The Potential threats That is facing and Manipulation the rigging of 2019 Nigeria Election Nigeria
17
Feb
0
The Potential threats That is facing and Manipulation the rigging of 2019 Nigeria Election Nigeria
The Nigerian Independent National Electoral
Commission (INEC) says no one can use the identification number on Permanent
Voters’ Cards (PVCs) to comprise the smart card reader machine on Election Day.
The fact is the INEC Chairman, Yakubu Mahmood lack a common knowledge of hacking software technique or cloning a magnetic or chip card
INTRODUCTIONEkens Security & Law Science Canada, Specialized on Twenty-First Century Cyber Security Threats, International Security Consultant and Counterintelligence Expert, Remote Monitoring Applications, ldetails at http://ekensdetective.com/
Ekens Security & Law Science, We are working hard in making the world a safer place by educating electorates on security concerns
CONFLICT OF INTEREST
The contractor or supplier of said electoral material for the election in question such as the electronic card and the card reading machine is a member of the ruling party (APC)
Not only that the person is a member of the ruling party but he is one of the contesting candidates of the election
The person in question is Hon Mohammed Sani Musa; the senatorial candidate for Niger North company name is Activate Technologies Limited Nigeria
ISSUES:
As technology emerges in this twenty-first
century, it becomes easier to manipulate and rig electronics voting devices
including manipulation of the card reader as intruded by the independent
electoral commission of Nigeria (INEC) for the upcoming 2019 general election
Major factors are common to computerized voting
technology in rigging elections to corporations that operate in the shadows
with a little technology oversight while the observers would be busy on the
physical site inspection of election ballots.
The rigging of this election would occur without public knowledge leading to one of the most dangerous and least understood crises in the history of Nigeria democracy on an inability to verify election results electronically
Electronic voting systems allow insiders to rig
elections on a national scale by manipulating the technology in secrecy through
the means of proprietary corporate-owned software by programming a small chip
on each of the devices to manipulate hundreds of thousands of votes.
These would potentially rig millions of votes
just with the stroke of a code which can be described in the security
terminology as an equivalent of a drone strike.
Even an encrypted audit log is one of the
easiest ways to manipulate and rig the election electronically.
Thus, there is no reason Nigerians should trust the so-called Activate Technologies Limited Nigeria Located at 15 Ganges Street, Ministers Hill, Maitama, Abuja, FCT, and Nigeria. To handle the supplier software and programming of the so-called card reader and devices without compromising the system, this is a lack of transparency in the system against adequate perfection of a free and fair 2019 election in Nigeria
Another common factor is anyone with hacking
techniques can easily execute an attack to the software device by injecting a
SQL injection and re-write encrypted code into the database then gain complete
control of voters data on the card readers potentially infect the machines with
malware or decrease the update allowing them to hack into the machines and
simply rig the election eventually making the (INEC) system Vulnerable by
compromising the voters potential data unreported
PROTOCOLS AND VULNERABILITY FOR EVERY CARD
READERS
Example of Wiegand Serial RS232 including the hack gear
here, RS422, RS458 Clock-and-Data / ABA format Magnetic Stripe Track – mostly
used in credit cards, focusing solely on the interface, as it is the most
common protocol.
This type of Card reader’s main objective protocol is to connect card readers to the electronic entry device via a specific protocol language. This means that anyone with hacking protocol knowledge can communicate to the electronic data system by digitally Clones the magnetic Stripe of the voter’s card
This is something called mag-spoof that can spoof any magnetic stripe or any card enabling a device to wirelessly send a signal to traditional card readers without needing NFC or RFID, However, this is very easy to build using basic electronics and custom code.
Once built, it can function as a traditional
voting card; you can switch between cards or have the potential to disable the
PIN
WHAT YOU MUST KNOW
What you must understand is all the uncollected
issued voters’ card can easily be cloned and while the legitimate are sitting
at home and enjoying their mean, someone would there clone their PVC card to do
accreditation eventually cast a vote
This is a total lack of common technology and security threats by the INEC Chairman, Yakubu Mahmood by making statement dated Jen, 11, 2019 that nobody can hack into its database and in clear terms, the cloned PVCs can’t work with (INEC) smart card readers.
UNDERSTANDING MAGNETIC STRIPES
To understand how (XXXXXX) works, you’ll first
need to know how magnetic stripes work. But while the level of magnetism in
these stripes is quite low, it is enough to attract iron oxide particles, which
in turn reveal each code data in a card
This produces a magnetic field that emulates a
stripe swipe by quickly changing the polarization of an electromagnet but the
stronger the electromagnet, the further away you can use it to vote
INEC CHIP AND PIN VOTERS CARD
This card protection mechanism requires a card to be dipped in the INEC card reader at the voting point but the protection can be deactivated from the bits by obtaining the magstripe then completely bypassing the enhanced security measure as previously programmed by the (INEC)
These are the common alert you need to observe
during this election, all the agents should record the number of any card
refused to work as it could a potential clone card
For
more information visit our website at http://ekensdetective.com/or http://.ekensfoundation.org