Skip to main content

Student candidate allegedly hacks his own election results

Students Computers
Image used with permission by copyright holder

As reported by the North County Times, the FBI is investigating a case involving identity theft and election fraud that occurred at California State University San Marcos. During the election for the school’s student body president, approximately 700 student identifications with passwords were stolen and used to cast votes electronically for college junior Matthew Weaver. All students at the school receive a username and password in order to sign up for classes each semester in addition to using it to voting in school elections. Immediately after the school discovered the intrusion, they locked down all 700 accounts and issued a warning to the students that the security of the accounts had been compromised.

Matt WeaverOn March 15, Weaver was arrested for unlawful access to a computer or database, ten counts of identity theft and suspicion of election fraud. According to school officials, the investigation led police to Weaver after the school’s IT department after detecting unusual login activity at a specific computer on campus.

Recommended Videos

Weaver was found in possession of the computer in addition to “a device that can be used to steal computer passwords.” After Weaver was placed in jail on March 15, he posted a $50,000 bail on the following day. 

Following the discovery of the election tampering, the university threw out the results of the election and rescheduled a new election to occur during May 2012. University spokeswoman Margaret Lutz-Chantung said “The decision was to restart the process by scratch.” It’s unlikely that Weaver will be allowed to continue his education at California State University. 

In regards to the reasoning behind the FBI’s involvement with Weaver’s case, Special Agent Darrel Foxworth stated “We are looking into it. I can’t say exactly what we are looking at, but given the facts and circumstances that have been reported to us, it appears there may be violations of federal laws.” 

While this case is one of the first to involve a student using a computer for election fraud, incidents of computer savvy students using their expertise to alter absences, grades or test results have been increasing over the past year.

According to the San Francisco Chronicle, approximately 36 students have been suspended in regards to their involvement with hacking the school’s computer system in order to adjust student absences. Since the school’s attendance policy required teachers to dock the grades of students with three or more unexcused absences, a group of at least four students used an administrator password to alter absences for a fee. 

This group of students charged between $2 to $20 to change the absence number. A collection of the highest-achieving students took them up on the offer in order to preserve their grade point average. The school is working with local law enforcement regarding the incident and has already expelled at least two students. Other incidents of cheating around the country include standardized test fraud in New York where 19-year-old Samuel Eshaghoff collected up to $3,600 per test to take the SAT for other students and a test-stealing incident in San Jose last month where students broke into a teacher’s computer in order to steal answers to an upcoming test.  

Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more