DreamHost/DistruptJ20 Warrant is an Outrage

The warrant is here.

The response delivered from DreamHost to the Justice Department is 60 pages and found here.

What is this Justice Department and Judge thinking? Of note, Jeff Sessions was not sworn in as Attorney General until February 9th. The warrant was signed off by John W, Borchert who was assigned to the Criminal Division’s Fraud Division.

The Electronic Frontier Foundation is aiding DreamHost as noted in this extensive blog post.

DreamHost is fighting DoJ request for 1.3M IP addresses of visitors to anti-Trump protest site

Web hosting service DreamHost is fighting a Department of Justice demand to scoop up all the IP addresses of visitors to an anti-Trump website. The website in question, disruptj20.org, organized participants of political protests against the current U.S. administration.

Blogging about its objections to the warrant yesterday, DreamHost’s general counsel describes it as “a highly untargeted demand that chills free association and the right of free speech afforded by the Constitution”.

DreamHost says it has not been able to see the affidavit pertaining to the warrant as those records are sealed. The search warrant can be found here.

In the warrant the DoJ demands that DreamHost hand over 1.3 million visitor IP addresses to the disruptj20.org website, along with contact information, email content, and photos of thousands of people.

“That information could be used to identify any individuals who used this site to exercise and express political speech protected under the Constitution’s First Amendment. That should be enough to set alarm bells off in anyone’s mind,” argues DreamHost.

“This is, in our opinion, a strong example of investigatory overreach and a clear abuse of government authority.”

The latest developments in what has been a months-long disagreement already, are that DreamHost has now filed arguments in opposition of the DoJ demand.

Its counsel will be attending a court hearing on the matter on August 18 in Washington, D.C.

DreamHost initially challenged the government to narrow the scope of the warrant but says instead the DoJ filed a motion in the Washington, D.C. Superior Court asking for an order to compel it to produce the records.

Also blogging about the issue yesterday, the Electronic Frontier Foundation accuses D.C. prosecutors of using “unconstitutional methods” to pursue their investigation into the J20 protests, aka the day President Trump was inaugurated.

“In just one example of the staggering overbreadth of the search warrant, it would require DreamHost to turn over the IP logs of all visitors to the [disruptj20.org] site. Millions of visitors — activists, reporters, or you (if you clicked on the link) — would have records of their visits turned over to the government. The warrant also sought production of all emails associated with the account and unpublished content, like draft blog posts and photos,” the EFF writes.

“No plausible explanation exists for a search warrant of this breadth, other than to cast a digital dragnet as broadly as possible. But the Fourth Amendment was designed to prohibit fishing expeditions like this. Those concerns are especially relevant here, where DOJ is investigating a website that served as a hub for the planning and exercise of First Amendment-protected activities.”

EB-5 Abusers go to Jail, Need More of This

When money buys citizenship, the honor, pride and loyalty fades fast.

Sounded good in theory at the time back in 1990 perhaps, then of course abuse set in:

EB-5 Immigrant Investor Program

USCIS administers the EB-5 Program. Under this program, entrepreneurs (and their spouses and unmarried children under 21) are eligible to apply for a green card (permanent residence) if they:

  • Make the necessary investment in a commercial enterprise in the United States; and
  • Plan to create or preserve 10 permanent full-time jobs for qualified U.S. workers.

This program is known as EB-5 for the name of the employment-based fifth preference visa that participants receive.

Congress created the EB-5 Program in 1990 to stimulate the U.S. economy through job creation and capital investment by foreign investors. In 1992, Congress created the Immigrant Investor Program, also known as the Regional Center Program. This sets aside EB-5 visas for participants who invest in commercial enterprises associated with regional centers approved by USCIS based on proposals for promoting economic growth.

There was a time this top democrat said: “I don’t believe that America should be selling visas and eventually citizenship,” said Sen. Dianne Feinstein, a Democrat of California. China is the biggest applicant to the program and no one can produce how many jobs are actually created.

In 2015 for instance, a Chinese national was arrested after investigators found he had obtained an EB-5 visa using stolen money. A 2013 Homeland Security investigation found that an Iranian who was arrested and involved in the EB-5 program had ties to Iranian intelligence operatives, The Times reported.

There has not been a congressional hearing dedicated to EB-5 abuse for more than a year, go here to watch the last one. Shocking.

The 2017 budget, which will continue funding the U.S. government until October, includes the extension of the EB-5 visa program, as lawmakers slipped the extension of the program into the spending bill.

 

It’s About Time — Two EB-5 Fraudsters Are Sent to Jail

After years of writing about the numerous and substantial frauds in the EB-5 program, I now can report that two people are going to jail for immigrant investor program crimes.

Each of the cases involved more than $100 million in misused EB-5 investments, with the actual thefts involving more than $10 million each. The cases had nothing to do with each other, but both show how badly the EB-5 program is managed by the Department of Homeland Security, an agency whose skill set does not include regulating high finance.

The EB-5 program currently gives a family-sized set of green cards to alien investors who place half-million-dollar investments through a DHS-approved regional center. The program, which keeps getting renewed by Congress for short periods, is due to sunset again on September 30. But the middlemen who benefit from the program (including some of the president’s in-laws) are likely to secure the program’s renewal again without any of the reforms it needs so badly. I hope I am wrong about that.

Earlier this month, Lobsang Dargey, said to be a former Tibetan monk, was sentenced to four years in prison for his crimes as part of a plea agreement. In addition to prison, Dargey agreed, along with associated firm Path Othello LLC, to disgorge $18.4 million. In these cases the question of deportation is handled separately and years later.

Dargey talked scores of investors, mostly from China, into buying into his Seattle real estate ventures.

Earlier in the year a similar conman was sentenced to three years in jail for an even bigger swindle in Chicago. This one was so dramatic that it reached the cover of Fortune magazine, even before sentencing. The promoters said it would be the:

“World’s First Zero Carbon Platinum LEED-certified and 100% Allergen Free convention center and hotel complex.” Lest anyone doubt its global eco-import, the project’s developer was branding it as a “Kyoto Protocol Centre.” At a projected cost of $913 million, it was to include three connected towers — 14, 17, and 19 stories tall — containing five upscale hotels with 995 suites and rooms, four levels of convention space, a green roof with a spa and yoga studio, a miniature golf course, and a 1,720-car “automatic robotic” parking garage.

The man behind the scam, Anshoo Sethi, now in jail, had told his gullible investors (and the equally gullible U.S. government) that he was investing $177.5 million worth of real estate in the project. However, that investment consisted of a modest motel, occupying two-plus acres near Chicago’s O’Hare Airport, that had been purchased by Sethi’s family for $10 million, a fact that any of the investors — or any DHS employee — could have discovered in the city’s land records. But no one checked until years later.

One hopes that these sentences will discourage other would-be EB-5 fraudsters, but while there have been dozens of accounts of similar schemes (as shown on a CIS-created map), so far these are the first to have led to well-deserved prison sentences.

Sergey Shoigu Planned with Maduro to Stop NATO in Latin America

And Venezuela needs the money, too bad Maduro capitulated on oil rights for power.

Shoigu’s Successes

Sergey has many successes on his resume, all of which make him a possible candidate for President. Here are some:

– Russia’s military success in Crimea, East Ukraine, Syria, South Ossetia, Chechnya, and down the border of NATO countries, Sergey and Russia were viewed as force well protected that can show effectiveness and efficiency in military actions

– Shoigu was minister in the Ministry of emergency situations for almost 22 years. During that time, he efficiently used the advantages of Russian bureaucracy and legalism to gather power and popularity, all while not making a single enemy

– Sergey showed pragmatic approach in addressing former American defense secretary Chuck Hagel with his personal name, not with his surname, which was practice before

Militarization of Russia

Since 2013, Russia and Moscow were heavily criticized for spending large amounts of money on armed forces. Many Western leaders thought that Putin is the man pulling the strings, and that it was his idea to spend so much money, despite his weak economy that is too much oil-dependent. However, what few people outside of Russia knew until lately is that Sergey Shoigu, the Russian defense minister is the one responsible for the huge expansion. More here.

 

In April of this year, Maduro’s Defense Minister paid an interesting visit to Moscow. Vladimir Padrino Lopez the Defense Minister would meet his Russian counterpart, Sergey Kuzhugetovich Shoygu, at a conference of international defense.

“I have come (to Moscow) upon the orders of President Nicolás Maduro,” Padrino said in the video. He added: “I bring a very interesting, a very important point (to the conference), which is NATO’s projection in Latin America, its consequences and risks.”

Beyond the excuse of the conference, why is Maduro’s Defense Minister, the man who “pulls the strings of power behind the scenes” in Venezuela according to García Otero, visiting Moscow precisely when massive citizen protests are posing an existential threat to the Chavista regime? The answer may have to do with what is perhaps the least analyzed aspect of the Venezuelan crisis: the geostrategic implications of a failed state in Venezuela from the point of view of the world’s great powers.

There certainly has been a shift in Washington’s attitude toward the Venezuelan regime since Donald Trump arrived at the White House. As the PanAm Post explained in 2016, the Obama administration carried out a three-pronged strategy in Latin America, its aims being:

  1. Achieving the dangerous pact between Colombian President Juan Manuel Santos and the communist FARC guerrillas.
  2. Renewing diplomatic and commercial relations with the Castros’ Cuba after more than five decades since the Cuban embargo was put in place.
  3. Appeasing the Maduro regime in Venezuela in order to guarantee the success of the Santos-FARC pact while preventing the implosion of the Cuban economy, which depends on Venezuelan oil for its survival (Obama wanted to avoid a Mariel Boatlift-type humanitarian crisis on the coasts of Florida).

Yes, there is some indication that NATO may begin cultivating members nations in Latin America, Putin is on the move using Iran, Cuba and Venezuela. Now you know why Vice President Pence is on a tour in Latin America.

When President Trump mentioned just a few days ago about a military option in Venezuela, he had something in mind due to the above meetings and building Russian influence in the region. Beginning in Columbia Pence discussions began this way:

Colombia is one of the United States’ closest allies in the Western Hemisphere, yet, as he stood next to Pence, Santos denounced Trump’s threat of military action, and told the visiting vice president that such a possibility “shouldn’t even be considered” and would be “unacceptable.”

“Every country in Latin America would not favor any form of military intervention, and that is why we are saying we are intent on looking into other measures, some of which are already underway and others to be implemented in the future,” Santos said.

The concerns build as Maduro’s Vice President, El Aissami has deep ties to Hezbollah of Iran and he was responsible for those tens of thousands of passports illegally issued for Syrians. Of course Putin is running Assad of Syria with the aid of Iran. Weapons abound globally. Vladimir Padrino Lopez is the mastermind and driver of the region.

The ideology of Venezuela’s minister of defense, Vladimir Padrino López, is captured in a 2015 photo of him kneeling before Fidel Castro. But he is reputed to be even closer to the Kremlin. This January, Venezuela launched a series of civil-military exercises around the country, dubbed Plan Zamora, under the guidance of advisers from Iran, Russia and Cuba.

Russia supplies arms to Venezuela. In November the Kremlin sent new aviation and air-defense technology to Caracas. Reuters reported in May that Venezuela now has “5,000 Russian-made MANPADS surface-to-air weapons,” representing “the largest known stockpile in Latin America.” More here from the WSJ.

  For a comprehensive timeline and names, go here, excellent work going back to 2015 investigating the Russian, Cuban, Iranian and Venezuelan operation.

 

Obama Blew All Opportunities with China and N. Korea

Obama along with Hillary and John gave us trade deals and climate change stuff….Obama did not understand Thucydides Trap and chose to ignore it. Steve Bannon and H.R, McMaster along with General Mattis are experts on it and President Trump is confused. Trump tells President Xi, he will honor the one China policy.
Obama launched an Asia Pivot, remember that? Others called it a ‘re-balance’. Well…..
The “rebalance” policy not only aims to protect the region from unwanted security threats, but also to secure commercial sea lanes for American imports and exports flowing in and out of the region.
It is increasingly important for the U.S. to maintain freedom for navigation from the
Arabian Sea to the Pacific Ocean. The economic aspects of the “rebalance” under the Obama Administration have been largely shaped by U.S. participation in the TPP talks aimed at institutionalizing regional free trade practices. The vision of the U.S. Trade Representative for the TPP is an FTA for the twelve negotiating parties –Australia, Brunei, Chile, Canada, Japan, Malaysia, Mexico, New Zealand, Peru, Singapore, the U.S., and Vietnam –
which will form the basis for a broader agreement that eventually could eventually include all the economies of the Asia -Pacific region, including China.
If successful, the TPP could provide the US with a number of benefits. It would include U.S. access to growing markets in Asia, help stimulate the growth in U.S. exports, generate export – related jobs, and foster an economic recovery, while enhancing measures to protect U.S. intellectual property rights, and ensuring that business competition occurs in a fair regional market.
The third major component of the U.S. “rebalance” policy falls in the “dignity basket”
that seeks to uphold democratic and human rights and the rule of law. The Obama
Administration’s emphasis on universal rights targets the credibility of the Chinese
government in the midst of its rapid growth and intends to apply pressure on Beijing to
adhere to right practices as a responsible stakeholder. In this way, China’s rise would be
perceived as less of a threat to regional and global powers and more as a constructive
member of the international community. The Administration’s “rebalance” to the Asia-
Pacific region is in essence a hedging strategy towards China, one that combines engagement
with Beijing with the creation of a network of bilateral military partnerships and alliances in the Asia-Pacific as a potential counterweight against the rise of China.
The U.S. “rebalance” has endowed smaller nations who are claimants of the South China
Sea territories with more political capital without becoming directly involved in such territorial disputes.
As a result, Chinese and western analysts are concerned about the “rebalance” being an actual policy of containment against China. Obama Administration officials, in response, repeatedly
make clear that “rebalance” to Asia is not a containment strategy, but a policy aimed at strategically placing the U.S. in a favorable position as the Asia-Pacific becomes one of

the major centers of global activity. More here.
*** So, with all that early on, the Obama administration got a TPP agreement…okay swell…what came next…
Well after all the Obama administration personnel changes and additional changes in region leaders including Japan, China and S. Korea….and the rise of Islamic State, the best then Obama and John Kerry could do was a Paris Agreement.

The United States and China announced Saturday that they are formally joining the Paris Agreement to combat climate change, significantly increasing the likelihood that the accord will take effect this year.

The announcement, made by U.S. President Barack Obama and Chinese President Xi Jinping before the start of the G20 summit in Hangzhou, China, adds momentum to ongoing international discussions surrounding climate change. The accord requires 55 countries to join, representing 55% of the world’s greenhouse gas emissions, before it enters into force. Together the U.S. and China represent nearly 39% of the world’s emissions. They join 24 other countries that have already signed on to the agreement, according to a count from the World Resources Institute.

The announcement is the latest in an unlikely partnership on climate change between the two countries. Chinese opposition to strong global warming measures, at least in part, prevented efforts to reach a strong climate deal in Copenhagen in 2009. But climate became an area of cooperation when Xi took office in 2013. The alignment between Obama and Xi has been credited with building support from other countries in advance of the Paris conference in 2015 that yielded the world’s strongest agreement on climate change. More here.

Where the hell were those consequences Obama talked about in September of 2016?

In part from ABC: North Korea confirmed its fifth nuclear test explosion early Friday, its largest yet. The provocation brought instant condemnation from the country’s neighbors and a call from President Obama for “serious consequences.”

Pyongyang also said it has made strides that could bring it closer to mounting a warhead on one of its ballistic missiles and launching a long-distance nuclear strike.

“We successfully conducted a nuclear explosion test to determine the power of [the] nuclear warhead,” a female anchor announced on North Korea’s state television. “We will continue to strengthen our nuclear capabilities to protect our sovereignty. We have now standardized and minimized nuclear warheads … We can now produce small nuclear warheads any time we desire.”

“Today’s nuclear test by the Democratic People’s Republic of Korea, if confirmed, is its second this year and the fifth since 2006,” said International Atomic Energy Agency Director General Yukiya Amano. “This is in clear violation of numerous UN Security Council resolutions and in complete disregard of the repeated demands of the international community. It is a deeply troubling and regrettable act.”

North Korea previously conducted nuclear tests in 2006, 2009, 2013, and most recently in January 2016.

South Korean President Park Geun-hye called the explosion an act of “fanatic recklessness.”

The White House said National Security Adviser Susan Rice briefed Obama on the incident.

“The president also consulted with President Park of the Republic of Korea and Prime Minister Abe of Japan in separate phone calls,” White House press secretary Josh Earnest told ABC News. “The president reiterated the unbreakable U.S. commitment to the security of our allies in Asia and around the world. The president indicated he would continue to consult our allies and partners in the days ahead to ensure provocative actions from North Korea are met with serious consequences.”

The U.S. State Department also told ABC News it was aware of the explosion.

“We are aware of seismic activity on the Korean Peninsula in the vicinity of a known North Korean nuclear test site,” State Department spokesman John Kirby said. “We are monitoring and continuing to assess the situation in close coordination with our regional partners. The Secretary has been briefed on this incident.”

China’s foreign ministry condemned North Korea’s nuclear test and said it will lodge a diplomatic protest with Pyongyang’s ambassador in Beijing. The foreign ministry issued a statement saying it “resolutely opposes” the test and “intensely urges” Pyongyang to abide by its non-proliferation promises.

Japanese Prime Minister Shinzo Abe said the test explosion “could not be tolerated.”

So now Guam is a target of North Korea due to fear of Thucydides Trap, there are 60 nuclear weapons in play, there are 10 hour trilateral air missions daily, and the U.S. nuclear triad is in active deployment.

For a list of what the United States has at the ready, go here. It all sounds good and comforting until someone asks what is on the menu of strategies going forward….the time for talk is over or is it?

 

2 Congressmen Watched Voting Machines Being Hacked

Primer

33 states accepted DHS aid to secure elections

The Department of Homeland Security (DHS) provided cybersecurity assistance to 33 state election offices and 36 local election offices leading up to the 2016 presidential election, according to information released by Democratic congressional staff.

During the final weeks of the Obama administration, the DHS announced that it would designate election infrastructure as critical, following revelations about Russian interference in the 2016 election.

Since January, two states and six local governments have requested cyber hygiene scanning from the DHS, according to a memo and DHS correspondence disclosed Wednesday by the Democratic staff of the Senate Homeland Security and Governmental Affairs Committee.

The information is related to the committee’s ongoing oversight of the DHS decision to designate election infrastructure.

The intelligence community said back in January that in addition to directing cyberattacks on the Democratic National Committee and top Democratic officials, Russia also targeted state and local electoral systems not involved in vote tabulating.

In June, DHS officials told senators investigating Russian interference that there was evidence that Russia targeted election-related systems in 21 states, none of them involved in vote tallying.

Officials have previously confirmed breaches in Arizona and Illinois, though it remains unclear whether other systems were successfully breached. Lawmakers such as Sen. Mark Warner (D-Va.) have demanded more information on the specific states targeted.

Homeland Security and Government Affairs ranking member Claire McCaskill (D-Mo.) wrote then-Secretary of Homeland Security John Kelly back in March, asking for more information on his plans for the critical infrastructure designation. The information released Wednesday is drawn from his response on June 13. Kelly has since left his post to serve as President Trump’s chief of staff.

“Prior to the election, DHS offered voluntary, no-cost cybersecurity services and assistance to election officials across all 50 states. By Election Day, 33 state election offices and 36 local election offices requested and received these cyber hygiene assessments of their internet-facing infrastructure,” Kelly wrote.

“In addition, one state election office requested and received a more in-depth risk and vulnerability assessment of their election infrastructure.”

Given the critical infrastructure designation, the DHS is providing cyber hygiene assessments, which include vulnerability scanning of election-related systems excluding voting machines and tallying systems, which the department recommends being disconnected from the internet.

The department also offers risk and vulnerability assessments, which include penetration testing, social engineering, wireless discovery and identification, and database and operating systems scanning. The DHS is also responsible for sharing threat information with owners and operators of critical infrastructure, which now include state and local election officials.

“Following the establishment of election infrastructure as critical infrastructure, several state and local governments requested new or expanded cybersecurity services from DHS,” Kelly disclosed in June, according to the letter. “Specifically, an additional two states and six local governments requested to begin cyber hygiene scanning (one state has, however, ended its service agreement). DHS also received one request for the risk and vulnerability assessment service.”

Many state and local election officials have opposed the designation, saying that the DHS has not offered enough information about what it means. The department has insisted that assistance will be given only to states that request it.

In the letter, Kelly, who has acknowledged objections, said there are “no plans to make any changes to the designation of election infrastructure as a critical infrastructure subsector.”

All of the Democratic members of the Senate Homeland Security and Governmental Affairs Committee have called for a full investigation into Russian election interference. The matter is already under investigation by the House and Senate Intelligence committees. The memo issued by Democratic staff on Wednesday was sent to the full committee.

Background at a Las Vegas Convention:

LAS VEGAS—For the first time in the 25 years of the world’s largest hacker convention, DefCon, two sitting U.S. Congressmen trekked here from Washington, D.C., to discuss their cybersecurity expertise on stage.

Rep. Will Hurd, a Texas Republican, and Rep. Jim Langevin, a Rhode Island Democrat, visited hacking villages investigating vulnerabilities in cars, medical devices, and voting machines; learned about how security researchers plan to defend quantum computers from hacks; and met children learning how to hack for good.

On Sunday, the last day of the conference, Hurd and Langevin delivered their own message: We come in peace. Please help us.

During a fireside chat-style conversation moderated by Joshua Corman, director of the Cyber Statecraft Initiative at the Atlantic Council, Hurd, chairman of the House Subcommittee on Information Technology, and Langevin, co-founder and co-chair of the Congressional Cybersecurity Caucus, called for the more than 2,000 hackers in the audience to “develop a dialogue” with their local representative in Congress.

“Never underestimate the value that you can bring to the table in helping to educate members and staff of what the best policies are, what’s going to work, and what’s not going to work,” Langevin said, pointing to Luta Security CEO and bug bounty expert Katie Moussouris’ ongoing advocacy for changes to the Wassenaar Arrangement, a decades-old international accord on how countries can transport “intrusion software” and other weapons across international borders.

Moussouris and Iain Mulholland of VMware have effectively convinced Wassenaar member countries to delay their adoption of proposed revisions to the agreement, as they’ve pushed for new language to better protect security researchers’ work.

The conversation between hackers and Congress has never been monosyllabic. But it has been frosty for decades, as federal prosecutors have used American antihacking laws such as the Computer Fraud and Abuse Act and Electronic Communication Privacy Act to punish people conducting legitimate security research.

As many security researchers continue to worry about how these laws might affect them, some have begun to use their expertise to influence the laws—and the lawmakers behind them.

Langevin and Hurd’s plea for hacker-legislator collaboration follows calls by hackers at last year’s DefCon for greater government regulation of software security.

“We don’t have voluntary minimum safety standards for cars; we have a mandatory minimum,” Corman told The Parallax at the time. “What tips the equation [for software] is the Internet of Things, because we now have bits and bytes meeting flesh and blood.”

Hurd said security researchers could play an important role in addressing increasingly alarming vulnerabilities in the nation’s voting apparatus. DefCon’s first voting machine-hacking village this weekend hosted a voting machine from Shelby County, Tenn., that unexpectedly contained personal information related to more than 600,000 voters. Village visitors managed to hack the machine, along with 29 others.

“We have to ensure that the American people can trust the vote-tabulating process,” Hurd said, acknowledging that DefCon attendees were able to hack each machine in the village. “The work that has been done out here is important in educating the secretaries of state all around the country, as well as the election administrators,” about secure technologies and practices.

Langevin and Hurd’s comments seemed to strike the right notes with hackers in attendance. Following Edward Snowden’s leaking of NSA documents and Apple’s refusal to create an encryption backdoor for law enforcement to the iPhone, relations between the hacking community and Washington have been strained at best, notes Herb Lin, a computer security policy expert and research fellow at Stanford University’s Center for International Security and Cooperation. But markedly improving the relationship will require more than a plea for collaboration, he warns.

“It’s better than what’s happened in the past, which is both nothing and active hostility,” he says. “One act by itself is not a game changer.”

The chat ended with assurances of more action from both sides. Corman said he’d like to see members of Congress attend more hacker conferences, such as ShmooCon in Washington, and Hurd promised that he wouldn’t let his experiences this past weekend go to waste.

“These conversations are going to lead me to hold hearings on many of these topics in the subcommittee that I chair,” Hurd said.

***  More details that were recorded at the convention:

DEF CON 2017 –  Are voting systems secure? In August 2016, the FBI issued a “flash” alert to election officials across the country confirming that foreign hackers have compromised state election systems in two states.

Although the US largely invested in electronic voting systems their level of security appears still not sufficient against a wide range of cyber attacks.

During an interesting session at the DEF CON hacking conference in Las Vegas, experts set up 30 computer-powered ballot boxes used in American elections simulating the Presidential election.  Welcome in the DEF CON Voting Village!

At the 1st ever Voting Village at , attendees tinker w/ election systems to find vulnerabilities. I’m told they found some new flaws

The organization asked the participant to physically compromise the system and hack into them, and the results were disconcerting.

“We encourage you to do stuff that if you did on election day they would probably arrest you.” John Hopkins computer scientist Matt Blaze said,

Most of the voting machines in the DEF CON Voting Village were purchased via eBay (Diebold, Sequoia and Winvote equipment), others were bought from government auctions.

voting machines hacking

In less than 90 minutes hackers succeeded in compromising the voting machines, one of them was hacker wirelessly.

“Without question, our voting systems are weak and susceptible. Thanks to the contributions of the hacker community today, we’ve uncovered even more about exactly how,” said Jake Braun, cybersecurity lecturer at the University of Chicago.

The analysis of the voting machines revealed that some of them were running outdated OS like Windows XP and Windows CE and flawed software such as unpatched versions of OpenSSL.

Some of them had physical ports open that could be used by attackers to install malicious applications to tamper with votes.

Even if physical attacks are easy to spot and stop, some voting machines were using poorly secured Wi-Fi connectivity.

The experts Carsten Schurmann at the DEF CON Voting Village hacked a WinVote system used in previous county elections via Wi-Fi, he exploited the MS03-026 vulnerability in Windows XP to access the voting machine using RDP.

Greetings from the Defcon voting village where it took 1:40 for Carsten Schurmann to get remote access to this WinVote machine.

Another system could be potentially cracked remotely via OpenSSL bug CVE-2011-4109, it is claimed.

huge cheer just went up in @votingvilllagedc as hackers managed to load Rick Astley video onto a voting machine

The good news is that most of the hacked equipment is no longer used in today’s election.