Thrive II Preview

U.S. Government Announces 21 States Had Hackers Target Their System – Leaves Out DHS Hackers

Posted by on September 25, 2017 in Agencies & Systems, Government, Politics with 0 Comments

Image via Chris Dionte Walker

By Aaron Kesel | Activist Post


The federal government just announced on Friday that election officials in 21 states had Russian hackers target their systems before last year’s presidential election according to the Associated Press. But what about the DHS’s own attempted meddling in the election, getting caught red-handed running unauthorized scans for vulnerabilities in voter databases in more than five states?

Last year, before the election the federal government was attempting to declare state election systems as “critical infrastructure.” After that attempt failed, it seems they attempted to illegally take matters into their own hands and scanned election systems without first notifying each respective state official.

Several states reported the reconnaissance scans for vulnerabilities in their servers performed by DHS IP addresses.

Cyber security experts agree the Obama administration’s Department of Homeland Security attempted to hack into states’ voter registration systems in GeorgiaIdahoIndianaKentucky, Maine, and West Virginia.

According to one report published by the Daily Caller News Foundation, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.

The second case was revealed by Georgia’s secretary of state wh0 stated that the DHS tried to breach its firewall of computers housing voter registration data on November 15.

Unlike the CIA’s narrative that the Russians hacked the election, this is well documented, and even the DHS itself has admitted it, blaming a “rogue employee.

The problem that has since emerged for the DHS is that there are now ten separate cyber attacks known coming from the DHS, trying to breach Georgia’s computers housing Americans’ voting data that was scanned for vulnerabilities in 2016.

The other problem is the timing of the attacks. Georgia Secretary of State Brian Kemp told The DCNF Jan. 24, 2016, he was suspicious because four of the 10 attacks against the Georgia election network occurred as he was about to talk to DHS officials, or coincided with his public testimony opposing designation of election systems as “critical infrastructure.”

Georgia and Indiana aren’t the only states to confirm that the DHS attempted hacking them according to a report from WSB-TV in Atlanta; two more states, West Virginia and Kentucky, also confirmed the same DHS IP address accessed their election system close to election day.

DHS Secretary Jeh Johnson told the Georgia Secretary of State that the DHS accessing Georgia’s election system was a federal contractor conducting “normal” internet searches on the website.

That’s not all. The DHS also attempted to hack Idaho, and Maine, while the agency may have also backdoored Hawaii’s election systems which seemingly had problems after being “secured” by the agency. Call it another long list of coincidences.

In Idaho, Secretary of State Lawerence Denney said that his state had detected attempts to hack the state’s election system on Nov. 8, 2016.

Denney said that when they “looked at IP addresses that tried to get into our system,” there wasn’t “a single IP address from a foreign country,” such as Russia, but one from “our own Department of Homeland Security,” Computer World reported.

The DHS explained that:

When DHS conducts a cybersecurity scan of a network or system, we do so only with the cooperation and consent of the system owner.

On November 3, 2016, it was reported that Hawaii was working with the Department of Homeland Security to secure its election systems.

On November 8, 2016, there were reports of equipment problems at 18 different polling places with ballot scanning machines.

The argument that many without any type of knowledge of security are making is that it’s possible that DHS IP addresses were spoofed. The problem with this is that if this were done, it would have been pointless because spoofing your IP address as a DHS IP address would do nothing but show your IP address as the DHS’s. You would not be able to receive information data packets and, instead, the IP address you spoofed would receive those replies.

In simple terms, imagine you spoof a phone number—as was possible with Skype years ago—and someone called that number back. They wouldn’t be talking to you, but would instead be talking to the real owner of that phone number you spoofed. For another example, it’s the equivalent of sending a letter with the wrong return address and expecting to receive your letter.

Thus it’s exposed that a rogue group in the DHS tried to hack the election, which should be worrying because originally the DHS wanted to oversee the election to prevent just this. There have been no reported incidents where any states had their votes changed, but the DHS never looked into it – one has to question why.

On his way out of office then-DHS secretary Jeh Johnson signed an order designating election systems as “critical infrastructure” that U.S. President Donald Trump still hasn’t rolled back, meaning the federal government could easily rig the election disguised as protecting our election integrity.

On election day voters all across the U.S. reported that their votes were being switched from Donald Trump to Hillary Clinton, according to CBS. It is not known who hacked these machines or how many votes may have been affected, and it probably never will be, but this should concern you – it’s a bipartisan issue.

All 50 state-level secretaries of state have urged the Trump administration to repeal the DHS directive. It’s worth noting that according to the WikiLeaks Stratfor documents, the 2008 election results were manipulated by Democrats.

As Thomas Jefferson once wrote, “Democracy requires constant vigilance.”

Image Credit: chrisdiontewalker

Aaron Kesel writes for Activist Post and is Director of Content for Coinivore. Follow Aaron at Twitter and Steemit.

This article is Creative Commons and can be republished in full with attribution. Like Activist Post on Facebook, subscribe on YouTube, follow on Twitter and at Steemit.

Tags: , , , , ,


If you enjoyed this article, subscribe now to receive more just like it.

Subscribe via RSS Feed Connect on YouTube

New Title

NOTE: Email is optional. Do NOT enter it if you do NOT want it displayed.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

FAIR USE NOTICE. Many of the articles on this site contain copyrighted material whose use has not been specifically authorized by the copyright owner. We are making this material available in an effort to advance the understanding of environmental issues, human rights, economic and political democracy, and issues of social justice. We believe this constitutes a 'fair use' of the copyrighted material as provided for in Section 107 of the US Copyright Law which contains a list of the various purposes for which the reproduction of a particular work may be considered fair, such as criticism, comment, news reporting, teaching, scholarship, and research. If you wish to use such copyrighted material for purposes of your own that go beyond 'fair use' must obtain permission from the copyright owner. And, if you are a copyright owner who wishes to have your content removed, let us know via the "Contact Us" link at the top of the site, and we will promptly remove it.

The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. Conscious Life News assumes no responsibility for the use or misuse of this material. Your use of this website indicates your agreement to these terms.

Paid advertising on Conscious Life News may not represent the views and opinions of this website and its contributors. No endorsement of products and services advertised is either expressed or implied.
Send this to a friend