|

 
|
| | Name : | Stanley A. Klein | Organization : | N/A | Post Date : | 9/30/2005 |
| Comment : | Threats: ... All threats
to voting systems can be classified under one or more of these vulnerabilities.
f) Data can be selectively activated and run as alternative code at any point in the
election process. | |
|
|