Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Emergency warning to poll workers from cyber scientists on election day

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Topic Forums » Election Reform Donate to DU
 
Amaryllis Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-07-05 10:33 PM
Original message
Emergency warning to poll workers from cyber scientists on election day
America's Leading Computer Scientists & Cyber Security Experts Issue Emergency Warning to Poll Workers and Americans on Election Day
http://www.opednews.com/articles/genera_press_re_051107_america_s_leading_co.htm

America's Leading Computer Scientists & Cyber Security Experts Issue Emergency Warning to Poll Workers and Americans on

by press release

http://www.opednews.com

The Just Issued Bi-Partisan GAO and Carter-Baker Reports are Correct: Electronic Voting Machines Are Poorly Designed, not Secure and easily Hacked. Your Vote May NOT Be Counted!

Four of America’s Leading Academic Experts in Computer Science and Voting machines offer the following pre-emptive emergency advice.

Background: On October 21, 2005 The Non-Partisan General Accounting Office (GAO) of The United States government issued a strongly worded indictment against electronic voting machines used in the 2004 elections, the same ones that will be used tomorrow in elections in California and around the country.

After an exhaustive study the report states:

“Until these efforts are completed, there is a risk that many state and local jurisdictions will rely on voting systems that were not developed, acquired, tested, operated, or managed in accordance with rigorous security and reliability standards – potentially affecting the reliability of future elections and voter confidence in the accuracy of the vote count.”

http://www.gao.gov/highlights/d05956high.pdf

And, on ____, The Carter-Baker Commission on Federal Election Reform, a bi-partisan effort chaired by President Jimmy Carter and former Secretary of Sate, James Baker, issued its report which similarly found that . . .

“The greater threat to most systems comes not from external hackers but from insiders who have direct access to the machines. Software can be modified maliciously before being installed into individual voting machines. There is no reason to trust insiders in the election industry any more than in other industries such as gambling, where sophisticated insider fraud has occurred despite extraordinary measures to prevent it.”

www.carterbaker.com

EMERGENCY PRESCRIPTIONS FOR A SAFER ELECTION

Dr. Hugh Thompson, Florida Institute of Technology

Direct Cell: 321-795-4531

And, c/o Tom Bain or Davida Dinerman at Schwartz communications
781-684-0770

“1. Tabulators are EASILY hacked, both before and during the election. Votes can be changed in as little as 60 seconds if someone has access to the machine. Therefore NO ONE, OTHER THAN THE POLL WORKERS, SHOULD BE ALLOWED INTO THE ROOM WHERE THE TABULATOR IS LOCATED.

2. PHYSICALLY AND SECURELY TRANSPORT THE DATA from where the votes are cast to where they are counted rather than using a modem. Memory cards should be treated with the same security as a box of ballots or a Brink's truckload of money. (Unlike transporting money there is NO WAY to know the content of the Memory Cards as they leave the polling stations, nor does the person receiving the data know what to expect so any tampering on the way can not , in any way, be detected.).”

Dr. Avi Rubin John Hopkins University

Office Phone 410 516 8177

Cell Phone: 443 527 4564

[email protected]

“Because of the myriad problems possible at every stage of the electronic voting process and the possibility that the software in the tabulator might be faulty or even rigged, it is a good idea to reconcile the precinct counts by hand to check that the numbers that come out of the tabulator, at the end of the process, match the actual precinct totals.



Dr. David Dill, Stanford University

Phone: 650 743 6139

“Law in California and many other states requires that a minimum of 1% of precincts be audited and that more may be. Verification is critical and it is highly recommended that the 1% + audit is conducted on ALL system, including votes by mail.”

Steven Spoonamore, President, Cybrinth, Inc.

Phone: 646 351 2255

“1. Voting Tabulators are where the primary hacks are happening, especially in counties where the Republican is already expected to win.

2. Incidence of hacks increases with the level of GOP partisanship and how much control that partisan GOP has over the voting. Also a high correlation with prominent Christian Right anti-abortion operatives.

3. Watch the suspect counties carefully. Usually they start counting and have some strange malfunction (Power outage, "Humidity Malfunction", Computer Error, Terrorist Threat ect.) They often times need to have a technician "reset" the machines, and whether it is done by a technician or remotely, they need some reason so the tabulator with the force balancer can finish counting much later than other counties, you have big cause to worry. The total number of which is known, then "breaks" in favor of the GOP. ‘Force Balancers’ need to know the total number of votes they have force BEFORE they begin forcing. And only the last county, or couple of counties doing that can do that as they have to know starting ratios and intended finishing ratios.

4. If the Democrat leads across the state, and then suddenly the last counties have huge returns in favor of the Republican, those hard drives should be obtained and searched. Even if they install and erase the code it will still be there until a deep wipe is done.”



Bios:

Dr. Herbert (Hugh) Thompson is Chief Security Strategist at Security Innovation ( www.securityinnovation.com) and is a word-renowned expert on application
security. He has co-authored four books on software security including,
"How to Break Software Security: Effective Techniques for Security Testing"
(Addison Weslwy) and most recently, "The Software Vulnerability Guide"
(Charles River). Herbert is the principal investigator on several US
Government research grants and has been interviewed by top news
organizations including CNN, BusinessWeek, Forbes, Associated Press and
Washington Post. He has delivered award-winning presentations and keynotes
on software security throughout the United States, Europe, and Asia, at
conferences such as STAR, Quality Week, RSA, Gartner, and COMPSEC.



Dr. Thompson has over 60 academic and industrial publications on software security and
frequently writes for industry magazines including CIO Update, Dr. Dobbs
Journal, IEEE Security & Privacy, Journal of Information and Software
Technology, ACM Queue, and Better Software Magazine. Dr. Thompson's primary
responsibilities with Security Innovation include the overall security &
research efforts on all areas of software security. He is also responsible
for training developers and security testers at some of the world's largest
software companies including Microsoft, HP, IBM, Cisco, Symantec and SAIC.
In 2005, Dr. Thompson was chosen a Microsoft Most Valuable Professional in
the field of Development Security. Dr. Thompson earned his PhD in Applied
Mathematics from Florida Institute of Technology, where he remains an
adjunct professor.



Dr. Avi D. Rubin is Professor of Computer Science and Technical
Director of the Information Security Institute at Johns Hopkins
University. Professor Rubin directs the NSF-funded ACCURATE center
for correct, usable, reliable, auditable and transparent elections.
Prior to joining Johns Hopkins, Rubin was a research scientist at
AT&T Labs. He is also a co-founder of Independent Security Evaluators
(securityevaluators.com), a security consulting firm. Rubin is
author of several books including Brave New Ballot (Random House,
2006) Firewalls and Internet Security, second edition (with Bill
Cheswick and Steve Bellovin, Addison Wesley, 2003), White-Hat
Security Arsenal (Addison Wesley, 2001), and Web Security Sourcebook
(with Dan Geer and Marcus Ranum, John Wiley & Sons, 1997). He is
Associate Editor of IEEE Transactions on Software Engineering,
Associate Editor of ACM Transactions on Internet Technology,
Associate Editor of IEEE Security & Privacy, and an Advisory Board
member of Springer's Information Security and Cryptography Book
Series. Rubin serves on the DARPA Information Science and Technology
Study Group. In January, 2004 Baltimore Magazine name Rubin a
Baltimorean of the Year for his work in safeguarding the integrity of
our election process, and he is also the recipient of the 2004
Electronic Frontiers Foundation Pioneer Award. Rubin has a B.S,
('89), M.S.E ('91), and Ph.D. ('94) from the University of Michigan.
Printer Friendly | Permalink |  | Top
Wilms Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-08-05 04:17 AM
Response to Original message
1. kick n/t
Printer Friendly | Permalink |  | Top
 
IndyOp Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-08-05 08:52 AM
Response to Original message
2. Kick...
:cry:

sorry, but my head and heart agree - it is already over. Schwarzenegger will get his 'upset' victory; Ohio voting reform issues will fail.
Printer Friendly | Permalink |  | Top
 
Melissa G Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-08-05 09:26 AM
Response to Original message
3. k-n-r !
Printer Friendly | Permalink |  | Top
 
nashville_brook Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-08-05 11:49 AM
Response to Original message
4. here we go again. k-n-r
random thought -- election fraud is like any fraud. you're either hip to it and willing to remove it. or you're not.

i'm finally starting to understand this.
Printer Friendly | Permalink |  | Top
 
CrispyQ Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-08-05 12:17 PM
Response to Original message
5. hmmmm

Watch the suspect counties carefully. Usually they start counting and have some strange malfunction (Power outage, "Humidity Malfunction", Computer Error, Terrorist Threat ect.) They often times need to have a technician "reset" the machines, and whether it is done by a technician or remotely, they need some reason so the tabulator with the force balancer can finish counting much later than other counties, you have big cause to worry.


We need to make people aware that these types of 'malfunctions' do not happen with Diebold's ATM machines, only with the machines that tabulate our votes.

Election fraud should be the leading story in all newspapers & newcasts. If we ever regain our country, the first thing we should do is put all the news corporation CEOs up on charges along with the boosh administration. Shameful, absolutely shameful!

:banghead:
Printer Friendly | Permalink |  | Top
 
roseBudd Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-08-05 09:10 PM
Response to Reply #5
9. Suspect counties in Ohio were never Diebold, they were either ES&S
punchcard, Triad punchcard, ES&S optiscan or Shoop Votetronic.

By constantly invoking Diebold, we do ourselves a disservice. ANY computer tabulated voting can be fraudulent. The assumption is that punch cards and optiscans leave a paper trail, therefore fraud won't be attempted. However the chances of a hand recount are so small as to be nonesxistent as a deterrent.
Printer Friendly | Permalink |  | Top
 
renate Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-08-05 12:58 PM
Response to Original message
6. I wonder... if the elections look fishy in an off-year
could this be an opportunity for the MSM to have an exciting story to follow without having to examine whether Blinky is the legitimately elected POTUS?

I mean, I can see reporters not wanting to touch THAT can o' worms with a million-foot-pole--but especially now that the administration and the Republican party are on the ropes, wouldn't a story on vote tampering make a nice little Pulitzer-winning investigative report?

(Yes, I am a wild-eyed optimist. But a year ago, would any of us have imagined *'s approval rating being 37%? Good things DO happen.)
Printer Friendly | Permalink |  | Top
 
farmbo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-08-05 01:31 PM
Response to Original message
7. Yikes! This describes Warren County Ohio (November 2nd 2004) to a tee...
3. Watch the suspect counties carefully. Usually they start counting and have some strange malfunction (Power outage, "Humidity Malfunction", Computer Error, Terrorist Threat ect.) They often times need to have a technician "reset" the machines, and whether it is done by a technician or remotely, they need some reason so the tabulator with the force balancer can finish counting much later than other counties, you have big cause to worry. The total number of which is known, then "breaks" in favor of the GOP. ‘Force Balancers’ need to know the total number of votes they have force BEFORE they begin forcing. And only the last county, or couple of counties doing that can do that as they have to know starting ratios and intended finishing ratios.
Printer Friendly | Permalink |  | Top
 
Land Shark Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-08-05 02:30 PM
Response to Original message
8. Op-ed link didn't work for me, is this all new information?
Printer Friendly | Permalink |  | Top
 
Bill Bored Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Nov-09-05 12:53 AM
Response to Original message
10. Spoonamore???
Edited on Wed Nov-09-05 01:13 AM by Bill Bored
This guy bothers me a little:

Steven Spoonamore, President, Cybrinth, Inc.
First of all, his name is Stephen -- not Steven.
He is the CEO of Cybrinth
http://cybrinth.com/wst_page9.html
but he says these things are happening so matter-of-factly. Where is his evidence? Sure it's possible but how does HE know "Tabulators are where the primary hacks are happening, especially in counties where the Republican is already expected to win", and if he's so sure, why has this not been I N V E S T I G A T E D ???

Also, tabulator hacks are the easiest to detect by simply doing a precinct canvass. He only says to forensically look at the tabulator hard drives. But the original votes are on the precinct machines, so why not also re-canvass them?

Far be it from me to say nay, but if this guy expects to be taken seriously, he should drop the partisan stuff, Democratic as it sounds, and stick to the facts. He's probably a DUer or something and although he may have good intentions, he needs to stop talking as if he's witnessed these hacks first hand, which would probably be a crime in itself if not reported!

Is it possible that this is misdirection? I.e., look for the theft in Republican strongholds, at the tabulators, after the election, while it's done somewhere else, like in Democratic strongholds by switching votes to Republicans on the precinct machines set up that way before the election???

Anyone know this Spoonamore fellow, or am I just a bit paranoid? He's not the guy from that Jeff Fisher story is he?

And what ever happened to Jeff?
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue May 14th 2024, 05:02 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Topic Forums » Election Reform Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC