![]() |
![]() IDG Network: Login Register ![]() |
![]() |
![]() |
||
![]() |
![]() |
![]() |
|||||||||||||||||||||||
![]() |
![]() |
![]() |
|
![]() |
|||||||||||||||||||
![]() |
![]() |
![]() |
![]() |
|
|||||||||||||||
![]() |
![]() |
|||||||||||||||
![]() |
![]()
|
![]() |
||||||||||||||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||||||||||||||||
![]() ![]() |
![]() Can you hack the vote? A $10,000 challenge is at stake
![]() News Story by Tom Spring ![]() AUGUST 06, 2004 It's an organized assault, too. E-voting technology expert Rebecca Mercuri, a Harvard research fellow who has been outspoken in her opposition to such systems, has issued a "Hack the Vote" challenge, trying to illustrate what she calls the systems' unreliability and vulnerability. She unveiled the so-called Mercuri Challenge at the recent Black Hat Briefings and Defcon 12 security conferences. Mercuri suggested that electronic voting machines be hacked during their pre-election testing so officials will abandon them before an actual election. "People in the election community say this technology is bulletproof," Mercuri says. "It's not." She especially opposes use of electronic voting technology in its current state, which doesn't allow for a verifiable backup. "I'm not asking anyone to break any laws. We just want the opportunity to hack e-voting systems to prove that it can or cannot be done," she says. Mercuri says the likeliest e-voting fraud would involve unauthorized remote access to voting machines, when a hacker manipulates results; or backdoor access to voting systems by workers with approved access but their own agenda. She described her concerns at a Defcon keynote address, "Hack the Vote." As part of her challenge, Mercuri is calling on e-voting system vendors VoteHere Inc. and Advanced Voting Solutions to provide any challengers with "full specifications" of their voting systems for review. The first person to change vote tallies without being detected can claim $10,000 from a separate challenge. The $10,000 is being offered by noted e-voting proponent and Carnegie Mellon University computer scientist Michael Shamos. His $10,000 bet, the Direct-Recording Electronic Hacking Challenge, contends that no one can hack into a DRE voting machine undetected. "It is impossible to tamper with e-voting systems without
being detected," he said in a telephone interview countering Mercuri's
claims. Shamos says no one has ever taken him up on the challenge
because, as he puts it, "the fundamental system is unhackable." continued>> |
![]() |
|||||||||||||||||||||||
![]() |
![]() |
![]() |
|||||||||||||||||||||
![]() |
|||||||||||||||||||||||
![]() |
![]() Sponsored Links Mobilize Your Enterprise For Success New Webcast ![]() Free Guide How to web-enable BPM apps in just weeks, not months ![]() Forrester Webcast Addressing Web App Delivery Challenges ![]() HP workstations at PC prices Xtreme machines for Xtreme users. Click here or Call 1-888-367-2402 ![]() Answers to real IT questions. Remedy. Ask a question today. ![]() Remedy. More than just Help Desk, Asset Management, Change Management, and SLA. Remedy. More. Get More from a Free Whitepaper. ![]() Improve IT Efficiency. Windows Server System makes it possible. ![]() The IP migration A wake-up call ![]() Securing Your Website for Business Looking for mission-critical server security? ![]() Click for cost-effective Intel® enterprise solutions ![]() Looking for service desk software that can save you money? ![]() EnvoyWorldWide White Paper: 'Shattering the Myths of Automated Notifications' ![]() Enterprise Grid Alliance Helping make grid computing work for you ![]() Scalable. Affordable. Reliable. IBM eServer xSeries systems with Intel® XEON™ processors. ![]() Dell has everything you need to Build a Scalable Enterprise Now. ![]() Click here to share your thoughts on I.T. Chance to win a $50 cash ![]() HP workstations: the power to propel innovation. ![]() HP Workstation Solutions for Financial Experts. Learn more. ![]() HP digital projectors. Superior digital imaging technology. Buy now. ![]() Enterprise Security Center: Exclusive collection of information for securing your business. ![]() Retailers see opportunity in new technology investments Tune in to this new webcast to hear what’s in store for 2004 ![]() ![]() |
![]() |
|||||||||||||||||||||
![]() |
|||||||||||||||||||||||
![]() |
![]() |
||||||||||||||||||||||
![]() |
|||||||||||||||||||||||
![]() Copyright © 2004 Computerworld Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of Computerworld Inc. is prohibited. Computerworld and Computerworld.com and the respective logos are trademarks of International Data Group Inc. ![]() |
![]() |
||