{"id":38248,"date":"2020-11-17T15:09:37","date_gmt":"2020-11-17T15:09:37","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31766\/After-Trump-Tweets-Defcon-Hacking-Video-Voting-Security-Experts-Call-BS.html"},"modified":"2020-11-17T15:09:37","modified_gmt":"2020-11-17T15:09:37","slug":"after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/","title":{"rendered":"After Trump Tweets Defcon Hacking Video, Voting Security Experts Call BS"},"content":{"rendered":"<figure class=\"intro-image intro-left\"><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/11\/voting-machines-800x534.jpg\" alt=\"After Trump tweets Defcon hacking video, voting security experts call BS\"><figcaption class=\"caption\">\n<div class=\"caption-credit\">Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"><a title=\"112 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/tech-policy\/2020\/11\/voting-security-experts-refute-trump-claims-of-voting-machine-hacking\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">179<\/span> <span class=\"visually-hidden\"> with 112 posters participating<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p><!-- cache hit 1:single\/related:19a4da358e417e53972dbff1dcd41222 --><!-- empty --><\/p>\n<p>As President Trump continues to make unfounded claims of widespread election fraud, 59 of the world\u2019s foremost experts on electronic voting are hitting back, saying that recent allegations of actual voting machine hacking \u201chave been unsubstantiated or are technically incoherent.\u201d<\/p>\n<p>Monday\u2019s letter came after almost two weeks of baseless and unfounded claims from Trump and some of his supporters that this month\u2019s presidential election had been \u201crigged\u201d in favor of President-elect Joe Biden. On Thursday, Trump started a new round of disinformation when he took to Twitter to say that polling machines made by Dominion Voting deleted 2.7 million Trump votes around the country.<\/p>\n<h2>Vulnerabilities aren\u2019t exploits<\/h2>\n<p>Over the weekend, Trump tweeted a video from last year\u2019s Defcon hacker convention. It showed attendees participating in an event called the <a href=\"https:\/\/defcon.org\/html\/defcon-27\/dc-27-villages.html#voting\">voting machine hacking village<\/a>. Organizers of the event held it to raise awareness about the importance of security in electronic voting. Some of the event organizers were beside themselves that Trump was using the video as innuendo that voting machine hacking played a role in the results of this month\u2019s election, or in any election ever, for that matter.<\/p>\n<p>\u201cAnyone asserting that a US election was \u2018rigged\u2019 is making an <em>extraordinary<\/em> claim, one that must be supported by persuasive and verifiable evidence,\u201d the computer scientists <a href=\"https:\/\/josephhall.org\/papers\/Experts-Statement-on-the-US-2020-General-Election-16NOV2020-1057.pdf\">wrote<\/a>. \u201cMerely citing the existence of technical flaws does not establish that an attack occurred, much less that it altered an election outcome. It is simply speculation.\u201d<\/p>\n<p>The letter continued:<\/p>\n<blockquote>\n<p>The presence of security weaknesses in election infrastructure does not by itself tell us that any election has actually been compromised. Technical, physical, and procedural safeguards complicate the task of maliciously exploiting election systems, as does monitoring of likely adversaries by law enforcement and the intelligence community. Altering an election outcome involves more than simply the existence of a technical vulnerability.<\/p>\n<p>We are aware of alarming assertions being made that the 2020 election was \u201crigged\u201d by exploiting technical vulnerabilities. However, in every case of which we are aware, these claims either have been unsubstantiated or are technically incoherent. To our collective knowledge, no credible evidence has been put forth that supports a conclusion that the 2020 election outcome in any state has been altered through technical compromise.<\/p>\n<\/blockquote>\n<p>Monday\u2019s letter follows the issuance of another strongly worded statement on Thursday by the Election Infrastructure Government Coordinating Council, which includes officials from the Department of Homeland Security\u2019s Cybersecurity &amp; Infrastructure Security Agency, the US Election Assistance Commission, and secretaries of state and state election directors from various states.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>\u201cThe November 3rd election was the most secure in American history,\u201d the joint statement read. \u201cRight now, across the country, election officials are reviewing and double checking the entire election process prior to finalizing the result.\u201d<\/p>\n<p>The statement went on to say: \u201cWhile we know there are many unfounded claims and opportunities for misinformation about the process of our elections, we can assure you we have the utmost confidence in the security and integrity of our elections, and you should too.\u201d<\/p>\n<p>Earlier that day, <a href=\"https:\/\/www.reuters.com\/article\/us-usa-cyber-officials-exclusive\/exclusive-senior-u-s-cybersecurity-official-tells-associates-he-expects-to-be-fired-sources-idUSKBN27S2YI\">Reuters reported<\/a> that Cybersecurity and Infrastructure Security Agency Director Christopher Krebs was telling associates he expected to be fired. Citing unnamed people familiar with the matter, the news outlet said that Krebs \u201cdrew the ire of the Trump White House over efforts to debunk disinformation\u201d related to the recent elections.<\/p>\n<p>Monday\u2019s letter shows that computer scientists are also now working to debunk conspiracy theories claiming widespread voter fraud. Those signing the document include Matt Blaze, a computer science professor at Georgetown University; Ronald Rivest, a professor at the Massachusetts Institute of Technology and the R in RSA; Steven M. Bellovin, a computer science professor at Columbia University; Joseph Lorenzo Hall, senior VP at the nonprofit Internet Society; and J. Alex Halderman, a University of Michigan professor of computer science and engineering who specializes in election security.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31766\/After-Trump-Tweets-Defcon-Hacking-Video-Voting-Security-Experts-Call-BS.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38249,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9049],"class_list":["post-38248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusafraudconference"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>After Trump Tweets Defcon Hacking Video, Voting Security Experts Call BS 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"After Trump Tweets Defcon Hacking Video, Voting Security Experts Call BS 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-17T15:09:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"After Trump Tweets Defcon Hacking Video, Voting Security Experts Call BS\",\"datePublished\":\"2020-11-17T15:09:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/\"},\"wordCount\":670,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs.jpg\",\"keywords\":[\"headline,hacker,government,usa,fraud,conference\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/\",\"name\":\"After Trump Tweets Defcon Hacking Video, Voting Security Experts Call BS 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs.jpg\",\"datePublished\":\"2020-11-17T15:09:37+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs.jpg\",\"width\":\"800\",\"height\":\"534\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,fraud,conference\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentusafraudconference\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"After Trump Tweets Defcon Hacking Video, Voting Security Experts Call BS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"After Trump Tweets Defcon Hacking Video, Voting Security Experts Call BS 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/","og_locale":"en_US","og_type":"article","og_title":"After Trump Tweets Defcon Hacking Video, Voting Security Experts Call BS 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-11-17T15:09:37+00:00","og_image":[{"width":800,"height":534,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"After Trump Tweets Defcon Hacking Video, Voting Security Experts Call BS","datePublished":"2020-11-17T15:09:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/"},"wordCount":670,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs.jpg","keywords":["headline,hacker,government,usa,fraud,conference"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/","url":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/","name":"After Trump Tweets Defcon Hacking Video, Voting Security Experts Call BS 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs.jpg","datePublished":"2020-11-17T15:09:37+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs.jpg","width":"800","height":"534"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/after-trump-tweets-defcon-hacking-video-voting-security-experts-call-bs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,fraud,conference","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusafraudconference\/"},{"@type":"ListItem","position":3,"name":"After Trump Tweets Defcon Hacking Video, Voting Security Experts Call BS"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38248"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38248\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38249"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}