Have you created a ShazzleMail account on your smartphone? This is a required first step.

Yes No

Free Encrypted Email

Posts Tagged ‘#Elections’


ICIT Reports Says: “Hacking Elections Is Easy! Tactics, Techniques And Procedures”

August 30, 2016

True democracy relies on the reliability of the democratic process. The “Help America Vote Act”, passed in 2002, ushered in an era of uncertainty by proliferating the use of electronic voting systems vulnerable to cyber, technical and physical attack. More often than not, electronic voting systems are nothing but bare-bone, decade old computer systems that lack even rudimentary endpoint security. Despite the recurring discussion on electronic voting vulnerabilities that occurs every four years, only limited attention is given to the systemic problem undermining American democracy. It’s time for a complete overhaul in the electoral process’ cyber, technical and physical security.
In this analysis, entitled, “Hacking Elections is Easy! Part One: Tactics, Techniques, and Procedures”, the Institute for Critical Infrastructure Technology provides a detailed analysis of the risks that voting machines and the digital age have introduced into our democratic process which have the potential to impact the integrity of election results. The report discusses:
• The shocking ease of hacking all aspects of virtually any voting machine’s “black box” technology
• The cyber, technical and physical attack methods that could be enlisted by Nation States, Hacktivists and black hat hackers
• Social Engineering attack vectors and methods that are so easy, even a novice script kiddie can do it
• A few simple tactics that can “fix” any local, state or national campaign in just days or even hours
• And much more
This paper was authored by:
• James Scott (Senior Fellow – Institute for Critical Infrastructure Technology)
• Drew Spaniel (Researcher – Institute for Critical Infrastructure Technology)
The following experts contributing to this report:
• Rob Roy (Fellow – Institute for Critical Infrastructure Technology & Federal CTO, HPE)
Part Two of this paper will be published shortly and provide a deeper technical analysis of this threat.
Download the paper here: http://icitech.org/wp-content/uploads/2016/08/ICIT-Analysis-Hacking-Elections-is-Easy-Part-One1.pdf

Tags: , , , , , , , ,

Introducing ShazzleMail Email and How it Works

Privacy is your Fundamental Human Right.

Our Daily Blog
9 Important Privacy Settings for Windows 10
June 3, 2019

Matt Powell On Jun 3, 2019 At first glance, the Digital Age may seem like a wonderful thing. And ...

Read more
Apple exec dismisses Google CEO’s criticism over turning privacy into a ‘luxury good’
May 29, 2019

By Jacob Kastrenakes@jake_k May 27, 2019, 12:18pm EDT Apple’s software chief, Craig Federigh...

Read more
Your Privacy Is Our Business
April 30, 2019

Let us reassure you: You’re worried only because you don’t understand anything about anything. ...

Read more
Coffee with Privacy Pros: Three Constants of Privacy
April 23, 2019

A look behind the career and privacy theology of the law-lovin’ CPO of Uber, Ruby Zefo Jared Cose...

Read more
We’ve Stopped Talking And Searching About Privacy
April 15, 2019

Kalev Leetaru Contributor AI & Big Data I write about the broad intersection of data and soci...

Read more