{"id":12838,"date":"2017-07-31T15:06:00","date_gmt":"2017-07-31T15:06:00","guid":{"rendered":"https:\/\/www.commoncause.org\/articles\/hackers-demonstrate-election-vulnerabilities\/"},"modified":"2017-07-31T15:06:00","modified_gmt":"2017-07-31T15:06:00","slug":"les-pirates-informatiques-demontrent-les-vulnerabilites-des-elections","status":"publish","type":"article","link":"https:\/\/www.commoncause.org\/fr\/articles\/hackers-demonstrate-election-vulnerabilities\/","title":{"rendered":"Des pirates informatiques d\u00e9montrent les vuln\u00e9rabilit\u00e9s des \u00e9lections"},"template":"","class_list":["post-12838","article","type-article","status-publish","hentry","article_type-blog-post"],"acf":{"details":{"summary":"In a matter of minutes over the weekend, a band of self-styled computer nerds demonstrated how voting machines similar to those used in hundreds of precincts across the U.S. can be manipulated to produce wildly inaccurate vote totals.","featured_image":null,"article_type":1103,"authors":["{\"site_id\":\"1\",\"post_type\":\"person\",\"post_id\":8577}"],"related_issues":[143,169,2066],"related_work":false,"location":null},"sidebar":{"helper_enable_sidebar":false,"helper_media_contact":{"heading":"Media Contact","manually_enter_person":false,"person":null,"name":"","role":"","phone":"","email":""},"helper_links_downloads":{"heading":"Links & Downloads","links":null}},"page_layout":[{"acf_fc_layout":"layout_wysiwyg","_acfe_flexible_toggle":null,"component_wysiwyg":{"content":"<p><p class=\"MsoNormal\">En quelques minutes, ce week-end, un groupe de soi-disant \u00ab nerds informatiques \u00bb a d\u00e9montr\u00e9 comment des machines \u00e0 voter similaires \u00e0 celles utilis\u00e9es dans des centaines de bureaux de vote \u00e0 travers les \u00c9tats-Unis peuvent \u00eatre manipul\u00e9es pour produire des totaux de votes extr\u00eamement inexacts.<\/p><p class=\"MsoNormal\">Gr\u00e2ce \u00e0 des connexions Wi-Fi, \u00e0 des cl\u00e9s en plastique faites maison similaires \u00e0 celles distribu\u00e9es aux employ\u00e9s des bureaux de vote le jour du scrutin et \u00e0 d&#039;autres astuces informatiques, certains pirates informatiques pr\u00e9sents \u00e0 la convention annuelle DEFCON \u00e0 Las Vegas ont \u00e9galement exhum\u00e9 d&#039;anciens r\u00e9sultats d&#039;\u00e9lections sur des machines dont les vendeurs ou les responsables \u00e9lectoraux ont affirm\u00e9 qu&#039;ils avaient \u00e9t\u00e9 effac\u00e9s. D&#039;autres ont montr\u00e9 qu&#039;ils \u00e9taient capables de fouiller dans les registres d&#039;inscription des \u00e9lecteurs.<\/p><p class=\"MsoNormal\">\"The exposure of those devices to the people who do bug bounties or actually look at these kind of devices has been fairly limited,\" Brian Knopf, an internet of things security researcher for Neustar, a security analysis company, told <strong><\/strong><a href=\"https:\/\/www.cnet.com\/news\/defcon-hackers-find-its-very-easy-to-break-voting-machines\/\"><strong>CNET.com<\/strong><\/a>. \"And so DEFCON is a great opportunity for those of us who hack hardware and firmware to look to these kind of devices and really answer that question, 'Are they hackable?'\"<\/p><p class=\"MsoNormal\">Les inqui\u00e9tudes concernant la vuln\u00e9rabilit\u00e9 des machines \u00e0 voter se sont multipli\u00e9es ces derniers mois, les 17 agences de renseignement du pays ayant conclu que des pirates informatiques soutenus par le gouvernement russe avaient tent\u00e9 de p\u00e9n\u00e9trer les syst\u00e8mes de vote dans 21 \u00c9tats et atteint leur objectif dans au moins deux \u00c9tats lors des \u00e9lections de 2016.<\/p><p class=\"MsoNormal\">Les autorit\u00e9s insistent sur le fait qu&#039;il n&#039;y a aucune preuve que les pirates informatiques russes aient pu modifier le total des votes, mais Jake Braun, un mod\u00e9rateur du panel lors de la conf\u00e9rence qui a conseill\u00e9 le D\u00e9partement de la s\u00e9curit\u00e9 int\u00e9rieure sur la cybers\u00e9curit\u00e9 pendant l&#039;administration Obama, a d\u00e9clar\u00e9 qu&#039;il n&#039;y avait aucun moyen d&#039;en \u00eatre s\u00fbr.<\/p><p class=\"MsoNormal\">\u00ab Les m\u00e9chants peuvent entrer\u2026 Je ne dis pas que les votes ont \u00e9t\u00e9 invers\u00e9s ou que les \u00e9lecteurs ont \u00e9t\u00e9 supprim\u00e9s des fichiers \u00e9lectoraux, mais le fait est que la s\u00e9curit\u00e9 est si laxiste et si mauvaise qu&#039;ils n&#039;ont aucun moyen de revenir en arri\u00e8re et de faire des analyses m\u00e9dico-l\u00e9gales et de dire dans un sens ou dans l&#039;autre \u00bb, a affirm\u00e9 Braun.<\/p><p class=\"MsoNormal\">The DEFCON demonstration was intended to bolster the case - long made by Common Cause and other election integrity advocates - for state election administrators to purchase voting systems that create a voter verifiable paper record of each ballot cast. The paper records can be audited to ensure that machine-generated totals are accurate.<\/p><p class=\"MsoNormal\">\u00ab M\u00eame lorsqu&#039;il y a des bulletins de vote papier, la plupart des bulletins n&#039;ont pas \u00e9t\u00e9 v\u00e9rifi\u00e9s pour voir s&#039;il y a eu piratage ou intrusion, donc m\u00eame si les agents de s\u00e9curit\u00e9 n&#039;ont pas vu de piratage ext\u00e9rieur se produire le jour du scrutin, les choses auraient pu \u00eatre attaqu\u00e9es plus t\u00f4t \u00bb, a d\u00e9clar\u00e9 Barbara Simmons, pr\u00e9sidente du conseil d&#039;administration de Verified Voting, un groupe \u00e0 but non lucratif qui suit les probl\u00e8mes de vote.<\/p><p class=\"MsoNormal\">Simmons a d\u00e9clar\u00e9 que des am\u00e9liorations de la s\u00e9curit\u00e9 \u00e9lectorale pourraient \u00eatre mises en \u0153uvre \u00e0 l&#039;\u00e9chelle nationale pour $500 \u00e0 600 millions, soit environ 0,15 % du budget f\u00e9d\u00e9ral de $3,9 billions.<\/p><p class=\"MsoNormal\">###<\/p><\/p>"}}]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hackers Demonstrate Election Vulnerabilities - Common Cause<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commoncause.org\/fr\/articles\/les-pirates-informatiques-demontrent-les-vulnerabilites-des-elections\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Demonstrate Election Vulnerabilities\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commoncause.org\/fr\/articles\/les-pirates-informatiques-demontrent-les-vulnerabilites-des-elections\/\" \/>\n<meta property=\"og:site_name\" content=\"Common Cause\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CommonCause\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/10\/CC-Share-Graphic-Main9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CommonCause\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.commoncause.org\/articles\/hackers-demonstrate-election-vulnerabilities\/\",\"url\":\"https:\/\/www.commoncause.org\/articles\/hackers-demonstrate-election-vulnerabilities\/\",\"name\":\"Hackers Demonstrate Election Vulnerabilities - Common Cause\",\"isPartOf\":{\"@id\":\"https:\/\/www.commoncause.org\/#website\"},\"datePublished\":\"2017-07-31T15:06:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.commoncause.org\/articles\/hackers-demonstrate-election-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.commoncause.org\/articles\/hackers-demonstrate-election-vulnerabilities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.commoncause.org\/articles\/hackers-demonstrate-election-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.commoncause.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Demonstrate Election Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.commoncause.org\/#website\",\"url\":\"https:\/\/www.commoncause.org\/\",\"name\":\"Common Cause\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.commoncause.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.commoncause.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.commoncause.org\/#organization\",\"name\":\"Common Cause\",\"url\":\"https:\/\/www.commoncause.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png\",\"contentUrl\":\"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png\",\"width\":2066,\"height\":331,\"caption\":\"Common Cause\"},\"image\":{\"@id\":\"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CommonCause\",\"https:\/\/x.com\/CommonCause\",\"https:\/\/www.instagram.com\/ourcommoncause\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Des pirates informatiques d\u00e9montrent les vuln\u00e9rabilit\u00e9s des \u00e9lections - Common Cause","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commoncause.org\/fr\/articles\/les-pirates-informatiques-demontrent-les-vulnerabilites-des-elections\/","og_locale":"fr_FR","og_type":"article","og_title":"Hackers Demonstrate Election Vulnerabilities","og_url":"https:\/\/www.commoncause.org\/fr\/articles\/les-pirates-informatiques-demontrent-les-vulnerabilites-des-elections\/","og_site_name":"Common Cause","article_publisher":"https:\/\/www.facebook.com\/CommonCause","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/10\/CC-Share-Graphic-Main9.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CommonCause","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commoncause.org\/articles\/hackers-demonstrate-election-vulnerabilities\/","url":"https:\/\/www.commoncause.org\/articles\/hackers-demonstrate-election-vulnerabilities\/","name":"Des pirates informatiques d\u00e9montrent les vuln\u00e9rabilit\u00e9s des \u00e9lections - Common Cause","isPartOf":{"@id":"https:\/\/www.commoncause.org\/#website"},"datePublished":"2017-07-31T15:06:00+00:00","breadcrumb":{"@id":"https:\/\/www.commoncause.org\/articles\/hackers-demonstrate-election-vulnerabilities\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commoncause.org\/articles\/hackers-demonstrate-election-vulnerabilities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.commoncause.org\/articles\/hackers-demonstrate-election-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commoncause.org\/"},{"@type":"ListItem","position":2,"name":"Hackers Demonstrate Election Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.commoncause.org\/#website","url":"https:\/\/www.commoncause.org\/","name":"Cause commune","description":"","publisher":{"@id":"https:\/\/www.commoncause.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.commoncause.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.commoncause.org\/#organization","name":"Cause commune","url":"https:\/\/www.commoncause.org\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png","contentUrl":"https:\/\/www.commoncause.org\/wp-content\/uploads\/2024\/05\/Common-Cause-Logo.png","width":2066,"height":331,"caption":"Common Cause"},"image":{"@id":"https:\/\/www.commoncause.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CommonCause","https:\/\/x.com\/CommonCause","https:\/\/www.instagram.com\/ourcommoncause\/"]}]}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Common Cause","distributor_original_site_url":"https:\/\/www.commoncause.org\/fr","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.commoncause.org\/fr\/wp-json\/wp\/v2\/article\/12838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commoncause.org\/fr\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/www.commoncause.org\/fr\/wp-json\/wp\/v2\/types\/article"}],"version-history":[{"count":0,"href":"https:\/\/www.commoncause.org\/fr\/wp-json\/wp\/v2\/article\/12838\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.commoncause.org\/fr\/wp-json\/wp\/v2\/media?parent=12838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}