The Race Ep.11 Taxes: Election Security (part 4/4)

Welcome back to the race from Chicago and as we count down the final weeks of the November midterm elections the government says cyber attack attempts are on the rise Corey Rangel has a look at what’s being done to protect your vote and maintain confidence in the election process u.

election databases are coming under attack a new report finds.

Election hacking attempts have been building since April 1 troubling note the government does not know who is behind the attacks well it is worrisome I think you know the more we know the better but.

I also do think in the world that we have we are going to have unknown actors whether foreign or domestic making attempts to to get into systems the good news so far Homeland Security says none of the attacks have been successful John Ford ei what the.

Bipartisan policy center thinks that’s a sign of enhanced election security and better communication between election officials I think we are in a better place now to identify those threats and to communicate those threats between.

Federal and local and state election officials and I think that’s a that’s a step up as the midterms approach.

The head of Homeland Security says the government will also be using other security tools including sensors that allow federal officials to see inside state computer systems to see if there are signs of hacking attempts our.

Network security sensors will cover 90% of registered voters and on Election Day we will be out in full force and hosting a virtual nationwide Situation Room.

To assist our partners experts continue to insist that voter databases like registration information is more at risk than hackers being able to change actual votes for the race I’m Corey Rangel that’ll do it for us this week here on the race join us next week as we take a look at a variety of social issues that could impact your vote in November from the legalization.
Of marijuana to the opioid crisis to the.

Me2 movement that’ll be next week but that’s going to do it for us for now.

From Chicago I’m Chris Stewart this is the race you..

U.s. Security Says Russia, China, And Iran Are Meddling In Elections

We haven’t seen certainly any compromises or any sort of access to election equipment across the United States at this point but our planning factor is looking back at 2016 see what the Russians conducted in terms of spearfishing campaigns and other sorts of attacks at state local networks and working to ensure that those sorts of events can’t happen again.

We’re not seeing anything anywhere remotely close to 16 in sit when I look back at 16 I think.

Based on the access they had they had no access to vote vote tabulation machine so they couldn’t actually technically manipulate the vote they had access to voter registration systems so from a resilience perspective if they had the ability to delete voter registration files a voter if they’d shown up to vote and they.

Were not on the voter roll they would have been able to request a provisional ballot their ballot still would have gone and it would have been counted as cast so we’re still thinking through that lens of what’s the resilience in this system that’s why.

We are encouraging people to make sure they know what to do on on November 6 so when you think.

Back to 2016 in the intelligence community assessment there were three buckets of activity one was this technical hacking of election infrastructure the second was the hacking leak against political campaigns and then the third was this broad information campaigns these these disinformation and misinformation campaigns on social media and new media that sort of activity has his persistent we continue to see Russians and increasingly Iranian.

And other Chinese actors continue to use social media to influence the American public to draw so discord in increased divisive nough something that that is probably just a tool of the trade for them right now so we continue to see that activity we’re not seeing the activity 2016 had a long.

Lead up of spear phishing campaigns this goes into that third bucket of social media manipulation traditional media manipulation what we’re seeing is efforts by the Chinese government to influence the voter how they perceive policies and influence the the decision-making process so that they have political candidates whether it’s in Congress or elsewhere that are more favorable to trade policies things like that we continue to see that sort of activity think the president referenced an ad in the.

Des Moines Register and the China daily.

While it may meet advertising standards for China for for the Des Moines.

Register it still is something that indicates a as it is kind of a hearts and minds campaign by the by the Chinese.

Hacking The The U.s. Midterm Elections | The Threat Report News

elections taught us that thewhole voting system is in need of a major cybersecurity upgrade. protect the upcoming2018 midterms? The answer is still unclear with multiplevoting machine vendors experiencing vulnerability issues and admitting to cybersecurity flawsin their systems. Another potential issue has been the explosionof fake websites for political candidates being used as.
The bright spot is a notable group.

Of votingvendors and tech companies have come together to battle such attacks.
This story still has to play out but comecritics are calling for the U.

Follow Canada’s lead and return to paper ballots..

Unisys Survey Found Most Americans Concerned About Election Security

And the numbers don’t lie 86% of Americans according to a new study released literally moments ago say they are concerned that our election systems could be compromised the number here in the Midwest even higher 89% equally is surprising that among these voters the concern is so great that nine percent of them say they’re not going to vote at.
All and another 13 percent say.

They may not time was the only electronics involved in voting was the plug leading to an overhead light but after the hanging chads of 2000 the push to modernize was real with.

Computers King concern over being compromised the concerned security.

Experts say it’s also real in August an 11 year old was able to hack into a replica of the Florida state election website and change voting results and it did it in under 10 minutes so what about here in Ohio first off we still physically have paper ballots that could be checked against the results from the scanners and those scanners in your local school gym.

Are not connected to the Internet they are standalone that doesn’t necessarily mean they’re invincible to a cyberattack but it does significantly reduce their vulnerability to a remote cyberattack the mere fact though that nearly 90% of voters in the unisys study are concerned is a.

Victory itself for those wanting to disrupt the elections because it plants a seed of doubt about the integrity of the process and.

To the nine percent who may not trust polling places election officials say take advantage of what Ohio offers early voting it’s a secure and convenient way to vote and it’s also safe for the e-team John Kasich.

Secretary Of State Talks Election Security

MANY OF YOU WILL HEAD OUT TO THE POLLS TO VOTE EARLY.

(PHIL) BUT DO YOU KNOW FOR SURE THAT YOUR VOTE IS SAFE? NEWS 8 STATEHOUSE BUREAU CHIEF, DAVID WILLIAMS, SAT DOWN WITH INDIANA’S SECRETARY OF STATE TO TALK ELECTION SECURITY. (DAVID) SECRETARY OF STATE, CONNIE LAWSON, SAYS THE WAY ELECTIONS ARE MANAGED AND RUN.
CONTINUALLY EVOLVE, BECAUSE SHE SAYS, THIS A RACE WITHOUT A.
(REPORTING) ((CONNIE LAWSON/ INDIANA SECRETARY OF STATE / “VOTERS, WE HAVE DONE EVERYTHING WE POSSIBLY CAN DO HERE IN INDIANA TO SECURE YOUR VOTE. I’D LIKE YOU TO KNOW FIRST OF ALL, OUR VOTING MACHINES ARE TESTED BEFORE THEY’RE EVER USED HERE IN INDIANA.”: )) INDIANA’S CHIEF ELECTIONS OFFICER, SECRETARY OF STATE, CONNIE LAWSON SAYS BALL.

STATE TESTS ALL INDIANA VOTING EQUIPMENT VIA THEIR VOTING OVERSIGHT PROGRAM.

PLUS, EVERY COUNTY TESTS BY SIMULATING AN ELECTION.

(( SOS LAWSON @ 18:22:49 “THEY WILL VOTE ON THE MACHINES TO MAKE SURE THE MACHINES ARE RECORDING THE VOTES AND THAT THE VOTES CAST FOR EACH CANDIDATE ARE CORRECT.
SECURITY DID A TWO-WEEK RISK AND VULNERABILITY TEST, AS WELL.

SURE THERE AREN’T ANY WAYS FOR SOMEONE TO CONNECT TO THE STATE’S VOTER REGISTRATION SYSTEM AND STAFFERS PASSWORDS ARE STRONG. (( LAWSON@ 18:23:22″ IN FACT THEY TRIED TO PENETRATE OUR STATEWIDE VOTER REGISTRATION SYSTEM AS A TEST, AND THEY COULD NOT GET IN, BECAUSE WE ARE USING A TWO-FACTOR. IF THE DEPARTMENT OF HOMELAND SECURITY COULDN’T ACESS STATEWIDE VOTER REGISTRATION SYSTEM, I DON’T THINK THE HACKERS WILL KNOW HOW TO GET IN.”/ : )) THAT TWO FACTOR AUTHENTICATION MEANS AFTER STAFFERS ENTER THEIR USERNAME AND PASSWORD, THEY GET AN EMAIL OR TEXT WITH A 6- DIGIT NUMBER TO VERIFY. LAWSON SAYS THE STATE’S ONLINE VOTER REGISTRATION SYSTEM ALSO HAS INTRUSION DETECTION TECHNOLOGY. (( LAWSON @ 18:24:13 “WHAT THAT DOES IS IT DETECTS TRAFFIC AND PEOPLE THAT TRY TO ACCESS THE STATEWIDE VOTER REGISTRATION SYSTEM. IT SENDS A SIGNAL BACK TO THE DEPARTMENT OF HOMELAND SECURITY SO THEY CAN IMMEDIATELY CONTACT US.”/ : )) LUCKILY NO ONE’S TRIED TO. LAWSON SAYS ALL THE STATE’S ONLINE DATABASES AND ELECTION WEBSITES WORK OFF A DATABASE COPY.

(( 18:25:43 “IT’S UPDATED ABOUT EVERY 3-10 MINUTES. IT PROTECTS THE ACTUAL DATABASE.”/ : )) (DAVID) LAWSON SAYS EVERY VOTE CAST IN INDIANA ON ONE.

OF THE MACHINES HAS A PAPER TRAIL. SHE ALSO SAYS NONE OF THE VOTING OR TABULATION MACHINES ARE CONNECTED TO THE INTERNET. LAWSON SAYS IF YOU WERE TAKEN OFF THE VOTER REGISTRATION DATABASE BY ACCIDENT. SHE SAYS ALL YOU HAVE TO DO IS GO TO THE POLLS, SIGN AN AFFIDAVIT SAYING YOU NEVER MOVED, AND YOU ALWAYS INTENDED TO COME BACK TO YOUR RESIDENCE AND VOTE. (PHIL) THE INDIANA SENATE CANDIDATES.

Ecc Cryptocurrency Takes Privacy To New Level – Encrypted Messages And File Storage

Secrets everybody has them yes so do you now think carefully which trusted daily companion holds more secrets about you your best friend or your mobile phone in this day and age your data is your life and your life is your data everything you type share like by watch and hear every location you visit even your photo collection yes.

Your most precious and intimate moments being measured tracked analyzed and stored as we speak business models are being made more profitable governments are becoming more powerful and criminals are.

Lurking all because of your valuable personal data there is no such thing as a free app you just didn’t know you were paying we believe that privacy is one of life’s basic requirements for that exact reason we dedicated ourselves to creating a new.

Path for you a pet that bypasses this omission and a militant data collection machine we aim for absolute digital.

Privacy and security by making blockchain services available to the masses to do that we created a multi-chain platform with the ECC coin as the financial core to function as a commercial infrastructure for future services all services are being designed with focus.

On user friendliness and commercial interest whilst being saved and decentralized rolling out services such as messaging and file storage are just the start when the foundation has been laid our ultimate goal.

Is to open-source our platform to other developers for them to create new services on top of ours all our services are equipped with address named service.

Capabilities which let you transfer currency or data using a nickname instead.

Of those long wallet addresses fast simple and safe we are ecc a community driven movement dedicated to creating a brand-new cyber world full of endless possibilities ECC unchaining the Internet.

Fix: Your Internet Security Settings Prevented One Or More Files From Being Opened

Hello everyone how are you doing this is mdtech here another quick tutorial today I’m going to show you guys how to resolve is a file cannot be open and it pertains to your internet security settings so this can we appreciate forward tutorial and even though we’re going to be performing it on a Windows 10 machine it should work.

For other versions of Windows as well so we’re just going to jump right into it and then we’re going to start by heading over to the Start menu and we’re going to type.

In Internet Options should be a little bit of both control panel you can also access this by going through.

The control panel window but I just would prefer to go through the Start menu I think it’s a little bit quicker so we’re going to just select that so in this new properties window we’re going to go over to the security tab at the top and then we’re going to left-click on the custom level button near the bottom scroll down here until we get to launching applications and unsaved files should be bound let’s say launching applications.

And unsaved files so we want to set it to prompt make sure it’s set to prompt so once you’ve made sure that your setting is on prompt there click on OK now you want to left-click on local internet right here and then left click.

On the cite button right here you want to disable all these options here so if anything’s checked you want to uncheck them and then equipment okay so now that we’re so underneath the local intranet area given our last clip on custom level down here now again we’re going.

To be going down to the launching application to NC file area same as we did for the internet area right here launching applications in unsaved files set it to.

Prompt and then click on ok and then you’re going to be asked if you are sure you want to change the settings for this zone left click on yes now we’re going to do the same thing for trusted.

Sites click on it and let’s go down and left click on custom level again we’re going to scroll down here until we get to launching applications and on C file make sure that step two problems which it is in this case and then finally restricted sites again click on that and.

Then go to a custom level scroll down here so you get to launching applications and on C file if it’s said to disable right here you want to move it over to prompts which.

Then you’ll be promptly sure you want to change your settings again click on yes I know it sounds very redundant that we did it four times but.
Trust me you need to do it for this and once you’re.

Done doing this you want to click on apply and ok and it should save your settings and hopefully your problem has been resolved so I hope this brief tutorial helped you guys out and I will catch you in the next video goodbye.

Secure Your Home With Mydlink Pro Wireless Camera Kit

If you’re thinking of a smarter way to keep your home and belonging secure then this new Wire free camera kit from d-link is definitely one to consider the new my d-link pro is a Wire free camera kit that offers motion detection its grateful indoors or outdoors is it install and the best thing about it for me is a.

Long-lasting rechargeable battery and its compatibility with a.

Lexer Google assistant and even even triple T inside the box you get everything you need to get started you get a quick installation card with the.

QR codes that you need to scan during installation process you got F in a cable DC power adapter for the Wi-Fi hub and micro USB power adapter for the cameras a mounting arm and two mounting brackets one Wi-Fi hub and of course two Wire free cameras as.

Well setting up the cameras is very straightforward as well first you need to download a mydlink app from the Play Store or Apple Store plug in your hub to the power source and.

Inter despair the net port that you’ve already got in your ethnic box then press and hold the sync button on the cameras till you see solid green lights then perform the.
Rest of installation using a free app also bear in.

Mind though that to use the app key we need to register with d-link and so you can log in and access your account wherever you are on the camera itself you.
Have a sync button and microphone.

For a two-way audio communication so you means you can talk and.

Listen as well you got infrared LEDs and operation LED.

As well and on the back of it there’s a mounting point a USB port and flip it over underneath it.

Is where you can attach the mounting arm if you wish to do so he offers an array of mounting options so it.

Won’t be a problem at all for you you can either.

It at all and just place it wherever you like to so it’s got enough flexibility as well thanks to this flat bottom it’s IP 65 rated as well so you can mount it outdoors with peace of mind – you don’t you won’t have to worry about water damage in it the mic dealing.

Cap is very easy to use you can get snapshots and video clips of you recording either by storing them in the cloud as well you can use a.

MicroSD card or even plug in an external.

Hard drive into the home hub.

What you’re recording in Full HD 1080p which is really good so you get a resolution.

Which allows you to then zoom in and out of your recording which is really good to.

Miss you can get into the details you.

Phone as way if you want to share it with the police or whatever reason you want to do so my dealing pro offers an advanced motion detection system with smart moving object detection together with PIR motion sensor you get less amounts of false alarms with a built in PIR motion detection in the text movement when a heat source like the human body passes by is ideal for highly accurate motion detection even in complete darkness my overall.

Experience has been really fantastic with a long battery life you can go on holiday without worrying about your home not being under your watchful eye or things that matter to you most it comes.

Floodlight Cam Installation: Step 1 – Install The Bracket

To get started loosen these knobs to point the lights straight up to get them out of the way during installation you can also use this lock collar at the base of each light to rotate it in the desired direction and secure it later you’ll then need to loosen the camera lock collar to rotate the camera 180 degrees so.

That it’s right-side up tighten the collar to hold the camera in place before you begin installation shut off power at the breaker to where your floodlight cam will be installed if you’re not sure which breaker controls the outlet where you’ll be performing.

The install then switch off your main breaker or consult with a licensed electrician as a warning installing flood bike cam involves working with high voltage electricity if you’re not comfortable or are inexperienced with the processes and tools described.

In this video we recommend that you hire a licensed electrician also be sure to comply with your local building and wiring codes once you’re sure power is off remove your existing floodlight unscrew it and then carefully pull it off the junction box it’s attached to if the wires are connected with wire nuts turn the wire nuts counterclockwise to detach them then remove your existing floodlight and set it aside.

If your existing floodlight has a bracket connected to your junction box remove this as well if you’re not replacing an existing light fixture you’ll need to install a four inch round waterproof junction box or hire an electrician to install one be sure to mount the junction box on a vertical wall not on an.

Eaves or overhead if you’re installing a new junction box for floodlight cam the optimal height is three meters or about nine feet off the ground check the weatherproof caps on your junction box to see if they’re installed in our watertight if.

The caps aren’t watertight you’ll need to use a silicone caulk to create a weatherproof seal it’s important that no water gets into the junction box now.

A safety and the proper operation of your ring floodlight cam the fixture must be properly grounded if you’re not familiar with the methods for properly grounding this type of fixture consult with a licensed electrician before installing the bracket make sure the ground.

Wire coming out of your junction box which is often a green or copper wire comes about two inches out if you have a metal junction box this wire should be.

Connected to the ground screw in the back of your junction box and have at least two extra inches of length if your ground wire is long enough proceed to install the.

Bracket if the ground wire from your junction box isn’t long enough then run the ground wire from the floodlight.

Cam through the hole in the middle of the bracket and connect it to the existing ground inside your junction box either wrap floodlight cams ground around the screw in your junction box or use the extra wire now we’ve provided to connect it to the existing ground wire in your junction box do this before installing the bracket since the ground in your.

Junction box may be hard to get to after installing the bracket at least two screws are needed to securely hold the mounting bracket although four screws are included if you’d like to use more after installing the mounting bracket check that the foam gasket on the mounting bracket is flush all the.

Way around the junction box and that your existing wires come through the big opening in the middle of the.

Mounting bracket this foam creates a waterproof seal between the junction box and the floodlight cam fixture you’re.
Now ready to wire your floodlight cam..