Review: Hacks, lies and videotape
Election integrity advocate Brad Friedman looks at HBO's Hacking Democracy
Computerworld - I believe in full transparency. So allow me to disclose to you that I didn't come to Hacking Democracy, HBO's new documentary on e-voting in America, with an unbiased perspective on the electronic voting machines that an unprecedented number of Americans will encounter at the polls in next week's general elections.
In fact, I'm one of those who have been labeled "conspiracy theorist" or "technophobe," despite years of experience as a computer programmer. Where do labels like those come from? Well, to quote the film:
"It makes me cry. I'm sorry but it does. ... There are people out there who are giving their lives to make sure our elections are secure. They're being called conspiracy theorists and technophobes. And these vendors are lying and saying that everything's all right and it's not all right."
-- Susan Pynchon, election integrity activist from the Florida Fair Elections Coalition, after serving as an eyewitness to the first known hack of a Diebold optical-scan voting machine, December 2005
Kathleen Wynne and Bev Harris (Image courtesy HBO's documentary, "Hacking Democracy")
If HBO's new documentary gets even a fraction of the eyeballs it deserves, it's hard to see how it could miss having a profound effect on the electoral process. Then again, with the overwhelming evidence already available, it's unimaginable that next week we will actually be heading to polling places nationwide where more than 80% of America's votes will be tabulated by hackable, inaccurate, unreliable electronic voting machines using 100% secret software to record and tabulate our votes.
And yet here we go.
Hacking Democracy is the culmination of three years of work by filmmakers Simon Ardizzone, Robert Carrillo Cohen and Russell Michaels, who have documented some of the most mind-blowing moments in the short, storied and sordid history of American e-voting. Other films I've seen on the subject -- some released, some still in the works, many of them superb, even several of them in which I appear -- tend to rely on talking-head expert explanations or data-crunching facts and figures. Hacking Democracy makes its case by showing rather than telling. It's accessible and, by the time viewers see the worst hack of them all, it's gut-wrenching. It's a real-life detective story, with real bad guys sweating, evading, lying and misleading, only to be busted on camera as snake-oil salesmen.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts