Check out the TB2K CHATROOM, open 24/7               Configuring Your Preferences for OPTIMAL Viewing
  To access our Email server, CLICK HERE

  If you are unfamiliar with the Guidelines for Posting on TB2K please read them.      ** LINKS PAGE **



*** Help Support TB2K ***
via mail, at TB2K Fund, P.O. Box 24, Coupland, TX, 78615
or


TECH Remote-Access Software Found On Popular Voting Machines
+ Reply to Thread
Results 1 to 7 of 7
  1. #1

    Remote-Access Software Found On Popular Voting Machines

    March 07, 2018

    Despite alleged Russian hacking of the 2016 presidential election, no evidence has been produced showing Moscow’s hackers – or anyone else – being able to remotely access and change votes on any of the 350,000 electronic voting machines used in the U.S.

    Americans have largely accepted that the machines are safe from hackers because they’ve repeatedly been told the devices are “air-gapped” – isolated from all unsecured networks, including the internet.

    That is untrue, according to a New York Times Magazine investigation last month that described Election Systems & Software, the largest manufacturer of voting machines, selling hardware with election-management systems pre-installed with remote-access software. The company also is said to have encouraged past purchasers to install the software on machines that did not currently have it so ES&S technicians could do troubleshooting and maintenance without having to be onsite.

    “The American public has been repeatedly assured that voting machines are not connected to the internet, and thus, cannot be remotely compromised by hackers,” Wyden wrote in the letter to ES&S.

    “The default installation or subsequent use of remote-access software on sensitive election systems runs contrary to cybersecurity best practices and needlessly exposes our election infrastructure to cyberattacks.”

    Wyden, a senior member of the Senate Intelligence Committee, questioned ES&S officials last year about the company’s cyber security practices, but it was less than forthcoming.

    “ES&S did not answer Wyden’s questions about whether the company follows basic cybersecurity best practices,” a spokesman for the senator’s office told Gizmodo.

    In his most recent questioning of ES&S, Wyden is addressing the issues raised in the New York Times Magazine report:

    Has ES&S sold devices on which remote-access software was pre-installed?

    Have ES&S officials or technical-support personnel recommended customers install remote-access software on voting machines or other election systems that did not already have it?

    In the last 24 hours, the company has issued a response that seems to deny any knowledge of pre- or post-installed remote-access software:

    “Election Systems and Software certifies our voting systems to the Voluntary Voting System Standards (VVSG) adopted by the Election Assistance Commission (EAC). The EAC VVSG does not allow for voting systems to be tested or approved with any form of remote-access software. In fact, an election-management system that is approved and tested to the EAC standard is required to be hardened. The term hardened in this case means that the server is locked down from any use other than that which has been approved under the standard and that it cannot contain any software application, including remote access software, which is not part of the certified end to end configuration. ES&S always adheres to these guidelines and, as such, does not sell or distribute products with remote access software installed.”

    But this denial flies in the face of evidence reported in last month’s report.

    In 2011, the election board in Pennsylvania’s Venango County, had its system examined by a computer-science professor from Carnegie Mellon University following complaints by voters that their votes were “flipped” from candidates they had selected on the screen to their opponents. While serious in terms of the vote outcome, that problem proved to be a simple calibration error that could be easily fixed. But of greater alarm was the discovery of remote-access software installed on the county’s election-management computer. This computer is used to tally results and, in some cases, program voting machines. In this case, the culprit was not a hacker but an approved contractor who was accessing the system from home. Still, the county had no knowledge such access was installed in the system they had purchased from ES&S or that it was possible to do so.

    An ES&S contract with Michigan from 2006 describes how the company’s tech-support workers used remote-access software called pcAnywhere to access customer-election systems. That same year, ES&S technicians spent hours connected to a Pennsylvania county’s system trying to track down the reason for vote discrepancies in a local race. According to an official for the county, the software had been pre-installed.

    As now, ES&S denied any knowledge of such a breach of cybersecurity protocol.

    “None of the employees who reviewed this response, including long-tenured employees, has any knowledge that our voting systems have ever been sold with remote-access software.”

    It’s a toss-up as to whether it’s worse that ES&S secretly installed the software or that it is unaware of how it came to be on systems that were sold.

    Even without the installed access software, there are other areas of vulnerability.

    Many counties have modems connected to their machines to transmit results to their central election office. While election officials say such transmissions are safe because the information is sent over phone lines and not the internet, the fact is that many of the modems are cellular, which use radio signals to send data to cell towers and routers that are part of the internet. It is theoretically possible to intercept and change the data being transmitted.

    The Election Assistance Commission, which oversees testing and certification of voting machines, says modems aren’t a problem.

    “The caution about not permitting network access does not apply to the use of modems on election night to transmit unofficial polling place results to the central office,” the commission’s election guidelines state. “The technical expertise required to intercept and alter a telephone communication without detection is extremely complex. Therefore, it is unlikely that anyone will be able to intercept and alter these results without detection.”

    But that does not address the problem of hackers using the connected modem and the pre-installed remote-access software to gain access to machines if they have the password or exploit some vulnerability. Indeed, trust in the election process can be undermined simply by the public never being certain the vote results are true.

    “The incorrect assertion that voting machines or voting systems can’t be hacked by remote attackers because they are ‘not connected to the internet’ is not just wrong, it’s damaging,” Susan Greenhalgh, a spokeswoman for the National Election Defense Coalition, an elections integrity group, told New York Times Magazine.

    “This oft-repeated myth instills a false sense of security that is inhibiting officials and lawmakers from urgently requiring that all voting systems use paper ballots and that all elections be robustly audited.”

    http://www.wnd.com/2018/03/remote-ac...ting-machines/

    I read somewhere that Soros is connected to the company that makes and maintains electronic voting machines.

    Wonder how many Democrats and RINOs won elections that they would have lost if not for the 'back door' in the voting machines.

  2. #2
    Join Date
    May 2001
    Location
    Illinois
    Posts
    21,399
    We need to go back to paper ballots. How can you recount after electronic ballots that have been changed?
    "Freedom is not something to be secured in any one moment of time. We must struggle to preserve it every day. And freedom is never more than one generation away from extinction."
    -Ronald Reagan

  3. #3
    Join Date
    Jul 2012
    Location
    northern ontario
    Posts
    4,515
    cant be too great

    the hillberg.. still didn't get in

  4. #4
    NYS has voting machines that you fill in the dot then the ballot is optically read. It keeps the paper ballet for backup.
    Those who beat their swords into plowshares will plow for those who don't.

  5. #5
    Quote Originally Posted by zeker View Post
    cant be too great

    the hillberg.. still didn't get in
    DNC demanded recount in four states after the election that they apparently though they couldn't lose. Trump ended up short on the popular vote but won the electoral college vote giving the left the argument that Trump lost the election. The question is did Trump really come up short? How many politicians are in office because of rigging the vote count?

  6. #6
    Join Date
    Dec 2017
    Location
    Swimming in sea quarks
    Posts
    3,767
    Clinton lost a rigged election. How bad of a candidate do you have to be to lose when millions of dead people, cats, dogs, illegal immigrants, and an untold number of cooked voting machines are in your favor????
    Facts?? We don't need no stinkin facts...

  7. #7
    Join Date
    Dec 2017
    Location
    Swimming in sea quarks
    Posts
    3,767
    Quote Originally Posted by Seer View Post
    DNC demanded recount in four states after the election that they apparently though they couldn't lose. Trump ended up short on the popular vote but won the electoral college vote giving the left the argument that Trump lost the election. The question is did Trump really come up short? How many politicians are in office because of rigging the vote count?
    Trump didn't lose the popular vote, see post 6.
    Facts?? We don't need no stinkin facts...

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts


NOTICE: Timebomb2000 is an Internet forum for discussion of world events and personal disaster preparation. Membership is by request only. The opinions posted do not necessarily represent those of TB2K Incorporated (the owner of this website), the staff or site host. Responsibility for the content of all posts rests solely with the Member making them. Neither TB2K Inc, the Staff nor the site host shall be liable for any content.

All original member content posted on this forum becomes the property of TB2K Inc. for archival and display purposes on the Timebomb2000 website venue. Said content may be removed or edited at staff discretion. The original authors retain all rights to their material outside of the Timebomb2000.com website venue. Publication of any original material from Timebomb2000.com on other websites or venues without permission from TB2K Inc. or the original author is expressly forbidden.



"Timebomb2000", "TB2K" and "Watching the World Tick Away" are Service Mark℠ TB2K, Inc. All Rights Reserved.