Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Demographics, Not Hacking, Explain The Election Results (538.com not buying it)
fivethirtyeight.com ^ | Nov 23, 2016 | By Carl Bialik and Rob Arthur

Posted on 11/26/2016 7:16:32 AM PST by jmaroneps37

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-31 last
To: JayAr36

We already know students throughout the state system voted twice, once at school and once at home. Not sure what is/can be done about it.


21 posted on 11/26/2016 7:49:17 AM PST by reformedliberal
[ Post Reply | Private Reply | To 16 | View Replies]

To: jmaroneps37

In general, vote fraud and tampering is OWNED by the democrats. Once you start looking under rocks, hard to tell what will be found. It may not be what they expect.

May want to tread lightly.


22 posted on 11/26/2016 7:49:23 AM PST by americas.best.days... ( I think we can now say that they are behind us.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: goldstategop

“no justifiable reason other than liberal paranoia over possible hacking/vote fraud.”

There is no liberal paranoia over possible hacking/voter fraud since they know whatever there is was rigged by them. The reason for the recount is a fishing expedition in order to generate more fraudulent ballots.


23 posted on 11/26/2016 7:50:04 AM PST by odawg
[ Post Reply | Private Reply | To 5 | View Replies]

To: jmaroneps37

Remember, the election ain’t over until the dead are finished voting.


24 posted on 11/26/2016 8:00:46 AM PST by sima_yi ( Reporting live from the far North)
[ Post Reply | Private Reply | To 1 | View Replies]

Trump will turn the Dems into a starving zombie army that sings We Shall Overcome as they stumble around, hungrily searching for a pound of flesh to feed on, after they got so used to eating away at our country’s foundations for so many years.


25 posted on 11/26/2016 8:05:47 AM PST by The Fop (God Bless Donald Trump, Frank Sinatra, Joan Rivers, and the Fightin' Rat Pack Wing of the GOP)
[ Post Reply | Private Reply | To 1 | View Replies]

To: jmaroneps37
AFFIDAVIT OF J. ALEX HALDERMAN

J. ALEX HALDERMAN, being duly sworn, deposes and says the following under penalty of perjury:

1. My name is J. Alex Halderman. I am a Professor of Computer Science and Engineering and the Director of the Center for Computer Security and Society at the University of Michigan in Ann Arbor, Michigan.

2. I have a Ph.D., a Master's Degree, and a Bachelor's Degree in Computer Science, all from Princeton University.

3. My research focuses on computer security and privacy, with an emphasis on problems that broadly impact society and public policy. Among my areas of research are software security, data privacy, and electronic voting.

4. l have published peer-reviewed research analyzing the security of electronic voting systems used in Wisconsin, other U.S. states, and other countries. 1 was part of a team of experts commissioned by the California Secretary of State to conduct a "Top-to-Bottom" review of the state's electronic voting systems. I have also investigated methods for improving the security of electronic voting, such as efficient techniques for testing whether electronic vote totals match paper vote records.

5. I have published numerous other peer-reviewed papers in these areas of research. My full curriculum vitae, including a list of honors and awards, research projects, and publications, is attached as Exhibit A.

Context: Cyberattacks and the 2016 Presidential Election

6. The 2016 presidential election was subject to unprecedented cyberattacks apparently intended to interfere with the election. This summer, attackers broke into the email system of the Democratic National Committee and, separately, into the email account of John Podesta, the chairman of Secretary Clinton's campaign. Exhibits B and C. The attackers leaked private messages from both hacks. Attackers also infiltrated the voter registration systems of two states, Illinois and Arizona, and stole voter data. Exhibit D. The Department of Homeland Security has stated that senior officials in the Russian government commissioned these attacks. Exhibit E. Attackers attempted to breach election offices in more than 20 other states. Exhibit F.

7. Russia bas sophisticated cyber-offensive capabilities, and it has shown a willingness to use them to hack elections elsewhere. For instance, according to published reports, during the 2014 presidential election in Ukraine, attackers linked to Russia sabotaged Ukraine's vote-counting infrastructure, and Ukrainian officials succeeded only at the 1ast minute in defusing vote-stealing malware that could have caused the wrong winner to be announced. Exhibit G. Countries other than Russia also have similarly sophisticated cyberwarfare capabilities.

8. If a foreign government were to attempt to hack American voting machines to influence the outcome of a presidential election, one might expect the attackers to proceed as follows. First, the attackers might probe election offices well in advance to find ways to break into the computers. Next, closer to the election, when it was clear from polling data which states would have close electoral margins, the attackers might spread malware into voting machines into some of these states, manipulating the machines to shift a few percent of the vote to favor their desired candidate. This malware would likely be designed to remain inactive during pre-election tests, perform its function during the election, and then erase itself after the polls closed. One would expect a skilled attacker's work to leave no visible signs, other than a surprising electoral outcome in which results in several close states differed from pre-election polling.

The Vulnerability of American Voting Machines to Cyberattack

9. As I and other experts have repeatedly documented in peer-reviewed and state sponsored research, American voting machines have serious cybersecurity problems. Voting machines are computers with reprogrammable software. An attacker who can modify that software by infecting the machines with malware can cause the machines to provide any result of the attacker's choosing. As I have demonstrated in laboratory tests, in just a few seconds, anyone can install vote-stealing malware on a voting machine that silently alters the electronic records of every vote. 1

l0. Whether voting machines are connected to the Internet is irrelevant. Shortly before each election, poll workers copy the ballot design from a regular desktop computer in a government office and use removable media (akin to the memory card in a digital camera) to load the ballot design onto each machine. That initial computer is almost certainly not well enough secured to guard against attacks by foreign governments. If technically sophisticated attackers A video documenting this result is publicly available at https://youtu.be/aZws98jw67g. infect that computer, they can spread vote-stealing malware to every voting machine in the area. Technically sophisticated attackers can accomplish this with ease. 11. While the vulnerabilities of American voting machines have been known for some time, states' responses to these vulnerabilities have been patchy and inconsistent at best. Many states, including Wisconsin, continue to use out-of-date machines that are known to be insecure.

Examining the Paper Record Is the Only Way to Ensure the Integrity of the Result

12. Paper ballots are the best and most secure technology available for casting votes. Optical scan voting allows the voter to fill out a paper ballot that is scanned and counted by a computer. Electronic voting machines with voter-verified paper audit trails allow the voter to review a printed record of the vote he bas just cast on a computer. Only a paper record documents the vote in a manner that cannot later be modified by malware or other forms of cyberattacks.

13. One explanation for the results of the 2016 presidential election is that cyberattacks influenced the result. This explanation is plausible, in light of other known cyberattacks intended to affect the outcome of the election; the profound vulnerability of American voting machines to cyberattack; and the fact that a skilled attacker would leave no outwardly visible evidence of an attack other than an unexpected result.

14. The only way to determine whether a cyberattack affected the outcome of the 2016 presidential election is to examine the available physical evidence-that is, to count the paper ballots and paper audit trail records, and review the voting equipment, to ensure that the votes cast by actual voters match the results determined by the computers. For ballots cast through optical scanners, a manual recount of the paper ba1Iots, without relying on the electronic equipment, must occur. Using the electronic equipment to conduct the recount, even after first evaluating the machine through a test deck, is insufficient. Attackers intending to commit a successful cyberattack could, and likely would, create a method to undermine any pre-tests. For votes cast on electronic voting machines, the paper audit trail records must be counted, since the electronic records stored in the machines could have been manipulated in an attack. Voting equipment that might yield forensic evidence of an attack includes the voting machines, removable media, and election management system computers. Paper ballots, paper audit trails, and voting equipment will only be examined in this manner if there is a recount.

15. A recount is the best way, and indeed the only way, to ensure public confidence that the results are accurate, authentic, and untainted by interference. It will also set a precedent that may provide an important deterrent against cyberattacks on future elections.

http://elections.wi.gov/sites/default/files/news/wisconsin_recount_petition_of_jill_stein_00268242_12391.pdf

In item 6 is stated that Illinois and Arizona voter registration systems were breached. An NBC news story is cited to support this claim. The NBC news story states that Illinois voter registration systems were breached and that attempts to breach Arizona's system failed.

In item 6 is stated that "attackers broke into [] the email account of John Podesta". Podesta's email was retrieved because he clicked on spam and provided his password. http://www.salon.com/2016/10/21/hillary-clinton-campaign-chariman-john-podestas-email-was-hacked-because-he-clicked-on-a-phishing-link/

In item 6 is stated "The Department of Homeland Security has stated that senior officials in the Russian government commissioned these attacks." The DNI-DHS statement does not claim there is evidence that Russia directed or conducted attacks, specifically stating "we are not now in a position to attribute this activity to the Russian Government." DNI & DHS believe attacks are "consistent with methods and motivations". Methods and motivations are not proof of actions, as the joint statement makes clear. https://www.dni.gov/index.php/newsroom/press-releases/215-press-releases-2016/1423-joint-dhs-odni-election-security-statement

Item 8 is conjecture.

No evidence of hacking or irregularity is presented by Halderman. Presented is conjecture, exaggerations, distortions, and lies.*


Stein claims an increase in absentee votes is an irregularity. Stein presents no evidence that any irregularity in absentee voting occurred.

 

* conjecture, exaggerations, distortions, and lies - item 8 in Halderman's affidavit is pure conjecture, exaggerated claims regarding the DNI-DHS statement, distorting Podesta's e-mail characterizing it as being "broken into" when Podesta himself provided the password (Note also, Podesta's email has nothing whatsoever to do with Wisconsin or any other state's voting systems. This is simply an attempt to prey upon the public mind by casting fear, uncertainty, and doubt into it.), lying about Arizona's voter registration systems being breached

26 posted on 11/26/2016 8:11:00 AM PST by Ray76 (DRAIN THE SWAMP)
[ Post Reply | Private Reply | To 1 | View Replies]

To: jmaroneps37
“Examining the physical evidence in these states — even if it finds nothing amiss — will help allay doubt and give voters justified confidence that the results are accurate,” Halderman wrote.

If these phonies were REALLY interested in "justifying confidence" they'd be all for Voter ID.

27 posted on 11/26/2016 8:20:02 AM PST by Oatka (Beware of an old man in a profession where men usually die young.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ray76

The professor has not made a case why only these three states were the targets of “hacking.” Surely in the interest of science, the good “scientist” needs a comparison to an un-hacked state ballot system. Otherwise, his learned opinion looks more like cherry-picking.


28 posted on 11/26/2016 8:29:34 AM PST by Sgt_Schultze (If a border fence isn't effective, why is there a border fence around the White House?)
[ Post Reply | Private Reply | To 26 | View Replies]

To: EQAndyBuzz
Trump can use this to fix voting fraud once and for all.

Yes Trump needs to add the fixing of voting fraud to his agenda.

It's so very important.

29 posted on 11/26/2016 9:09:40 AM PST by FreeReign
[ Post Reply | Private Reply | To 11 | View Replies]

To: jmaroneps37

One of the great benefits of this election is that we will never hear of the infallible accuracy of fivethirtyeight polls and analyses anymore, or the ignorant mumblings of Nate Silver.


30 posted on 11/26/2016 10:03:43 AM PST by oldbill
[ Post Reply | Private Reply | To 1 | View Replies]

To: jmaroneps37

... and Lenin’s not really dead.


31 posted on 11/26/2016 10:30:55 AM PST by Jack Hammer
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-31 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson