General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsTop Voting Machine Vendor Admits it Sold Remote-Access Software on Systems Sold to States
Discussing a letter to Senator Ron Wyden (D-OR), in response to his questions, Kim Zetter writes for Motherboard:
The nation's top voting machine maker has admitted in a letter to a federal lawmaker that the company installed remote-access software on election-management systems it sold over a period of six years, raising questions about the security of those systems and the integrity of elections that were conducted with them.
In 2006, at least 60% of U.S. votes were tabulated on election management systems made and operated by ES&S, the corporation that admitted to the installation of the remote-access software. It remains today the top voting machine maker in the U.S. In its letter to Wyden, ES&S referred to its remote-access software as pcAnywhere, and admitted selling it to customers between 2000 and 2006. Of note, earlier this year ES&S lied about this very same activity, in saying that it had never installed a remote-access system on any system that it sold.
Zetter notes:
The presence of such software makes a system more vulnerable to attack from hackers, especially if the remote-access software itself contains security vulnerabilities. If an attacker can gain remote access to an election-management system through the modem and take control of it using the pcAnywhere software installed on it, he can introduce malicious code that gets passed to voting machines to disrupt an election or alter results.
Consequently, Senator Wyden has tried very hard to obtain more information on this issue from ES&S. But they have refused to answer many of his questions, including what customers they sold their remote-access systems to. ES&S also refused to attend a hearing on election security last week before the Senate Committee on Rules and Administration. Wyden concludes:
ES&S needs to stop stonewalling and provide a full, honest accounting of equipment that could be vulnerable to remote attacks . When a corporation that makes half of Americas voting machines refuses to answer the most basic cyber security questions, you have to ask what it is hiding.
I have been writing an eight-part series on Election Fraud in the United States for World News Trust, which has been posting this series on DU. Part I dealt with the vulnerability of our election system, but it did not include the recent admission by ES&S because it was not available at the time.
It seems to me that this admission by ES&S is dynamite, and Im very grateful to Senator Wyden, one of our most progressive U.S. Senators, for aggressively investigating this. I have some additional thoughts on this issue:
1) Though Zetters article notes that the remote-access software makes our voting system more vulnerable to attacks from hackers, it seems to me that a more serious threat than outside hackers would be the voting machine companies themselves or the customers whom they choose to sell the software to, because they would have inside knowledge as to the opportunities that are available. Of note in this regard is that ES&S and other major voting machine companies in the United States are owned by militant supporters of the Republican Party.
2) I totally agree with Senator Wyden saying that, due to ES&Ss refusal to answer many of his questions and refusal to attend a Senate hearing on the subject, we have to ask what they are hiding. But I would also add, perhaps even more important, that we have to ask why they chose to make and sell remote-access systems in the first place and then refuse to acknowledge this.
3) Although ES&S has admitted that it sold this remote access feature between 2000 and 2006, we have no assurances that it hasn't also sold or used it from 2006 to 2016. We only know what they've admitted to, not what they haven't yet admitted to.
In conclusion, Zetter notes in her article that the recent US indictments against Russian state hackers who tried to interfere in the 2016 presidential elections show that they targeted companies in the US that make software for the administration of elections. That alone should make Americans extremely concerned about the vulnerability of their election systems. I would add that we should have similar concern whether its the Russians who hack our elections, our Republican supporting voting machine corporations, Republican politicians who have access to these machines, outside hackers who have an interest in altering the results of our elections, or a combination of any of the above.
I believe that this is the most important issue facing our country today, because everything else depends upon it. I believe that Donald Trump would not be our President today if we had a secure election system. And I believe that the matter is only going to get worse unless and until we do something to start correcting it. In Part VIII of my World News Trust series I discuss some things we can do to improve the security of our election system.
Crutchez_CuiBono
(7,725 posts)AND REFUSED TO APPEAR AT A CONGRESSIONAL HEARING?!!!
The fact that they are owned by "MILITANT SUPPORTERS OF THE REPUBLICAN PARTY!"?? What? This is the crux of all of it. Right here.
Throwing the election and changing vote tabulations. Another article said Michigan uses them...the key state they wouldn't recount. BY COURT ORDER they stopped it. Why would the gop stop a vote count? Too big a financial burden they said. Please note the spending since they took office. It was pure clap-trap. First hard hard evidence of a fifth column type set-up in the USA to throw elections by malicious code and software to alter the counts. And they hid the truth. EVEN when asked by Congress. So long as there continues to be no penalty for lying to congress, it will continue.
When we continue to play the game like doves...we will be devoured by the hawks. Soon-without exaggeration-it will be too late.
Policy right out of the auspices of 'Politics is War'/Karl Rove.
Tace
(6,800 posts)This story serves to confirm what many have suspected about electronic voting all along. --Tace
malaise
(268,873 posts)In 2004.
Truth will out.
diva77
(7,639 posts)that votes are counted as cast. They never should have been certified by SOS's; and county boards of supervisors should never have approved budgets for them.
Having to prove that there is evidence of wifi capability/modem installation in the machines is a backward way of going about ridding us of election fraud and has caused a delay of years, moving into decades, of putting a stop to stolen elections.
Election protection activists have known about wifi/modem capability in computerized voting machines & tabulators since at least 2005, if not earlier.
Time for change
(13,714 posts)The United States is ranked dead LAST among the Western democracies in the integrity of its election system.
https://www.washingtonpost.com/news/worldviews/wp/2016/03/21/the-u-s-has-worst-elections-of-any-long-established-democracy-report-finds/?noredirect=on&utm_term=.d89fd5adc38e
That is no accident. There has been a concerted effort among right wing zealots in our country to keep it that way. Our corporate news media has made discussion of electronic election fraud a forbidden topic in our country, labeling anyone who tries to discuss it a "conspiracy theorist" or worse. Losing candidates for high political office know that they will face a massive effort to discredit them as "sore losers" if they dare to mention the subject.