Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
2016 Postmortem
Showing Original Post only (View all)Critical Discovery During Wisconsin Recount: Cellular Connectivity of Tabulators [View all]
UNBELIEVABLE, unless, of course, elections are being designed for rigging.Critical New Discovery During Wisconsin Recount: Cellular Connectivity of Tabulators Leaves Door Open to Hacking
FOR IMMEDIATE RELEASE
MADISON, Wis., Dec. 15, 2016
A huge security hole in our US elections, which allows alteration of vote totals by outsider or insider entities, was discovered during the Wisconsin recount, according to electronic security investigators from RecountNow.org.
A cellular capability is available as an option on the latest Election Systems and Software (ES&S) DS200 model of optical scanner.
"Cellular connectivity at the precinct level is bad," says IT specialist Jim March-Simpson, who, along with forensic investigator John Brakey, discovered and examined the vulnerability, "but the precinct-level scanners can open an internet channel to the central vote tabulator." March-Simpson is referring to a central unit that collects and adds vote totals from a whole region.
"That is the big disaster," says March-Simpson, "and cannot be tolerated in a US election."
An entity with "government-level resources . . . could completely 'own' the electoral process," March-Simpson says. "If the central vote tabulator does not have the best possible security, then even a good hacker with a normal PC can get in," he reports.
Cellular wireless connections can not only link directly with the internet, but they are built to have a longer range and be harder to detect than regular Wi-Fi networks. There is universal agreement among computer professionals that anything connected to the internet is hackable.
When FBI Director James Comey told the public, and Congress specifically, that none of our election equipment is connected to the internet, perhaps he was unaware of these connections or did not fully understand their implications. It is possible that no government agency ever examined, tested or certified this newest equipment.
There are currently over 26,500 ES&S DS200 optical scan vote-counting machines in 25 states. It is not yet known how many of them have the cellular capability at present, nor whether other equipment models have the same or similar capabilities. DS200 scanners count ballots electronically; ballots are fed in by hand but are counted by a computer inside in accordance with programmable instructions.
"This is a huge discovery that totally changes the rather blanket assurances of election security," stated Jonathan Simon of RecountNow. "Gaping vulnerabilities such as these, coupled with the statistical red flags that have appeared in places where these vulnerable machines have been used to count votes, call for immediate and thorough federal investigation of the electoral results to which they contributed."
March-Simpson and Brakey are working with the support of several non-partisan, nonprofit organizations working to achieve transparent elections, AuditZ, ProtectOurVote, RecountNow, and TrustVote.
FOR IMMEDIATE RELEASE
MADISON, Wis., Dec. 15, 2016
A huge security hole in our US elections, which allows alteration of vote totals by outsider or insider entities, was discovered during the Wisconsin recount, according to electronic security investigators from RecountNow.org.
A cellular capability is available as an option on the latest Election Systems and Software (ES&S) DS200 model of optical scanner.
"Cellular connectivity at the precinct level is bad," says IT specialist Jim March-Simpson, who, along with forensic investigator John Brakey, discovered and examined the vulnerability, "but the precinct-level scanners can open an internet channel to the central vote tabulator." March-Simpson is referring to a central unit that collects and adds vote totals from a whole region.
"That is the big disaster," says March-Simpson, "and cannot be tolerated in a US election."
An entity with "government-level resources . . . could completely 'own' the electoral process," March-Simpson says. "If the central vote tabulator does not have the best possible security, then even a good hacker with a normal PC can get in," he reports.
Cellular wireless connections can not only link directly with the internet, but they are built to have a longer range and be harder to detect than regular Wi-Fi networks. There is universal agreement among computer professionals that anything connected to the internet is hackable.
When FBI Director James Comey told the public, and Congress specifically, that none of our election equipment is connected to the internet, perhaps he was unaware of these connections or did not fully understand their implications. It is possible that no government agency ever examined, tested or certified this newest equipment.
There are currently over 26,500 ES&S DS200 optical scan vote-counting machines in 25 states. It is not yet known how many of them have the cellular capability at present, nor whether other equipment models have the same or similar capabilities. DS200 scanners count ballots electronically; ballots are fed in by hand but are counted by a computer inside in accordance with programmable instructions.
"This is a huge discovery that totally changes the rather blanket assurances of election security," stated Jonathan Simon of RecountNow. "Gaping vulnerabilities such as these, coupled with the statistical red flags that have appeared in places where these vulnerable machines have been used to count votes, call for immediate and thorough federal investigation of the electoral results to which they contributed."
March-Simpson and Brakey are working with the support of several non-partisan, nonprofit organizations working to achieve transparent elections, AuditZ, ProtectOurVote, RecountNow, and TrustVote.
InfoView thread info, including edit history
TrashPut this thread in your Trash Can (My DU » Trash Can)
BookmarkAdd this thread to your Bookmarks (My DU » Bookmarks)
131 replies, 20678 views
ShareGet links to this post and/or share on social media
AlertAlert this post for a rule violation
PowersThere are no powers you can use on this post
EditCannot edit other people's posts
ReplyReply to this post
EditCannot edit other people's posts
Rec (84)
ReplyReply to this post
131 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
Critical Discovery During Wisconsin Recount: Cellular Connectivity of Tabulators [View all]
Coyotl
Dec 2016
OP
No one gets to see the secret code owned by the ultra-right vote counting corporations.
Coyotl
Dec 2016
#2
they should have done it a long time ago, but they are blocked by GOP every step of the way. nt
TheFrenchRazor
Dec 2016
#11
I may get killed here for his but there were anomalies in the democratic primaries
elehhhhna
Dec 2016
#129
You're not going to get killed for saying that. The very fact that Dems don't fight
Nay
Dec 2016
#130
The fact that our voting machines are controlled by "secret propiratary software" is
Dark n Stormy Knight
Dec 2016
#34
And the coders have an agenda, that is not consistent with our secular constitution.
alfredo
Dec 2016
#70
With optical scan tabulators, a recount would make this connectivity meaningless.
Thor_MN
Dec 2016
#17
And possibly a back door in the code. How would we know if we don't get to see the secret code?
Coyotl
Dec 2016
#48
Poll observers looked at the ballots as they came out of the machines and compared the counts to the
AtheistCrusader
Dec 2016
#67
Except, they don't necessarily count every vote, and they aren't double checked by humans.
Coyotl
Dec 2016
#100
I closed an argument with a local elections official, who believed the voting machines were safe,
SharonAnn
Dec 2016
#22
And yet no white hat hackers left one of these machines showing 99999999 for Trump and 0 for Hillary
AtheistCrusader
Dec 2016
#52
Cellular connectivity is available as an option on my CPAP machine too. So what.
AtheistCrusader
Dec 2016
#18
Or, you could just use a reputable source. Or a non-right wing source. Use whichever adjective you
AtheistCrusader
Dec 2016
#62
So that's five machines. In a county other than the one in question here.
AtheistCrusader
Dec 2016
#74
Hand counting occurred. That's why these optical machines are superior to touchscreens.
AtheistCrusader
Dec 2016
#79
what makes you think that the installation of cell capability would be "recorded" anywhere?
TheFrenchRazor
Dec 2016
#93
maybe, but who's going to be checking? we can't even get the votes looked at. nt
TheFrenchRazor
Dec 2016
#110
The election board handles, inspects, programs, and controls the physical access to these machines.
AtheistCrusader
Dec 2016
#125
As I reject the premise that these machines are quite so vulnerable as the other posters in this
AtheistCrusader
Dec 2016
#84
"The seals were broken by the technician who came to install the modem in each machine. . . . ''
ucrdem
Dec 2016
#57
This is exactly the "unintended" flaw that just sank a bill imposing electronic voting in Argentina
tenorly
Dec 2016
#20
I'm sure buying such a thing would be cinch for the GOP and its fellow travelers.
tenorly
Dec 2016
#24
Memory cards in numerous WI voting machines were in fact shown to have been tampered with.
tenorly
Dec 2016
#27
The oengths ppl are going to to deny any weakness in our candidate is breathtaking...
dionysus
Dec 2016
#43
As are the lenghts people are going to insist on attacking the candidate with a historic number
synergie
Dec 2016
#73
Her weakness, IMO lies in hillary the candidate, not the president she would have been.
dionysus
Dec 2016
#88
65 million people, and tens of thousands of others whose votes were not counted
synergie
Dec 2016
#107
Yes, that's a ton of people. However, in a sane country we'd be talking about the biggestst
dionysus
Dec 2016
#120
Kind of tells you how good the "anti-establishment" sales people were. They were just
synergie
Dec 2016
#131
NY uses these machines and I've always vouched for their security. Well shit...
LLStarks
Dec 2016
#47
There are a variety of tried and tested means to hack a mechanical voting system.
AtheistCrusader
Dec 2016
#65
Chaining ballots is one of many methods, and could be considered 'hacking'.
AtheistCrusader
Dec 2016
#75
Snopes quotes the official admission: "ES&S sent out a technician to install modems in the scanners"
ucrdem
Dec 2016
#90
WI election officials admit they installed modems in the voting machines, per Snopes:
ucrdem
Dec 2016
#91
Because the machines passed physical observation by the poll observers.
AtheistCrusader
Dec 2016
#127
A new offshot of an Election Integrity group. Jonathan Simon heads it, I think.
Coyotl
Dec 2016
#114