The Potential threats That is facing and Manipulation the rigging of 2019 Nigeria Election Nigeria

  • Home
  • The Potential threats That is facing and Manipulation the rigging of 2019 Nigeria Election Nigeria
17 Feb
0

The Potential threats That is facing and Manipulation the rigging of 2019 Nigeria Election Nigeria

  • The Nigerian Independent National Electoral Commission (INEC) says no one can use the identification number on Permanent Voters’ Cards (PVCs) to comprise the smart card reader machine on Election Day.
  • The fact is the INEC Chairman, Yakubu Mahmood lack a common knowledge of hacking software technique or cloning a magnetic or chip card
  • INTRODUCTIONEkens Security & Law Science Canada, Specialized on Twenty-First Century Cyber Security Threats, International Security Consultant and Counterintelligence Expert, Remote Monitoring Applications, ldetails at http://ekensdetective.com/
  • Ekens Security & Law Science, We are working hard in making the world a safer place by educating electorates on security concerns
  • CONFLICT OF INTEREST 
  • The contractor or supplier of said electoral material for the election in question such as the electronic card and the card reading machine is a member of the ruling party (APC)
  • Not only that the person is a member of the ruling party but he is one of the contesting candidates of the election
  • The person in question is Hon Mohammed Sani Musa; the senatorial candidate for Niger North company name is Activate Technologies Limited Nigeria

  • ISSUES:
  • As technology emerges in this twenty-first century, it becomes easier to manipulate and rig electronics voting devices including manipulation of the card reader as intruded by the independent electoral commission of Nigeria (INEC) for the upcoming 2019 general election
  • Major factors are common to computerized voting technology in rigging elections to corporations that operate in the shadows with a little technology oversight while the observers would be busy on the physical site inspection of election ballots.
  • The rigging of this election would occur without public knowledge leading to one of the most dangerous and least understood crises in the history of Nigeria democracy on an inability to verify election results electronically
  • Electronic voting systems allow insiders to rig elections on a national scale by manipulating the technology in secrecy through the means of proprietary corporate-owned software by programming a small chip on each of the devices to manipulate hundreds of thousands of votes.
  • These would potentially rig millions of votes just with the stroke of a code which can be described in the security terminology as an equivalent of a drone strike.
  • Even an encrypted audit log is one of the easiest ways to manipulate and rig the election electronically.
  • Thus, there is no reason Nigerians should trust the so-called Activate Technologies Limited Nigeria Located at 15 Ganges Street, Ministers Hill, Maitama, Abuja, FCT, and Nigeria.  To handle the supplier software and programming of the so-called card reader and devices without compromising the system, this is a lack of transparency in the system against adequate perfection of a free and fair 2019 election in Nigeria
  • Another common factor is anyone with hacking techniques can easily execute an attack to the software device by injecting a SQL injection and re-write encrypted code into the database then gain complete control of voters data on the card readers potentially infect the machines with malware or decrease the update allowing them to hack into the machines and simply rig the election eventually making the (INEC) system Vulnerable by compromising the voters potential data unreported
  • PROTOCOLS AND VULNERABILITY FOR EVERY CARD READERS
  • Example of  Wiegand Serial RS232 including the hack gear here, RS422, RS458 Clock-and-Data / ABA format Magnetic Stripe Track – mostly used in credit cards, focusing solely on the interface, as it is the most common protocol.   
  • This type of Card reader’s main objective protocol is to connect card readers to the electronic entry device via a specific protocol language. This means that anyone with hacking protocol knowledge can communicate to the electronic data system by digitally Clones the magnetic Stripe of the voter’s card
  • This is something called mag-spoof that can spoof any magnetic stripe or any card enabling a device to wirelessly send a signal to traditional card readers without needing NFC or RFID, However, this is very easy to build using basic electronics and custom code.
  • Once built, it can function as a traditional voting card; you can switch between cards or have the potential to disable the PIN
  • WHAT YOU MUST KNOW
  • What you must understand is all the uncollected issued voters’ card can easily be cloned and while the legitimate are sitting at home and enjoying their mean, someone would there clone their PVC card to do accreditation eventually cast a vote
  • This is a total lack of common technology and security threats by the INEC Chairman, Yakubu Mahmood by making statement dated Jen, 11, 2019 that nobody can hack into its database and in clear terms, the cloned PVCs can’t work with (INEC) smart card readers.

  • UNDERSTANDING MAGNETIC STRIPES
  • To understand how (XXXXXX) works, you’ll first need to know how magnetic stripes work. But while the level of magnetism in these stripes is quite low, it is enough to attract iron oxide particles, which in turn reveal each code data in a card
  • This produces a magnetic field that emulates a stripe swipe by quickly changing the polarization of an electromagnet but the stronger the electromagnet, the further away you can use it to vote
  • INEC CHIP AND PIN VOTERS CARD
  • This card protection mechanism requires a card to be dipped in the INEC card reader at the voting point but the protection can be deactivated from the bits by obtaining the magstripe then completely bypassing the enhanced security measure as previously programmed by the (INEC)
  • These are the common alert you need to observe during this election, all the agents should record the number of any card refused to work as it could a potential clone card
  • For more information visit our website at http://ekensdetective.com/or http://.ekensfoundation.org

EKENS SECURITY & LAW SCIENCE CANADA
http://ekensdetective.com/

Categorised in: ,

Leave a Reply

Your email address will not be published. Required fields are marked *

Verified by MonsterInsights