An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

The New York Channel to North Korea is in Play

His name is Joseph Yun, a U.S. diplomat at the United Nations, one that the North Korean regime has reached out to more than once. Most recently it was over the return of Otto Warmbier and his release.

Under the Obama administration, all talks were terminated where at the time Sweden was the communications envoy of record. With the transfer of power and government to Donald Trump, Pyongyang opened up the back channel via the United Nations to Joseph Yun, who has long diplomatic experience in the region.

While preparations are in place according to President Trump should Kim launch his 4 missiles toward Guam, Pentagon Chief Mattis declares the United States and allies are ready. That still leaves North Korea with nuclear weapons, a condition every expert is omitting in talking points. Secretary of State Tillerson says his work is to get North Korea to stop with the missile program, and that will not likely occur as it is a proxy operation of Iran.

The Kim regime is keeping his estimated 60 nuclear weapons for a bargaining tool and global legitimacy. That is the real problem. Many expert declare that North Korea always backs down in the end when they get food or sanctions relief but we are dealing with a new Kim that is far more unpredictable than his father.

So, what can the U.S. and allies do going forward? Shall we continue to rely on China? They are anything but a friend or a cooperative partner stating in local Chinese news that China will remain neutral should Kim strike first. Further, China declared that if the United States went to a preemptive posture, China would stop us.

China wants total ownership and power in the region and certainly when it comes to navigation, so any U.S. naval activity angers them.

The United States has other options and tools, where not one but a combination of all may also be deployed. That includes forcing a regime change, not always the best solution. Then there is the special forces deployment to covertly enter North Korea and work on a detonation of key command and control sites. Special operations has trained for this kind of operation for more than 20 years.

There is a cyber option, a tool that several experts declare have already been used that Kim’s missile miss targets or fail on re-entry.

Dealing with China to control North Korea is a fool’s errand as Russia and Iran are part of the total equation. There could still be wider consequences when the United States and allies prevail over North Korea on the missile side, again the nuclear inventory remains and is traded to other rogue nations such as Iran or Syria.

There are other allies included in the variables regarding North Korea. They include Australia, Japan and Britain, where Canada, Germany and France remain silent. Japan has just deployed a missile defense system in a defensive mode.

The media continues to declare that any military conflict will lead to millions dying. That is only true if North Korea is successful on a land based conflict hitting Seoul. The U.S. uses only precision guided munitions where collateral damage would not affect other regions of North Korea, hence millions would not escape across the Yalu river into China. China has a standing army at that border preventing such an event.

China and North Korea want the peninsula to be unified and under Chinese control which is much the case to the waterways in dispute along with the contested islands. China fears that the United States is working to unify the peninsula under S. Korean control, which has not been an objective.

In summary, while fear for days has been the media headlines, it cannot be fully dismissed, however, a near term conflict will be likely resolved, leaving North Korea with a viable nuclear weapons and missile program. The coordination between Iran and North Korea will continue in that same realm and Trump is left with the same festering issue of previous president.

Will there be a Chinese naval blockade if the United State and allies go for a preemptive strike? Perhaps that New York Channel to Pyongyang has the burden of finding out. Has someone sent an envoy to Tehran yet with these discussions? Nah….Russia meanwhile is keeping a keen eye on all of it.

 

NoKo Crossed the Nuclear Power Threshold, 60?

The best defense is to take them out before they are fired…..we can and we know where they are.

We Know the Locations of N Korea Nuclear Sites

Primer: North Korean delegation wraps up Iran visit

Trip included opening of new embassy and meetings with foreign representatives
 

North Korea’s newly built embassy in Tehran opened Wednesday, according to the North’s state-run KCNA news agency. It said the new embassy was “built to boost exchanges, contacts and cooperation between the two countries for world peace and security and international justice.”

After the second ICBM test last month, defense experts said it appeared North Korea’s long-range ballistic missile had the range to reach half, if not most, of the continental United States. Iran could have an ICBM capability similar to North Korea within a few years, as just last week it successfully launched a satellite-carrying rocket that some see as a precursor to long-range ballistic missile weapon capability.

‘Extensive’ missile cooperation

“There’s been fairly extensive cooperation on missiles,” said Bunn. “And in fact, early generations of Iranian missiles were thought to be basically modestly adapted North Korean missiles.” More here.

North Korea now making missile-ready nuclear weapons, U.S. analysts say

North Korea has successfully produced a miniaturized nuclear warhead that can fit inside its missiles, crossing a key threshold on the path to becoming a full-fledged nuclear power, U.S. intelligence officials have concluded in a confidential assessment.

The new analysis completed last month by the Defense Intelligence Agency comes on the heels of another intelligence assessment that sharply raises the official estimate for the total number of bombs in the communist country’s atomic arsenal. The U.S. calculated last month that up to 60 nuclear weapons are now controlled by North Korean leader Kim Jong Un. Some independent experts believe the number of bombs is much smaller.

The findings are likely to deepen concerns about an evolving North Korean military threat that appears to be advancing far more rapidly than many experts had predicted. U.S. officials last month concluded that Pyongyang is also outpacing expectations in its effort to build an intercontinental ballistic missile capable of striking cities on the American mainland.

While more than a decade has passed since North Korea’s first nuclear detonation, many analysts believed it would be years before the country’s weapons scientists could design a compact warhead that could be delivered by missile to distant targets. But the new assessment, a summary document dated July 28, concludes that this critical milestone has already been reached.

“The IC [intelligence community] assesses North Korea has produced nuclear weapons for ballistic missile delivery, to include delivery by ICBM-class missiles,” the assessment states, in an excerpt read to The Washington Post. The assessment’s broad conclusions were verified by two U.S. officials familiar with the document. It is not yet known whether the reclusive regime has successfully tested the smaller design, although North Korean officially last year claimed to have done so.

The DIA and the Office of the Director of National Intelligence declined to comment.

An assessment this week by the Japanese Ministry of Defense also concludes there is evidence to suggest that North Korea has achieved miniaturization.

Kim Jong Un is becoming increasingly confident in the reliability of his nuclear arsenal, analysts have concluded, explaining perhaps the dictator’s willingness to engage in defiant behavior, including missile tests that have drawn criticism even from North Korea’s closest ally, China. On Saturday, both China and Russia joined other members of the U.N. Security Council in approving punishing new economic sanctions, including a ban on exports that supply up to a third of North Korea’s annual $3 billion earnings.

The nuclear progress further raises the stakes for President Trump, who has vowed that North Korea will never be allowed to threaten the United States with nuclear weapons. In an interview broadcast Saturday on MSNBC’s Hugh Hewitt Show, national security adviser H.R. McMaster said the prospect of a North Korea armed with nuclear-tipped ICBMs would be “intolerable, from the president’s perspective.”

“We have to provide all options . . . and that includes a military option,” he said. But McMaster said the administration would do everything short of war to “pressure Kim Jong Un and those around him, such that they conclude it is in their interest to denuclearize.” The options said to be under discussion ranged from new multilateral negotiations to reintroducing U.S. battlefield nuclear weapons to the Korean Peninsula, officials familiar with internal discussions said.

Determining the precise makeup of North Korea’s nuclear arsenal has long been a difficult challenge for intelligence professionals because of the regime’s culture of extreme secrecy and insularity. The country’s weapons scientists have conducted five nuclear tests since 2006, the latest being a 20- to 30-kiloton detonation on Sept. 9, 2016, that produced a blast estimated to be up to twice that of the bomb dropped on Hiroshima, Japan, in 1945.

But producing a compact nuclear warhead that can fit inside a missile is a technically demanding feat, one that many analysts believed was still beyond North Korea’s grasp. Last year, state-run media in Pyongyang displayed a spherical device that government spokesmen described as a miniaturized nuclear warhead, but whether it was a real bomb remained unclear. North Korean officials described the September detonation as a successful test of a small warhead designed to fit on a missile, though many experts were skeptical of the claim.

Kim has repeatedly proclaimed his intention to field a fleet of nuclear-tipped ICBMs as a guarantor of his regime’s survival. His regime took a major step toward that goal last month with the first successful tests of a missile with intercontinental range. Video analysis of the latest test revealed that the missile caught fire and apparently disintegrated as it plunged back toward Earth’s surface, suggesting North Korea’s engineers are not yet capable of building a reentry vehicle that can carry the warhead safely through the upper atmosphere. But U.S. analysts and many independent experts believe that this hurdle will be overcome by late next year.

“What initially looked like a slow-motion Cuban missile crisis is now looking more like the Manhattan Project, just barreling along,” said Robert Litwak, a nonproliferation expert at the Woodrow Wilson International Center for Scholars and author of “Preventing North Korea’s Nuclear Breakout,” published by the center this year. “There’s a sense of urgency behind the program that is new to the Kim Jong Un era.”

While few discount North Korea’s progress, some prominent U.S. experts warned against the danger of overestimating the threat. Siegfried Hecker, director emeritus of the Los Alamos National Laboratory and the last known U.S. official to personally inspect North Korea’s nuclear facilities, has calculated the size of North Korea’s arsenal at no more than 20 to 25 bombs. Hecker warned of potential risks that can come from making Kim into a bigger menace than he actually is.

“Overselling is particularly dangerous,” said Hecker, who visited North Korea seven times between 2004 and 2010 and met with key leaders of the country’s weapons programs. “Some like to depict Kim as being crazy – a madman – and that makes the public believe that the guy is undeterrable. He’s not crazy and he’s not suicidal. And he’s not even unpredictable.”

“The real threat,” Hecker said, “is we’re going to stumble into a nuclear war on the Korean Peninsula.”

In the past, U.S. intelligence agencies have occasionally overestimated the North Korean threat. In the early 2000s, the George W. Bush administration assessed that Pyongyang was close to developing an ICBM that could strike the U.S. mainland – a prediction that missed the mark by more than a decade. More recently, however, analysts and policymakers have been taken repeatedly by surprise as North Korea achieved key milestones months or years ahead of schedule, noted Jeffrey Lewis, director of the Center for Nonproliferation Studies’ East Asia Nonproliferation Program. There was similar skepticism about China’s capabilities in the early 1960s, said Lewis, who has studied that country’s pathway to a successful nuclear test in 1964.

“There is no reason to think that the North Koreans aren’t making the same progress after so many successful nuclear explosions,” Lewis said. “The big question is why do we hold the North Koreans to a different standard than we held [Joseph] Stalin’s Soviet Union or Mao Zedong’s China? North Korea is testing underground, so we’re always going to lack a lot of details. But it seems to me a lot of people are insisting on impossible levels of proof because they simply don’t want to accept what should be pretty obvious.”

 

C’mon People It is the Welcoming Cities Initiative

Yes….welcome to our cities and partly thanks the Clinton Global Initiative….ah yes….the Clintons again.

This is all supposed to enhance business, employment and bring more economic success to America…right? Well, how about cost comparisons….like Los Angeles…

Photo/Truthdig

FNC: Illegal immigrant families received nearly $1.3 billion in Los Angeles County welfare money during 2015 and 2016, nearly one-​quarter of the amount spent on the county’s entire needy population, according to data obtained by Fox News.

The data was obtained from the county Department of Public Social Services — which is responsible for doling out the benefits — and gives a snapshot of the financial costs associated with sanctuary and related policies.

The sanctuary county of Los Angeles is an illegal immigration epicenter, with the largest concentration of any county ​in the nation, according to a study from the Migration Policy Institute. ​The county also allows illegal immigrant parents with children born in the United States to seek welfare and food stamp benefits.

I know you don’t want to read a 94 page document, but at least skim the document. You will learn there are millions upon millions of corrupt dollars floating across the country, for years that put foreign migrants and many illegals at that above Americans for jobs and business development.

Partner Organizations
Welcoming Cities and Counties has been recognized as a 2013 Clinton Global Initiative Commitment to Action
.
This initiative is also supported by a growing list of partner organizations, including:
City of Chicago
Sanctuary cities are lawless cities and at the core is the following:
Cities and counties that join Welcoming Cities and Counties
will have the chance to:
Hear from local government leaders who are making the most of their diversity, by creating
“immigrant -friendly” welcoming plans.
Learn about large and small communities that are responding to demographic change and supporting long-term immigrant integration in a way that speaks to and benefits all members of the community.
Access new tools and resources to help advance welcoming resolutions, initiatives and strategies
.
Receive support and recognition for their efforts to foster more vibrant, inclusive, and welcoming communities.
Participate in national and transatlantic learning exchanges that highlight promising practices from globally competitive cities
***
How bad is it all?

A new wave of local government policies has emerged across cities that is aimed at improving immigrants’ economic and social integration. This report examines the group of cities that joined the Welcoming America’s Welcoming Cities initiative, a notable example of this new policy movement.

Welcoming America is a national grassroots -driven cooperative that launched the Welcoming Cities and Counties initiative in 2013 to provide a venue for immigrant –
welcoming communities to share resources and exchange best practices. We focus on cities in this report because they make up the majority of the program participants (only four out of 54 local participating governments are counties). Read this document here, and start with page 5.
Some cooperation came from the following:
Numerous individuals helped make this guide possible, but our special appreciation goes to its lead author, Steve Tobocman of Global Detroit and his team, including Francis Grunow, Sloan Herrick, Kyle Murphy, Beth Szurpicki, Kate Brennan, and Raquel Garcia Andersen. We also thank the number of individuals who worked with Steve and his team to provide details on their local efforts, including Amanda Bergson-Shilcock, formerly of the Welcoming Center for New Pennsylvanians, Betsy Cohen of St. Louis Mosaic, Todd Adams at Visibility Marketing, Paul McDaniel at the Immigration Policy Center, and Robyn Webb of the Greater Halifax Partnership. We also want to thank Susan Downs-Karkos and Rachel Peric who provided extremely valuable editing to the document.
We hope you will find this guide to be a useful resource in your work, and that you will stay connected by sharing your ideas and joining our growing network of partners across the United States. For more information, or to get involved, please visit us at www.welcomingamerica.org. You can find more information about the local immigrant
economic development organizations in the Rust Belt, many of which are featured throughout this guide, through the WE Global Network at www.weglobalnetwork.org.

Chicago Mayor Sues DoJ/Sessions, Sanctuary City Money

Primer:

Jamie Gorelick — a partner at Wilmer Hale who also represents Ivanka Trump and Jared Kushner on non-Russia related legal issues, is one of the many attorneys who is listed as pro bono counsel on the suit. Last year Chicago received $2.3 million in JAG funds. Over the years, the city has purchased SWAT equipment, police vehicles, radios and Tasers with the money.

The suit revolves around specific conditions Sessions announced in July for a federal program, the Edward Byrne Memorial Justice Assistance Grant, or Bryne JAG, which provides federal funding to support local law enforcement efforts.
“(The executive branch) may not unilaterally concoct and import into the Byrne JAG program sweeping new policy conditions that were never approved (and indeed were considered and rejected) by Congress and that would federalize local jails and police stations, mandate warrantless detentions in order to investigate for federal civil infractions, sow fear in local immigrant communities, and ultimately make the people of Chicago less safe,” attorneys for the city wrote in Monday’s filing. More here.

‘Sanctuary city’ Chicago sues Trump administration

Chicago (AFP) – The city of Chicago filed suit Monday against the Donald Trump administration for withholding funds from so-called “sanctuary cities” that fail to cooperate with tougher federal efforts cracking down on undocumented immigrants.

The lawsuit, the first of its kind, challenges the Trump administration’s requirement that cities detain suspects for questioning by federal immigration authorities or see their grant funding for municipal police departments withheld.

Chicago Mayor Rahm Emanuel on Monday called the policy counterproductive.

“By forcing us, or the police department, to choose between the values of the city and the philosophy of the police department… I think it’s a false choice, and it undermines our actual safety agenda,” Emanuel told CNN.

“We will always be a welcoming city,” he continued, adding that local police departments rely on the cooperation of the immigrant community — both documented and undocumented.

“Our police department is part of a neighborhood, part of a community, built on the premise of trust,” the mayor said.

“We want you to come to Chicago if you believe in the American dream,” he added.

The federal grant at the center of the lawsuit provided $2.3 million to Chicago last year to purchase police equipment, such as cars, computers, radios and Tasers, Emanuel said.

The federal government’s new rules would tie the grant to requirements that, among other things, cities give federal immigration authorities unlimited access to local police stations to interrogate arrestees, Chicago officials said.

The city is asking a federal court to declare such requirements unlawful.

Trump has targeted sanctuary cities as part of his promised crackdown on illegal immigration, and the Department of Justice implemented the new funding requirement last month.

Supporters of “sanctuary city” policies say requiring local police to fully cooperate with immigration enforcement erodes with the communities they serve and frustrate law enforcement efforts.

The Department of Justice (DOJ) criticized the lawsuit in a statement that accused Emanuel of “protecting criminal aliens and putting Chicago’s law enforcement at greater risk.”

The head of the DOJ, US Attorney General Jeff Sessions, last week said the policy would improve safety for immigration officers who now have to track down suspects who already had been detained and released by local police.

“By forcing police to go into more dangerous situations to re-arrest the same criminals, these policies endanger law enforcement officers more than anyone,” Sessions said.

2 Congressmen Watched Voting Machines Being Hacked

Primer

33 states accepted DHS aid to secure elections

The Department of Homeland Security (DHS) provided cybersecurity assistance to 33 state election offices and 36 local election offices leading up to the 2016 presidential election, according to information released by Democratic congressional staff.

During the final weeks of the Obama administration, the DHS announced that it would designate election infrastructure as critical, following revelations about Russian interference in the 2016 election.

Since January, two states and six local governments have requested cyber hygiene scanning from the DHS, according to a memo and DHS correspondence disclosed Wednesday by the Democratic staff of the Senate Homeland Security and Governmental Affairs Committee.

The information is related to the committee’s ongoing oversight of the DHS decision to designate election infrastructure.

The intelligence community said back in January that in addition to directing cyberattacks on the Democratic National Committee and top Democratic officials, Russia also targeted state and local electoral systems not involved in vote tabulating.

In June, DHS officials told senators investigating Russian interference that there was evidence that Russia targeted election-related systems in 21 states, none of them involved in vote tallying.

Officials have previously confirmed breaches in Arizona and Illinois, though it remains unclear whether other systems were successfully breached. Lawmakers such as Sen. Mark Warner (D-Va.) have demanded more information on the specific states targeted.

Homeland Security and Government Affairs ranking member Claire McCaskill (D-Mo.) wrote then-Secretary of Homeland Security John Kelly back in March, asking for more information on his plans for the critical infrastructure designation. The information released Wednesday is drawn from his response on June 13. Kelly has since left his post to serve as President Trump’s chief of staff.

“Prior to the election, DHS offered voluntary, no-cost cybersecurity services and assistance to election officials across all 50 states. By Election Day, 33 state election offices and 36 local election offices requested and received these cyber hygiene assessments of their internet-facing infrastructure,” Kelly wrote.

“In addition, one state election office requested and received a more in-depth risk and vulnerability assessment of their election infrastructure.”

Given the critical infrastructure designation, the DHS is providing cyber hygiene assessments, which include vulnerability scanning of election-related systems excluding voting machines and tallying systems, which the department recommends being disconnected from the internet.

The department also offers risk and vulnerability assessments, which include penetration testing, social engineering, wireless discovery and identification, and database and operating systems scanning. The DHS is also responsible for sharing threat information with owners and operators of critical infrastructure, which now include state and local election officials.

“Following the establishment of election infrastructure as critical infrastructure, several state and local governments requested new or expanded cybersecurity services from DHS,” Kelly disclosed in June, according to the letter. “Specifically, an additional two states and six local governments requested to begin cyber hygiene scanning (one state has, however, ended its service agreement). DHS also received one request for the risk and vulnerability assessment service.”

Many state and local election officials have opposed the designation, saying that the DHS has not offered enough information about what it means. The department has insisted that assistance will be given only to states that request it.

In the letter, Kelly, who has acknowledged objections, said there are “no plans to make any changes to the designation of election infrastructure as a critical infrastructure subsector.”

All of the Democratic members of the Senate Homeland Security and Governmental Affairs Committee have called for a full investigation into Russian election interference. The matter is already under investigation by the House and Senate Intelligence committees. The memo issued by Democratic staff on Wednesday was sent to the full committee.

Background at a Las Vegas Convention:

LAS VEGAS—For the first time in the 25 years of the world’s largest hacker convention, DefCon, two sitting U.S. Congressmen trekked here from Washington, D.C., to discuss their cybersecurity expertise on stage.

Rep. Will Hurd, a Texas Republican, and Rep. Jim Langevin, a Rhode Island Democrat, visited hacking villages investigating vulnerabilities in cars, medical devices, and voting machines; learned about how security researchers plan to defend quantum computers from hacks; and met children learning how to hack for good.

On Sunday, the last day of the conference, Hurd and Langevin delivered their own message: We come in peace. Please help us.

During a fireside chat-style conversation moderated by Joshua Corman, director of the Cyber Statecraft Initiative at the Atlantic Council, Hurd, chairman of the House Subcommittee on Information Technology, and Langevin, co-founder and co-chair of the Congressional Cybersecurity Caucus, called for the more than 2,000 hackers in the audience to “develop a dialogue” with their local representative in Congress.

“Never underestimate the value that you can bring to the table in helping to educate members and staff of what the best policies are, what’s going to work, and what’s not going to work,” Langevin said, pointing to Luta Security CEO and bug bounty expert Katie Moussouris’ ongoing advocacy for changes to the Wassenaar Arrangement, a decades-old international accord on how countries can transport “intrusion software” and other weapons across international borders.

Moussouris and Iain Mulholland of VMware have effectively convinced Wassenaar member countries to delay their adoption of proposed revisions to the agreement, as they’ve pushed for new language to better protect security researchers’ work.

The conversation between hackers and Congress has never been monosyllabic. But it has been frosty for decades, as federal prosecutors have used American antihacking laws such as the Computer Fraud and Abuse Act and Electronic Communication Privacy Act to punish people conducting legitimate security research.

As many security researchers continue to worry about how these laws might affect them, some have begun to use their expertise to influence the laws—and the lawmakers behind them.

Langevin and Hurd’s plea for hacker-legislator collaboration follows calls by hackers at last year’s DefCon for greater government regulation of software security.

“We don’t have voluntary minimum safety standards for cars; we have a mandatory minimum,” Corman told The Parallax at the time. “What tips the equation [for software] is the Internet of Things, because we now have bits and bytes meeting flesh and blood.”

Hurd said security researchers could play an important role in addressing increasingly alarming vulnerabilities in the nation’s voting apparatus. DefCon’s first voting machine-hacking village this weekend hosted a voting machine from Shelby County, Tenn., that unexpectedly contained personal information related to more than 600,000 voters. Village visitors managed to hack the machine, along with 29 others.

“We have to ensure that the American people can trust the vote-tabulating process,” Hurd said, acknowledging that DefCon attendees were able to hack each machine in the village. “The work that has been done out here is important in educating the secretaries of state all around the country, as well as the election administrators,” about secure technologies and practices.

Langevin and Hurd’s comments seemed to strike the right notes with hackers in attendance. Following Edward Snowden’s leaking of NSA documents and Apple’s refusal to create an encryption backdoor for law enforcement to the iPhone, relations between the hacking community and Washington have been strained at best, notes Herb Lin, a computer security policy expert and research fellow at Stanford University’s Center for International Security and Cooperation. But markedly improving the relationship will require more than a plea for collaboration, he warns.

“It’s better than what’s happened in the past, which is both nothing and active hostility,” he says. “One act by itself is not a game changer.”

The chat ended with assurances of more action from both sides. Corman said he’d like to see members of Congress attend more hacker conferences, such as ShmooCon in Washington, and Hurd promised that he wouldn’t let his experiences this past weekend go to waste.

“These conversations are going to lead me to hold hearings on many of these topics in the subcommittee that I chair,” Hurd said.

***  More details that were recorded at the convention:

DEF CON 2017 –  Are voting systems secure? In August 2016, the FBI issued a “flash” alert to election officials across the country confirming that foreign hackers have compromised state election systems in two states.

Although the US largely invested in electronic voting systems their level of security appears still not sufficient against a wide range of cyber attacks.

During an interesting session at the DEF CON hacking conference in Las Vegas, experts set up 30 computer-powered ballot boxes used in American elections simulating the Presidential election.  Welcome in the DEF CON Voting Village!

At the 1st ever Voting Village at , attendees tinker w/ election systems to find vulnerabilities. I’m told they found some new flaws

The organization asked the participant to physically compromise the system and hack into them, and the results were disconcerting.

“We encourage you to do stuff that if you did on election day they would probably arrest you.” John Hopkins computer scientist Matt Blaze said,

Most of the voting machines in the DEF CON Voting Village were purchased via eBay (Diebold, Sequoia and Winvote equipment), others were bought from government auctions.

voting machines hacking

In less than 90 minutes hackers succeeded in compromising the voting machines, one of them was hacker wirelessly.

“Without question, our voting systems are weak and susceptible. Thanks to the contributions of the hacker community today, we’ve uncovered even more about exactly how,” said Jake Braun, cybersecurity lecturer at the University of Chicago.

The analysis of the voting machines revealed that some of them were running outdated OS like Windows XP and Windows CE and flawed software such as unpatched versions of OpenSSL.

Some of them had physical ports open that could be used by attackers to install malicious applications to tamper with votes.

Even if physical attacks are easy to spot and stop, some voting machines were using poorly secured Wi-Fi connectivity.

The experts Carsten Schurmann at the DEF CON Voting Village hacked a WinVote system used in previous county elections via Wi-Fi, he exploited the MS03-026 vulnerability in Windows XP to access the voting machine using RDP.

Greetings from the Defcon voting village where it took 1:40 for Carsten Schurmann to get remote access to this WinVote machine.

Another system could be potentially cracked remotely via OpenSSL bug CVE-2011-4109, it is claimed.

huge cheer just went up in @votingvilllagedc as hackers managed to load Rick Astley video onto a voting machine

The good news is that most of the hacked equipment is no longer used in today’s election.