General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsMeet the security expert telling Clinton to contest the election
Without more detail, its impossible to judge the teams claims. But one thing is clear: Halderman is credible and trusted among his peers.
Halderman is very credible, and if he says there are anomalies that deserve investigation, they should be investigated, wrote Rick Hasen, a professor of Law and Political Science at UC Irvine, on his Election Law Blog.
While no system is 100 percent hack-proof, elections in this country are secure perhaps as secure as theyve ever been, said David Becker, executive director of the nonprofit Center for Election Innovation & Research, said at a House hearing in September. To manipulate election results on a state or national scale would require a conspiracy of literally hundreds of thousands, and for that massive conspiracy to go undetected.
Halderman disagrees. Becker is wrong, he told me in an email earlier this month. Even though the machines arent connected to the Internet, their software can potentially be attacked through a stuxnet-style attack that spreads via the memory cards that are used to load the ballot design.
This is more complicated than attacking an online voting system that is directly connected to the Internet, he added. But its within the capabilities of nation-state attackers, and it would not require a large conspiracy.
https://www.revealnews.org/blog/meet-the-security-expert-telling-clinton-to-contest-the-election/?utm_source=Reveal&utm_medium=social_media&utm_campaign=facebook
Never thought the day would come that I would have to agree with Lindsey Graham.
We cannot sit on the sidelines as a party and let allegations against a foreign government interfering in our election process go unanswered because it may have been beneficial to our cause, Graham said.
ancianita
(36,066 posts)It's up to you, Grandma Queen of Half The World Hillary!
SoCalMusicLover
(3,194 posts)Nobody cared then, nobody cares now.
Politics is a game, and regardless of whether there was cheating, hacking, or not, she lost, and will accept the results like a good Democratic politician.
SHRED
(28,136 posts)Think of the fight she'd have going back in now.
KittyWampus
(55,894 posts)But there's bound to be a lot of people telling her not to make waves.
lonestarnot
(77,097 posts)can't just throw in the towel on a Russian attack and she won't.
lonestarnot
(77,097 posts)ancianita
(36,066 posts)yallerdawg
(16,104 posts)Clinton doesn't have to do shit!
If this is fraud and corruption of an election, it's a crime against US, and has no deadlines or limits!
What it needs is proof - and if a case of merit is presented, an investigation will follow!
One more thing to bash Hillary for is rather unseemly - but probably never-ending...
Glitterati
(3,182 posts)Anyone BUT Hillary will be laughed out of a courtroom.
To bring a legal action, the plaintiff must have been DIRECTLY HARMED by some action.
Hillary is the only one who qualifies here.
If she refuses to bring an action, there is no case. Period. End of discussion.
flamingdem
(39,313 posts)If there's half a chance do it
Liberty Belle
(9,535 posts)Today he told media he's decided not to try and have her prosecuted.
Is it possible she's been warned that if she contests the election, he'll go after her with a special prosecutor?
Is it possible for someone else to contest the election with a lawsuit on behalf of people who voted for Clinton, if her campaign won't?
TrishaJ
(798 posts)immediate thought, too. If she will go quietly into the sunset, she will be left alone. Whether there is a crime committed or not, it would probably be very expensive for the Clintons to have to battle another bogus investigation. Just my two cents.
OldRedneck
(1,397 posts)Halderman disagrees. Becker is wrong, he told me in an email earlier this month. Even though the machines arent connected to the Internet, their software can potentially be attacked through a stuxnet-style attack that spreads via the memory cards that are used to load the ballot design.
I'm a member of our county electoral board. Here's how this works.
1. After the state determines the ballot layout, the electronic file containing the ballot layout is available.
2. We tell the state which company manufactures our voting machines. The ballot file is sent via encrypted message to the machine manufacturer.
3. Manufacturer then produces the memory cards and checks each card six times for virus, bugs, and anything else out of the ordinary.
4. Manufacturer sends a sample of cards, hard-copy, to the state for checking.
5. When state determines the memory cards are programmed correctly, the manufacturer is okayed to ship the cards to us.
6. We run several logic and accuracy tests on the machines with cards installed.
7. Machines are then sealed and not opened until election day.
There are around 35 companies in the country who are certified to program memory cards. So -- Halderman wants us to believe that all 35 have been compromised; 35 firewalls breached; 35 security protocols byapssed . . . After all, that's what must happen for his scenario to occur.
Ford_Prefect
(7,901 posts)You code or read code for details and anomalies? You personally have experience defeating computer virus software? You assume that your description of the machine preparation sequence is identical that used in other states that are in question? I have only your statement that the card maker is using clean code. Stuxnet hit hundreds of thousands of computers, many of which were behind the same kind of "security" you assert.
That a foreign agency could have planted it is possible, but less likely than that a local one such as the GOP in states where they control the Voting system used. As you said it was the STATE who managed the files and content from their end. That reduces the number of needed contact points. VW made a system hack that operated only when the diesel vehicle computer was connected to testing equipment and was otherwise invisible and undiscovered for over 10 years. The Windows system that runs most voting machines is very basic and easily fooled, as repeated public testing has shown.
If there is reason and evidence to suppose Russian activity then we do need to examine the results for it. There is every reason to do so if the evidence and the numbers are suspect whether the Russians did so, or someone else did.
elmac
(4,642 posts)so that they spew out money. Using a malware Skimer by exploiting the network that the ATM connects to. Not an expert but seems like ATMs would be much more secure so the voting machines probably would be a piece of cake to a determined hacker.
Hekate
(90,714 posts)robbob
(3,531 posts)What can we even do about it?
IthinkThereforeIAM
(3,076 posts)... optical scanners, just like my high school electronics teacher used to grade tests back in 1980.