Dominion Voting Systems
ImageCast Democracy Suite
ImageCast is a prime example of a vulnerable optical scan system and its associated components. It
debunks the notion that only DRE systems are vulnerable to malicious adversaries. The Democracy
Suite is a paper-based optical scan system that includes an Election Management System (EMS), the
ImageCast Precinct (ICP), a precinct-based optical scan ballot tabulator, the ImageCast Evolution
(ICE), a precinct scanner with optional ballot marking capabilities, and the ImageCast Central (ICC), a
high-speed central ballot scan tabulator based on COTS hardware. As with ClearVote, the use of
COTS components increases transparency, but it may also increase the attack surface. The ICP has a
small touchscreen to allow users, ranging from poll-workers to attackers, to access diagnostic and
configuration settings. The system scans and interprets voter ballots and stores and tabulates each vote
from each paper ballot in compatible ballot storage boxes. An ATI device provides additional
accessibility to voters through “sip and puff” or by allowing them to listen to options as audio with
variable speed and playback functionality. Because the ATI is directly connected to the tabulator, there
is no paper ballot when votes are cast using ATI; further, the direct connection can be exploited by an
attacker to gain control over the system. The ICE scans, interprets, and tabulates voter ballots and it
displays them back to the voter through an LCD display. The ICC is a central ballot tabulator that
relies on a Canon DR-X10C or Canon DR-7550C scanner and a proprietary ballot processing
application software [12]. Exploits for these COTS systems can be easily found online and used to
disrupt the paper audit trail.
In one 2012 Wyle Laboratories security assessment of the suite for the EAC, the EMS, which was
hosted on a Sell Precision T1500 with a Rocsecure Commander 2UE external hard drive, password
policy complexity was disabled, administrative and guest accounts had not been disabled or renamed,
the backup and restore privilege was disabled, “audit shutdown system if unable to log security audits”
was disabled, “FIPS Compliant Algorithms for Encryption Hashing and Signing” were disabled, and
several user accounts were found to perform tasks outside their defined roles. Analysis of the ICP
19
found that USB ports were properly disabled and the RJ45 connector only allowed for operation of the
ATI device. Networked connection to the system was disabled (except the connection light) and no
information was accessible. In the ICE, a hole was discovered in the ballot box that was large enough
to permit “ballot stuffing”. All other access points appeared to be locked or sealed [17].
https://icitech.org/wp-content/uploads/2016/09/ICIT-Analysis-Hacking-Elections-is-Easy-Part-Two.pdf
They don't mention anything about the fact that Dominion themselves are compromised.