Back to Results
First PageMeta Content
Election fraud / Cyberwarfare / Computer network security / Information society / Software testing / Voter-verified paper audit trail / Vulnerability / Voting machine / Security through obscurity / Electronic voting / Politics / Computer security


Microsoft Word - Red_Overview-after2.doc
Add to Reading List

Document Date: 2011-05-14 16:39:28


Open Document

File Size: 303,08 KB

Share Result on Facebook

City

Santa Barbara / Sacramento / /

Company

Ciber Inc. / HP / Diebold / Microsoft / /

Country

United States / /

Event

Person Travel / /

Facility

FIPS PUB / University of California / /

IndustryTerm

information technology security / electronic media / surreptitious device / electronic voting systems / purpose computer systems / unnecessary services / application software / election systems / election management systems / information technology system / software security settings / wireless drivers / wireless device / election management software runs / Internet web sites / enterprise systems / security management / election management software / /

OperatingSystem

Microsoft Windows / /

Organization

Federal Election Assistance Commission / University of California / University of California / Davis / UN Court / DVD Copyright Control Association / /

Person

Robert P. Abbott / Giovanni Vigna / Richard Kemmerer / Matt Bishop / Hart / /

PoliticalEvent

Federal Election / /

Position

investigator / eCM Manager / California Secretary / Manager / version / central count administrator / VC Programmer / California Secretary of State / Certification The California Secretary / Bishop / Principle Investigator / Secretary of State and the teams / poll worker / Secretary / Secretary of State / Interpreter / Principle Investigator / /

ProvinceOrState

California / /

Technology

information technology system / Cryptography / AV / 1 An Information Technology / Information Technology / wireless device / private key / operating system / /

URL

http /

SocialTag