Are you saying the system to cheat the voters has been implemented or that
it has been corrected?

Selma


----- Original Message ----- 
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, July 09, 2003 9:29 AM
Subject: Re: [Futurework] Fw: Bigger Than Watergate!


> That is a lot of work to create a system that we already have implemented
> here in Florida.
>
> Bill
>
> On Wed, 9 Jul 2003 08:57:11 -0400 "Selma Singer" <[EMAIL PROTECTED]>
> writes:
> >
> > ----- Original Message ----- 
> > Sent: Tuesday, July 08, 2003 9:11 PM
> > Subject: Bigger Than Watergate!
> >
> >
> >
> > URL: http://www.scoop.co.nz/mason/stories/HL0307/S00064.htm
> >
> > Sludge Report #154 - Bigger Than Watergate!
> > Tuesday, 8 July 2003, 6:13 pm
> > Column: C.D. Sludge
> >
> > IMPORTANT NOTE: Publication of this story marks a
> > watershed in American political history. It is
> > offered freely for publication in full or part on
> > any and all internet forums, blogs and
> > noticeboards. All other media are also encouraged
> > to utilise material. Readers are encouraged to
> > forward this to friends and acquaintances in the
> > United States and elsewhere.
> >
> > See Also Companion Article For Detail And Screenshots Of An Election
> > HackS
> > Inside A U.S. Election Vote Counting Program
> >
> > http://www.scoop.co.nz/mason/stories/HL0307/S00065.htm
> >
> > Sludge Report #154
> >
> > Bigger Than Watergate!
> >
> > The story you are about to read is in this
> > writer's view the biggest political scandal in
> > American history, if not global history. And it
> > is being broken today here in New Zealand.
> >
> > This story cuts to the bone the machinery of
> > democracy in America today. Democracy is the only
> > protection we have against despotic and arbitrary
> > government, and this story is deeply disturbing.
> >
> > Imagine if you will that you are a political
> > interest group that wishes to control forevermore
> > the levers of power.  Imagine further that you
> > know you are likely to implement a highly
> > unpopular political agenda, and you do not wish
> > to be removed by a ballot driven backlash.
> >
> > One way to accomplish this outcome would be to
> > adopt the Mugabe (Zimbabwe) or Hun Sen (Cambodia)
> > approach. You agree to hold elections, but
> > simultaneously arrest, imprison and beat your
> > opponents and their supporters. You stuff ballot
> > boxes, disenfranchise voters who are unlikely to
> > vote for you, distort electoral boundaries and
> > provide insufficient polling stations in areas
> > full of opposition supporters.
> >
> > However as so many despots have discovered,
> > eventually such techniques always fail - often
> > violently. Hence, if you are a truly ambitious
> > political dynasty you have to be a bit more
> > subtle about your methods.
> >
> > Imagine then if it were possible to somehow
> > subvert the voting process itself in such a way
> > that you could steal elections without anybody
> > knowing.
> >
> > Imagine for example if you could:
> >
> > - secure control of the companies that make the
> > voting machines and vote counting software;
> > - centralise vote counting systems, and politicise their
> > supervision;
> > - legislate for the adoption of such systems
> > throughout your domain,  and provide large
> > amounts of money for the purchase of these
> > systems;
> > - establish systems of vote counting that
> > effectively prevent anybody on the ground in the
> > election - at a booth or precinct level -  from
> > seeing what is happening at a micro-level;
> > - get all the major media to sign up to a single
> > exit-polling system that you also control -
> > removing the risk of exit-polling showing up your
> > shenanigans.
> >
> > And imagine further that you;
> >
> > - install a backdoor, or numerous backdoors,  in
> > the vote counting systems you have built that
> > enable you to manipulate the tabulation of
> > results in real time as they are coming in.
> >
> > Such a system would enable you to intervene in
> > precisely the minimum number of races necessary
> > to ensure that you won a majority on election
> > night. On the basis of polling you could pick
> > your marginal seats and thus keep your tweaking
> > to a bare minimum.
> >
> > Such a system would enable you to minimise the
> > risks of discovery of your activities.
> >
> > Such a system would enable you to target and
> > remove individual political opponents who were
> > too successful, too popular or too inquisitive.
> >
> > And most importantly of all, such a system would
> > enable you to accomplish all the above without
> > the public being in the least aware of what you
> > were doing. When confronted with the awfulness of
> > your programme they would be forced to concede
> > that at least it is the result of a democratic
> > process.
> >
> >
> > How To Rig An Election In The United States
> >
> > So how would such a system actually work?
> >
> > Well one way to run such a corrupt electoral system might look like
> > this.
> >
> > - Each voting precinct (or booth) could be fitted
> > with electronic voting systems, optical scanning
> > systems, punch card voting systems or the more
> > modern touchscreen electronic voting machines;
> >
> > - At the close of play each day the
> > booth/precinct supervisor could be under
> > instructions to compile an electronic record of
> > the votes cast in their booth;
> >
> > - They might print out a report that contains
> > only the details of the total votes count for
> > that precinct/booth, and then file via modem the
> > full electronic record of votes through to the
> > County supervisor;
> >
> > - The County Supervisor could be equipped with a
> > special piece of software and a bank of modems
> > that enables all these results to be received and
> > tabulated in the internals of the computer;
> >
> > - The County Supervisors themselves could be
> > assured that their system was bullet proof,
> > certified and contained tamper-protection
> > mechanisms par excellence;
> >
> > - The Country Supervisor could be given a range
> > of tools for looking at the data within this
> > software, but nothing to enable them to directly
> > manipulate the results;
> >
> > - But unbeknownst to the County Supervisor the
> > software could actually create three separate
> > records of the voting data;
> >
> > - Meanwhile -  also unbeknownst to the County
> > Supervisor - these three tables of voting data
> > could be in fact completely insecure and
> > accessible simply through a common database
> > programme, say Microsoft Access;
> >
> > - Having the three tables would enable you to
> > keep the real data in place - so the system could
> > pass spot tests on individual precincts and booth
> > results (should a precinct supervisor be
> > particularly astute)  -while simultaneously
> > enabling you to manipulate the bottom line result;
> >
> > - Finally you might also enhance the election
> > hacker's powers by including within the software
> > a utility to enable them to cover their tracks by
> > changing the date and time stamps on files and
> > remove evidence of your tampering.
> >
> >
> > Fantasy Becomes Reality
> >
> > The above description of a corrupt voting system
> > is not the result of an overactive imagination.
> > Rather it is the result of a extensive research
> > by computer programmers and journalists working
> > around the globe. Principally it is the work of
> > investigative Journalist Bev Harris, author of
> > the soon to be published book " Black Box Voting:
> > Ballot Tampering In The 21st Century "
> >
> > And most important of all it is the result of
> > research focussed on investigating the actual
> > software distributed by one of the largest voting
> > systems companies operating in  the recent U.S.
> > Elections.
> >
> > CAVEAT: It is important to note that the research
> > into this subject has not established that the
> > files we have been working on were in fact in
> > situ in County Election Supervisors offices at
> > the last election  - nor have we proof that the
> > back door we have discovered  - which might
> > enable the rigging of elections -  was actually
> > used in any recent election.  However it is the
> > considered opinion of  all those involved in this
> > investigation that it is not up to us as
> > journalists or programmers to prove that
> > elections were rigged, rather it is a
> > responsibility of the electoral system itself to
> > prove its integrity.
> >
> > What you read here amounts to revelation of
> > evidence of motive, opportunity,method, prior
> > conduct, and a variety of items of, consistent
> > unexplained circumstantial evidence.
> > Significantly we do not believe we have
> > sufficient resources to complete this
> > investigation to its conclusion and are therefore
> > making available our findings to the media,
> > community organisations, political parties,
> > computer scientists and geeks in the anticipation
> > that they will pick up the torch and take extend
> > this inquiry into every county in the United
> > States.
> >
> >
> > How We Discovered The Backdoor
> >
> > The story of how this story emerged is a great
> > tale in itself, most of which has already been
> > told in this report by Bev Harris.
> >
> > SYSTEM INTEGRITY FLAW DISCOVERED AT DIEBOLD ELECTION SYSTEMS
> > http://www.scoop.co.nz/mason/stories/HL0302/S00052.htm
> >
> > The short version of the story is relatively simple.
> >
> > In the course of investigating the issue of the
> > integrity of new electronic voting machines Bev
> > Harris learned that people around the world had
> > been downloading from an open FTP site belonging
> > to Diebold Election Systems, one of the leading
> > manufactures of voting systems.
> >
> > This website contained several gigabytes of files
> > including manuals, source codes and installation
> > versions of numerous parts of the Diebold voting
> > system, and of its vote counting programme GEMS.
> >
> > Realising we had stumbled across what might be
> > the equivalent of the Pentagon Papers for
> > elections, the full contents of this website have
> > been secured around the world at several
> > locations. The original website was itself taken
> > down on January 29th 2003.
> >
> > We can now reveal for the first time the location
> > of a complete online copy of the original data
> > set. As we anticipate attempts to prevent the
> > distribution of this information we encourage
> > supporters of democracy to make copies of these
> > files and to make them available on websites and
> > file sharing networks.
> >
> > http://users.actrix.co.nz/dolly/
> >
> > As many of the files are zip password protected
> > you may need some assistance in opening them, we
> > have found that the utility available at the
> > following URL works well:
> >
> > http://www.lostpassword.com
> >
> > Finally some of the zip files are partially
> > damaged, but these too can be read by using the
> > utility at:
> >
> > http://www.zip-repair.com/
> >
> > At this stage in this inquiry we do not believe
> > that we have come even remotely close to
> > investigating all aspects of this data.  I.E.
> > There is no reason to believe that the security
> > flaws discovered so far are the only ones.
> >
> > Therefore we expect many more discoveries to be
> > made. We want the assistance of the online
> > computing community in this enterprise and we
> > encourage you to file your findings at the forum
> > HERE,
> > http://www.liberalisnotadirtyword.com/cgi-bin/dcforum/dcboard.cgi
> >
> > Finally, for obvious reasons it is important that
> > this information is distributed as widely as
> > possible as quickly as possible. We encourage all
> > web bloggers, web publishers and web media to
> > re-publish and link to this article and to its
> > companion article by Bev Harris which contains
> > detailed descriptions of how to use the GEMS
> > software to rig an election.:
> >
> > To conclude this overview article I will make a
> > few more comments on the evidence we have thus
> > far that the U.S. election system has been
> > compromised. As stated earlier we do not at this
> > stage have proof that it has in fact been been
> > compromised through this method, just a great
> > deal of circumstantial evidence that it could
> > have been.
> >
> > If this was Watergate, we are effectively at the
> > point of discovering evidence of a break-in and
> > have received the call from deep-throat telling
> > us that should dig much deeper.
> >
> > Proof will follow in time we expect,  but only if
> > the work we have begun is completed and this
> > inquiry is taken into every corner of the U.S.
> > electoral system.
> >
> >
> > Evidence Of Motive
> >
> > This is probably the easiest part of this puzzle
> > to get your head around. The motivation of the
> > Republican Party in general and the current
> > administration in particular to gain ever greater
> > amounts of power -  by whatever means possible
> > and  damn the consequences - is evidenced most
> > recently in the Supreme Court's partisan
> > appointment of George Bush Jr. as President, the
> > attempt to recall California Governor Gray Davis,
> > and the Ken Starr investigation and attempted
> > impeachment of President Clinton.
> >
> >
> > Evidence Of Opportunity
> >
> > Republican connected control over the major
> > election systems companies in the United States
> > has been thoroughly researched.
> >
> > Bob Urosevich, CEO of Diebold Election Systems
> > is also the founder of ES&S, a competing voting
> > machine company.  Together these two companies
> > are responsible for tallying around 80% of votes
> > cast in the United States. Also significant, from
> > what we can determine about the architecture of
> > the software, is that its basic structure  was
> > specifically a creation of Mr Urosevich's company
> > I-Mark.
> >
> > For more background on Diebold Systems connections to the Republican
> > Party
> > see:
> >
> > Diebold - The Face Of Modern Ballot Tampering
> > http://www.scoop.co.nz/mason/stories/HL0211/S00081.htm
> >
> > Meanwhile Presidential wannabee and Republican
> > Party United States Senator Chuck Hagel has been
> > directly connected to ES&S via his campaign
> > finance director, Michael McCarthy, who has
> > admitted that Senator Hagel still owns a
> > beneficial interest in the ES&S parent company,
> > the McCarthy Group.
> >
> > Senate Ethics Director Resigns; Senator Hagel
> > Admits Owning Voting Machine Company
> > http://www.scoop.co.nz/mason/stories/HL0301/S00166.htm
> >
> >
> > Evidence Of Method
> >
> > The evidence of method has been detailed in a
> > companion article by Bev Harris, author of the
> > soon to be published block-buster Black Box
> > Voting.
> >
> > Inside A U.S. Election Vote Counting Program
> > http://www.scoop.co.nz/mason/stories/HL0307/S00065.htm
> >
> > In this article - which contains screenshots from
> > the software and detailed instructions on how one
> > might rig an election  -  Bev Harris explains
> > security flaws thus:
> >
> > The GEMS election file contains more than one
> > "set of books." They are hidden from the person
> > running the GEMS program, but you can see them if
> > you go into Microsoft Access.
> >
> > You might look at it like this: Suppose you have
> > votes on paper ballots, and you pile all the
> > paper ballots in room one. Then, you make a copy
> > of all the ballots and put the stack of copies in
> > room 2.
> >
> > You then leave the door open to room 2, so that
> > people can come in and out, replacing some of the
> > votes in the stack with their own.
> >
> > You could have some sort of security device that
> > would tell you if any of the copies of votes in
> > room 2 have been changed, but you opt not to.
> >
> > Now, suppose you want to count the votes. Should
> > you count them from room 1 (original votes)? Or
> > should you count them from room 2, where they may
> > or may not be the same as room 1? What Diebold
> > chose to do in the files we examined was to count
> > the votes from "room2."
> >
> >
> > Evidence Of Prior Conduct
> >
> > It is a recorded fact that every system of
> > balloting established in America has been gamed
> > and rigged. I.E. America's political
> > practitioners have a very long history of ballot
> > rigging and vote tampering. This is nothing new
> > and evidence of the sort we have uncovered has
> > been long predicted by computer scientists such
> > as Dr Rebecca Mercuri.
> >
> > In more recent history investigative Journalist
> > Greg Palast has documented in detail Katherine
> > Harris's use of electronic data matching
> > technologies to disenfranchise thousands of
> > Florida voters in advance of the 2000
> > Presidential election.
> >
> > We highly recommend readers purchase a copy of
> > "The Best Democracy Money Can Buy" by Greg Palast
> > to read much more about this.
> >
> > A compendium of links on Palast's investigations
> > can be found via a Google search on:
> > "greg palast florida katherine harris"
> >
> >
> > Consistent Unexplained Circumstantial Evidence
> >
> > During the 2002 Mid-term  there were numerous
> > reports of unusual happenings in counties
> > throughout the United States.
> >
> > Among the phenomena reported were voting numbers
> > suddenly fluctuating in the middle of the
> > counting process, something you might expect to
> > see if the backdoor identified above were used
> > clumsily.
> >
> > An organisation called Votewatch was set up
> > during the 2002 elections to record unusual
> > happenings and its archives can be viewed here.
> >
> > http://pub103.ezboard.com/bsoldiervoice
> >
> > It will suffice here to cite a couple of specific
> > examples - these are excerpts from the soon to be
> > published " Black Box Voting: Ballot Tampering In
> > The 21st Century ". These examples of actual
> > events are consistent with the existence and use
> > of an electronic vote counting hack described
> > above.
> >
> > November 1990, Seattle, Washington -  Worse than
> > the butterfly ballot, some Democratic candidates
> > watched votes alight, then flutter away. Democrat
> > Al Williams saw 90 votes wander off his tally
> > between election night and the following day,
> > though no new counting had been done. At the same
> > time, his opponent, Republican Tom Tangen, gained
> > 32 votes. At one point several hundred ballots
> > added to returns didn't result in any increase in
> > the number of votes. But elsewhere, the number of
> > votes added exceeded the number of additional
> > ballots counted. A Republican candidate achieved
> > an amazing surge in his absentee percentage for
> > no apparent reason. And no one seemed to notice
> > (until a determined Democratic candidate started
> > demanding an answer) that the machines simply
> > forgot to count 14,000 votes.
> >
> > November 1996, Bergen County, New Jersey -
> > Democrats told Bergen County Clerk Kathleen
> > Donovan to come up with a better explanation for
> > mysterious swings in vote totals. Donovan blamed
> > voting computers for conflicting tallies that
> > rose and fell by 8,000 or 9,000 votes. The swings
> > perplexed candidates of both parties. For
> > example, the Republican incumbent, Anthony
> > Cassano, had won by about 7,000 votes as of the
> > day after the election but his lead evaporated
> > later. One candidate actually lost 1,600 votes
> > during the counting. "How could something like
> > that possibly happen?" asked Michael Guarino,
> > Cassano's Democratic challenger. "Something is
> > screwed up here."
> >
> > November 1999, Onondaga County, New York -
> > Computers gave the election to the wrong
> > candidate, then gave it back. Bob Faulkner, a
> > political newcomer, went to bed on Election Night
> > confident he had helped complete a Republican
> > sweep of three open council seats. But after
> > Onondaga County Board of Elections staffers
> > rechecked the totals, Faulkner had lost to
> > Democratic incumbent Elaine Lytel.
> >
> > April 2002, Johnson County, Kansas -  Johnson
> > County's new Diebold touch screen machines,
> > proclaimed a success on election night, did not
> > work as well as originally believed. Incorrect
> > vote totals were discovered in six races, three
> > of them contested, leaving county election
> > officials scrambling to make sure the unofficial
> > results were accurate. Johnson County Election
> > Commissioner Connie Schmidt checked the machines
> > and found that the computers had under- and
> > over-reported hundreds of votes. "The machines
> > performed terrifically," said Bob Urosevich, CEO
> > of Diebold Election Systems. "The anomaly showed
> > up on the reporting part."
> >
> > The problem, however, was so perplexing that
> > Schmidt asked the Board of Canvassers to order a
> > hand re-count to make sure the results were
> > accurate. Unfortunately, the touch screen
> > machines did away with the ballots, so the only
> > way to do a hand recount is to have the machine
> > print its internal data page by page. Diebold
> > tried to re-create the error in hopes of
> > correcting it. "I wish I had an answer,"
> > Urosevich said. In some cases, vote totals
> > changed dramatically.
> >
> > November 2002, Comal County, Texas -  A
> > Texas-sized lack of curiosity about
> > discrepancies: The uncanny coincidence of three
> > winning Republican candidates in a row  tallying
> > up exactly 18,181 votes each was called weird,
> > but apparently no one thought it was weird enough
> > to audit. Conversion to alphabet: 18181 18181
> > 18181 ahaha ahaha ahaha
> >
> > November 2002, Baldwin County, Alabama -  No one
> > at the voting machine company can explain the
> > mystery votes that changed after polling places
> > had closed, flipping the election from the
> > Democratic winner to a Republican in the Alabama
> > governor's race. "Something happened. I don't
> > have enough intelligence to say exactly what,"
> > said Mark Kelley of ES&S. Baldwin County results
> > showed that Democrat Don Siegelman earned enough
> > votes to win the state of Alabama. All the
> > observers went home. The next morning, however,
> > 6,300 of Siegelman's votes inexplicably had
> > disappeared, and the election was handed to
> > Republican Bob Riley. A recount was requested,
> > but denied.
> >
> > November 2002, New York -  Voting machine tallies
> > impounded in New York: Software programming
> > errors hampered and confused the vote tally on
> > election night and most of the next day, causing
> > elections officials to pull the plug on the
> > vote-reporting Web site. Commissioners ordered
> > that the voting machine tallies be impounded, and
> > they were guarded overnight by a Monroe County
> > deputy sheriff.
> >
> > November 2002, Georgia -  Election officials lost
> > their memory: Fulton County election officials
> > said that memory cards from 67 electronic voting
> > machines had been misplaced, so ballots cast on
> > those machines were left out of previously
> > announced vote totals. No hand count can shine
> > any light on this; the entire state of Georgia
> > went to touch-screen machines with no physical
> > record of the vote. Fifty-six cards, containing
> > 2,180 ballots, were located, but 11 memory cards
> > still were missing two days after the election:
> > Bibb County and Glynn County each had one card
> > missing after the initial vote count. When DeKalb
> > County election officials went home early
> > Wednesday morning, they were missing 10 cards.
> >
> > **** ENDS ****
> >
> > Anti�opyright Sludge 2003
> >
> > Copyright (c) Scoop Media
> >
> >
> > _______________________________________________
> > Futurework mailing list
> > [EMAIL PROTECTED]
> > http://scribe.uwaterloo.ca/mailman/listinfo/futurework
> >
> >
>
> ________________________________________________________________
> The best thing to hit the internet in years - Juno SpeedBand!
> Surf the web up to FIVE TIMES FASTER!
> Only $14.95/ month - visit www.juno.com to sign up today!
> _______________________________________________
> Futurework mailing list
> [EMAIL PROTECTED]
> http://scribe.uwaterloo.ca/mailman/listinfo/futurework
>


_______________________________________________
Futurework mailing list
[EMAIL PROTECTED]
http://scribe.uwaterloo.ca/mailman/listinfo/futurework

Reply via email to