hacked, Black Box Voting then engaged the services of Hursti to hack the poll tapes. Black Box Voting purchased a card reader from the internet and Hursti used it to produce counterfeit memory cards, which successfully altered the voting machine results tapes on May 26, 2005.[2]

One-Step hack

[edit]

A fourth trip to Tallahassee was made on Dec. 13, 2005. Black Box Voting and the producers of the film Hacking Democracy organized the test. Attending were Harris and Kathleen Wynne from Black Box Voting, Hursti, Thompson, along with Susan Pynchon of Florida Fair Elections Coalition from Volusia County, Florida, and Susan Bernecker, a former candidate for New Orleans city council who videotaped Sequoia-brand touch-screen voting machines in her district recording vote after vote for the wrong candidate.[3] During his research, Hursti found that Diebold's cards allowed negative votes. Hursti successfully altered the votes using only a memory card, producing a one-step hack that simultaneously altered both the central tabulator results and the voting machine results tapes for matched (but rigged) results. "I would have had no way of knowing," said Sancho. "I would have certified this election."

Three voting machines hacking tests have been performed by Finnish computer expert Harri Hursti for the nonprofit elections watchdog group Black Box Voting[4] and the producers of Hacking Democracy[5] who filmed it. The first two Hursti Hacks were set up in Leon County, Florida with the authorization of Supervisor of Elections Ion Sancho and these tests examined a Diebold Election Systems (DES) Accu-Vote OS 1.94w (optical scan) voting machine. The third Hursti test was conducted for Black Box Voting in collaboration with Bruce Funk, then-County Clerk of Emery County, Utah, on a Diebold TSx touch-screen.

Hursti Memory Card Hacks

[edit]

The tests by Hursti were the third (May 26, 2005) and fourth (Dec. 13, 2005) in a series of five voting machine examinations produced by the Black Box Voting group. The first four tests were authorized by Supervisor of Elections for Leon County, Ion Sancho to ascertain whether votes could be altered on a Diebold voting machine. Tests on Feb. 14, 2005 and May 2, 2005 were conducted on the Diebold GEMS central tabulator by Herbert Hugh Thompson, who proved that results reports could be altered without a password by using a Visual Basic script. The third and fourth tests were memory card tests performed by Hursti. The fifth test took place with both Hursti and Thompson in Emery County Utah.

During Hursti's first memory card hack on May 26, 2005, he altered the program that creates the "poll tapes", or voting machine results reports. However, this hack would be detected if the supervisor of elections compared the poll tape results with the GEMS central tally report. The GEMS tally report can be hacked to match, as demonstrated during two earlier Black Box Voting projects in Leon County with Herbert Thompson. Thompson successfully manipulated the GEMS tally program using a Visual Basic script.

The May 26 version of the Hursti memory card hack would require two steps to succeed without detection in a vigilant election setting: Both the memory card and the GEMS tabulator program would need to have matching hacks.[6]

During a videotaped meeting in Cuyahoga County, Ohio, DES Research and Development chief Pat Green stated that checks and balances would detect the tampering and that it would not be possible to alter the votes themselves on the memory card.

However, during the Dec. 13 2005 testing, Hursti successfully altered the votes on the memory card. His memory card manipulations falsified both the voting machine results tapes and the GEMS central tabulator report. Leon County Supervisor of Elections Ion Sancho stated that he would have had no way to detect the tampering and would have certified the election.

The Hursti memory card hack performed in Leon County on Dec. 13, 2005 is a variation on stuffing the ballot box prior to any votes being cast. Hursti had pre-loaded the memory card giving one candidate 5 positive votes and one candidate 5 negative votes to create a "zero report." This keeps the machine accurate in votes cast compared to number of voters.

"What we are going to do here is modify one card and then bring it to the election provider's Ion Sancho's office, log it has the real card...if in any election as to the real election system and run ballots through and that's the same system which have been used in a number of previous elections...and we'll see that what is the power in the ballot box, this should be an empty box containing the votes but it has more capabilities than that."

— Harri Hursti, Tuesday, December 13, 2005.[7]

Actual paper ballots were used pre-printed with the following question: "Can the votes on this Diebold system be hacked using the memory card?"

The test election

[edit]
Ballots Cast By Participants
Participant Yes or No

Bev Harris No
Thomas James No
Ion Sancho No
Susan Bernecker No
Susan Pynchon No
Kathleen Wynn No
Hugh Thompson Yes
Harri Hursti Yes
TOTAL: 6 NO 2 YES
Actual Results By Diebold Machine
YES NO
7 1

Since Hursti was the technical advisor he was asked by Sancho to remain outside of the test area. Selection of the voting machine was done by random draw. Machine #15191 was pulled as the random machine.[8] Hursti only touched the memory card but did not come into contact with any machines.

Seven participants made out their ballots using the opti-scan paper sheets (Hursti remaining outside the test area). Sancho then went to Hursti and gave him a ballot which Hursti filled out. Hursti then gave Sancho the memory card to insert into the machine. The operation of the machine was explained by Sancho to those in attendance and the card inserted and machine turned on which then produced the "zero total tape." The tape produced zero votes cast. The test ballots were then inserted into the Diebold machine followed by the "ender card" (same size as ballot) was inserted telling the machine to turn off its counting function and start its reporting function. The machine then produced a paper tape with 7 yes votes and 1 no vote.

Results

[edit]

This test demonstrated that Diebold Election Systems made misrepresentations to Secretaries of State across the nation when the company claimed votes could not be changed on the memory card, the credit card-sized ballot box used by computerized voting machines. More seriously Diebold Election Systems claimed in writing to state election officials that the Diebold memory cards did not contain any executable code. In fact the memory cards did contain executable code - likened to 'a living thing' inside the cards - and it was this executable code that hacking expert, Harri Hursti, used to defraud the Diebold voting system.

Furthermore, DES wrote a press release referring to the famous vote changing 'Hursti Hack', stating that - "Harri Hursti is shown attacking a DES machine in Florida. But his attack proved later to be a complete sham." In response to the test election, California's Secretary of State commissioned a special report by scientists at UC Berkeley to investigate the 'Hursti Hack'.

The UC Berkeley scientists wrote a Special Report On The Diebold Accuvote Voting Machine. Page 2 of their report states:

"Harri Hursti's attack does work: Mr. Hursti's attack on the AV-OS is definitely real. He was indeed able to change the election results by doing nothing more than modifying the contents of a memory card. He needed no passwords, no cryptographic keys, and no access to any other part of the voting system, including the GEMS election management server."[9]

A spokesman for DES said it was similar to "leaving your car unlocked, with the windows down and keys left in the ignition and then acting surprised when your car is stolen."[10]

The test election was filmed and shown in the conclusion of the Emmy nominated HBO documentary, Hacking Democracy, which premiered November 2, 2006."[11][12][13]

Examination of the DES TSx touch-screens in Utah

[edit]

In 2006, Black Box Voting was invited by Emery County, Utah County Clerk Bruce Funk to examine the DES TSx touch-screen. Black Box Voting arranged for the services of Hursti and Black Box board member Jim March, who traveled to Utah March 1 and 2, 2006. Hursti discovered numerous security flaws, the most egregious being the ability to reload the entire operating system and the ability to replace the boot loader simply by inserting a memory card with a specific program name.[14] Hursti discovered that the system would accept macros in a manner that posed a risk to election security. Jim March opened the case of the TSx and photographed its interior, discovering a hidden SD wireless slot and piggyback connectors under the standard modem, both enabling the machine to be equipped for wireless communications without the knowledge of election directors.[15]

After seeing how serious the problems were, Black Box Voting engaged the services of Herbert Thompson, then head of the security company Security Innovation, to provide an independent opinion. Both Hursti and Thompson conducted a second series of tests on March 16 and 17, 2006 to confirm findings, which prompted emergency warnings and last minute corrective actions in Pennsylvania, California, and other states.[16]

References

[edit]
  1. ^ Goldfarb, Zachary (January 22, 2006), "As Elections Near, Officials Challenge Balloting Security", Washington Post
  2. ^ Black Box Voting Report: Critical Security Issues with Diebold Optical Scan Design, Harri Hursti, July 4 2005
  3. ^ Florida Fair Elections
  4. ^ Black Box Voting site Archived 2007-07-16 at the Wayback Machine
  5. ^ hackingdemocracy.com website
  6. ^ Black Box Voting "Hursti I" Report: Critical Security Problem with Diebold Optical Scan
  7. ^ Transcribed from "Hacking Democracy" DVD
  8. ^ Transcribed from "Hacking Democracy" DVD
  9. ^ Special Security Analysis Report Archived 2016-12-02 at the Wayback Machine
  10. ^ Washington Post, March 25, 2006
  11. ^ "Hacking Democracy," HBO documentary. Retrieved October 16, 2006
  12. ^ HBO Documentary Films. retrieved Nov. 6, 2006
  13. ^ Archived at Ghostarchive and the Wayback Machine: Hacking Democracy - The Hack. YouTube.
  14. ^ Unredacted Black Box Voting Hursti report on TSx
  15. ^ Unredacted supplement to Black Box Voting TSx report
  16. ^ Technology Daily: States Still Concerned About New Voting Equipment; May 30, 2006