{"id":4569,"date":"2007-05-20T17:57:22","date_gmt":"2007-05-21T00:57:22","guid":{"rendered":"http:\/\/www.bradblog.com\/?p=4569"},"modified":"2007-05-21T18:44:55","modified_gmt":"2007-05-22T01:44:55","slug":"sunday-night-e-voting-video-of-the-moment-nbcs-heroes-hacks-an-election","status":"publish","type":"post","link":"https:\/\/bradblog.com\/?p=4569","title":{"rendered":"Sunday Night E-Voting Video of the Moment: NBC&#8217;s HEROES Hacks an Election"},"content":{"rendered":"<p>If the GOP can, in the course of selecting their own Presidential nominee, <a href=\"http:\/\/rawstory.com\/news\/2007\/Oped_GOP_candidates_impersonated_Jack_Bauer_0518.html\">use a fictional TV show<\/a> to highlight dangers, real or imagined, that face America, so can we point to a fictional networkwide election hacking scenario as recently seen on a popular TV show. Fictionalized or otherwise, the premise behind this TV hack is based on a <i>real<\/i> and documented vulnerability of electronic voting machines and underscores the dangers they pose to American democracy.<\/p>\n<p>The following compilation of a few scenes from last week&#8217;s <i>HEROES<\/i> on NBC demonstrates a very real scenario: the ability of a single person to hack an election via inappropriate access to a voting machine &#8212; the type of access regularly granted to election officials, voting machine company employees, and poll workers allowed to take voting machines home for &#8220;sleepovers&#8221; prior to elections.<\/p>\n<p>While the inappropriate access by <i>this<\/i> particular person in the following clip is obviously a fantasy, the premise underscoring the scenario is anything but &#8212; at least if you&#8217;re one of those reality-based folks who still believe in the expertise of scientists, peer-reviewed university studies and reports by the Government Accountability Office (GAO), etc.<\/p>\n<p>Enjoy&#8230;<\/p>\n<p><center><object classid=\"clsid:D27CDB6E-AE6D-11cf-96B8-444553540000\" width=\"320\" height=\"240\" codebase=\"http:\/\/download.macromedia.com\/pub\/shockwave\/cabs\/flash\/swflash.cab\"><param name=\"movie\" value=\"https:\/\/bradblog.com\/video\/heroes_election.swf\"><param name=\"quality\" value=\"high\"><param name=\"bgcolor\" value=\"#000000\"><embed src=\"https:\/\/bradblog.com\/video\/heroes_election_player.swf\" quality=\"high\" bgcolor=\"#000000\" width=\"320\" height=\"240\" name=\"https:\/\/bradblog.com\/video\/heroes_election_player.swf\" play=\"true\" menu=\"true\" loop=\"false\" allowScriptAccess=\"sameDomain\" type=\"application\/x-shockwave-flash\" pluginspage=\"http:\/\/www.macromedia.com\/go\/getflashplayer\"><\/embed><\/object><\/center><\/p>\n<p>(<i>Thanks to Alan Breslauer for the smart edit, and to <a href=\"http:\/\/www.Bradblog.com\">BRAD BLOG<\/a> emailer and <\/i>HEROES<i> fan, Corey K. for the heads up!<\/i>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If the GOP can, in the course of selecting their own Presidential nominee, use a fictional TV show to highlight dangers, real or imagined, that face America, so can we point to a fictional networkwide election hacking scenario as recently seen on a popular TV show. Fictionalized or otherwise, the premise behind this TV hack [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":""},"categories":[106],"tags":[],"coauthors":[],"class_list":["post-4569","post","type-post","status-publish","format-standard","hentry","category-election-fraud"],"acf":[],"_links":{"self":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/posts\/4569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4569"}],"version-history":[{"count":0,"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/posts\/4569\/revisions"}],"wp:attachment":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4569"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcoauthors&post=4569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}