That is a lot of work to create a system that we already have implemented
here in Florida.

Bill

On Wed, 9 Jul 2003 08:57:11 -0400 "Selma Singer" <[EMAIL PROTECTED]>
writes:
> 
> ----- Original Message ----- 
> Sent: Tuesday, July 08, 2003 9:11 PM
> Subject: Bigger Than Watergate!
> 
> 
> 
> URL: http://www.scoop.co.nz/mason/stories/HL0307/S00064.htm
> 
> Sludge Report #154 - Bigger Than Watergate!
> Tuesday, 8 July 2003, 6:13 pm
> Column: C.D. Sludge
> 
> IMPORTANT NOTE: Publication of this story marks a
> watershed in American political history. It is
> offered freely for publication in full or part on
> any and all internet forums, blogs and
> noticeboards. All other media are also encouraged
> to utilise material. Readers are encouraged to
> forward this to friends and acquaintances in the
> United States and elsewhere.
> 
> See Also Companion Article For Detail And Screenshots Of An Election 
> HackS
> Inside A U.S. Election Vote Counting Program
> 
> http://www.scoop.co.nz/mason/stories/HL0307/S00065.htm
> 
> Sludge Report #154
> 
> Bigger Than Watergate!
> 
> The story you are about to read is in this
> writer's view the biggest political scandal in
> American history, if not global history. And it
> is being broken today here in New Zealand.
> 
> This story cuts to the bone the machinery of
> democracy in America today. Democracy is the only
> protection we have against despotic and arbitrary
> government, and this story is deeply disturbing.
> 
> Imagine if you will that you are a political
> interest group that wishes to control forevermore
> the levers of power.  Imagine further that you
> know you are likely to implement a highly
> unpopular political agenda, and you do not wish
> to be removed by a ballot driven backlash.
> 
> One way to accomplish this outcome would be to
> adopt the Mugabe (Zimbabwe) or Hun Sen (Cambodia)
> approach. You agree to hold elections, but
> simultaneously arrest, imprison and beat your
> opponents and their supporters. You stuff ballot
> boxes, disenfranchise voters who are unlikely to
> vote for you, distort electoral boundaries and
> provide insufficient polling stations in areas
> full of opposition supporters.
> 
> However as so many despots have discovered,
> eventually such techniques always fail - often
> violently. Hence, if you are a truly ambitious
> political dynasty you have to be a bit more
> subtle about your methods.
> 
> Imagine then if it were possible to somehow
> subvert the voting process itself in such a way
> that you could steal elections without anybody
> knowing.
> 
> Imagine for example if you could:
> 
> - secure control of the companies that make the
> voting machines and vote counting software;
> - centralise vote counting systems, and politicise their 
> supervision;
> - legislate for the adoption of such systems
> throughout your domain,  and provide large
> amounts of money for the purchase of these
> systems;
> - establish systems of vote counting that
> effectively prevent anybody on the ground in the
> election - at a booth or precinct level -  from
> seeing what is happening at a micro-level;
> - get all the major media to sign up to a single
> exit-polling system that you also control -
> removing the risk of exit-polling showing up your
> shenanigans.
> 
> And imagine further that you;
> 
> - install a backdoor, or numerous backdoors,  in
> the vote counting systems you have built that
> enable you to manipulate the tabulation of
> results in real time as they are coming in.
> 
> Such a system would enable you to intervene in
> precisely the minimum number of races necessary
> to ensure that you won a majority on election
> night. On the basis of polling you could pick
> your marginal seats and thus keep your tweaking
> to a bare minimum.
> 
> Such a system would enable you to minimise the
> risks of discovery of your activities.
> 
> Such a system would enable you to target and
> remove individual political opponents who were
> too successful, too popular or too inquisitive.
> 
> And most importantly of all, such a system would
> enable you to accomplish all the above without
> the public being in the least aware of what you
> were doing. When confronted with the awfulness of
> your programme they would be forced to concede
> that at least it is the result of a democratic
> process.
> 
> 
> How To Rig An Election In The United States
> 
> So how would such a system actually work?
> 
> Well one way to run such a corrupt electoral system might look like 
> this.
> 
> - Each voting precinct (or booth) could be fitted
> with electronic voting systems, optical scanning
> systems, punch card voting systems or the more
> modern touchscreen electronic voting machines;
> 
> - At the close of play each day the
> booth/precinct supervisor could be under
> instructions to compile an electronic record of
> the votes cast in their booth;
> 
> - They might print out a report that contains
> only the details of the total votes count for
> that precinct/booth, and then file via modem the
> full electronic record of votes through to the
> County supervisor;
> 
> - The County Supervisor could be equipped with a
> special piece of software and a bank of modems
> that enables all these results to be received and
> tabulated in the internals of the computer;
> 
> - The County Supervisors themselves could be
> assured that their system was bullet proof,
> certified and contained tamper-protection
> mechanisms par excellence;
> 
> - The Country Supervisor could be given a range
> of tools for looking at the data within this
> software, but nothing to enable them to directly
> manipulate the results;
> 
> - But unbeknownst to the County Supervisor the
> software could actually create three separate
> records of the voting data;
> 
> - Meanwhile -  also unbeknownst to the County
> Supervisor - these three tables of voting data
> could be in fact completely insecure and
> accessible simply through a common database
> programme, say Microsoft Access;
> 
> - Having the three tables would enable you to
> keep the real data in place - so the system could
> pass spot tests on individual precincts and booth
> results (should a precinct supervisor be
> particularly astute)  -while simultaneously
> enabling you to manipulate the bottom line result;
> 
> - Finally you might also enhance the election
> hacker's powers by including within the software
> a utility to enable them to cover their tracks by
> changing the date and time stamps on files and
> remove evidence of your tampering.
> 
> 
> Fantasy Becomes Reality
> 
> The above description of a corrupt voting system
> is not the result of an overactive imagination.
> Rather it is the result of a extensive research
> by computer programmers and journalists working
> around the globe. Principally it is the work of
> investigative Journalist Bev Harris, author of
> the soon to be published book " Black Box Voting:
> Ballot Tampering In The 21st Century "
> 
> And most important of all it is the result of
> research focussed on investigating the actual
> software distributed by one of the largest voting
> systems companies operating in  the recent U.S.
> Elections.
> 
> CAVEAT: It is important to note that the research
> into this subject has not established that the
> files we have been working on were in fact in
> situ in County Election Supervisors offices at
> the last election  - nor have we proof that the
> back door we have discovered  - which might
> enable the rigging of elections -  was actually
> used in any recent election.  However it is the
> considered opinion of  all those involved in this
> investigation that it is not up to us as
> journalists or programmers to prove that
> elections were rigged, rather it is a
> responsibility of the electoral system itself to
> prove its integrity.
> 
> What you read here amounts to revelation of
> evidence of motive, opportunity,method, prior
> conduct, and a variety of items of, consistent
> unexplained circumstantial evidence.
> Significantly we do not believe we have
> sufficient resources to complete this
> investigation to its conclusion and are therefore
> making available our findings to the media,
> community organisations, political parties,
> computer scientists and geeks in the anticipation
> that they will pick up the torch and take extend
> this inquiry into every county in the United
> States.
> 
> 
> How We Discovered The Backdoor
> 
> The story of how this story emerged is a great
> tale in itself, most of which has already been
> told in this report by Bev Harris.
> 
> SYSTEM INTEGRITY FLAW DISCOVERED AT DIEBOLD ELECTION SYSTEMS
> http://www.scoop.co.nz/mason/stories/HL0302/S00052.htm
> 
> The short version of the story is relatively simple.
> 
> In the course of investigating the issue of the
> integrity of new electronic voting machines Bev
> Harris learned that people around the world had
> been downloading from an open FTP site belonging
> to Diebold Election Systems, one of the leading
> manufactures of voting systems.
> 
> This website contained several gigabytes of files
> including manuals, source codes and installation
> versions of numerous parts of the Diebold voting
> system, and of its vote counting programme GEMS.
> 
> Realising we had stumbled across what might be
> the equivalent of the Pentagon Papers for
> elections, the full contents of this website have
> been secured around the world at several
> locations. The original website was itself taken
> down on January 29th 2003.
> 
> We can now reveal for the first time the location
> of a complete online copy of the original data
> set. As we anticipate attempts to prevent the
> distribution of this information we encourage
> supporters of democracy to make copies of these
> files and to make them available on websites and
> file sharing networks.
> 
> http://users.actrix.co.nz/dolly/
> 
> As many of the files are zip password protected
> you may need some assistance in opening them, we
> have found that the utility available at the
> following URL works well:
> 
> http://www.lostpassword.com
> 
> Finally some of the zip files are partially
> damaged, but these too can be read by using the
> utility at:
> 
> http://www.zip-repair.com/
> 
> At this stage in this inquiry we do not believe
> that we have come even remotely close to
> investigating all aspects of this data.  I.E.
> There is no reason to believe that the security
> flaws discovered so far are the only ones.
> 
> Therefore we expect many more discoveries to be
> made. We want the assistance of the online
> computing community in this enterprise and we
> encourage you to file your findings at the forum
> HERE,
> http://www.liberalisnotadirtyword.com/cgi-bin/dcforum/dcboard.cgi
> 
> Finally, for obvious reasons it is important that
> this information is distributed as widely as
> possible as quickly as possible. We encourage all
> web bloggers, web publishers and web media to
> re-publish and link to this article and to its
> companion article by Bev Harris which contains
> detailed descriptions of how to use the GEMS
> software to rig an election.:
> 
> To conclude this overview article I will make a
> few more comments on the evidence we have thus
> far that the U.S. election system has been
> compromised. As stated earlier we do not at this
> stage have proof that it has in fact been been
> compromised through this method, just a great
> deal of circumstantial evidence that it could
> have been.
> 
> If this was Watergate, we are effectively at the
> point of discovering evidence of a break-in and
> have received the call from deep-throat telling
> us that should dig much deeper.
> 
> Proof will follow in time we expect,  but only if
> the work we have begun is completed and this
> inquiry is taken into every corner of the U.S.
> electoral system.
> 
> 
> Evidence Of Motive
> 
> This is probably the easiest part of this puzzle
> to get your head around. The motivation of the
> Republican Party in general and the current
> administration in particular to gain ever greater
> amounts of power -  by whatever means possible
> and  damn the consequences - is evidenced most
> recently in the Supreme Court's partisan
> appointment of George Bush Jr. as President, the
> attempt to recall California Governor Gray Davis,
> and the Ken Starr investigation and attempted
> impeachment of President Clinton.
> 
> 
> Evidence Of Opportunity
> 
> Republican connected control over the major
> election systems companies in the United States
> has been thoroughly researched.
> 
> Bob Urosevich, CEO of Diebold Election Systems
> is also the founder of ES&S, a competing voting
> machine company.  Together these two companies
> are responsible for tallying around 80% of votes
> cast in the United States. Also significant, from
> what we can determine about the architecture of
> the software, is that its basic structure  was
> specifically a creation of Mr Urosevich's company
> I-Mark.
> 
> For more background on Diebold Systems connections to the Republican 
> Party
> see:
> 
> Diebold - The Face Of Modern Ballot Tampering
> http://www.scoop.co.nz/mason/stories/HL0211/S00081.htm
> 
> Meanwhile Presidential wannabee and Republican
> Party United States Senator Chuck Hagel has been
> directly connected to ES&S via his campaign
> finance director, Michael McCarthy, who has
> admitted that Senator Hagel still owns a
> beneficial interest in the ES&S parent company,
> the McCarthy Group.
> 
> Senate Ethics Director Resigns; Senator Hagel
> Admits Owning Voting Machine Company
> http://www.scoop.co.nz/mason/stories/HL0301/S00166.htm
> 
> 
> Evidence Of Method
> 
> The evidence of method has been detailed in a
> companion article by Bev Harris, author of the
> soon to be published block-buster Black Box
> Voting.
> 
> Inside A U.S. Election Vote Counting Program
> http://www.scoop.co.nz/mason/stories/HL0307/S00065.htm
> 
> In this article - which contains screenshots from
> the software and detailed instructions on how one
> might rig an election  -  Bev Harris explains
> security flaws thus:
> 
> The GEMS election file contains more than one
> "set of books." They are hidden from the person
> running the GEMS program, but you can see them if
> you go into Microsoft Access.
> 
> You might look at it like this: Suppose you have
> votes on paper ballots, and you pile all the
> paper ballots in room one. Then, you make a copy
> of all the ballots and put the stack of copies in
> room 2.
> 
> You then leave the door open to room 2, so that
> people can come in and out, replacing some of the
> votes in the stack with their own.
> 
> You could have some sort of security device that
> would tell you if any of the copies of votes in
> room 2 have been changed, but you opt not to.
> 
> Now, suppose you want to count the votes. Should
> you count them from room 1 (original votes)? Or
> should you count them from room 2, where they may
> or may not be the same as room 1? What Diebold
> chose to do in the files we examined was to count
> the votes from "room2."
> 
> 
> Evidence Of Prior Conduct
> 
> It is a recorded fact that every system of
> balloting established in America has been gamed
> and rigged. I.E. America's political
> practitioners have a very long history of ballot
> rigging and vote tampering. This is nothing new
> and evidence of the sort we have uncovered has
> been long predicted by computer scientists such
> as Dr Rebecca Mercuri.
> 
> In more recent history investigative Journalist
> Greg Palast has documented in detail Katherine
> Harris's use of electronic data matching
> technologies to disenfranchise thousands of
> Florida voters in advance of the 2000
> Presidential election.
> 
> We highly recommend readers purchase a copy of
> "The Best Democracy Money Can Buy" by Greg Palast
> to read much more about this.
> 
> A compendium of links on Palast's investigations
> can be found via a Google search on:
> "greg palast florida katherine harris"
> 
> 
> Consistent Unexplained Circumstantial Evidence
> 
> During the 2002 Mid-term  there were numerous
> reports of unusual happenings in counties
> throughout the United States.
> 
> Among the phenomena reported were voting numbers
> suddenly fluctuating in the middle of the
> counting process, something you might expect to
> see if the backdoor identified above were used
> clumsily.
> 
> An organisation called Votewatch was set up
> during the 2002 elections to record unusual
> happenings and its archives can be viewed here.
> 
> http://pub103.ezboard.com/bsoldiervoice
> 
> It will suffice here to cite a couple of specific
> examples - these are excerpts from the soon to be
> published " Black Box Voting: Ballot Tampering In
> The 21st Century ". These examples of actual
> events are consistent with the existence and use
> of an electronic vote counting hack described
> above.
> 
> November 1990, Seattle, Washington -  Worse than
> the butterfly ballot, some Democratic candidates
> watched votes alight, then flutter away. Democrat
> Al Williams saw 90 votes wander off his tally
> between election night and the following day,
> though no new counting had been done. At the same
> time, his opponent, Republican Tom Tangen, gained
> 32 votes. At one point several hundred ballots
> added to returns didn't result in any increase in
> the number of votes. But elsewhere, the number of
> votes added exceeded the number of additional
> ballots counted. A Republican candidate achieved
> an amazing surge in his absentee percentage for
> no apparent reason. And no one seemed to notice
> (until a determined Democratic candidate started
> demanding an answer) that the machines simply
> forgot to count 14,000 votes.
> 
> November 1996, Bergen County, New Jersey -
> Democrats told Bergen County Clerk Kathleen
> Donovan to come up with a better explanation for
> mysterious swings in vote totals. Donovan blamed
> voting computers for conflicting tallies that
> rose and fell by 8,000 or 9,000 votes. The swings
> perplexed candidates of both parties. For
> example, the Republican incumbent, Anthony
> Cassano, had won by about 7,000 votes as of the
> day after the election but his lead evaporated
> later. One candidate actually lost 1,600 votes
> during the counting. "How could something like
> that possibly happen?" asked Michael Guarino,
> Cassano's Democratic challenger. "Something is
> screwed up here."
> 
> November 1999, Onondaga County, New York -
> Computers gave the election to the wrong
> candidate, then gave it back. Bob Faulkner, a
> political newcomer, went to bed on Election Night
> confident he had helped complete a Republican
> sweep of three open council seats. But after
> Onondaga County Board of Elections staffers
> rechecked the totals, Faulkner had lost to
> Democratic incumbent Elaine Lytel.
> 
> April 2002, Johnson County, Kansas -  Johnson
> County's new Diebold touch screen machines,
> proclaimed a success on election night, did not
> work as well as originally believed. Incorrect
> vote totals were discovered in six races, three
> of them contested, leaving county election
> officials scrambling to make sure the unofficial
> results were accurate. Johnson County Election
> Commissioner Connie Schmidt checked the machines
> and found that the computers had under- and
> over-reported hundreds of votes. "The machines
> performed terrifically," said Bob Urosevich, CEO
> of Diebold Election Systems. "The anomaly showed
> up on the reporting part."
> 
> The problem, however, was so perplexing that
> Schmidt asked the Board of Canvassers to order a
> hand re-count to make sure the results were
> accurate. Unfortunately, the touch screen
> machines did away with the ballots, so the only
> way to do a hand recount is to have the machine
> print its internal data page by page. Diebold
> tried to re-create the error in hopes of
> correcting it. "I wish I had an answer,"
> Urosevich said. In some cases, vote totals
> changed dramatically.
> 
> November 2002, Comal County, Texas -  A
> Texas-sized lack of curiosity about
> discrepancies: The uncanny coincidence of three
> winning Republican candidates in a row  tallying
> up exactly 18,181 votes each was called weird,
> but apparently no one thought it was weird enough
> to audit. Conversion to alphabet: 18181 18181
> 18181 ahaha ahaha ahaha
> 
> November 2002, Baldwin County, Alabama -  No one
> at the voting machine company can explain the
> mystery votes that changed after polling places
> had closed, flipping the election from the
> Democratic winner to a Republican in the Alabama
> governor's race. "Something happened. I don't
> have enough intelligence to say exactly what,"
> said Mark Kelley of ES&S. Baldwin County results
> showed that Democrat Don Siegelman earned enough
> votes to win the state of Alabama. All the
> observers went home. The next morning, however,
> 6,300 of Siegelman's votes inexplicably had
> disappeared, and the election was handed to
> Republican Bob Riley. A recount was requested,
> but denied.
> 
> November 2002, New York -  Voting machine tallies
> impounded in New York: Software programming
> errors hampered and confused the vote tally on
> election night and most of the next day, causing
> elections officials to pull the plug on the
> vote-reporting Web site. Commissioners ordered
> that the voting machine tallies be impounded, and
> they were guarded overnight by a Monroe County
> deputy sheriff.
> 
> November 2002, Georgia -  Election officials lost
> their memory: Fulton County election officials
> said that memory cards from 67 electronic voting
> machines had been misplaced, so ballots cast on
> those machines were left out of previously
> announced vote totals. No hand count can shine
> any light on this; the entire state of Georgia
> went to touch-screen machines with no physical
> record of the vote. Fifty-six cards, containing
> 2,180 ballots, were located, but 11 memory cards
> still were missing two days after the election:
> Bibb County and Glynn County each had one card
> missing after the initial vote count. When DeKalb
> County election officials went home early
> Wednesday morning, they were missing 10 cards.
> 
> **** ENDS ****
> 
> Anti�opyright Sludge 2003
> 
> Copyright (c) Scoop Media
> 
> 
> _______________________________________________
> Futurework mailing list
> [EMAIL PROTECTED]
> http://scribe.uwaterloo.ca/mailman/listinfo/futurework
> 
> 

________________________________________________________________
The best thing to hit the internet in years - Juno SpeedBand!
Surf the web up to FIVE TIMES FASTER!
Only $14.95/ month - visit www.juno.com to sign up today!
_______________________________________________
Futurework mailing list
[EMAIL PROTECTED]
http://scribe.uwaterloo.ca/mailman/listinfo/futurework

Reply via email to