----- Original Message ----- 
Sent: Tuesday, July 08, 2003 9:11 PM
Subject: Bigger Than Watergate!



URL: http://www.scoop.co.nz/mason/stories/HL0307/S00064.htm

Sludge Report #154 - Bigger Than Watergate!
Tuesday, 8 July 2003, 6:13 pm
Column: C.D. Sludge

IMPORTANT NOTE: Publication of this story marks a
watershed in American political history. It is
offered freely for publication in full or part on
any and all internet forums, blogs and
noticeboards. All other media are also encouraged
to utilise material. Readers are encouraged to
forward this to friends and acquaintances in the
United States and elsewhere.

See Also Companion Article For Detail And Screenshots Of An Election HackS
Inside A U.S. Election Vote Counting Program

http://www.scoop.co.nz/mason/stories/HL0307/S00065.htm

Sludge Report #154

Bigger Than Watergate!

The story you are about to read is in this
writer's view the biggest political scandal in
American history, if not global history. And it
is being broken today here in New Zealand.

This story cuts to the bone the machinery of
democracy in America today. Democracy is the only
protection we have against despotic and arbitrary
government, and this story is deeply disturbing.

Imagine if you will that you are a political
interest group that wishes to control forevermore
the levers of power.  Imagine further that you
know you are likely to implement a highly
unpopular political agenda, and you do not wish
to be removed by a ballot driven backlash.

One way to accomplish this outcome would be to
adopt the Mugabe (Zimbabwe) or Hun Sen (Cambodia)
approach. You agree to hold elections, but
simultaneously arrest, imprison and beat your
opponents and their supporters. You stuff ballot
boxes, disenfranchise voters who are unlikely to
vote for you, distort electoral boundaries and
provide insufficient polling stations in areas
full of opposition supporters.

However as so many despots have discovered,
eventually such techniques always fail - often
violently. Hence, if you are a truly ambitious
political dynasty you have to be a bit more
subtle about your methods.

Imagine then if it were possible to somehow
subvert the voting process itself in such a way
that you could steal elections without anybody
knowing.

Imagine for example if you could:

- secure control of the companies that make the
voting machines and vote counting software;
- centralise vote counting systems, and politicise their supervision;
- legislate for the adoption of such systems
throughout your domain,  and provide large
amounts of money for the purchase of these
systems;
- establish systems of vote counting that
effectively prevent anybody on the ground in the
election - at a booth or precinct level -  from
seeing what is happening at a micro-level;
- get all the major media to sign up to a single
exit-polling system that you also control -
removing the risk of exit-polling showing up your
shenanigans.

And imagine further that you;

- install a backdoor, or numerous backdoors,  in
the vote counting systems you have built that
enable you to manipulate the tabulation of
results in real time as they are coming in.

Such a system would enable you to intervene in
precisely the minimum number of races necessary
to ensure that you won a majority on election
night. On the basis of polling you could pick
your marginal seats and thus keep your tweaking
to a bare minimum.

Such a system would enable you to minimise the
risks of discovery of your activities.

Such a system would enable you to target and
remove individual political opponents who were
too successful, too popular or too inquisitive.

And most importantly of all, such a system would
enable you to accomplish all the above without
the public being in the least aware of what you
were doing. When confronted with the awfulness of
your programme they would be forced to concede
that at least it is the result of a democratic
process.


How To Rig An Election In The United States

So how would such a system actually work?

Well one way to run such a corrupt electoral system might look like this.

- Each voting precinct (or booth) could be fitted
with electronic voting systems, optical scanning
systems, punch card voting systems or the more
modern touchscreen electronic voting machines;

- At the close of play each day the
booth/precinct supervisor could be under
instructions to compile an electronic record of
the votes cast in their booth;

- They might print out a report that contains
only the details of the total votes count for
that precinct/booth, and then file via modem the
full electronic record of votes through to the
County supervisor;

- The County Supervisor could be equipped with a
special piece of software and a bank of modems
that enables all these results to be received and
tabulated in the internals of the computer;

- The County Supervisors themselves could be
assured that their system was bullet proof,
certified and contained tamper-protection
mechanisms par excellence;

- The Country Supervisor could be given a range
of tools for looking at the data within this
software, but nothing to enable them to directly
manipulate the results;

- But unbeknownst to the County Supervisor the
software could actually create three separate
records of the voting data;

- Meanwhile -  also unbeknownst to the County
Supervisor - these three tables of voting data
could be in fact completely insecure and
accessible simply through a common database
programme, say Microsoft Access;

- Having the three tables would enable you to
keep the real data in place - so the system could
pass spot tests on individual precincts and booth
results (should a precinct supervisor be
particularly astute)  -while simultaneously
enabling you to manipulate the bottom line result;

- Finally you might also enhance the election
hacker's powers by including within the software
a utility to enable them to cover their tracks by
changing the date and time stamps on files and
remove evidence of your tampering.


Fantasy Becomes Reality

The above description of a corrupt voting system
is not the result of an overactive imagination.
Rather it is the result of a extensive research
by computer programmers and journalists working
around the globe. Principally it is the work of
investigative Journalist Bev Harris, author of
the soon to be published book " Black Box Voting:
Ballot Tampering In The 21st Century "

And most important of all it is the result of
research focussed on investigating the actual
software distributed by one of the largest voting
systems companies operating in  the recent U.S.
Elections.

CAVEAT: It is important to note that the research
into this subject has not established that the
files we have been working on were in fact in
situ in County Election Supervisors offices at
the last election  - nor have we proof that the
back door we have discovered  - which might
enable the rigging of elections -  was actually
used in any recent election.  However it is the
considered opinion of  all those involved in this
investigation that it is not up to us as
journalists or programmers to prove that
elections were rigged, rather it is a
responsibility of the electoral system itself to
prove its integrity.

What you read here amounts to revelation of
evidence of motive, opportunity,method, prior
conduct, and a variety of items of, consistent
unexplained circumstantial evidence.
Significantly we do not believe we have
sufficient resources to complete this
investigation to its conclusion and are therefore
making available our findings to the media,
community organisations, political parties,
computer scientists and geeks in the anticipation
that they will pick up the torch and take extend
this inquiry into every county in the United
States.


How We Discovered The Backdoor

The story of how this story emerged is a great
tale in itself, most of which has already been
told in this report by Bev Harris.

SYSTEM INTEGRITY FLAW DISCOVERED AT DIEBOLD ELECTION SYSTEMS
http://www.scoop.co.nz/mason/stories/HL0302/S00052.htm

The short version of the story is relatively simple.

In the course of investigating the issue of the
integrity of new electronic voting machines Bev
Harris learned that people around the world had
been downloading from an open FTP site belonging
to Diebold Election Systems, one of the leading
manufactures of voting systems.

This website contained several gigabytes of files
including manuals, source codes and installation
versions of numerous parts of the Diebold voting
system, and of its vote counting programme GEMS.

Realising we had stumbled across what might be
the equivalent of the Pentagon Papers for
elections, the full contents of this website have
been secured around the world at several
locations. The original website was itself taken
down on January 29th 2003.

We can now reveal for the first time the location
of a complete online copy of the original data
set. As we anticipate attempts to prevent the
distribution of this information we encourage
supporters of democracy to make copies of these
files and to make them available on websites and
file sharing networks.

http://users.actrix.co.nz/dolly/

As many of the files are zip password protected
you may need some assistance in opening them, we
have found that the utility available at the
following URL works well:

http://www.lostpassword.com

Finally some of the zip files are partially
damaged, but these too can be read by using the
utility at:

http://www.zip-repair.com/

At this stage in this inquiry we do not believe
that we have come even remotely close to
investigating all aspects of this data.  I.E.
There is no reason to believe that the security
flaws discovered so far are the only ones.

Therefore we expect many more discoveries to be
made. We want the assistance of the online
computing community in this enterprise and we
encourage you to file your findings at the forum
HERE,
http://www.liberalisnotadirtyword.com/cgi-bin/dcforum/dcboard.cgi

Finally, for obvious reasons it is important that
this information is distributed as widely as
possible as quickly as possible. We encourage all
web bloggers, web publishers and web media to
re-publish and link to this article and to its
companion article by Bev Harris which contains
detailed descriptions of how to use the GEMS
software to rig an election.:

To conclude this overview article I will make a
few more comments on the evidence we have thus
far that the U.S. election system has been
compromised. As stated earlier we do not at this
stage have proof that it has in fact been been
compromised through this method, just a great
deal of circumstantial evidence that it could
have been.

If this was Watergate, we are effectively at the
point of discovering evidence of a break-in and
have received the call from deep-throat telling
us that should dig much deeper.

Proof will follow in time we expect,  but only if
the work we have begun is completed and this
inquiry is taken into every corner of the U.S.
electoral system.


Evidence Of Motive

This is probably the easiest part of this puzzle
to get your head around. The motivation of the
Republican Party in general and the current
administration in particular to gain ever greater
amounts of power -  by whatever means possible
and  damn the consequences - is evidenced most
recently in the Supreme Court's partisan
appointment of George Bush Jr. as President, the
attempt to recall California Governor Gray Davis,
and the Ken Starr investigation and attempted
impeachment of President Clinton.


Evidence Of Opportunity

Republican connected control over the major
election systems companies in the United States
has been thoroughly researched.

Bob Urosevich, CEO of Diebold Election Systems
is also the founder of ES&S, a competing voting
machine company.  Together these two companies
are responsible for tallying around 80% of votes
cast in the United States. Also significant, from
what we can determine about the architecture of
the software, is that its basic structure  was
specifically a creation of Mr Urosevich's company
I-Mark.

For more background on Diebold Systems connections to the Republican Party
see:

Diebold - The Face Of Modern Ballot Tampering
http://www.scoop.co.nz/mason/stories/HL0211/S00081.htm

Meanwhile Presidential wannabee and Republican
Party United States Senator Chuck Hagel has been
directly connected to ES&S via his campaign
finance director, Michael McCarthy, who has
admitted that Senator Hagel still owns a
beneficial interest in the ES&S parent company,
the McCarthy Group.

Senate Ethics Director Resigns; Senator Hagel
Admits Owning Voting Machine Company
http://www.scoop.co.nz/mason/stories/HL0301/S00166.htm


Evidence Of Method

The evidence of method has been detailed in a
companion article by Bev Harris, author of the
soon to be published block-buster Black Box
Voting.

Inside A U.S. Election Vote Counting Program
http://www.scoop.co.nz/mason/stories/HL0307/S00065.htm

In this article - which contains screenshots from
the software and detailed instructions on how one
might rig an election  -  Bev Harris explains
security flaws thus:

The GEMS election file contains more than one
"set of books." They are hidden from the person
running the GEMS program, but you can see them if
you go into Microsoft Access.

You might look at it like this: Suppose you have
votes on paper ballots, and you pile all the
paper ballots in room one. Then, you make a copy
of all the ballots and put the stack of copies in
room 2.

You then leave the door open to room 2, so that
people can come in and out, replacing some of the
votes in the stack with their own.

You could have some sort of security device that
would tell you if any of the copies of votes in
room 2 have been changed, but you opt not to.

Now, suppose you want to count the votes. Should
you count them from room 1 (original votes)? Or
should you count them from room 2, where they may
or may not be the same as room 1? What Diebold
chose to do in the files we examined was to count
the votes from "room2."


Evidence Of Prior Conduct

It is a recorded fact that every system of
balloting established in America has been gamed
and rigged. I.E. America's political
practitioners have a very long history of ballot
rigging and vote tampering. This is nothing new
and evidence of the sort we have uncovered has
been long predicted by computer scientists such
as Dr Rebecca Mercuri.

In more recent history investigative Journalist
Greg Palast has documented in detail Katherine
Harris's use of electronic data matching
technologies to disenfranchise thousands of
Florida voters in advance of the 2000
Presidential election.

We highly recommend readers purchase a copy of
"The Best Democracy Money Can Buy" by Greg Palast
to read much more about this.

A compendium of links on Palast's investigations
can be found via a Google search on:
"greg palast florida katherine harris"


Consistent Unexplained Circumstantial Evidence

During the 2002 Mid-term  there were numerous
reports of unusual happenings in counties
throughout the United States.

Among the phenomena reported were voting numbers
suddenly fluctuating in the middle of the
counting process, something you might expect to
see if the backdoor identified above were used
clumsily.

An organisation called Votewatch was set up
during the 2002 elections to record unusual
happenings and its archives can be viewed here.

http://pub103.ezboard.com/bsoldiervoice

It will suffice here to cite a couple of specific
examples - these are excerpts from the soon to be
published " Black Box Voting: Ballot Tampering In
The 21st Century ". These examples of actual
events are consistent with the existence and use
of an electronic vote counting hack described
above.

November 1990, Seattle, Washington -  Worse than
the butterfly ballot, some Democratic candidates
watched votes alight, then flutter away. Democrat
Al Williams saw 90 votes wander off his tally
between election night and the following day,
though no new counting had been done. At the same
time, his opponent, Republican Tom Tangen, gained
32 votes. At one point several hundred ballots
added to returns didn't result in any increase in
the number of votes. But elsewhere, the number of
votes added exceeded the number of additional
ballots counted. A Republican candidate achieved
an amazing surge in his absentee percentage for
no apparent reason. And no one seemed to notice
(until a determined Democratic candidate started
demanding an answer) that the machines simply
forgot to count 14,000 votes.

November 1996, Bergen County, New Jersey -
Democrats told Bergen County Clerk Kathleen
Donovan to come up with a better explanation for
mysterious swings in vote totals. Donovan blamed
voting computers for conflicting tallies that
rose and fell by 8,000 or 9,000 votes. The swings
perplexed candidates of both parties. For
example, the Republican incumbent, Anthony
Cassano, had won by about 7,000 votes as of the
day after the election but his lead evaporated
later. One candidate actually lost 1,600 votes
during the counting. "How could something like
that possibly happen?" asked Michael Guarino,
Cassano's Democratic challenger. "Something is
screwed up here."

November 1999, Onondaga County, New York -
Computers gave the election to the wrong
candidate, then gave it back. Bob Faulkner, a
political newcomer, went to bed on Election Night
confident he had helped complete a Republican
sweep of three open council seats. But after
Onondaga County Board of Elections staffers
rechecked the totals, Faulkner had lost to
Democratic incumbent Elaine Lytel.

April 2002, Johnson County, Kansas -  Johnson
County's new Diebold touch screen machines,
proclaimed a success on election night, did not
work as well as originally believed. Incorrect
vote totals were discovered in six races, three
of them contested, leaving county election
officials scrambling to make sure the unofficial
results were accurate. Johnson County Election
Commissioner Connie Schmidt checked the machines
and found that the computers had under- and
over-reported hundreds of votes. "The machines
performed terrifically," said Bob Urosevich, CEO
of Diebold Election Systems. "The anomaly showed
up on the reporting part."

The problem, however, was so perplexing that
Schmidt asked the Board of Canvassers to order a
hand re-count to make sure the results were
accurate. Unfortunately, the touch screen
machines did away with the ballots, so the only
way to do a hand recount is to have the machine
print its internal data page by page. Diebold
tried to re-create the error in hopes of
correcting it. "I wish I had an answer,"
Urosevich said. In some cases, vote totals
changed dramatically.

November 2002, Comal County, Texas -  A
Texas-sized lack of curiosity about
discrepancies: The uncanny coincidence of three
winning Republican candidates in a row  tallying
up exactly 18,181 votes each was called weird,
but apparently no one thought it was weird enough
to audit. Conversion to alphabet: 18181 18181
18181 ahaha ahaha ahaha

November 2002, Baldwin County, Alabama -  No one
at the voting machine company can explain the
mystery votes that changed after polling places
had closed, flipping the election from the
Democratic winner to a Republican in the Alabama
governor's race. "Something happened. I don't
have enough intelligence to say exactly what,"
said Mark Kelley of ES&S. Baldwin County results
showed that Democrat Don Siegelman earned enough
votes to win the state of Alabama. All the
observers went home. The next morning, however,
6,300 of Siegelman's votes inexplicably had
disappeared, and the election was handed to
Republican Bob Riley. A recount was requested,
but denied.

November 2002, New York -  Voting machine tallies
impounded in New York: Software programming
errors hampered and confused the vote tally on
election night and most of the next day, causing
elections officials to pull the plug on the
vote-reporting Web site. Commissioners ordered
that the voting machine tallies be impounded, and
they were guarded overnight by a Monroe County
deputy sheriff.

November 2002, Georgia -  Election officials lost
their memory: Fulton County election officials
said that memory cards from 67 electronic voting
machines had been misplaced, so ballots cast on
those machines were left out of previously
announced vote totals. No hand count can shine
any light on this; the entire state of Georgia
went to touch-screen machines with no physical
record of the vote. Fifty-six cards, containing
2,180 ballots, were located, but 11 memory cards
still were missing two days after the election:
Bibb County and Glynn County each had one card
missing after the initial vote count. When DeKalb
County election officials went home early
Wednesday morning, they were missing 10 cards.

**** ENDS ****

Anti�opyright Sludge 2003

Copyright (c) Scoop Media


_______________________________________________
Futurework mailing list
[EMAIL PROTECTED]
http://scribe.uwaterloo.ca/mailman/listinfo/futurework

Reply via email to