Sequoia Voting Machines Hacked to Play Pac-Man

Sequoia, Diebold... e-voting has a long way to go.
(Image is in the Public Domain)
This is your Sequoia touch-screen voting machine with Pac-Man hacked onto it without disturbing any of the "tamper-evident" seals supposedly meant to protect it from hackers...

Apparently, they put tamper seals on the ports and plugins, but NOT the case itself. Therefore, the university was able to just dismantle the machine and connect on the inside instead. Pathetic attempt Sequoia, just pathetic.

Source

Tags: , ,

DC Online Voting Halted Due to Hackers

(Image is in the Public Domain)

From the Washington Post:

Last week, the D.C. Board of Elections and Ethics opened a new Internet-based voting system for a weeklong test period, inviting computer experts from all corners to prod its vulnerabilities in the spirit of "give it your best shot." Well, the hackers gave it their best shot -- and midday Friday, the trial period was suspended, with the board citing "usability issues brought to our attention." Here's one of those issues: After casting a vote, according to test observers, the Web site played "Hail to the Victors" -- the University of Michigan fight song.

Whoah! E-voting not secure? Where have we heard that before!? And the best part is that it doesn't even take the vile hacker underground to do it. It's the college researchers each time.

No knock against college researchers, but for e-voting to work, it should take a vast conspiracy spanning several continents and special agents who jump from helicopters in the night to break into buildings through air-ducts not some mostly-sober frat boy. They obviously have no idea what they're doing and should stop. Now.

About the only ray of light in this whole story is that they were smart enough to challenge the public to hack them thus making their failure obvious (and therefore correctable).

Tags: , ,

Judge Supresses Report on Voting Machine Insecurity

(Image is in the Public Domain)

Just great.

Tags: , , , ,

Diebold Finally Admits Voting Machines Lose Votes

(Image is in the Public Domain)

Though they originally blamed it on anti-virus software on the machines, Diebold has admitted that it was coding error that leads its machines to drop votes. Hopefully that will help in the lawsuit against Diebold and encourage others states to recoup their losses as well.

Tags: , ,

States Throw Out Worthless Diebold Voting Machines

(Image is in the Public Domain)

It's actually very encouraging that the same states that were originally duped into buying these machines despite the vast mountain of evidence of their general worthlessness have become smart enough to remove them in time for the upcoming election.

And about this:

"I have a huge inventory of machines that I am not able to use," she complained. "They are just sitting in our warehouse basically useless." Stacked to floor to ceiling are 4,000 machines purchased at $3,500 each. Total cost of that system: $16 million.

How exactly does Diebold get away with selling defective merchandise to the government without being forced to issue a refund?

Update

Today Ars Technica also covers the story and adds some interesting details. For example, it turns out that in one case a voting machine company offered to buy back their machines from the state for $1 each (their original price was $5000 each). At least the state was smart enough to decline). Tags: ,

Ohio Sues Diebold for Fraudulent E-Voting Machines

(Image is in the Public Domain)

Of course, I believe some of the blame should go to the Ohio elections people, but I can't fault them for being pulled in by slick salesguys (if that's what actually happened). Either way, at least they're fessing up and making sure to hold Diebold accountable for their flop.

The touch-screen voting setup used in half of Ohio's 88 counties doesn't work properly, and the former Diebold Election Systems should pay as a result, Secretary of State Jennifer Brunner said in a court filing yesterday.

Well duh. Better yet, they should scrap the system and get something that actually works.

Tags: ,

Voting Machines Shown to Add Wrong

(Image is in the Public Domain)

In case you didn't know already, voting machines are hackable and otherwise, just plain poop. Any state that's using them should be sued. Now a man has used voting machine print-outs to prove that they are adding votes incorrectly.

Tags:

Super Tuesday Meet E-Voting Kryptonite

(Image is in the Public Domain)

Several states are still using e-voting despite the disastrous security they provide. Because of that, voting advocacy groups have labeled six of the 24 states in the primary as being high risk for miscounts due to tampering or malfunction. Best of all, these miscounts would be undetectable due to lack of a paper record for audit or recount.

Tags: , , ,

How to Hack a Diebold Voting Machine – Picture

(Image is in the Public Domain)

I found this picture on Digg.com that has an easy 5 step process to hacking the voting machines to do your bidding. Remember when you go to vote soon, to thank your state's voting commission if they are using these well known, hackable, substandard, and completely worthless machines. Better yet sue them for incompetence or corruption (or both).

Tags: , ,

Colorado E-Voting Machines Decertified

(Image is in the Public Domain)

Well good.

Tags: ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]