How to hack an election 1.12: Diebold tries to silence incriminating evidence
: Diebold, maker of proven-to-be hackable voting systems, plays global whack-a-mole
, in effort to scare ISP's into taking down websites with incriminating material. They used the DCMA to shut down BlackBoxVoting.org.
But the incriminating data just keeps popping back up on the Net
, and Gun-and-Voting rights activist Jim March calls the bluff and challenges Diebold “Diebold: You are cordially invited to bite me. Bring it on. Make my day."
. March has created a legal strategy/toolkit for voting rights activists who want to fight Diebold, a company which has knowingly - for 10 years - sold security-compromised voting technology, and whose CEO, an aggressive Republican fundraiser
, has said he is "he is "committed to helping Ohio deliver its electoral votes to the president next year."
In internal memos published by Scoop
, Diebold's officials admit that their voting records database is (and has been for a long time) hackable ( [anyone can] "access the GEMS Access database and alter the Audit log without entering a password" ) but that this isn't necessarily a problem because "It has a lot to do with perception. Of course everyone knows perception is reality." For background to this story, see my summary of Mefi posts on the Voting Fraud story
, from this
thread. Diebold's funky voting systems are in the process of being "Certified", in Maryland and elsewhere, by SAIC, a company convicted of major frauds within the last decade and which has extensive ties to the Bush Administration
, the CIA, and which "proudly lists DARPA in its annual report as one of its prime clients.", and owns Network Solutions, Inc. SAIC has not, it seems, noticed the GEMS database story (see main link). If Diebold systems win certification, we can expect an awful lot of This
sort of thing.
Computer security expert Dr. Rebecca Mercuri has some pointed analysis on the subject.
You can join the effort to demand truly secure voting systems at VerifiedVoting.Org
by David L. Dill, a Professor of Computer Science at Stanford University. Go team.