Tuesday, November 23, 2004

This subject of a stolen election is not going away. Here's a brief summary of the most salient points and a chance to contribute to challenge the results if you're so moved. Let me just point out that exit polls are extremely accurate because they don't poll likely voters; they poll actual voters.
This second link takes you to an article written by a Republican IT auditor (someone who hacks sytems to verify how secure they are). He has looked into this election and concluded what many lefties have, that it was stolen. He explains what was probably hacked and why, and it's not the touch screen machines, but the central vote tabulation systems. Here's the heart of that information:
I feel that it is unlikely that these individual touch screen machines would be targeted. At greater risk than the individual touch screens are the Central Voting Tabulation computers, which compile the results from many other systems, such as touch screens and optically scanned cards. From a hacker’s standpoint, there are a couple of reasons why these central computers are better targets:
a. It is extremely labor intensive to compromise a large number of systems, and the chance of failure or being detected increases every time an attack is attempted. Also, the controversy surrounding the touch screen terminals ensures that their results will be closely watched, and this theory has been born out in recent days.
b. If one were to compromise the individual terminals, they would only be able to influence a few hundred to maybe a couple of thousand votes. These factors create a very poor risk/reward ratio, which is a key factor in determining which systems it makes sense to attack.
c. On the other hand, the Central Vote Tabulation systems are a very inviting target – by simply compromising one Windows desktop, you could potentially influence tens or hundreds of thousands of votes, with only one attack to execute and only one attack to erase your tracks after. This makes for an extremely attractive target, particularly when one realizes that by compromising these machines you can affect the votes that people cast not only by the new touch screen systems, but also voters using traditional methods, such as optical scanning systems, since the tallies from all of these systems are brought together for Centralized Tabulation. This further helps an attacker stay under the radar and avoid detection, since scrutiny will not be as focused on the older systems....

2 Comments:

At 2:26 PM, Blogger job opportunitya said...

I surf the web looking for blogs like this one.
Your site was on point and will be back again! Awesome
blog.
I will give you access to jump to my care circumcision health private blog.

 
At 1:57 PM, Blogger instant cash advance66 said...

Exciting blog. Your site was amazing and will be
back again! I never get tired of looking for blogs
just like this one.
I was in love with your cash advance nassau blog site.

 

Post a Comment

<< Home