<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>2016 election &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/2016-election/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Thu, 26 Mar 2020 19:15:00 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>2016 election &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>HBO’s &#8216;Kill Chain&#8217; doc highlights the flaws in US election machines</title>
		<link>https://www.efrtechgroup.com/tech/hbos-kill-chain-doc-highlights-the-flaws-in-us-election-machines/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Thu, 26 Mar 2020 19:15:00 +0000</pubDate>
				<category><![CDATA[2016 election]]></category>
		<category><![CDATA[2016election]]></category>
		<category><![CDATA[2020 election]]></category>
		<category><![CDATA[2020election]]></category>
		<category><![CDATA[Election]]></category>
		<category><![CDATA[election interference]]></category>
		<category><![CDATA[election security]]></category>
		<category><![CDATA[electioninterference]]></category>
		<category><![CDATA[electionsecurity]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[harri hursti]]></category>
		<category><![CDATA[harrihursti]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[voting machines]]></category>
		<category><![CDATA[votingmachines]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/hbos-kill-chain-doc-highlights-the-flaws-in-us-election-machines/</guid>

					<description><![CDATA[[ad_1] While the matter is of grave concern across the country, Kill Chain: The Cyber War on America&#8217;s Elections delves into problems with some specific machines and issues in certain states. For instance, back in 2005, security researcher Harri Hursti (a key figure in the film) demonstrated a memory card exploit that could alter votes [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>While the matter is of grave concern across the country, <em>Kill Chain: The Cyber War on America&#8217;s Elections</em> delves into problems with some specific machines and issues in certain states. For instance, back in 2005, security researcher Harri Hursti (a key figure in the film) demonstrated a memory card exploit that could alter votes on an optical scan voting machine. Those Diebold machines are still in operation in 20 states and are slated for use in November, the filmmakers note.</p>
<p><center></p>
<figure class="iframe-container"><iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/AwSVN_dgio8" width="560"></iframe></figure>
<p></center></p>
<p>Elsewhere, a judge <a href="https://www.engadget.com/2019-08-16-georgia-voting-machines-election-security.html">banned Georgia</a> from continuing to use the vulnerable systems it had in place for well over a decade. In the wake of the <a href="https://www.engadget.com/2018-11-09-how-brian-kemp-hacked-georgias-election.html">contentious 2018 gubernatorial election</a>, officials <a href="https://www.wtvy.com/content/news/Georgia-launches-new-voting-machines-statewide-for-presidential-primary-568441531.html" target="_blank" rel="noopener noreferrer">had new machines in place</a> for this month&#8217;s presidential primary. While the replacements can print paper ballots, which are important <a href="https://www.engadget.com/2019/06/09/ess-backs-away-from-paperless-voting-machines/">for proper vote auditing,</a> they&#8217;re still very much vulnerable as they <a href="https://www.govtech.com/security/Georgia-Awards-107M-Voting-Machine-Contract-to-Dominion.html" target="_blank" rel="noopener noreferrer">run on Windows 7</a> &#8212; for which Microsoft <a href="https://www.engadget.com/2020/01/14/microsoft-ends-support-for-windows-7-today/">recently ended support</a>.</p>
<p>We also hear from an Indian hacker who says he was able to <a href="https://www.cyberscoop.com/alaska-election-website-hacked-2016/" target="_blank" rel="noopener noreferrer">gain full access</a> to Alaska&#8217;s system, including live voting data, during the 2016 presidential election. He claims he&#8217;d have been able to remove a candidate from the ballot or change any vote, but decided not to for fear of triggering some kind of alarm.</p>
<p>The documentary adeptly skirts the line between spelling out specific vulnerabilities and making the problems clear enough for the less technically-minded among us. It touches on many other issues related to election security, such as remote access and the case of the <a href="https://www.engadget.com/2018/08/23/nsa-leaker-reality-winner-sentenced-to-5-years-in-prison/">NSA whistleblower Reality Winner</a> and some prominent figures weigh in, including recent presidential candidate Amy Klobuchar.</p>
<p>The film is effective in hammering home its message about the technical issues that pervade many US polling machines. It&#8217;s not much of a spoiler to reveal its main call-to-action: ask for a paper ballot if you&#8217;re not completely certain that your district&#8217;s electronic system is secure. <em>Kill Chain: The Cyber War on America&#8217;s Elections</em> premieres at 9PM ET on HBO, HBO Now and HBO Go.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2020/03/26/hbo-election-hacking-documentary-kill-chain/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Senate: Obama Admin. wasn&#8217;t prepared to handle Russian interference</title>
		<link>https://www.efrtechgroup.com/tech/senate-obama-admin-wasnt-prepared-to-handle-russian-interference/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Thu, 06 Feb 2020 17:37:00 +0000</pubDate>
				<category><![CDATA[2016 election]]></category>
		<category><![CDATA[Election]]></category>
		<category><![CDATA[election interference]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[interference]]></category>
		<category><![CDATA[mark warner]]></category>
		<category><![CDATA[obama]]></category>
		<category><![CDATA[obama administration]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[report]]></category>
		<category><![CDATA[richard burr]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[select committee on intelligence]]></category>
		<category><![CDATA[senate]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/senate-obama-admin-wasnt-prepared-to-handle-russian-interference/</guid>

					<description><![CDATA[[ad_1] Committee Chairman Richard Burr (R-NC) said the Obama administration &#8220;struggled to determine the appropriate response&#8221; and &#8220;debated courses of action without truly taking one.&#8221; The administration worried about alarming the American people and that a statement could be perceived as political, given that then-President Obama was actively campaigning for Hillary Clinton. &#8220;There were many [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>Committee Chairman Richard Burr (R-NC) said the Obama administration &#8220;struggled to determine the appropriate response&#8221; and &#8220;debated courses of action without truly taking one.&#8221; The administration worried about alarming the American people and that a statement could be perceived as political, given that then-President Obama was actively campaigning for Hillary Clinton.</p>
<p>&#8220;There were many flaws with the U.S. response to the 2016 attack, but it&#8217;s worth noting that many of those were due to problems with our own system – problems that can and should be corrected,&#8221; said Vice Chairman Mark Warner (D-VA).</p>
<p>The committee concluded that in the case of future attacks, the public should be notified &#8220;as soon as possible with a clear and succinct statement of the threat.&#8221; Though, Burr says that as the 2020 presidential election approaches, the US is <a href="https://www.engadget.com/2018/07/20/doj-publicly-expose-foreign-election-schemes/">in a better position</a> to identify foreign interference efforts.</p>
<p>This Senate report is the third of an expected five that will investigate the government&#8217;s handling of Russia&#8217;s election interference. The <a href="https://www.engadget.com/2019/07/25/intelligence-committee-election-report/">first report was released in July</a>. We don&#8217;t know when the final two will be complete, but they are expected to detail the intelligence community&#8217;s 2017 assessment on Russian interference and the final counterintelligence findings.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2020/02/06/senate-report-obama-election-interference/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Intelligence Committee releases heavily redacted report on 2016 election hacking</title>
		<link>https://www.efrtechgroup.com/tech/intelligence-committee-releases-heavily-redacted-report-on-2016-election-hacking/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Fri, 26 Jul 2019 00:16:00 +0000</pubDate>
				<category><![CDATA[2016 election]]></category>
		<category><![CDATA[2020 election]]></category>
		<category><![CDATA[intelligence committee]]></category>
		<category><![CDATA[mark warner]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[richard burr]]></category>
		<category><![CDATA[ron wyden]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[senate]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/intelligence-committee-releases-heavily-redacted-report-on-2016-election-hacking/</guid>

					<description><![CDATA[[ad_1] Today the US Senate Select Committee on Intelligence released Vol. 1 of its report (PDF) on Russian attempts at election hacking in 2016. However, much of the information in it has already been released &#8212; like knowledge that hacking attempts reached all 50 states in one form or another &#8212; or is blacked out. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>Today the US Senate Select Committee on Intelligence released Vol. 1 of its report (<a href="https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume1.pdf">PDF</a>) on Russian attempts at election hacking in 2016. However, much of the information in it has already been released &#8212; like knowledge that hacking attempts reached all 50 states in one form or another &#8212; or is blacked out. As the <a href="https://www.nytimes.com/2019/07/25/us/politics/russian-hack-of-elections-system-was-far-reaching-report-finds.html"><em>New York Times</em></a> notes, information redacted includes some of the key lessons for 2020.</p>
<p>In public statements about the report, <a href="https://www.burr.senate.gov/press/releases/senate-intel-releases-election-security-findings-in-first-volume-of-bipartisan-russia-report">senators in both parties on the committee noted</a> there is still work remaining to be done to ensure election security in 2020. Despite that, earlier today Senate Majority Leader Mitch McConnell blocked the consideration of election security bills. In response, Senator Ron Wyden said in a <a href="https://www.wyden.senate.gov/news/press-releases/wyden-renews-call-for-mandatory-election-security-standards-in-response-to-intelligence-committee-report">statement</a> that &#8220;We shouldn&#8217;t ask a county election IT employee to fight a war against the full capabilities and vast resources of Russia&#8217;s cyber army. That approach failed in 2016 and it will fail again.&#8221;</p>
<blockquote>
<p><strong>Key Findings and Recommendations:</strong></p>
<ul>
<li><small>The Russian government directed extensive activity against U.S. election infrastructure. The Committee found the activity directed at the state and local level began in at least 2014 and carried into at least 2017. The Committee has seen no evidence that any votes were changed or that any voting machines were manipulated.</small></li>
<li><small>Russian efforts exploited the seams between federal authorities and capabilities, and protection for the states. The Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) are, by design, limited in domestic cybersecurity authorities. State election officials, who have primacy in running elections, were not sufficiently warned or prepared to handle an attack from a hostile nation-state actor.</small></li>
<li><small>DHS and FBI warnings to the states in the late summer and fall of 2016 did not provide enough information or go to the appropriate people. The Committee found that while the alerts were actionable, they provided no clear reason for states to take the threat more seriously than other warnings.</small></li>
<li><small>DHS has redoubled its efforts to build trust with the states and deploy resources to assist in securing elections. Since 2016, DHS has made great strides in learning how election procedures vary across states and how to best assist those states. The Committee determined DHS&#8217;s work to bolster states&#8217; cybersecurity has likely been effective but believes more needs to be done to coordinate efforts.</small></li>
<li><small>Russian activities demand renewed attention to vulnerabilities in U.S. voting infrastructure. Cybersecurity for electoral infrastructure at the state and local level was sorely lacking in 2016. Despite increased focus over the last three years, some of these vulnerabilities, including aging voting equipment, remain. As states look to replace machines that are now out of date, they should purchase more secure voting machines. At a minimum, any machine purchased going forward should have a voter-verified paper trail.</small></li>
<li><small>Congress should evaluate the results of the $380 million in state election security grants allocated in 2018. States should be able to use grant funds provided under the Help America Vote Act (HAVA) to improve cybersecurity in a variety of ways, including hiring additional IT staff, updating software, and contracting vendors to provide cybersecurity services. When those funds are spent, Congress should evaluate the results and consider an additional appropriation to address remaining insecure voting machines and systems.</small></li>
<li><small>DHS and other federal government entities remain respectful of the limits of federal involvement in state election systems. America&#8217;s decentralized election system can be a strength against cybersecurity threats. However, the federal government and states should each be aware of their own cybersecurity limitations and know both how and when to obtain assistance. States should remain firmly in the lead on running elections, and the federal government should ensure they receive the necessary resources and information.</small></li>
<li><small>The United States must create effective deterrence. The United States should communicate to adversaries that it will view an attack on its election infrastructure as a hostile act and respond accordingly. The U.S. government should not limit its response to cyber activity; rather, it should create a menu of potential responses that will send a clear message and create significant costs for the perpetrator.</small></li>
</ul>
</blockquote></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/07/25/intelligence-committee-election-report/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
