FAQ: How can our voting systems get hacked when they are locked behind closed doors and disconnected from the internet?
Oregon voting systems can have ports and/or wireless connections, as well as microprocessor chips – all of which can be entry points for malware either before or during tabulation. For example:
- Undetected Malware. Undetected malware can lay in wait like the VW emissions hack malware did, e.g., work perfectly throughout rigorous pre-testing, and then activate momentarily during the actual tabulation, and finally disappear without a trace
- Wireless Connections. There have been systems like ours in Oregon that have been found to have hidden wireless connections. If we were to have this type of capacity secreted in our hardware, it could activate during actual tests.
- Corrupted Microprocessor Chips. Since 2009 we have known computer chips can be corrupted with hidden security holes. Recently it was huge news that there was a scandal about the Intel microprocessor chips’ security flaw.
- Stuxnet-Type Intrusions. “Stuxnet” is the infamous computer worm, first discovered in 2010, that threatened public infrastructure and security systems around the world. This type of intrusion is the perfect example for why not being connected to the Internet is not equivalent to being safe. We now know that anytime you plug something into a computer (even power cables in rare instances) there's a chance it can install software.
There are even more Sci-Fi ways that can occur without a computer connected to the internet. But the point is, let’s just check some ballots after tabulation to VERIFY our elections are accurate, and then we don’t just have to just guess. It is also a deterrent and instills confidence in our vote. All good things.