US Election Recounts In ‘Hacked’ States?

Jill Stein, the Green party’s presidential candidate, is preparing to request recounts of the election result in several key battleground states. (2016 Electoral College Votes By State; pictured)

Stein launched an online fundraising page seeking donations toward a multimillion-dollar fund she said was needed to request reviews of the results in Michigan, Pennsylvania and Wisconsin.

The drive has already raised more than $4.5m, which the campaign said would enable it to file for recounts in Wisconsin on Friday and Pennsylvania. The fundraising page said it expected to need around $6m-7m to challenge the results in all three states. Stein said she was acting due to “compelling evidence of voting anomalies” and that data analysis had indicated “significant discrepancies in vote totals” that were released by state authorities. 

“These concerns need to be investigated before the 2016 presidential election is certified,” she said in a statement. “We deserve elections we can trust.” Stein’s move came amid growing calls for recounts or audits of the election results by groups of academics and activists concerned that foreign hackers may have interfered with election systems. The concerned groups have been urging Hillary Clinton, the defeated Democratic nominee, to join their cause.

Donald Trump won unexpected and narrow victories against Clinton in Pennsylvania and Wisconsin earlier in November and may yet win Michigan, where a final result has not yet been declared. 

A loose coalition of academics and activists concerned about the election’s security is preparing to deliver a report detailing its concerns to congressional committee chairs and federal authorities early next week, according to two people involved.

A second group of analysts, led by the National Voting Rights Institute founder John Bonifaz and Professor Alex Halderman, the director of the University of Michigan’s center for computer security and society, is also taking part in the push for a review. In a recent blogpost, Halderman said paper ballots and voting equipment should be examined in Wisconsin, Michigan and Pennsylvania. “Unfortunately, nobody is ever going to examine that evidence unless candidates in those states act now, in the next several days, to petition for recounts,” he said.

Clinton’s defeat to Donald Trump followed the release by US intelligence agencies of public assessments that Russian hackers were behind intrusions into regional electoral computer systems and the theft of emails from Democratic officials before the election. 

Curiosity about Wisconsin has centred on apparently disproportionate wins that were racked up by Trump in counties using electronic voting compared with those that used only paper ballots.

Use of the voting machines that are in operation in some Wisconsin counties has been banned in other states, including California, after security analysts repeatedly showed how easily they could be hacked into.

However, Nate Silver, the polling expert and founder of FiveThirtyEight, cast doubt over the theory, stating that the difference disappeared after race and education levels, which most closely tracked voting shifts nationwide, were controlled for.

Still, dozens of professors specialising in cybersecurity, defense and elections have signed an open letter to congressional leaders stating that they are “deeply troubled” by previous reports of foreign interference, and requesting swift action by lawmakers.

Guardian:           Fears Of Hacked US Election Ebb Away:      Was Donald Trump's Surprise Victory Hidden In The Data?:   
 

 

« Five Things AI Can Do Better Than Humans
CIA Chief - Trump Picks Pompeo »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NCC Group

NCC Group

NCC Group is a global cyber and software resilience business operating across multiple sectors, geographies and technologies.

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Nuspire

Nuspire

Nuspire provide services to protect your network with best-in-class managed detection and response, allowing you to stay focused on managing your business.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. 

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.