SlideShare a Scribd company logo
1 of 19
A Potential Way to Attack
WA State Election System
Nathan Scott
Agenda
Agenda
Terminologies
Background
Problems
Solutions
MyVote
A type of voter records archive system.
reCAPTCHA
reCAPTCHA is a free service that
protects your website from spam and
abuse.
Social Engineering
Social engineering, in the context of
information security, refers to psychological
manipulation of people into performing
actions or divulging confidential information.
Background
• On 12/15/2018 I graduated from Washington State University (Pullman).
• On 12/21/2018 I moved from Pullman to the Great Seattle area.
• On 12/24/2018 I changed my address online, but the system also ask me to change my voter
address that is how I know MyVote exist.
• On 12/24/2018 I realized the voter information can be manipulated by a attacker.
• On 12/25/2018 I contacted Secretary of State (SOS) of Washington.
• On 12/26/2018 I got a useless email in reply.
• On 12/27/2018 I published my article on my Linkedin account to warn others remove their date
of birth from their social media account.
Steps of Attacking
1. Find a victim from Facebook.
2. Add the victim as friend.
3. Check/find out victim’s date of birth.
4. Use MyVote to get victim’s true address.
5. Use ***Search to get all victim’s information
including victim’s relatives’ information.
6. Repeat step 1.
MyVote
MyVote
MyVote
MyVote
MyVote
MyVote
MyVote
MyVote
SOS Email
Hello,
Thank you for contacting our office. Certain voter registration data is public and can’t be withheld from public request.
Private information like your phone number, driver’s license number, Social Security number, etc. is not public and
therefore not disclosed, but your name, address, date of birth, gender, etc. is public. If anyone contacts our office or a
County Auditor’s Office and requests voter registration information, we are required by RCW 29A.08.710 to provide that
information. The only exception to public disclosure is voters enrolled in the Address Confidentiality Program (RCW
29A.08.710). RCW 29A.08.740 does restrict what requesters can do with voter registration information and misuse of
voter registration information is a class C felony.
Everything that appears on MyVote is public information under state law.
I hope this answers your questions!
Selena Faller
Office Assistant
Washington State Elections | Office of the Secretary of State
(360) 902-4180 | www.vote.wa.gov
My Question
So my question is:
"If everyone can follow the law,
why we still need a password?"
Solutions
• Add a ReCAPTCHA at front page.
• Add a request form to verify the requester’s
information.
• Taking down all reserve social engineering website
like ***Search.
Q & A
Q & A

More Related Content

Similar to A Potential Way to Attack WA State Election System

Identity Theft
Identity TheftIdentity Theft
Identity Theft
sarakr00
 

Similar to A Potential Way to Attack WA State Election System (20)

Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
What is Vote By Mail?
What is Vote By Mail?What is Vote By Mail?
What is Vote By Mail?
 
Voter Registration Toolbox
Voter Registration ToolboxVoter Registration Toolbox
Voter Registration Toolbox
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminals
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Election integrity-manual
Election integrity-manualElection integrity-manual
Election integrity-manual
 
ID Shield Services and Features
ID Shield Services and Features ID Shield Services and Features
ID Shield Services and Features
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
IDSHield Services and Features
IDSHield Services and FeaturesIDSHield Services and Features
IDSHield Services and Features
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
2015 senate youth information webinar for student's, counselors, and parents ...
2015 senate youth information webinar for student's, counselors, and parents ...2015 senate youth information webinar for student's, counselors, and parents ...
2015 senate youth information webinar for student's, counselors, and parents ...
 
2015 senate youth information webinar for student's, counselors, and parents ...
2015 senate youth information webinar for student's, counselors, and parents ...2015 senate youth information webinar for student's, counselors, and parents ...
2015 senate youth information webinar for student's, counselors, and parents ...
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

A Potential Way to Attack WA State Election System

  • 1. A Potential Way to Attack WA State Election System Nathan Scott
  • 3. MyVote A type of voter records archive system.
  • 4. reCAPTCHA reCAPTCHA is a free service that protects your website from spam and abuse.
  • 5. Social Engineering Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.
  • 6. Background • On 12/15/2018 I graduated from Washington State University (Pullman). • On 12/21/2018 I moved from Pullman to the Great Seattle area. • On 12/24/2018 I changed my address online, but the system also ask me to change my voter address that is how I know MyVote exist. • On 12/24/2018 I realized the voter information can be manipulated by a attacker. • On 12/25/2018 I contacted Secretary of State (SOS) of Washington. • On 12/26/2018 I got a useless email in reply. • On 12/27/2018 I published my article on my Linkedin account to warn others remove their date of birth from their social media account.
  • 7. Steps of Attacking 1. Find a victim from Facebook. 2. Add the victim as friend. 3. Check/find out victim’s date of birth. 4. Use MyVote to get victim’s true address. 5. Use ***Search to get all victim’s information including victim’s relatives’ information. 6. Repeat step 1.
  • 16. SOS Email Hello, Thank you for contacting our office. Certain voter registration data is public and can’t be withheld from public request. Private information like your phone number, driver’s license number, Social Security number, etc. is not public and therefore not disclosed, but your name, address, date of birth, gender, etc. is public. If anyone contacts our office or a County Auditor’s Office and requests voter registration information, we are required by RCW 29A.08.710 to provide that information. The only exception to public disclosure is voters enrolled in the Address Confidentiality Program (RCW 29A.08.710). RCW 29A.08.740 does restrict what requesters can do with voter registration information and misuse of voter registration information is a class C felony. Everything that appears on MyVote is public information under state law. I hope this answers your questions! Selena Faller Office Assistant Washington State Elections | Office of the Secretary of State (360) 902-4180 | www.vote.wa.gov
  • 17. My Question So my question is: "If everyone can follow the law, why we still need a password?"
  • 18. Solutions • Add a ReCAPTCHA at front page. • Add a request form to verify the requester’s information. • Taking down all reserve social engineering website like ***Search.
  • 19. Q & A Q & A