.

NEWS AND VIEWS THAT IMPACT LIMITED CONSTITUTIONAL GOVERNMENT

"There is danger from all men. The only maxim of a free government ought to be to trust no man living with
power to endanger the public liberty." - - - - John Adams

Wednesday, October 4, 2017

Senator calls on voting machine makers to detail how they'll prevent hacks




The Retarded Run America

  • Sen. Wyden is asking the wrong questions. There are only two reasons why government secrets or election systems would be connected to the Internet.  1) You are a fucking idiot or 2) You want the information hacked so you can demand more Police State powers to "protect" us.
  • Personally I think it is a neck and neck race between 1 and 2.


(Tech Crunch)  -  One of the Senate's main cybersecurity proponents wants assurances that voting systems in the U.S. are ready for their next major threat and he's going straight to the hardware makers to get it. 
In a letter, Oregon Senator Ron Wyden — an outspoken member of the Senate Intelligence Committee — called on six of the main voting machine manufacturers in the U.S. to provide details about their cybersecurity efforts to date. 
Wyden's line of inquiry is grounded in the pursuit of details like if a company has been breached previously without reporting the incident and how often it has conducted penetration testing in cooperation with an external security firm.
Wyden's full list of questions are as follows:

1. Does your company employ a Chief Information Security Officer? If yes, to whom do they directly report? If not, why not?

2. How many employees work solely on corporate or product information security? 

3. In the last five years, how many times has your company utilized an outside cybersecurity firm to audit the security of your products and conduct penetration tests of your corporate information technology infrastructure? 

4. Has your company addressed all of the issues discovered by these cybersecurity experts and implemented all of their recommendations? If not, why not? 

5. Do you have a process in place to receive and respond to unsolicited vulnerability reports from cybersecurity researchers and other third parties? How many times in the past five years has your company received such reports? 

6. Are you aware of any data breaches or other cybersecurity incidents in which an attacker gained unauthorized access to your internal systems, corporate data or customer data? If your company has suffered one or more data breaches or other cybersecurity incidents, have you reported these incidents to federal, state and local authorities? If not, why not? 

7. Has your company implemented the best practices described in the National Institute of Standards and Technology (NIST) 2015 Voluntary Voting Systems Guidelines 1.1? If not, why not? 

8. Has your firm implemented the best practices described in the NIST Cybersecurity Framework 1.0? If not, why not?
Read More . . . .


What kind of idiots do you have working here?

A government of idiots ruling over sheep





2 comments:

Anonymous said...

a pencil , and a paper ... and fact check with those machines
if at odds ...
paper voting rules

EASY !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Anonymous said...

Really ?! psichopaths in charge ?
never wonder as beautifull world is ...