I've been saying this for four years, so have many others. But it's no longer just tinfoil: Electronic voting machines made by companies that are Republican campaign contributors aren't just subject to "malicious hacking", but also to deliberate changing of results.
Brad Friedman reports:
In exclusive stunning admissions to The BRAD BLOG some 11 months after the 2004 Presidential Election, a "Diebold Insider" is now finally speaking out for the first time about the alarming security flaws within Diebold, Inc's electronic voting systems, software and machinery. The source is acknowledging that the company's "upper management" -- as well as "top government officials" -- were keenly aware of the "undocumented backdoor" in Diebold's main "GEM Central Tabulator" software well prior to the 2004 election. A branch of the Federal Government even posted a security warning on the Internet.
Pointing to a little-noticed "Cyber Security Alert" issued by the United States Computer Emergency Readiness Team (US-CERT), a division of the U.S. Department of Homeland Security, the source inside Diebold -- who "for the time being" is requesting anonymity due to a continuing sensitive relationship with the company -- is charging that Diebold's technicians, including at least one of its lead programmers, knew about the security flaw and that the company instructed them to keep quiet about it.
"Diebold threatened violators with immediate dismissal," the insider, who we'll call DIEB-THROAT, explained recently to The BRAD BLOG via email. "In 2005, after one newly hired member of Diebold's technical staff pointed out the security flaw, he was criticized and isolated."
In phone interviews, DIEB-THROAT confirmed that the matters were well known within the company, but that a "culture of fear" had been developed to assure that employees, including technicians, vendors and programmers kept those issues to themselves.
The "Cyber Security Alert" from US-CERT was issued in late August of 2004 and is still available online via the US-CERT website. The alert warns that "A vulnerability exists due to an undocumented backdoor account, which could [sic: allow] a local or remote authenticated malicious user [sic: to] modify votes."
The alert, assessed to be of "MEDIUM" risk on the US-CERT security bulletin, goes on to add that there is "No workaround or patch available at time of publishing."
The direct link at US-CERT is here. And the rest of the article at Bradblog is here. It's worth your time to read it.
No one knows the extent to which vote tabulation manipulation affected the outcome of the 2000 and 2004 elections, if it did. I think it did, but there's no concrete proof. There are, however, a great many smoking guns, ranging from company insider testimony such as that of "Dieb Throat", who has yet to go public; and the bogus "security threat" against the precinct in Ohio in which votes were delayed and counted in private by Republican operatives.
But the fact that the Democrats have done NOTHING AT ALL to try to educate the public about this, or to ensure that such security holes are fixed, indicates that they are either completely clueless about technology and have no will to become educated, or Mr. Brilliant is right and they really ARE all on the same side.
Aucun commentaire:
Enregistrer un commentaire