Body for Awareness Project: Your Body. Your Clothes. Your Truth. On Sale Now.
(Aaron Kesel) The federal government just announced on Friday that election officials in 21 states had Russian hackers target their systems before last year’s presidential election according to the Associated Press. But what about the DHS’s own attempted meddling in the election, getting caught red-handed running unauthorized scans for vulnerabilities in voter databases in more than five states?
by Aaron Kesel, September 24th, 2017
Last year, before the election the federal government was attempting to declare state election systems as “critical infrastructure.” After that attempt failed, it seems they attempted to illegally take matters into their own hands and scanned election systems without first notifying each respective state official.
Several states reported the reconnaissance scans for vulnerabilities in their servers performed by DHS IP addresses.
Cyber security experts agree the Obama administration’s Department of Homeland Security attempted to hack into states’ voter registration systems in Georgia, Idaho, Indiana, Kentucky, Maine, and West Virginia.
According to one report published by the Daily Caller News Foundation, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.
The second case was revealed by Georgia’s secretary of state wh0 stated that the DHS tried to breach its firewall of computers housing voter registration data on November 15.
Unlike the CIA’s narrative that the Russians hacked the election, this is well documented, and even the DHS itself has admitted it, blaming a “rogue employee.”
The problem that has since emerged for the DHS is that there are now ten separate cyber attacks known coming from the DHS, trying to breach Georgia’s computers housing Americans’ voting data that was scanned for vulnerabilities in 2016.
The other problem is the timing of the attacks. Georgia Secretary of State Brian Kemp told The DCNF Jan. 24, 2016, he was suspicious because four of the 10 attacks against the Georgia election network occurred as he was about to talk to DHS officials, or coincided with his public testimony opposing designation of election systems as “critical infrastructure.”
Georgia and Indiana aren’t the only states to confirm that the DHS attempted hacking them accordingto a report from WSB-TV in Atlanta; two more states, West Virginia and Kentucky, also confirmed the same DHS IP address accessed their election system close to election day.
DHS Secretary Jeh Johnson told the Georgia Secretary of State that the DHS accessing Georgia’s election system was a federal contractor conducting “normal” internet searches on the website.
That’s not all. The DHS also attempted to hack Idaho, and Maine, while the agency may have also backdoored Hawaii’s election systems which seemingly had problems after being “secured” by the agency. Call it another long list of coincidences.
Denney said that when they “looked at IP addresses that tried to get into our system,” there wasn’t “a single IP address from a foreign country,” such as Russia, but one from “our own Department of Homeland Security,” Computer World reported.
The DHS explained that:
When DHS conducts a cybersecurity scan of a network or system, we do so only with the cooperation and consent of the system owner.
On November 3, 2016, it was reported that Hawaii was working with the Department of Homeland Security to secure its election systems.
On November 8, 2016, there were reports of equipment problems at 18 different polling places with ballot scanning machines.
The argument that many without any type of knowledge of security are making is that it’s possible that DHS IP addresses were spoofed. The problem with this is that if this were done, it would have been pointless because spoofing your IP address as a DHS IP address would do nothing but show your IP address as the DHS’s. You would not be able to receive information data packets and, instead, the IP address you spoofed would receive those replies.
In simple terms, imagine you spoof a phone number—as was possible with Skype years ago—and someone called that number back. They wouldn’t be talking to you, but would instead be talking to the real owner of that phone number you spoofed. For another example, it’s the equivalent of sending a letter with the wrong return address and expecting to receive your letter.
Thus it’s exposed that a rogue group in the DHS tried to hack the election, which should be worrying because originally the DHS wanted to oversee the election to prevent just this. There have been no reported incidents where any states had their votes changed, but the DHS never looked into it – one has to question why.
On his way out of office then-DHS secretary Jeh Johnson signed an order designating election systems as “critical infrastructure” that U.S. President Donald Trump still hasn’t rolled back, meaning the federal government could easily rig the election disguised as protecting our election integrity.
On election day voters all across the U.S. reported that their votes were being switched from Donald Trump to Hillary Clinton, according to CBS. It is not known who hacked these machines or how many votes may have been affected, and it probably never will be, but this should concern you – it’s a bipartisan issue.
All 50 state-level secretaries of state have urged the Trump administration to repeal the DHS directive. It’s worth noting that according to the WikiLeaks Stratfor documents, the 2008 election results were manipulated by Democrats.
As Thomas Jefferson once wrote, “Democracy requires constant vigilance.”
Aaron Kesel writes for Activist Post and is Director of Content for Coinivore. Follow Aaron at Twitter andSteemit.
Stillness in the Storm Editor’s note: Did you find a spelling error or grammar mistake? Do you think this article needs a correction or update? Or do you just have some feedback? Send us an email at [email protected] with the error, headline and url. Thank you for reading.