Create an Account
username: password:
 
  MemeStreams Logo

MemeStreams Discussion

search


This page contains all of the posts and discussion on MemeStreams referencing the following web page: Daily Kos: Nonpartisan GAO Confirms Security Flaws in Voting Machines. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.

Daily Kos: Nonpartisan GAO Confirms Security Flaws in Voting Machines
by Rattle at 9:37 pm EST, Nov 1, 2005

1 Some electronic voting systems did not encrypt cast ballots or system audit logs, thus making it possible to alter them without detection.

2 It is easy to alter a file defining how a ballot appears, making it possible for someone to vote for one candidate and actually be recorded as voting for an entirely different candidate.

3 Falsifying election results without leaving any evidence of such an action by using altered memory cards.

4 Access to the voting network was easily compromised because not all digital recording electronic voting systems (DREs) had supervisory functions password-protected, so access to one machine provided access to the whole network.

5 Supervisory across to the voting network was also compromised by repeated use of the same user IDs combined with easily guessed passwords.

6 The locks protecting access to the system were easily picked and keys were simple to copy.

7 One DRE model was shown to have been networked in such a rudimentary fashion that a power failure on one machine would cause the entire network to fail.

8 GAO identified further problems with the security protocols and background screening practices for vendor personnel.

Voting machine security should truly be a non-partisan issue, yet it's only the democrats I ever see making an issue of it. That's truly disturbing. Will this start to become a wider issue now that the GAO is calling out the problems as well?


 
RE: Daily Kos: Nonpartisan GAO Confirms Security Flaws in Voting Machines
by Mike the Usurper at 12:36 pm EST, Nov 2, 2005

Rattle wrote:

1 Some electronic voting systems did not encrypt cast ballots or system audit logs, thus making it possible to alter them without detection.

2 It is easy to alter a file defining how a ballot appears, making it possible for someone to vote for one candidate and actually be recorded as voting for an entirely different candidate.

3 Falsifying election results without leaving any evidence of such an action by using altered memory cards.

4 Access to the voting network was easily compromised because not all digital recording electronic voting systems (DREs) had supervisory functions password-protected, so access to one machine provided access to the whole network.

5 Supervisory across to the voting network was also compromised by repeated use of the same user IDs combined with easily guessed passwords.

6 The locks protecting access to the system were easily picked and keys were simple to copy.

7 One DRE model was shown to have been networked in such a rudimentary fashion that a power failure on one machine would cause the entire network to fail.

8 GAO identified further problems with the security protocols and background screening practices for vendor personnel.

Voting machine security should truly be a non-partisan issue, yet it's only the democrats I ever see making an issue of it. That's truly disturbing. Will this start to become a wider issue now that the GAO is calling out the problems as well?

This has only been an issue for Democrats because in a number of cases the Republicans have been working to disenfranchise Americans. They don't WANT people to vote. Jim Crow is alive and well and he's a card carrying Republican.
And since a couple of people have been dubious of statements like that, try looking here and at the new Georgia photo ID requirement. It is not that they don't care, they're actively doing it.


Daily Kos: Nonpartisan GAO Confirms Security Flaws in Voting Machines
by logickal at 10:56 am EST, Nov 1, 2005

1 Some electronic voting systems did not encrypt cast ballots or system audit logs, thus making it possible to alter them without detection.

2 It is easy to alter a file defining how a ballot appears, making it possible for someone to vote for one candidate and actually be recorded as voting for an entirely different candidate.

3 Falsifying election results without leaving any evidence of such an action by using altered memory cards.

4 Access to the voting network was easily compromised because not all digital recording electronic voting systems (DREs) had supervisory functions password-protected, so access to one machine provided access to the whole network.

5 Supervisory across to the voting network was also compromised by repeated use of the same user IDs combined with easily guessed passwords.

6 The locks protecting access to the system were easily picked and keys were simple to copy.

7 One DRE model was shown to have been networked in such a rudimentary fashion that a power failure on one machine would cause the entire network to fail.

8 GAO identified further problems with the security protocols and background screening practices for vendor personnel.

Overshadowed by indictments and nominations, the GAO unveils an interesting report...


Daily Kos: Nonpartisan GAO Confirms Security Flaws in Voting Machines
by Acidus at 12:04 pm EST, Nov 1, 2005

1 Some electronic voting systems did not encrypt cast ballots or system audit logs, thus making it possible to alter them without detection.

2 It is easy to alter a file defining how a ballot appears, making it possible for someone to vote for one candidate and actually be recorded as voting for an entirely different candidate.

3 Falsifying election results without leaving any evidence of such an action by using altered memory cards.

4 Access to the voting network was easily compromised because not all digital recording electronic voting systems (DREs) had supervisory functions password-protected, so access to one machine provided access to the whole network.

5 Supervisory across to the voting network was also compromised by repeated use of the same user IDs combined with easily guessed passwords.

6 The locks protecting access to the system were easily picked and keys were simple to copy.

7 One DRE model was shown to have been networked in such a rudimentary fashion that a power failure on one machine would cause the entire network to fail.

8 GAO identified further problems with the security protocols and background screening practices for vendor personnel.

Holy shit!


There are redundant posts not displayed in this view from the following users: k, skullaria.
 
 
Powered By Industrial Memetics