Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - New York Investigators Obtain Fraudulent Ballots 97 Percent of Time (nationalreview.com) 8

cold fjord writes: National Review reports, "New York City’s Department of Investigation (DOI) has just shown how easy it is to commit voter fraud that is almost undetectable. Its undercover agents were able to obtain ballots for city elections a total of 61 times — 39 times using the names of dead people, 14 times using the names of incarcerated felons, and eight times using the names of non-residents. On only two occasions, or about 3 percent of the time, were the agents stopped by polling-place officials. In one of the two cases, an investigator was stopped only because the felon he was trying to vote in the name of was the son of the election official he was dealing with. Ballot security in checking birth dates or signatures was so sloppy that young undercover agents were able to vote using the name of someone three times their age who had died. As the New York Post reports: “A 24-year female was able to access the ballot at a Manhattan poll site in November under the name of a deceased female who was born in 1923 and died in April 25, 2012 — and would have been 89 on Election Day.” All of the agents who got ballots wrote in the names of fictitious candidates so as not to actually influence election outcomes."

Comment Re:KNetworkManager (Score 4, Interesting) 341

Well actually, you can stash the password in a system-level store, like a keychain, so it's not in plaintext. AFAIK that's what mac os x does.

They don't have to use plaintext - they could use, say, blowfish. Sure they key would have to be stored somewhere. But anything that isn't plaintext is more work to crack. It's substantially more work to dig a key out of a system and decrypt something than it is to do a

cat pasword_file

As someone once said, security is about layers. Sure the password will be unencrypted in RAM - but you don't have to make it easy for people to get it. Is WEP better than no encryption? Sure - the extra 10 minutes may dissuade someone and they'll move on. Plus breaking the encryption means intent, which may be useful if there ever was a court case stemming from the activity.

There's a big difference between "yeah, i broke the encryption, it was so easy" and "I just sort of stumbled on this network."

Comment Methods, not intel (Score 4, Insightful) 572

Luckily for the NSA, the guardian hasn't said anything about specific operations or people involved. The releases have been about methods and reach, which aren't the same. The only surprises there are that the NSA was more active than most people thought.

There's nothing in there that's mind-glowingly unbelievable, like the NSA hooked up some kind of transmitter to an eyeball and has been using that realtime video feed to monitor meetings.

Of course, there are a few more million documents, but I'm sure the really juicy ones are being withheld.

Comment Advertising (Score 1) 104

They can just stick a small ad before or after a picture is shown. If the content is amusing enough, people will click through.

They have to watch out that they don't make it a pain in the ass to bypass the ad. They already know this - not very many people like ads in general.

Comment NSA logic at its best (Score 4, Insightful) 199

Program A was never designed to do B

Program A was designed to do C, which could help in B

So by saying that A didn't help B is incorrect. C didn't do B. A helped C as designed.

This sort of retarded logic is all too common when technical people try and justify their failure.

The program as a whole hasn't worked. The metadata collection is part of the program, and it may be doing great - but it's value is basically 0, because the program's value is 0.

Of course we've spent billions of dollars on it with no real return. So there's that. It's kept a bunch of storage companies alive.

Slashdot Top Deals

To do nothing is to be nothing.

Working...