How I hacked the government (it was easier than you may think)
Though no expert coder, a government concentrator uses bots to show an agency its website vulnerability
Max Weiss ’20 never intended to hack the government. His discovery of how easy it is to do — outlined in a new paper he authored — came of the best of intentions.
Weiss, a government concentrator from Cincinnati, was doing advocacy work for state expansion and defense of Medicaid last summer, a project that combined his interests in public policy and health care. While studying the ways in which various advocacy groups can influence pending legislation, he learned how valuable such groups find the federal government’s comment period, when members of the public are invited to weigh in on new or pending legislation via online forms. He realized how easy it would be to manipulate the results using bots — computer programs that generate automated responses — to flood the sites with fake responses for or against any proposal.
The 21-year-old detailed his findings in a recent Technology Science piece, “Deepfake Bot Submissions to Federal Public Comment Websites Cannot Be Distinguished from Human Submissions.”
“We were spending a lot of time and energy getting high-quality comments from constituents,” said Weiss. “I wanted to make sure these federal agencies understood the potential consequences of their policies, and I had the idea that I could use a bot and submit a lot of fake comments.”
He paused, recognizing that corrupting the process was fraught: “This would be bad for democracy.”
But the Leverett House resident couldn’t shake the idea, and he began to research the feasibility of such a scheme. Turns out submission is easy to automate. Federal agencies have some leeway to discount comments that are obviously duplicated or irrelevant. But the typical technological defenses against attack, including CAPTCHAS, anomaly detection, and outside verification — all of which are integrated into online activity from banking to email log-in — were pretty much absent.
“One of the very important findings from the study is that someone like me who’s a very novice coder was able to Google his way through hacking the government.”
Max Weiss
“Most of those websites really just have a text box for your public comments and then a submit button,” he said.
In the course of writing the Tech Science paper, Weiss realized that cybersecurity experts have been sounding the alarm on federal website vulnerability for years, but previous transgressions had used relatively unsophisticated substitution methods. “In 2017, there were 22 million comments posted for the FCC proposal to repeal net neutrality,” he recalled. “And it was found that 96 percent of those were part of duplicative campaigns.”
Weiss used AI methods to generate a high volume of unique Deepfake comments about a proposed Medicaid waiver. He then wrote a program that automated the submission process, and ran it from a laptop in his dorm room over the course of a few days. He submitted more than 1,000 fake comments that comprised 55 percent of the total submissions and that were found by survey respondents to be indistinguishable from human comments. Afterward, he notified the federal Centers for Medicare and Medicaid Services which comments were part of his demonstration to prevent their interference with authentic public comment evaluation.
Among the scarier revelations was Weiss’ admission that he was successful without being an expert coder and without special equipment. “I’ve learned to code in the last four years, just through a series of personal projects and summer jobs, and one class,” said Weiss, who has taken some courses in the new program in technology science. “I think one of the very important findings from the study is that someone like me who’s a very novice coder was able to Google his way through hacking the government.
“I’ve always been very interested in public policy,” said Weiss, who also enjoys writing and performing comedy. “Most of my government study has been in health policy or in technology policy or public interest technology, so this was just kind of a synthesis of a lot of different things that I’d learned in the Government Department and just some personal tech projects that I have done in the past.”
“Max did groundbreaking work, exactly the kind of real-world-impact work we encourage our students to do” in technology science classes, said Latanya Sweeney, professor of government and technology in residence and director of the Data Privacy Lab at the Institute for Quantitative Social Science, who serves as editor-in-chief of Technology Science.
“Thanks to Max’s work, several groups within the federal government are now actively making changes to combat these kinds of vulnerabilities,” she added.