Posted By

Tags

Government Concentrator hacks the government- with ease

Clea Simon
Cambridge, Massachusetts February 8, 2020

Max Weiss (Picture by Harvard Staff Photographer Stephanie Mitchell)

Though no expert coder, a government concentrator uses bots to show an agency its website vulnerability

Max Weiss ’20 never intended to hack the government. His discovery of how easy it is to do — outlined in a new paper he authored — came of the best of intentions.

Weiss, a government concentrator from Cincinnati, was doing advocacy work for state expansion and defence of Medicaid last summer, a project that combined his interests in public policy and healthcare.

While studying the ways in which various advocacy groups can influence pending legislation, he learned how valuable such groups find the federal government’s comment period, when members of the public are invited to weigh in on new or pending legislation via online forms.

Manipulating results

He realised how easy it would be to manipulate the results using bots — computer programmes that generate automated responses — to flood the sites with fake responses for or against any proposal.

The 21-year-old detailed his findings in a recent Technology Science piece, “Deepfake Bot Submissions to Federal Public Comment Websites Cannot Be Distinguished from Human Submissions.”

“We were spending a lot of time and energy getting high-quality comments from constituents. I wanted to make sure that these federal agencies understood the potential consequences of their policies, and I had the idea that I could use a bot and submit a lot of fake comments,” Weiss said.

He paused, recognising that corrupting the process was fraught: “This would be bad for democracy.”

But the Leverett House resident could not shake the idea, and he began to research the feasibility of such a scheme. Turns out submission is easy to automate.

Discounting comments

Federal agencies have some leeway to discount comments that are obviously duplicated or irrelevant. But the typical technological defences against attack, including CAPTCHAS, anomaly detection, and outside verification — all of which are integrated into online activity from banking to email log-in — were pretty much absent.

“One of the very important findings from the study is that someone like me who’s a very novice coder was able to Google his way through hacking the government. Most of those websites really just have a text box for your public comments and then a submit button,” Weiss said.

In the course of writing the Tech Science paper, Weiss realised that cybersecurity experts have been sounding the alarm on federal website vulnerability for years, but previous transgressions had used relatively unsophisticated substitution methods.

“In 2017, there were 22 million comments posted for the FCC proposal to repeal net neutrality. And it was found that 96 percent of those were part of duplicative campaigns,” he said.

Unique Deepfake responses

Weiss used AI methods to generate a high volume of unique Deepfake comments about a proposed Medicaid waiver. He then wrote a programme that automated the submission process, and ran it from a laptop in his dorm room over the course of a few days.

He submitted more than 1000 fake comments that comprised 55% of the total submissions and that were found by survey respondents to be indistinguishable from human comments.

Afterward, he notified the federal Centres for Medicare and Medicaid Services which comments were part of his demonstration to prevent their interference with authentic public comment evaluation.

Scary revelations

Among the scarier revelations was Weiss’ admission that he was successful without being an expert coder and without special equipment.

 I have learned to code in the last four years, just through a series of personal projects and summer jobs, and one class,” said Weiss, who has taken some courses in the new programme in technology science.

“I think that one of the very important findings from the study is that someone like me, who is a very novice coder was able to Google his way through hacking the government. I have always been very interested in public policy,” he said.

Weiss also enjoys writing and performing comedy.

“Most of my government study has been in health policy or in technology policy or public interest technology; so, this was just kind of a synthesis of a lot of different things that I had learned in the Government Department and just some personal tech projects that I have done in the past.”

“Max did ground-breaking work, exactly the kind of real-world-impact work we encourage our students to do” in technology science classes,” Latanya Sweeney, Professor of Government and Technology in Residence and Director of the Data Privacy Lab at the Institute for Quantitative Social Science, who serves as Editor-in-Chief of Technology Science, said.

“Thanks to Max’s work, several groups within the federal government are now actively making changes to combat these kinds of vulnerabilities,” she added.

Clea Simon is Harvard Correspondent of Harvard Gazette, in which the above article appeared on January 8,  2020.

Share this story

Related Stories

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Indian Newslink

Previous slide
Next slide

Advertisement

Previous slide
Next slide

Advertisement

Previous slide
Next slide

Advertisement

Previous slide
Next slide

Advertisement

Previous slide
Next slide

Advertisement

Advertisement

Previous slide
Next slide

Advertisement

Previous slide
Next slide

Advertisement

Previous slide
Next slide

Advertisement