Watch: What PBS Found Before the Election is Troubling

5577
Watch: What PBS Found Before the Election is Troubling
Image Screenshot From PBS NewsHour YouTube Video Below.



Before the election, PBS Newshour did a piece on the Dominion voting systems in Georgia. What they found then was troubling to several experts.

A white-hat hacker exploits computer systems or networks to identify security flaws and make improvement recommendations. PBS Newshour had one named Harri Hursti, who inspected the system and found that “they have set up a complicated system which is centralized; it doesn’t seem to have any safeguards.”

Hursti described the system by saying: “it’s an assortment of laptops, iPads, magnetic cards, touch screens, printers, and scanners.” What he meant was that it has a lot of moving parts.

PBS said that the devices replaced touchscreens in 2019, which didn’t create a paper ballot. However, one of the women responsible for bringing about the change isn’t entirely happy with the new system either.

Election experts have also found several troubling problems with the system, especially with the QR codes that it creates for tabulation.



Alex Halderman looked closely at the Q.R. codes, where the votes are encoded for the scanner. “By analyzing the structure of the Q.R. codes, I have been able to learn that there’s nothing that stops an attacker from just duplicating one, and the duplicate would count the same as the original barcode.”

And in late September, another concern came to light. During testing, election workers found half the names of the 21 candidates for the Senate intermittently disappeared from screens during the review phase. Dominion sent out a last-minute software patch.

Halderman warned, “I’m worried that the Georgia system is the technical equivalent to the 737 MAX. They have just made a last-minute software change that might well have unintended consequences and cause even more severe problems on Election Day.”

Hirsti, the white-hat hacker, expressed his concern that the system was being rushed to put in place without the proper testing that it needs.



“You never want to rush something mission-critical, and this is mission-critical, into production without proper time for testing,” he said.

“That’s really one of the ways bad actors are finding the vulnerabilities to exploit is looking for honest vulnerabilities and finding out if they can be weaponized, if they can be exploited,” Hirsti explained.

Watch the whole piece below.