- It was possible to alter the machines so that a ballot cast for one candidate would be recorded for another.
- Vendors installed uncertified versions of voting system software at the local level.
- Access was easily compromised and did not require a widespread conspiracy. A small handful of people is sufficient to steal an election.
Chains Of Habits Are Too Light To Be Felt Until They Are Too Heavy To Bear.
Thursday, October 25, 2012
Evidence of a Stolen Election by Paul Craig Roberts
Some voting machines did not encrypt cast ballots or system audit logs, and it was possible to alter both without being detected.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment