Read Time:55 Second

According to the Senate Intelligence Committee report on Russian cyber-hacking of US election infrastructure, Russia’s military intelligence is specifically named by DHS as having targeted the systems of 16 different states. intelligence.senate.gov/sites/default/…

While bills to secure our elections get shot down … MoscowMitch

https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume1.pdf

VII.(U)SECURITY OF VOTING MACHINES

(U) TheCommitteereviewofRussianactivityin2016highlightedpotential vulnerabilitiesinmanyvotingmachines,withpreviousstudiesbysecurityresearcherstakingon new urgency and receiving new scrutiny. Although researchers have repeatedly demonstrated it ispossibletoexploitvulnerabilitiesinelectronicvotingmachinestoaltervotes, someelection officialsdisputewhethersuchattackswould befeasibleinthecontextofanactualelection.

• (U)Dr.AlexHalderman,ProfessorofComputerScienceattheUniversityofMichigan, testifiedbeforetheCommitteeinJune2017that”ourhighlycomputerizedelection infrastructureisvulnerabletosabotageandeventocyberattacksthatcouldchange votes. Dr. Halderman concluded,”Voting machines are not as distantfrom the internetasthey may seem.”-^’^

• (U)WhenState7decommissioneditsDirect-RecordingElectronic(DRE)voting machines in 2017,the IT director led an exercise in attempting to break into a few ofthe machinesusingtheaccessa”normal”voterwouldhaveinusingthemachines.”^^ The resultswerealarming:theprogrammed passwordonsomeofthemachineswasABC123, and thetesterswere abletoflipthe machinestosupervisor mode,disablethem,and”do enoughdamagetocalltheresultsintoquestion.”-^^ TheITdirectorsharedtheresults with State 21 and State 24, which were using similiar machines.”^’

• (U)In2017,DEFCON^®^researcherswereabletofindandexploitvulnerabilitiesinfive differentelectronicvotingmachines.-^^ The WinVote machines,thoserecently decertifiedbyState7,weremosteasilymanipulated. Oneattendeesaid,”Itjusttookusa couple of hours on Google to find passwords that let us unlock the administrative

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
%d bloggers like this: