Friday’s Mini-Report

Today’s edition of quick hits.

* How does John Edwards get some airtime in the midst of Hillary Clinton and Barack Obama attacking each other? By attacking them for attacking each other.

* Bill O’Reilly thought he’d flex his muscles a bit by berating JetBlue into canceling its sponsorship of YearlyKos. He probably didn’t think about the equal and opposite reaction: “Liberal activists are stepping up their campaign against Fox News Channel by pressuring advertisers not to patronize the network. MoveOn.org, the Campaign for America’s Future and liberal blogs like DailyKos.com are asking thousands of supporters to monitor who is advertising on the network. Once a database is gathered, an organized phone-calling campaign will begin, said Jim Gilliam, vice president of media strategy for Brave New Films, a company that has made anti-Fox videos.”

* That has to hurt: “Bob Dole says his preferred presidential candidate, Arizona Senator John McCain, is fading and that his support is likely to be “picked up” by Fred Thompson, who is expected to announce his candidacy for the Republican nomination in September. ‘My heart has always been with my good friend John McCain,’ said Dole, former Senate majority leader and Republican presidential nominee. ‘But it’s just not happening, the buzz is gone.'”

* The WaPo ran a surprisingly dumb article last week about Hillary Clinton showing a modest amount of cleavage during a speech on the Senate floor last week. This week, the very clever campaign is turning it into a fundraising opportunity: “Frankly, focusing on women’s bodies instead of their ideas is insulting,” Ann Lewis, a senior adviser to Clinton, wrote in the e-mail. “It’s insulting to every woman who has ever tried to be taken seriously in a business meeting. It’s insulting to our daughters — and our sons — who are constantly pressured by the media to grow up too fast.”

* For all the talk about Iran’s influence in Iraq, there is the other huge neighbor to consider: “Now, Bush administration officials are voicing increasing anger at what they say has been Saudi Arabia’s counterproductive role in the Iraq war. They say that beyond regarding Mr. Maliki as an Iranian agent, the Saudis have offered financial support to Sunni groups in Iraq. Of an estimated 60 to 80 foreign fighters who enter Iraq each month, American military and intelligence officials say that nearly half are coming from Saudi Arabia and that the Saudis have not done enough to stem the flow. One senior administration official says he has seen evidence that Saudi Arabia is providing financial support to opponents of Mr. Maliki.”

* Speaking of Iraq, the Parliament hasn’t quite embarked on its month-long break, but in the meantime, Iraqi lawmakers aren’t doing much: “Missing from Thursday’s session of the Iraqi parliament were about half of the members, including the speaker, the former speaker and two former prime ministers. Also missing: a sense of urgency. American officials have been pressing Iraqi leaders to prove their commitment to ending sectarian strife by enacting landmark legislation before mid-September, when the Bush administration is to present its next report on Iraq to Congress. But even as parliament’s monthlong August break approaches, key issues aren’t being discussed. Quorums are marginal, or fleeting.”

* According to Bob Novak, heaven will be blog-free. The guy seems to have something of a hang-up, doesn’t he?

* Bill O’Reilly continues his habit of cutting the mic when a guest might mention something inconvenient. In this case, someone was about to tell O’Reilly’s audience about the hate speech that appears on BillOReilly.com.

* If you haven’t seen Max Blumenthal’s “Rapture Ready: The Unauthorized Christians United for Israel Tour,” you really ought to take a couple of minutes to check it out.

* When Al Franken first announced his Senate campaign, the GOP treated it like a joke. I don’t think they’re laughing anymore.

* I suppose it’s possible that Limbaugh could be more loathsome, I’m just not sure how.

* Escalation architect ret. Gen. Jack Keane said today that calling the Army broken “is one of the most offensive statements we can make.” He has to pretty upset, then, with a whole lot of former Bush administration officials.

* And finally, I think it’s fair to say the WaPo’s Eugene Robinson has seen enough of our tragic Attorney General: “Over time, one becomes almost numb to this administration’s relentless lies and can-you-top-this transgressions. A kind of ‘outrage fatigue’ sets in, accompanied by the knowledge that whatever it is that they’ve done this time, it could have been worse…. For me, at least, Gonzo is the perfect antidote to midsummer apathy…. I hope they nail him.”

Anything to add? Consider this an end-of-the-day open thread.

No cat-blogging? 🙁

  • How does John Edwards get some airtime in the midst of Hillary Clinton and Barack Obama attacking each other? By attacking them for attacking each other.

    From the beginning this has been manufactured dis-consent.

    Shrill had to distance herself from the left side of the party and pander to the center-right.
    No better way to do that then to thumb her nose at Castro and Chavez.
    We all hate those two right?
    Except, of course, for a few godless liberals and that boy Obama Hussien…

    Everyone knows that Castro and Chavez are enemies of all things American.
    One we tried to assassinate…
    The other… we merely pray for his assassination.
    (Praise the Lord Jesus!)
    So Shrill couldn’t lose by puffing up her cleavage on this issue…

    Nicely done Hillbilly…
    You’ll make a find Emperess for Corporate America…

    PS: If my choice is between you and some repug. I’ll vote for Nader.

  • My client would like to inform you that his contract stipulates regular Friday appearances in the venue known as The Carpetbagger Report. If further violations occur he will be forced to join with Dave Chappell in an undisclosed location in boycotting show biz.

  • According to Bob Novak, heaven will be blog-free.

    Actually, CB, he said “I’m going ‘some place’ . . . ” since some of us here think life without blogs would be Hell, maybe we’re all in agreement 😉

  • “American military and intelligence officials say that nearly half are coming from Saudi Arabia and that the Saudis have not done enough to stem the flow.” The other 50% come from Egypt, Jordan, and probably any one else who want to blow themselves up. I would really like to know how they get into Iraq. Do they just jump on an airplane to Baghdad or just drive in through Kuwait???

  • If you haven’t seen Max Blumenthal’s “Rapture Ready: The Unauthorized Christians United for Israel Tour,” you really ought to take a couple of minutes to check it out.

    That is like a sick horror/snuff flick. We are all surely doomed.

    I’m off to the worldcantwait.org impeachment rally in Chicago. I’ll be the guy in the orange U of I Big Ten Men’s Basketball Tournment t-shirt.

  • I would really like to know how they get into Iraq. Do they just jump on an airplane to Baghdad or just drive in through Kuwait???
    Comment by jerri — 7/27/2007 @ 6:06 pm

    Yeah, I’d like to know that too. I guess it’s a long craggy border, but it’s also a war zone.

    According to Bob Novak, heaven will be blog-free.

    Only because there’s no one up there to blog about.

    Comment by memekiller — 7/27/2007 @ 6:15 pm

    Ha! Good one, memekiller.

    I’m off to the worldcantwait.org impeachment rally in Chicago. I’ll be the guy in the orange U of I Big Ten Men’s Basketball Tournment t-shirt.
    Comment by JKap

    Give’em hell, JKap. We’ll be looking for you during the FBI perp walk segment of the program. 🙂

  • Will They or Won’t They?
    Hindu organizations are asking presidential candidates and senators to denounce the protestors who disrupted the first ever Hindu opening prayer that was delivered in the senate earlier this month.

    If you don’t remember, it was the shameful moment captured in this video.
    Josh Marshall

    Wow this is a lousy choice. EVERY religious observance in the Senate deserves to be protested and disrupted on separation issues. But on the other hand I dislike the hypocrites who disrupted only the Hindu one. Having Hindus do a service in a government venue is not a big win no matter what Josh “I am the boss” Marshall thinks. Hindu’s: so many armed gods and so little time.

  • *According to Bob Novak, heaven will be blog-free

    For a guy who calls himself the “Prince of Darkness”, Novakula seems a bit presumptuous assuming that he’d end up in heaven (if it existed.)

    * Bill O’Reilly thought he’d flex his muscles a bit by berating JetBlue

    Be hard to get Bilbo’s sponsors to cut and run considering Repub demand for adult diapers and Cialis.

  • “How does John Edwards get some airtime in the midst of Hillary Clinton and Barack Obama attacking each other?”

    So, Edwards pulls ahead in the Iowa polls and gets drowned out by the seeming annointed frontrunners quarreling. Who knew the MSM would prefer a silly argument over substantive commentary…like, everyone (not you MSM, we know you wouldn’t know)…

    Doesn’t it smell a little like a coordinated campaign coup twixt Clinton/Obama…?

  • Steve Clemons gets it:

    It is my view that some of Hillary’s foreign policy advisors see value in highlighting the world’s bad guys and using general disdain for them as a way to rally support. This was a tactic of PNAC. It’s part of the “high fear”, “we live in a dangerous world”, “watch out for terrorists” motif that organizations like “Family Security Matters” exploit on the political right.

  • “Over time, one becomes almost numb to this administration’s relentless lies and can-you-top-this transgressions. A kind of ‘outrage fatigue’ sets in,[…] — Eugene Robinson

    Perhaps that’s why you didn’t find much under “Bush fatigue”, CB?

  • LOL Libra #16

    Since this is the biggest bunch of assholes ever asembled in the White House maybe we can get all this shite out of our System and get a regular crew in there again.

  • someone was about to tell O’Reilly’s audience about the hate speech that appears on BillOReilly.com.

    Might undermine his use of KKK and Nazi analogies.

    People who don’t really know Republicans (didn’t grow up talking to ’em at all) might check out the website and realize it’s all bullsh*t)

  • You are joking: The idea that the Democrats have somehow against all odds produced any meaningful change in the direction of gov’t, which has been dedicated to bigger and bigger deficits, creating larger defense and homeland security spending, keeping the tax loopholes in place for powerful interests in Ag, Pharma, Financial, maintaining at all cost perks for the powerful members of congress, is pretty silly. Their stop the war in Iraq campaigan has been weak and mostly PR driven. Its heart warming that the Democrats have passed a bill raising the mim wage but nobody reads the fine print where they provided endless tax breaks to companies and individuals that don’ need it. The Democrats are winning the battle of political donations which is a good indication they and the K street elite are getting to know each other again. While barking about bringing the Iraq War to a close they intend to expand the Afgan War, create a larger Army and keep spending money that they don’t have.
    Its important in the long run that Blogs like this not just pat these guys on the back and get caught up in their little spat’s with the other guys but let them know that conventional political BS doesn’t get it anymore.

  • In order for the shrill little man-cub to flex his muscles, he would first have to HAVE muscles. And as for boycotting things, we should blame the national appetite to boycott on O’Reilly himself.

    “All boycotts are because of Bill O’Reilly.”

    that ought to promote the shrill little man-cub as a PR “pariah.”

    And Bob Dole—“Mr. Viagra” himself, no less—says of McCain that “the buzz is gone?” It suggests a new term for dysfunction (political or otherwise):

    “A Flacid Rampstrike.”

  • FAILING GRADES ACROSS THE BOARD for electronic voting machines in (SecState Bowen-ordered) University of California-run technical tests.

    Letter campaign to bring CRIMINAL lawsuits against owners of these companies by new CA Attorney General Jerry Brown in 5, 4, 3, 2, ….

    6.1 Sequoia The red team analyzing the Sequoia system identified several issues. They fall into several classes:
    1. Physical Security. The testers were able to gain access to the internals of the systems by, for example, unscrewing screws to bypass locks. The screws were not protected by seals. Similarly, plastic covers that were protected by seals could be pried open enough to insert tools that could manipulate the protected buttons without damaging the seals or leaving any evidence that the security of the system had been compromised.
    2. Overwriting Firmware. The testers discovered numerous ways to overwrite the firmware of the Sequoia Edge system, using (for example) malformed font files and doctored update cartridges. The general approach was to write a program into memory and use that to write the corrupt firmware onto disk. At the next reboot, the boot loader loaded the malicious firmware. At this point, the attackers controlled the machine, and could manipulate the results of the election. No source code access was required or used for this attack, and a feature of the proprietary operating system on the Edge made the attack easier than if a commercial operating system had been used.
    3. Overwriting the Boot Loader. Just as the testers could overwrite firmware on the disk, they could overwrite the boot loader and replace it with a malicious boot loader. This program could then corrupt anything it loaded, including previously uncorrupted firmware.
    4. Detecting Election Mode. The firmware can determine whether the system is in test mode (LAT) or not. This means malicious firmware can respond correctly to the pre- election testing and incorrectly to the voters on Election Day.
    5. Election Management System. The testers were able to bypass the Sequoia WinEDS client controlling access to the election database, and access the database directly. They were able to execute system commands on the host computer with access only to the database. Further, the testers were able to exploit the use of the autorun feature to insert a malicious program onto the system running the Sequoia WinEDS client; this program would be able to detect the insertion of an election cartridge and configure it to launch the above attacks when inserted into an Edge.
    6. Presence of an Interpreter. A shell-like scripting language interpreted by the Edge includes commands that set the protective counter, the machine’s serial number, modify the firmware, and modify the audit trail.
    7. Forging materials. Both the update cartridges and voter cards could be forged.
    • The report presents several scenarios in which these weaknesses could be exploited to affect the correct recording, reporting, and tallying of votes.Â

    6.2 Diebold

    The team investigating the Diebold system identified several issues. They fall into several classes:
    1. Election Management System. The testers were able to penetrate the GEMS server system by exploiting vulnerabilities in the Windows operating system as delivered and installed by Diebold. Once this access was obtained, they were able to bypass the GEMS server to access the data directly. Further, the testers were able to take security-related actions that the GEMS server did not record in its audit logs. Finally, with this level of access, the testers were able to manipulate several components networked to the GEMS server, including loading wireless drivers onto the GEMS server that could then be used to access a wireless device plugged surreptitiously into the back of the GEMS server.
    2. Physical Security. The testers were able to bypass the physical controls on the AccuVote Optical Scanner using ordinary objects. The attack caused the AV-OS unit to close the polls, meaning the machine could not tally ballots at the precinct or inform voters whether they had “over-voted” their ballot. Similarly, the testers were able to compromise the AccuVote TSx completely by bypassing the locks and other aspects of physical security using ordinary objects. They found an attack that will disable the printer used to produce the VVPAT in such a way that no reminders to check the printed record will be issued to voters.
    3. AccuVote TSx. The testers found numerous ways to overwrite the firmware in the AccuVote TSx. These attacks could change vote totals, among other results. The testers were able to escalate privileges from those of a voter to those of a poll worker or central count administrator. This enabled them to reset an election, issue unauthorized voter cards, and close polls. No knowledge of the security keys was needed.
    4. Security Keys for Cryptography. The testers discovered that a well-known static security key was used by default.
    • The report presents several scenarios in which these weaknesses could be exploited to affect the correct recording, reporting, and tallying of votes.Â

    6.3 Hart

    The team investigating the Hart system identified several issues. They fall into several classes:
    1. Election Management System. The testers did not test the Windows systems on which the Hart election management software was installed because Hart does not configure the operating system or provide a default configuration. Hart software security settings provide a restricted, Hart-defined environment that the testers bypassed, allowing them to run the Hart software in a standard Windows environment. They also found an undisclosed account on the Hart software that an attacker who penetrated the host operating system could exploit to gain unauthorized access to the Hart election management database.Â
    2. eScan. The testers were able to overwrite the eScan firmware. The team also accessed menus that should have been locked with passwords. Other attacks allowed the team to alter vote totals; these attacks used ordinary objects. The team, in cooperation with the source code review team, was able to issue administrative commands to the eScan.
    3. JBC. The team developed a surreptitious device that caused the JBC to authorize access codes without poll worker intervention. The team verified that the mobile ballot box (MBB) card can be altered during an election. The team also found that post-election safeguards to prevent the altered data on a tampered MBB card from being counted can be easily bypassed.
    4. eSlate. The testers were able to remotely capture the audio from a voting session on an eSlate with audio enabled, thereby providing an attack that violates voter privacy. The team was also able to force an eSlate to produce multiple barcodes after printing “BALLOT ACCEPTED” on the VVPAT records. This could cause a county that used bar code readers to read the VVPAT to produce erroneous vote totals.
    • The report presents several scenarios in which these weaknesses could be exploited to affect the correct recording, reporting, and tallying of votes.

    http://www.sos.ca.gov/elections/voting_systems/ttbr/red_overview.pdf
    [full report at: http://www.sos.ca.gov/elections/elections_vsr.htm%5D

  • Comments are closed.