![]() Both sets of photocopied ballots from Shepherd and Slye were not only accepted into the ES&S 200 tabulator but counted as part of the vote total. You wouldn't get on your home computer with the security level that it is on these systems."Īngela Shepherd did fake ballot testing in Lee County in conjunction with what Slye did at his precinct. So what that means now is our ballot tabulators for processing people's votes are less secure than the average snack vending machine. The vending machine electronics can distinguish the difference. Consider that when a person puts a fake dollar bill into a vending machine, that person gets it spit right back out. ![]() "My friend Angela made the best analogy to what this reality indicates. " can't distinguish between counterfeit and real ballots," Slye said. Jason Slye was one of two people who ran the counterfeit ballots through the ES&S machines during a time of public testing done ahead of the primaries. "This is not about Democrat or Republican parties this is about voter rights. "How can you sit in court and watch a video of fake ballots going through a machine that was used in our primary election and not question it? How can you listen to experts like say that even though the machines are not connected to the internet, they can still be hacked? How can you listen to that and not make a decision to protect the citizens of Alabama? "We showed the judge a video of photocopied ballots accepted and counted by an electronic voting machine," said FOA's Rebecca Rodgers. The lawsuit seeks to halt the use of ES&S tabulators until the system has practical checks and balances applied through a hand recount of ballots and access to the machine for forensic analysis. Parikh and FOA want to provide a third-party analysis for voters showing whether this election system is as unhackable as election officials are publicly maintaining.įollowing the May primaries of 2022, FOA filed a lawsuit against Secretary of State John Merrill and the Alabama Election Committee to achieve more election transparency, safeguards and accountability. That is why Parikh has teamed up with the group Focus on America (FOA) to legally gain access to the ES&S 200 tabulators in Alabama to test the claims of "safe and secure" voting systems. "Don't ask if you have been hacked assume that you have and try to find out how." "There is a saying in the Department of Defense," Parikh explained. Parikh calls points of entry for hackers "exploitables." He says the average person has no way of knowing where these exploitables are or how to find them such scrutiny requires a trained computer science expert.Īs a successful hacker with a master's degree in cybersecurity, Parikh, who has been subcontracted within major government agencies, knows there is a difference between saying something is secure and it actually being secure. That's just good guys doing it - believe me, the bad guys have a lot less reign." ![]() In the group I was in when we played 'bad guy,' we hacked a Roomba just to prove the point that we could do it and control it remotely. I know systems I don't care if it's a cell phone, a laptop, an Xbox or a Roomba. "This has been my total career path since retiring from the military," said Parikh. As a certified ethical hacker, Parikh's job was not only to think like a criminal but to act like one, too. Clay Parikh spent nine years hacking elections.Īs a hacker, he worked in an election testing lab, dealing with many voting systems, including the ES&S system used in Alabama. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |