You sit back and begin to rock back and forth tapping your pen on the desk. With few exceptions, the NCA’s system had been able to successfully locate almost all users involved in illicit or disruptive activities for the agency’s history. In addition to the fact that all hardware and internet services are provided by the government, communication from foreign sources is sent through an immigration control of sorts similar to that required of tourists coming to the states for the first time. These protocols required information such as verified information on the sender’s name, location, country of origin, date of birth, etc. In other words, getting past John Sherman and his tracking team should be impossible. How was the hacker able to provide a fake name and address without the system noticing? How did the hacker get through the stringent security run by his department to affect the voting results with the limited hardware allowed in the United States?
As you rock back and forth you begin to mull over the fake name used by the sender. Stafford Beer was a networking pioneer that developed a network called Cybersyn to monitor Chile’s economy and support the socialist government under Salvador Allende. Beer later recommended the use of a similar system to monitor citizens’ satisfaction with the government through buttons on their television sets. The United States’ new voting system mirrors this recommendation and many think that Beer’s proposal served as an inspiration for the switch. The hacker is clearly well versed in networking history, perhaps a professional in the internet and networking field.
Do you: