Announcement

Collapse
No announcement yet.

Republicans Like Their Elections Ultra-Hackable

Collapse
  • Filter
  • Time
  • Show
Clear All
new posts

  • #11
    Originally posted by DoubleLeftH00k View Post
    Nah there was no proof our system is hackable

    But there is proof illegal rusians can easily vote without being required IDs
    Or Mexicans but thats ok in some people's books.

    Comment


    • #12
      Originally posted by man down View Post
      All this concern and Dems want non citizens to vote.



      Right, so concerned about election meddling, but are outraged over voter ID laws.

      Also for posting a TYT video as some sort of legitimate opinion.

      Comment


      • #13
        Originally posted by DoubleLeftH00k View Post
        Nah there was no proof our system is hackable

        But there is proof illegal rusians can easily vote without being required IDs



        There is proof that republicans don't want to spend more money on protecting the election after there is evidence of previous meddling.

        Comment


        • #14
          Originally posted by Zero Delay View Post
          There is proof that republicans don't want to spend more money on protecting the election after there is evidence of previous meddling.
          Why spend money on something that has no proof?

          Spend money on voter ID its proven to be a loophole that rusian can explore

          Comment


          • #15
            Originally posted by DoubleLeftH00k View Post
            Why spend money on something that has no proof?

            Spend money on voter ID its proven to be a loophole that rusian can explore



            State elections systems still hackable, report

            by Robert Abel, Content Coordinator/Reporter
            4-5 minutes



            U.S. State Election Systems are increasingly at risk of suffering cyberattacks allowing adversaries to influence particular races and delegitimize elections.
            U.S. state election systems are increasingly at risk of suffering cyberattacks allowing adversaries to influence particular races and delegitimize elections.


            Recent data breaches, vulnerable voting machines, inconsistent security practices a complex decentralized election system provide several attack vectors for attackers looking to influence elections, according to FireEye's "Attacking the Ballot Box" report.


            “Although we have not observed attacks against elections infrastructure as of March 2018, malicious actors and nation states likely already have an understanding of the flaws in the US elections infrastructure and will seek to exploit opportunities where they can,” researchers said in the report.



            “Ensuring a holistic approach to security that considers adversary intent and TTPs will allow forward-leaning states and municipalities to reduce their risk exposure and preserve the integrity of the election process.”


            Researchers warn attackers can disrupt elections before ballots are even cast by blocking access to online registration, corrupting data to disqualify voters, and by deleting records.


            Attackers could also prevent voters from going to the polls by launching DDoS attacks against sites which inform voters of their polling locations to diminish voter turnout.


            Researchers warn attackers could corrupt elections by targeting Election Management Systems (EMS) are software that aggregate votes from individual voting machines across counties or even states as the machines are susceptible to remote, network-based attacks, such as from a voting machine, programmer machine or even the Internet.


            In addition to the threat of the EMS's being hacked, many of the computers running them often have outdated and unpatched software as the machines seldom follow recommending security practices for authentication or encryption.


            Voters themselves also face the risk of their own information being recycled as there have been several voter database breaches since the beginning of 2016. These databases often include names, dates of birth, and social security numbers leaving them vulnerable to spearphishing attacks or identity theft.


            In order to combat these threats researchers recommend officials keep a regular back-up of the voter database in a secure location, track for large-scale changes to voter databases, and, maintain and regularly patch voter registration websites.


            In addition, officials should ensure that the security within the organizations behind the state websites have established DDoS mitigation protocols, both within their own servers and with their ISP that include backup servers, rate limits and filters to drop packets, and heightened monitoring of website traffic.


            https://www.scmagazine.com/state-ele...rticle/770533/

            Comment


            • #16
              Originally posted by Zero Delay View Post
              State elections systems still hackable, report

              by Robert Abel, Content Coordinator/Reporter
              4-5 minutes



              U.S. State Election Systems are increasingly at risk of suffering cyberattacks allowing adversaries to influence particular races and delegitimize elections.
              U.S. state election systems are increasingly at risk of suffering cyberattacks allowing adversaries to influence particular races and delegitimize elections.


              Recent data breaches, vulnerable voting machines, inconsistent security practices a complex decentralized election system provide several attack vectors for attackers looking to influence elections, according to FireEye's "Attacking the Ballot Box" report.


              “Although we have not observed attacks against elections infrastructure as of March 2018, malicious actors and nation states likely already have an understanding of the flaws in the US elections infrastructure and will seek to exploit opportunities where they can,” researchers said in the report.



              “Ensuring a holistic approach to security that considers adversary intent and TTPs will allow forward-leaning states and municipalities to reduce their risk exposure and preserve the integrity of the election process.”


              Researchers warn attackers can disrupt elections before ballots are even cast by blocking access to online registration, corrupting data to disqualify voters, and by deleting records.


              Attackers could also prevent voters from going to the polls by launching DDoS attacks against sites which inform voters of their polling locations to diminish voter turnout.


              Researchers warn attackers could corrupt elections by targeting Election Management Systems (EMS) are software that aggregate votes from individual voting machines across counties or even states as the machines are susceptible to remote, network-based attacks, such as from a voting machine, programmer machine or even the Internet.


              In addition to the threat of the EMS's being hacked, many of the computers running them often have outdated and unpatched software as the machines seldom follow recommending security practices for authentication or encryption.


              Voters themselves also face the risk of their own information being recycled as there have been several voter database breaches since the beginning of 2016. These databases often include names, dates of birth, and social security numbers leaving them vulnerable to spearphishing attacks or identity theft.


              In order to combat these threats researchers recommend officials keep a regular back-up of the voter database in a secure location, track for large-scale changes to voter databases, and, maintain and regularly patch voter registration websites.


              In addition, officials should ensure that the security within the organizations behind the state websites have established DDoS mitigation protocols, both within their own servers and with their ISP that include backup servers, rate limits and filters to drop packets, and heightened monitoring of website traffic.


              https://www.scmagazine.com/state-ele...rticle/770533/
              Wow the Russians must really suck. They couldnt even hack the system.

              Comment


              • #17
                Originally posted by Zero Delay View Post
                State elections systems still hackable, report

                by Robert Abel, Content Coordinator/Reporter
                4-5 minutes



                U.S. State Election Systems are increasingly at risk of suffering cyberattacks allowing adversaries to influence particular races and delegitimize elections.
                U.S. state election systems are increasingly at risk of suffering cyberattacks allowing adversaries to influence particular races and delegitimize elections.


                Recent data breaches, vulnerable voting machines, inconsistent security practices a complex decentralized election system provide several attack vectors for attackers looking to influence elections, according to FireEye's "Attacking the Ballot Box" report.


                “Although we have not observed attacks against elections infrastructure as of March 2018, malicious actors and nation states likely already have an understanding of the flaws in the US elections infrastructure and will seek to exploit opportunities where they can,” researchers said in the report.



                “Ensuring a holistic approach to security that considers adversary intent and TTPs will allow forward-leaning states and municipalities to reduce their risk exposure and preserve the integrity of the election process.”


                Researchers warn attackers can disrupt elections before ballots are even cast by blocking access to online registration, corrupting data to disqualify voters, and by deleting records.


                Attackers could also prevent voters from going to the polls by launching DDoS attacks against sites which inform voters of their polling locations to diminish voter turnout.


                Researchers warn attackers could corrupt elections by targeting Election Management Systems (EMS) are software that aggregate votes from individual voting machines across counties or even states as the machines are susceptible to remote, network-based attacks, such as from a voting machine, programmer machine or even the Internet.


                In addition to the threat of the EMS's being hacked, many of the computers running them often have outdated and unpatched software as the machines seldom follow recommending security practices for authentication or encryption.


                Voters themselves also face the risk of their own information being recycled as there have been several voter database breaches since the beginning of 2016. These databases often include names, dates of birth, and social security numbers leaving them vulnerable to spearphishing attacks or identity theft.


                In order to combat these threats researchers recommend officials keep a regular back-up of the voter database in a secure location, track for large-scale changes to voter databases, and, maintain and regularly patch voter registration websites.


                In addition, officials should ensure that the security within the organizations behind the state websites have established DDoS mitigation protocols, both within their own servers and with their ISP that include backup servers, rate limits and filters to drop packets, and heightened monitoring of website traffic.


                https://www.scmagazine.com/state-ele...rticle/770533/
                Still no proof of being hacked

                Comment


                • #18
                  Originally posted by DoubleLeftH00k View Post
                  Still no proof of being hacked



                  Proof of a weak security system where it can be exploited and a government who opposes protecting the American electoral process.

                  Comment


                  • #19
                    Originally posted by Zero Delay View Post
                    Proof of a weak security system where it can be exploited and a government who opposes protecting the American electoral process.
                    Seems odd, if the Russians did everything they could to try and hack the election then why not do this if it's weak?

                    Comment

                    Working...
                    X
                    TOP