\"Writing.Com
*Magnify*
    December    
SMTWTFS
2
3
4
5
6
8
9
10
11
12
13
14
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Archive RSS
SPONSORED LINKS
Printed from https://writing.com/main/books/action/view/entry_id/939497
Image Protector
\"Reading Printer Friendly Page Tell A Friend
(143)
by Jeff Author IconMail Icon
Rated: 18+ · Book · Biographical · #1399999
My primary Writing.com blog.
#939497 added August 10, 2018 at 6:54pm
Restrictions: None
This Just In - August 10



I'm fascinated by the concept of "white hat" hackers. While black hats seek to hack for personal gain (stealing credit card information to buy things, stealing personal information to sell, etc.), white hats are "ethical hackers" who seek to use their skills to positive ends (working with a company or agency to point out vulnerabilities in their security, etc.). I've read a couple books by Kevin Mitnick over the years (if your interested in hacking and haven't read Ghost in the Wires yet, I highly recommend it), and think it's really interesting to see these savvy techno-wizards using their skills to help make things better rather than tearing them down or gaining personally. A lot of white hats happen to be former black hats who through altruism or a plea agreement, have decided to work for the other side.

I didn't even realize DefCon was a thing, but I'm glad they have white hats working on figuring out potential vulnerabilities in our electronic voting systems. It's kind of a double-edged sword, though, because while you may learn about vulnerabilities that need to be fixed, you also realize how easy your security was to beat in the first place and can sometimes make a target out of you by those looking to flex their muscles and show off. Remember Todd Davis, the LifeLock CEO guy? After he participated in an ad campaign where he posted his real Social Security Number for the world to see and claiming their service's identity theft protections were unbeatable... well, he had his identity stolen 13 times over the following year, mostly from hackers who just wanted to prove they could beat an unbeatable system. *Think* Never underestimate people's ability to rise to a challenge!

What's a little worrisome in this article are the ways in which the white hats were able to exploit voting systems. Especially the Danish researcher referenced in this article who just last year was able to take control of a touchscreen voting machine remotely from up to 1,000 feet away. *Shock2* I know that the whole paper ballot hanging chad thing was a big deal in the 2000 presidential election, but the idea of debating how thoroughly punched or marked a piece of paper is seems almost quaint compared to the idea that you could literally steal someone's vote by remotely operating their voting machine from a laptop in your car across the street. *Worry*

It'll be interesting to see what happens with the voting machines in the 2018 midterm elections coming up in just a few short months. I don't know if they're going to have all this hacked voting machine stuff sorted out by then... but I do know that if they don't, I'm probably going to request a paper ballot. Our district has been singled out for being one of the swing districts where our incumbent Republican congressman has a fair shot at being ousted by his Democratic challenger, so this election is far too important to trust to a machine if it has a known security vulnerability that could be exploited.

© Copyright 2018 Jeff (UN: jeff at Writing.Com). All rights reserved.
Jeff has granted Writing.Com, its affiliates and its syndicates non-exclusive rights to display this work.
Printed from https://writing.com/main/books/action/view/entry_id/939497