NC’s Voting System ‘Master Passwords’ Found Online, Available to Download by Anyone: ‘BradCast’ 6/10/2019

Share article:

On today’s BradCast, we’ve got an exclusive interview with CHRIS VICKERY, Director of Cyber Risk Research at the cyber security firm UpGuard. Vickery revealed late last week on Twitter that he discovered files, including administrative master passwords for voting systems, at the North Carolina State Board of Elections website that were left vulnerable and available online for anyone to download, prior to the 2018 election. Today he explains the evidence that suggests these files may have been available as early as February of 2016, months before that year’s controversial Presidential election. [Audio link to full show is posted at bottom of article.]

The files were found by Vickery unencrypted and with no password needed to retrieve them from the site. He tells me today that there were so many files and screenshots (see a redacted snippet from one of the password screenshots in the graphic above), that he’s not even sure if they number in the hundreds or thousands.

The longtime cyber security researcher says he promptly notified state officials of the discovery last year, before the 2018 elections, and that the state, shortly thereafter, set the files in question and their directories to “private”. In response to a commenter on his short Twitter thread revealing the potential security breech late last Friday, however, he notes that “someone would have had to actively choose to make the file repository available to the entire world. It is not unprotected by default.”

He tells me today that he is “very concerned” about the exposure and would “like to know who the data was intended for. If you put it up somewhere, you’re intending it to be accessed by somebody. So who did they aim this for? I would love to know that.” Indeed, he also shared an email with me over the weekend that was posted in the same directory as the passwords screenshot, in which a State Board of Elections official notes: “The attached screen shots should show just about all of the settings you will need for contests and candidates” in the ES&S iVotronic Image Management program, part of the computer voting system which defines where candidates selected by voters are placed on the electronic ballots and optical-scan systems.

Vickery says he decided to go public with the disclosure following the Washington Post exclusive last week reporting that federal investigators at the Dept. of Homeland Security have finally agreed to work with NC on a forensic investigation of the state’s voter registration computers which inexplicably failed during the 2016 Presidential Election, on Election Day, in parts of the state. That announcement via the Post comes on the heels of Robert Mueller’s redacted report [PDF] (see Volume 2, page 50, “Intrusions Targeting the Administration of U.S. Elections”), in which the Special Counsel briefly details how Russian Military Intelligence operatives were able to penetrate the voter registration systems of “at least one” county in Florida. Just over a week ago, the new Republican Governor of Florida announced he was notified by the FBI that, in fact, two counties had, in fact, been penetrated via a spearphishing attack on VR Systems, the private vendor contracted to run those voter registration systems.

VR Systems also supplies similar systems in about half a dozen other U.S. states, one of them being North Carolina. But, as Vickery notes, the password files that he found exposed on the Internet last year were not for registration systems, but for the state’s computer voting machines, scanners and tabulation systems made by private vendor ES&S (the nation’s largest), as used across most of the state of North Carolina. And ALL of this comes after we have been trying to point out on The BradCast for the last two and a half years that nobody — not the FBI, not DHS, not the states themselves, nor even Mueller’s Special Counsel team, as he admits — ever carried out a forensic investigation of the computer voting, registration or tabulation systems in use in any of the states in 2016, despite that election’s surprise ending in which Donald Trump purportedly won by a razor thin margin.

In his first broadcast interview on these new revelations, Vickery explains how he discovered the files, how the state responded when he told them about the vulnerability last year, whether the DHS has contacted him since he revealed his findings on Friday, and how serious of a potential security breech this is, especially given the extraordinary effort that the U.S. Intelligence Community and the Mueller Report claim Russia expended in hopes of interfering in the 2016 Presidential election. “When you have computers, and software, and firmware updating passwords and modems all mixed in together, you have the capability to do a lot of crazy stuff,” he says, in response to my question about whether these passwords could have been used to alter or upload false results. “It’s not out of the realm of possibility, but I have no specific reason to believe that happened. But that is kind of a frightening concept to realize that all of the ingredients are there.”

Disturbingly, Vickery’s report is startlingly similar to one revealed last year by Kim Zetter at Politico in the state of Georgia, regarding a security researcher who found millions of voter registrations along with voting system administrative passwords online and vulnerable to download without a password, prior to the Peach State’s 2016 elections.

Also today: The last many weeks of climate changed-fueled weather disasters move from the Central U.S. to the SouthEast, with a month’s worth of rain falling in one day over this past weekend (yet the DNC still won’t allow a 2020 Presidential candidate debate focused solely on climate change!); Donald Trump pretends that his backing off of a threat to tax Americans who purchase imported goods from Mexico is a great negotiation victory; And we take a few calls on our disturbing interview with Vickery, including from one listener who quips that NC “left the combination of the safe written on top of the door”…

CLICK TO LISTEN OR DOWNLOAD SHOW!…
[audio:http://BradBlog.com/audio/BradCast_BradFriedman_ChrisVickery-NCVotingMachinePasswordsFoundOnline_061019.mp3]

* * *
While we post The BradCast here every day, and you can hear it across all of our great affiliate stations and websites, to automagically get new episodes as soon as they’re available sent right to your computer or personal device, subscribe for free at iTunes, Pandora, TuneIn, Google, Amazon or our native RSS feed!
* * *

MONTHLY BRAD BLOG SUBSCRIPTION
ONE-TIME DONATION

Choose monthly amount…

(Snail mail support to “Brad Friedman, 7095 Hollywood Blvd., #594 Los Angeles, CA 90028” always welcome too!)

Share article:

4 Comments on “NC’s Voting System ‘Master Passwords’ Found Online, Available to Download by Anyone: ‘BradCast’ 6/10/2019

  1. My favorite password story:

    When Kennedy was President he realized there were no technical controls to keep the mad generals from launching nuclear war without his authorization. JFK ordered “P.A.L.” locks to be installed on the arsenal. It came out many years later they had passwords of “00000000.”

    I’d like to see a candidate debate on all of the causes of overshoot, including climate chaos, resource depletion, peak everything, deforestation, exponential growth money, overconsumption, overpopulation.

    Paper ballots, counted by hand …

  2. Brad, regarding Mr. Vickery’s concerns about the ES&S iVotronics. I didn’t see any mention of the damning evidence that the iVotronics DRE from the 2006 timeframe has a “manufacturer’s password” built into the system that bypasses all local passwords. Is he aware of this? This vulnerability was discovered by the Florida State University Technology Lab in its state sponsored review of the iVotronics after the failed Congressional for the District 13 House seat election in Sarasota, Florida, in 2006. This particular evidence was the last paragraph on the last page of the last appendix to the report. Below is the relevant paragraph of the report.

    … Our judgment is that the password mechanisms on the iVotronic are poorly conceived and poorly implemented. The consequence is that the passwords by themselves do not do a good job of preventing unauthorized individuals from accessing critical system functions. Finally, these passwords can all be bypassed using a special type of PEB, called a Factory Test PEB. When a PEB is inserted, the iVotronic machine queries the PEB to ask it what kind of PEB it is, and the PEB returns a single byte indicating what type of PEB it is. A Factory Test PEB identifies itself by returning a special single-byte value. This special value is hard-coded into the iVotronic code. Anyone who knows the special single-byte value, has access to a PEB and is able to program the PEB could construct a PEB that identifies itself as a Factory Test PEB. When a Factory Test PEB is present, all password checks are bypassed: in places where the user would normally need to enter a password, the password check is bypassed, the machine functions as though the correct password had been entered, and a log entry is appended to the event log as though the user entered the correct password. This undocumented backdoor poses a risk of unauthorized access to critical system functions, because it provides a way that a malicious individual could bypass the password checks by tampering with a PEB.

Comments are closed.

Please help The BRAD BLOG, BradCast and Green News Report remain independent and 100% reader and listener supported in our 22nd YEAR!!!
ONE TIME
any amount...

MONTHLY
any amount...

OR VIA SNAIL MAIL
Make check out to...
Brad Friedman/
BRAD BLOG
7095 Hollywood Blvd., #594
Los Angeles, CA 90028

RECENT POSTSX

About Brad Friedman...

Brad is an independent investigative journalist, blogger and broadcaster.
Full Bio & Testimonials…
Media Appearance Archive…
Articles & Editorials Elsewhere…
Contact…
He has contributed chapters to these books…
…And is featured in these documentary films…

BRAD BLOG ON THE AIR!

THE BRADCAST on KPFK/Pacifica Radio Network (90.7FM Los Angeles, 98.7FM Santa Barbara, 93.7FM N. San Diego and nationally on many other affiliate stations! ALSO VIA PODCAST: RSS/XML feed | Pandora | TuneInApple Podcasts/iTunesiHeartAmazon Music

GREEN NEWS REPORT, nationally syndicated, with new episodes on Tuesday and Thursday. ALSO VIA PODCAST: RSS/XML feed | Pandora | TuneInApple Podcasts/iTunesiHeartAmazon Music

Media Appearance Archives…

AD
CONTENT

ADDITIONAL STUFF

Brad Friedman/
The BRAD BLOG Named...

Buzz Flash's 'Wings of Justice' Honoree
Project Censored 2010 Award Recipient
The 2008 Weblog Awards