Out of the review, which also involved threat assessment conducted with the national party as well as officials in Iowa… … and Nevada, came directions to guard the name of the vendor, and to take the software live as late as possible to prevent it from getting into the hands of hackers, according to multiple people who participated or had knowledge of the exercises.”
The DNC ordered and paid for a security audit of the software, which was completed by NCC Group, a Britain-based cybersecurity firm. Out of the review, which also involved threat assessment conducted with the national party as well as officials in Iowa and Nevada, came directions to guard the name of the vendor, and to take the software live as late as possible to prevent it from getting into the hands of hackers, according to multiple people who participated or had knowledge of the exercises.
“Currently, there is no known way to secure a digital ballot. At this time, any election that does not employ paper ballots cannot be secured,” Dr. Gilbert said. “Therefore, the report recommended that Internet voting, and specifically the electronic return of marked ballots, should not be used at this time.”
House Administration Committee Chairperson Zoe Lofgren commended Dr. Gilbert on the presentation of the report’s findings and the excellent work done by the National Academies. She noted that the report was “the guts of what we ended up putting in our SAFE [Securing America’s Federal Elections] Act that’s now pending in the Senate.”
The name Prime III was chosen because it’s a third generation voting system. Dr. Juan E. Gilbert defines voting systems by generation. First generation voting was done with mechanical equipment and paper, e.g. lever machines, punch cards, etc. Second generation voting uses computers, e.g. optical scan, DRE. Third generation devices are multimodal, e.g. Prime III, AutoMark. These are machines that accommodate multiple voters on one machine using multimodality. Prime III is a third generation voting device that allows voters to cast their ballot using touch, voice or both..
After piloting Prime III in selected wards in the 2014 primary election, the New Hampshire Department of State modified the software to accommodate the requirements of the state’s election code and debuted the system in the Presidential primary on February 9, 2016. Prime III can also be used through Gilbert’s other voting systems: Balloting and Televoting. The Balloting system enables voters to fill out their ballots online or through their phone. Once the ballot is completed, the voter will get a QR code that can be scanned at a Prime III-enabled voting machine to speed up the voting process.Televoting allows military and overseas voters to fill out their ballots through Prime III online and have it printed back at their home precinct.
For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret.
The company, Crypto AG, got its first break with a contract to build code-making machines for U.S. troops during World War II. Flush with cash, it became a dominant maker of encryption devices for decades, navigating waves of technology from mechanical gears to electronic circuits and, finally, silicon chips and software.
Boeing (BA) employees ridiculed the 737 Max’s regulatory certification progress and crudely expressed doubts about the plane’s ability to fly safely, according to a trove of newly released internal documents.
The company on Thursday sent the documents — more than 100 pages in all — to the House and Senate committees that have been probing its design of the troubled 737 Max plane, which was grounded last March after two fatal crashes that claimed 346 lives
July 4, 2015
Tech Person at MSNBC.com, I ask you: Why do these websites suck so much?
From February 2015, the Ukrainian Glissada company, specialising in the supply of spare parts for airplanes and helicopters of various nations, began looking for pilots and technicians with experience on the Mirage F1 for full-time jobs in Africa.
The final client was Libya Dawn, via the Caravana Middle East company based in Jordan and directed by a US-Jordanian, Rami Ghanem Najm, according to MEE’s source. Najm was arrested in December 2015 in Greece on an international arrest warrant and extradited to the US on arms trafficking charges.
The first two foreign mercenaries appeared in Misrata in June 2015. One of them refused to bomb LNA troops and left. The other – an Ecuadorian, reinforced by technicians of the same country – carried out several air strikes against LNA forces, then Islamic State militants in the Sirte region.
After Meltdown, Spectre, and Foreshadow, we discovered more critical vulnerabilities in modern processors. The ZombieLoad attack allows stealing sensitive data and keys while the computer accesses them.
While programs normally only see their own data, a malicious program can exploit the fill buffers to get hold of secrets currently processed by other running programs. These secrets can be user-level secrets, such as browser history, website content, user keys, and passwords, or system-level secrets, such as disk encryption keys.
The attack does not only work on personal computers but can also be exploited in the cloud.
Almost every computer with an Intel chips dating back to 2011 are affected by the vulnerabilities. AMD and ARM chips are not said to be vulnerable like earlier side-channel attacks.
Computer experts have claimed that the chips which power most of the computers in the world are hiding mysterious and ‘undocumented’ technology.
Analysts from Positive Technologies alleged that Intel chips and processors contain an enigmatic ‘logic signal analyser’ capable of reading ‘almost all data on a computer’.
The claims are likely to alarm conspiracy theorists …
The Government has rejected a petition calling for Brexit to be stopped, which has gathered more than 5.75 million signatures.
The BBC spoke to three cyber-security experts about how likely it is that a number of the 3m signatures gathered so far are not genuine.
They all agreed that the petition’s email validation process would be a deterrent.
Remainers and Leavers alike have been getting a little too excited about the Revoke Article 50 Petition. Yes, you can sign it as many times as you like with made up email addresses and whatever name and country you care to put in. Yes, there are videos online explaining in detail how to use bots to hijack Parliamentary petitions – exactly what happened with the second referendum petition immediately after the referendum. Is it actually going to stop Brexit? No, that will be MPs…
Over three million people have signed the petition to revoke Article 50 and cancel Brexit. But are they all real?
In recent years, automated programs known as bots have come to be used for artificially inflating Instagram follower counts, mining bitcoin or swaying online polls.
The Kansas City Star had the right headline. Cenk Uygur, and John Iadarola, hosts of The Young Turks, break it down.
Multiple that by 196 and you get a LONG delay
The county recently spent more than $10 million on 2,100 new voting machines. It’s unclear if Tuesday’s delay is connected to the new machines.
The results were key in determining the outcomes of two high-profile races: the Republican nomination for Kansas governor and the Democratic nomination for the 3rd Congressional District.