|
To determine if there is a relationship between DHCP and the digiboard. What is really needed is hardware/firmware documentation for the port cards, to see how it presents itself to the OS.
As far as hacking stuff, I think you are viewing it in the context of an external entity coming in to the system from afar and changing stuff around without the knowlege of the election workers or of the vendor.
The latter is the most dangerous of assumptions. I wouldn't go around trying to convince folks that an election system can be hacked by any rogue amateur. It's pretty silly.
The more likely scenario is that security flaws are left in the system intentionally by the vendors, rather than blatantly fraudlent software. By leaving a security flaw in the system, they can claim it was a mistake, rather than intentional.
And nothing requires you to have a second set of memory cards, just to be able to act like you have all the cards. And even that assumes you cannot bypass the card authentication process as well. As far as compromising tabulators... you own both products. Just have the tabulator compromise them as they dial in.
Plus, as far as staffing it goes, you'd be surprised what one human can do with the right equipment and a lot of preparation. I myself once reconfigured over 200 switches and routers in about 15 minutes.
|