According to the Senate Intelligence Committee report on Russian cyber-hacking of US election infrastructure, Russia’s military intelligence is specifically named by DHS as having targeted the systems of 16 different states. intelligence.senate.gov/sites/default/…

While bills to secure our elections get shot down … MoscowMitch

https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume1.pdf

VII.(U)SECURITY OF VOTING MACHINES

(U) TheCommitteereviewofRussianactivityin2016highlightedpotential vulnerabilitiesinmanyvotingmachines,withpreviousstudiesbysecurityresearcherstakingon new urgency and receiving new scrutiny. Although researchers have repeatedly demonstrated it ispossibletoexploitvulnerabilitiesinelectronicvotingmachinestoaltervotes, someelection officialsdisputewhethersuchattackswould befeasibleinthecontextofanactualelection.

• (U)Dr.AlexHalderman,ProfessorofComputerScienceattheUniversityofMichigan, testifiedbeforetheCommitteeinJune2017that”ourhighlycomputerizedelection infrastructureisvulnerabletosabotageandeventocyberattacksthatcouldchange votes. Dr. Halderman concluded,”Voting machines are not as distantfrom the internetasthey may seem.”-^’^

• (U)WhenState7decommissioneditsDirect-RecordingElectronic(DRE)voting machines in 2017,the IT director led an exercise in attempting to break into a few ofthe machinesusingtheaccessa”normal”voterwouldhaveinusingthemachines.”^^ The resultswerealarming:theprogrammed passwordonsomeofthemachineswasABC123, and thetesterswere abletoflipthe machinestosupervisor mode,disablethem,and”do enoughdamagetocalltheresultsintoquestion.”-^^ TheITdirectorsharedtheresults with State 21 and State 24, which were using similiar machines.”^’

• (U)In2017,DEFCON^®^researcherswereabletofindandexploitvulnerabilitiesinfive differentelectronicvotingmachines.-^^ The WinVote machines,thoserecently decertifiedbyState7,weremosteasilymanipulated. Oneattendeesaid,”Itjusttookusa couple of hours on Google to find passwords that let us unlock the administrative

By Treadstone 71

@Treadstone71LLC Cognitive Warfare Training, Intelligence and Counterintelligence Tradecraft, Influence Operations, Cyber Operations, OSINT,OPSEC, Darknet, Deepweb, Clandestine Cyber HUMINT, customized training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, Disinformation detection, Analysis as a Service