Search
  • Robert J. Borer

I prefer trust, but verify

In the contract signed by Bob Evnen between the State of Nebraska and ES&S, they have a protocol that uses USB drives to transfer our vote totals from the tabulators to a computer for transmission to the EMS software that runs our elections. Bob Evnen tells us this is safe and secure because that's what ES&S tells him. But does anyone check within the state? No!


There are ways that these USB devices can be exploited, but we don't check. How can anyone assert "safe and secure" if you do not first verify?


As the next Secretary of State, I will check and verify.


ICYMI: Here's a List of 29 Different Types of USB Attacks (bleepingcomputer.com)


8 views0 comments

Recent Posts

See All