NAVIGATION MAIN MENU

COMPENDIUM LIBRARY/TWITTER MONITOR
VIDEO GALLERY
Economic News
Newsbrief Archives
Democrat Leadership Twitter and Realtime Feeds
Cabinet twitter and realtime feeds
North America weblog
International weblog
Democrats twitter directory
Latest Government Jobs and Public Tenders
Jobs Matrix
Global Travel Information
Pop Entertainment Forum
Start Portal


Please make a donation to support upkeep of the daily news journal, back archives, twitter feeds and the compendium library.










Dissertation on Voting Machine Software: Ka-Ping Ye« Thread

Daily newsbrief journal for December 2007, also see http://www.usdemocrats.com/brief for a global 100-page perpetual brief and follow twitter @usdemocrats


Dissertation on Voting Machine Software: Ka-Ping Ye« Thread

Postby admin » Sun Jan 29, 2012 2:09 pm

Dissertation on Voting Machine Software: Ka-Ping Ye« Thread Started on Dec 27, 2007, 5:30am » --------------------------------------------------------------------------------Dissertation on Voting Machine Software: Ka-Ping Yee, "Building ...By Michael Alvarez(Michael Alvarez) read at source> http://zesty.ca/pubs/yee-phd.pdf
I examine the question of how to design election-related software, with particular attention to the threat of insider attacks, and propose the goal of simplifying the software in electronic voting machines. I apply a technique called ...
admin
Site Admin
 
Posts: 82092
Joined: Fri Nov 27, 2009 7:00 am



Re: Dissertation on Voting Machine Software: Ka-Ping Ye« Thread

Postby admin » Sun Jan 29, 2012 2:18 pm

other things to watch for when inspecting electronic vote machines>
chip hardware embedded hidden backdoors
multiple system clocks to rewrite timestamps
system code running off chip embedded rom/flash memory code where inspected code is simply nonfunctional front and/or modified rewritten during an election and restored post election stored in hidden chip based flash memory
codes clearing hardware based flash memory post election to hide any hidden code that may have resided during election
hidden wifi backdoors to allow modification of results/printing/system code
hidden code embedded on chips to rewrite certified machine code during and restore certified code post election
peer to peer software connecting machines to offlocation or cloud processing/analysis/reporting
delayed printer write to enable modification of actual vote results
modification of code or results or activate switches using wifi (iphone/blackberry/cellular phone text message)
malevolent subroutine code start on/off switching mechanisms using wifi, preset clocks, (iphone/blackberry/cellular phone text message)
admin
Site Admin
 
Posts: 82092
Joined: Fri Nov 27, 2009 7:00 am



Re: Dissertation on Voting Machine Software: Ka-Ping Ye« Thread

Postby admin » Sun Jan 29, 2012 2:35 pm

ALSO ISP TELCO BASED NON LOCAL HACKS ARE POSSIBLE (IP PACKET HACK)
This is where a web based machines sends data through the internet where it is intercepted by local ISP's which will scan IP packet data using 'packet sniffers'
installed by DHS and other law enforcement agencies and run a 'find and replace cut and paste routine'
There is a possibility that telco executives could have agreed to the installation of such systems considering their favors owed due to immunities that were granted to them for conduct during the past republican administration

This modifies and 'switches' data packets containing democrat votes with republican votes and relay a modified IP packet back through the internet and back to the election machine printers or tabulators while maintaining an illusion that there is no interception or hack since the machines themselves were inspected.

So for example if a packet indicates a Democrat vote, software at an ISP can be hacked to modify the packet data to switch the vote to Republican
These routines can be set time temporary, after a certain number or an array of variables where any local machine inspection will show no tampering

Also hardware chip embedded vote switching codes can be programmed to run as main system code as subroutines and bypass any inspected software code during
the period of the election and then automatically switch back to the certified code post election and delete itself to erase any evidence of tampering post election. This is also a possible hack of the electronic vote machines.

***BALLOTS SCANNERS connected through the internet to printers or tabulators can also be equally intercepted and hacked before printing results or data sent to tabulators
admin
Site Admin
 
Posts: 82092
Joined: Fri Nov 27, 2009 7:00 am


Return to December 2007

Who is online

Users browsing this forum: No registered users and 9 guests

cron