<snip>
Imagine that a rogue programmer gets access to a few networks of computers in the California special gubernatorial election. The programmer manipulates the software to count wrong, making sure that Darrell Issa or whoever is running on the Republican ticket gets 10% more votes than the voters really gave him. This software "fix" will do it's work then delete itself. The program can be made to randomize the bogus numbers so they are a little different percentage at each voting location.
Now imagine that this is not some independently acting rogue programmer. What if he works for the company and the company is currying favor for or selling power to the candidate or even to unidentified backers-- like some of the wealthy oil people who have funded attack ads for George Bush in the past. This is no far-fetched scenario. There are a lot of us who believe it has already happened.
As a businessman with experience with software design, creation and support, I know how easy it is to change the numbers a program supplies-- the results-- by manipulating underlying aspects of the software. It's easy to do it so no end user would realize it. It's easy to do it so the evidence of manipulations, like the old Mission Impossible tape recorder, destroy themselves and disappear.
Of course there are other ways to fix elections, Jeb Bush and Katherine Harris showed us that in Florida, with Greg Palast's and Michael Moore's books spelling out the details of their vote corruption. So we need to be careful about a plethora of means the far right can and probably will use to corrupt future elections.
<snip>
More:
http://www.opednews.com/Kall_computervoting2.htmAnd... Notice who's site is cited at the bottom!!!
:bounce::kick::bounce: