Five ways hackers could tamper with the 2008 elections.

Who's winning, who's losing, and why.
Aug. 15 2008 1:53 PM

Hack the Vote

Five ways Internet tricksters could tamper with the 2008 elections.

Hacker. Illustration by Natalie Matthews.

In the late 1800s, during the heyday of Tammany Hall, New Yorkers would often show up to vote with a full beard. "When you've voted them with their whiskers on, you take them to a barber and scrape off the chin fringe,"explained Democratic boss Big Tim Sullivan. If the political machine needed still more votes, the voter would return with nothing but a mustache, and then once again clean-shaven. "That makes one of them good for four votes," according to Sullivan.

Technology has cleaned up elections since then. Voting machines ensure one person casts only one vote. Electronic databases let secretaries of state compare their rolls to avoid double registration. Hotlines tell voters where and when to show up on Election Day.


This year, campaigns are relying more than ever on e-mail, texting, and the Web to get their message out and raise cash. But high-speed communication also means more opportunities for electronic skullduggery. Just as new technology lets voters get good information faster than ever in 2008, mischief-makers can spread bad information quickly.

Election tricksters—perhaps working for campaigns, perhaps freelancing—disseminate false polling locations and closing times. They spread rumors that Democrats vote Tuesday, Republicans vote Wednesday, or that anyone with outstanding parking tickets, unpaid rent, or family members in prison can't vote. Voters also get misled about ID laws, believing they're stricter than they really are. (A recent Supreme Court decision to uphold Indiana's voter ID law could be misinterpreted as applying to other states as well.)

Campaigns and voting rights activists are anticipating all kinds of Internet dirty tricks to spread this misinformation. Here are five they are most worried about—and how they can be stopped.

1. Fake e-mails. In 2004, Democrats were duped by an official-looking e-mail soliciting donations to the Kerry campaign. Researchers exposed it as a phishing scam, but many donors had already lost their money. Now most contributions to the presidential candidates are given online. And supporters are eager to give—a fake solicitation from Obama campaign manager David Plouffe could rake in cash before the campaign had time shut it down. (Just look how accurately tricksters were able to replicate bank Web sites.) Such fraud doesn't have to be about money: In November, an e-mail falsely attributed to the Mitt Romney campaign called out Rudy Giuliani and "his pedophile friends," reflecting poorly on both candidates.

Defense: Rapid response. Campaigns need an early-warning system that lets them counter false claims as soon as they occur. Branding also helps—the more distinctive campaign e-mails are, the more likely supporters will recognize a fake. Notice that Obama's donation page has a security seal at the bottom designating it an "authentic site." Notice, also, that you can easily copy the seal and post it on your own site.

2.Dummy Web sites. In 1999, a Web site appeared depicting George Bush with a straw up his nose inhaling lines of coke. It was clearly satire, but the GOP sued and the site was taken down. More threatening is the prospect of fake candidate sites that look real. Some weak points have already been exposed: A team from Symantec registered 124 domain names with various misspellings of the candidates' names and attracted 21,000 hits over two months. In April, a hacker redirected anyone who clicked on the "Community Blogs" section of to Hillary Clinton's home page, then posted an apparent confession. (One online security expert recently discovered a flaw in the Domain Name System that could allow hackers to redirect visitors to other pages.) Particularly vulnerable are Secretary of State sites, where many voters go to find polling locations and to preview their ballots. These state sites are generally low-tech and subject to tampering—if people with basic coding skills could access and manipulate Oklahoma's sex offender registry, they can certainly muck with the Secretary of State polling-station locators.

Defense:Back it up. If a campaign finds a major security breach in their site, they can immediately pull it down and automatically redirect users to an identical clone site. If done right, the user experience would be seamless. That said, beware of false alarms: Sen. Joe Lieberman cried foul in 2006 when he thought his Web site was downed by Ned Lamont-loving hackers. Turns out it was his own campaign's fault. As for security, companies offer seals of authenticity for political and government Web sites. But, again, they're easy to fake.



Slate Plus Early Read: The Self-Made Man

The story of America’s most pliable, pernicious, irrepressible myth.

Rehtaeh Parsons Was the Most Famous Victim in Canada. Now, Journalists Can’t Even Say Her Name.

Mitt Romney May Be Weighing a 2016 Run. That Would Be a Big Mistake.

Amazing Photos From Hong Kong’s Umbrella Revolution

Transparent Is the Fall’s Only Great New Show

The XX Factor

Rehtaeh Parsons Was the Most Famous Victim in Canada

Now, journalists can't even say her name.


Lena Dunham, the Book

More shtick than honesty in Not That Kind of Girl.

What a Juicy New Book About Diane Sawyer and Katie Couric Fails to Tell Us About the TV News Business

Does Your Child Have Sluggish Cognitive Tempo? Or Is That Just a Disorder Made Up to Scare You?

  News & Politics
Sept. 29 2014 11:45 PM The Self-Made Man The story of America’s most pliable, pernicious, irrepressible myth.
Sept. 29 2014 7:01 PM We May Never Know If Larry Ellison Flew a Fighter Jet Under the Golden Gate Bridge
Dear Prudence
Sept. 30 2014 6:00 AM Drive-By Bounty Prudie advises a woman whose boyfriend demands she flash truckers on the highway.
  Double X
Sept. 29 2014 11:43 PM Lena Dunham, the Book More shtick than honesty in Not That Kind of Girl.
  Slate Plus
Slate Fare
Sept. 29 2014 8:45 AM Slate Isn’t Too Liberal, but … What readers said about the magazine’s bias and balance.
Brow Beat
Sept. 29 2014 9:06 PM Paul Thomas Anderson’s Inherent Vice Looks Like a Comic Masterpiece
Future Tense
Sept. 29 2014 11:56 PM Innovation Starvation, the Next Generation Humankind has lots of great ideas for the future. We need people to carry them out.
  Health & Science
Medical Examiner
Sept. 29 2014 11:32 PM The Daydream Disorder Is sluggish cognitive tempo a disease or disease mongering?
Sports Nut
Sept. 28 2014 8:30 PM NFL Players Die Young. Or Maybe They Live Long Lives. Why it’s so hard to pin down the effects of football on players’ lives.