Fw:Fraud voting machines

2003-03-31 Thread Richard Guy Briggs
 democracy itself at peril.

And, argues Charlie Matulka, for a former officer of one of those
corporations to then place himself into an election without disclosing such
an apparent conflict of interest is to create a parody of democracy.

Perhaps Matulka's been reading too many conspiracy theory tracts. Or maybe
he's on to something. We won't know until a truly independent government
agency looks into the matter.

When Bev Harris and The Hill's Alexander Bolton pressed the Chief Counsel
and Director of the Senate Ethics Committee, the man responsible for
ensuring that FEC disclosures are complete, asking him why he'd not
questioned Hagel's 1995, 1996, and 2001 failures to disclose the details of
his ownership in the company that owned the voting machine company when he
ran for the Senate, the Director reportedly met with Hagel's office on
Friday, January 25, 2003 and Monday, January 27, 2003. After the second
meeting, on the afternoon of January 27th, the Director of the Senate Ethics
Committee resigned his job.

Meanwhile, back in Nebraska, Charlie Matulka had requested a hand count of
the vote in the election he lost to Hagel. He just learned his request was
denied because, he said, Nebraska has a just-passed law that prohibits
government-employee election workers from looking at the ballots, even in a
recount. The only machines permitted to count votes in Nebraska, he said,
are those made and programmed by the corporation formerly run by Hagel.

Matulka shared his news with me, then sighed loud and long on the phone, as
if he were watching his children's future evaporate.

If you want to win the election, he finally said, just control the
machines.

Thom Hartmann is the author of Unequal Protection: The Rise of Corporate
Dominance and the Theft of Human Rights. www.unequalprotection.com This
article is copyright by Thom Hartmann, but permission is granted for reprint
in print, email, or web media so long as this credit is attached.

http://www.commondreams.org/views03/0131-01.htm

--


slainte mhath, RGB

-- 
Richard Guy Briggs   --~\ Auto-Free Ottawa! Canada
www.TriColour.net--\@   @   www.flora.org/afo/
No Internet Wiretapping!--   _\\/\%___\\/\%Vote! -- Green.ca
www.FreeSWAN.org___GTVS6#790__(*)___(*)(*)___www.Marillion.com

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Columbia crypto box

2003-02-08 Thread Richard Guy Briggs
On Sat, Feb 08, 2003 at 01:36:46PM -0500, Adam Fields wrote:
 On Sat, Feb 08, 2003 at 01:24:14PM -0500, Tim Dierks wrote:
  There may be more valid reasons for treating the device as secret; some 
  categories that come to mind include protecting non-cryptographic 
  information, such as the capabilities of the communication channel. Also, 
  many systems on the shuttle are obsolete by modern standards, and it's 
  possible that the communications security is similarly aged.
 
 Isn't it also possible that the device contains a physical key of some
 kind?

Right, which should be different for each vehicle/flight and if it is
used for control of that particular vehicle/flight, is pretty moot now...

Having said that, if there was sensitive content in those transmissions
that was in addition to real-time control of the vehicle, there would be
a significant interest in preventing others from acquiring it.  This
seems like a weakness of the system.

   - Adam

slainte mhath, RGB

-- 
Richard Guy Briggs   --~\ Auto-Free Ottawa! Canada
www.TriColour.net--\@   @   www.flora.org/afo/
No Internet Wiretapping!--   _\\/\%___\\/\%Vote! -- Green.ca
www.FreeSWAN.org___GTVS6#790__(*)___(*)(*)___www.Marillion.com

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



[no subject]

2001-12-04 Thread Richard Guy Briggs

On Tue, Dec 04, 2001 at 03:32:04PM +0800, Enzo Michelangeli wrote:
 Actually, the authentication is not performed by Visa, but by the issuer
 (the member bank that has issued the card). Visa only manages a directory
 server where the merchant's plugin looks up the first six digits of the card
 number (a.k.a. the issuer BIN) and finds the URL of the Issuer
 Authentication Control Server. The merchant plugin then redirects the
 buyer's browser to that server, which in turn authenticates the buyer in any
 way it deems fit (normally, a password or PIN). Visa, merchant and acquiring
 bank are all out of the authentication loop: the process only involves
 issuer and cardholder.
 
 If the authentication is successful, the Issuer ACS certifies the card
 number (basically, signing it) and redirects the browser to the merchant's
 plugin, which verifies the issuer's signature (through a Visa-issued root
 cert) and proceeds. Only then it the transaction submitted for
 authorization.

So if I understand this correctly, if I am running a client, for which
there is no plugin, I am screwed?  This seems pretty limiting.

 Enzo

slainte mhath, RGB

-- 
Richard Guy Briggs   --~\ Auto-Free Ottawa! Canada
www.TriColour.net--\@   @   www.flora.org/afo/
No Internet Wiretapping!--   _\\/\%___\\/\%Vote! -- Green.ca
www.FreeSWAN.org___GTVS6#790__(*)___(*)(*)___www.Marillion.com



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]