MaryJane,
Good question. The v****g booths are not networked, meaning they do not connect to the Internet in any way. This prevents them from being hacked from an outside source. The only way a booth could be tampered with is inside the building where it is plugged in. Meaning, the supervisor could tamper with a machine or a v**er, if possessing the proper software and a key to the machine (actually on some, only a paper-clip is necessary). The other way is corruption of the individual machine's software. In both cases, only one machine would be affected. This makes manipulation of the actual v**es almost impossible. But, v***r f***d goes beyond casting the b****t. Let me explain. If the v****g oversight is not well trained and check the identification of the v**er or check the names against their v**er eligibility printout, then an ineligible individual could, and often do, cast v**es. If the state has not tied their records into the corner's records or Social Security, a dead person's credentials could be used and therefor an illegal v**e. I think you can follow this on down the rabbit hole.
Now, to address the supposed Russian hacking. What they are being accused of doing is two fold. 1. They are accused of gaining access to the DNC's computers and downloading their mail and making it public. And 2. They are accused of buying ad space on social media (specifically Facebook) and making false or misleading statements. The Russians are blamed because the FBI has tracked Gluficer 2.0 to an office building in Moscow. But, the FBI has never had access to DNC's computer or the software used during the supposed hack. To make matters worse, those computers have either been destroyed or have been completely wiped clean and that is according to the DNC and unverifiable.
Now then what is the WH, military and so on doing to ensure security in v****g. Basically nothing nor can they do much. The computers used by a campaign office is the responsibility of that system administrator. That individual is responsible for installing and managing firewalls and security. They are the oversight, any leaks or hacking intrusion is their failure.
Military computers have tight restrictions on the use of Ports and Protocols, meaning there is a narrow ban width used to t***sfer and archive data. There are also applications that are approved for military computers and any unauthorized software is automatically blocked and can not be downloaded and therefore used on those systems. Classified information is only housed on the SIPERNET, only available inside the work space. You can get access to the SIPERNET from outside, but it requires verification that the intended system will only be connected to the SIPERNET and you have to have log on credentials. They are almost impenetrable if the DOD PPSMs (Ports, Protocol, and Management Services) restrictions are applied and maintained. This is a lite offering of the protections, and I have omitted many details. Of course it only takes one individual sending a classified file to an unprotected server as an attachment to an email to circumvent all the firewalls or port requirements. (Personal emails are permitted in all government offices). This is why Clinton's server was such an issue.... it was a public domain server, open to the public and she maintained plus t***smitted classified information on the unsecured servers.
Bottom line, your v**e when cast is almost untamperable. The government can impose rules on social media preventing them from selling ad space to individuals residing in other countries. And basically that is all the government can do. Banks are, with regret, vulnerable to hacking as is your medical records, DMV, and your school records. It happens more than you want to know. The "bad actors" into these types of records have typically been China, North Korea, and the Ukraine. Keep in mind, the government can not do anything about a poorly trained systems administrator.
I hope this addressed your concerns.
maryjane wrote:
There has been quite a hullabaloo about the Russians and the last e******n. And we are constantly hearing about China constantly stealing technology and ideas from us. What I want to know is what, if anything, is any state doing about protecting v****g technology from being hacked or otherwise being interfered with?? What are the military and all government agencies doing to prevent access to their files, secrets, etc? What about our infrastructure like electric grids and plants? Technology has taken over almost every aspect of our lives. Where once upon a time, thieves stole mail from your mailbox, went through an embassy's trash, bribed an employee to get specific technology plans, now all they need is an excellent hacker. If I were head of the military, the FIB, a bank, etc, I would be very concerned about this. Can anything stored in any computer really be safe when there always seems to be a talented hacker out there that can find a way into any computer?? What do you folks here on OPP predict for the future in this area?
There has been quite a hullabaloo about the Russia... (
show quote)