Review: Hacks, lies and videotape
Election integrity advocate Brad Friedman looks at HBO's Hacking Democracy
Computerworld - I believe in full transparency. So allow me to disclose to you that I didn't come to Hacking Democracy, HBO's new documentary on e-voting in America, with an unbiased perspective on the electronic voting machines that an unprecedented number of Americans will encounter at the polls in next week's general elections.
In fact, I'm one of those who have been labeled "conspiracy theorist" or "technophobe," despite years of experience as a computer programmer. Where do labels like those come from? Well, to quote the film:
"It makes me cry. I'm sorry but it does. ... There are people out there who are giving their lives to make sure our elections are secure. They're being called conspiracy theorists and technophobes. And these vendors are lying and saying that everything's all right and it's not all right."
-- Susan Pynchon, election integrity activist from the Florida Fair Elections Coalition, after serving as an eyewitness to the first known hack of a Diebold optical-scan voting machine, December 2005
Kathleen Wynne and Bev Harris (Image courtesy HBO's documentary, "Hacking Democracy")
If HBO's new documentary gets even a fraction of the eyeballs it deserves, it's hard to see how it could miss having a profound effect on the electoral process. Then again, with the overwhelming evidence already available, it's unimaginable that next week we will actually be heading to polling places nationwide where more than 80% of America's votes will be tabulated by hackable, inaccurate, unreliable electronic voting machines using 100% secret software to record and tabulate our votes.
And yet here we go.
Hacking Democracy is the culmination of three years of work by filmmakers Simon Ardizzone, Robert Carrillo Cohen and Russell Michaels, who have documented some of the most mind-blowing moments in the short, storied and sordid history of American e-voting. Other films I've seen on the subject -- some released, some still in the works, many of them superb, even several of them in which I appear -- tend to rely on talking-head expert explanations or data-crunching facts and figures. Hacking Democracy makes its case by showing rather than telling. It's accessible and, by the time viewers see the worst hack of them all, it's gut-wrenching. It's a real-life detective story, with real bad guys sweating, evading, lying and misleading, only to be busted on camera as snake-oil salesmen.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable.
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts