Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Dr. Britt Williams (Georgia "expert") explains why Diebold is "secure"

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU
 
Kelvin Mace Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:01 PM
Original message
Dr. Britt Williams (Georgia "expert") explains why Diebold is "secure"
Right off the top, the very first assumption about an audit trail doesn't exist in Diebold's software. You can edit the audit log and erase your tracks. I leave the rest of it for your comments
---------------------------------------------------------------------


Security in the Georgia Voting System
Britain J. Williams, Ph.D.
April 23, 2003

Introduction: The State of Georgia replaced all voting systems statewide with a computer-based voting system. This system, known as a direct recording electronic (DRE) voting system, was first used in the November 2002 election. This voting system, described in the next section, is computer based. As a result, questions have been raised regarding the vulnerability of the system to attacks by hackers and persons attempting election fraud.

Overall security of any computer-based system is obtained by a combination of three factors working in concert with each other. First, the computer system must provide audit data that is sufficient to track the sequence of events that occur on the system and, to the extent possible, identify the person(s) that initiated the events. Next, there must be in place well defined and strictly enforced policies and procedures that control who has access to the system, the circumstances under which they can access the system, and the functions that they are allowed to perform on the system. Finally, there must be in place physical security; fences, doors, locks, etc.; that control and limit access to the system. This article describes how these factors are incorporated into the election system in the State of Georgia.

Overview of the Georgia Voting System: The computer-based election system deployed in the State of Georgia is classified as a direct recording electronic (DRE) system. The components of the system consist of the following:

Standard personal computers running an executable module known as GEMS, Global Election Management System. This system, called the GEMS computer, is used to define the election, enter the candidates and questions, and format the ballots for the voting devices. This computer also accumulates the votes after the polls close and prints various reports and audits.

Touch-screen voting stations are used for in-person voting.

Optical ballot scanners are used for absentee and provisional voting.


Each county election office in the State is equipped with a GEMS computer. This computer is used to define elections and format the ballots for both the touch-screen voting stations and the absentee (paper) ballot scanners. The system also produces files that can be sent directly to a printer to print the absentee and provisional ballots.

When the election definition is complete, the GEMS system produces PCMCIA cards, also called PC memory cards, which are used to program the touch-screen voting stations and the ballot scanners. One card is produced for each voting station and ballot scanner.
While still in the county warehouse the voting stations are arranged by precinct and the PC cards are inserted. In the days just before the election a series of tests called Logic and Accuracy tests are conducted. These tests are designed to confirm that the voting stations have been properly prepared for the election and that they correctly register all votes cast. These tests are open to the public. At the completion of the Logic and Accuracy tests the voting stations are sealed and delivered to the precincts.

On the morning of Election Day the Precinct Manager and Assistant Precinct Manager break the seals and prepare the voting stations for the election. The first step in this process is to print out a 'zero totals tape'. This tape verifies that no votes have been recorded on the voting stations prior to the opening of the polls. As the voters cast their ballots on a touch-screen voting station their choices are recorded on the PC memory card. The absentee ballots and provisional ballots are processed through ballot scanners and their votes are recorded on PC memory cards.

After the polls close all of the memory cards from the voting stations in the precincts and from the absentee and provisional ballot scanners are returned to the county elections office for tallying.

Certification of the Voting System: Georgia participates in the Federal Election Commission (FEC) Voting Systems Standards program. This program defines three levels of tests that a voting system must pass before it can be used in Georgia. These three levels are federal tests called Qualification Tests, state tests called Certification Tests, and local tests called Acceptance Tests.

National laboratories selected by and monitored by the National Association of State Election Directors (NASED) Voting System Board administer the Qualification tests. During these tests the system is evaluated for accuracy, reliability, availability, and maintainability. In addition, the system is subjected to various environmental conditions that simulate the conditions under which an election system may be transported and stored. A major component of these tests is a line-by-line examination of the source code for the system. This review includes an evaluation of the function of each module of the code to insure that no extraneous code is contained in the system. A complete description of the Qualification tests can be found in the FEC Voting System Standards section on the FEC web site: http://www.fec.gov.

After the system has successfully completed qualification testing it is brought into the State for Certification testing. Certification testing is conducted by the Center for Election Systems at Kennesaw State University. Tests are conducted to verify that the voting system complies with the requirements of the Georgia Election Code, the Rules of the Georgia Secretary of State, and the Rules of the Georgia Election Board. A mock election is defined and executed in order to evaluate whether or not the system can be installed and operated by personnel in a typical Georgia election office. During this mock election a sufficient number of ballots is cast to ensure that the system has the capacity to accommodate the maximum number of ballots that may be cast in a Georgia precinct. A major component of the certification tests is to install security features.

The final level of tests, Acceptance tests, are conducted in the county offices after the voting system has been delivered and installed. The purpose of these tests are to verify that the system as delivered and installed in the county is complete, is working properly, and is identical to the system that was previously Qualified by the ITA and Certified by the State. The KSU Center for Election Systems also conducts Acceptance tests.

Types of Threats to an Election System: There are two reasons why a person might launch an attack against an election system: to disrupt the election or to commit election fraud. In the first instance, the intent of the perpetrator is simply to disrupt the election, an act of terrorism. Although a terrorist act against an election is disruptive, it is not a threat to the integrity of the election. On September 11, when the twin towers in New York were attacked, there was an election in progress in New York City. One of the precincts was in the shadow of 'ground zero'. The election was completely disrupted. New York election officials re-conducted this election with such quiet professionalism that very few people outside New York are even aware that an election was in progress on that fateful day. No matter how severe, an act of terrorism against an election is disruptive and expensive but it is no threat to the electoral process.

Election fraud is an attempt to alter the outcome of an election. In order to be successful election fraud must go undetected. Once detected election fraud is simply another form of terrorism and can be dealt with accordingly.

The security features installed in the Georgia voting system protect against both terrorism and election fraud, but the main emphasis is on preventing election fraud.

Computer System Security Features: The computer portion of the election system contains features that facilitate overall security of the election system. Primary among these features is a comprehensive set of audit data. For transactions that occur on the system, a record is made of the nature of the transaction, the time of the transaction, and the person that initiated the transaction. This record is written to the audit log. If an incident occurs on the system, this audit log allows an investigator to reconstruct the sequence of events that occurred surrounding the incident.

In addition, passwords are used to limit access to the system to authorized personnel.

Procedural Security Features: There are rigid policies and procedures that control who has access to the election system, when they can access the system, what components they can access, and what function they are allowed to perform. The most familiar of these procedures is the process that a voter must go through in order to cast a vote on the system.

Many of these procedures are directed toward insuring that the correct versions of the system software is initially installed in the GEMS computers and voting stations and, subsequently, testing at various times to insure that this software has not been altered.

To insure that the initial installation of the software is correct, the following steps are rigidly enforced.

· The State does not accept software from any source except the ITA that conducted the NASED Qualification Tests on the software. When the ITA completes Qualification Testing of the software they submit to the KSU Election Center a copy of the source code and the resulting object code.
· As a part of the State Certification Testing the KSU Election Center prepares a validation program, similar to a virus detector program, that is subsequently used to verify that versions of the software installed in the county systems is identical to the software that the KSU Center certified. This validation program is structured such that it provides a 1/1,000,000,000 chance that someone could alter the software without being detected.
· When the software is installed in a county system, a member of the KSU Center travels to that county and runs the validation program to verify that the installed software is correct.
· This validation program is routinely run before an election is begun to verify that the software is correct. It is run again after the election to verify that the software did not change during the election.
· The validation program can be run at any time that an incident occurs that might potentially alter the software. An example of such an event might be a nearby lightning strike that caused the GEMS computer to crash.

Physical Security Features: The first line of defense in any system is physical security. The following is an overview of the physical security implemented in State elections.

· The GEMS computers are kept in locked offices within the county election offices.
· The GEMS computers are not connected to any communication system, including the Internet, and contain no software other than the Windows operating system and the Global Election Management System object code.
· A security program, similar to a virus detector program, is run against the Windows operation system and the GEMS object code prior to beginning the definition of an election to verify that the code has not been altered. This program is repeated after the close of the election to verify that the code did not change during the election.
· No person is allowed access to the GEMS computer until his or her identity has been clearly established by the county Election Superintendent.
· The voting stations are stored in their voting booth cases in stacks of five in a locked county warehouse facility.
· The PC memory cards in the touch screen voting stations are in a locked compartment. The Precinct Manager is the only person in a precinct with a key to this compartment.
· After the polls close a summary report of the votes cast in the precinct is posted on the precinct door.
· The PC memory cards from a precinct are transported from the precinct to the county elections office by a sworn election official or a sworn law enforcement officer.
· The area of the precinct that contains the voting stations is secure. A voter is not allowed to enter this area until a voting station is available for his or her use.

Specific Comments: In the following paragraphs we address specific comments that have appeared in the press and open literature.

"If the only way you know that it's working incorrectly is when there's four votes instead of 1,200 votes, then how do you know that if it's 1,100 votes instead of 1,200 votes? You do not know.", Rebecca Mecuri, Professor, Bryn Mawr College, Washington Post, New Voting Systems Assailed, March 28, 2003

In a Georgia precinct there are three separate manual counts of the number of voters that cast ballots in the precinct. These are 1) the number of people that fill out a registration slip (called a voter's certificate), 2) the number of people checked on the voter registration list, and 3) the numbered list of voters (i.e. the number of ballots issued). When the polls are closed these three numbers are audited against the number of ballots recorded as cast on the voting system. Any discrepancy between these four totals is immediately obvious and must be accounted for in order to close the precinct.

"No official at Diebold or the Georgia Secretary of State's office has provided any explanation at all about program files contained in a folder called 'rob-georgia' on Diebold's unprotected FTP site. Inside 'rob-georgia' were folders with instructions to 'Replace what is in the GEMS folder with these' and 'Run this program to the C-Program Files in Winnt System32 Directory' ". Beverly Harris, Black Box Voting: Ballot-Tampering in the 21st Century, http://www.blackboxvoting.com, March 3, 2003

Apparently, there was an FTP site that Diebold employees used to store and transfer versions of the system that were under development. The contents, or even existence, of the 'rob georgia' folder has not been established.

However, for the sake of this discussion, we will assume that the FTP site existed, that the version of the GEMS system used in Georgia was on that FTP site, that the 'rob georgia' folder existed, and that there was a rogue employee at Diebold that intended to use the 'rob georgia' folder to corrupt the Georgia voting system.

This would have had absolutely no effect on the election system as implemented in Georgia. The State does not obtain its election system code from an FTP site or even from Diebold. The process is as follows:

· The vendor, Diebold, submits the source code to the ITA.
· The ITA conducts a line-by-line examination of the source code to determine that no extraneous code is present (i.e. that all code presented has a direct relationship to the functions of conducting an election).
· After completing their evaluations, the ITA oversees the compilation of the source code into object code.
· The ITA, not the vendor and certainly not an open FTP site, provides the KSU Election Center with the source code, the object code, and various related files.
· The KSU Election Center conducts Certification Tests on the code provided by the ITA.
· After successful completion of Certification Tests the vendor is allowed to install the certified object code in the county computers.
· The KSU Center conducts audits to verify that the code that the vendor installs in the counties is identical to the code that was obtained from the ITA.

"A patch to the underlying operation system - Windows - can slip through without scrutiny." Beverly Harris, Black Box Voting: Ballot-Tampering in the 21st Century, http://www.blackboxvoting.com, March 3, 2003.

This comment assumes that the State of Georgia allows changes and/or upgrades to the Microsoft operating system. This is not the case.

The vendor, Diebold, submits to the ITA a specific version of the operating system and a specific version of the election software. This specific version of the operating system and the election software undergoes ITA testing and State Certification testing. The State Certification is for this specific version of the Microsoft operating system and the Diebold election system. After State Certification any change to either the Microsoft operating system or the Diebold election system voids the State Certification.

If a change to either the Microsoft operating system or the Diebold election system becomes desirable or necessary, this change voids the State Certification. The revised system then must then go back through the entire ITA Qualification and State Certification process.

"It requires one programmer at the company who has a political agenda or who has been bribed or somebody who can break into the company's network, who can hack the code when they're not looking," David Dill, Professor, Stanford University, High Tech Train Wreck, Creative Loafing, April 2, 2003.

This is the vendor version of the comment above and is equally unlikely. Let's look at what must transpire in order for a rogue employee of the vendor to effectively commit election fraud.

First, (s)he must figure out how to defraud an election that has not yet been defined and that will occur several years in the future. Since the races, much less the candidates, have not yet been defined the best you can hope for is to favor certain parties. In Georgia this is not a trivial matter. The State does not use the party affiliations built into the election system. Instead, the State embeds the party affiliation in the candidate name field. Thus, the rogue code must parse the name field looking or "R" or "Rep" or "REP" or "Republican" or "REPUBLICAN", and "D" or "Dem" or "DEM" or "Democrat" or "DEMOCRAT", etc.

Second, in a primary election all choices on a given ballot belong to the same party, it would be impossible to favor an, as yet, undetermined candidate in a primary election.

Finally, for this approach to election fraud to succeed, this code must lie dormant during all testing phases, ignore a primary election but become active during a general election, and lie dormant during all post election testing.

The code required to accomplish the foregoing is substantial. It is extremely unlikely that this amount of code would escape detection by the ITA during Qualification Testing.

Finally, if all else fails and rogue code finds its way into the State election system, it would be detected during State certification tests. The contention is that this code could be cleverly devised to become active only on the dates of a general election. When we conduct our mock election we set the date on the computer to the date of a general election.

"A person could insert a memory card into a voting machine that would change the program on the machine.", Anonymous.

This conjecture assumes that one can simply walk up to a voting station in the State and insert a PC memory card. It is not this simple.

The following steps would be necessary in order to commit election fraud by altering the code in the voting stations employed in Georgia.

First, one would have to obtain the code installed in the voting station and alter it to suit their purpose. This is no small feat but, for the sake of this discussion, let us assume that it is done. Assume that the perpetrator has in their possession a supply of PC memory cards that can alter the code in a voting station in such a way as to alter the outcome of an election. One must now get this bogus system installed in the voting stations.

The voting stations can be attacked either before or after they are installed in the precincts. Before they are installed in the precincts the voting stations are stored in county warehouse facilities. In these warehouses, the voting stations are enclosed in their voting station cases and stacked five high. To alter the voting stations in this environment, one would have to gain access to the warehouse, remove the voting stations from the stacks, open the cases, unlock the memory card access door (having obtained a key from somewhere), insert the bogus PC memory card, boot the voting station to install the bogus code, shut down the voting station, remove the bogus PC memory card, close the case, and return the voting station to the stack. All of this must be accomplished without being detected by any of the county warehouse employees.

To attack the voting stations in a precinct one would have to gain access to the secure area of the precinct. The only people allowed in this area are poll workers and registered voters. Poll workers only work in one precinct and do not move from precinct to precinct. Altering the voting stations in only one precinct is not likely to alter the outcome an election. Thus our perpetrator must either be or impersonate a registered voter in the precinct. Once in the secure area, the perpetrator must remove the right-hand security screen, unlock the memory card access door (having obtained the key from somewhere), remove the PC memory card in the voting station and insert the bogus PC memory card, reboot the voting station, remove the bogus PC card and re-insert the original card, reboot the voting station, lock the access door, and replace the security screen. All of this must be accomplished without attracting the attention of any of the poll workers, candidate poll watchers, or party poll watchers. This procedure must then be repeated for the other voting stations in the precinct.

The above scenarios describe the effort required to alter a single voting station. In order to impact a statewide race our perpetrator must modify a significant portion of the 22,000 voting machines in the State. To impact an election in Fulton or DeKalb County one would have to alter a significant portion of 3,000 voting stations. On the other hand, if one's ambition were to be a county commissioner in Talliaferro County, population 2077, he would only have to alter 8 voting stations.

"When Georgia debuted 22,000 Diebold touch screens last fall, some people touched one candidate's name on the screen and saw another candidate's name appear as their choice. Voters who were paying attention had a chance to correct the error before finalizing their vote, but those who weren't did not.", Dan Keating, Washington Post Staff Writer, New Voting Systems Assailed Computer Experts Cite Fraud Potential, Washington Post, March 28, 2003.

"In Georgia, newly using touch-screens, some voters reported their votes being recorded for other candidates", Peter G. Neumann, SRI, The 2002 General Election, The Risks Digest, Volume 22, Issue 36, November 6, 2002.

During the 2002 General Election in Georgia there were five reported instances of persons touching a name on the ballot and adjacent name lighting up. In each case, technicians were sent to the precinct, but in each case the problem could not be duplicated.

This can occur as a result of a calibration error on a voting station. If the voting station is not perfectly calibrated there will be a small area between two names where pressing in this area will register for the wrong name. Since most voters vote with the end of their finger, not with a sharp instrument such as a stylus, the voting station would have to be significantly out of calibration for this error to occur.

When it does occur it is immediately obvious and easy to correct. The voter simply de-selects the wrong name and selects the right name. If the voter is not paying attention and misses this error when it occurs, (s)he gets another chance to correct the error when (s)he reviews the summary screen at the end of the ballot.

If the situation persists, the voter is moved to another voting station to continue voting and the poll manager recalibrates the errant voting machine. It takes approximately two minutes to re-calibrate a voting machine.

"Computerized voting equipment is inherently subject to programming error, equipment malfunction, and malicious tampering. It is therefore crucial that voting equipment provide a voter-verifiable audit trail, by which we mean a permanent record of each vote that can be checked for accuracy by the voter before the vote is submitted, and is difficult or impossible to alter after it has been checked. . . . The paper ballots must be submitted by the voters, to be available for counting or recounting and to avoid vote-selling. The votes on the paper ballots must be regarded as the definitive legal votes, taking precedence over electronic records or counts. ", David Dill, Professor, Stanford University, http://verify.stanford.edu/evote.html, January 20, 2003.

Complex problems rarely have simple solutions. If all of the problems with an electronic voting system could be solved by the seemingly simple act of adding a printer to each voting station and printing paper receipts election officials would be clamoring for this to happen. They are not. Here are some of the reasons.

There are logistical problems associated with the introduction of paper ballots.
· The presence of the paper supply in the voting station would increase the weight of the voting station. When fully loaded with paper, as at the opening of the polls, the current voting stations that provide paper receipts weight in excess of forty pounds, more than a typical poll worker is capable of lifting.
· The component of an electronic system that is most likely to malfunction is an electro-mechanical component. Printers are more mechanical than electrical. Thus, the introduction of the printer to a voting station greatly increases the probability of the voting station failing during an election.
· Poll workers must be trained to replace paper and ink.
· Technicians must be available to replace failed printers.
· Finally, there is the expense associated with the purchase, installation, and maintenance of a large number of printers (22,000, and counting, in Georgia).

The contention is that the voter will check the paper receipt for accuracy before his ballot is cast. Georgia law requires that voters be allowed to change their ballots up to the time that the ballot is cast. Therefore, a voter who does not like what is on the paper ballot must be given an opportunity to change it, as many times as he wishes. The present procedure for spoiling a paper ballot includes a requirement that the spoiled ballot be placed in an envelope to be available for auditing the number of ballots issued versus the number of ballots cast. If the voter can change his mind at random and print as many paper ballots as he wishes, how is the poll worker to know how many ballots have been spoiled and ensure that the correct paper ballot is deposited in the ballot box?

How do you handle the situation where a voter casts his electronic ballot before he notices that the paper ballot, for whatever reason, cannot be read? Now we have a valid electronic ballot, but no corresponding paper ballot. If we now use the paper ballots in any official capacity we have disenfranchised this voter.

A similar situation exists when a voter casts his electronic ballot and then insists that his paper ballot is incorrect. How do we determine whether this is the result of a voter error or a system error? If the voter admits to committing an error there is no way the error can be corrected. We cannot let him obtain a paper ballot by voting again on the electronic system and changing the paper ballot introduces a discrepancy between the electronic ballots and the paper ballots.

It finally gets down to a question of need. The primary argument in favor of a paper receipt is that it could be used to check the accuracy of the electronic system. The fallacy in this argument is that the paper receipts would, in fact, be less accurate than the electronic ballots they are supposedly checking. The current DRE voting systems have been tested to an accuracy of better than one part in ten million, as per the FEC Voting Systems Standards. Thus, the paper receipt is not needed to insure accuracy. In fact, our past experience with manual counts of paper ballots proves that they cannot consistently achieve that level of accuracy.

The paper ballots could be printed in a format that is machine-readable and counted on another computer. But that would put us in the rather peculiar position of saying that we do not trust the computer that printed the ballots but we trust the computer that counted them.

Summary: In conclusion, we recognize that there is no such thing as a 100 % secure computer system. Yet we are willing to fly on airplanes that are controlled by computers. We allow a heart-lung machine controlled by a computer to monitor and control the vital functions of our body during an operation. In many phases of our lives we are willing to submit to various computer controlled situations. Why should we not extend the same level of confidence to our voting systems.

We do not pretend that the security features described above make the State's voting system completely safe from attack. We do believe, however, that these features reduce the chance of a successful election fraud in the State of Georgia to better than one in one billion.
------------------------
About the Author: Brit Williams is a Professor Emeritus of Computer Science and Information Systems at Kennesaw State University. He was a consultant to the FEC during the development of the FEC Voting System Standards in 1990 and again in 2002. He is currently a member of the NASED Voting Systems Board and Chair of the NASED Voting Systems Board Technical Committee. He has been conducting certification evaluations of computer-based voting systems for the State of Georgia


David Allen
Publisher, CEO, Janitor
Plan Nine Publishing
1237 Elon Place
High Point, NC 27263
http://www.plan9.org
Printer Friendly | Permalink |  | Top
DEMActivist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:07 PM
Response to Original message
1. But, someone is lying....
Dr. Williams says:

However, for the sake of this discussion, we will assume that the FTP site existed, that the version of the GEMS system used in Georgia was on that FTP site, that the 'rob georgia' folder existed, and that there was a rogue employee at Diebold that intended to use the 'rob georgia' folder to corrupt the Georgia voting system.

This would have had absolutely no effect on the election system as implemented in Georgia. The State does not obtain its election system code from an FTP site or even from Diebold. The process is as follows:

· The vendor, Diebold, submits the source code to the ITA.
· The ITA conducts a line-by-line examination of the source code to determine that no extraneous code is present (i.e. that all code presented has a direct relationship to the functions of conducting an election).
· After completing their evaluations, the ITA oversees the compilation of the source code into object code.
· The ITA, not the vendor and certainly not an open FTP site, provides the KSU Election Center with the source code, the object code, and various related files.
· The KSU Election Center conducts Certification Tests on the code provided by the ITA.
· After successful completion of Certification Tests the vendor is allowed to install the certified object code in the county computers.
· The KSU Center conducts audits to verify that the code that the vendor installs in the counties is identical to the code that was obtained from the ITA.

But the Legal Department, State Elections Division says:
From: Clifford D. Tatum
Assistant Director - Legal Affairs
State Elections Division
2 MLK Jr. Drive, Suite 1104
Atlanta, Georgia 30334
Office: 404-657-5352; Fax: 404-651-9531

Our office has received your request under the Georgia Open Records Act, O.C.G.A. § 50-18-70 regarding electronic voting information.

Please find outlined below a response relative to each item requested. Public records matching the description of your request do not exist for each of the categories you have identified. However, for the categories in which records do exist, the documents will be made available for inspection or copying at a mutually convenient time.

In response to your first category, we have determined that no records exist regarding a change to software used by the voting system.

The request was:
> 1. According to state law, any changes in the voting machine software
> (GEMS and Windows) require documentation in writing. I would like to
> get copies of any such documentation.
Printer Friendly | Permalink |  | Top
 
Fredda Weinberg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:09 PM
Response to Reply #1
3. I still see no contradiction
the first describes a procedure to handle a scenario, the second says there were no files changed. Where's the lie?
Printer Friendly | Permalink |  | Top
 
DEMActivist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:23 PM
Response to Reply #3
6. A little reading comprehension might help
Clifford Tatum says "no records exist." Dr. Williams says all of it is documented and a rigid procedure followed. But there are no records......

And, this may help just a bit:

Political Notebook
Larry Hartstein and Doug Nurse
Atlanta Journal Constitution
Sunday, September 1, 2002

Georgia -- The Aug. 20 primary was supposed to offer voters a chance to try out the touch-screen system that will be used statewide in November.

But in Gwinnett County and elsewhere, many of the machines failed.

snip....

But Ledford was relieved to learn the machines worked well in Hall and Marion counties, the only counties where real primary votes were recorded electronically.

The touch-screen machines in those counties had received a software upgrade that those in Gwinnett and Fulton had not. And only the poll workers in Hall and Marion had gotten extensive training in using the machines, made by Diebold Election Systems of Ohio.

So far, Gwinnett has 151 touch-screens. The county expects to receive about 1,100 more on Sept. 13. All are scheduled to receive software upgrades well before Nov. 5, Ledford said.

She hopes to place one machine in every public library for demonstration before Election Day.

http://www.securepoll.com/Archives/Archive103.htm
Printer Friendly | Permalink |  | Top
 
Fredda Weinberg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:54 PM
Response to Reply #6
14. Oh, for Pete's sake
"Dr. Williams says all of it is documented and a rigid procedure followed. But there are no records......"

Read it again. Williams accepts the hypothetical for the sake of argument. Show me where he states a known fact.

Reading comprehension, indeed.

Your press report says an update was scheduled. And if it never happened? No lie.


Printer Friendly | Permalink |  | Top
 
Kelvin Mace Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:19 PM
Response to Reply #1
5. the FTP site explanation
Except that is not what happened in August of 2002.

Sequence of events:

1) During the primaries in August 2002, a substantial number if Diebold machine "freeze" during voting.

2) Diebold identifies the problem as a video driver conflict and obatins an updated driver.

3) In September, teams of techs update all 22,000+ voting machines. The patch is never evaluated by any certifying agency. Diebold tells that Sec State that this is unnecessary since only the OS is being patched (Williams et al seem to be under the impression that the OS can't be used as a platform to corrupt data)

4) According to Rob, the tech who the "Rob Georgia" file is named after, the FTP site was routinely used to fix problems on-site. A tech would download files as needed.

5) The 2002 election held in November, a number of "anomalies noted, especially Cleland's loss to Chambliss.

6) When news of Bev's discovery of the FTP site and the patched machines gets picked up by the press, Diebold denies categorically *any* patch was applied. The Sec State and Williams stand by their story that it did occur.

I think I have this correct, Bev correct me if I missed any points.

David Allen
Publisher, CEO, Janitor
Plan Nine Publishing
1237 Elon Place
High Point, NC 27263
http://www.plan9.org
Printer Friendly | Permalink |  | Top
 
jiacinto Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:27 PM
Response to Reply #5
7. The 72 hr task force
Here is some information that can help explain the Cleland and Barnes losses last year. A few weeks ago I attended a campaign training conference and one of the issues was the 2002 elections and why Dems fared bad in GA.

The GOP had an initiative called the "72 hr task force" that brought out formerly inactive Republicans to the polls. Reed et al brought out many new voters from S. Georgia.

Printer Friendly | Permalink |  | Top
 
Kelvin Mace Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:34 PM
Response to Reply #7
9. Quite possibly...
Edited on Tue Jul-08-03 09:05 PM by plan9_pub
But in the various instances where an aberration in canvassing occurred, the computers were "assumed" to be correct. This is a *bad* assumption to make under any circumstances.

David Allen
Publisher, CEO, Janitor
Plan Nine Publishing
1237 Elon Place
High Point, NC 27263
http://www.plan9.org

Edit: Deleted duplicate text.
Printer Friendly | Permalink |  | Top
 
jiacinto Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:43 PM
Response to Reply #9
12. But part of the reason was turnout
Reed and the GA GOP worked very hard to bring out formerly inactive Republicans.

Printer Friendly | Permalink |  | Top
 
DEMActivist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:50 PM
Response to Reply #9
13. Factually inaccurate assumption
Which has been perpetuated by the Sonny Perdue and Saxby Chambliss camp since the election.

(from the link above)

Between 1998 and 2002, overall active voter registration fell by 142,682 citizens. This reduction in the voter roll, even as Georgia’s population showed strong growth during the period, is the result of list maintenance efforts established by NVRA (the federal “motor voter” law).

White males, white females and black males all showed reductions in voter registration between 1998 and 2002. Only black females and “other” voters showed increases.
Printer Friendly | Permalink |  | Top
 
DEMActivist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:36 PM
Response to Reply #7
11. That is completely false
And here is the data to prove it:

http://www.sos.state.ga.us/pressrel/022503.htm
Printer Friendly | Permalink |  | Top
 
ParanoidPat Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-09-03 12:38 AM
Response to Reply #7
36. RE; "I attended a campaign training conference".....
....Could you let us know who sponsored the conference so we can help them stop spreading disinformation?
Assuming they're on our side. :evilgrin:
Printer Friendly | Permalink |  | Top
 
DEMActivist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:32 PM
Response to Reply #5
8. From Bev's site...
Edited on Tue Jul-08-03 08:52 PM by DEMActivist
Barnes (Michael Barnes, of the Georgia Secretary of State Elections Division): "That FTP site did not affect us in any way shape or form because we did not do any file transferring from it. None of the servers ever connected so no one could have transferred files from it. No files were transferred relating to state elections."

According to Salon.com, Diebold Election Systems, now denies that a program patch was ever applied to the Georgia voting machines: "We have analyzed that situation and have no indication of that happening at all."

and from my correspondence with the Secretary of State's office:

From: "Sinkule, Kara" (ksinkule@sos.state.ga.us)
Date: Wed Mar 5, 2003 3:14:57 PM US/Eastern
To: (xxxxxxxxxxxxxxxxxxxx)
Subject: Urgent questions re: electronic voting

Attached below are answers to your additional questions. I presumed that Dr. Williams (after I forwarded his contact information to you) would have provided answers to many of your additional questions. Please forward any questions he was not able to answer and I will respond as quickly as possible.

1. A patch was installed on the TS units prior to Logic and Accuracy testing on all 22,000+ units in Georgia. The patch was not to the voting software. The patch repaired a communication issue between the TS units operating software (WIN CE 3.0) and the voting software. From time to time communication between these two elements would be interrupted and a screen freeze would occur on the voting unit. The patch ensured the two elements remained in constant communication, thus eliminating screen freezes while voting. The patch prior to being installed was examined by the state's certification experts at KSU and discussed with the national testing labs. Once it was cleared by these entities, the patch was then allowed to be installed on the voting units by Diebold.

We were aware of the Diebold FTP site, but Georgia never used it (our model didn't require us to.)

2. Hardcopy "print-outs" of each ballot cast on our system CAN be produced (they would print out similar to an opti-scan layout) in the event of a hand recount --- which meets HAVA requirements.

Regards,

Kara Sinkule
Office of Secretary of State
(404) 657-4597
Printer Friendly | Permalink |  | Top
 
Fredda Weinberg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:02 PM
Response to Reply #8
16. And where's the problem here? I don't see it
"The patch prior to being installed was examined by the state's certification experts at KSU and discussed with the national testing labs. Once it was cleared by these entities, the patch was then allowed to be installed on the voting units by Diebold."

You still haven't established that the patch came from Diebold.
Printer Friendly | Permalink |  | Top
 
Kelvin Mace Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:12 PM
Response to Reply #16
18. The patch came from MS
and Diebold sent it out to be installed. Dr. Williams told Bev the patch did not require re-certification since it was patching the OS, not the program.

To assume that an OS patch *can't* compromise a secure system is at best naive, but utterly stupid for a "pro".

It is on par with this statement by R. Doug Lewis:

Lewis says that if you have "malicious code in the system" -- such as a simplistic virus, perhaps, designed to change a vote cast for one candidate into one for his opponent -- the code will be caught in the testing phase of the certification process: "It will not compile right. The testing itself would discover this."

Salon
http://archive.salon.com/tech/feature/2003/02/20/voting_machines/index2.html

David Allen
Publisher, CEO, Janitor
Plan Nine Publishing
1237 Elon Place
High Point, NC 27263
http://www.plan9.org
Printer Friendly | Permalink |  | Top
 
BevHarris Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:20 PM
Response to Reply #18
20. David: The patch came directly from Diebold, not MS
Edited on Tue Jul-08-03 09:22 PM by BevHarris
Search the interview transcripts. And please do not divulge more of the previously unpublished interviews on this forum yet.

Thanks,

Bev
Printer Friendly | Permalink |  | Top
 
Fredda Weinberg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:26 PM
Response to Reply #20
24. Please do not divulge?
 
Printer Friendly | Permalink |  | Top
 
Fredda Weinberg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:24 PM
Response to Reply #18
22. sent "it" out or a link to MS?
So we've established that the 'patch' came from MS.

Now I'm baffled. Was a copy downloaded from Diebold's site or not? If the chain of custody went from MS to the certifiers to the officials, where did Diebold put their malicious anything?
Printer Friendly | Permalink |  | Top
 
Kelvin Mace Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:28 PM
Response to Reply #22
25. Bev has corrected me..
Please note above.

Printer Friendly | Permalink |  | Top
 
Fredda Weinberg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:32 PM
Response to Reply #25
28. So you have the certifying agency to question
Since the election officials say the file came from them. Is there a statement somewhere that contradicts what DemActivist has posted?
Printer Friendly | Permalink |  | Top
 
Fredda Weinberg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:58 PM
Response to Reply #5
15. Whoah. Where did the update files come from?
You've assumed the video driver updates came from the Diebold site. If I were doing the update, I wouldn't take it from anyone but the vendor's site - I'd receive a direct link and wouldn't expect less.

Was the video driver even placed on the Diebold site? There are ftp records to see if the local elections officials got their updates that way.
Printer Friendly | Permalink |  | Top
 
DEMActivist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:08 PM
Response to Reply #15
17. No assumptions....direct testimony.
We KNOW better.
Printer Friendly | Permalink |  | Top
 
Fredda Weinberg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:17 PM
Response to Reply #17
19. Show me
 
Printer Friendly | Permalink |  | Top
 
DEMActivist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:21 PM
Response to Reply #19
21. Not to worry....
you'll see it soon enough!

This story unfolds on OUR timetable, not yours.
Printer Friendly | Permalink |  | Top
 
Fredda Weinberg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:28 PM
Response to Reply #21
26. So the accusation stands unsubstantiated?
It's not my timetable ... this is a public forum and officials are being accused of dishonesty. But when I question the specifics, I get contradictions - Bev and Dave can't keep their stories straight.
Printer Friendly | Permalink |  | Top
 
DEMActivist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:38 PM
Response to Reply #26
29. Oh, you mean....
Edited on Tue Jul-08-03 09:44 PM by DEMActivist
like your unsubstantiated claims that Dan Spillane would not support Bev's claims??? Like those unsubstantiated claims?

No, frankly, we have the evidence....you're the one in possession of unsubstantiated claims.
Printer Friendly | Permalink |  | Top
 
Fredda Weinberg Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-09-03 04:42 AM
Response to Reply #29
41. As I predicted, Dan's review is lukewarm
and filled with caveats.
Printer Friendly | Permalink |  | Top
 
Interrobang Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:08 PM
Response to Original message
2. Good grief, they're using Microsoft?!
Well, the hoi polloi at Slashdot are more capable of learned discourse on the subject than I, so I'll leave it in their capable hands. Nevertheless... Eeek!

I'd make more cogent comments, but I'm too fried.

G'night, all.
Printer Friendly | Permalink |  | Top
 
Dudley_DUright Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:11 PM
Response to Original message
4. What total garbage
Edited on Tue Jul-08-03 08:13 PM by Dudley_DUright
We do not pretend that the security features described above make the State's voting system completely safe from attack. We do believe, however, that these features reduce the chance of a successful election fraud in the State of Georgia to better than one in one billion.

This sounds alarmingly like the rhetoric at NASA just before the Challenger blew up.
Printer Friendly | Permalink |  | Top
 
ParanoidPat Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 08:35 PM
Response to Reply #4
10. What are the odds....
.....of hitting a tri-fecta! :shrug: :evilgrin:
Printer Friendly | Permalink |  | Top
 
Kelvin Mace Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:25 PM
Response to Original message
23. And no one explains this glaring inconsistency..
From the Sec State's office:

"A patch was installed on the TS units prior to Logic and Accuracy testing on all 22,000+ units in Georgia. The patch was not to the voting software. The patch repaired a communication issue between the TS units operating software (WIN CE 3.0) and the voting software."

However Salon rerported:

"Joseph Richardson, a spokesman for Diebold, denied that a patch had been applied to the Georgia machines: "We have analyzed that situation and have no indication of that happening at all."

Okay, so who is telling the truth? Why would anyone lie about this. did Dr. Williams, the Sec State's office on Ron (the tech Bev interviewed) all "imagine" the patch was applied to TWENTY-TWO THOUSAND MACHINES?

Why is Diebold lying?

Dark conspiracy? Not in my mind. Typical corporate "never admit stupidity or incompetence even when caught red-handed."

David Allen
Publisher, CEO, Janitor
Plan Nine Publishing
1237 Elon Place
High Point, NC 27263
http://www.plan9.org
Printer Friendly | Permalink |  | Top
 
Fredda Weinberg Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:31 PM
Response to Reply #23
27. I see no inconsistency here.
I don't call files from MS patches. For all we know, they applied a service pack.
Printer Friendly | Permalink |  | Top
 
DEMActivist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 09:40 PM
Response to Reply #27
30. No one says anything came from MS
again with the lack of reading comprehension.

Not one document I posted said anything came from Microsoft.
Printer Friendly | Permalink |  | Top
 
Kelvin Mace Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 10:01 PM
Response to Reply #30
32. My fault
I said it did, Bev corrected me above.

David Allen
Publisher, CEO, Janitor
Plan Nine Publishing
1237 Elon Place
High Point, NC 27263
http://www.plan9.org
Printer Friendly | Permalink |  | Top
 
Kelvin Mace Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 10:00 PM
Response to Reply #27
31. Sorry, you just blew your credibility with me...
"Service pack" is Microsoft-speak for patch.

David Allen
Publisher, CEO, Janitor
Plan Nine Publishing
1237 Elon Place
High Point, NC 27263
http://www.plan9.org
Printer Friendly | Permalink |  | Top
 
Cronus Protagonist Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Jul-08-03 10:14 PM
Response to Original message
33. This is great stuff!
Edited on Tue Jul-08-03 10:14 PM by Cronus
With Freda and Jiacinto playing the devil's advocates, we've managed to learn of several arguments that we would never have thought of on our own, and those in the know are learning how to handle these arguments and build effective responses to them.

I still haven't thought of a way to respond to Freda's constant blindness ("I don't see that" seems to be the focal point of most of her posts), but every now and then she brings up a good point that will need to be addressed.

So keep it up people, you're doing a good job of exploring and countering all possible arguments here before it hits the mainstream. I'm taking notes myself.



http://kucinichforpresident.com - Kucinich Is The One
http://cronus.com/prayer - One of Kucinich's speeches

http://brainbuttons.com/home.asp?stashid=13 - cute little buttons
http://bushspeaks.com - sardonic political toons
http://cronus.com - enlightening and educational liberal fun

Conceptual Guerilla
Printer Friendly | Permalink |  | Top
 
ConsAreLiars Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-09-03 12:07 AM
Response to Reply #33
34. Exactly right
The reasons for such disputes don't matter much, they carry both negative and positive dynamics. Geting bogged down in small tit-for-tats, beating dead horses with straw men, juggling red herrings and such - these will degrade the thread. But at the beginning at least
people are expressing the kinds of doubts and uncertainties and points of view that need to be understood in order to communicate what is and is not known at each stage, and what this all means.

And ultimately, what this all means will depend on what we do as much as what we learn. This is just one aspect of the whole democracy-justice thing, and we are just beginning beginning to remove the curtains that now burka the "Spirit of Justice" and debase the "Majesty of Law."

Such curtains cover everything they do. In every possible way. Each unveiling is a victory to be celebrated and supported. (Remember? http://www.nydailynews.com/front/story/3695p-3303c.html )

This is a process - a struggle, not a finished work, and if this is merely a small step, it is still an important one. We've moved from an awareness of what "might" have already been done, or "might" soon be done, past speculation about how and maybe, to exposing the precise mechanisms Diebold provides for adjusting the election tallies.

Printer Friendly | Permalink |  | Top
 
Pobeka Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-09-03 12:22 AM
Response to Reply #33
35. This is the reply to "I don't see it"
"Then perhaps we should find someone with the intelligence to either see it, or point out the obsure error".
Printer Friendly | Permalink |  | Top
 
Cronus Protagonist Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-09-03 01:44 AM
Response to Reply #35
38. Yeah, but what if you could say something that makes them go "OH!"

I SEE IT!!



Now that would then be the key thing to tell others who are skeptical. Let's not let frustration keep us away from formulating that kick-ass answer. I'm thinking about that one question myself and so far I don't have a good response to it other than violating the questioner, which will get us no where.

I'm thinking we would need to ask a question back first, to find out where the message is defective or not effective. I think that would go along the lines of:

Here's what the claims are, which of these do you accept and which do you disagree with and why?

1/ The election code for Diebold and other voting machines is flawed either through one or more of the following: lax security, poorly written code, poorly developed architecture, poor documentation and procedures, poor training, poor choice of platform/operating system or all of the above.

2/ The method is there to allow for an undetected or well-hidden alteration of election results.

3/ The method is there to allow for easy physical sabotage of the electronic voting systems, resulting in permanently lost votes or preventing people from voting.

4/ The opportunity was present at these election centers where the flaws existed and/or will be present at the next election if the system in question is as indicated.

5/ The desire to change election results is present in many politicians. (given the wide and deep history in this country of fixing elections, to argue otherwise would then beg the question of mental impairment :)

6/ We all want a top-notch 100% secure, 100% reliable, 100% accurate voting system, or as near to that as humanly possible.

7/ It is in the best interests of everyone in this country and around the world where these machines are also used to investigate previous elections to find out if their veracity has been compromised, given the previous facts.

8/ It is in the best interests of eveyone concerned that the current code be fully vetted for loopholes, poor structure, lax security, bloat (hidden or unused program structures), etc.

Fredda, what do you agree with above, or disagree with, and why?



http://kucinichforpresident.com - Kucinich Is The One
http://cronus.com/prayer - One of Kucinich's speeches

http://brainbuttons.com/home.asp?stashid=13 - cute little buttons
http://bushspeaks.com - sardonic political toons
http://cronus.com - enlightening and educational liberal fun

Conceptual Guerilla
Printer Friendly | Permalink |  | Top
 
bpilgrim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-09-03 01:57 AM
Response to Reply #38
39. i think it all boils down to a paper trail...
Edited on Wed Jul-09-03 01:57 AM by bpilgrim
"check your receipt" or "make sure you're counted, get a receipt!".

something along those lines since everyone the notion of a recipt and why it is valuble and how it's value is raised according to the value of the transaction something most americans will value as high as they still take the time to vote.

all the rest is just noise... especially the php cs jargon wether from 'our side' or theirs.

:hi:

peace
Printer Friendly | Permalink |  | Top
 
Cronus Protagonist Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-09-03 02:06 AM
Response to Reply #39
40. A paper trail can be faked/messed with/ignored
Edited on Wed Jul-09-03 02:26 AM by Cronus
(my first try at editing titles.... wooo!)

I can easily write a program that shows you something on the screen, something identical on paper and something different in memory and on the disk.

You would also have to write procedures, train staff, provide for legislative capabilities to go into any part of the system for audit or any system check desired. If the candidates want any machine disassembled and checked, that needs to be an option.

And the paper trail concept only works for future elections, assuming it works at all.

Another concern is earlier elections and most recent elections - in some instances that information may be very important indeed. I understand several countries use these machines. Was Chirac properlyt elected? How about Sharon? How many Diebold machines are in Israel?

So I think the scope is much wider than you do and it doesn't all boil down to a paper trail. It opens up questions of extreme import on national and global politics.



http://kucinichforpresident.com - Kucinich Is The One
http://cronus.com/prayer - One of Kucinich's speeches

http://brainbuttons.com/home.asp?stashid=13 - cute little buttons
http://bushspeaks.com - sardonic political toons
http://cronus.com - enlightening and educational liberal fun

Conceptual Guerilla
Printer Friendly | Permalink |  | Top
 
bpilgrim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-09-03 05:00 AM
Response to Reply #40
42. much better than what we got now... NONE
so all those issues of global import as you correctly point to will never be KNOWN if we don't have a paper trail to verify and therefore POWERLESS to fight them and prevent future ones.

make sure you're counted, get a receipt ;->

i think that's pretty good advice and what we should rally around so as to help get that SIMPLE message out.

everyone will tune out if you start going into global conspiracy theories, imo, not that i think them outside the realm of possibility.

KISS

:hi:

peace
Printer Friendly | Permalink |  | Top
 
Pobeka Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-09-03 08:10 AM
Response to Reply #38
43. "How would *you* know?"
Edited on Wed Jul-09-03 08:18 AM by Pobeka
Perhaps that is the question for the layperson -- if the election was tamperred with on the computer, how would you know?

If there is no clear answer to that question, then there is more than a chance that person's vote could be meddled with, and they'd hopefully realize they can no longer be sure of their voice in democracy.
--
On edit - htlm-tag fixes (how does one italicize in titles -- tried you to no avail)
Printer Friendly | Permalink |  | Top
 
bpilgrim Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-09-03 01:01 AM
Response to Original message
37. "to disrupt the election, an act of terrorism"
Types of Threats to an Election System:

There are two reasons why a person might launch an attack against an election system: to disrupt the election or to commit election fraud.

In the first instance, the intent of the perpetrator is simply to disrupt the election, an act of terrorism. Although a terrorist act against an election is disruptive, it is not a threat to the integrity of the election. On September 11, when the twin towers in New York were attacked, there was an election in progress in New York City. One of the precincts was in the shadow of 'ground zero'. The election was completely disrupted. New York election officials re-conducted this election with such quiet professionalism that very few people outside New York are even aware that an election was in progress on that fateful day. No matter how severe, an act of terrorism against an election is disruptive and expensive but it is no threat to the electoral process.

Election fraud is an attempt to alter the outcome of an election. In order to be successful election fraud must go undetected. Once detected election fraud is simply another form of terrorism and can be dealt with accordingly.



what do we call it if it's not detected? a coup?


if a receipt is NOT necessary why do we demand them at the cash register. dollars and cents are more important than are votes apparently :shrug:

the fact is the most feared and most successful attack is from the inside. they are the hardest to defend against.

and once a machine has been compromised you can cite it's accuracy all want and it doesn't matter a hill of beans because obviously it is now not accurate.

so the question then becomes what processes are in place to TRY and detect this fraud(terrorism)?

the only realistic answer is a paper receipt issued at point of purchase... i mean when the voter actually votes... is visually confirmed and then that human readable paper receipt with a bar code(for sorting later) is placed into a receptacle in case a recount is ordered for whatever reason.

as to the BS reasoning in dealing with multiple ballots needing to be cast for whatever reasons being an obstacle to paper is ludicrous.

you simply let the voter vote again, the machine will override the last vote cast by this voter and mark the last ballot to not be counted.

the new paper receipt will record this action as well and placed into the receptacle, even if this is the second or 100th one resubmitted due to whatever error.

if a recount is ordered the paper ballots can be placed into a sorting machine have their barcodes read and have multiple ballots from the same voter sorted out.

as each paper has a record of all the changes and a time stamp only the latest timestamp is counted.

shoot, people are able to cancel, change their order right at the cash register without a problem there is no reason to think it would be a big deal with votes.

i think this guys has an OBVIOUS agenda here and makes me even more suspicious since he has been involved with setting up the system we now use.

he could just be in cya mode, but he sounds like he might have a political agenda with all this talk of terrorism, even evoking 911.

my 2 cents

Peace
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 30th 2024, 09:54 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC