Incident: Vulnerabilities in Dominion Voting Systems' Software Raise Election Security Concerns

Published Date: 2022-05-31

Postmortem Analysis
Timeline 1. The software failure incident regarding the vulnerabilities in Dominion Voting Systems' electronic voting machines happened before May 31, 2022, as the article discussing the incident was published on that date. [127755]
System 1. Dominion Voting Systems' Democracy Suite ImageCast X voting system [127755]
Responsible Organization 1. The software vulnerabilities in the Dominion Voting Systems’ equipment were identified by the U.S. Cybersecurity and Infrastructure Agency (CISA) [127755]. 2. The vulnerabilities were detailed in a report by University of Michigan computer scientist J. Alex Halderman, who is an expert witness in a lawsuit targeting the voting machines used in Georgia [127755].
Impacted Organization 1. State election officials [127755]
Software Causes 1. Software vulnerabilities in Dominion Voting Systems’ electronic voting machines that could be exploited by sophisticated attackers, hostile nation states, or election insiders [127755].
Non-software Causes 1. Lack of adherence to multiple safeguards in using digital technology to record votes, making the system vulnerable to hacking [127755]. 2. Concerns about possible meddling by election insiders, as highlighted by the indictment of Mesa County Clerk Tina Peters in Colorado [127755].
Impacts 1. The software vulnerabilities in Dominion Voting Systems’ equipment left them susceptible to hacking, potentially allowing attackers to spread malicious code and alter recorded votes, posing serious consequences [127755]. 2. Concerns about possible meddling by election insiders were raised, as evidenced by the indictment of Mesa County Clerk Tina Peters in Colorado, who had access to the voting machines and appeared at an election symposium organized by MyPillow CEO Mike Lindell [127755]. 3. The vulnerabilities in the voting machines could allow attackers to forge cards used by technicians, granting them access to change the software, mark ballots inconsistently with voters’ intent, alter recorded votes, or identify voters’ secret ballots [127755]. 4. The incident highlighted the importance of using hand-marked paper ballots as the most secure method of voting, according to election security experts like J. Alex Halderman [127755]. 5. The software failure incident led to the U.S. Cybersecurity and Infrastructure Agency (CISA) issuing an advisory detailing nine vulnerabilities and recommending protective measures to prevent or detect their exploitation, emphasizing the need for election officials to take action [127755].
Preventions 1. Implementing multiple safeguards for digital technology used in voting systems, such as using hand-marked paper ballots as the most secure method of voting [127755]. 2. Applying prompt mitigation measures and continued and enhanced defensive measures to reduce the risk of exploitation of vulnerabilities in the voting machines [127755]. 3. Ensuring voting machines are secure and protected at all times, conducting rigorous pre- and post-election testing, and encouraging voters to verify the human-readable portion on printed ballots [127755].
Fixes 1. Implementing protective measures suggested by the U.S. Cybersecurity and Infrastructure Agency (CISA) to prevent or detect the exploitation of the identified vulnerabilities [127755]. 2. Applying continued and enhanced defensive measures to reduce the risk of exploitation of the vulnerabilities ahead of every election [127755]. 3. Ensuring voting machines are secure and protected at all times [127755]. 4. Conducting rigorous pre- and post-election testing on the machines as well as post-election audits [127755]. 5. Encouraging voters to verify the human-readable portion on printed ballots to reduce the risk of attacks exploiting the vulnerabilities [127755].
References 1. U.S. Cybersecurity and Infrastructure Agency (CISA) [127755] 2. University of Michigan computer scientist J. Alex Halderman [127755] 3. Dominion Voting Systems [127755] 4. Mesa County Clerk Tina Peters [127755] 5. MyPillow CEO Mike Lindell [127755] 6. Verified Voting [127755] 7. Georgia Deputy Secretary of State Gabriel Sterling [127755]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization a) The software failure incident related to vulnerabilities in electronic voting machines from Dominion Voting Systems has happened again within the same organization. The vulnerabilities in the Dominion Voting Systems’ equipment were highlighted in a report by University of Michigan computer scientist J. Alex Halderman, who has long argued against using digital technology for voting due to security concerns [127755]. b) While the specific incident mentioned in the article pertains to Dominion Voting Systems, the expert involved, J. Alex Halderman, expressed concerns about systemic problems in the development, testing, and certification of election equipment from various vendors. Halderman suggested that if other vendors' equipment were subjected to similar testing, serious problems could likely be found as well [127755].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the vulnerabilities identified in the Dominion Voting Systems' equipment. The U.S. Cybersecurity and Infrastructure Agency (CISA) detailed nine vulnerabilities in the machines, including the potential spread of malicious code from the election management system to machines throughout a jurisdiction, allowing for the alteration of recorded votes or identification of voters' secret ballots [127755]. (b) The software failure incident related to the operation phase is highlighted by concerns about possible meddling by election insiders, such as the case of Mesa County Clerk Tina Peters in Colorado. Peters, who had access to the voting machines, appeared at an election symposium and was later barred from overseeing the upcoming election in her county. This situation underscores the risks associated with individuals with operational access potentially compromising the system [127755].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident related to the electronic voting machines from Dominion Voting Systems was primarily due to software vulnerabilities within the system itself. The U.S. Cybersecurity and Infrastructure Agency (CISA) detailed nine vulnerabilities in the Dominion Voting Systems' equipment that could be exploited by attackers, such as spreading malicious code, forging technician cards, and altering recorded votes [127755]. These vulnerabilities were identified by a computer scientist, J. Alex Halderman, who highlighted the risks associated with using digital technology for voting and emphasized the importance of implementing multiple safeguards to prevent exploitation of these vulnerabilities. Additionally, the incident involved concerns about the security of the voting machines and the potential for exploitation by hostile actors, including nation-states or election insiders [127755]. (b) outside_system: While the software failure incident primarily stemmed from vulnerabilities within the Dominion Voting Systems' equipment, there were external factors contributing to the overall context of the incident. For example, there were concerns about possible meddling by election insiders, as highlighted by the indictment of Mesa County Clerk Tina Peters in Colorado, who had access to the voting machines and appeared at events related to election conspiracy theories [127755]. Additionally, the incident occurred within the broader context of misinformation and disinformation surrounding elections, with CISA trying to balance the need for action by election officials without causing public alarm [127755].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the article is primarily related to non-human actions, specifically software vulnerabilities in the Dominion Voting Systems' equipment that leave them susceptible to hacking if unaddressed. The vulnerabilities were identified through testing by a computer scientist, J. Alex Halderman, and were not introduced by human actions but rather existed within the software itself [127755]. (b) However, human actions can also play a role in exploiting these vulnerabilities. For example, attackers could exploit the vulnerabilities by spreading malicious code from the election management system to machines throughout a jurisdiction, either through physical access or by remotely infecting other systems connected to the internet. Additionally, attackers could forge cards used in the machines by technicians to gain access and alter the software, potentially impacting election results [127755].
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - The software vulnerabilities in the Dominion Voting Systems' equipment could potentially allow malicious code to be spread from the election management system to machines throughout a jurisdiction, which could be exploited by someone with physical access or by someone who is able to remotely infect other systems connected to the internet [127755]. - One of the vulnerabilities identified could allow an attacker to forge cards used in the machines by technicians, giving the attacker access to a machine that would allow the software to be changed [127755]. (b) The software failure incident related to software: - The vulnerabilities identified in the Dominion Voting Systems' equipment were primarily due to software vulnerabilities that could be exploited by sophisticated attackers, such as hostile nation states or election insiders, leading to serious consequences like altering recorded votes or identifying voters' secret ballots [127755]. - The advisory issued by the U.S. Cybersecurity and Infrastructure Agency (CISA) highlighted nine software vulnerabilities in the Dominion Voting Systems' equipment and recommended protective measures to prevent or detect their exploitation [127755].
Objective (Malicious/Non-malicious) malicious, non-malicious (a) The software failure incident related to the vulnerabilities in Dominion Voting Systems' electronic voting machines can be categorized as potentially malicious. The vulnerabilities identified in the machines could allow for malicious code to be spread, forged cards to be used by attackers, and ballots to be altered or votes to be identified inconsistently with voters' intent [127755]. These vulnerabilities could be exploited by sophisticated attackers, hostile nation states, or election insiders, leading to serious consequences if not addressed. Additionally, concerns about possible meddling by election insiders were raised in the context of the incident, further indicating a potential for malicious exploitation [127755]. (b) The software failure incident can also be viewed as non-malicious in the sense that the vulnerabilities were not necessarily introduced with the intent to harm the system. The vulnerabilities were identified through testing by a computer scientist and expert witness, J. Alex Halderman, who has long argued that using digital technology for voting is inherently risky due to the vulnerabilities of computers [127755]. The incident highlights the importance of multiple safeguards and proper security measures in place to prevent exploitation, indicating that the vulnerabilities may have been a result of oversight or inadequate security practices rather than intentional harm.
Intent (Poor/Accidental Decisions) unknown (a) The intent of the software failure incident related to poor_decisions: - The software failure incident related to vulnerabilities in Dominion Voting Systems' electronic voting machines was not due to poor decisions but rather due to inherent vulnerabilities in the digital technology used for recording votes [127755]. - The vulnerabilities in the voting machines were identified through testing by a computer scientist and expert witness, J. Alex Halderman, who has long argued that using digital technology for voting is dangerous due to the inherent vulnerability of computers to hacking [127755]. - The vulnerabilities were not a result of poor decisions but rather a consequence of using digital technology that can be exploited by sophisticated attackers, hostile nation states, or election insiders [127755]. (b) The intent of the software failure incident related to accidental_decisions: - The software failure incident was not due to accidental decisions but rather due to the vulnerabilities inherent in the Dominion Voting Systems' electronic voting machines [127755]. - The vulnerabilities identified in the machines were not accidental but were deliberate weaknesses that could be exploited by attackers with physical or remote access to the systems [127755]. - The vulnerabilities were not introduced accidentally but were a result of the design and implementation of the voting machines, which could allow for malicious code to be spread and for ballots to be altered or votes to be manipulated [127755].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence is evident in the vulnerabilities found in the Dominion Voting Systems' equipment. The U.S. Cybersecurity and Infrastructure Agency (CISA) identified nine vulnerabilities in the voting machines, including the potential spread of malicious code, the ability to forge technician cards, and the risk of altering recorded votes [127755]. These vulnerabilities were highlighted by University of Michigan computer scientist J. Alex Halderman, who emphasized the dangers of using digital technology for voting and the need for multiple safeguards that were not uniformly followed. The incident underscores systemic problems in the development, testing, and certification of election equipment, indicating a lack of professional competence in ensuring the security of voting systems. (b) The software failure incident related to accidental factors is not explicitly mentioned in the articles.
Duration permanent (a) The software failure incident described in the articles seems to be more of a permanent nature. The vulnerabilities in the Dominion Voting Systems' equipment identified by the U.S. Cybersecurity and Infrastructure Agency (CISA) are inherent to the software and could potentially be exploited by sophisticated attackers or election insiders [127755]. These vulnerabilities, if not addressed, could have serious consequences and pose a risk to election integrity. Additionally, the concerns raised by experts like J. Alex Halderman about the security of digital voting technology and the need for multiple safeguards indicate that the software vulnerabilities are not temporary issues but rather fundamental flaws in the system [127755].
Behaviour value, other (a) crash: The software failure incident in the article is not described as a crash where the system loses state and does not perform any of its intended functions [127755]. (b) omission: The software failure incident in the article is not described as an omission where the system omits to perform its intended functions at an instance(s) [127755]. (c) timing: The software failure incident in the article is not described as a timing issue where the system performs its intended functions correctly, but too late or too early [127755]. (d) value: The software failure incident in the article is related to the system performing its intended functions incorrectly, which could be categorized as a failure due to the system providing incorrect value [127755]. (e) byzantine: The software failure incident in the article is not described as a byzantine failure where the system behaves erroneously with inconsistent responses and interactions [127755]. (f) other: The software failure incident in the article involves vulnerabilities in electronic voting machines that could potentially be exploited by sophisticated attackers, election insiders, or hostile nation states, leading to serious consequences such as altering recorded votes or identifying voters' secret ballots. This behavior could be categorized as a failure due to potential malicious exploitation of the system [127755].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence The consequence of the software failure incident discussed in the articles is primarily a theoretical consequence. The U.S. Cybersecurity and Infrastructure Agency (CISA) highlighted nine vulnerabilities in Dominion Voting Systems' electronic voting machines, which could potentially be exploited by sophisticated attackers such as hostile nation states or election insiders. These vulnerabilities could lead to serious consequences like altering recorded votes, marking ballots inconsistently with voters' intent, or identifying voters' secret ballots. However, there is no evidence that these vulnerabilities have been exploited to alter election results [127755].
Domain government (a) The failed system in this incident is related to the government industry, specifically the election industry. The software vulnerabilities were found in electronic voting machines from Dominion Voting Systems used in at least 16 states [Article 127755]. These vulnerabilities could potentially be exploited by attackers to alter election results, highlighting the critical role of secure voting systems in the democratic process.

Sources

Back to List