<html><head><meta http-equiv="Content-Type" content="text/html charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">+1 on the fact that this was an add-on system, meant to provide transparency, but was never intended to be the official source for the tally of elections. <div><br></div><div>We finally have an idea of the system setup and what went wrong: <a href="http://iebctechkenya.tumblr.com/post/44928868808/a-clear-definition-of-the-iebc-tech-failure">http://iebctechkenya.tumblr.com/post/44928868808/a-clear-definition-of-the-iebc-tech-failure</a></div><div><br><div apple-content-edited="true">
<div style="color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div>Erik Hersman</div><div><br></div><div><div><a href="http://www.ushahidi.com/" target="_blank">www.ushahidi.com</a> | <a href="http://www.ihub.co.ke/" target="_blank">www.iHub.co.ke</a></div><div><a href="http://www.afrigadget.com/" target="_blank">www.whiteafrican.com</a> | <a href="http://twitter.com/whiteafrican" target="_blank">@whiteafrican</a><br></div></div><div><br></div><div><br></div></div></div><div><div>On Mar 9, 2013, at 12:21 PM, Odhiambo Washington <<a href="mailto:odhiambo@gmail.com">odhiambo@gmail.com</a>> wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite">+1<br><br>I will repeat what Adam has noted:<br><br>It sounds like he did the best job possible but a penetration test is
just one of many layers needed for security so this really does appear
to be a textbook example of a failed implementation of an important
technology system.<br><br>Pentest and securing of a system does NOT in any way stop someone with access privileges from compromising the system in their own special way:)<br><br><br><br><div class="gmail_quote">On 9 March 2013 11:58, Adam Nelson <span dir="ltr"><<a href="mailto:adam@varud.com" target="_blank">adam@varud.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">It doesn't really matter in terms of the election itself because the system was abandoned and was never intended to be the definitive basis of results. <div>
<br></div><div>However, saying that attacks were stopped in real time is already bad news. The fact that he was changing passwords and taking the "SQL server" off the network (I presume he means on some sort of public or unsafe network) just days before the election is pretty bad. The system could have been hijacked before he set up the IDS and did that work. It sounds like he did the best job possible but a penetration test is just one of many layers needed for security so this really does appear to be a textbook example of a failed implementation of an important technology system.</div>
<div><br></div><div>However, many best practices and lessons could come out of this. It almost seems like a book-length project.</div><div><br></div><div>-Adam</div><div class="gmail_extra"><br><div class="gmail_quote">
<div><div class="h5">
On Sat, Mar 9, 2013 at 11:47 AM, Rebecca Wanjiku <span dir="ltr"><<a href="mailto:rebeccawanjiku@yahoo.com" target="_blank">rebeccawanjiku@yahoo.com</a>></span> wrote:<br></div></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div><div class="h5">
<table cellpadding="0" cellspacing="0" border="0"><tbody><tr><td style="font:inherit" valign="top">Just in case you were wondering whether it was hacked, the person who did the pen test and monitored the network says no.<br>
<br>Read the views......<br><br><a href="http://www.wanjiku.co.ke/2013/03/was-the-iebc-network-compromise-an-insiders-view/" target="_blank">http://www.wanjiku.co.ke/2013/03/was-the-iebc-network-compromise-an-insiders-view/</a><br>
<br></td></tr></tbody></table><br></div></div>_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/adam%40varud.com" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/adam%40varud.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div><br></div></div>
<br>_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/odhiambo%40gmail.com" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/odhiambo%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div><br><br clear="all"><br>-- <br>Best regards,<br>Odhiambo WASHINGTON,<br>Nairobi,KE<br>+254733744121/+254722743223<br>_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ <br>I can't hear you -- I'm using the scrambler.<br>
_______________________________________________<br>kictanet mailing list<br><a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>https://lists.kictanet.or.ke/mailman/listinfo/kictanet<br><br>Unsubscribe or change your options at https://lists.kictanet.or.ke/mailman/options/kictanet/erik%40zungu.com<br><br>The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br><br>KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.</blockquote></div><br></div></body></html>