April 25, 2024, 03:23:14 AM *
Welcome, Guest. Please login or register.

Login with username, password and session length
News: NEW CHILD BOARD CREATED IN THE POLITICAL SECTION FOR THE 2016 ELECTION
 
   Home   Help Login Register  
Pages: 1   Go Down
  Print  
Author Topic: "NSA infected 50,000 computer networks with malicious software" Secure E-Ballot?  (Read 1082 times)
0 Members and 1 Guest are viewing this topic.
WhiskeyGirl
Monkey All Star Jr.
****
Offline Offline

Posts: 7754



« on: November 24, 2013, 10:58:22 AM »

When I read something like this, I have to wonder how secure electronic ballots are?  How secure are ballot boxes with an electronic counting system?

Quote
The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.
 
A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software.

(snip)

NSA special department employs more than a thousand hackers

The NSA computer attacks are performed by a special department called TAO (Tailored Access Operations). Public sources show that this department employs more than a thousand hackers. As recently as August 2013, the Washington Post published articles about these NSA-TAO cyber operations. In these articles The Washington Post reported that the NSA installed an estimated 20,000 ‘implants’ as early as 2008. These articles were based on a secret budget report of the American intelligence services. By mid-2012 this number had more than doubled to 50,000, as is shown in the presentation NRC Handelsblad laid eyes on.

Quote
‘Sleeper cells’ can be activated with a single push of a button

The malware can be controlled remotely and be turned on and off at will. The ‘implants’ act as digital ‘sleeper cells’ that can be activated with a single push of a button. According to the Washington Post, the NSA has been carrying out this type of cyber operation since 1998.

read more here - http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/

Do they ever look at the code when they test electronic voting machines?  Does photo ID matter in places with electronic voting machines?

I recall on youtube they had a number of videos about remote control of electronic voting machines and how easy they are to hack.

What's wrong with this picture?
Logged

All my posts are just my humble opinions.  Please take with a grain of salt.  Smile

It doesn't do any good to hate anyone,
they'll end up in your family anyway...
WhiskeyGirl
Monkey All Star Jr.
****
Offline Offline

Posts: 7754



« Reply #1 on: November 24, 2013, 11:01:02 AM »

Quote
N.S.A. Report Outlined Goals for More Power

WASHINGTON — Officials at the National Security Agency, intent on maintaining its dominance in intelligence collection, pledged last year to push to expand its surveillance powers, according to a top-secret strategy document.

 In a February 2012 paper laying out the four-year strategy for the N.S.A.’s signals intelligence operations, which include the agency’s eavesdropping and communications data collection around the world, agency officials set an objective to “aggressively pursue legal authorities and a policy framework mapped more fully to the information age.”

read more here - ]http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html?partner=rss&emc=rss&smid=tw-nytimes&_r=1&#h[]

Who are they targeting?  Working Americans?  Terrorists?  People like the Boston Marathon bombers?

Logged

All my posts are just my humble opinions.  Please take with a grain of salt.  Smile

It doesn't do any good to hate anyone,
they'll end up in your family anyway...
Pages: 1   Go Up
  Print  
 
Jump to:  

Use of this web site in any manner signifies unconditional acceptance, without exception, of our terms of use.
Powered by SMF 1.1.13 | SMF © 2006-2011, Simple Machines LLC
 
Page created in 7.998 seconds with 19 queries.