<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>FBI Archives - Follow My Vote</title>
	<atom:link href="https://followmyvote.com/tag/fbi/feed/" rel="self" type="application/rss+xml" />
	<link>https://followmyvote.com/tag/fbi/</link>
	<description>Blockchain Voting Pioneers</description>
	<lastBuildDate>Tue, 30 Aug 2016 02:22:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://followmyvote.com/wp-content/uploads/2013/08/cropped-Follow-My-Vote-T-shirt-White-on-Black-Front-Logo-1-150x150.jpg</url>
	<title>FBI Archives - Follow My Vote</title>
	<link>https://followmyvote.com/tag/fbi/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Breaking: Two State Election Databases Hacked</title>
		<link>https://followmyvote.com/two-state-election-databases-hacked/</link>
					<comments>https://followmyvote.com/two-state-election-databases-hacked/#respond</comments>
		
		<dc:creator><![CDATA[Will Long]]></dc:creator>
		<pubDate>Tue, 30 Aug 2016 02:22:51 +0000</pubDate>
				<category><![CDATA[Elections]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Voting]]></category>
		<category><![CDATA[Arizona]]></category>
		<category><![CDATA[Election Systems]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Flash Alert]]></category>
		<category><![CDATA[Hacked]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Illinois]]></category>
		<guid isPermaLink="false">https://followmyvote.com/?p=14732</guid>

					<description><![CDATA[<p>We just learned today, August 29th, that hackers have breached the databases of not one, but two state board of election systems. This breaking news comes from a FBI &#8220;flash&#8221; alert that was given to state boards earlier this month and just emerged into the eyes of the public. Follow My Vote has secured a copy of the [&#8230;]</p>
<p>The post <a href="https://followmyvote.com/two-state-election-databases-hacked/">Breaking: Two State Election Databases Hacked</a> appeared first on <a href="https://followmyvote.com">Follow My Vote</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We just learned today, August 29th, that hackers have breached the databases of not one, but two state board of election systems. This breaking news comes from a FBI &#8220;flash&#8221; alert that was given to state boards earlier this month and just emerged into the eyes of the public.</p>
<p>Follow My Vote has secured a copy of the original alert released by the FBI’s Cyber Division.</p>
<p><a href="https://followmyvote.com/wp-content/uploads/2016/08/FBI-Flash-alert-election-sites-hacked-Follow-My-Vote.jpg" rel="attachment wp-att-14733"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-14733" src="https://followmyvote.com/wp-content/uploads/2016/08/FBI-Flash-alert-election-sites-hacked-Follow-My-Vote.jpg" alt="FBI Flash alert" width="786" height="580" /></a></p>
<p style="text-align: center;">
<h2>Which State Election Databases Got Hacked?</h2>
<p>Right now we are not getting any official confirmation on which states had their systems hacked. Without mentioning specifics, The FBI alert reports that two states had their Board of Election databases compromised. Recent events however, give us all the clues we need.</p>
<p><a href="https://followmyvote.com/wp-content/uploads/2016/08/Illinois-sign-Follow-My-Vote.jpg" rel="attachment wp-att-14734"><img decoding="async" class="aligncenter size-full wp-image-14734" src="https://followmyvote.com/wp-content/uploads/2016/08/Illinois-sign-Follow-My-Vote.jpg" alt="Illinois sign" width="400" height="400" /></a></p>
<p><a href="https://thesouthern.com/news/local/state-and-regional/hackers-penetrate-illinois-voter-registration-database/article_6e58f325-367f-5f8e-aa78-f0b8224865cd.html" target="_blank" rel="noopener noreferrer">On July 13, 2016</a>, officials in Illinois went as far as to shut down the entire state&#8217;s voter registration system for 10 days.</p>
<p>During the breach, hackers were able to steal the personal data of <strong>200,000 registered Illinois voters. </strong>This information aligns perfectly with what is described in the flash alert concerning a breach and theft of data. It&#8217;s likely the alert is referring to the Illinois hack.</p>
<p><a href="https://followmyvote.com/wp-content/uploads/2016/08/Arizona-Sign-Follow-My-Vote.jpg" rel="attachment wp-att-14736"><img decoding="async" class="aligncenter size-full wp-image-14736" src="https://followmyvote.com/wp-content/uploads/2016/08/Arizona-Sign-Follow-My-Vote.jpg" alt="Arizona Sign" width="400" height="400" /></a></p>
<p>The second hack can likely be attributed to Arizona. On or around <a href="https://www.azcentral.com/story/news/politics/arizona/2016/06/29/security-concerns-shut-down-parts-arizona-secretary-states-elections-site/86523404/" target="_blank" rel="noopener noreferrer">June 30, 2016</a>, The Arizona Secretary of State&#8217;s Office shut down part of their voter registration system due to finding malicious software on a computer used to log into the state&#8217;s voter registration system.</p>
<p>The Arizona breach is slightly less serious, as no data was stolen.</p>
<h2>The Breach</h2>
<p>The hack described in the FBI alert is a SQL injection. This type of attack is carried out by adding SQL (Structured Query Language) code to forms or input locations to gain access to backend data. SQL injections are currently the most common type of website hack. An attacker can often gain easy access to websites and their servers by entering code that the form does not expect to be inserted. The form will easily deny a wrong password or username, but when confronted with a totally different type of request, it opens a vulnerability. Specifically, it can allow hackers to view, manipulate, or steal all of the backend data.</p>
<h2>Who Is Responsible?</h2>
<p><a href="https://followmyvote.com/wp-content/uploads/2016/08/Who-are-the-hackers-Follow-My-Vote.jpg" rel="attachment wp-att-14741"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-14741" src="https://followmyvote.com/wp-content/uploads/2016/08/Who-are-the-hackers-Follow-My-Vote.jpg" alt="Who are the hackers - Follow My Vote" width="1000" height="297" /></a></p>
<p>We are not sure. There are 8 IP addresses listed in the alert as sources of the attacks. One of these IP addresses was listed as a source for both attacks, supporting the theory that one organization was behind both attacks.</p>
<p>An additional theory that is circulating the internet is that Russian hackers are responsible. The evidence behind this theory stems from a previous emergence of one of these IP addresses on a Russian hacker forum.</p>
<h2>Where Do We Go From Here?</h2>
<p>Some people are in favor of paper voting systems. It seems logical because hackers can&#8217;t manipulate or steal the information in the same manner. This is true. However, paper based voting systems are fantastic at negating all transparency. They create black boxes where you will never know if your vote was counted or got discarded. Top this off with human error and a small number of people counting the ballots, and elections easily become inadequate tools for true representation.</p>
<p>Ultimately, we need more transparency and better voting technology. Follow My Vote is dedicated to advancing and reforming voting technology around the world. The United States is one of many countries that are in dire need of innovation in the voting sector.</p>
<blockquote><p>&#8220;These attacks are yet another reminder that something must be done to secure our election systems. If people can’t trust our elections systems, they are going to be much less likely to vote. Follow My Vote’s blockchain-based voting software is a complete end-to-end system that supports secure identity verification, voter registration, anonymous ballot issuance, verifiable vote casting, and tallying results. Blockchain voting is the future. The time is now!&#8221;</p>
<p style="text-align: center;">– Adam Kaleb Ernest, Co-Founder &amp; CEO – Follow My Vote</p>
</blockquote>
<p style="text-align: left;">This is a massive wake up call for a lot of people, especially following the <a href="https://www.wired.com/2016/07/heres-know-russia-dnc-hack/" target="_blank" rel="noopener noreferrer">Democratic National Convention hack</a>. Those in the election industry have been aware of the lack of security. They have stood by watching voting machines get compromised and<a href="https://followmyvote.com/the-worst-voting-machine-in-the-us/" target="_blank" rel="noopener noreferrer"> de-certified</a> one after another.</p>
<p style="text-align: left;">Now is the time for innovative technology to help us vote better. We are at a point where we can use the tools of the past or use the tools of the future.</p>
<p style="text-align: left;">Learn about <a href="https://followmyvote.com/online-voting-technology/blockchain-technology/" target="_blank" rel="noopener noreferrer">our Technology</a> and <a href="https://followmyvote.com/support-us/" target="_blank" rel="noopener noreferrer">get involved</a>!</p>
<p><a href="https://followmyvote.com/wp-content/uploads/2016/08/Advancing-and-reforming-voting-banner-Follow-My-Vote.jpg" rel="attachment wp-att-14744"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-14744" src="https://followmyvote.com/wp-content/uploads/2016/08/Advancing-and-reforming-voting-banner-Follow-My-Vote.jpg" alt="Advancing and reforming voting " width="1550" height="392" /></a></p>
<p><strong>About the author: </strong>Will Long is the Marketing Manager of Follow My Vote.</p>
<p>The post <a href="https://followmyvote.com/two-state-election-databases-hacked/">Breaking: Two State Election Databases Hacked</a> appeared first on <a href="https://followmyvote.com">Follow My Vote</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://followmyvote.com/two-state-election-databases-hacked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The FBI v. Apple: The Future of Encryption Technology</title>
		<link>https://followmyvote.com/apple-vs-fbi-future-encryption/</link>
					<comments>https://followmyvote.com/apple-vs-fbi-future-encryption/#comments</comments>
		
		<dc:creator><![CDATA[tylerm93]]></dc:creator>
		<pubDate>Mon, 14 Mar 2016 17:39:11 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[encryption technology]]></category>
		<category><![CDATA[FBI]]></category>
		<guid isPermaLink="false">https://followmyvote.com/?p=12447</guid>

					<description><![CDATA[<p>The future of encryption could seemingly be hanging in the balance in the FBI v. Apple saga. In short, the FBI wants Apple to unlock the iPhone of one of the deceased San Bernardino terrorist suspects, because they believe there may be useful information about the man&#8217;s history inside of the iPhone. Apple has refused to [&#8230;]</p>
<p>The post <a href="https://followmyvote.com/apple-vs-fbi-future-encryption/">The FBI v. Apple: The Future of Encryption Technology</a> appeared first on <a href="https://followmyvote.com">Follow My Vote</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The future of encryption could seemingly be hanging in the balance in the <a href="https://www.cnn.com/2016/02/16/us/san-bernardino-shooter-phone-apple/" target="_blank" rel="noopener noreferrer">FBI v. Apple</a> saga. In short, the FBI wants Apple to unlock the iPhone of one of the deceased San Bernardino terrorist suspects, because they believe there may be useful information about the man&#8217;s history inside of the iPhone. Apple has refused to comply thus far, citing that giving the FBI access to the iPhone&#8217;s encryption key could essentially give them a master key to unlock other devices.</p>
<p>The implications of allowing government access to encryption goes far beyond just Apple. Any software company or developer that uses encryption to protect their right to privacy would potentially be affected. For example, Follow My Vote relies on encryption to ensure voter privacy. Many of the great applications and software being built today would become extraneous without the reliance of encryption.</p>
<blockquote>
<p class="zn-body__paragraph">&#8220;The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers &#8212; including tens of millions of American citizens &#8212; from sophisticated hackers and cybercriminals&#8221;</p>
<p class="zn-body__paragraph">&#8211; Tim Cook, <a href="https://www.apple.com/customer-letter/" target="_blank" rel="noopener noreferrer">Apple CEO</a></p>
</blockquote>
<p><iframe src="https://www.youtube.com/embed/zsjZ2r9Ygzw" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<blockquote><p>&#8220;What is the FBI seeking here? First, the FBI is demanding that Apple make a new software product. Second, that software product would have to be designed in accordance with specifications provided to Apple by the FBI. Third, once Apple created that software product, it would have to test the product to ensure it met Apple’s own quality standards. Fourth and finally, Apple would have to test and validate this software product so that criminal defendants would be able to exercise their constitutional rights to challenge the government’s legal claims as provided by the Federal Rules of Evidence (FRE).&#8221;</p>
<p>&#8211; John Eden, <a href="https://techcrunch.com/2016/03/13/why-apple-is-right-to-resist-the-fbi/" target="_blank" rel="noopener noreferrer">TechCrunch</a></p></blockquote>
<p>So far, a magistrate judge has ordered Apple to build a new iOS so the terrorist suspect&#8217;s information can be removed by the FBI. The FBI is citing the <em><strong>All Writs Act of 1789</strong></em> to make Apple comply. Apple has filed a Motion to Vacate (MTV) the judge&#8217;s ruling, citing long-term security concerns of allowing the FBI a master key.</p>
<p>With prominent talk show hosts attempting to tackle this complex issue, the case is beginning to pick up national coverage. <a href="https://www.wired.com/2016/03/new-documents-solve-mysteries-apple-fbi-saga/" target="_blank" rel="noopener noreferrer">WIRED</a> has taken a deep dive into new documents that have surfaced in the past few days. There does not appear to be an easy solution to this problem and many believe that this case could eventually make its way to the Supreme Court. Follow My Vote will be monitoring the progress of this saga closely. Due to the high profile nature of this case, the future of encryption technology is truly hanging in the balance.</p>
<p><strong>About the author:</strong> Tyler Molihan is a Marketing Intern at Follow My Vote. He hopes to increase awareness about the benefits of online voting systems.</p>
<p><!-- Begin MailChimp Signup Form --></p>
<p><!--End mc_embed_signup--></p>
<p>The post <a href="https://followmyvote.com/apple-vs-fbi-future-encryption/">The FBI v. Apple: The Future of Encryption Technology</a> appeared first on <a href="https://followmyvote.com">Follow My Vote</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://followmyvote.com/apple-vs-fbi-future-encryption/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
