
image text translation
President’s handwritten letter from Macbook (01.15] claiming election fraud and
Explanation on election fraud claims in the President’s current response
The National Election Commission said that among the contents of the handwritten letter posted on the Facebook page of 15-member Un Seok-yeol, President Moon Seok-yeol,
Claims of election fraud and
In the press
Among the current replies to the reported Presidential Rumm:
We would like to inform you of the exact facts regarding the claim of election fraud as follows.
(Regarding the President’s handwritten letter on Facebook)
[“A huge number of fake ballots were not found during the ballot box check in the election campaign.”
In the past, in several re-election lawsuits, the regular ballot paper or the close ballot paper was
I’m not asking for help, baby
“The National Election Commission’s computer system is defenseless against hacking and manipulation.”
System configuration diagram requested by the National Election Commission and the National Intelligence Service at the time of the Joint Security Rights Shintang in 203
Information asset current ship system manager. Text account is not provided in this case,
They’re breaking in. Some of our own security systems, such as blocking, are not applied. Mock touching is
In this situation, our committee’s decision is based on the contents.
It is difficult to accept the claim that the Jinsan system is a help to Haihong and Zhao Zi.
[ “Even though it falls significantly short of the standards of the national agency’s computer system, it is trying to correct it within two days.
“Not only does he not make any effort”
The central election committee is promoting the implementation of security rights shielding [most of the vulnerable access information was created by constructing a framework]
‘No action taken’ Press release related to this ‘Reappointment Commission; Improved information security system, prepared comprehensive customer service
203 1 2 Provision rate combination presented
and distribute:
In addition, before the election of members of the National Assembly was held, a second meeting was held with the National Intelligence Service in the presence of political party observers.
Jointly implement on-site electricity to determine whether or not it is implemented:
The first inspection will be conducted from 1 3 to 7. 31, and the second inspection will be conducted on 3. 19.
Completion of on-site inspection of implementation of action results before candidate registration application deadline 3 21)
(Regarding claims of election fraud in the current response to the Presidential Congratulations)
image text translation
Password is very simple
Although there were no inaccuracies related to password operation in a single program, the Central Security Council
Security fetch after security right setting, modification of vulnerable password, access to integrated voter list DB server
Security is urgently needed, such as strengthening control, and measures are taken immediately next to Sochiha.
in love
Regarding this, before the National Assembly elections were held in 2721, the National Intelligence Service
We jointly conducted two on-site implementation inspections.
The Central New Government Commission established a system to ensure that citizens can vote with peace of mind following the Security Construction Team.
Home control and control logs are strengthened, and security equipment rates are not added.
The new government committee’s business network, election network, and internet service are physically separated and operated.
An unauthorized system that uses a firewall and a server access control system to increase authority.
house wool
control and
there is.
Vulnerable Password Favors
change
Not just the measures
In the case of important systems, we introduce a secondary traction system using traction, bobail, etc.
Countries importing Korean electronic ballot counting machines are in national chaos due to election fraud.
The National Election Commission (NEC) is the national language of the Kyrgyz Republic in 2015 through the World Council of New Residential Organizations (A-WTB).
Starting with optical readout notation, new information system, and data cable support,
of international development cooperation (ODA) in the election field.
As part of the transitional democratic nation, voting ICT
Although equipment support was provided, the overseas equipment support project has been discontinued from 2027.
In some cases, domestic private companies export new equipment regardless of the Central New Construction Committee.
Overturning, Iraq
In the case of DR Palace, each country’s election committee and the Korean private industry
in the contract
Dara Export W
This is a case .
In addition, the new equipment exported to each country is used for domestic election equipment.
In particular, the Kirogiz Republic’s Kakhak Mandokgae symbol is used by each candidate at the polling station.
The votes are counted and after the vote is over, the results are raided by the Kyrgyz Republic’s Election Commission.
Unlike Korea, where physical ballots are counted at a counting station, there are two voting methods and
The way election equipment is used is completely different.
The National Election Commission’s system security management company is a small company with limited expertise.
image text translation
Affiliates of companies involved in winnings from North Korea
At the time of the joint security investigation team, the company that carried out the integrated security control records was a security control expert.
Home security provided by both a professional security service company and a software business operator.
From professional structurers and government agencies
We are a company that has been recognized for security.
Purpose of the Haedam Project for Shinggwanwinon Integrated Security Control Project Companies
The amount of guarantee for the proper performance of the task depends on the qualification requirements and the capacity to carry out the project.
[Act on Contracts with National Record Counselor
Dara Jipgeom: I already have someone to check,
Remission related to corporate governance loss is considered when new business is established and tasks are performed.
It’s not.
In addition, the business owner in question is not an affiliated company of a company related to winnings from North Korea.
Now, let me explain how ignorant Yoon Seok-yeol is.
The Korean government, public institutions, and financial institutions must pass the National Intelligence Service security review when building a network system. After the system is established, a National Intelligence Service employee visits and verifies this in person. And once every 1-2 years, National Intelligence Service employees make an unannounced visit to check the organization’s network security and vulnerabilities, which are then reflected in the organization’s management evaluation score.
Yoon Seok-yeol and the 2nd party’s argument
1. The National Election Commission’s network system was vulnerable to hacking, so North Korea intervened in the election.
2. The company that maintains the National Election Commission’s computer staff and system also found no traces of infiltration.
3. As a result, National Intelligence Service employees inspected the system to find vulnerabilities and infiltration routes, but were unable to find them.
4. After the National Intelligence Service employees reported to the Director of the National Intelligence Service that there was no problem with the National Election Commission system, the Director of the National Intelligence Service reported to Seok-yeol Yoon that there was no problem.
5. Yoon Seok-yeol did not believe this and insisted on it for two years. What’s even funnier is that Ji chose the head of the National Intelligence Service and didn’t believe the head of the National Intelligence Service for two years.
6. 2Jeokdeul widely spread false information on YouTube that the National Election Commission system was hacked. Among the people who claim to have hacked, there are absolutely no logs of hacking, let alone successful hacking demonstrations.
7. Yoon Seok-yeol believes in this again. No matter how much the head of the National Intelligence Service tries to dissuade me by saying there was no hacking, I will never believe it.
8. The reason why counterintelligence soldiers went to the National Election Commission and took pictures of the server on the day martial law came into effect was because they knew that it had not been hacked. If you were sure that it would be hacked, instead of coming to the National Election Commission and taking pictures, you would have successfully infiltrated from a remote location in advance and taken all the logs.
Therefore, Yoon Seok-yeol did not believe the words of the head of the National Intelligence Service, who was appointed by Ji, and did such a bad thing.
Even now, among the three people spreading rumors about the National Election Commission hacking, the ignorant ones who can’t even attempt hacking, let alone demonstrate hacking, are insisting that they have been hacked.
Why do I know this?
I know this because at my previous company, the team next to me built and operated the National Election Commission system, and I was in charge of network separation for a small organization.