[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Sign-in] [Mail] [Setup] [Help]
Status: Not Logged In; Sign In
(s)Elections See other (s)Elections Articles Title: Princeton University Reveals How the GOP Steals Election January 12, 2008 Princeton University Reveals How the GOP Steals Election By Len Hart Unless something is done, the GOP will steal the next election as well. Unless something is done, this series of primaries means absolutely nothing. The fix is undoubtedly in. Unless something is done, the GOP will walk away with another stolen election, another GOP nincompoop will foist upon the nation his personal and vainglorious ambitions of empire. The Military/Industrial complex is licking its chops and theocrats are lining up to play Torquemada. Princeton tested an AccuVote-TS which it obtained from a private party. The experiements were designed to determine whether the machine could be hacked under "real election practices", realistic scenarios in the real world. Princeton found the machine vulnerable to a number of "extremely serious attacks" that "undermine undermine the accuracy and credibility of the vote counts it produces." In other words, DieBold machines can be hacked and most have been. Princeton points out that computer specialists are skeptical of Direct Recording Machines (DRE), essentially general purpose machines running specialized election software. The biggest flaw, according to Princeton, is that DREs are dependent upon the "correct and secure operation of complex software programs" In the real word, that simply does not happen. Ominously, DRE failures most likely go undetected. ... Abstract This paper presents a fully independent security study of a Diebold AccuVote-TS voting machine, including its hardware and software. We obtained the machine from a private party. Analysis of the machine, in light of real election procedures, shows that it is vulnerable to extremely serious attacks. For example, an attacker who gets physical access to a machine or its removable memory card for as little as one minute could install malicious code; malicious code on a machine could steal votes undetectably, modifying all records, logs, and counters to be consistent with the fraudulent vote count it creates. An attacker could also create malicious code that spreads automatically and silently from machine to machine during normal election activities - a voting-machine virus. We have constructed working demonstrations of these attacks in our lab. Mitigating these threats will require changes to the voting machine's hardware and software and the adoption of more rigorous election procedures. --Ariel J. Feldman, J. Alex Halderman, and Edward W. Felten,Security Analysis of the Diebold AccuVote-TS Voting Machine Here are the exit poll results at 8:01 PM when the polls closed and here is a chart with the final tabulation. With voting over in New Hampshire, the big network exit poll is out and according to Fox News it shows: Democratic candidates: Obama 39% Republican candidates: McCain 35% Both races are too close to call - and it looks like both Obama and McCain have only a slim lead based on these polls. --Guardian Unlimited, Exit polls: Obama and McCain ahead Authors Website: http://existentialistcowboy.blogspot.com/ Poster Comment: How to Rig an Election: Disgraced Ex-GOP Consultant Allen Raymond Reveals His Dirty Tricks as Party's 'Fall Guy' Post Comment Private Reply Ignore Thread
|
||
[Home]
[Headlines]
[Latest Articles]
[Latest Comments]
[Post]
[Sign-in]
[Mail]
[Setup]
[Help]
|