
“The 2010 discovery of the Stuxnet cyberweapon, which used a thumb drive to attack Iran’s nuclear facilities and spread among its computers, illustrated how one type of attack could work. Most at risk are paperless e-voting machines, which don’t print out any record of votes, meaning the electronically stored results could be altered without anyone knowing they had been changed. In a tight election, the result could be the difference between winning and losing. A Monitor analysis shows that four swing states – Pennsylvania, Virginia, Colorado, and Florida – rely to varying degrees on paperless machines.”
Related posts:
Tens of thousands of government workers hired to roll out Obamacare
UN: New generation of secret British courts could conceal torture collusion
Federal case against Bundy supporters falls apart as jury refuses to convict
Huntington’s gene therapy breakthrough may stop disease
Europe To Pay Iran In Euros For Oil, Abandoning The Dollar
Tons of radioactive water pouring out of crippled Fukushima nuclear plant
Paulson claimed Russia 'planned Wall Street bear raid' in 2008
Nobel laureates urge end to Syria hospital attacks
Despite Legal Costs, Big Six U.S. Banks’ 2013 Profit 2nd Highest Ever
Iraq-Turkey oil export pipeline seen back in 72 hours after new attack
Pennsylvania tax collector sold weed outside courthouse
Building superintendent mistakes tomato plants for pot, and so did cops he called
UnitedHealth warns it may exit Obamacare plans
Study: At least 4.1% of U.S. death row defendants are innocent
Government investigating whether free app games target children for commercial gains