{"id":1934,"date":"2006-07-14T06:01:38","date_gmt":"2006-07-14T12:01:38","guid":{"rendered":"http:\/\/www.edgewiseblog.com\/mjh\/uncategorized\/a-single-person-could-swing-an-election\/"},"modified":"2006-07-10T20:01:59","modified_gmt":"2006-07-11T02:01:59","slug":"a-single-person-could-swing-an-election","status":"publish","type":"post","link":"https:\/\/www.edgewiseblog.com\/mjh\/uncategorized\/a-single-person-could-swing-an-election\/","title":{"rendered":"A Single Person Could Swing an Election"},"content":{"rendered":"<p><a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2006\/06\/27\/AR2006062701451.html?referrer=email\">A Single Person Could Swing an Election<\/a> By Zachary A. Goldfarb, Special to The Washington Post<\/p>\n<p>To determine what it would take to hack a U.S. election, a team of cybersecurity experts turned to a fictional battleground state called Pennasota and a fictional gubernatorial race between Tom Jefferson and Johnny Adams. It&#8217;s the year 2007, and the state uses electronic voting machines.<\/p>\n<p>Jefferson was forecast to win the race by about 80,000 votes, or 2.3 percent of the vote. Adams&#8217;s conspirators thought, &#8220;How easily can we manipulate the election results?&#8221;<\/p>\n<p>The experts thought about all the ways to do it. And they concluded in a report issued yesterday that it would take only one person, with a sophisticated technical knowledge and timely access to the software that runs the voting machines, to change the outcome.<\/p>\n<p><a href=\"http:\/\/www.brennancenter.org\/presscenter\/releases_2006\/pressrelease_2006_0627.html\">The report<\/a>, which was unveiled at a Capitol Hill news conference by New York University&#8217;s Brennan Center for Justice and billed as the most authoritative to date, tackles some of the most contentious questions about the security of electronic voting.<\/p>\n<p>The report concluded that the three major electronic voting systems in use have significant security and reliability vulnerabilities. &#8230;<\/p>\n<p>Voting machine vendors have dismissed many of the concerns, saying they are theoretical and do not reflect the real-life experience of running elections, such as how machines are kept in a secure environment. &#8230;<\/p>\n<p>&#8220;This report is based on speculation rather than an examination of the record. To date, voting systems have not been successfully attacked in a live election,&#8221; said Bob Cohen, a spokesman for the Election Technology Council, a voting machine vendors&#8217; trade group. &#8230;<\/p>\n<p>&#8220;It&#8217;s not a question of &#8216;if,&#8217; it&#8217;s a question of &#8216;when,&#8217; &#8221; [Thomas M. Davis III (Va.), chairman of the House Government Reform Committee] said of an attempt to manipulate election results.  <span class=\"mine\">[mjh: Like Ohio in 2004?]<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Single Person Could Swing an Election By Zachary A. Goldfarb, Special to The Washington Post To determine what it would take to hack a U.S. election, a team of cybersecurity experts turned to a fictional battleground state called Pennasota and a fictional gubernatorial race between Tom Jefferson and Johnny Adams. It&#8217;s the year 2007, &hellip; <a href=\"https:\/\/www.edgewiseblog.com\/mjh\/uncategorized\/a-single-person-could-swing-an-election\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">A Single Person Could Swing an Election<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1934","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/posts\/1934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/comments?post=1934"}],"version-history":[{"count":0,"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/posts\/1934\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/media?parent=1934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/categories?post=1934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edgewiseblog.com\/mjh\/wp-json\/wp\/v2\/tags?post=1934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}