Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Congress to Tackle E-Voting Overhaul

(Image is in the Public Domain)

So they're finally going to try and do something about the e-voting disaster.

HR 811 features several requirements that will warm the hearts of geek activists. It bans the use of computerized voting machines that lack a voter-verified paper trail. It mandates that the paper records be the authoritative source in any recounts, and requires prominent notices reminding voters to double-check the paper record before leaving the polling place. It mandates automatic audits of at least three percent of all votes cast to detect discrepancies between the paper and electronic records. It bans voting machines that contain wireless networking hardware and prohibits connecting voting machines to the Internet. Finally, it requires that the source code for e-voting machines be made publicly available.

There's not one thing in there that's wrong! If they actually implemented all those provisions, e-voting might actually work!

The proposal wasn't without its detractors, however. Several state election officials testified about the practical challenges of implementing the new requirements. Chris Nelson, South Dakota's secretary of state, warned that many of the requirements in the legislation would conflict with the states' own election procedures.

Cry me a river. "Oh it's too HARD to implement security! We need to have less restrictions so we can do this cheaper!"

The law allows flexibility in how some of the auditing is done as long as it's NIST approved and the states always have the option of keeping the optical current methods if they decide that the regulations for e-voting are too strict or too expensive to implement at this time.

Of course, this almost sounds too good to be true. I'll have to read the law later, but I'm betting it has some terrible hidden catch like it legalizes eating little puppies or provides millions of pork dollars for human RFID implantations.

Update: It looks like the guys over at Slashdot feel the same way I do.

Tags: ,

Share This

Have a Comment or Question?

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

goodbye identity theft Tutorial
|INDEX|next: Credit Freeze

Too Late!

If you've already become a victim, here is a list of things you should do.

Solving ID Theft

Lock your credit reports with a Credit Freeze to prevent credit-based ID theft (90% of ID theft risk).
Learn to protect your information to prevent not only ID theft, but many other kinds of problems (the rest of ID theft risk).

Save Time and Money

cancel credit-monitoring services.
Cancel id-theft-insurance

Who is Responsible?

Sometimes you just have to wonder why it's so easy to steal identities in the first place.

... or check out any of my other guides and tutorials by clicking here!

The Identity Theft Victim's Mini-Guide to Recovery

If you've already experienced ID theft, here are some tips of what to do next.

[Click for full description]

Credit Freeze

Setting a credit report freeze is the fastest and most effective way to actually block and reduce your risk of ID Theft. And it's free.

[Click for full description]

Out and About Defense

The best defense against non-credit ID Theft and a variety of other risks is to adopt a mindset of protection: Data Defense. Learn how to protect your information with simple and sometimes free countermeasures all based on a simple philosophy that the less people who have your information, the safer you are.

[Click for full description]