Journal: Electronic Voting Fraud, Failure, & Foolishness

11 Society, Civil Society, Collective Intelligence, Ethics, Government, Methods & Process
Full Story Online
Full Story Online

Sequoia Voting Systems hacks self in foot

by Mokurai

Tue Oct 20, 2009

Sequoia Voting Systems has inadvertently released the SQL (Structured Query Language) code for its voting databases. The existence of such code appears to violate Federal voting law. Read the announcement after the jump, just as received on the Open Voting Consortium mailing list earlier today.

The Linux “strings” command was able to peel it apart.  Nedit was able to digest 800meg text files.  What was revealed was thousands of lines of MS-SQL source code that appears to control or at least influence the logical flow of the election, in violation of a bunch of clauses in the FEC voting system rulebook banning interpreted code, machine modified code and mandating hash checks of voting system code.

I've got it all organized for commentary and download in wiki form at:

Continue reading “Journal: Electronic Voting Fraud, Failure, & Foolishness”

1988-2009 OSINT-M4IS2 TECHINT Chronology

Collaboration Zones, Communities of Practice, Methods & Process, Mobile, Policies, Real Time, Threats
Rock ON, Dude
Steele as Wild Card Speaker

Phi Beta Iota: This started as a short list for the various college and university engineering students that have dialed in, but as we got into it, it became more of a “situational awareness” inventory pulling together both technical “solutions” none of which have been integrated yet, and analytic “requirements” none of which have been satisfied yet.

$75 billion a year for secret intelligence, and we still do not have an analytic desktop toolkit, all-source geospatially and historically and cultural astute back office processing, or global reach to all humans, all minds, all the time.  Sucks for us.  Let's see what the Smart Mob can do….

We specifically invite suggestions in the Comments for removing items from this list, or for adding items from within this website or from any other website.  This is now a work zone.  Steele is available to visit any engineering workshop and especially those working on bottom-up clouds like Swarm DPL (transparently scalable distributed programming language).

See also About the Idea, Articles, Briefs, Handbooks, and Historic Contributions. Use the Menu–everything on this stie responds to “OSINT” that is not a good search term.  Rock on!

TOTALLY TECH:

2009 Arnold Google: The Digital Gutenberg

2008 Memoranda: Policy-Budget Outreach Tool

2006  USSOCOM Software List and STRONG ANGEL TOOZL

2006 Morville (UK) Ambient Findability Massive Scale Beyond Your Imagination A Recommedned Approach to Creating the World Brain with Instant Recall

Continue reading “1988-2009 OSINT-M4IS2 TECHINT Chronology”

Worth a Look: Bankster

03 Economy, Civil Society, Commerce, Commercial Intelligence, Ethics, Government, Reform, Worth A Look
Site Home Online
Site Home Online

On the one-year anniversary of the Banksters blowing a hole in the global economy, no employee of a major American bank or financial institution is behind bars. Compare this to what happened after the Savings and Loan heist almost 20 years ago.

Take Action
Take Action

No less than 1,852 S&L officials were prosecuted and 1,072 were jailed. Over 500 CEOs and top officers were indicted. What is going on here? Don't we believe in holding people accountable anymore? Tell the U.S. Department of Justice and the FBI to get cracking! Our motto? TOO BIG TO FAIL, BUT NOT TOO BIG TO GO TO JAIL!

Put an End to Death Bonds

No New Powers for the Fed

Cap Those Interest Rates, 10% is Enough!

Demand Accountability, Fairness, and Security

Phi Beta Iota: Being added to Righteous Sites.

Journal: Information Security Seven Guiding Principles

Collaboration Zones, Communities of Practice, InfoOps (IO), Methods & Process, Mobile, Policies, Real Time
Full Story Online
Full Story Online

RSA Executives Offer Seven Guiding Principles To Maximize Megatrends Redefining the Information Security Industry

LONDON, Oct. 20 /PRNewswire/ — RSA® CONFERENCE EUROPE 2009 — Building a
systemic security strategy to help organizations better face challenges and exploit opportunities spurred by next generation technology trends was the theme of the opening keynote at the 2009 RSA Conference Europe. In a joint keynote address, Art Coviello and Christopher Young, President and Senior Vice President, respectively, with RSA, The Security Division of EMC (NYSE: EMC), highlighted the need for organizations to develop a systemic security strategy that treats escalating technology trends not as a burden to be lifted, but as
an unprecedented opportunity to improve security and build a more secure information infrastructure.

The seven principles:

Continue reading “Journal: Information Security Seven Guiding Principles”

Journal: Multinational Operations 101

04 Inter-State Conflict, 05 Civil War, 10 Security, Methods & Process, Military

Full Story Online
Full Story Online

Italian Troops Denied Access To Intelligence Reports, Minister Says

Richard Owen  TimesOnline (UK) October 20, 2009

Italy is denied full access to intelligence assessments in Afghanistan, a restriction that affects its troops' ability to operate safely and hampers allied co-ordination, the Italian Foreign Minister said yesterday.

The lack of co-ordination and pooled intelligence between Nato forces was a widespread problem, Franco Frattini said. “We have repeatedly raised this issue,” he added.  …

Mr Frattini said the problem was that intelligence was “the only resource not put at the disposal of everyone”. He said that in Herat, which is under Italian and Spanish command, there was excellent co-ordination with Spanish forces, “but if I want to leave Herat to go to Kandahar it is another matter”.

Continue reading “Journal: Multinational Operations 101”

Journal: How NOT to Decide on Afghanistan

02 China, 04 Inter-State Conflict, 05 Civil War, 05 Iran, 06 Russia, 08 Wild Cards, 10 Security, Ethics, Government, Methods & Process, Military, Policy, Reform, Strategy, Threats
Failure of HUMINT
Failure of HUMINT

The Real Reason for More Troops in Afghanistan

Michael Gaddy LouRockwell.com    October 20, 2009Anyone with a rudimentary knowledge of our quest for empire over the past six decades realizes that Obama’s contemplation of whether to send additional troops to Afghanistan is simply those who control him providing Obama with the opportunity to look “presidential.” The decision to send additional troops was reached prior to the situational comedy of General McChrystal’s leaked “confidential report” to the Washington Post and Obama’s National Security Advisor’s public admonishment of McChrystal’s failure to follow the chain of command. All of this is nothing but a well-rehearsed, though poorly camouflaged hoax. Additional troops will be sent to Afghanistan within a very short period of time and Obama really has no say in the matter. The question is: why?

Continue reading “Journal: How NOT to Decide on Afghanistan”

Journal: Medical Software–Dead on Arrival

07 Health, Civil Society, Ethics, Methods & Process, Mobile

Full Story Online
Full Story Online

Medical Records: Stored in the Cloud, Sold on the Open Market

Kim Zetter October 19, 2009

When patients visit a physician or hospital, they know that anyone involved in providing their health care can lawfully see their medical records. But unknown to patients, an increasing number of outside vendors that manage electronic health records also have access to that data, and are reselling the information as a commodity.   …

Below Fold More and Second Story

Continue reading “Journal: Medical Software–Dead on Arrival”

noble gold