Computerized Election Theft

Moderators: Elvis, DrVolin, Jeff

Re: Computerized Election Theft

Postby Elvis » Thu Jul 25, 2019 2:32 pm

More action is needed—quickly:

Pew Reseach


https://www.pewtrusts.org/en/research-a ... -their-own


Feds Don't Regulate Election Equipment, So States Are On Their Own
Stateline Article
July 10, 2019
By: Matt Vasilogambros Topics: Politics and Campaigns & Homeland Security
Read time: 6 min

Image
A Philadelphia investigator demonstrates new voting machines. Pennsylvania is one of several states replacing election equipment before the 2020 presidential election.
Matt Rourke/The Associated Press



Behind nearly every voter registration database, voting machine and county website that posts results on Election Day, there’s an election technology company that has developed those systems and equipment.

By targeting one of those private vendors, Russia, China or some other U.S. adversary could tamper with voter registration rolls, the ballot count or the publicly released results, potentially casting doubt on the legitimacy of the final tally.

Nevertheless, there are no federal rules requiring vendors to meet security standards, test equipment for vulnerabilities or publicly disclose hacking attempts. With the 2020 presidential election approaching, security experts, lawmakers and even election vendors themselves are calling for more rigorous testing of election equipment and stricter security standards for the private companies that provide election-related services.

“The lack of vendor regulation in the election technology space is a big gap that needs to be addressed,” said Edgardo Cortés, an election security expert at the Brennan Center for Justice at New York University Law School.

One of the many revelations from special counsel Robert Mueller’s report on foreign interference in the 2016 presidential election was that Russian military intelligence officers targeted employees of an election vendor that develops software that U.S. counties use to manage voter registration rolls.

Russians, according to the report, successfully installed malware on that company’s network. The name of the company was redacted, though according to reporting from The Intercept, the company was VR Systems, which maintains voter registration systems in eight states. The company has denied that Russians infiltrated its systems.

The threat did not stop after 2016, according to Maurice Turner, a senior technologist at the nonprofit Center for Democracy and Technology in Washington, D.C.

“The Mueller report is proof that targeting vendors is no longer a theoretical route,” said Turner, who worries that election technology companies are not rising to the challenge.

For example, election security experts have criticized Elections Systems & Software (ES&S), one of the largest election technology companies in the country, for installing software on 300 jurisdictions’ systems between 2000 and 2006 that was vulnerable to hackers. (The company will not disclose which jurisdictions were impacted.)

But the company notes that the vulnerable software hasn’t been used in more than a decade. It now submits its equipment to the U.S. Election Assistance Commission — a federal agency that serves as a resource for election administrators and vendors — for testing and certification. It also contracts with the Idaho National Lab, to assess whether its equipment can be penetrated, and the U.S. Department of Homeland Security, to scan its public-facing website.

ES&S is in a “very strong position going into 2020,” said Kathy Rogers, its senior vice president of government relations. But there should be even more testing, she said.

“People say there isn’t enough testing,” she told Stateline. “We agree.”

Hart InterCivic, another top election vendor, denied an interview to Stateline, but it pointed to an April letter it sent to Congress emphasizing that “protecting the integrity of elections is at the core of everything we do” and calling for more federal funding for election security.

But Richard DeMillo, a professor of computing at Georgia Tech University, says vendors that boast about taking new steps to secure their systems “are being disingenuous.”

“What they’re doing is giving the appearance of a company that is concerned about security,” he said, “but it doesn’t take much digging to see that they’re not.”

As an example, DeMillo pointed to last September’s Def Con hackers conference in Las Vegas, when ES&S lambasted researchers for publicly testing the company’s voting machines and publishing their vulnerabilities. The company at the time said foreign spies may have infiltrated the event. Researchers found several bugs in the software that left machines hackable.

Computing experts like DeMillo say independent public testing is essential to preventing foreign hacking in future elections.

Rogers of ES&S said her company is open to further testing, but that industry leaders, government officials and security experts should collaborate on hackathons.


Voluntary Security Requirements

Since 2017, the federal government has considered election systems to be critical infrastructure, just like nuclear facilities and public utilities.

While there are no federal mandates for election vendors, many states require vendors to follow voluntary guidelines from the U.S. Election Assistance Commission.

States can set security requirements during contract talks for new equipment. According to a 2018 analysis by the National Conference of State Legislatures, 38 states require some element of federal testing and certification of election systems before installing them in their state. In eight states, officials do not require that sort of testing or certification.

At the federal level, Republicans have resisted tougher regulations.

In June, the Democratic-led U.S. House passed an election security bill that would, among other measures, require backup paper ballots for all federal elections and add cybersecurity safeguards for election equipment and systems. The bill also would authorize $600 million in additional funding to states to boost security.

It garnered only one Republican vote, from U.S. Rep. Brian Mast of Florida. And GOP Senate Majority Leader Mitch McConnell of Kentucky has signaled his unwillingness to take up election security measures, long believing elections should remain a states’ issue.

Brennan’s Cortés, who served as Virginia’s commissioner of elections for four years until 2018, said that if the federal government won’t act, states and counties should push for security requirements in their contracts with private vendors.

A few days before the November midterms, Wayne County, which encompasses Detroit, said it would no longer use a vendor that failed to fix delays and accuracy issues that occurred in the primary.

And in February, Maryland announced it was cutting ties with an election vendor connected to a Russian oligarch. After investigating the company and its ties to Russia last year, the Department of Homeland Security found no evidence of foreign interference in the state’s election systems.

But Cortés acknowledged that many smaller counties lack the leverage to demand tougher security requirements for election vendors, in part because the industry is dominated by three companies: ES&S, Dominion Voting Systems and Hart InterCivic get 90% of the business.

Some critics have noted the close ties between these companies and election officials. The companies have covered travel expenses for industry meetings and formed customer advisory boards comprised of state and local election officials.

Rogers, at ES&S, said the procurement process is governed by “strict laws” at the federal and state levels, and the company makes sure they are “100 percent within those boundaries.”


Georgia Controversy

Similar criticisms have arisen in Georgia this year as the state decides which voting machines to use for future elections and which vendor will provide them.

Republican Gov. Brian Kemp signed a law in April to begin a search for a new statewide voting system. Georgia soon will be the only state in the country to conduct all its voting on touch-screen ballot-marking devices, which print a paper record.

But this has drawn the ire of a large contingent of election security experts, who say those machines are vulnerable to hacking and bugs that can alter votes. It is “impossible to make them perfectly secure,” DeMillo wrote in a recent paper.

Democratic state Sen. Elena Parent has been an outspoken critic not only of the “insecure” voting machines Georgia is preparing to purchase, but also of the contract process, which she said has been driven by “cronyism” and well-placed lobbyists. It leaves her with “a lot outstanding questions.”

“There’s a strong concern when it comes to something as fundamental as election security,” Parent told Stateline. “And anyone poo-pooing that is doing a disservice to the people that they represent.”

Until the $150 million contract for 27,000 new voting machines is awarded, Georgia officials have been tight-lipped on any special security measures they’ll negotiate with a vendor.

Tess Hammock, press secretary for Republican Secretary of State Brad Raffensperger, would not comment on questions related to the contract process nor on the importance of security standards in election administration. She referred questions to the office’s Request for Proposals document, which requires that any new hardware “must ensure security.”

The document mandates that suppliers provide a detailed overview of the company’s security protocols, software and cyber defenses of the products. The state also would have the power to conduct post-election audits using the new equipment, the document stipulates.

Beyond this, DeMillo said, there are no security requirements for software testing and notification of malicious breaches.

Georgia likely will announce its new election vendor in the next month, Hammock said. Four companies — Dominion Voting, ES&S, Hart InterCivic and Smartmatic — have submitted bids.

Meanwhile, a lawsuit seeking to change Georgia’s voting system to hand-marked paper ballots is moving forward in federal court. The plaintiffs in the suit, individual voters and a group called the Coalition for Good Governance allege the touch-screen voting machines are hackable.

“The purpose of studying economics is not to acquire a set of ready-made answers to economic questions, but to learn how to avoid being deceived by economists.” ― Joan Robinson
User avatar
Elvis
 
Posts: 7567
Joined: Fri Apr 11, 2008 7:24 pm
Blog: View Blog (0)

Re: Computerized Election Theft

Postby Grizzly » Thu Jul 25, 2019 9:05 pm

Sorry to interrupt the RUSSIARUSSIARUSSIA party, but...

https://www.businessinsider.com/israeli-hackers-gave-data-to-cambridge-analytica-2018-3
Israeli hackers reportedly gave Cambridge Analytica stolen private emails of two world leaders

Cambridge Analytica, the political-research company at the center of a massive Facebook-data scandal, received private emails of two world leaders from Israeli hackers.
In one instance, Israeli hackers brought a USB stick which included private information about a Nigerian opposition leader, who is now president, to Cambridge Analytica's offices.
The same Israeli cybersecurity team was reportedly hired again in early 2015, and obtained private information on a St. Kitts and Nevis politician who was elected prime minister.


Israeli hackers reportedly gave information from the hacked emails of two world leaders to Cambridge Analytica, the political-research company at the center of a massive Facebook-data scandal.

Cambridge Analytica received data from the hacked emails of Nigeria's now-President Muhammadu Buhari and now-Prime Minister of St. Kitts and Nevis Timothy Harris, during separate election campaigns in the countries, The Guardian reported, citing several ex-employees of the company.

The company's leadership reportedly encouraged use of the data, offered by Israeli hackers, with ousted CEO Alexander Nix, along with other senior directors, giving employees direction on how to handle the material.

Cambridge Analytica was reportedly paid £2 million ($2.8 million) in 2015 by a Nigerian billionaire to support a campaign to re-elect Goodluck Jonathan as president of Nigeria, according to the report.

"It was the kind of campaign that was our bread and butter," one ex-employee told The Guardian. "We're employed by a billionaire who's panicking at the idea of a change of government and who wants to spend big to make sure that doesn't happen."

Former Cambridge Analytica staff told The Guardian that they met Israeli cybersecurity agents in their London offices in early 2015.

According to the staff accounts, the hackers brought a USB stick reportedly filled with hacked personal emails, which included private information, including potential medical records, about then-Nigerian opposition leader Muhammadu Buhari, who is now president.

Staff members were alarmed by the information presented at the meeting, according to the report, which led them to refuse to implement the hacked data into their campaign.

The same Israeli cybersecurity team was reportedly hired again in early 2015, and obtained private information on St. Kitts and Nevis politician Timothy Harris, who was later elected prime minister.

In a previous incident, the parent group of Cambridge Analytica, SCL Group, reportedly used a £1 million ($1.4 million) bribe to help win an election for the St. Kitts and Nevis Labour Party, who was a client, in 2010.

SCL Group denied using stolen data from the individuals mentioned in The Guardian report.

Executives from Cambridge Analytica, which helped Donald Trump's 2016 presidential campaign, were caught on tape boasting about helping secure Trump's win.

Facebook recently suspended Cambridge Analytica for not destroying the private data of 50 million users it used to predict the behavior of individual American voters.
“The more we do to you, the less you seem to believe we are doing it.”

― Joseph mengele
User avatar
Grizzly
 
Posts: 4912
Joined: Wed Oct 26, 2011 4:15 pm
Blog: View Blog (0)

Re: Computerized Election Theft

Postby seemslikeadream » Fri Jul 26, 2019 8:23 am

Senate Republicans (Mitch McConnell) blocked two election security bills and a cybersecurity measure on Wednesday in the wake of Mueller's warning that Russia's interference in our elections is ongoing.

One thing being downplayed in coverage of McConnell's refusal to protect our elections: These are BIPARTISAN bills

repeating McConnell's bullshit about the bills being a big partisan hoax is not helpful

SANCTIONED RUSSIAN OLIGARCH'S COMPANY TO INVEST MILLIONS IN NEW ALUMINUM PLANT IN MITCH MCCONNELL'S STATE
https://www.newsweek.com/company-russia ... ll-1397061



Caroline Orr

New Senate Intelligence Committee report confirms that Russian hackers probed election systems in all 50 states in 2016.

Election infrastructure was successfully breached in two states, and voter data was accessed/obtained in Illinois.

https://www.intelligence.senate.gov/sit ... olume1.pdf



According to the Senate Intelligence report, Russian hackers accessed up to 200,000 voter registration records in Illinois, "resulting in the exfiltration of an unknown quantity of voter registration data", including names, addresses, partial SSN's, DOB's, & driver’s license #'s.
Image

The Senate intelligence report says there's no evidence that votes were altered as a result of Russia's probing of election infrastructure. It does note that Russia may have wanted their activities to be discovered in order to undermine confidence in election results.
Image
Image
https://twitter.com/RVAwonk/status/1154531259890061312



A Russian Oligarch Bought Maryland’s Election Vendor. Now These Senators Are Questioning the Rules

Letter to Rules Committee follows request to Treasury Secretary Mnuchin


Maryland’s Democratic senators want a Senate committee to require disclosures of foreign investments in U.S. election systems, an alarm bell set off by a Russian oligarch’s connection to their state’s voter registration system.

The request to the Rules and Administration Committee comes from Sen. Benjamin L. Cardin and Sen. Chris Van Hollen. Van Hollen is also the chairman of the Democratic Senatorial Campaign Committee.

The Maryland senators have been alarmed by a Russian oligarch’s investment connection to ByteGrid LLC, which handles the Old Line State’s voter registration database and candidate management operations.

“As the Rules Committee prepares to mark up the Secure Elections Act, we respectfully request that you sponsor an amendment requiring that an election infrastructure vendor submit a report to the Chair of the [Election Assistance Commission] and the Secretary of [the Department of Homeland Security] identifying any foreign national that directly or indirectly owns or controls the vendor, as well as any material change in ownership resulting in ownership or control by a foreign national,” Cardin and Van Hollen wrote Monday.

The letter, directed at Rules Chairman Roy Blunt of Missouri and ranking member Amy Klobuchar of Minnesota, comes ahead of a markup that is scheduled for Wednesday on improving physical election systems, including the promotion of verifiable paper trails.

“We also recently asked Treasury Secretary [Steven] Mnuchin to review the acquisition of ByteGrid in his role as Chairman of the Committee on Foreign Investment in the United States,” the Maryland Democrats wrote. “While we are hopeful that the Treasury Department’s review will be able to provide additional information about this specific transaction, we are concerned about the implications of this case for elections across the country.”

The request to review the ByteGrid case through the CFIUS process came in an Aug. 7 letter to the Treasury.

“Currently, CFIUS is authorized to review foreign investments in U.S. companies that result in foreign control of the company. If an investment poses a threat to national security, it can be blocked,” the senators wrote in the letter to Mnuchin. “If either AltPoint Capital or ByteGrid did not file a notice with CFIUS, the Committee has the ability to look back at any completed transaction that results in control and threatens national security and take steps to address the national security threat, including requiring divestment.”

Vladimir Potanin, the largest single investor in AltPoint, is among the richest men in Russia. He has appeared on a Treasury Department list of Russian oligarchs. Maryland officials were reportedly informed of the transaction in July, by the FBI.

https://www.rollcall.com/news/politics/ ... ht-russian



Georgia Election Officials Accused of Destroying Evidence
Image
(ATLANTA) — In a federal court filing, lawyers for election integrity advocates accuse Georgia election officials of intentionally destroying evidence that could show unauthorized access to the state election system and potential manipulation of election results.

Election integrity advocates and individual Georgia voters sued election officials in 2017 alleging that the touchscreen voting machines Georgia has used since 2002 are unsecure and vulnerable to hacking. In a court filing Thursday, they said state officials began destroying evidence within days of the suit’s filing and continued to do so as the case moved forward.

“The evidence strongly suggests that the State’s amateurish protection of critical election infrastructure placed Georgia’s election system at risk, and the State Defendants now appear to be desperate to cover-up the effects of their misfeasance — to the point of destroying evidence,” the filing says.

A spokeswoman for the secretary of state’s office, which oversees elections, denied the allegations.

The brief was filed Thursday as U.S. District Judge Amy Totenberg was holding a hearing on requests by the plaintiffs that she order the state to immediately stop using its current voting machines and switch to hand-marked paper ballots. That hearing is set to continue Friday.

In court Thursday, lawyers for the plaintiffs highlighted weaknesses identified in risk assessment reports by Fortalice Solutions, a cybersecurity firm hired by the secretary of state’s office. Fortalice CEO Theresa Payton testified that her team did find serious risks in their initial 2017 assessment but also said the secretary of state’s office had made progress toward fixing the problems by the time of a subsequent review last November.

The plaintiffs’ lawyers pointed out, however, that the assessment only covered general cybersecurity in the office and that Fortalice wasn’t asked to look at potential risks for election management systems or voting machines.

Judge Totenberg has previously expressed grave concerns about the vulnerability of the state’s election system and scolded state officials for being slow to respond to evidence of those problems, and on Thursday said she still has “worries about the integrity of the voting data system.”

Georgia’s voting system drew national scrutiny last year during the closely watched governor’s race in which Brian Kemp, a Republican who was the state’s top election official at the time, narrowly defeated Democrat Stacey Abrams.

A law passed this year and signed by Kemp provides specifications for a new system, which state officials said will be in place for the 2020 presidential election. But the state still plans to use the current machines for special and municipal elections this year and the plaintiffs fear the outdated machines will also be used in 2020 if a new system isn’t implemented in time.

Lawyers for the state have argued in court filings that new security measures have been put in place to protect the existing system, that the implementation of a new voting system addresses the judge’s concerns and that putting an intermediate hand-marked paper ballot system in place while the state is moving to a new voting system would be “an impossible burden” on state and local election officials.

In their brief Thursday, lawyers for the Coalition for Good Governance accused state officials of destroying computer servers from the Center for Election Systems at Kennesaw State University after a security hole there that exposed Georgia voters’ personal data and passwords used by county election officials was discovered. State lawyers then failed to ask the FBI for a copy of a forensic image the agency made of the server before it was wiped, despite saying they would, they say.

The brief also accuses state officials and their lawyers of deleting and overwriting data preserved on voting machine memories and on memory cards used to program the voting machines.

“After abundant notice of their well-known duty to preserve evidence, the State Defendants did not simply neglect to disable some automated purge function in their IT systems. Rather, they intentionally and calculatingly destroyed evidence,” the brief says. “Surely, to engage in conduct so odious that any junior lawyer would know it would expose them to sanctions, the evidence so disposed of must have been damning in the extreme.”

Secretary of state’s office spokeswoman Tess Hammock said allegations of destroying evidence are false.

“We look forward to vigorously defending ourselves from these spurious allegations meant to distract the Court from the fact that there is no evidence that supports plaintiffs’ outlandish theories,” she wrote in an email.

Many of the allegations stem from the time when Kemp was secretary of state before he became governor. Governor’s office spokeswoman, Candice Broce, declined to comment, referring questions to lawyers for state election officials, who also declined to comment.

https://time.com/5636354/georgia-offici ... -evidence/
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Computerized Election Theft

Postby seemslikeadream » Sat Jul 27, 2019 11:14 am

Mitch McConnell Received Donations from Voting Machine Lobbyists Before Blocking Election Security Bills
By Nicole Goodkind On 7/26/19 at 4:48 PM EDT
Senate Majority Leader Mitch McConnell squashed two bills intended to ensure voting security on Thursday, just one day after former special counsel Robert Mueller warned that Russians were attempting to sabotage the 2020 presidential elections "as we sit here."

McConnell said he wouldn't allow a vote on the bills because they were "so partisan," but, as previously reported, earlier this year McConnell received a slew of donations from four of the top voting machine lobbyists in the country.

"Clearly this request is not a serious effort to make a law. Clearly something so partisan that it only received one single solitary Republican vote in the House is not going to travel through the Senate by unanimous consent," said McConnell on the Senate floor.

The plans would likely burden the two largest electronic voting machine vendors in the United States, Election Systems & Software and Dominion Voting Systems, with new regulations and financial burdens. Together, the companies make up about 80 percent of all voting machines used in the country and both have far-reaching lobbying arms in Washington D.C. Many of those lobbyists have contributed to the McConnell campaign, reported Sludge last month, an investigative outlet that focuses on money in politics.

Sludge found that Brownstein Hyatt Farber Schreck lobbyist David Cohen, who has worked on behalf of Dominion Voting Systems this year, donated $2,000 to McConnell during this time. Brian Wild, who works with Cohen and has also lobbied Dominion, gave McConnell $1,000.

Contributions
FEC
Around the same time, on February 19 and March 4 Emily Kirlin and Jen Olson, who have lobbied on behalf of Election Systems & Software over the last year donated $1,000 to McConnell each.

Thursday's first bill, presented by Senate Minority Leader Chuck Schumer would authorize $775 million to bolster election security and require states to keep paper trails of all votes cast. The second, presented by Senator Richard Blumenthal, would require political candidates and their staff and family members to notify the FBI about any offers of assistance from foreign governments.

Election Systems & Software's CEO Tom Burt did speak in favor of creating paper trails for digital election systems and urged Congress to pass legislation requiring states to do so. Election Systems & Software has said it no longer sells machines without paperless ballots, so a rule change would benefit them.

Mitch McConnell
Senate Majority Leader Mitch McConnell (R-KY) answers questions at the U.S. Capitol on July 09, 2019 in Washington, DC. Win McNamee/Getty
"It's not surprising to me that Mitch McConnell is receiving these campaign contributions," the Brennan Center for Justice's Lawrence Norden told Sludge last month. "He seems single-handedly to be standing in the way of anything passing in Congress around election security, and that includes things that the vendors might want, like money for the states to replace antiquated equipment."

McConnell's actions seemed even more out of balance with his party, as the Senate Intelligence Committee⁠—led by Republicans⁠—released a report later on Thursday claiming Russians have targeted voting systems in all 50 states in 2016. Though there was no evidence votes were changed, in Illinois "Russian cyberactors were in a position to delete or change voter data."

In 2018, there were 14 states that used electronic voting systems in 2018 with no paper trail, that means that if votes were inaccurately tallied or machines malfunctioned, there would be no way to investigate or recover those votes. Voting machine companies are not currently subject to any federally-mandated security standards.

Morning Joe's Joe Scarborough slammed McConnell for blocking the votes Friday morning.

"He is aiding and abetting [Russian President] Vladimir Putin's ongoing attempts to subvert American democracy, according to the Republican FBI, CIA, DNI, intel committee," he said. "All Republicans are all saying Russia is subverting American democracy and Moscow Mitch won't even let the Senate take a vote on it. That is un-American."

https://www.newsweek.com/mitch-mcconnel ... ia-1451361
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Computerized Election Theft

Postby Elvis » Sat Jul 27, 2019 7:31 pm

From the Pew Reseach article I posted above:

By targeting one of those private vendors, Russia, China or some other U.S. adversary could tamper with voter registration rolls, the ballot count or the publicly released results, potentially casting doubt on the legitimacy of the final tally.


Infuriating that they omit the possibility—indeed greater likelihood—that American partisans would tamper.

Focusing exclusively on "Russia" and foreign powers generally is very dangerous. "We have met the enemy...."
“The purpose of studying economics is not to acquire a set of ready-made answers to economic questions, but to learn how to avoid being deceived by economists.” ― Joan Robinson
User avatar
Elvis
 
Posts: 7567
Joined: Fri Apr 11, 2008 7:24 pm
Blog: View Blog (0)

Re: Computerized Election Theft

Postby Marionumber1 » Sun Jul 28, 2019 2:57 am

Elvis » Sat Jul 27, 2019 4:31 pm wrote:Infuriating that they omit the possibility—indeed greater likelihood—that American partisans would tamper.


Yeah, although it is good to see election security concerns getting some mainstream play, there is a fundamental problem with how the issue is framed. Quite often, external hacking is presented as the only threat, ignoring the insiders who actually do have access to these systems and don't need to hack anything at all. Hackers getting control of these machines is a theoretical concern, while corporate vendors, private contractors, and election officials -- many of which have very suspect backgrounds -- are already known to be in control. Focus on the danger that is known to already be here before getting worked up about one that might appear.
Marionumber1
 
Posts: 374
Joined: Sat Jul 08, 2017 12:42 am
Blog: View Blog (0)

Re: Computerized Election Theft

Postby Elvis » Sun Jul 28, 2019 3:23 am

I wonder what portion of those news pieces are drawn from press releases written by the voting machine makers.

When I was a movie critic I could write a convincing review just from the press kit, without bothering to see the film. They make it real easy for you. Of course I never did that... :bigsmile
“The purpose of studying economics is not to acquire a set of ready-made answers to economic questions, but to learn how to avoid being deceived by economists.” ― Joan Robinson
User avatar
Elvis
 
Posts: 7567
Joined: Fri Apr 11, 2008 7:24 pm
Blog: View Blog (0)

Re: Computerized Election Theft

Postby seemslikeadream » Sun Jul 28, 2019 9:40 am

McConnell is BLOCKING election security bill ..why would he do that?

MITCH MCCONNELL RECEIVED DONATIONS FROM VOTING MACHINE LOBBYISTS BEFORE BLOCKING ELECTION SECURITY BILLS
https://www.newsweek.com/mitch-mcconnel ... ia-1451361


Bipartisan Senate panel concludes Russia penetrated all 50 States’ election systems and is poised to change vote tallies. But Trump & McConnell still block all defensive measures.

Sanctioned Russian Oligarch's Company to Invest Millions in New Aluminum Plant in Mitch McConnell's State
By Cristina Maza On 4/15/19 at 5:57 PM EDT
Rusal, the aluminum company partially owned by Russian oligarch Oleg Deripaska, announced plans to invest around $200 million to build a new aluminum plant in Kentucky just months after the Trump administration removed it from the U.S. sanctions list.

The new aluminum plant, slated to be built in the home state of Senate Majority Leader Mitch McConnell, will be the biggest new aluminum plant constructed in the U.S. in decades. Rusal will have a 40 percent stake in the facility.

"Rusal, one of the leading global aluminium producers, and Braidy Industries Inc., a U.S. base holding company which owns both Veloxint, an MIT-incubated lightweighting solutions company, and NanoAl, a Northwestern University incubated materials research and technology company, announce an intent to establish a joint project in Ashland, Kentucky, USA to produce flat-rolled aluminium products for the U.S. automotive industry," according to a company press release.

gettyimages-1137663471-594x594
Russian tycoon Oleg Deripaska speaks to the media outside his carmaker GAZ plant in Nizhny Novgorod on April 16, 2019. Kirill Kudryavtsev/AFP/Getty Images
The U.S. removed Rusal from its sanctions list in January, after the Treasury Department struck an agreement with the company that saw Deripaska, a close ally of Russian President Vladimir Putin, reduce his stake in the company to below 50 percent and lower his voting rights to below 35. The agreement requires the companies to report any contact between Deripaska and company affiliates, including members of the board.

McConnell was among the advocates for lifting sanctions on Rusal, arguing that the deal with Treasury would maintain pressure on Deripaska personally without disrupting global aluminum supplies.

Also on Monday, the public affairs company Mercury, which was hired by British Lord Gregory Barker to lobby for the oligarch's companies to be removed from the U.S. sanctions list, filed a letter under the Foreign Agents Registration Act describing how "the Barker plan permanently removed Oleg Deripaska from control" of his companies EN+ and Rusal. Barker is the executive chairman of Rusal and its parent company EN+.

"The Board will be two-thirds/one-third independent of Deripaska, Deripaska will not receive any dividends for as long as he remains subject to sanctions, and the Company and its operations will remain under the scrutiny of U.S. regulators," the document reads. "The agreement will allow the world's second largest producer of aluminum to stay out of Russian state or Chinese ownership."

Still, analysts have expressed concern that Deripaska, who was sanctioned in April 2018 for attempting to meddle in the U.S. elections, may still wield influence over his companies from behind the scenes.

The agreement struck with the Treasury Department gave the Swiss commodities firm Glencore, a company that has done business with Deripaska for years and whose CEO previously sat on Rusal's board, some of Deripaska's lost shares. The Russian bank VTB, nicknamed Putin's piggy bank, also got a stake in Deripaska's companies. Some experts have claimed that it is possible Deripaska could use his ties with these companies to exert some influence over Rusal.

Meanwhile, at least one of the trustees that the Office of Foreign Assets Control appointed to ensure that Deripaska does not exercise influence on the company's board is linked to a law firm that has worked with the oligarch and his companies for years.

Earlier this month, The New York Times reported the Treasury Department had allowed around $78 million worth of company shares to be transferred to a trust fund belonging to Deripaska's children, despite a previous statement from Treasury Secretary Steve Mnuchin claiming that the oligarch's children would "in no way benefit" from sanctions relief
https://www.newsweek.com/company-russia ... ll-1397061.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Computerized Election Theft

Postby Elvis » Thu Dec 19, 2019 12:12 pm

Again with the foreign connection, but the more coverage the better.

Time to nationalize the national elections—the machines and management and showing all work in real time.

-- Video at link --

https://www.nbcnews.com/news/all/chines ... t-n1104516

Chinese parts, hidden ownership, growing scrutiny: Inside America's biggest voting machine maker

Scrutiny of the U.S. election system, spurred by Russia’s interference in the 2016 election, has put Election Systems & Software in the political spotlight.

Dec. 19, 2019, 3:30 AM PST
By Ben Popken, Cynthia McFadden and Kevin Monahan

OMAHA, Neb. — Just off a bustling interstate near the border between Nebraska and Iowa, a 2,800-square-foot American flag flies over the squat office park that is home to Election Systems & Software LLC.

The nondescript name and building match the relative anonymity of the company, more commonly known as ES&S, which has operated in obscurity for years despite its central role in U.S. elections. Nearly half of all Americans who vote in the 2020 election will use one of its devices.

That’s starting to change. A new level of scrutiny of the U.S. election system, spurred by Russia’s interference in the 2016 election, has put ES&S in the political spotlight. The source of the nation’s voting machines has become an urgent issue because of real fears that hackers, whether foreign or domestic, might tamper with the mechanics of the U.S. voting system.

That has led to calls for ES&S and its competitors to reveal details about their ownership and the origins of the parts that make up their machines, some of which come from China.

But ES&S still faces questions about the company’s supply chain and the identities of its investors, although it has said it is entirely owned by Americans. And the results of its government penetration tests, in which authorized hackers try to break in so vulnerabilities can be identified and fixed, have yet to be revealed.

The secrecy of ES&S and its competitors has pushed politicians to send the companies letters requesting information on security, oversight, finances and ownership. This month, a group of Democratic politicians sent the private equity firms that own the major election vendors a letter asking them to disclose a range of information, including ownership, finances and research investments.

"The voting machine lobby, led by the biggest company, ES&S, believes they are above the law,” said Sen. Ron Wyden, D-Ore., a member of the Intelligence Committee who co-signed the letter. “They have not had anybody hold them accountable even on the most basic matters.”

ES&S Chief Executive Tom Burt dismissed criticism as inevitable and impossible to answer, but he called for greater oversight of the national election process.

“There are going to be people who have opinions from now until eternity about the security of the equipment, the bias of those companies who are producing the equipment, the bias of the election administrators who are conducting the election,” Burt said in an interview. “I can’t do anything to affect those people’s opinions.”

“What the American people need is a system that can be audited, and then those audits have to happen and be demonstrated to the American public,” Burt said. “That's what will cut through the noise.”


Supply chain questions

ES&S invited NBC News journalists into its headquarters, the first time it has done so for a national news organization. The walls were decorated with images of the Constitution and inspirational messages about quality control. In glass-walled rooms etched with the company’s patents, technicians tested machines under tight security.

Burt, a native Nebraskan, has called for federal regulations that would require voting machine companies to address some of the key questions posed to ES&S. In June, he wrote an op-ed article asking Congress for more regulation, which would include requirements for paper backups of individual votes, mandatory post-election audits and more resources for the U.S. Election Assistance Commission to speed improvements.

NBC News examined publicly available online shipping records for ES&S for the past five years and found that many parts, including electronics and tablets, were made in China and the Philippines, raising concerns about technology theft or sabotage.

During the tour, Burt said the overseas facilities are “very secure.” He said the final assembly of voting machines takes place in the United States.

Chinese manufacturers can be forced to cooperate with requests from Chinese intelligence officials to share any information about the technology and therefore pose a risk for U.S. companies, said NBC News analyst Frank Figliuzzi, a former assistant director of the FBI for counterintelligence. That could include intellectual property, such as source code, materials or blueprints. There is also the concern of machines’ being shipped with undetected vulnerabilities or backdoors that could allow tampering.

In a letter to NBC News, ES&S said it takes “great care” with its foreign supply chain, including conducting risk assessments of and making on-site visits to suppliers to make sure that components “are trusted, tested and free of malware.” It said that all of its facilities adhere to international standards, that it manufactures in compliance with all federal guidelines and that it follows cybersecurity best practices.

The company says that its overseas manufacturing site has been successfully audited by the Federal Election Assistance Commission and that the company conducts on-site visits of its suppliers “to ensure that components are trusted, tested and free of malware.”

“Some components (such as surface mount capacitors, resistors, inductors and fixed logic devices) may be sourced from China-based manufacturers,” the letter said, referring to basic circuitry components.

ES&S said it conducts end-to-end quality assurance tests on the machines.


Ownership questions

Questions about who owns the major voting machine manufacturers have followed the industry for years.

The issue took on greater urgency after the FBI disclosed in July 2018 that a Russian oligarch had invested in a Maryland election services firm. Officials in Maryland and North Carolina have started questioning voting machine makers about potential foreign ownership.

Because it is privately owned, ES&S is not legally obligated to reveal its ownership or any other details about its finances, although Burt did confirm that the company generated about $100 million in sales last year.

But in response to questions this year from the North Carolina State Board of Elections, ES&S disclosed which investors own more than 5 percent of the company. They include Burt, Chief Financial Officer Tom O’Brien and the Omaha-based private equity firm McCarthy Group, which owns a controlling interest. The letter identified two passive investors, Nancy McCarthy and Kenneth Stinson, who own stakes of more than 5 percent in McCarthy Group.

ES&S said McCarthy Group’s bylaws prevented it from revealing other individual investors, but it affirmed that they are all U.S. citizens or trusts or are corporations owned by Americans. The company offered to pay for an independent auditor to verify that all the investors are Americans. NBC News declined, as citizenship itself wouldn’t answer other potential questions, including political affiliations or other conflicts of interest.

McCarthy Group did not respond to NBC News’ requests for comment.


Testing questions

Virtually no laws govern the cybersecurity aspects of voting machine technologies. But ES&S points to its voluntary efforts to improve voting machine security, most notably a new program with the Energy Department’s Idaho National Labs, the same federal facility that tests the power grid and nuclear power generators. ES&S machines underwent eight weeks of vulnerability testing and penetration by government hackers.

Chris Wlaschin, head of systems security for ES&S, said at the cybersecurity summit in September that the company’s machines are not prone to a remote attack over the internet. But he added that someone with enough time and access could make a machine “inoperative or unusable.”

Although Wlaschin said the company would release an executive summary of the government testing, the company recently said it has nothing for “external release.” It said recommendations from the tests would be incorporated into “future voting system releases.”

Wyden said he was concerned by the company’s foreign parts supply and was working on legislation to limit it.

“What you have found is particularly important because of the China connection,” he said.

Wyden is also eager to see the Idaho National Lab findings.

“They’re claiming that the Department of Homeland Security has been working with them. I’m going to ask for this information on the basis of your report within 10 days,” he said.

Eddie Perez, global director of technology development for the Open Source Election Technology Institute, a nonprofit election technology research group with which NBC News has partnered since 2016, said the lack of oversight is problematic.

“The way people vote is managed by a couple of entities that people don’t know a lot about, and that creates risks for the country,” he said.

When it comes down to the essentials, voting machine makers “behave based on the level of regulation they have,” Perez said.

“They have to check the boxes,” he added. “But once they’ve done that, they focus on selling their product.”


Image
Senior Vice President of Government Relations Kathy Rogers and Vice President of Systems Security Chris Wlaschin.Scott Morgan / for NBC News

-----

Ben Popken is an NBC News Senior Business reporter.

Cynthia McFadden is the senior legal and investigative correspondent for NBC News.

Kevin Monahan is a producer for the NBC News Investigative Unit.

“The purpose of studying economics is not to acquire a set of ready-made answers to economic questions, but to learn how to avoid being deceived by economists.” ― Joan Robinson
User avatar
Elvis
 
Posts: 7567
Joined: Fri Apr 11, 2008 7:24 pm
Blog: View Blog (0)

Re: Computerized Election Theft

Postby Elvis » Sat Jan 11, 2020 4:00 am

Several videos at link.

https://www.nbcnews.com/politics/electi ... g-n1112436

'Online and vulnerable': Experts find nearly three dozen U.S. voting systems connected to internet
A team of election security experts used a “Google for servers” to challenge claims that voting machines do not connect to the internet and found some did.

Jan. 10, 2020, 3:36 PM PST
By Kevin Monahan, Cynthia McFadden and Didi Martinez

It was an assurance designed to bolster public confidence in the way America votes: Voting machines “are not connected to the internet.”

Then Acting Undersecretary for Cybersecurity and Communications at the Department of Homeland Security Jeanette Manfra said those words in 2017, testifying before Congress while she was responsible for the security of the nation’s voting system.

So many government officials like Manfra have said the same thing over the last few years that it is commonly accepted as gospel by most Americans. Behind it is the notion that if voting systems are not online, hackers will have a harder time compromising them.

But that is an overstatement, according to a team of 10 independent cybersecurity experts who specialize in voting systems and elections. While the voting machines themselves are not designed to be online, the larger voting systems in many states end up there, putting the voting process at risk.

That team of election security experts say that last summer, they discovered some systems are, in fact, online.

“We found over 35 [voting systems] had been left online and we’re still continuing to find more,” Kevin Skoglund, a senior technical advisor at the election security advocacy group National Election Defense Coalition, told NBC News.

“We kept hearing from election officials that voting machines were never on the internet,” he said. “And we knew that wasn't true. And so we set out to try and find the voting machines to see if we could find them on the internet, and especially the back-end systems that voting machines in the precinct were connecting to to report their results.”

Skoglund and his team developed a tool that scoured the internet to see if the central computers that program voting machines and run the entire election process at the precinct level were online. Once they had identified such systems, they contacted the relevant election officials and also provided the information to reporter Kim Zetter, who published the findings in Vice’s Motherboard in August.

The three largest voting manufacturing companies — Election Systems &Software, Dominion Voting Systems and Hart InterCivic — have acknowledged they all put modems in some of their tabulators and scanners. The reason? So that unofficial election results can more quickly be relayed to the public. Those modems connect to cell phone networks, which, in turn, are connected to the internet.

The largest manufacturer of voting machines, ES&S, told NBC News their systems are protected by firewalls and are not on the “public internet.” But both Skoglund and Andrew Appel, a Princeton computer science professor and expert on elections, said such firewalls can and have been breached.

“AT&T and Verizon and so on try and protect as best they can the security of their phone network from the rest of the internet, but it’s still part of the internet,” Appel explained. “There can still be security holes that allow hackers to get into the phone network.”

The 35 systems Skoglund’s team found represent a fraction of total voting systems nationwide, though he believes they only captured a portion of the systems that are or have been online. Earlier this week, Skoglund showed NBC three election systems were still online even after officials had been told they were vulnerable.

For election systems to be online, even momentarily, presents a serious problem, according to Appel.

“Once a hacker starts talking to the voting machine through the modem, the hacker cannot just change these unofficial election results, they can hack the software in the voting machine and make it cheat in future elections,” he said.

The National Institute of Standards and Technology, which provides cybersecurity frameworks for state and local governments and other organizations, recommends that voting systems should not have wireless network connections.

All the systems Skoglund’s group found online were manufactured by ES&S. The online systems were found in 11 states, in at least some precincts, as well as in the District of Columbia. The states were: Florida, Wisconsin, Michigan, Rhode Island, Illinois, Indiana. Kentucky, Minnesota, Massachusetts, Nebraska and Mississippi.

While the company’s website states that “zero” of its voting tabulators are connected to the internet, ES&S told NBC News 14,000 of their DS200 tabulators with online modems are currently in use around the country.

NBC News asked the two other major manufacturers how many of their tabulators with modems were currently in use. Hart said that it has approximately 1,600 such tabulators in use in 11 counties in Michigan. Dominion did not respond to numerous requests from NBC News for their sales numbers.
'Vulnerable to hacking'

With the 2020 presidential election only ten months away, Appel and Skoglund believe all modems can and should be removed from election systems.

“Modems in voting machines are a bad idea,” said Appel. “Those modems that ES&S [and other manufacturers] are putting in their voting machines are network connections, and that leaves them vulnerable to hacking by anybody who can connect to that network.”

The state of Michigan is currently grappling with this issue. Since the 2016 election, Michigan authorized $82 million dollars to upgrade its election systems. Some of that money was spent on tabulators with wireless modems. But now, some state officials worry that the machines may pose a security risk and are pushing to have the modems removed.

Others are not so sure, and the state has set up an advisory committee.

Jake Rollow, director of communications for the Michigan Department of State, said in a statement to NBC News, “Even though the results are unofficial, if these unofficial results were disrupted or manipulated, it could still cause confusion on Election Day.”

"The department will consider the advisory commission’s recommendations to improve the security of the process," Rollow continued. "The specific steps taken would depend on the recommendation and the timeline required to make changes effectively.”

Last fall, when ES&S gave NBC News an exclusive tour at its headquarters in Omaha, Neb., Chief Executive Officer Tom Burt defended using modems when asked about the Sprint and Verizon modems seen in ES&S's testing area.

“There’s a small percentage of jurisdictions in the country -- a lot of them are in Florida -- who have decided they want to modem unofficial results to the election office,” he said. “Generally speaking, the media in those locations are kinda clamoring to get unofficial results as quickly as possible.”

When asked if the desire for speed was at odds with accuracy and security, Burt said, “it’s not my place to judge that.”

NBC News reached out to the Department of Homeland Security, which declined to comment on the topic of modem security in voting machine tabulators and scanners.
'Inviting trouble'

Critics also argue ES&S has mislead jurisdictions into thinking their DS200 tabulators with modems are certified by the U.S. Election Assistance Commission, a claim they say is grounds for an investigation.

In a letter obtained by NBC News sent to the EAC on Tuesday, the campaign finance reform nonprofit Free Speech for People and the National Election Defense Coalition asked the agency to look into whether ES&S violated agency regulations by implying that DS200 voting machines with modems are EAC certified.

“ES&S has repeatedly advertised its DS200 with internal modem — a critical component to ES&S’s voting systems — as being EAC certified when, in fact, it is not,” the letter said. “We therefore again respectfully request that EAC investigate and take action to correct this serious issue.”

“Once you add that modem, you are de-certifying it,” Skoglund said. “It is no longer federally certified. And I don't know that all these jurisdictions are aware of that because ES&S is advertising otherwise.”

But Skogland points to some good news. He believes there is time to make real change before the 2020 election.

“We should be unplugging all of these machines from the internet,” Skoglund said. “Even for elections nights.”

Appel agreed. “We can not make our computers perfectly secure," he said. "What we should do is remove all of the unnecessary, hackable pathways, such as modems. We should not connect our voting machines directly to the computer networks. That is just inviting trouble.”

These two tech experts also agree on the path forward, saying they are comforted by the fact that most Americans will vote this year on hand-marked paper ballots which are counted by machine and can be recounted by hand if the situation warrants.

The machines America votes on seem to be capturing the interest of some in Congress. The House Committee on Administration held a congressional hearing yesterday which was the first time the heads of the three major vendors, representing at least 80 percent of U.S. voting machines, appeared together for questioning. While lawmakers questioned them about foreign influence in their supply chains and whether they would comply with more federal reporting requirements, the presence of modems in some of their tabulators was mentioned but not pursued.

“The purpose of studying economics is not to acquire a set of ready-made answers to economic questions, but to learn how to avoid being deceived by economists.” ― Joan Robinson
User avatar
Elvis
 
Posts: 7567
Joined: Fri Apr 11, 2008 7:24 pm
Blog: View Blog (0)

Re: Computerized Election Theft

Postby stickdog99 » Tue Jul 28, 2020 1:06 pm

stickdog99
 
Posts: 6600
Joined: Tue Jul 12, 2005 5:42 am
Blog: View Blog (0)

Re: Computerized Election Theft

Postby conniption » Fri Nov 13, 2020 1:00 am

(the link works, but for some reason the video doesn't post... wonder why??)




* https://www.youtube.com/watch?v=Ztu5Y5obWPk


Dr.SHIVA LIVE: MIT PhD Analysis of Michigan Votes Reveals Unfortunate Truth of U.S. Voting Systems.
604,457 views
•Streamed live on Nov 10, 2020

Dr. Shiva Ayyadurai
205K subscribers
Dr.SHIVA LIVE: MIT PhD Analysis of Michigan Votes Reveals Unfortunate Truth of U.S. Voting Systems.

Dr.SHIVA Ayyadurai, MIT PhD, the Inventor of Email, Scientist, Engineer, shares the results of his team's mathematical analysis of four major counties votes in Michigan in the Trump-Biden election that reveals an unfortunate truth of U.S. voting systems. The analysis raises important questions for Election Integrity.

Dr.SHIVA is joined by two special guests.



Edit:

Evidently Dr. Shiva ran for the Senate as a write-in...


https://www.youtube.com/watch?v=dmn6OqaxcjI

Edited again...thx Ben.
Last edited by conniption on Fri Nov 13, 2020 3:51 am, edited 1 time in total.
conniption
 
Posts: 2480
Joined: Sun Nov 11, 2012 10:01 pm
Blog: View Blog (0)

Re: Computerized Election Theft

Postby BenDhyan » Fri Nov 13, 2020 2:22 am

* Conniption, you only use the code after the equal sign (bolded), erase the rest..

[youtube]https://www.youtube.com/watch?v=Ztu5Y5obWPk[/youtube]

Ben D
User avatar
BenDhyan
 
Posts: 953
Joined: Wed Apr 12, 2017 8:11 pm
Location: Australia Gold Coast
Blog: View Blog (0)

Re: Computerized Election Theft

Postby conniption » Fri Nov 13, 2020 3:43 am

^^^ lol, okay, I'm a dope. Will fix.
conniption
 
Posts: 2480
Joined: Sun Nov 11, 2012 10:01 pm
Blog: View Blog (0)

Re: Computerized Election Theft

Postby stickdog99 » Thu Dec 03, 2020 8:56 pm

So who here has even heard of Trump's recent speech to require hand counting of all the votes in our elections?



Wow. I finally found something that I agree with Trump on 100%! Sure, this statement was embedded in a bunch of self-aggrandizing carping about the 2020 election results, but when you are 100% right about something, you are 100% right. This should not be a partisan issue.

Hmmm. Why aren't any of our major media outlets discussing this bombshell? Why are advocates of hand counted paper ballots completely dismissed in this country when so many scored of other countries have rightfully made fraud-o-matic black box voting machines illegal?

It's weird that so many of us have somehow been trained to consider unthinkable something that so many other countries manage to do every election.

I mean, electronic vote counting was rightly deemed unconstitutional in Germany. France rightly disallowed it because of cybersecurity concerns. Ireland recently got rid of all of its voting machines. Even Kazakhstan's citizens are intelligent enough to demand that their paper and ink ballots are counted by hand.

Of all the nations of the world, only the USA, Belgium, Brazil, Estonia, the Philippines, South Korea, the UAE, and Venezuela allow proprietary fraud-o-matic machines to count the votes in their national elections, at least as far as I can tell.

Hmmm. How do all these other countries (Germany, Canada, France, Ireland, Italy, Denmark, Finland, etc., etc.,) manage to do something so inconceivable as to ensure the integrity of their democracy?
stickdog99
 
Posts: 6600
Joined: Tue Jul 12, 2005 5:42 am
Blog: View Blog (0)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 144 guests