Tuesday, 29 December 2015, WASHINGTON, D.C. - A publicly accessible U.S. voter database consolidating 191 million U.S. voters' names, addresses, birth dates, party affiliations, phone numbers, and email addresses from all fifty states and Washington, DC was incorrectly configured so that it was not secure with the leak first reported by CSO Online and Databreaches, Inc. Those computer and privacy news sites according to Austin, Texas computer researcher tech support specialist Chris Vickery were helping him to locate the Internet voter database's owner.
Vickery said in a Monday telephone interview that it was he who originally had discovered the leak while seeking to expose data security public leaks on the Internet. Mr. Vickery reportedly said the database took about one day to download and did not know if it had been accessed by any others. CSO Online said the information contained codes that may have originated from campaign software provider NationBuilder.
NationBuilder Chief Executive Officer Jim Gilliam said the database was not created by the Los Angeles-based company although some of the database information may have come from "data it freely supplies to political campaigns." Gilliam curiously then while implying NationBuilder had not necessarily "seen" all the information leaked made the definite statement that the voter information "included" in the leak "is already publicly available from each state government" and so asserted that "no new or private information was released in this database". Apparently Mr. Gilliam may have overlooked both the security danger the voter information compilation posed including because of criminal use of it in "concentrated" form as Mr. Vickery pointed out as well as the fact that different state governments do not uniformly allow the same uses of voter registration information.
Federal agencies quickly stepped up to shift the blame to others with a representative with the U.S. Federal Elections Commission saying the FEC has no jurisdiction over protecting voter records. Mr. Vickery said he has not been able to identify who controls the database, but that he is working with U.S. agencies whom he declined to identify to determine who owns the site so that it can be removed from public view. Unsurprisingly the F.B.I. declined to comment on its role presumably yet again sleuthing slippery commie states and/or tech punks (it might later hire due to its own present gross ineptitude) in this recent huge government Internet security breach doubtless hoping yet again no one rightfully could attribute responsibility to the F.B.I. for this or any of the other rapidly growing multitudes of government Internet and database breaches extending from the White House to the Pentagon that serve to magnify the F.B.I.'s inability to enforce internet security against anyone except its own corrupt recently criminally tried agents.
This "no FBI comment" strategy is readily understandable especially considering that FBI Director "Backdoor Man" James B. Comey like screaming NSA Director "No Backdoor Man" Admiral Michael "Mike" Rogers has been increasingly vociferously demanding a "key" or "split keys" to U.S. technology company including phone encryption contrary to all reputable world computer security expert opinions (and directly violating Comey's pledge covered verbatim in a post here earlier this year in which he assured that would take "no position" on the issue) on the grounds that Director Comey and apparently Admiral Rogers even in the wake of the continuing tidal wave onslaught of U.S. government cyberbreaches still incredibly believe their agencies can insure any cybersecurity at all much less manage not to lose or have a "key" misused by a criminal hostile state within a matter of days. Should the federal government succeed in threatening American technology companies to get a single "key" or "split keys" the Ninth Amendment respectfully suggests that President Obama please immediately demand it be turned over to the White House so that it may be secured with the First Lady to wear as a necklace.
Readers interested in more information regarding the above first reported by Reuters can go to the New York Times link incorporating the Reuters report below.
http://www.nytimes.com/reuters/2015/12/28/us/28reuters-usa-voters-breach.html?_r=0
Copyright Martin P. 2015 All World Rights Expressly Reserved
Vickery said in a Monday telephone interview that it was he who originally had discovered the leak while seeking to expose data security public leaks on the Internet. Mr. Vickery reportedly said the database took about one day to download and did not know if it had been accessed by any others. CSO Online said the information contained codes that may have originated from campaign software provider NationBuilder.
NationBuilder Chief Executive Officer Jim Gilliam said the database was not created by the Los Angeles-based company although some of the database information may have come from "data it freely supplies to political campaigns." Gilliam curiously then while implying NationBuilder had not necessarily "seen" all the information leaked made the definite statement that the voter information "included" in the leak "is already publicly available from each state government" and so asserted that "no new or private information was released in this database". Apparently Mr. Gilliam may have overlooked both the security danger the voter information compilation posed including because of criminal use of it in "concentrated" form as Mr. Vickery pointed out as well as the fact that different state governments do not uniformly allow the same uses of voter registration information.
Federal agencies quickly stepped up to shift the blame to others with a representative with the U.S. Federal Elections Commission saying the FEC has no jurisdiction over protecting voter records. Mr. Vickery said he has not been able to identify who controls the database, but that he is working with U.S. agencies whom he declined to identify to determine who owns the site so that it can be removed from public view. Unsurprisingly the F.B.I. declined to comment on its role presumably yet again sleuthing slippery commie states and/or tech punks (it might later hire due to its own present gross ineptitude) in this recent huge government Internet security breach doubtless hoping yet again no one rightfully could attribute responsibility to the F.B.I. for this or any of the other rapidly growing multitudes of government Internet and database breaches extending from the White House to the Pentagon that serve to magnify the F.B.I.'s inability to enforce internet security against anyone except its own corrupt recently criminally tried agents.
This "no FBI comment" strategy is readily understandable especially considering that FBI Director "Backdoor Man" James B. Comey like screaming NSA Director "No Backdoor Man" Admiral Michael "Mike" Rogers has been increasingly vociferously demanding a "key" or "split keys" to U.S. technology company including phone encryption contrary to all reputable world computer security expert opinions (and directly violating Comey's pledge covered verbatim in a post here earlier this year in which he assured that would take "no position" on the issue) on the grounds that Director Comey and apparently Admiral Rogers even in the wake of the continuing tidal wave onslaught of U.S. government cyberbreaches still incredibly believe their agencies can insure any cybersecurity at all much less manage not to lose or have a "key" misused by a criminal hostile state within a matter of days. Should the federal government succeed in threatening American technology companies to get a single "key" or "split keys" the Ninth Amendment respectfully suggests that President Obama please immediately demand it be turned over to the White House so that it may be secured with the First Lady to wear as a necklace.
Readers interested in more information regarding the above first reported by Reuters can go to the New York Times link incorporating the Reuters report below.
http://www.nytimes.com/reuters/2015/12/28/us/28reuters-usa-voters-breach.html?_r=0
Copyright Martin P. 2015 All World Rights Expressly Reserved
No comments:
Post a Comment