US Election Recounts In ‘Hacked’ States?

Jill Stein, the Green party’s presidential candidate, is preparing to request recounts of the election result in several key battleground states. (2016 Electoral College Votes By State; pictured)

Stein launched an online fundraising page seeking donations toward a multimillion-dollar fund she said was needed to request reviews of the results in Michigan, Pennsylvania and Wisconsin.

The drive has already raised more than $4.5m, which the campaign said would enable it to file for recounts in Wisconsin on Friday and Pennsylvania. The fundraising page said it expected to need around $6m-7m to challenge the results in all three states. Stein said she was acting due to “compelling evidence of voting anomalies” and that data analysis had indicated “significant discrepancies in vote totals” that were released by state authorities. 

“These concerns need to be investigated before the 2016 presidential election is certified,” she said in a statement. “We deserve elections we can trust.” Stein’s move came amid growing calls for recounts or audits of the election results by groups of academics and activists concerned that foreign hackers may have interfered with election systems. The concerned groups have been urging Hillary Clinton, the defeated Democratic nominee, to join their cause.

Donald Trump won unexpected and narrow victories against Clinton in Pennsylvania and Wisconsin earlier in November and may yet win Michigan, where a final result has not yet been declared. 

A loose coalition of academics and activists concerned about the election’s security is preparing to deliver a report detailing its concerns to congressional committee chairs and federal authorities early next week, according to two people involved.

A second group of analysts, led by the National Voting Rights Institute founder John Bonifaz and Professor Alex Halderman, the director of the University of Michigan’s center for computer security and society, is also taking part in the push for a review. In a recent blogpost, Halderman said paper ballots and voting equipment should be examined in Wisconsin, Michigan and Pennsylvania. “Unfortunately, nobody is ever going to examine that evidence unless candidates in those states act now, in the next several days, to petition for recounts,” he said.

Clinton’s defeat to Donald Trump followed the release by US intelligence agencies of public assessments that Russian hackers were behind intrusions into regional electoral computer systems and the theft of emails from Democratic officials before the election. 

Curiosity about Wisconsin has centred on apparently disproportionate wins that were racked up by Trump in counties using electronic voting compared with those that used only paper ballots.

Use of the voting machines that are in operation in some Wisconsin counties has been banned in other states, including California, after security analysts repeatedly showed how easily they could be hacked into.

However, Nate Silver, the polling expert and founder of FiveThirtyEight, cast doubt over the theory, stating that the difference disappeared after race and education levels, which most closely tracked voting shifts nationwide, were controlled for.

Still, dozens of professors specialising in cybersecurity, defense and elections have signed an open letter to congressional leaders stating that they are “deeply troubled” by previous reports of foreign interference, and requesting swift action by lawmakers.

Guardian:           Fears Of Hacked US Election Ebb Away:      Was Donald Trump's Surprise Victory Hidden In The Data?:   
 

 

« Five Things AI Can Do Better Than Humans
CIA Chief - Trump Picks Pompeo »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

National Cyber-Forensics & Training Alliance (NCFTA)

National Cyber-Forensics & Training Alliance (NCFTA)

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

PROMIA

PROMIA

PROMIA is in the business of providing solutions that are designed to support highly secure, reliable, scalable and interoperable business applications.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

Security Innovation Network (SINET)

Security Innovation Network (SINET)

SINET is dedicated to building a cohesive, worldwide Cybersecurity community with the goal of accelerating innovation through collaboration.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

INE

INE

INE is a premier provider of Technical Training for the IT industry.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Maltego Technologies

Maltego Technologies

Maltego is a comprehensive tool for graphical link analyses that offers real-time data mining and information gathering. Applications include cybersecurity threat intelligence and incident response.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

Strategic Security Solutions (S3)

Strategic Security Solutions (S3)

S3 is a leading provider of Cybersecurity consulting services for Identity and Access Governance (IAG), Zero Trust, and Enterprise Risk and Compliance.

Corgea

Corgea

Corgea is AI-powered security platform that finds, triages and fixes your insecure code.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.