_______________________________________________________________ | | http://propaganda.lege.net/evoting/ | | | U.S. Voting Fraud, Mass Media Cover-up, etc. | | "Corporate America is very close to running this country. | The only thing that is stopping them from taking total | control are the pesky voters. That's why there's such a | drive to control the vote. What we're seeing is the | corporatisation of the last shred of democracy." [ New | Zealand News - World - US voting system vulnerable to fraud | -- | http://www.nzherald.co.nz/storydisplay.cfm?storyID=3529550&thesection=news&thesubsection=world | ] | | Who Plans to Steal the 2004 US Elections? Some people have | it figured out By Egan Orion Monday 29 September 2003, The | Inquirer. [ http://www.theinquirer.net/?article=11811 ]. | It's actually Chris Floyd's CounterPunch article Vanishing | Act -- "Disappearing" the Republic at the Push of a Button. | [ http://counterpunch.org/floyd09262003.html ]. Only, Egan | Orion adds these comments in the beginning: ``AFTER THE | VOTING MESS in Florida during the 2000 elections, the US | Congress passed the "Help America Vote Act". They should | have more accurately entitled it the "Help Steal America's | Vote Act" instead. However, at least one journalist has | cottoned on to what's happening, and it is simply | outrageous. We reprint by permission Chris Floyd's dynamite | article at CounterPunch exposing these sordid facts.'' | | | Mass Media Cover-up | | Leading Journalists Expose the Myth of a Free Press | Edited by Kristina Borjesson, Foreword by Gore Vidal | | This is a 10-page summary [ | http://www.wanttoknow.info/buzzsaw10pg ] of the fascinating | accounts of 18 award-winning journalists from the book Into | the Buzzsaw [ http://intothebuzzsaw.com/ ]. All of these | writers were prevented by corporate media ownership from | reporting major, incredibly revealing news. Some were even | fired or laid off. These journalists have won numerous | awards, including several Emmys and a Pulitzer Award. Help | us to create a more responsible media and a better world. | Spread this news across the land [ | http://www.wanttoknow.info/emailmedia ]. | | | Touch screens worry voter | | Posted on Mon, Nov. 10, 2003 | ELECTIONS | Touch screens worry voters [ | http://www.miami.com/mld/miamiherald/7224229.htm ] | South Florida voter opinions reflect increasing national | concern about the security of electronic voting and the | desire for a paper record. | By Erika Bolstad <ebolstad@herald.com> | | | Touch screen voting systems and rigged elections | [ http://vancouver.indymedia.org/news/2003/09/67789.php ] | | by Schuyler Ebbets * Wednesday September 17, 2003 at 11:03 | PM | | | Attempts to examine the code used by the machines in Florida | were blocked in the courts by the GOP citing, | "proprietary/trade secrecy" protections under a law, which | made it impossible for the DNC to ascertain how the machines | tabulated votes. | | The 2004 Election Has Already Been Rigged | | By Schuyler Ebbets | Posted September 2, 2003 thepeoplesvoice.org | | The pollsters have recently been forced to admit that the | majority of Americans are against the re-election of George | Bush. Two wars, thousands of dead human beings, and nine | million lost jobs later and people are beginning to realize | that something is very wrong. In spite of this gradual | awakening most registered voters continue to depend on TV | for their news and they are kept woefully in the dark about | issues like election reform and touch screen voting. The | media has gone to great lengths to foster an illusion of | legitimacy and normalcy surrounding the electoral process. | People have been intentionally lead to believe that their | vote counts and Bush could actually be booted out of office | on Election Day. No way is Bush going to lose, it just can't | happen. The 2004 election has already been rigged. The | corporations and the military industrial complex have bought | them selves a government and they aren't going to let some | silly little presidential election jeopardize their | investment. [ | http://vancouver.indymedia.org/news/2003/09/67789.php ] | | | Sludge Report #154 - Bigger Than Watergate! | [ http://scoop.co.nz/mason/stories/HL0307/S00064.htm ] | Tuesday, 8 July 2003, 6:13 pm | Column: C.D. Sludge | | | In This Edition: Bigger Than Watergate! - How To Rig An | Election In The United States - Fantasy vs Reality - How We | Discovered The Backdoor - Evidence Of Motive - Evidence Of | Opportunity - Evidence Of Method - Evidence Of Prior Conduct | - Consistent Unexplained Circumstantial Evidence | | IMPORTANT NOTE: Publication of this story marks a watershed | in American political history. It is offered freely for | publication in full or part on any and all internet forums, | blogs and noticeboards. All other media are also encouraged | to utilise material. Readers are encouraged to forward this | to friends and acquaintances in the United States and | elsewhere. | | | *** NEW *** FOLLOW UP STORY | Bald-Faced Lies About Black Box Voting Machines | and | The Truth About the Rob-Georgia File [ | http://scoop.co.nz/mason/stories/HL0307/S00078.htm ] | | See Also Companion Article For Detail And Screenshots Of An | Election Hack . . . Inside A U.S. Election Vote Counting | Program http://scoop.co.nz/mason/stories/HL0307/S00065.htm | | | Sludge Report #154 | | Bigger Than Watergate! | | The story you are about to read is in this writer's view the | biggest political scandal in American history, if not global | history. And it is being broken today here in New Zealand. | | This story cuts to the bone the machinery of democracy in | America today. Democracy is the only protection we have | against despotic and arbitrary government, and this story is | deeply disturbing. | | Imagine if you will that you are a political interest group | that wishes to control forevermore the levers of power. | Imagine further that you know you are likely to implement a | highly unpopular political agenda, and you do not wish to be | removed by a ballot driven backlash. | | One way to accomplish this outcome would be to adopt the | Mugabe (Zimbabwe) or Hun Sen (Cambodia) approach. You agree | to hold elections, but simultaneously arrest, imprison and | beat your opponents and their supporters. You stuff ballot | boxes, disenfranchise voters who are unlikely to vote for | you, distort electoral boundaries and provide insufficient | polling stations in areas full of opposition supporters. | | However as so many despots have discovered, eventually such | techniques always fail - often violently. Hence, if you are | a truly ambitious political dynasty you have to be a bit | more subtle about your methods. | | Imagine then if it were possible to somehow subvert the | voting process itself in such a way that you could steal | elections without anybody knowing. | | Imagine for example if you could: | | - secure control of the companies that make the voting | machines and vote counting software; | | - centralise vote counting systems, and politicise their | supervision; | | - legislate for the adoption of such systems throughout your | domain, and provide large amounts of money for the purchase | of these systems; | | - establish systems of vote counting that effectively | prevent anybody on the ground in the election - at a booth | or precinct level - from seeing what is happening at a | micro-level; | | - get all the major media to sign up to a single | exit-polling system that you also control - removing the | risk of exit-polling showing up your shenanigans. | | And imagine further that you; | | - install a backdoor, or numerous backdoors, in the vote | counting systems you have built that enable you to | manipulate the tabulation of results in real time as they | are coming in. | | Such a system would enable you to intervene in precisely the | minimum number of races necessary to ensure that you won a | majority on election night. On the basis of polling you | could pick your marginal seats and thus keep your tweaking | to a bare minimum. | | Such a system would enable you to minimise the risks of | discovery of your activities. | | Such a system would enable you to target and remove | individual political opponents who were too successful, too | popular or too inquisitive. | | And most importantly of all, such a system would enable you | to accomplish all the above without the public being in the | least aware of what you were doing. When confronted with the | awfulness of your programme they would be forced to concede | that at least it is the result of a democratic process. | | | How To Rig An Election In The United States | | So how would such a system actually work? | | Well one way to run such a corrupt electoral system might | look like this. | | - Each voting precinct (or booth) could be fitted with | electronic voting systems, optical scanning systems, punch | card voting systems or the more modern touchscreen | electronic voting machines; | | - At the close of play each day the booth/precinct | supervisor could be under instructions to compile an | electronic record of the votes cast in their booth; | | - They might print out a report that contains only the | details of the total votes count for that precinct/booth, | and then file via modem the full electronic record of votes | through to the County supervisor; | | - The County Supervisor could be equipped with a special | piece of software and a bank of modems that enables all | these results to be received and tabulated in the internals | of the computer; | | - The County Supervisors themselves could be assured that | their system was bullet proof, certified and contained | tamper-protection mechanisms par excellence; | | - The Country Supervisor could be given a range of tools for | looking at the data within this software, but nothing to | enable them to directly manipulate the results; | | - But unbeknownst to the County Supervisor the software | could actually create three separate records of the voting | data; | | - Meanwhile - also unbeknownst to the County Supervisor - | these three tables of voting data could be in fact | completely insecure and accessible simply through a common | database programme, say Microsoft Access; | | - Having the three tables would enable you to keep the real | data in place - so the system could pass spot tests on | individual precincts and booth results (should a precinct | supervisor be particularly astute) -while simultaneously | enabling you to manipulate the bottom line result; | | - Finally you might also enhance the election hacker's | powers by including within the software a utility to enable | them to cover their tracks by changing the date and time | stamps on files and remove evidence of your tampering. | | | Fantasy Becomes Reality | | The above description of a corrupt voting system is not the | result of an overactive imagination. Rather it is the result | of a extensive research by computer programmers and | journalists working around the globe. Principally it is the | work of investigative Journalist Bev Harris, author of the | soon to be published book " Black Box Voting: Ballot | Tampering In The 21st Century " | | And most important of all it is the result of research | focussed on investigating the actual software distributed by | one of the largest voting systems companies operating in the | recent U.S. Elections. | | CAVEAT: It is important to note that the research into this | subject has not established that the files we have been | working on were in fact in situ in County Election | Supervisors offices at the last election - nor have we proof | that the back door we have discovered - which might enable | the rigging of elections - was actually used in any recent | election. However it is the considered opinion of all those | involved in this investigation that it is not up to us as | journalists or programmers to prove that elections were | rigged, rather it is a responsibility of the electoral | system itself to prove its integrity. | | What you read here amounts to revelation of evidence of | motive, opportunity, method, prior conduct , and a variety | of items of, consistent unexplained circumstantial evidence | . Significantly we do not believe we have sufficient | resources to complete this investigation to its conclusion | and are therefore making available our findings to the | media, community organisations, political parties, computer | scientists and geeks in the anticipation that they will pick | up the torch and take extend this inquiry into every county | in the United States. | | | How We Discovered The Backdoor | | The story of how this story emerged is a great tale in | itself, most of which has already been told in this report | by Bev Harris: | | SYSTEM INTEGRITY FLAW DISCOVERED AT DIEBOLD ELECTION SYSTEMS | -- http://scoop.co.nz/mason/stories/HL0302/S00052.htm | | The short version of the story is relatively simple. | | In the course of investigating the issue of the integrity of | new electronic voting machines Bev Harris learned that | people around the world had been downloading from an open | FTP site belonging to Diebold Election Systems one of the | leading manufactures of voting systems. | | This website contained several gigabytes of files including | manuals, source codes and installation versions of numerous | parts of the Diebold voting system, and of its vote counting | programme GEMS. | | Realising we had stumbled across what might be the | equivalent of the Pentagon Papers for elections, the full | contents of this website have been secured around the world | at several locations. The original website was itself taken | down on January 29th 2003. | | We can now reveal for the first time the location of a | complete online copy of the original data set. As we | anticipate attempts to prevent the distribution of this | information we encourage supporters of democracy to make | copies of these files and to make them available on websites | and file sharing networks. | | http://users.actrix.co.nz/dolly/ | | As many of the files are zip password protected you may need | some assistance in opening them, we have found that the | utility available at the following URL works well: | | http://www.lostpassword.com | | Finally some of the zip files are partially damaged, but | these too can be read by using the utility at: | | http://www.zip-repair.com/ | | At this stage in this inquiry we do not believe that we have | come even remotely close to investigating all aspects of | this data. I.E. There is no reason to believe that the | security flaws discovered so far are the only ones. | | Therefore we expect many more discoveries to be made. We | want the assistance of the online computing community in | this enterprise and we encourage you to file your findings | at the forum HERE [ | http://liberalisnotadirtyword.com/cgi-bin/dcforum/dcboard.cgi | ] | | Finally, for obvious reasons it is important that this | information is distributed as widely as possible as quickly | as possible. We encourage all web bloggers, web publishers | and web media to re-publish and link to this article and to | its companion article by Bev Harris which contains detailed | descriptions of how to use the GEMS software to rig an | election: | | Companion Article For Detail And Screenshots Of An Election | Hack . . . Inside A U.S. Election Vote Counting Program | http://scoop.co.nz/mason/stories/HL0307/S00065.htm | | To conclude this overview article I will make a few more | comments on the evidence we have thus far that the U.S. | election system has been compromised. As stated earlier we | do not at this stage have proof that it has in fact been | been compromised through this method, just a great deal of | circumstantial evidence that it could have been. | | If this was Watergate, we are effectively at the point of | discovering evidence of a break-in and have received the | call from deep-throat telling us that should dig much | deeper. | | Proof will follow in time we expect, but only if the work we | have begun is completed and this inquiry is taken into every | corner of the U.S. electoral system. | | | Evidence Of Motive | | This is probably the easiest part of this puzzle to get your | head around. The motivation of the Republican Party in | general and the current administration in particular to gain | ever greater amounts of power - by whatever means possible | and damn the consequences - is evidenced most recently in | the Supreme Court's partisan appointment of George Bush Jr. | as President, the attempt to recall California Governor Gray | Davis, and the Ken Starr investigation and attempted | impeachment of President Clinton. | | | Evidence Of Opportunity | | Republican connected control over the major election systems | companies in the United States has been thoroughly | researched. | | Bob Urosevich, CEO of Diebold Election Systems is also the | founder of ES&S, a competing voting machine company. | Together these two companies are responsible for tallying | around 80% of votes cast in the United States. Also | significant, from what we can determine about the | architecture of the software, is that its basic structure | was specifically a creation of Mr Urosevich's company | I-Mark. | | For more background on Diebold Systems connections to the | Republican Party see: | | Diebold - The Face Of Modern Ballot Tampering | http://scoop.co.nz/mason/stories/HL0211/S00081.htm | | Meanwhile Presidential wannabee and Republican Party United | States Senator Chuck Hagel has been directly connected to | ES&S via his campaign finance director, Michael | McCarthy, who has admitted that Senator Hagel still owns a | beneficial interest in the ES&S parent company, the | McCarthy Group. | | [Diebold has in common with ES&S not only significant | connections with the Republican party. (Wally O'Dell, its | corporate chief. is a major contributor to the GOP) but | actual blood relationships. Bob Urosevich, brother of Todd | Urosevich (Vice President at ES&S), is in charge of | Diebold's election division. Both brothers' entry into the | vote counting business was funded by Howard Ahmanson, a | Savings and Loan heir who served for over twenty years on | the board of the Chalecedon Foundation, a Christian | Reconstructionist organization that advocates, among other | things, slavery and the death penalty for homosexuality and | "blasphemy." [ http://liberalslant.com/pt102103.htm ]] | | | Senate Ethics Director Resigns; Senator Hagel Admits Owning | Voting Machine Company [ | http://scoop.co.nz/mason/stories/HL0301/S00166.htm ] | | | Evidence Of Method | | The evidence of method has been detailed in a companion | article by Bev Harris, author of the soon to be published | block-buster Black Box Voting. | | Inside A U.S. Election Vote Counting Program | http://scoop.co.nz/mason/stories/HL0307/S00065.htm | | In this article - which contains screenshots from the | software and detailed instructions on how one might rig an | election - Bev Harris explains security flaws thus: | | | The GEMS election file contains more than one "set of | books." They are hidden from the person running the GEMS | program, but you can see them if you go into Microsoft | Access. | | You might look at it like this: Suppose you have votes on | paper ballots, and you pile all the paper ballots in room | one. Then, you make a copy of all the ballots and put the | stack of copies in room 2. | | You then leave the door open to room 2, so that people can | come in and out, replacing some of the votes in the stack | with their own. | | You could have some sort of security device that would tell | you if any of the copies of votes in room 2 have been | changed, but you opt not to. | | Now, suppose you want to count the votes. Should you count | them from room 1 (original votes)? Or should you count them | from room 2, where they may or may not be the same as room | 1? What Diebold chose to do in the files we examined was to | count the votes from "room2." | | Evidence Of Prior Conduct | | It is a recorded fact that every system of balloting | established in America has been gamed and rigged. I.E. | America's political practitioners have a very long history | of ballot rigging and vote tampering. This is nothing new | and evidence of the sort we have uncovered has been long | predicted by computer scientists such as Dr Rebecca Mercuri. | | In more recent history investigative Journalist Greg Palast | has documented in detail Katherine Harris's use of | electronic data matching technologies to disenfranchise | thousands of Florida voters in advance of the 2000 | Presidential election. | | We highly recommend readers purchase a copy of "The Best | Democracy Money Can Buy" by Greg Palast to read much more | about this. | | A compendium of links on Palast's investigations can be | found via a Google search on: "greg palast florida | katherine harris" | | | Consistent Unexplained Circumstantial Evidence | | During the 2002 Mid-term there were numerous reports of | unusual happenings in counties throughout the United States. | | Among the phenomena reported were voting numbers suddenly | fluctuating in the middle of the counting process, something | you might expect to see if the backdoor identified above | were used clumsily. | | An organisation called Votewatch was set up during the 2002 | elections to record unusual happenings and its archives can | be viewed here: | | http://pub103.ezboard.com/bsoldiervoice | | It will suffice here to cite a couple of specific examples - | these are excerpts from the soon to be published "Black Box | Voting: Ballot Tampering In The 21st Century". These | examples of actual events are consistent with the existence | and use of an electronic vote counting hack described above. | | November 1990, Seattle, Washington - Worse than the | butterfly ballot, some Democratic candidates watched votes | alight, then flutter away. Democrat Al Williams saw 90 votes | wander off his tally between election night and the | following day, though no new counting had been done. At the | same time, his opponent, Republican Tom Tangen, gained 32 | votes. At one point several hundred ballots added to returns | didn't result in any increase in the number of votes. But | elsewhere, the number of votes added exceeded the number of | additional ballots counted. A Republican candidate achieved | an amazing surge in his absentee percentage for no apparent | reason. And no one seemed to notice (until a determined | Democratic candidate started demanding an answer) that the | machines simply forgot to count 14,000 votes. | | November 1996, Bergen County, New Jersey - Democrats told | Bergen County Clerk Kathleen Donovan to come up with a | better explanation for mysterious swings in vote totals. | Donovan blamed voting computers for conflicting tallies that | rose and fell by 8,000 or 9,000 votes. The swings perplexed | candidates of both parties. For example, the Republican | incumbent, Anthony Cassano, had won by about 7,000 votes as | of the day after the election but his lead evaporated later. | One candidate actually lost 1,600 votes during the counting. | ``How could something like that possibly happen?'' asked | Michael Guarino, Cassano's Democratic challenger. | ``Something is screwed up here.'' | | November 1999, Onondaga County, New York - Computers gave | the election to the wrong candidate, then gave it back. Bob | Faulkner, a political newcomer, went to bed on Election | Night confident he had helped complete a Republican sweep of | three open council seats. But after Onondaga County Board of | Elections staffers rechecked the totals, Faulkner had lost | to Democratic incumbent Elaine Lytel. | | April 2002, Johnson County, Kansas - Johnson County's new | Diebold touch screen machines, proclaimed a success on | election night, did not work as well as originally believed. | Incorrect vote totals were discovered in six races, three of | them contested, leaving county election officials scrambling | to make sure the unofficial results were accurate. Johnson | County Election Commissioner Connie Schmidt checked the | machines and found that the computers had under- and | over-reported hundreds of votes. ``The machines performed | terrifically,'' said Bob Urosevich, CEO of Diebold Election | Systems. ``The anomaly showed up on the reporting part.'' | | The problem, however, was so perplexing that Schmidt asked | the Board of Canvassers to order a hand re-count to make | sure the results were accurate. Unfortunately, the touch | screen machines did away with the ballots, so the only way | to do a hand recount is to have the machine print its | internal data page by page. Diebold tried to re-create the | error in hopes of correcting it. ``I wish I had an answer,'' | Urosevich said. In some cases, vote totals changed | dramatically. | | November 2002, Comal County, Texas - A Texas-sized lack of | curiosity about discrepancies: The uncanny coincidence of | three winning Republican candidates in a row tallying up | exactly 18,181 votes each was called weird, but apparently | no one thought it was weird enough to audit. Conversion to | alphabet: 18181 18181 18181 ahaha ahaha ahaha | | November 2002, Baldwin County, Alabama - No one at the | voting machine company can explain the mystery votes that | changed after polling places had closed, flipping the | election from the Democratic winner to a Republican in the | Alabama governor's race. ``Something happened. I don't have | enough intelligence to say exactly what,'' said Mark Kelley | of ES&S. Baldwin County results showed that Democrat Don | Siegelman earned enough votes to win the state of Alabama. | All the observers went home. The next morning, however, | 6,300 of Siegelman's votes inexplicably had disappeared, and | the election was handed to Republican Bob Riley. A recount | was requested, but denied. | | November 2002, New York - Voting machine tallies impounded | in New York: Software programming errors hampered and | confused the vote tally on election night and most of the | next day, causing elections officials to pull the plug on | the vote-reporting Web site. Commissioners ordered that the | voting machine tallies be impounded, and they were guarded | overnight by a Monroe County deputy sheriff. | | November 2002, Georgia - Election officials lost their | memory: Fulton County election officials said that memory | cards from 67 electronic voting machines had been misplaced, | so ballots cast on those machines were left out of | previously announced vote totals. No hand count can shine | any light on this; the entire state of Georgia went to | touch-screen machines with no physical record of the vote. | Fifty-six cards, containing 2,180 ballots, were located, but | 11 memory cards still were missing two days after the | election: Bibb County and Glynn County each had one card | missing after the initial vote count. When DeKalb County | election officials went home early Wednesday morning, they | were missing 10 cards. | | **** ENDS **** | | Anti©opyright Sludge 2003 | | | Copyright (c) Scoop Media | | (In accordance with Title 17 U.S.C. Section 107, this | material is distributed without profit to those who have | expressed a prior interest in receiving the included | information for research and educational purposes.) | | | Voting Fraud | [ http://lightscion.com/voting_fraud.htm ] | | In the U.S.A., where the notion of common interest is young, | democracy is generally still very weak (Dick Cheney admitted | he never cared to vote). When a coalition of conservative | forces seized power in the 2000 U.S 'election', democracy | got very ill. Rightist ideology expands its wings over the | world, backed by an uncontrolled military machine and | intelligence apparatus, financed by countless of billions of | dollars. The underlying dynamics are oil imperialism, space | weapons, and subliminal racism. Items no party would ever | get democratically elected for, and so they had to be | enforced - enter 9/11. The 2000 administration has been put | in place by nation-wide fraud in the election process. Now, | with 9/11 as a pretext, innocent human beings are being | imprisoned (2 [ http://www.broward.com/mld/miami/2929045.htm | ]) and tortured (3 [ | http://swissinfo.org/sen/Swissinfo.html?siteSect=143&sid=1459443 | ]), and governments that don't bend can find themselves | terrorized, by both visible (4 [ | http://wsws.org/articles/2002/jan2002/anth-j23.shtml ]) and | unvisible violence (5 [ | http://www.twnside.org.sg/title/hawa2.htm ]). To keep the | general public ignorant, concocted stories of Islamic | terrorism are fed to the media - who have no choice than to | abide (6 [ http://lightscion.com/corporate_media_CIA.htm ]). | | * Hacking Democracy | [ http://salon.com/tech/feature/2003/02/20/voting_machines/index.html?x ] | | * Suppression of minorities | [ http://www.washingtonpost.com/ac2/wp-dyn/A5346-2002Nov4?language=printer ] | | * Fraud in Arkansas | [ http://www.pbcommercial.com/archives/index.inn?loc=detail&doc=/2002/October/22-2390-NEWS1.TXT ] | | * Three Republicans win their states with exactly the same | number of votes | [ http://abclocal.go.com/ktrk/news/110802_sn_number.html ] | | * 104000 Florida votes missing | [ http://www.sanluisobispo.com/mld/sanluisobispo/news/politics/4465458.htm ] | | * Machines in Florida automatically switch votes to | Republican candidate | [ http://www.drudgereport.com/vote1.htm ] | | * The vote counting machines are in the hands of a small | number of private corporations | [ http://www.talion.com/election-machines.html ] | | * The software for the machines is written in proprietary | code - undecipherable for external controllers | [ http://nypress.com/13/50/news&columns/feature.cfm ] | | * If you want to win the elections, control the voting | machines | [ http://www.commondreams.org/views03/0131-01.htm ] | | | (In accordance with Title 17 U.S.C. Section 107, this | material is distributed without profit to those who have | expressed a prior interest in receiving the included | information for research and educational purposes.) | | | Rebecca Mercuri's Statement on Electronic Voting | [ http://notablesoftware.com/RMstatement.html ] | Copyright © 2001 by Rebecca Mercuri  All Rights Reserved. | | ``I am adamantly opposed to the use of any fully electronic | or Internet-based systems for use in anonymous balloting and | vote tabulation applications. The reasons for my opposition | are manyfold, and are expressed in my writings as well as | those of other well-respected computer security experts. To | briefly summarize my opinion (based on a decade of research) | on this matter I state the following... ... It is therefore | incumbent upon all concerned with elections to REFRAIN from | procuring ANY system that does not provide an indisputable | paper ballot which can be checked by the voter visually | before deposit and used by the election board in the case of | recount.'' [ http://notablesoftware.com/RMstatement.html ] | | ____________________________________________________________ | | | Additional reading: | | Targeting Diebold with Electronic Civil Disobedience | http://why-war.com/features/2003/10/diebold.html | | Mirror of Targeting Diebold with Electronic Civil | Disobedience (Doesn't contain "Campaign Update) | http://members.optusnet.com.au/whywardotcom/ | | A coalition of concerned students from across the world. | http://wiki.volitant.net/diebold-cd/ | | The above links contain among other things an archive with | about 15,000 internal Diebold e-mail messages. Some | referred to software patches installed on Diebold machines | days before elections. Others indicated that the Microsoft | Access database used in Diebold's tabulation servers was not | protected by passwords. Diebold, which says passwords are | now installed on machines, is threatening legal action | against anyone who posts the files or links to them, | contending that the e-mail is copyrighted. | | Resources | http://propaganda.lege.net/resources/ | | Media censorship and 175,000 uncounted Florida ballots | http://votermarch.org/FilmFl.htm | | 673 Law Professors Say: By Stopping the Vote Count in | Florida, The U.S. Supreme Court Used Its Power To Act as | Political Partisans, Not Judges of a Court of Law | http://the-rule-of-law.com/archive/supreme/statement.html | | | Copyleft © 2003 Leif Erlingsson or author. | Updated 5 December 2003 |______________________________________________________________