Drunken elephants go on rampage after "getting into" the rice beer

Stories

At least 6 in India killed after elephants get into rice beer

Dec 17, 2002 – At least six persons were crushed to death by wild elephants that went amok after getting drunk on rice beer near Guwahati, India. A forest official said the herd went on the rampage Monday in Tinsukia district.

“They smashed huts and plundered granaries and broke open casks to drink rice beer. The herd then went berserk killing six persons,” according to a Reuters report.

Wild elephants have been targeting areas where people brew large volumes of rice beer. “We have come across devastating drunken bouts by herds that have developed a liking for country liquor,” Kushal Sharma, a noted elephant expert, said.

In the last two years, elephants have killed at least 150 people. Villagers, in turn, have killed up to 200 of the animals.

oasisiphp.gif

Edie Brickell Keyboardist Shot Dead In Dallas

Stories

The New York Times


September 5, 2007

Musician Is Killed for Banging on a Door

DALLAS, Sept. 4 — A Texas rock musician was shot to death here early Monday by a neighbor who fired through a closed door, thinking he was scaring off a burglar.

The incident occurred just three days after a new law took effect strengthening the right of Texans to use deadly force to protect themselves and their property.

The musician, Jeffrey Carter Albrecht, 34, a keyboardist with Edie Brickell and the New Bohemians and the Dallas rock band Sorta, was shot in the head after he startled a man and his wife about 4 a.m. by pounding and kicking at their back door, the police said. Mr. Albrecht had just assaulted his girlfriend, who lives next door and had locked him out of her house, the police said.

The neighbor, who has not been identified by the police, was awakened by his wife’s screams that someone was breaking into their home, according to the police report. The man yelled for the person to go away, but when the pounding continued, he fired through the top of the door.

Mr. Albrecht, who was about 6-foot-5, was struck in the head.

The police said the case would be referred to a grand jury for review. Mr. Albrecht’s mother, Judith Albrecht, would not say whether she thought the neighbor should be charged with a crime.

“I think he was frightened, and I do think he could have made another choice,” Ms. Albrecht said. “I understand there are a lot of bad people, but Carter was not one of them.”

Mr. Albrecht’s girlfriend, Ryann Rathbone, said she believed he was having a bad reaction to the combination of alcohol and an antismoking drug they both had taken for a week. The drug had given them hallucinatory dreams, Ms. Rathbone said.

“This was not a drunken rage,” she said.

“Carter would never have hurt me, ever,’’ Ms. Rathbone said.

Texas has protected the right to “stand your ground” and use deadly force to protect oneself at home without first trying to retreat since 1995. And a law that took effect on Saturday expanded that so-called “castle doctrine” to apply to public spaces.

The law also expanded civil immunity and could make it more difficult for the Albrecht family or relatives of those killed in similar incidents in Texas to win a wrongful-death suit, said James Dark, executive director of the Texas State Rifle Association, which lobbied for the new law.

“These duty-to-retreat laws provide legal protection for those who are out committing criminal acts,” Mr. Dark said. Under the new Texas law, “the protection of the law falls on those who obey the law not those who violate the law.”

Texas is one of 19 states with a castle doctrine self-defense law, according to the National Rifle Association.

Marsha McCartney, president of the North Texas chapter of the Brady Campaign to Prevent Gun Violence, called Mr. Albrecht’s death “one more gun tragedy.”

“I’m sure the man who did the shooting feels terrible about it,” Ms. McCartney said, “but legally in Texas he can do exactly what he did because he feels frightened.”

Borris Miles, a Democratic state representative from Houston and a former schools police officer, opposed the legislation, which was signed into law in March.

In July, Mr. Miles confronted a robber at his home construction site and shot him in the leg. No charges were filed, but he said he still opposed the new law.

“We have a right to defend ourselves in our home. I support that and I always will,” Mr. Miles said. But the law went too far, he said, by expanding the right to use deadly force in the workplace and one’s automobile.

PEGGY NOONAN'S ACID TRIP

9/11, Bin Laden, Rove

A Time for Grace
America needs unity in dealing with Iraq. That means the president must lead.

Friday, August 31, 2007 12:01 a.m.

What will be needed this autumn is a new bipartisan forbearance, a kind of patriotic grace. This is a great deal to hope for. The president should ask for it, and show it. Gen. David Petraeus, the commander of U.S. forces in Iraq, will report to Congress on Sept. 11. From the latest metrics, it’s clear the surge has gained some ground. It is generally supposed that Gen. Petraeus will paint a picture of recent decreases in violent incidents and increases in safety. In another world, that might be decisive: It’s working, hang on.

At the same time, it’s clear that what we call Iraq does not wholly share U.S. objectives. We speak of it as a unitary country, but the Kurds are understandably thinking about Kurdistan, the Sunnis see an Iraq they once controlled but that no longer exists, and the Shia–who knows? An Iraq they theocratically and governmentally control, an Iraq given over to Iran? This division is reflected in what we call Iraq’s government in Baghdad. Seen in this way, the non-latest-metrics way, the situation is bleak.

Capitol Hill doesn’t want to talk about it, let alone vote on it. Lawmakers not only can’t figure a good way out, they can’t figure a good way through.

But we’re going to have to achieve some rough consensus, because we’re a great nation in an urgent endeavor. The process will begin with Gen. Petraeus’s statement.

Particular atmospherics, and personal dynamics, are the backdrop to the debate. People are imperfect, and people in politics tend to be worse: “Politics is not an ennobling profession,” as Bill Buckley once said. You’d better be pretty good going in, because it’s not going to make you better. Politicians are individuals with a thirst for power, honors, and fame. When you think about that you want to say, “Oh dear.” But of course “democracy is the worst form of government, except for all the others.”

All sides in the Iraq debate need to step up, in a new way, to the characterological plate. From the pro-war forces, the surge supporters and those who supported the Iraq invasion from the beginning, what is needed is a new modesty of approach, a willingness to admit it hasn’t quite gone according to plan. A moral humility. Not meekness–great powers aren’t helped by meekness–but maturity, a shown respect for the convictions of others.

What we often see instead, lately, is the last refuge of the adolescent: defiance. An attitude of Oh yeah? We’re Lincoln, you’re McClellan. We care about the troops and you don’t. We care about the good Iraqis who cast their lot with us. You’d just as soon they hang from the skids of the last helicopter off the embassy roof. They have been called thuggish. Is this wholly unfair?

The antiwar forces, the surge opponents, the “I was against it from the beginning” people are, some of them, indulging in grim, and mindless, triumphalism. They show a smirk of pleasure at bad news that has been brought by the other team. Some have a terrible quaking fear that something good might happen in Iraq, that the situation might be redeemed. Their great interest is that Bushism be laid low and the president humiliated. They make lists of those who supported Iraq and who must be read out of polite society. Might these attitudes be called thuggish also?

Do you ever get the feeling that at this point Washington is run by two rival gangs that have a great deal in common with each other, including an essential lack of interest in the well-being of the turf on which they fight?

Not only hearts and minds are invested in a particular stand. Careers are, too. Candidates are invested in a position they took; people are dug in, caught. Every member of Congress is constrained by campaign promises: “We’ll fight” or “We’ll leave.” The same for every opinion spouter–every pundit, columnist, talk show host, editorialist–all of whom have a base, all of whom pay a price for deviating from the party line, whatever the party, and whatever the line. All this freezes things. It makes immobile what should be fluid. It keeps people from thinking. What is needed is simple maturity, a vow to look to–to care about–America’s interests in the long term, a commitment to look at the facts as they are and try to come to conclusions. This may require in some cases a certain throwing off of preconceptions, previous statements and former stands. It would certainly require the mature ability to come to agreement with those you otherwise hate, and the guts to summon the help of, and admit you need the help of, the other side.

Without this, we remain divided, and our division does nothing to help Iraq, or ourselves.

It would be good to see the president calming the waters. Instead he ups the ante. Tuesday, speaking to the American Legion, he heightened his language. Withdrawing U.S. forces will leave the Middle East overrun by “forces of radicalism and extremism”; the region would be “dramatically transformed” in a way that could “imperil” both “the civilized world” and American security.

083107map.jpg

Forgive me, but Americans who oppose the war do not here understand the president to be saying: Precipitous withdrawal will create a vacuum that will be filled by killing that will tip the world to darkness. That’s not what they hear. I think they understand him to be saying, I got you into this, I reaped the early rewards, I rubbed your noses in it, and now you have to save the situation.

His foes feel a tight-jawed bitterness. They believe it was his job not to put America in a position in which its security is imperiled; they resent his invitation to share responsibility for outcomes of decisions they opposed. And they resent it especially because he grants them nothing–no previous wisdom, no good intent–beyond a few stray words here and there.

And here’s the problem. The president’s warnings are realistic. He’s right. At the end of the day we can’t just up and leave Iraq. That would only make it worse. And it is not in the interests of America or the world that it be allowed to get worse.

Would it help if the president were graceful, humble, and asked for help? Why, yes. Would it help if he credited those who opposed him with not only good motives but actual wisdom? Yes. And if he tried it, it would make news. It would really, as his press aides say, break through the clutter. I don’t see how the president’s supporters can summon grace from others when they so rarely show it themselves. And I don’t see how anyone can think grace and generosity of spirit wouldn’t help. They would. They always do in big debates. And they would provide the kind of backdrop Gen. Petraeus deserves, the kind in which his words can be heard.

Ms. Noonan is a contributing editor of The Wall Street Journal and author of “John Paul the Great: Remembering a Spiritual Father” (Penguin, 2005), which you can order from the OpinionJournal bookstore. Her column appears Fridays on OpinionJournal.com.

Canadian Ryan Coniam hired as race engineer for Jacques Villeneuve in 2008 NASCAR Sprint Cup

Stories

 

Burlington racer to be Villeneuve’s NASCAR engineer

TheStar.com – AutoRacing – Burlington racer to be Villeneuve’s NASCAR engineer

September 04, 2007


Motorsport Reporter

6_-_ryan_coniam_-_head_shot_16-123-2-t.jpg

Burlington’s Ryan Coniam has been hired as race engineer for Jacques Villeneuve in the 2008 NASCAR Nextel Cup Series.

Villeneuve, who was world driving champion in 1997, will start his NASCAR career at Las Vegas Motor Speedway on Sept. 22 when he will partner Bill Davis Racing teammate Mike Skinner in a Craftsman Truck Series race.

Villeneuve is expected to drive as many as seven truck races and possibly one Nextel Cup race in ’07 before going into the Cup series full-time in 2008.

The 27-year-old Coniam, former World of Outlaws sprint car star and son of Canadian Motorsport Hall of Fame inductee Warren Coniam, has been living in Mooresville, N.C., where he was employed in research and development for Dale Earnhardt Inc. He was head-hunted by BDR and travelled to Bristol, Tenn., for an interview the weekend of Aug. 25. He was notified last Friday that he has the job and told wheels.ca today that he is absolutely thrilled.

Coniam, who started racing karts when he was seven, has carefully worked his way up the racing ladder. He had seasons in modifieds and limited supermodifieds on pavement and then went sprint-car racing on dirt, spending seasons with the Southern Ontario Sprint Car series and the New York-based Empire Super Sprints.

A move to the highly competitive U.S.-based All Star Circuit of Champions series followed and he won rookie-of-the-year honours and finished top five in points in his first year. He then raced on and off with the World of Outlaws before starting to concentrate on car preparation and team management.

Villeneuve will drive truck No. 27, renumbered in recent days by BDR to honour Villeneuve’s late father, Gilles Villeneuve, who drove Ferrari No. 27.

Jacques Villeneuve also drove with that number on his car when he raced in the CART series in the mid-1990s, winning both the Indianapolis 500 and the CART championship in 1995.

CARLOS AMEZCUELA ROCKS FAT FOX CONTRACT; BAILS ON HAL FISHMAN JOB AT KTLA

Stories

carlos-publicity.jpg

LOS ANGELES TIMES

September 5, 2007

Carlos Amezcua, the longtime KTLA-TV Channel 5 morning news anchor who was viewed as a potential replacement for the late Hal Fishman on the station’s 10 p.m. newscast, has decided to move to rival KTTV-TV Channel 11, station officials said Tuesday.

Amezcua, who has been with KTLA for more than 16 years, had been working as the interim evening news anchor after Fishman died this summer.

“We had hoped that he would be in that position, but obviously things take turns. We’ve got to move forward,” said Rich Goldner, interim KTLA news director.

Variety reported that Amezcua will anchor KTTV’s 10 p.m. newscast beginning this fall, replacing veteran anchor John Beard.

VOTING MACHINES "FATALLY FLAWED"

Stories

OpEdNews


………..the software mechanisms that are intended to secure the systems can be defeated very, very easily……….”
“………I frankly was surprised that the systems we looked at had passed certification. …..”

“…………I think they’re fatally flawed, and that puts us in a real bind……….”

 

Voice of the Voters: Transcript of Matt Blaze Interview

By Mary Ann Gould

TIME TO BAN DREs?????
THE PROBLEMS WITH ELECTRONIC VOTING, ESPECIALLY DRES – A VIEW FROM THE CA TOP TO BOTTOM STUDY
Transcript of Matt Blaze, and Mary Ann Gould on Voice of the Voters!
Dr. Matt Blaze of the University of Pennsylvania and leader of the Sequoia source code review team for California’s Top to Bottom Electronic Voting Investigation
August 8, 2007

MAG: Good evening, Dr. Blaze. We’re glad to have you here, especially with all the notoriety that is going around the country about the top-to-bottom study in California.

MB: Glad to be here.

MAG: I noticed on your blog, which is excellent, www.crypto.com, you noted that you found significant, deeply rooted weaknesses in all three of the vendors’ software. Then you went on to talk about the red team and their finding significant problems because of built-in security mechanisms that they were up against—that they simply don’t work properly.

MB: That’s right. I should start by telling you a little bit about what we did, and what my role in it was. So, the California Secretary of State, Debra Bowen, this Spring, put together a study of the electronic voting technology that’s used in her state, that’s primarily four systems made by Diebold, Sequoia, Hart, and ES&S. What she did is went to the University of California to two professors, one at UC Berkley, David Wagner, and another at UC Davis, Matt Bishop, and asked them to put together teams to review each of these systems in various ways. And in particular, one of the teams was to review the source code of the systems—the programs that run on the voting computers, and on the vote tallying computers back at the county election’s headquarters. And another team was to attempt to use any vulnerabilities that were found to see if these could be exploited to interfere with the proper tallying of votes or interfere in the election, in some way. Now, my role in this was to lead the team that looked at the source code for one of the systems, the Sequoia system, and our reports, the red team reports, and the source code review reports were submitted to the state a few weeks ago, and they’re up on the Secretary of State’s website. So, my role was to basically look at the Sequoia system’s source code and see if there were any security problems in it—to do a security review of the software. Now, after we finished, all the reports found particular problems that were particular to the various systems. There was an overall similarity among them, which is that all three of the reviewed systems (one of the systems wasn’t reviewed; they didn’t submit their source code in time, that was the ES&S system), of the three systems that were reviewed, Diebold, Sequoia and Hart, all of the teams that looked at them just found that the software mechanisms that are intended to secure the systems can be defeated very, very easily. They just don’t work very well, at all. Because of that, the red teams that were to try to penetrate these systems and tamper with election results in a simulated environment had a relatively easy time of it. They were able to succeed at almost everything they tried.

MAG: Now, you indicated that what you found, even in the code alone, was far more pervasive and much more easily exploitable than you had ever imagined it would be. What did you mean by that?

MB: That’s right. It would be unfair to expect any large system to be completely perfect, and really nobody expects that any large software project is going to be completely free of mistakes or bugs or even little security problems. And in fact, election systems are designed with procedures that are intended to tolerate a certain amount of weakness. So we expected that we would find some things that would be wrong. What really surprised me, and I think surprised all of us, was just how deeply rooted the problems were. It wasn’t simply that there were some mechanisms that could be beefed up or that weren’t as good as they could have been, but that every single mechanism that was intended to stop somebody from doing something just didn’t work or could be defeated very, very easily.

Now, two of the three systems, Hart and Sequoia, haven’t really been studied that widely in the public literature, in the academic literature; not much had been known about them before. But the Diebold system, various versions of that have been studied by academics, by researchers, who had found that there were problems. But even there, the problems that were found by the Diebold team included some things that hadn’t been found before.

MAG: Well, Harri Hursti, on our program, had said two things: one, that there was an overall weakness in the architecture and that basically, the equipment that he had looked at has not been built for quality.

MB: I’d say there really are two problems. This is really another way of putting that. The first, as you said: there’s a problem with the architecture, and by the architecture, what I mean is the design of the system. Even if it were built absolutely perfectly, the way it was designed puts security at a bit of a disadvantage. That is, the way these systems are designed, if you compromise one component, one voting machine somewhere, it becomes easier than it should be to interfere with the election results. The architectures of the systems aren’t designed with enough built-in checks and balances and built-in—essentially—mistrust of the possibility of mistakes to tolerate the kinds of problems that come up in any system run by people. So you can look at the overall design of these systems and tell right off the bat that this design was not as good for security as it could be. But, compounding that problem, when we actually went and looked inside these systems and looked at the source code that runs them, not only is the design weak, but the implementation itself is weak. The code has bugs in it, there are some fundamental security weaknesses that could have been avoided by better programming. So that makes that weak architecture that much worse, because the weaknesses that you might be able to exploit are just all over the place.

MAG: How did these machines get certified?

MB: There’s a federal certification process in which the design is submitted and the source code is submitted to what’s called an independent testing authority, and they look at the code and make sure, and they’re supposed to make sure, that the code is written according to certain standards. They look at the actual machines and they test them. I frankly was surprised that the systems we looked at had passed certification.

MAG: Then that’s my question. How did they get past that certification?

MB: I think you’d have to ask the testing authorities. It frankly baffles me.

MAG: Okay. Then we get to the bottom line, I guess. Are the problems fixable, or do we have systems that might be fatally flawed?

MB: I think they’re fatally flawed, and that puts us in a real bind. We can’t just postpone our elections until the technology is ready. So we really have two problems: one, which in a lot of ways is the easier of the two problems, is what do we do in the long term? How would we design a good, secure election system for use in three to five years from now? And I think there are a number of ways we might do that, and we can talk about them. But we’re still left with the problem of what will we do in November and what will we do in the primaries, and what do we do in the presidential election in 2008?

MAG: And those are very serious situations. First, I’d like to ask on DREs, direct recording electronics, or many people call them touch-screen machines: Even if we had a printer put on them, would that solve the problem?

MB: So there’s a concept with these touch-screen DRE voting machines, a concept called a voter-verified paper trail. The idea here is that votes are recorded electronically, but before you finalize casting your vote, there’s a little printer, similar to a cash register receipt printer, next to the machine, usually behind glass, that prints out the votes that the machine is recording, all the different candidates in each race it thinks you voted for. What you’re supposed to do is, before pressing the “Yes, I want to cast my vote” on the touch-screen display, you should look at that voter-verified paper trail print-out and confirm that it actually reflects your vote, and at that point, it should print out on that display “Vote confirmed, scroll forward,” and then the display on the screen will go blank and let the next person vote. So this is intended to improve the reliability and the security of these machines, because it means that there is now a paper record of what’s been voted for, so if the electronic record is tampered with, or is lost, or is challenged later on, you can go to these print-outs and count up the votes that the machines printed out. Now, this does, in fact, prevent a number of ways of attacking these machines, a number of types of vote tampering pretty well, but they’re not perfect; they don’t solve the problem as well as we’d need them to, and probably not well enough to use with the kinds of machines that we’ve seen here. The first problem is that the paper trail produced by these printers only gets counted if there’s an actual recount. It’s a very labor-intensive process to go through all the voting machines and count up each of the tallies in each of the races.

MAG: So on election night, what we get as a result has nothing to do with these paper print-outs.

MB: That’s right. These are just secondary records that are used only if there’s a recount of particular machines, so if there is no recount, then these paper trails are never looked at. So somebody would have to suspect there was a problem, or challenge the results of the election for these paper trail records to even be taken into consideration. So that’s one weakness. Another weakness is that we really don’t know that much about how voters behave with these print-outs. We don’t know if people actually look at them carefully, so if the machine is running software or firmware that’s trying to cheat, it may be able to print out invalid choices right on the printer.

MAG: And I believe that has been found.

MB: So, the behavior of voters— because you know, the voter’s looking at the screen to cast their ballot and there’s this little receipt printer, or this little cash register–type printer on the side, we don’t really know if people look at it carefully enough to tell if their choices are accurately recorded. The other problem is that in these voting machines, the printer itself—many of the characteristics of the printer—are under the control of the software running on the voting machine and so the corrupted voting machine that has bad software loaded into it by someone might be able to print out the paper trail in a very misleading way that might look acceptable to the voter but in fact actually reflects a vote for someone else. For example, it could print out the correct candidates, but then print “cancelled” below them, and then print the candidates that the machine wants to vote for.

MAG: Hmm. Now, we also have the other option with the opscan. Now that too is vulnerable. How would you compare the two?

MB: So, the optical scanning voting systems are a little different. There, rather than voting on a touch-screen, you vote by filling out a piece of paper, one of these optically scanned forms where you usually cross out with a pen or pencil something next to the candidate you want to vote for, so you actually use a paper ballot, and it’s at the voting booth. It’s just a booth; there’s no actual voting machinery where you fill out the form, it’s just a little booth you get privacy to fill out your ballot in. Then you take this ballot and feed this into a scanning device that sits on top of a ballot box and basically the scanning device reads the marks you put on the ballot and figures out who you voted for, records a tally for those candidates in those races, and deposits your ballot in the ballot box. Then, at the end of the election, the electronic results from the optical scanner and the paper ballots are sent back to the election headquarters. Now, what we found in looking again at all these systems is that it’s possible to tamper with the electronic records of optically scanned ballots that are returned from the polling place back to headquarters and change what results are recorded. So these systems, as they’re implemented, are still vulnerable to tampering, but they at least have the benefit that you still have the paper ballots that the voters voted on. And, as long as the ballot boxes are adequately secured, and somebody is watching them and they’re properly sealed, if you suspect there might have been that kind of tampering, you can go back and count the paper ballots in a secure place and find out who the voters intended to vote for.

MAG: Okay. Now, some people say that we can also solve the problem by doing a one to three percent audit. Would that work? Are there some problems that you’ve found?

MB: We didn’t look at auditing procedures in our study in any particular detail, except the procedures as used in California, as they might interact with some of the vulnerabilities that we found. So, I can tell you what they do in California is automatically recount one percent of the precinct results as a kind of safeguard, so one percent of the voting machines will have their paper ballots (if they’re an optical scan system, or if there are voter-verified paper trails) counted and matched against the electronic results that were recorded in those machines. And, if there’s a mismatch, then they know that there was some tampering with those particular machines. Now, this is actually helpful for catching deep problems that affect all of the machines. If, for example, the manufacturer of a voting machine included bad software in every machine that was sent everywhere, the one percent recount procedure would be likely to catch that because the fraud would be uniformly distributed among all of the voting machines. But what this is not as good at catching is targeted fraud where somebody goes to a particular precinct and knows that there will be, for example, a lot of votes for the candidate they don’t want to win, and arranges for those particular machines to run tampered software, which as we showed could be very easily loaded in. The safeguards to prevent that in software don’t work nearly as well as they’re intended to. Now, the one percent recount will only catch that if, by sheer luck, a chance of one in a hundred, the machines that were tampered with get selected for the audit.

MAG: So we have a serious situation. We’ve got a system that you’ve indicated is fatally flawed, the two systems available both have problems; one from your point of view has the advantage, at least, of the voter completing the ballot with their own hand, which could be counted. What, then, can we do for 2008?

MB: Again, we’re in a real bind. I don’t envy the election officials who are going to have to make some very hard decisions, coming up. Now, one thing I should emphasize: we looked only at the software and the systems themselves. We looked at the software. The red teams looked at the hardware as delivered, and tried to tamper with it, using some of the problems that we discovered with the software systems. And what we found was that the software and the hardware don’t prevent tampering. So that’s not the only set of security mechanisms in place in an election. The elections are also protected by procedures and by physical security of the machines themselves. So what our results tell you is that the security system depends entirely on those procedures. Any security that we were relying on the machines to have or the software to have, we shouldn’t assume it’s there; it’s fatally flawed. So what we’re saying is all of the security in an election depends on the security procedures and the protocols and the physical seals and the two-person control by poll workers and election officials and people watching what’s going on—that’s where all of the security comes in. Now, the problem that we have is that those procedures were designed on the assumption that the machines were offering a certain level of security to start with, but in fact they’re not. So those procedures have to be thought out from the beginning very carefully, and whether or not a practical set of procedures can be designed that actually adds security, I’m not sure.

MAG: So you’re really saying that you could have the best security procedures in the world, but if what they’re checking out has problems, it may help a little bit, but you’re still left defenseless.

MB: You have the problem that an election is a logistically very complex event. You may have a thousand polling places in a county, and thousands of poll workers who get a few hours of training and have been basically hired to work just on Election Day, and you may have half a dozen of them in any polling place, carrying out procedures that they do maybe once a year after a few hours of training. The equipment has to be distributed to these polling places; some of them are in lobbies of apartment buildings, in school gyms, sometimes even in private homes. That equipment might be delivered the night before. In some cases, it’s sent home with the poll workers, who bring it to the polling place on the morning of Election Day and basically had it in their homes overnight and had access to it completely without restriction. So building a physical security system that prevents anybody from tampering with equipment in such a complicated event and with so many people involved, this is going to be very hard.

MAG: Well, I understand the Secretary of State of California is going to institute some changes, which may include in some places a hundred percent count. Do you think we may have to do that for 2008?

MB: One of the things that the Secretary of State required was that in many cases the DRE machines all have to have their paper trails recounted—one hundred percent of them, not just one percent. That will certainly prevent certain attacks that would otherwise not be detected with just a one percent recount. They’ve limited the number of DREs for the Diebold and the Sequoia system to just one per polling place in order to accommodate voters with disabilities who can’t use the optical scan ballots without needing assistance, but who might be able to use the DRE machines, and that is intended
to reduce the scale and the number of people who’d have access to the machine throughout the day, to limit what would need to be protected and to make it easier to do that hundred percent recount. These seem like, to me, frankly, very sensible ways of mitigating this. What I’d be less confident in saying is that this is going to give you a secure election, but these seem like steps in the right direction. It’s certainly more secure than not doing these things.

MAG: Now I’ll put you on the spot: Congress is apparently finally waking up and is supposedly considering banning DREs and giving states money to replace [them] with optical scan. Would you support that?

MB: That seems, from what we’ve seen, my opinion, and I’m speaking only for myself, is that that would make me feel a lot more comfortable with the security of these elections.

MAG: But you would still like to see a fair number of procedural changes, as well.

MB: That’s right. We still need procedural changes, we still need to look at the security of the optical scan ballots, but I think the most serious problems we found, and most importantly, the ones that are hardest to correct, once they’ve happened, are the problems with the DREs.

MAG: That even raises the question, because you mentioned checks and balances, and that’s pretty important; I’m wondering if you could ever design and have a DRE system that would meet that, because a DRE system, even with a printer, would never be a separate and independent system.

MB: The disadvantage of a DRE is that the voters’ intentions—are touching a screen, this ephemeral process, that, at the end of it, you’re left with only the record produced by the machine, you’re not left with something that the voter has produced themselves, so you don’t know if it’s an accurate reflection of what they actually intended. So, DREs start from a security disadvantage right there. Now, it’s important not to confuse DREs with touch-screens.

MAG: Understood.

MB: This, I think, has been a source of considerable confusion on the issue because people often equate the nice user interface of a touch-screen, which many voters, particularly disabled voters, like quite a bit because you can, for example, have assistive devices hooked up to it that will speak in different languages, you can have sip and puff interfaces for mobility-impaired voters, and so on. These are all very important considerations, but they don’t actually require a DRE machine in order to accommodate these voters.

MAG: Do you think that we’re going to be faced in 2008 with doing a lot more hand counting to give us any security?

MB: Well, I think if we want secure elections, with the equipment at least that we looked at, we’re going to have no alternative.

MAG: Is there any reason for you to think that, and here again, this is strictly your opinion, that the equipment you didn’t examine, although it covers a large majority, that it would be that much different?

MB: Well, all we can do is speculate. We looked at three. Of the three we looked at, all of them were very deeply and pervasively flawed. Are the others any better? I suppose it’s possible that they are, but unfortunately, they haven’t been looked at with the same kind of scrutiny.

MAG: So, how do you feel as a Pennsylvanian and living in Philadelphia, where you have a Danaher machine which actually doesn’t even have a print-out, and you will be going, unless there is a change, up to that machine, entering your vote and not knowing where it went? How secure will you feel in 2008 if we have no change?

MB: Well, I hope that the procedures that are put in place in Philadelphia to prevent tampering are really sound.

MAG: But we still have that problem without any proof.

MB: That’s right.

MAG: Okay. Is there anything else that our audience should know, and is there anything Congress should be aware of?

MB: Well, I think one of the things we need to recognize is that these voting machines, the DREs, and the systems that count the votes, and the optical scan systems, these are all computers. They don’t look like personal computers, they don’t have the same keyboard and the same display, but on the inside, they’re computers that run software, and they’re running very complex software that performs a specialized task that only gets tested out a few times a year, and may not be stress-tested in a hostile environment very often in its life at all. Now, writing software that’s correct and that’s secure is a very, very difficult problem. It’s really the fundamental problem that computer science has been grappling with and has not succeeded in solving for its whole history. So, building a secure voting system out of software is already a very difficult problem, because designing software itself is a hard problem. So scrutiny and skepticism are really the only safeguards we have here.

MAG: And what about for Congress? Do you think it is time they re-look at this?

MB: It’s a shame, and again, I’m speaking only for myself here.

MAG: Understood.

MB: It’s a shame that after the 2000 election, with the butterfly ballot and so on, there was a real national consensus that it was important to make voting more reliable. I think everyone agreed with this very important goal that we should modernize elections and make them as reliable as possible. Unfortunately, we really rushed into buying equipment everywhere in the country that really wasn’t ready, and I think the only way we are going to solve this problem is by recognizing that we’ve got to do a careful design. We’re going to be left with whatever equipment we buy, whatever systems are put in place, we’re going to have them for a while, and this is something our democracy vitally depends on, so this is worth doing right.

MAG: Well, I would invite all our listeners, in addition, to play a game. I found that your Vendor Excuse Bingo is absolutely ingenious and fantastic. Where could they find it?

MB: There’s a link to it on my blog. I should say, I don’t want to make light of this, because this is very, very serious; but an unfortunate property of vendors of software, whether it’s voting machines or web servers, who have had their software exposed to scrutiny and discovered that it’s not as secure as it should be is to deny and threaten and so on. So I’ve put together a little bingo game with some of the common vendor responses to these kinds of things that I think we’re likely to hear in the voting machine case, but we often hear in computing in general.

MAG: And that website is?

MB: The website is www.crypto.com/blog.

MAG: Well, I want to thank you.

MB: And I should also say, if I can just interrupt very quickly. Go to the source: the Secretary of State’s website in California has all of our reports. We tried to make them as readable as possible.

MAG: And you did an excellent job and I think you did a tremendous service for this country and thank you very much.

MB: Thank you.

Authors Bio: Mary Ann Gould is a founding member of the Pennsylvania-based Coalition for Voting Integrity.

B-52 Carrying 5 Nuclear Warheads Mistakenly Flew Across United States

Stories

BREAKING:FROM CROOKS AND LIARS

air_b-52_landing_lgthumbnail.jpg From Americablog:

CNN’s Barbara Starr has been breathlessly reporting the news that a B-52, loaded with nuclear warheads, flew across the country last week — without anyone’s knowledge. It has caused quite a stir in the military. Starr reports that Bush had to be informed about the mistake. Here’s an NBC report:

An Air Force squadron commander has been relieved of his command after five nuclear weapons were mistakenly loaded aboard a B-52 and flown cross-country from North Dakota to Louisiana last week, NBC News reported.

Five 150-kiloton warheads were attached to cruise missiles that were flown from Minot Air Force Base in North Dakota to Barksdale Air Force Base in Louisiana to be dismantled, but they should have been removed, according to officials.

Military officials insist the warheads remained “under control” at all times and did not pose a danger.

That’s comforting.

More information as it becomes available.

WORST HEADLINE EVER

Stories

Fire Illuminates Burning Man Complaints

SAN FRANCISCO (AP) — After the signature effigy of the Burning Man festival went up in flames four days ahead of schedule, festival-goers vowed to rebuild the 40-foot icon by Saturday’s planned climax. But not everyone was disappointed by Tuesday’s incineration.

aleqm5htshvmrawyxskri61pl_q9ab6xqa.jpg

The alleged torching of the wood-and-neon figure by a San Francisco performance artist has cast light on the disillusionment of many who feel the annual celebration of radical self-expression has lost touch with its spontaneous, subversive roots.

“People have been trying to set that thing on fire for years,” said Hugh D’Andrade, a San Francisco artist who attended the festival for many years. “This is not a new phenomenon.”

Organizers trace the first Burning Man back to a 1986 party on a San Francisco beach where Larry Harvey, who still runs the festival, set ablaze a crude 8-foot wooden figure.

Since then, the event has evolved into a weeklong gathering of nearly 40,000 people who descend on the Black Rock Desert in northwestern Nevada around Labor Day each year to celebrate countercultural creativity.

In San Francisco, especially, Burning Man has emerged as a kind of underground high holiday as legions of so-called Burners devote the rest of the year to choreographing fire dances, decorating art cars and building elaborate interactive sculptures.

The event has become such a mainstay of the city’s cultural calendar that Burner parents in 2005 unsuccessfully urged the San Francisco school board to postpone the first day of school so their children could attend.

But the rise in Burning Man’s popularity has also brought a backlash.

In the immediate aftermath of this week’s unscheduled burn, gleeful expressions of approval for the alleged prank rained down on blogs and Internet forums.

Some comments came from conservative posters ready to mock anything carrying a hint of hippiedom.

But many originated from self-described former attendees complaining that Burning Man has been spoiled by crowds of “yuppies” and “frat boys” mostly interested in doing drugs and ogling naked participants.

Steven Black, a 40-something librarian at the University of California, Berkeley, has attended Burning Man 11 times. But even though he had a ticket this year, he said, he didn’t go.

“What has happened here is giving pause for a degree of introspection and reflection on what it means to burn this man that is perhaps long overdue,” Black said.

According to Black, Burning Man’s huge crowds have attracted heavy law enforcement attention to an event that was originally meant to be an exultation, leaving him feeling “less secure and less free” than if he had just stayed home.

Paul Addis, 35, of San Francisco, who is accused of setting fire to the Burning Man, posted $25,632 bond and was released from jail in Pershing County, Nev., on Tuesday. He was arrested on suspicion of arson, illegal possession of fireworks, destruction of property and resisting a public officer, according to the sheriff’s department.

Known on the city’s art scene for playing gonzo journalist Hunter S. Thompson on stage, Addis has apparently had long-standing gripes against the festival. In a letter published in a local alternative newspaper in 2002, a person using the same name complained about the imposition of rules he felt were spoiling the event.

“Those rules and judgments, such as what art is permitted in B(lack) R(ock) C(ity) and radical free expression’s outer limits are determined in line with what will make the most money for B(urning) M(an) and generate the fewest potential controversies in the media,” the person wrote.

Law enforcement officials said they did not know Addis’ whereabouts after his release. Calls to a telephone number listed for him in San Francisco were not answered.

A spokeswoman for Burning Man organizers did not respond to messages seeking comment.

Despite the criticism, even disenchanted Burners like D’Andrade haven’t completely written off the festival.

“When I first started going, they already said it was over,” said D’Andrade, who went to his first Burning Man in 1999 and designed the ticket for this year’s event, though he hasn’t attended since 2005. “New people are still getting a big blast of all the positive elements that have made it what it is.”