Hacking Democracy

Results: 26



#Item
1Issue brief: A “backdoor” to encryption for government surveillance Center for Democracy & Technology  Encrypting smartphones and other tech products will help protect against malicious hacking, identity

Issue brief: A “backdoor” to encryption for government surveillance Center for Democracy & Technology Encrypting smartphones and other tech products will help protect against malicious hacking, identity

Add to Reading List

Source URL: cdt.org

Language: English - Date: 2014-11-10 17:17:00
    2Issue brief: A “backdoor” to encryption for government surveillance Center for Democracy & Technology  Encrypting smartphones and other tech products will help protect against malicious hacking, identity

    Issue brief: A “backdoor” to encryption for government surveillance Center for Democracy & Technology Encrypting smartphones and other tech products will help protect against malicious hacking, identity

    Add to Reading List

    Source URL: d1ovv0c9tw0h0c.cloudfront.net

    Language: English - Date: 2014-11-10 17:17:00
      3Chapter 9  Black Box Voting Ballot Tampering in the 21st Century  by Bev Harris

      Chapter 9 Black Box Voting Ballot Tampering in the 21st Century by Bev Harris

      Add to Reading List

      Source URL: www.instinct.org

      Language: English - Date: 2003-11-29 03:26:35
      4Chapter 7  Black Box Voting Ballot Tampering in the 21st Century  by Bev Harris

      Chapter 7 Black Box Voting Ballot Tampering in the 21st Century by Bev Harris

      Add to Reading List

      Source URL: www.instinct.org

      Language: English - Date: 2003-11-29 03:26:35
      5Chapter 9  Black Box Voting Ballot Tampering in the 21st Century  by Bev Harris

      Chapter 9 Black Box Voting Ballot Tampering in the 21st Century by Bev Harris

      Add to Reading List

      Source URL: pgl.yoyo.org

      Language: English - Date: 2003-11-29 02:01:07
      6Chapter 7  Black Box Voting Ballot Tampering in the 21st Century  by Bev Harris

      Chapter 7 Black Box Voting Ballot Tampering in the 21st Century by Bev Harris

      Add to Reading List

      Source URL: pgl.yoyo.org

      Language: English - Date: 2003-11-29 02:01:02
      71  Cindy A. Co~ Esq. (SBN[removed]Wendy Seltzer,Esq.  2

      1 Cindy A. Co~ Esq. (SBN[removed]Wendy Seltzer,Esq. 2

      Add to Reading List

      Source URL: www.onlinepolicy.org

      Language: English - Date: 2005-10-15 20:26:21
      8Trusted Agent Report Diebold AccuVote-TS Voting System January 20, 2004  Prepared by:

      Trusted Agent Report Diebold AccuVote-TS Voting System January 20, 2004 Prepared by:

      Add to Reading List

      Source URL: euro.ecom.cmu.edu

      Language: English - Date: 2004-09-04 11:15:04
      9Executive Summary The California Secretary of State entered into a contract with the University of California to test the security of three electronic voting systems as part of her Top to Bottom Review. Each Red Team was

      Executive Summary The California Secretary of State entered into a contract with the University of California to test the security of three electronic voting systems as part of her Top to Bottom Review. Each Red Team was

      Add to Reading List

      Source URL: votingsystems.cdn.sos.ca.gov

      Language: English - Date: 2014-12-02 18:19:09
      10Microsoft Word - BM06-021 lthd Conditional Certification.doc

      Microsoft Word - BM06-021 lthd Conditional Certification.doc

      Add to Reading List

      Source URL: votingsystems.cdn.sos.ca.gov

      Language: English - Date: 2014-12-02 18:09:14