Electronic Vulnerability

GMO Danger: CALEA II (Government Modified Operating system)

Last week a group of computer security experts issued a warning about a proposed expansion of government spying know as CALEA II (Communications Assistance For Law Enforcement Assistance) being considered for “wire” tap expansion.

The report if anything understates the risks. Further, if you believe that, in general, government can be incompetent, that makes this plan even less effective and more risky.

Testimony against six bills and for one

All of these bills are well intended. In fact, I would support most of the concepts, yet in only a single case could I support one of these bills , based on huge gaps between the good intent and the actual details present and missing in those bills.

What We Worry? What Could Go Wrong On Election Day?

America’s elections are run entirely on the honor system. What could possibly go wrong?

Caltech/MIT: What has changed, what hasn’t, & what needs improvement

The Caltech/MIT Voting Technology Project has released a thorough, comprehensive, and insightful new report timed to the 2012 election. We find little to quibble with in the report. We agree with all of its recommendations.Several items with which we fully endorse were covered in this report which sometimes are missing from the discussion or often underemphasised.

The report itself is 52 pages, followed by 32 pages of opinions of others, including election officials, advocates, and vendors, some of whom disagree with some aspects of the report. Every page is worth reading. The report is not technical. It covers a wide range of issues, background, and recommendations.

CTVotersCount flip flops from “Trust but Verify” to “Verify to Trust”

There is absolutely no need to “trust” anyone if there is sufficient verification. There is also little evidence to trust our democracy to anyone. As they say power corrupts.

Now we learn that many of our votes are being counted by machines under the influence of one of the candidates and his family.

Big Bird and Charlie Rose know what the CT Legislature does not!

See Charlie Rose interview Dr. Barbara Simons, co-auther of Broken Ballots. <view>

Big Bird and Charlie Rose now know that Internet voting, email voting, Virgina elections, and inadequately audited elections – do not merit our trust.

What can the F.D.A. teach us about Officials, Internet voting, and Computer voting?

Vast, easy spying capabilities. No technical expertise required. The possibilities are endless. Votes, voters, spouses, lawyers, business opponents, employees, bosses, officials, candidates, campaigns, investigators, and auditors can be monitored by practically anyone. Will the perpetrators be brought to justice?

UConn paper warns of limitations of cryptography

Use of good tools must go hand-in-hand with good use of tools

Newspapers join CTVotersCount, ACLU, and CBIA in objections to H.B. 5556

CTVotersCount opposes H.B. 5556 and has urged Governor Malloy to veto the bill because it contains a provision for risky, unconstitutional email and fax voting.

Could It Happen Here? Too wide to scan, would we count or copy?

Brad Blog reports ballots too wide to scan in Wisconsin. The official solution – count by hand? NO. They copied the ballots and scanned. We agree with Brad that this is unacceptable. But what would happen in Connecticut – would one of our warnings come true?

Page 10 of 24« First...89101112...20...Last »