Saturday
FrontPage - Diebold-CD Wiki "The only possible motive I can see for disabling some of the security mechanisms and features in their system is to be able to rig elections."
Salon.com News | Osama University? On Oct. 21, the House of Representatives unanimously passed a bill that could require university international studies departments to show more support for American foreign policy or risk their federal funding.
The Yale Herald - Nov 7, 2003 - Jerry's phat ('cause of all the ice cream): "He is currently embarking on the Pants on Fire campaign in which, to highlight what he claims are the lies President George W. Bush, DC '68, has told the country, he drags a 12-foot statue of Bush with flaming pants behind his motorcycle on various trails around the country."
Thursday
POLITICS-U.S.: Feith is the Answer "(V)irtually everything that has gone wrong in Iraq -- especially those matters that Congress is either investigating or is poised to probe -- is linked directly to his office. ''All roads lead to Feith,'' noted one knowledgeable administration official this week."
Tuesday
A PDF of the original report finding fault with electronic voting machines. Abstract:
Recent election problems have sparked great interest in managing the election process through the
use of electronic voting systems. While computer scientists, for the most part, have been warning of
the perils of such action, vendors have forged ahead with their products, claiming increased security and
reliability. Many municipalities have adopted electronic systems, and the number of deployed systems is
rising. For these new computerized voting systems, neither source code nor the results of any third-party
certification analyses have been available for the general population to study, because vendors claim that
secrecy is a necessary requirement to keep their systems secure. Recently, however, the source code
purporting to be the software for a voting system from a major manufacturer appeared on the Internet.
This manufacturer’s systems were used in Georgia’s state-wide elections in 2002, and the company just
announced that the state of Maryland awarded them an order valued at up to $55.6 million to deliver
touch screen voting systems.1
This unique opportunity for independent scientific analysis of voting system source code demonstrates
the fallacy of the closed-source argument for such a critical system. Our analysis shows that
this voting system is far below even the most minimal security standards applicable in other contexts.
We highlight several issues including unauthorized privilege escalation, incorrect use of cryptography,
vulnerabilities to network threats, and poor software development processes. For example, common voters,
without any insider privileges, can cast unlimited votes without being detected by any mechanisms
within the voting terminal. Furthermore, we show that even the most serious of our outsider attacks
could have been discovered without the source code. In the face of such attacks, the usual worries about
insider threats are not the only concerns; outsiders can do the damage. That said, we demonstrate that
the insider threat is also quite considerable. We conclude that, as a society, we must carefully consider
the risks inherent in electronic voting, as it places our very democracy at risk.
Recent election problems have sparked great interest in managing the election process through the
use of electronic voting systems. While computer scientists, for the most part, have been warning of
the perils of such action, vendors have forged ahead with their products, claiming increased security and
reliability. Many municipalities have adopted electronic systems, and the number of deployed systems is
rising. For these new computerized voting systems, neither source code nor the results of any third-party
certification analyses have been available for the general population to study, because vendors claim that
secrecy is a necessary requirement to keep their systems secure. Recently, however, the source code
purporting to be the software for a voting system from a major manufacturer appeared on the Internet.
This manufacturer’s systems were used in Georgia’s state-wide elections in 2002, and the company just
announced that the state of Maryland awarded them an order valued at up to $55.6 million to deliver
touch screen voting systems.1
This unique opportunity for independent scientific analysis of voting system source code demonstrates
the fallacy of the closed-source argument for such a critical system. Our analysis shows that
this voting system is far below even the most minimal security standards applicable in other contexts.
We highlight several issues including unauthorized privilege escalation, incorrect use of cryptography,
vulnerabilities to network threats, and poor software development processes. For example, common voters,
without any insider privileges, can cast unlimited votes without being detected by any mechanisms
within the voting terminal. Furthermore, we show that even the most serious of our outsider attacks
could have been discovered without the source code. In the face of such attacks, the usual worries about
insider threats are not the only concerns; outsiders can do the damage. That said, we demonstrate that
the insider threat is also quite considerable. We conclude that, as a society, we must carefully consider
the risks inherent in electronic voting, as it places our very democracy at risk.
: What Diebold doesn't want you to know about their voting machines: they subtract votes. "I have been waiting for someone to give me an explanation as to why Precinct 216 gave Al Gore a minus 16022 [votes] when it was uploaded."
Apparently Blogger dot com doesn't want you to know either as they won't allow the link to be published.
Apparently Blogger dot com doesn't want you to know either as they won't allow the link to be published.
Subscribe to:
Posts (Atom)