<div dir="ltr"><span style="font-family:calibri,sans-serif;font-size:16px"> "specifically intended to satisfy national security interests" </span><div><span style="font-family:calibri,sans-serif;font-size:16px"><br></span></div><div><span style="font-family:calibri,sans-serif;font-size:16px">This doesn't fly as this will not satisfy national security interests. </span><br><div><span style="font-family:calibri,sans-serif;font-size:16px">Obviously merely disclosing the shoddy code is a less-than-poor substitute for open source for numerous reasons including public participation ( eyes on the process ) and chain of custody issues ( </span><font face="calibri, sans-serif"><span style="font-size:16px"><a href="http://www.zdnet.com/article/ca-says-es-amps-sold-uncertified-machines-wants-10m-fine/">http://www.zdnet.com/article/ca-says-es-amps-sold-uncertified-machines-wants-10m-fine/</a> ) </span></font><br></div><div><br></div><div><span style="font-family:calibri,sans-serif;font-size:16px">" it does give us a mechanism to find faults in proprietary voting systems" </span><br></div></div><div><span style="font-family:calibri,sans-serif;font-size:16px"><br></span></div><div><span style="font-family:calibri,sans-serif;font-size:16px">I think The Top to Bottom Review </span><font face="calibri, sans-serif"><span style="font-size:16px"><a href="http://www.sos.ca.gov/elections/voting-systems/oversight/top-bottom-review/">http://www.sos.ca.gov/elections/voting-systems/oversight/top-bottom-review/</a> and all other scientific conclusions bring more than evidence that we can not serve the national security interest via corporate owned software -- </span></font></div><div><font face="calibri, sans-serif"><span style="font-size:16px"><br></span></font></div><div><font face="calibri, sans-serif"><span style="font-size:16px">This along with DOD statements on open source <a href="http://dodcio.defense.gov/Portals/0/Documents/FOSS/2009OSS.pdf">http://dodcio.defense.gov/Portals/0/Documents/FOSS/2009OSS.pdf</a></span></font></div><div>certify that the open source election system mission must be fulfilled immediately. </div></div><div class="gmail_extra"><br><div class="gmail_quote">On Sat, Nov 5, 2016 at 9:51 AM, Lawrence Rosen <span dir="ltr"><<a href="mailto:lrosen@rosenlaw.com" target="_blank">lrosen@rosenlaw.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang="EN-US" link="blue" vlink="purple"><div class="m_-402190387415637984WordSection1"><p class="MsoNormal" style="margin-left:.5in"><span style="font-family:"Calibri",sans-serif">Brent Turner wrote:<u></u><u></u></span></p><p class="MsoNormal" style="margin-left:.5in"><span style="font-family:"Calibri",sans-serif">> </span>Hopefully national security interests will be considered paramount to the corporate interests <u></u><u></u></p><p class="MsoNormal"><span style="font-family:"Calibri",sans-serif"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-family:"Calibri",sans-serif">I just learned of a change to DMCA regulations from the Copyright Office specifically intended to satisfy national security interests. It will now be legal to investigate and decompile proprietary voting software despite it being protected by DMCA encryption or other features. <u></u><u></u></span></p><p class="MsoNormal"><span style="font-family:"Calibri",sans-serif"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-family:"Calibri",sans-serif">While this is not the same as open source software, it does give us a mechanism to find faults in proprietary voting systems.<u></u><u></u></span></p><p class="MsoNormal"><span style="font-family:"Calibri",sans-serif"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-family:"Calibri",sans-serif">NOTE: Avoiding DMCA protections isn't automatic. Be sure to follow appropriate procedures to request the code before you decompile.<u></u><u></u></span></p><p class="MsoNormal"><span style="font-family:"Calibri",sans-serif"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-family:"Calibri",sans-serif">/Larry<u></u><u></u></span></p><p class="MsoNormal"><span style="font-family:"Calibri",sans-serif"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-family:"Calibri",sans-serif;color:black">Lawrence Rosen<u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:8.0pt;font-family:"Calibri",sans-serif;color:black">Rosenlaw (</span><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><a href="http://www.rosenlaw.com/" target="_blank"><span style="font-size:8.0pt;color:#0563c1">www.rosenlaw.com</span></a></span><span style="font-size:8.0pt;font-family:"Calibri",sans-serif;color:black">) <u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:8.0pt;font-family:"Calibri",sans-serif;color:black">3001 King Ranch Rd., Ukiah, CA 95482<u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:8.0pt;font-family:"Calibri",sans-serif;color:black">Cell: <a href="tel:707-478-8932" value="+17074788932" target="_blank">707-478-8932</a> <u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:8.0pt;font-family:"Calibri",sans-serif;color:black">This email is licensed under </span><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"><a href="https://creativecommons.org/licenses/by/4.0/" target="_blank"><span style="font-size:8.0pt;color:#0563c1">CC-BY-4.0</span></a></span><span style="font-size:8.0pt;font-family:"Calibri",sans-serif;color:black">. Please copy freely.</span><span style="font-family:"Calibri",sans-serif;color:black"> <img border="0" width="89" height="31" style="width:.9236in;height:.3263in" id="m_-402190387415637984Picture_x0020_1" src="cid:image002.png@01D2374A.19B2EDF0" alt="https://licensebuttons.net/l/by/4.0/88x31.png"></span><span style="font-size:8.0pt;font-family:"Calibri",sans-serif;color:black"><u></u><u></u></span></p><p class="MsoNormal"><span style="font-family:"Calibri",sans-serif"><u></u> <u></u></span></p><p class="MsoNormal" style="margin-left:.5in"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">From:</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> CAVO [mailto:<a href="mailto:cavo-bounces@opensource.org" target="_blank">cavo-bounces@<wbr>opensource.org</a>] <b>On Behalf Of </b>Brent Turner<br><b>Sent:</b> Saturday, November 5, 2016 8:47 AM<br><b>To:</b> CAVO <<a href="mailto:cavo@opensource.org" target="_blank">cavo@opensource.org</a>><br><b>Subject:</b> Re: [CAVO] After election, DHS will work with voting machine vendors on cybersecurity<u></u><u></u></span></p><p class="MsoNormal" style="margin-left:.5in"><u></u> <u></u></p><div><p class="MsoNormal" style="margin-left:.5in">Yes-- we have been speaking to them about insider hacks and vulnerabilities as well as the " Cozy Bears " and the rest of Yogi's family..<u></u><u></u></p><div><p class="MsoNormal" style="margin-left:.5in"><u></u> <u></u></p></div><div><p class="MsoNormal" style="margin-left:.5in">The problem seems to be stipulated as the corporate owned proprietary software.. the lobbyists pressure form Microsoft and the vendors.that don't want open source etc.. <u></u><u></u></p></div><div><p class="MsoNormal" style="margin-left:.5in"><u></u> <u></u></p></div><div><p class="MsoNormal" style="margin-left:.5in">Hopefully national security interests will be considered paramount to the corporate interests <u></u><u></u></p></div></div><div><p class="MsoNormal" style="margin-left:.5in"><u></u> <u></u></p><div><p class="MsoNormal" style="margin-left:.5in">On Sat, Nov 5, 2016 at 8:38 AM, Juan E. Gilbert <<a href="mailto:juan@ufl.edu" target="_blank">juan@ufl.edu</a>> wrote:<u></u><u></u></p><blockquote style="border:none;border-left:solid #cccccc 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in"><div><p class="MsoNormal" style="margin-left:.5in"><u></u> <u></u></p><h2 style="margin-left:.5in"><span style="font-family:"Georgia",serif;font-weight:normal">After election, DHS will work with voting machine vendors on cybersecurity<u></u><u></u></span></h2><p style="margin-left:.5in"><em><span style="font-family:"Georgia",serif;color:#999999">From </span></em><span style="font-family:"Georgia",serif;color:#999999"><a href="http://flip.it/LLHLNa" target="_blank"><span style="color:#999999">News</span></a><em><span style="font-family:"Georgia",serif">, a Flipboard magazine by </span></em><a href="https://flipboard.com/@thenewsdesk" target="_blank"><span style="color:#999999">Flipboard Newsdesk</span></a><u></u><u></u></span></p><p style="margin-left:.5in"><span style="font-family:"Georgia",serif">After next week, the Homeland Security Department plans to start working with election machine vendors to make sure they're…<u></u><u></u></span></p><p class="MsoNormal" style="margin-left:.5in"><a href="http://flip.it/GwlXZ4" target="_blank"><u></u><u></u></a></p><h3 style="margin-left:.5in"><u><span style="font-family:"Arial",sans-serif;color:#0099cc"><a href="http://flip.it/GwlXZ4" target="_blank"><span style="color:#0099cc">Read it on Flipboard</span><span style="color:#0099cc;text-decoration:none"><u></u><u></u></span></a></span></u></h3><p class="MsoNormal" style="margin-left:.5in"><a href="http://www.politico.com/story/2016/11/voting-machines-cybersecurity-homeland-security-230773" target="_blank"><u></u><u></u></a></p><h4 style="margin-left:.5in"><u><span style="font-family:"Arial",sans-serif;color:#999999"><a href="http://www.politico.com/story/2016/11/voting-machines-cybersecurity-homeland-security-230773" target="_blank"><span style="color:#999999">Read it on politico.com</span><span style="color:#999999;text-decoration:none"><u></u><u></u></span></a></span></u></h4><p class="MsoNormal" style="margin-left:.5in"><br><br><br><br><br><br><u></u><u></u></p><pre style="margin-left:.5in">-- <u></u><u></u></pre><pre style="margin-left:.5in">Juan E. Gilbert, Ph.D. <u></u><u></u></pre><pre style="margin-left:.5in">Andrew Banks Family Preeminence Endowed Professor & Chair<u></u><u></u></pre><pre style="margin-left:.5in">Computer & Information Science & Engineering Department <u></u><u></u></pre><pre style="margin-left:.5in">Herbert Wertheim College of Engineering<u></u><u></u></pre><pre style="margin-left:.5in">University of Florida <u></u><u></u></pre><pre style="margin-left:.5in">P.O. Box 116120 <u></u><u></u></pre><pre style="margin-left:.5in">Gainesville, FL 32611 <u></u><u></u></pre><pre style="margin-left:.5in"><a href="tel:352.562.0784" target="_blank">352.562.0784</a> (V)<u></u><u></u></pre><pre style="margin-left:.5in"><a href="tel:352.273.0738" target="_blank">352.273.0738</a> (F)<u></u><u></u></pre><pre style="margin-left:.5in"><a href="mailto:juan@ufl.edu" target="_blank">juan@ufl.edu</a><u></u><u></u></pre><pre style="margin-left:.5in">Twitter: @DrJuanGilbert <u></u><u></u></pre><pre style="margin-left:.5in"><a href="http://www.juangilbert.com/" target="_blank">http://www.juangilbert.com/</a> <u></u><u></u></pre></div><p class="MsoNormal" style="margin-right:0in;margin-bottom:12.0pt;margin-left:.5in"><br>______________________________<wbr>_________________<br>CAVO mailing list<br><a href="mailto:CAVO@opensource.org" target="_blank">CAVO@opensource.org</a><br><a href="https://lists.opensource.org/cgi-bin/mailman/listinfo/cavo" target="_blank">https://lists.opensource.org/<wbr>cgi-bin/mailman/listinfo/cavo</a><u></u><u></u></p></blockquote></div><p class="MsoNormal" style="margin-left:.5in"><u></u> <u></u></p></div></div></div><br>______________________________<wbr>_________________<br>
CAVO mailing list<br>
<a href="mailto:CAVO@opensource.org">CAVO@opensource.org</a><br>
<a href="https://lists.opensource.org/cgi-bin/mailman/listinfo/cavo" rel="noreferrer" target="_blank">https://lists.opensource.org/<wbr>cgi-bin/mailman/listinfo/cavo</a><br>
<br></blockquote></div><br></div>