DHS Election Hacking Scandal Spreads to More States

In response to an inquiry from Georgia 4 more states confirm traffic from the DHS network that hacked Georgia’s election system.

DHS Election Hacking Scandal Expands to More States

DHS Election Hacking Scandal Expands to More States

Kentucky and West Virginia have discovered unsolicited and unauthorized access from the United States Department of Homeland Security network that the State of Georgia says blames for trying to hack their election system 10 times since February.

The news comes following reports in September that Russia was behind attempt election hacks in 20 states which NSA whistle blower Edward Snowden warned could easily be pinned on Russia by the NSA, which is part of the Department of Homeland Security.

The two states reported the unauthorized activity in response to an inquiry from Georgia’s Secretary of State Brian Kemp which also revealed that Colorado and Utah had authorized the DHS to scan their networks.

Georgia first revealed it learned that the United States Department of Homeland Security hacked the state’s election system on December 9th when Georgia’s Secretary of State Brian Kemp sent a letter demanding an explanation for unauthorized cyber attacks that were traced back to the public IP Address of a DHS network.

After receiving an unsatisfactory explanation for the activity Georgia conducted a further review of their security logs and found that the DHS attempted to hack their election systems 10 times going back to February 2nd at dates near or on critical dates during the primaries and during the general election.

Following the discovery of the additional hacking attempts, Georgia sent out requests to several Secretary of State’s nationwide asking to review if their their systems received traffic from the Department of Homeland Security network that attacked Georgia’s election system.

In response to Kemp’s West Virginia and Kentucky confirmed unauthorized access to their systems from the network while Colorado and Utah  confirmed traffic from the network but stated security scans being conducted against their systems were solicited and authorized.

After Georgia’s initial discovery of the unauthorized hacking the Department of Homeland Security stated the cyber attack detected was a one time event committed by a rogue contractor.

But after Georgia discovered 9 more hacking attempts the DHS walked back their original statement and then claimed the traffic was the result of normal search behavior of a single user.

Kemp tells reporters he is still not satisfied with the response saying his cyber security experts state there is no way to recreate the traffic recorded by their security systems through normal search activities while describing one of the hacking attempts as “massive.”

Georgia’s Secretary of State has told reporters he does not believe the Obama administration is being forthright and he is not confident he will get answers from the current administration about the activities and has since issued a letter to demanding President-elect Donald Trump investigate the issue.

The media is now citing experts stating the most likely reason for the multiple attacks in multiple states is malware on DHS computers.

But that explanation, along with the original explanation that traffic was part of normal user search activity, falls apart under scrutiny and Georgia’s Secretary of State is being joined by the National Association of Secretary of State’s to demand answers.

Utah has confirmed they have solicited the DHS to test the security of their election system and that they are receiving authorized traffic to conduct those tests come from the IP Address in question.

Colorado also confirms their election system receives daily traffic from DHS IP address but notes it coming from a user they are doing business with.

It is unlikely that authorized scans are being originated from these IP Addresses in Utah and Georgia while at the same time Malware is responsible for the unauthorized network traffic in Georgia, Kentucky and West Virginia.

 

 

 

 

Comments

Write a Comment

Your e-mail address will not be published.
Required fields are marked*