US Election Recounts In ‘Hacked’ States?

Jill Stein, the Green party’s presidential candidate, is preparing to request recounts of the election result in several key battleground states. (2016 Electoral College Votes By State; pictured)

Stein launched an online fundraising page seeking donations toward a multimillion-dollar fund she said was needed to request reviews of the results in Michigan, Pennsylvania and Wisconsin.

The drive has already raised more than $4.5m, which the campaign said would enable it to file for recounts in Wisconsin on Friday and Pennsylvania. The fundraising page said it expected to need around $6m-7m to challenge the results in all three states. Stein said she was acting due to “compelling evidence of voting anomalies” and that data analysis had indicated “significant discrepancies in vote totals” that were released by state authorities. 

“These concerns need to be investigated before the 2016 presidential election is certified,” she said in a statement. “We deserve elections we can trust.” Stein’s move came amid growing calls for recounts or audits of the election results by groups of academics and activists concerned that foreign hackers may have interfered with election systems. The concerned groups have been urging Hillary Clinton, the defeated Democratic nominee, to join their cause.

Donald Trump won unexpected and narrow victories against Clinton in Pennsylvania and Wisconsin earlier in November and may yet win Michigan, where a final result has not yet been declared. 

A loose coalition of academics and activists concerned about the election’s security is preparing to deliver a report detailing its concerns to congressional committee chairs and federal authorities early next week, according to two people involved.

A second group of analysts, led by the National Voting Rights Institute founder John Bonifaz and Professor Alex Halderman, the director of the University of Michigan’s center for computer security and society, is also taking part in the push for a review. In a recent blogpost, Halderman said paper ballots and voting equipment should be examined in Wisconsin, Michigan and Pennsylvania. “Unfortunately, nobody is ever going to examine that evidence unless candidates in those states act now, in the next several days, to petition for recounts,” he said.

Clinton’s defeat to Donald Trump followed the release by US intelligence agencies of public assessments that Russian hackers were behind intrusions into regional electoral computer systems and the theft of emails from Democratic officials before the election. 

Curiosity about Wisconsin has centred on apparently disproportionate wins that were racked up by Trump in counties using electronic voting compared with those that used only paper ballots.

Use of the voting machines that are in operation in some Wisconsin counties has been banned in other states, including California, after security analysts repeatedly showed how easily they could be hacked into.

However, Nate Silver, the polling expert and founder of FiveThirtyEight, cast doubt over the theory, stating that the difference disappeared after race and education levels, which most closely tracked voting shifts nationwide, were controlled for.

Still, dozens of professors specialising in cybersecurity, defense and elections have signed an open letter to congressional leaders stating that they are “deeply troubled” by previous reports of foreign interference, and requesting swift action by lawmakers.

Guardian:           Fears Of Hacked US Election Ebb Away:      Was Donald Trump's Surprise Victory Hidden In The Data?:   
 

 

« Five Things AI Can Do Better Than Humans
CIA Chief - Trump Picks Pompeo »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

NSFOCUS Information Technology

NSFOCUS Information Technology

NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

Marcus Donald People

Marcus Donald People

Marcus Donald People is a UK IT recruitment specialist covering the following sectors: Infrastructure & Cloud, Information Security, Development, Business transformation.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

Kasada

Kasada

Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

RevBits

RevBits

RevBits provides high-performance cybersecurity solutions including email security, endpoint security, deception technology and PAM solution to enterprise companies and public sector organizations.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

SpeQtral

SpeQtral

SpeQtral offers commercial space-based Quantum Key Distribution (QKD) founded on technology developed at the National University of Singapore.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

Etalon Cyber

Etalon Cyber

Etalon Cyber provides a range of advanced features to ensure the highest level of security for your website.