Monday, September 28, 2020

The Tale Of The Electoral College: Tyler Technologies Is Not Havin A Very Good Week With Its Crappy Predictive Modeling Electoral College Databases

Tyler Technologies is not having a very good week.

Wanna know why?

Because, "She was hoisted by her own petard, again."

IDIOTS!

Meet the Electoral College Corporate Parent of the vote, because in order to vote, one must live in the
National Governors Association

geopolitical district, which is administrated by SOCRATA, like all the municipal property taxes, and county registry of deeds, and court records, and school records, and Medicaid fraud in child welfare records, which are used through the certification process of the vote, to generate a finding on the Electoral College votes for a POTUS.

So, that would mean if there was a situation of fake ass property taxes, fake ass foreclosures, fake ass bankruptcy, fake ass Detroit Land Bank Authority, running some fake ass public and private mortgage fraud schemes in the name of the tax exempt lord, there would definitely not be found any corruption in the chain of command of the record when it comes to the chain of command of the certification of the election, in a situation of more illegitimate certifiers, covering up all the mean things they did to my Sweetie, because something like that would just jack the entire 2016 Presidential Election Algorithm, right?

National Conference of State Legislatures

 U.S. Presidential Elections are based on the Electoral College, not the popular vote, which is why the issue is election interference.

They negotiate who wins before the vote.

But, when those wily plans go awry, we have a serious question ask ourselves"

"When will Trump stop obstructing justice and pull that IG Report from his backpocket?"

#maytheheavensfall

Tyler Technologies: Ransomware Locked Our Network, But Election Info Not At Risk

In a late Friday afternoon update to the single page of attack information that now passes for Tyler Technologies’ website, the company admitted to being hit by ransomware, but insisted customers were safe.

Tyler Technologies has copped to the ransomware attack that still has the company’s phone lines and website off line.

In an update to its online statement, Plano, Texas-based Tyler confirmed that early Sept. 23 it was hit with ransomware. It did not specify which variant was used against its network.

The company -- No. 46 on the 2019 CRN Solution Provider 500 -- is sticking by its claims that the only portion of its system that was attacked was the internal network used by Tyler Technologies employees, as well as the telephone systems.

Tyler said addressing this with clients is the company’s “highest priority.”

“We are deploying every resource at our disposal, both internal and external, to take whatever steps are needed to return to business as usual,” the company said. “We are committed to doing that in a responsible, deliberate way, and we are laser-focused on those efforts.”

Tyler said it has been in contact with the FBI “and we are cooperating with them.”

The attack on Tyler Technologies is setting off alarm bells in the security community, not just because it is yet another ransomware attack this year against a massive solution provider, but because the company’s website and phone system remains down.

Kyle Hanslovan, CEO of Huntress Labs, said solution providers that are Tyler’s size typically have network redundancies built in, meaning the phone systems and website should be restorable quickly. The fact that the site has not yet come back online, likely means Tyler does not know the extent of the intrusion.

“It’s concerning. Redundancies are hard. Redundancies are expensive, but they should be part of any company’s resiliency plan,” he said. “They could be one of these companies that is very operationally mature when it comes to sales and products, but inside their network it is a house of cards.”

A call to Tyler’s spokeswoman could not be routed through the switchboard, an operator who picked up the phone yesterday said.

“We’re still having problems with the phones,” she said. In an email, a spokesperson directed CRN to an update on the website. Tyler’s website – which was offline following the attack – has been replaced by a single-page statement about the ransomware attack, a part of which insists that none of its clients’ systems were accessed.

“Based on all of the evidence gathered to date through our around-the-clock response efforts, all information available to us continues to indicate that this incident is limited to Tyler‘s internal corporate environment and does not impact the separate environment where we host client systems,” the statement reads. “ We have disconnected points of access between Tyler’s internal systems and our client systems to further protect our clients.”

The company also said its internal payroll systems are part of a separate system and were also not hit.

However, Hanslovan said it is very difficult for the best security forensics to determine how far-reaching an attack was, even weeks afterwards. At best, those reports will only indicate “high confidence” that an attack did not spread beyond the area that it impacted.

Tyler Technologies serves 15,000 customers around the world, but focuses primarily on state and local government customers. The company offers dozens of solutions for courts, police, EMS, fire department, probation, as well as resourced to pay parking tickets and water bills.

The company bought Socrata, an advanced AI platform in 2018, which extracts information from municipal systems giving decision makers actionable datasets used in urban planning. A part of that includes data from elections departments, raising the concern that ransomware actors could be attempting to tamper with elections.

The company said the Socrata system is housed on an AWS server and has not been touched.

“Based on all of the evidence gathered to date through our around-the-clock response efforts, all information available to us continues to indicate that this incident is limited to Tyler‘s internal corporate environment and does not impact the separate environment where we host client systems. In addition, our Socrata platform is hosted offsite on AWS (Amazon Web Services), and our Tyler Federal Entellitrak and Tyler Cybersecurity platforms are maintained in entirely separate environments. There is no evidence of any impact on those environments whatsoever.

The company also insisted that none of its products are used in voting. The Socrata system reads the information that is provided.

“None of our products is a system of record for voting or any other election- or voting-related activities. Users of our open data solution may use our platform to post aggregated information about election returns, or to provide information about polling stations and campaign finance, but Tyler does not store individual voting records. Our open data solution is hosted offsite on AWS, not on Tyler‘s internal network that was impacted.”

The company also disputed some online comments that its utility bill payment systems used by cities and towns was having trouble following the outage.

“Tyler‘s Online Services and Support teams have reviewed all the logs, monitoring, traffic reports, volume reports, and cases related to utility and court payments,” the company said. “There were no outages with any of our online payment systems and payment activity has functioned normally during this time.”

Brett Callows, a threat analyst at Emsisoft, said the looming U.S. election, and the danger posed by ransomware to municipal systems, regardless of vendor, is real.

“The threat ransomware groups present cannot be overstated,” he said. “They’re using APT-level tools and techniques to successfully attack - and extract data from - courts, government agencies, companies in the Defence Industrial Base sector, financial institutions and public and private entities in multiple other sectors. These incidents could potentially be a risk to national security, economic security and, of course, election security.”

Voting is beautiful, be beautiful ~ vote.©

1 comment:

BEVERLY TRAN said...

FYI...the Wayne County Land Records are still inaccessible.