It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Much more at: www.cisa.gov...
This advisory identifies vulnerabilities affecting versions of the Dominion Voting Systems Democracy Suite ImageCast X, which is an in-person voting system used to allow voters to mark their ballot. While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.
Exploitation of these vulnerabilities would require physical access to individual ImageCast X devices, access to the Election Management System (EMS), or the ability to modify files before they are uploaded to ImageCast X devices. Jurisdictions can prevent and/or detect the exploitation of these vulnerabilities by diligently applying the mitigations recommended in this advisory, including technical, physical, and operational controls that limit unauthorized access or manipulation of voting systems.
originally posted by: rickymouse
It doesn't surprise me at all that the Biden Administration would inform the voting administrators of flaws in the system that can be used to hack the system instead of insisting all these flaws be fixed immediately before any further elections were held.
This proves that the machines can be hacked and it also opens up the issue of whether the last presidential election and other elections were valid. We have a lot of hackers out there that could have found these issues easily.
More at: apnews.com...
During a hearing, a lawyer for the state told the judge physical security elements recommended by CISA were “largely in place.”
But the secretary of state’s office has said a software update from Dominion is too cumbersome to install before the 2024 elections.
CISA recommends election officials continue to take and further enhance defensive measures to reduce the risk of exploitation of these vulnerabilities. Specifically, for each election, election officials should:
Ensure all affected devices are physically protected before, during, and after voting.
Ensure compliance with chain of custody procedures throughout the election cycle.
Ensure that ImageCast X and the Election Management System (EMS) are not connected to any external (i.e., Internet accessible) networks.
Ensure carefully selected protective and detective physical security measures (for example, locks and tamper-evident seals) are implemented on all affected devices, including on connected devices such as printers and connecting cables.
Close any background application windows on each ImageCast X device.
Use read-only media to update software or install files onto ImageCast X devices.
Use separate, unique passcodes for each poll worker card.
Ensure all ImageCast X devices are subjected to rigorous pre- and post-election testing.
Disable the “Unify Tabulator Security Keys” feature on the election management system and ensure new cryptographic keys are used for each election.
As recommended by Dominion Voting Systems, use the supplemental method to validate hashes on applications, audit log exports, and application exports.
Encourage voters to verify the human-readable votes on printout.
Conduct rigorous post-election tabulation audits of the human-readable portions of physical ballots and paper records, to include reviewing ballot chain of custody and conducting voter/ballot reconciliation procedures. These activities are especially crucial to detect attacks where the listed vulnerabilities are exploited such that a barcode is manipulated to be tabulated inconsistently with the human-readable portion of the paper ballot. (NOTE: If states and jurisdictions so choose, the ImageCast X provides the configuration option to produce ballots that do not print barcodes for tabulation.)
IN MY OPINION: Since this "bulletin" from the Biden-Harris administration says these numerous vulnerabilities have yet to be exploited, it stands to reason that the administration is using it to let technical people in the Election Fraud Organization (referenced by Joe Biden), know HOW to make vote manipulation easier for those who will flip votes on (or before) November 5th Election Day. 🚨
-WeMustCare 😎
originally posted by: rickymouse
It doesn't surprise me at all that the Biden Administration would inform the voting administrators of flaws in the system that can be used to hack the system instead of insisting all these flaws be fixed immediately before any further elections were held.
I am sure this information would be beneficial for some of the crooked people who would want to see their candidate win.
Fix the issues instead of informing the voting administration how to exploit them. The company who created the machines should be fixing the security issues they were not supposed to allow in the creation of the technology....
This proves that the machines can be hacked and it also opens up the issue of whether the last presidential election and other elections were valid. We have a lot of hackers out there that could have found these issues easily.
You're viewing things from the perspective that the Biden-Harris CISA is a good, well-meaning agency that wanted to make sure Joe was re-elected fair and square.
originally posted by: IndieA
a reply to: Dalamax
I would think the existence of known vulnerabilities would demand an alternative solution to the voting system.
Or fixing those vulnerabilities, and at the very least, updating election software to meet current security standards (Georgia).