Win / GreatAwakening
GreatAwakening
Sign In
DEFAULT COMMUNITIES All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Reason: None provided.

Cybersecurity professional here, they did a good job covering their tracks.

20,480KB, or 20.48 MB is the default setting for the windows 10 security event viewer logs. Don't believe me? Open your Event Viewer right now from your start menu. Expand the tab that says "Windows Logs", right click on "Security" and then click on Properties. You will see your default log settings are set to 20,480. If it's different, it was changed by you, or someone who used your computer.

Now, with that said, the Cybersecurity professional did make a good case for their being no standard for these machines to be held to. They should be held to NIST 800-53, or NIST 800-171 respective to the company maintaining the machines. Not being held to a standard is unfortunately not evidence of fraud, it's just a gap that should be addressed moving forward.

Finally, what was strange about this segment was the auditing of the systems for blank username passwords. It doesn't make much sense for Maricopa to be actively auditing usernames on a system where there are zero security standards in place. This is a system that was never updated, uses the same password for every administrative username, and accounts are shared. This was the bit he spoke about not being able to tell who did what on the account, because it has no unique identifier, such as the person's name. There is no way to attribute actions from an account to a person. Despite all of this, they bothered to check for blank passwords?

The person who ran these scans knew damn well they were filling the default audit logs with white noise, but it will never in a million years be proven in court. The defense will argue the machines were set to default, and the county failed to hold them to any meaningful standard.

The best that we can hope for coming out of this is a confession. Otherwise, it's up to the United States to hold election machines to the same NIST standards they hold all government Information Systems to. The security standards in place are a joke, all for show.

2 years ago
1 score
Reason: None provided.

Cybersecurity professional here, they did a good job covering their tracks.

20,480KB, or 20.48 MB is the default setting for the windows 10 security event viewer logs. Don't believe me? Open your Event Viewer right now from your start menu. Expand the tab that says "Windows Logs", right click on "Security" and then click on Properties. You will see your default log settings are set to 20,480. If it's different, it was changed by you, or someone who used your computer.

Now, with that said, the Cybersecurity professional did make a good case for their being no standard for these machines to be held to. They should be held to NIST 800-53, or NIST 800-171 respective to the company maintaining the machines. Not being held to a standard is unfortunately not evidence of fraud, it's just a gap that should be addressed moving forward.

Finally, what was strange about this segment was the auditing of the systems for blank username passwords. It doesn't make much sense for Maricopa to be actively auditing usernames on a system where there are zero security standards in place. This is a system that was never updated, uses the same password for every administrative username, and accounts are shared. This was the bit he spoke about not being able to tell who did what on the account, because it has no unique identifier, such as the person's name. There is no way to attribute actions from an account to a person. Despite all of this, they bothered to check for blank passwords?

The person who ran these scans knew damn well they were filling the default audit logs with white noise, but it will never in a million years be proven in court. The defense will argue the machines were set to default, and the county failed to hold them to any meaningful standard.

The best that we can hope for coming out of this is a confession. Otherwise, it's up to the United States to hold election machines to the same NIST standards they hold all government Information Systems to.

2 years ago
1 score
Reason: None provided.

Cybersecurity professional here, they did a good job covering their tracks.

20,480KB, or 20.48 MB is the default setting for the windows 10 security event viewer logs. Don't believe me? Open your Event Viewer right now from your start menu. Expand the tab that says "Windows Logs", right click on "Security" and then click on Properties. You will see your default log settings are set to 20,480. If it's different, it was changed by you, or someone who used your computer.

Now, with that said, the Cybersecurity professional did make a good case for their being no standard for these machines to be held to. They should be held to NIST 800-53, or NIST 800-171 respective to the company maintaining the machines. Not being held to a standard is unfortunately not evidence of fraud, it's just a gap that should be addressed moving forward.

Finally, what was strange about this segment was the auditing of the systems for blank username passwords. It doesn't make much sense for Maricopa to be actively auditing usernames on a system where there are zero security standards in place. This is a system that was never updated, uses the same password for every administrative username, and accounts are shared. Yet they bothered to check for blank passwords?

The person who ran these scans knew damn well they were filling the default audit logs with white noise, but it will never in a million years be proven in court. The defense will argue the machines were set to default, and the county failed to hold them to any meaningful standard.

The best that we can hope for coming out of this is a confession. Otherwise, it's up to the United States to hold election machines to the same NIST standards they hold all government Information Systems to.

2 years ago
1 score
Reason: Original

Cybersecurity professional here, they did a good job covering their tracks.

20,480KB, or 20.48 MB is the default setting for the windows 10 security event viewer logs. Don't believe me? Open your Event Viewer right now from your start menu. Expand the tab that says "Windows Logs", right click on "Security" and then click on Properties. You will see your default log settings are set to 20,480. If it's different, it was changed by you, or someone who used your computer.

Now, with that said, the Cybersecurity professional did make a good case for their being no standard for these machines to be held to. They should be held to NIST 800-53, or NIST 800-171 respective to the company maintaining the machines. Not being held to a standard is unfortunately not evidence of fraud, it's just a gap that should be addressed moving forward.

Finally, what was strange about this segment was the auditing of the systems for blank username passwords. It doesn't make much sense for Maricopa to be actively auditing usernames on a system where there are zero security standards in place. This is a system that was never updated, uses default administrator usernames and passwords, and accounts are shared. Yet they bothered to check for blank passwords?

The person who ran these scans knew damn well they were filling the default audit logs with white noise, but it will never in a million years be proven in court. The defense will argue the machines were set to default, and the county failed to hold them to any meaningful standard.

The best that we can hope for coming out of this is a confession. Otherwise, it's up to the United States to hold election machines to the same NIST standards they hold all government Information Systems to.

2 years ago
1 score