IVN Steele on Electoral Reform Part 3: Voting for People

Steele on Electoral Reform – Part 3: Voting for People Independent Voter Network, 9 March 2012 All national, state, and local elections must immediately begin, and by Election Day 2014 complete, the process of phasing out plurality voting and adopting a better voting system. An improved voting system should collect more information from voters using …

IVN Steele on Electoral Reform Part 2: Ballot Access

Steele on Electoral Reform – Part 2: Ballot Access Independent Voter News, 9 March 2012 Ballot access requirements shall be the same for every candidate, irrespective of party affiliation. Equal access includes access to debates. This shall also apply to initiatives and referenda, and to primary elections. No state shall be eligible to receive federal …

Berto Jongman: Australian Intelligence Buying Cyber-Bugs

Australian spies buying computer bugs: sources Cynthia Karena Sydney Morning Herald, 8 March 2012 Cyber criminals are not the only ones buying software flaws, say sources. The  Australian government is buying computer security weaknesses found by hackers before they are sold on the black market, as part of its defence strategy, claim those at the …

IVN Steele on Electoral Reform Part 1: Process

Steele on Electoral Reform Part 1: Process Independent Voter Network, 6 March 2012 The election process shall reflect the eleven International Election Integrity Principles of Transparency, Chain of Custody, Observer Access, Checks & Balances, Enforcement of Election Laws, Right to Paper Ballot and Open Source Software, Right to Polls and Protection of Poll Workers; Right …

Patrick Meier: Trails of Digital Trustworthness

Trails of Trustworthiness in Real-Time Streams Real-time information channels like Twitter, Facebook and Google have created cascades of information that are becoming increasingly challenging to navigate. “Smart-filters” alone are not the solution since they won’t necessarily help us determine the quality and trustworthiness of the information we receive. I’ve been studying this challenge ever since the …

DefDog: $15 Billion for Cyber-Command, Zero for Actual Needs + Meta-RECAP

The myths behind the spending — disavowed by true subject-matter experts, manipulated by the military-industrial-congressional complex (MICC) to spend more on vaporware…. RSA Conference: On the Subject of Cyber War and Industrial Espionage Talk of an impending ‘Cyber Pearl Harbor’ is not an uncommon image evoked during discussions of cyber threats to the critical infrastructure …