Tom Atlee: Diebold Voting Machines Can Be Hacked Remotely–ONE THIRD of All Votes Can Be Easily Manipulated

07 Other Atrocities, 09 Justice, 11 Society, Articles & Chapters, Commerce, Commercial Intelligence, Corruption, Government, IO Technologies
Tom Atlee

This kind of information should be spread as fast as possible. – Tom

Diebold voting machines can be hacked by remote control

Exclusive: A laboratory shows how an e-voting machine used by a third of all voters can be easily manipulated

Brad Friedman, Salon, 27 September 2011

It could be one of the most disturbing e-voting machine hacks to date.

Voting machines used by as many as a quarter of American voters heading to the polls in 2012 can be hacked with just $10.50 in parts and an 8th grade science education, according to computer science and security experts at the Vulnerability Assessment Team at Argonne National Laboratory in Illinois. The experts say the newly developed hack could change voting results while leaving absolutely no trace of the manipulation behind.

Read full story.

Phi Beta Iota:  The two political parties and the Department of Justice under varied Administrations have known of all this since the Diebold machines were first introduced and their CEO bragged publicly that he would “deliver” the next election to George Bush Junior.  What kind of Nation is so stupid and so apathetic as to tolerate this kind of pervasive electoral crime?

See Especially:

For $26 and an 8th Grade Education, You Can Hack a Voting Machine

Two of the lead researchers in the study were able to demonstrate a number of different ways that voting machines could be hacked. They used a $1.29 microprocessor and a circuit board that costs about $8, along with a $15 remote control. They demonstrated that the cheap hack worked from over a half-mile away.

See Also:

Diebold Crime at DuckDuckGO

Journal: The U.S. electoral system is in danger, once again.

Review: Grand Illusion–The Myth of Voter Choice in a Two-Party Tyranny

Wikipedia entry for “Diebold Election Systems” which was acquired by “Premiere Election Solutions” then by “Election System & Software” (ES&S) which was then acquired by “Dominion.”

Video: Princeton Univ Exposes Diebold Flaws

Diebold to Deploy Situational Awareness Platform Software to Manage Security Systems at World Trade Center Site

DefDog: US Surveillance Law Goes to Supreme Court

07 Other Atrocities, Civil Society, DHS, Director of National Intelligence et al (IC), Ethics, Government, IO Technologies, Law Enforcement
DefDog

Court allows challenge of U.S. surveillance law

By

Washington Post, 21 September 2011

A group of plaintiffs hoping to mount a challenge to U.S. surveillance law secured a major victory Wednesday when a federal appeals court upheld their standing to sue the government.

The Second Circuit Court of Appeals’ 6-6 decision allows a group of American lawyers, human rights activists and journalists to challenge the constitutionality of the Foreign Intelligence Surveillance Act as amended by Congress in 2008.

The revision expanded the government’s surveillance authority, permitting intelligence agencies to collect information on U.S. soil without a warrant identifying a particular individual — as long as the government could assure a surveillance court that its targeting procedures are designed to find people who are not U.S. persons and who are overseas.

U.S. government has typically attempted to block such challenges by arguing that litigation would reveal state secrets or that the plaintiffs lack standing to sue. But in March, a three-judge panel accepted the argument of the plaintiffs, represented by the American Civil Liberties Union, that the law had harmed them by forcing them to take draconian measures to avoid government interception of their phone calls and e-mails to overseas clients.

In other words, the plaintiffs in the case, Amnesty International v. Clapper, had standing.

Continue reading “DefDog: US Surveillance Law Goes to Supreme Court”

Patrick Meier: Crisis Crowd Sourcing the Diaspora

Advanced Cyber/IO, Blog Wisdom, Civil Society, Collective Intelligence, Cultural Intelligence, Earth Intelligence, IO Deeds of Peace, IO Technologies, Policies
Patrick Meier

Crisis Mapping Somalia with the Diaspora

The state of Minnesota is home to the largest population of Somalis in North America. Like any Diaspora, the estimated 25,000 Somalis who live there ar closely linked to family members back home. They make thousands of phone calls every week to numerous different locations across Somalia. So why not make the Somali Diaspora a key partner in the humanitarian response taking place half-way across the world?

In Haiti, Mission 4636 was launched to crowdsource micro needs assessments from the disaster affected population via SMS. The project could not have happened without hundreds of volunteers from the Haitian Diaspora who translated and geo-referenced the incoming text messages. There’s no doubt that Diasporas can play a pivotal role in humanitarian response but they are typically ignored by large humanitarian organizations. This is why I’m excited to be part of an initiative that plans to partner with key members of the Diaspora to create a live crisis map of Somalia.

Read more….

See Also:

Ushahidi & The Unprecedented Role of SMS in Disaster Response

Marcin Jakubowski: Open-sourced blueprints for civilization

About the Idea, Augmented Reality, Collaboration Zones, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, Ethics, InfoOps (IO), IO Deeds of War, IO Technologies, Methods & Process, Policies, Reform, Standards, Technologies, Tools

Open Source Ecology — 50 Open Source Tools for Resilience

Industrial productivity can be achieved on a small scale….it just requires open source design.  A single DVD is a civilization starter kit.

Interactive Transcript

About The Speaker

About This Talk

Using wikis and digital fabrication tools, TED Fellow Marcin Jakubowski is open-sourcing the blueprints for 50 farm machines, allowing anyone to build their own tractor or harvester from scratch. And that's only the first step in a project to write an instruction set for an entire self-sustaining village (starting cost: $10,000).

IMF: Cyber-Militia Flexing Its Muscles?

07 Other Atrocities, 08 Wild Cards, Advanced Cyber/IO, Civil Society, Computer/online security, Corruption, Government, IO Technologies, Law Enforcement, Non-Governmental, Policies

IMF attack goal said to be network ‘insider presence'

‘It was a targeted attack,' says expert who once worked for organization

Reuters, 11  June 2011

Phi Beta Iota: This is interesting on two levels.  First, all instruments of Empire can expect to be attacked; without any central impetus, we anticipate a global cyber-intelligence and penetration network to develop, similar to what has matured for Free/Open Source Software, but with penetration, understanding, and neutralization of as the objective.  A Cyber-Militia, if you will.  Second, no government, no corporation, no international organization, can muster the global intelligence capability needed to be effective in today's reality–the US Government least of all.  An opportunity is emerging for a multinational decision-support centre and network co-sponsored by a mix of stakeholders who are willing to commit to absolute integrity.  That is all it takes: integrity and a commitment to “The Virgin Truth.”

See Also:

1994 Sounding the Alarm on Cyber-Security

Cyber-Virus Proliferation: USG as “Main Enemy”

2011 Cyber-Command or IO 21 + IO Roots

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Search: Steele USMC C4I 1990′s

Multinational, Multiagency, Multidisciplinary, Multidomain Information-Sharing and Sense-Making (M4IS2)

 

Joint US-Russia Assessment Nuclear Terrorism

06 Russia, 08 Proliferation, 10 Security, Academia, Cultural Intelligence, Government, IO Multinational, IO Sense-Making, IO Technologies, Military, Peace Intelligence, Politics of Science & Science of Politics, Technologies
Berto Jongman Recommends...

“First Joint U.S.-Russia Assessment of Nuclear Terror Threat”

Study Warns of Multiple Dangers, Calls for Urgent Action

June 6, 2011

Belfer Center Programs or Projects: The US-Russia Initiative to Prevent Nuclear Terrorism

Learn More

Phi Beta Iota: This is a good initiative, something we should have been doing for decades.  However, it does not go far enough.  No such study can be credible without the participation of Brazil, China, Iran, Israel, and Pakistan, as well as major “interested parties” such as South Africa and Turkey.  In short, we are long over-due for a Multinational Decision-Support Centre that does M4IS2 on all topics.

Open Source Anonymous Banking….Here Now!

03 Economy, 11 Society, Advanced Cyber/IO, Budgets & Funding, Civil Society, Commerce, Commercial Intelligence, Counter-Oppression/Counter-Dictatorship Practices, Government, InfoOps (IO), IO Technologies, Methods & Process, Money, Banks & Concentrated Wealth, Reform, Tools
Michael Ostrolenk Recommends...

What Happens When Anonymous Gets a Bank?

Dominic Basulto on May 18, 2011

bigthink

The same people who brought you Wikileaks are back, and this time, they've created a virtual currency called Bitcoin that could destabilize the entire global financial system. Bitcoin is an open-source virtual currency generated by a computer algorithm that is completely beyond the reach of financial intermediaries, central banks and national tax collectors. Bitcoins could be used to purchase anything, at any time, from anyone in the world, in a transaction process that it is almost completely frictionless. Yes, that's right, the hacktivists now have a virtual currency that's untraceable, unhackable, and completely Anonymous.

And that's where things start to get interesting. Veteran tech guru Jason Calacanis recently called Bitcoin the most dangerous open source project he's ever seen. TIME suggested that Bitcoin might be able to bring national governments and global financial institutions to their knees. You see, Bitcoin is as much a political statement as it is a virtual currency. If you think there's a shadow banking system now, wait a few more months. The political part is that, unlike other virtual currencies like Facebook Credits (used to buy virtual sock puppets for your friends), Bitcoins are globally transferrable across borders, making them the perfect instrument to finance any cause or any activity — even if it's banned by a sovereign government.

You don't need a banking or trading account to buy and trade Bitcoins – all you need is a laptop. They're like bearer bonds combined with the uber-privacy of a Swiss bank account, mixed together with a hacker secret sauce that stores them as 1's and 0's on your computer. They're “regulated” (to use the term lightly) by distributed computers around the world. Most significantly, Bitcoins can not be frozen or blocked or taxed or seized.

Read full article….

See Also:

Open Money