Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:Learn to Google (Score 1) 279

Every election we hear about one or two cases. This election we have seen literally Millions of cases of election fraud, and everyone says we have toi focus on making sure Trump doesn't win.

What people who make idiotic arguments like yours are oblivious to are the many frauds that ALREADY happen through mail-in votes. Why do you think conservative states are all about mail in voting? Shutins in nursing homes get ballots. People who haven't had a connection to reality in years are sent ballots, which their AIDS complete in their stead and return. No one asks for an ID because it's not needed, right?

Election fraud is all around us. Voter fraud has been repeatedly been shown to be statistically irrelevant. Arizona denying the right to vote to hundreds of thousands of legally registered voters is not.

Comment Re:Spyware (Score 3, Insightful) 982

A friend's Dell that uses bluetooth for everything was hosed beyond repair, because it killed the keyboard and mouse functionality even in the bios. He closed the popup for weeks and was caught by the latest "update" that made the red X mean "yes, please fubar my box."

Telemetry? Canonical, Redhat and others have been collecting telemetry on various issues for years. However, Microsoft is a closed box - so you really believe telemetry data from a corporation that is opaque and has already agreed to aid law enforcement by essentially fishing for untoward activities, is not a big deal? This is literally allowing LEA an open window into your home.

How's that for FUD? Facts, Uncertainty, and a Dubious product.

Comment This method will not pick up many issues (Score 2) 215

For example, there is very strong evidence that Scott Brown reached the US Senate as a result of election fraud. Details are in http://electiondefensealliance.org/files/BelieveIt_OrNot_100904.pdf That analysis compared the results in machine count jurisdictions and hand count jurisdictions. The usual disparity between hand count and machine count results (based on prior elections) runs around 0.25%. Coakley led in hand count jurisdictions by 2% and Brown in machine count jurisdictions by 5%. That is a 7% disparity. It also turns out that the company operating the machine counts was Republican-connected, and that the ballots were neither saved nor sampled to validate the accuracy of the machine counts. There are numerous ways to tamper with a machine count of paper ballots, especially in a two-person special election.

The method published in the subject paper could not pick up this kind of election fraud.

Comment Re:Consistent availability is the issue (Score 2) 345

One major potential source of battery backup is electric vehicles. Even after their batteries are no longer usable in the cars (about 75% of capacity) they can be used as backup for wind and solar. That also requires either the vehicles or the charging stations to include inverters that can feed power to the grid.

Geographic diversity can do some mitigation of wind variability, but storage is better. Not all storage needs to be in batteries. For example, compressed air and flywheels are other storage technologies that can also help.

The distribution infrastructure needs to be rebuilt, but that is not what would transfer power over larger regions. The transmission infrastructure does that job. One study a few years ago estimated a need for about 10K miles of new 500KV transmission to handle a wind penetration of around 20% to 30%.

Also, there is a need for much more detailed and more statistically-focused weather forecasting to support wind production forecasting. That is needed to help manage a system with high wind penetration.

Comment Re:Complexity of the vote is different (Score 1) 500

In addition to the number of offices and questions on the ballot, US elections can be complicated by multi-seat offices (e.g., there are five council seats, they run "at large," and you vote for five candidates out of of whatever number are running; the top five win). In Canada and many other countries, there is one office and a number of competing candidates. They can put the ballots in piles and count the piles. You can't do that with a multi-seat office, and it gets difficult when there are multiple offices on the ballot.

The number of offices and questions can be large. Where I live, in a presidential year there may be around a dozen or more offices and questions on the ballot. In an "off-year" (mainly local) election there may be 20 or 30 offices and questions, including at least 3 or 4 that are multi-seat.

Comment Re:Mandatory already for electric power (Score 1) 94

Some problems do remain. FERC and NERC only control the Bulk Electric System. The state PUC's regulate the distribution system, and few PUCs have the capability for overseeing cybersecurity. Second, there is huge pushback on NERC when they try to tighten the CIP standards. The prime example is the continued existence of the scope exclusion for non-routable protocols. They are just as vulnerable as routable protocols, but if they were made in scope asset owners would have more work to do to protect them or might actually need to replace their legacy equipment. So, the exclusion hangs on revision after revision. Finally, even if the asset owner is serious about cybersecurity, their vendor might not be willing to get serious and might prefer to peddle half-vast capabilities.

Comment Mandatory already for electric power (Score 2) 94

For the high voltage part of the electric grid there are already mandatory standards, They are part of the reliability standards mandated by a 2005 law and are produced by an industry consensus standards organization. However, upon acceptance by the Federal Energy Regulatory Commission (FERC) they become mandatory with maximum penalties of a million dollars a day per violation.

The early versions of the standards mainly required asset owners to attend to cybersecurity by identifying critical assets and making and following plans to protect them. The early violations were not having the plans and not updating them. Some asset owners tried to say they didn't have any critical assets. Over the years provisions have tightened (like defining what kinds of assets are critical and requiring that the plans not only be prepared but actually followed).

The asset owners have some legitimate concerns. For example, if the standards give discretion to auditors in reviewing the quality of their cybersecurity protections, they are worried about auditors who don't really understand the technology, see an actually inapplicable "best practice" somewhere and downrate the cybersecurity protections if the practice isn't followed. For example, the general practice in IT is to routinely install vendor patches. However, the proper practice in electric grid control systems is to individually test the patches to ensure that they don't cause system instability or equipment misoperation. You don't routinely install vendor patches if your job is to keep the lights on.

Mandating of cybersecurity has to be done carefully with sensitivity and attention to details in the application domain. But it does need to be done.

Slashdot Top Deals

In 1914, the first crossword puzzle was printed in a newspaper. The creator received $4000 down ... and $3000 across.

Working...