US Election Recounts In ‘Hacked’ States?

Jill Stein, the Green party’s presidential candidate, is preparing to request recounts of the election result in several key battleground states. (2016 Electoral College Votes By State; pictured)

Stein launched an online fundraising page seeking donations toward a multimillion-dollar fund she said was needed to request reviews of the results in Michigan, Pennsylvania and Wisconsin.

The drive has already raised more than $4.5m, which the campaign said would enable it to file for recounts in Wisconsin on Friday and Pennsylvania. The fundraising page said it expected to need around $6m-7m to challenge the results in all three states. Stein said she was acting due to “compelling evidence of voting anomalies” and that data analysis had indicated “significant discrepancies in vote totals” that were released by state authorities. 

“These concerns need to be investigated before the 2016 presidential election is certified,” she said in a statement. “We deserve elections we can trust.” Stein’s move came amid growing calls for recounts or audits of the election results by groups of academics and activists concerned that foreign hackers may have interfered with election systems. The concerned groups have been urging Hillary Clinton, the defeated Democratic nominee, to join their cause.

Donald Trump won unexpected and narrow victories against Clinton in Pennsylvania and Wisconsin earlier in November and may yet win Michigan, where a final result has not yet been declared. 

A loose coalition of academics and activists concerned about the election’s security is preparing to deliver a report detailing its concerns to congressional committee chairs and federal authorities early next week, according to two people involved.

A second group of analysts, led by the National Voting Rights Institute founder John Bonifaz and Professor Alex Halderman, the director of the University of Michigan’s center for computer security and society, is also taking part in the push for a review. In a recent blogpost, Halderman said paper ballots and voting equipment should be examined in Wisconsin, Michigan and Pennsylvania. “Unfortunately, nobody is ever going to examine that evidence unless candidates in those states act now, in the next several days, to petition for recounts,” he said.

Clinton’s defeat to Donald Trump followed the release by US intelligence agencies of public assessments that Russian hackers were behind intrusions into regional electoral computer systems and the theft of emails from Democratic officials before the election. 

Curiosity about Wisconsin has centred on apparently disproportionate wins that were racked up by Trump in counties using electronic voting compared with those that used only paper ballots.

Use of the voting machines that are in operation in some Wisconsin counties has been banned in other states, including California, after security analysts repeatedly showed how easily they could be hacked into.

However, Nate Silver, the polling expert and founder of FiveThirtyEight, cast doubt over the theory, stating that the difference disappeared after race and education levels, which most closely tracked voting shifts nationwide, were controlled for.

Still, dozens of professors specialising in cybersecurity, defense and elections have signed an open letter to congressional leaders stating that they are “deeply troubled” by previous reports of foreign interference, and requesting swift action by lawmakers.

Guardian:           Fears Of Hacked US Election Ebb Away:      Was Donald Trump's Surprise Victory Hidden In The Data?:   
 

 

« Five Things AI Can Do Better Than Humans
CIA Chief - Trump Picks Pompeo »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Information Security Group (ISG) - Royal Holloway

Information Security Group (ISG) - Royal Holloway

The Information Security Group, Royal Holloway, University of London, is an Academic Centres of Excellence in Cyber Security Research.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

Nexusguard

Nexusguard

Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.