Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

9/30 Threat of Internet Voting Looms, Siegleman fraud case claims another victim, Twittering

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
Home » Discuss » Topic Forums » Election Reform Donate to DU
 
WillYourVoteBCounted Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-30-09 07:52 PM
Original message
9/30 Threat of Internet Voting Looms, Siegleman fraud case claims another victim, Twittering

Threat of Internet Voting Looms, Siegleman fraud case claims another victim, Twittering election officials

September 30, 2009

The threat of internet voting looms closer as the Defense Authorization bill (S1390), that allows for military email voting, is on the verge of passing from a conference committee. The dangerous idea of email/internet voting has spread to North Carolina: the popular NC paper, the Greensboro News and Record ran an OpEd that endorses having overseas military cast their ballots by email, over the internet. Insecure voting does not honor our troops one little bit. My blog on that is in this edition of news. Internet/email voting is a problem, not a solution. At this time, we should seek simple, cost-efficient and effective measures, not big expensive ineffective things like internet voting that carries multiple security risks with it. Then we can reassess the situation.

The Siegleman election fraud case claims another victim - whistle blower, Tamarah Grimes fired. The FEC is already making it easier for LLCs to influence elections.
Some less scary news: Bo Lipari is reporting on Day 2 of New York's voting machine exams.
Election issues and services are hitting twitter, Voting News, Verified Voting, Overseas Vote Foundation, even San Mateo County election office are tweeting. Check it out.

The news is short today because of the internet voting issue raised today in North Carolina. I'm in North Carolina and we now have a new issue to fight. Internet voting is also your problem because of the federal DOD bill which would serve as the trojan horse for internet voting nationwide. We'll catch up tomorrow on voting news. Meanwhile, Voting News is happy to publish your articles and blogs about e-voting when possible. Just send them to ncvoter (at) gmail.com. If we can use them we will. Thanks

CA. Tweet from smcvote: Election and voting news from the Office of Warren Slocum, Chief Elections Officer, San Mateo County, California: "We are currently performing functional testing of each piece of voting equipment for use in the Nov. election. It should take about 10 days"

GA. Siegleman Election Fraud Claims Another Victim
September 29, 2009 This is the case of election fraud in the reelection bid of Alabama Governor Don Seigelman. The 1st victims were the people of Alabama. Governor Seigelman was not reelected due to fraud in the election. The next victim was Don Seigelman..Most recently a whistle blower, Tamarah Grimes, sent Attorney General Eric Holder a letter detailing more misconduct in the case. Three days later Ms. Grimes was fired, becoming the latest victim..
http://www.ctvoterscount.org/?p=2422


NC North Carolina Internet Voting Whack-a-Mole,military vote by email not secure, not private
It is Internet Voting Whackamole Time - this time in North Carolina. The Greensboro News and Record is running an OpEd that endorses having overseas military cast their ballots by email, over the internet. Does anyone believe that if email/internet voting were allowed for overseas that it would not spread to the rest of our elections? Making military votes go over e-mail is unsafe in the first place.
http://ncvoters.blogspot.com/2009/09/north-carolina-internet-voting-whack.html

NY. Day 2 of NYS Voting Machine Tests
September 29 2009 The second day of New York State’s Voting Machine Certification testing again focused on completing ballot programming on the Election Management System (EMS) systems for the Dominion ImageCast and ES&S DS200/Automark. While one team member reads through the steps of the test plan on a spreadsheet, the other performs that step. ...By the end of the day, ballot programming was wrapping up. Ballot programs were installed on the machines, and sample ballots were printed to verify that they were accurate before the PDF files were sent out to the printer.
http://www.bolipari.com/boblog/2009/09/day-two-of-ny-voting-machine-tests/

NY. Military voters may be shut out in special election for N.Y.'s 23rd Congressional District
September 29, 2009. Gov. David Paterson’s decision to call for a special election Nov. 3 in the 23rd Congressional District will likely disenfranchise thousands of military voters deployed overseas, a former top U.S. Justice Department official said Tuesday.The short 35-day window before the election makes it impossible for overseas ballots to be printed, mailed and returned in time to be counted, said Hans A. von Spakovsky, who enforced the federal Voting Rights Act at the Justice Department.
http://www.syracuse.com/news/index.ssf/2009/09/military_voters_may_be_shut_ou.html


SC. South Carolina Green Party Files Strong Brief in 4th Circuit
September 29th, 2009. On September 28, the South Carolina Green Party filed this brief in the U.S. Court of Appeals, 4th circuit...Most states don’t permit fusion. And among the states that do permit it, none of the other fusion states have ever had a law like the South Carolina law at issue. http://www.ballot-access.org/2009/09/29/south-carolina-green-party-files-strong-brief-in-4th-circuit/

Defense Authorization bill (S1390) includes language to allow overseas military to cast voted ballots by email.
here's the Thomas link for the bill
http://thomas.loc.gov/cgi-bin/query/F?r111:1:./temp/~r111UtIb7T:e482155:

Congressional Bills on Puerto Rico, and Public Funding, Gain Co-Sponsors
September 29th, 2009
In the last nine days, bills in the U.S. House of Representatives to provide for public funding of congressional candidates, and to provide for a plebescite on the political future of Puerto Rico, have continued gaining co-sponsors
http://www.ballot-access.org/2009/09/29/congressional-bills-on-puerto-rico-and-public-funding-gain-co-sponsors/

FEC Opens a New Avenue for Weathy Donors
Sept 29. A decision by the Federal Election Commission on Monday makes it a whole lot easier for individuals to use LLCs to wage sophisticated political campaigns for or against candidates in next year’s midterm elections and beyond.
The decision is latest blow to the 2002 McCain-Feingold law and its attempts to reduce the influence of money in politics.
http://blogs.wsj.com/washwire/2009/09/29/fec-opens-a-new-avenue-for-weathy-donors/

Computer Technologists' statement on internet voting - Verified Voting
http://www.verifiedvoting.org/article.php?id=5867


Voting News by Joyce McCloy.
Archives here at http://votingnews.blogspot.com/
Subscribe to receive the Voting News by email by visiting this link:
http://feedburner.google.com/fb/a/mailverify?uri=VotingNews&loc=en_US
email comments, questions us at ncvoter (at) gmail.com
Refresh | +8 Recommendations Printer Friendly | Permalink | Reply | Top
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-30-09 08:09 PM
Response to Original message
1. Let's talk a bit. If voters were to register a PGP key with the state and submit their vote
encrypted with that key. Would that provide enough security?

Printer Friendly | Permalink | Reply | Top
 
WillYourVoteBCounted Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-30-09 08:23 PM
Response to Reply #1
2. when hackers can crack into govt systems and banks?
and on top of the security risk the voters lose the right to a secret ballot.

Computer scientists, internet security specialists say internet voting is not safe,
too much at stake and too tempting to hackers, too easy to spoof etc including creating a denial of service.
Printer Friendly | Permalink | Reply | Top
 
cliffordu Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-30-09 08:25 PM
Response to Reply #1
3. It might...I'd want to know everything about the server and the meatspace
security on that end.
Printer Friendly | Permalink | Reply | Top
 
wroberts189 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-30-09 10:33 PM
Response to Reply #1
4.  Computer Technologists’ Statement on Internet Voting..from the OP

Computer Technologists’ Statement on Internet Voting


Election results must be verifiably accurate -- that is, auditable with a permanent, voter-verified record that is independent of hardware or software. Several serious, potentially insurmountable, technical challenges must be met if elections conducted by transmitting votes over the internet are to be verifiable. There are also many less technical questions about internet voting, including whether voters have equal access to internet technology and whether ballot secrecy can be adequately preserved.

Internet voting should only be adopted after these technical challenges have been overcome, and after extensive and fully informed public discussion of the technical and non-technical issues has established that the people of the U.S. are comfortable embracing this radically new form of voting.

A partial list of technical challenges includes:

• The voting system as a whole must be verifiably accurate in spite of the fact that client systems can never be guaranteed to be free of malicious logic. Malicious software, firmware, or hardware could change, fabricate, or delete votes, deceive the user in myriad ways including modifying the ballot presentation, leak information about votes to enable voter coercion, prevent or discourage voting, or perform online electioneering. Existing methods to “lock-down” systems have often been flawed; even if perfect, there is no guaranteed method for preventing or detecting attacks by insiders such as the designers of the system.

• There must be a satisfactory way to prevent large-scale or selective disruption of vote transmission over the internet. Threats include “denial of service” attacks from networks of compromised computers (called “botnets”), causing messages to be mis-routed, and many other kinds of attacks, some of which are still being discovered. Such attacks could disrupt an entire election or selectively disenfranchise a segment of the voting population.

• There must be strong mechanisms to prevent undetected changes to votes, not only by outsiders but also by insiders such as equipment manufacturers, technicians, system administrators, and election officials who have legitimate access to election software and/or data.

• There must be reliable, unforgeable, unchangeable voter-verified records of votes that are at least as effective for auditing as paper ballots, without compromising ballot secrecy. Achieving such auditability with a secret ballot transmitted over the internet but without paper is an unsolved problem.

• The entire system must be reliable and verifiable even though internet-based attacks can be mounted by anyone, anywhere in the world. Potential attackers could include individual hackers, political parties, international criminal organizations, hostile foreign governments, or even terrorists. The current internet architecture makes such attacks difficult or impossible to trace back to their sources.

Given this list of problems, there is ample reason to be skeptical of internet voting proposals. Therefore, the principles of operation of any internet voting scheme should be publicly disclosed in sufficient detail so that anyone with the necessary qualifications and skills can verify that election results from that system can reasonably be trusted. Before these conditions are met, “pilot studies” of internet voting in government elections should be avoided, because the apparent “success” of such a study absolutely cannot show the absence of problems that, by their nature, may go undetected. Furthermore, potential attackers may choose only to attack full-scale elections, not pilot projects.

The internet has the potential to transform democracy in many ways, but permitting it to be used for public elections without assurance that the results are verifiably accurate is an extraordinary and unnecessary risk to democracy.

-END-
Printer Friendly | Permalink | Reply | Top
 
WillYourVoteBCounted Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-30-09 11:11 PM
Response to Reply #1
5. Threat Level Privacy, Crime and Security Online Is Internet Voting Safe? Vote Here
Here's Kevin Poulsen's take on internet voting.

Threat Level Privacy, Crime and Security Online Is Internet Voting Safe? Vote Here

...Speaking on the panel here, computer scientist Avi Rubin pointed out that phishing attacks could also lure voters onto a fake election website, where the black hats could have their way with the vote.

These attacks are a built-in risk for any system that proposes to turn home computers into voting booths. But current, offline voting methods aren’t exactly bulletproof either.

http://www.wired.com/threatlevel/2009/06/cfp-evote/

Who is Kevin Poulsen?

Before segueing into journalism, he had a notorious career in the 1980s as a hacker whose handle was Dark Dante. He worked for SRI International by day, and hacked at night. During this time, Poulsen taught himself lock picking, and engaged in a brash spree of high-tech stunts that would ultimately make him one of America's best-known cyber-criminals. Among other things, Poulsen reactivated old Yellow Page escort telephone numbers for an acquaintance that then ran a virtual escort agency.

His best-appreciated hack was a takeover of all of the telephone lines for Los Angeles radio station KIIS-FM, guaranteeing that he would be the 102nd caller, and the potential prize of a Porsche 944 S2.<2><3>

When the FBI started pursuing Poulsen, he went underground as a fugitive. When he was featured on NBC's Unsolved Mysteries, the show's 1-800 telephone lines mysteriously crashed.<2><4> He was finally arrested in April 1991. In June 1994, Poulsen pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, and obstruction of justice, and was sentenced to 51 months in prison and ordered to pay $56,000 in restitution. At the time, it was the longest sentence ever given for cracking. He also pleaded guilty to breaking into computers and obtaining information on undercover businesses run by the FBI.

more here, and remember Kevin is one of many, although he is more famous than most:
http://en.wikipedia.org/wiki/Kevin_Poulsen

While he did get caught for somethings, it was AFTER the fact, which is way too late to correct
election fraud, as we have seen in the US.


Printer Friendly | Permalink | Reply | Top
 
WillYourVoteBCounted Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Sep-30-09 11:19 PM
Response to Reply #1
6. FBI - Mitnick had the ability to "start a nuclear war by whistling into a pay phone"
Kevin Mitnick was run to ground in my home state of North Carolina.

Mitnick served five years in prison, four and a half years pre-trial and eight months in solitary confinement, because law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone"

http://en.wikipedia.org/wiki/Kevin_Mitnick

Whether these guys get caught, and its said he did alot more than what he was charged for,
the damage is done, and with elections, you can't undo a fraudulent election.

Printer Friendly | Permalink | Reply | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sun Dec 22nd 2024, 02:37 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Topic Forums » Election Reform Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC