Published on Election Defense Alliance (http://electiondefensealliance.org)

Home > content > Attack Vectors in Computerized Voting Systems: An Election Fraud Slideshow

Attack Vectors in Computerized Voting Systems: An Election Fraud Slideshow

The attached PDF slideshow [1], prepared by Bev Harris of BlackBoxVoting.org, presents a detailed explanation of computerized election systems and the many ways they are vulnerable to undetected intrusion and rigging of election results. Cheating in elections is nothing new. But whereas the methods for defrauding traditional paper ballot elections are well-known and can be effectively countered by recognized chain of custody procedures and public observation, votes counted by computer software are not observable by the public, and the potential pathways of attack into computer-driven voting systems are limitless and impossible to defend. Absorb the lessons presented in this graphic summary, and you will begin to understand why.
This presentation courtesy of BlackBoxVoting.org





AttachmentSize
BBV_attackpoints_SS.pdf [1]9.04 MB
All content on this site © 2006-2009 by each individual author, All Rights Reserved.

Election Defense Alliance is a program of International Humanities Center, a nonprofit organization under Section 501(c)(3) of the IRS Code.

Fair Use Policy |
Site Meter

website stats

Powered by Drupal, an open source content management system

Source URL (retrieved on 06/19/2010 - 9:16pm): http://electiondefensealliance.org/attack_vectors_computerized_voting_systems_election_fraud_slideshow

Links:
[1] http://electiondefensealliance.org/files/BBV_attackpoints_SS.pdf