Election integrity

Update on DoS attacks against Black Box Voting

Thank you for your patience and support as we migrate the huge old website to the “new” Black Box Voting. We identified the perpetrators of the DoS (Denial of Service) attack that permanently shut down our forums. The attack came from a source that turned out to be readily identifiable and to my surprise, is domiciled in the USA. I am researching its corporate parentage and political contributions and I am providing the logs and a complaint to law enforcement authorities.

A second hack targeted our new site. We dealt with that quickly and effectively. There appear to be connections with the second hack and a company owned by one of Rupert Murdoch’s former partners in NewsCorp, the discredited news organization prosecuted last year for illegal phone tapping. A consultant I spoke with encouraged me to turn the information over to the investigative agency in Great Britain handling the NewsCorp case; at any rate, this certainly makes me wonder just how widespread these private corporate invasions are, because the NewsCorp phone tapping scandal involved a large network of targets and was only caught when the dorks wiretapped the royal family. The linkage on the New Year’s Eve Black Box Voting attack is only slightly more ambiguous than the attack on our old forums; it traveled through two steps, the first of which disabled intrusion protection software, the second unleashing a DoS attack.

Frankly, I expected the hacks to travel through an impenetrable jungle of Chinese and Ukrainian IP hosts, but such was not the case. The attacks were readily identifiable and came through specific US and Western European companies, with identifiable timestamps, host IP, and a footprint that stuck out like a big cat on fresh-fallen snow. By all means, if you operate a political or voting rights website, I will be happy to privately share information on how to see if the same characters are bumbling around in your site logs.

 

Comments

comments