Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Massive election fraud has occured!

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU
 
KingChicken Donating Member (814 posts) Send PM | Profile | Ignore Mon Nov-08-04 08:08 PM
Original message
Massive election fraud has occured!
I've reviewed the DieBold system in place in Ohio and Florida, and I can tell you that the entire thing is screwed! I didn’t realize that the systems were actually being run on Windows machines; I thought it was embedded Linux or Unix software. I’m a software engineer and I can say that from the DieBold “GEMS” software I’ve downloaded and tested, it wouldn’t take anything more than access to the physical computer to compromise a portion or the entire vote calculation. These voting machines are using a Windows operating system and software that is EXTREMELY weak; there is NO protection, NO password on the data sources, and NO encryption. The security measures present are so extremely weak that I wouldn’t even regard it as a valid beta test platform, let alone for production use.

Trust me people, I oversee many software projects every year, and I can tell you these systems wouldn’t make it out of development. Given the insecurity of Windows 2000 and XP, as demonstrated in the last two years on the open market, it wouldn’t be very difficult for even simple minded hackers to gain access to the databases and play with the numbers.

To see the numbers so skewed and the vote tally’s in so many precincts either exceeding the registered voters or impossibly unbalanced, I’m convinced that at the very least isolated incidents of tampering occurred, if not widespread calculated attempts to alter the vote.

At first I thought this was just a few people in denial about Bush winning, but now I can see that something massive occurred in at least Ohio and Florida. The numbers just don’t add up, and what’s even more suspicious is the downplaying of the hard evidence.

Please make some noise concerning this issue, time is a factor!
Printer Friendly | Permalink |  | Top
spooky3 Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:11 PM
Response to Original message
1. check out Olbermann now on MSNBC if you have cable
Printer Friendly | Permalink |  | Top
 
nadinbrzezinski Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:11 PM
Response to Original message
2. contact bev harris on this
serious, they need folks to help
Printer Friendly | Permalink |  | Top
 
slackmaster Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:12 PM
Response to Original message
3. Yes, MS Access file with no password protection
The ONLY security control is physical access to the machine.
Printer Friendly | Permalink |  | Top
 
HysteryDiagnosis Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:14 PM
Response to Reply #3
6. Go KEITH!!!! He is on this like a pit bull..... bless him n/t
Printer Friendly | Permalink |  | Top
 
Eurobabe Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:13 PM
Response to Original message
4. running on windoze? who woulda thunk!!
then they can blame it on Bill Gates! HA...
Printer Friendly | Permalink |  | Top
 
kwolf68 Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:13 PM
Response to Original message
5. KingC

I agree with your synposis and some numbers are matriculating out, but the fact of the matter is just because a system CAN BE hacked doesn't mean it HAS BEEN hacked.

Therein lies the rub. How do we PROVE these boxes were manipulated outside of a "glitch"
Printer Friendly | Permalink |  | Top
 
KingChicken Donating Member (814 posts) Send PM | Profile | Ignore Mon Nov-08-04 08:19 PM
Response to Reply #5
8. There is evidence to demand action, we have good reason to suspect
Edited on Mon Nov-08-04 08:20 PM by KingChicken
That’s all the cops need to get a search warrant, this is all we need to get this thing investigated. We are talking about usually very reliable numbers, except when it comes to these machines. The huge deviation alone points to something massive. No "glitches" should be occurring here, if that is the case then wrong doing was done by the software producer, they are liable. If I had made software like this I would be out of a job!
Printer Friendly | Permalink |  | Top
 
in_cog_ni_to Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:26 PM
Response to Reply #8
14. Contact Bev Harris at www.blackboxvoting.org
Edited on Mon Nov-08-04 08:26 PM by in_cog_ni_to
email her immediately with your info. She needs all the help she can get. YOU are exactly what she needs!
Printer Friendly | Permalink |  | Top
 
leftchick Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:32 PM
Response to Reply #8
18. email Bev Harris....NOW!
she needs computer people. Lots... do you have a network of computer friends?
here is her web address you can contact her there.....
http://blackboxvoting.org/

Printer Friendly | Permalink |  | Top
 
leftchick Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:32 PM
Response to Reply #8
19. email Bev Harris....NOW!
she needs computer people. Lots... do you have a network of computer friends?
here is her web address you can contact her there.....
http://blackboxvoting.org/

Printer Friendly | Permalink |  | Top
 
CHIMO Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:28 PM
Response to Reply #5
16. Simple
If Clark makes the following statements:

"When there's a major cyber incident it's very difficult to prove most of the time who did it,"


"I would hope that one of the lessons we learned from September 11 is that you don't wait for a disaster to occur before we fix the problems we know exist," he said.

http://english.aljazeera.net/NR/exeres/D29B0874-8690-4929-9BFE-44E59F217582.htm

My response to you is. Prove to me that it didn't happen. Show me.
Prove that the mafia, another country or any other individual(s) didn't hack anything.
Printer Friendly | Permalink |  | Top
 
librechik Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-09-04 12:18 AM
Response to Reply #5
24. KC, if you know anyone with any influence, say the members of
your professional group or similar associates, please write them a letter also and tell them your concerns. We need a massive word of mouth campaign; I see "software engineer" in your post and I think "opinion leader." Please write LTTEs and let all your friends know too!
Printer Friendly | Permalink |  | Top
 
eleonora Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:17 PM
Response to Original message
7. view this movie:
Printer Friendly | Permalink |  | Top
 
Steely_Dan Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:20 PM
Response to Original message
9. Buy A Mac
Maybe we should demand that they use a REAL computer...a Macintosh.

-Paige
Printer Friendly | Permalink |  | Top
 
KingChicken Donating Member (814 posts) Send PM | Profile | Ignore Mon Nov-08-04 08:24 PM
Response to Reply #9
13. Linux or anything open source, people need to be able to see the code
This is public stuff, no secrets should be kept. The people must be able to have the integrity of the system inspected by a third party. If you know about the integrity of the open source initiative then you know this is the only way to go. Windows should not be used, at all, in the government.
Printer Friendly | Permalink |  | Top
 
slackmaster Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-09-04 12:05 AM
Response to Reply #13
23. I'm not a major open-source enthusiast but agree with you
Any computer system used by government should be 100% auditable. That doesn't mean source code for sensitive information like crypto systems has to be public; but the operating system, supporting programs, etc. have to be transparent. Intrusion is harder to detect on a proprietary system.

Windows systems can be secured quite well but it takes some thought and hard work. I work with secure systems every day.

Windows should not be used, at all, in the government.

I see no problem with government using it for non-sensitive operations like office automation or unsecure email systems, but using what Diebold has is clearly unacceptable for many reasons.
Printer Friendly | Permalink |  | Top
 
GreenPartyVoter Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:21 PM
Response to Original message
10. Many folks are kicking
up a fuss over this.

-----------------------------------------------------------
Help expose the 2004 election fraud!
http://www.geocities.com/greenpartyvoter/electionreform.htm
Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:21 PM
Response to Original message
11. I can't believe it either
MS Access being used to store votes?! What in the HELL were they thinking?
Printer Friendly | Permalink |  | Top
 
rockydem Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:23 PM
Response to Original message
12. interesting post
I have doubts about fraud, at least wide-scale election changing fraud, as I haven't seen conclusive evidence yet.

But your post intruigues me - if the program really is as weak as you say it is - well, that right there is a scandal in and of itself as far as I'm concerned.
Printer Friendly | Permalink |  | Top
 
KingChicken Donating Member (814 posts) Send PM | Profile | Ignore Mon Nov-08-04 08:27 PM
Response to Reply #12
15. I've hacked things in my younger year that no one knew about either
Edited on Mon Nov-08-04 08:27 PM by KingChicken
No evidence needs to be left, a good hacker never leaves a trace. This is child's play anyway, it's all wide open. Let me tell you, if I was in front of one of these machines I would have a hard time not putting a couple of thousand in for Kerry.
Printer Friendly | Permalink |  | Top
 
juajen Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:37 PM
Response to Reply #15
21. Gee, if only democrats were crooks, too
Then the whole world population would seem to have voted! I really wanted a dem to hack, but give the votes to Mickey Mouse. This would shock republican voters into making some changes in this voting system; alas, our guys are just too honest.
Printer Friendly | Permalink |  | Top
 
slackmaster Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-09-04 12:19 AM
Response to Reply #15
25. I have one problem with sounding a "massive fraud" alarm at this point
Edited on Tue Nov-09-04 12:24 AM by slackmaster
I think most of us agree that present electronic voting systems are totally unacceptable because they are vulnerable to tampering.

Maybe time will prove me too skeptical here, but I can't imagine how systematic tampering with voting systems distributed over a wide geographical area in various states could be kept secret very long.

If there was - call it a broad, organized effort - to sway the election, more than a handful of people would have to be involved. Sooner or later one or more would rat out the others.

What I see looks too much like garden-variety bungled corporate and/or government software development project ineptness. It's very much like a mode of failure I've seen many times in the software development process:

A piece of demo software written by a senior developer for internal purposes gets functionality added willy-nilly and becomes the basis for a blue-sky development project. It evolves into a Rube Goldbergian sales tool that gets used to sell an idea to senior management. The big-wigs like it and put the project on an accelerated development track, so the demo system turns into Franken-software that gets shipped as a live 1.0 release in order to meet a promised deadline. The RIGHT thing to do would have been to develop detailed specs based on deep analysis of business requirements and code it from scratch, but because of the perverted expectations of management you end up with a happy-looking boiled-dead frog.

Or maybe they were just incompetent.

Or maybe there really is an organized effort to influence elections.

If it's the latter, sooner or later someone will squeal. We couldn't keep the atomic bomb secret. The lid will blow if the worst has really happened.

MS Access is very handy for single-user desktop database fiddling. It's great for small database modeling operations, and integrates easily with Visual Basic and other Windows application development systems. You can easily build pretty applications that are completely unsuitable for "industrial" use. Putting an Access-based application into live production is a mistake I've seen before.
Printer Friendly | Permalink |  | Top
 
RedEagle Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-08-04 08:30 PM
Response to Original message
17. Systems concocted between vendors and election officials
Want to help, step up to the plate and contact Bev at:

bevharris@blackboxvoting.org

KEEP TRYING. They are swamped right now, which is good but don't have the staff to keep up at this point. Bev gets thousands of emails a day.

If you have credentials, Microsoft experience a plus (sounds like it), and a willingness to go out on a limb and publically say so, get in touch with Bev.
Printer Friendly | Permalink |  | Top
 
KingChicken Donating Member (814 posts) Send PM | Profile | Ignore Mon Nov-08-04 08:41 PM
Response to Reply #17
22. I'm contacting her now, thanks for the address
Printer Friendly | Permalink |  | Top
 
nefarious Donating Member (132 posts) Send PM | Profile | Ignore Mon Nov-08-04 08:37 PM
Response to Original message
20. Yes, Access is very weak against tampering...
But lower level database layers are what the Diebold and the republican vote riggers have not counted on.

Like many other Windows file operations, when a field or record is "overwritten", the old field or record is simply abandoned and a new one is created. The abandoned data is no longer viewable by the high-level database interfaces, but can be viewed through other means - the FBI and CIA for instance, employ software people for the purpose of "resurrecting the ghosts".

I wonder if any of the fraudsters that Conyers said he will prosecute before Congress will sing like canaries when faced with prison time?
Printer Friendly | Permalink |  | Top
 
Stinky The Clown Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-09-04 01:22 AM
Response to Original message
26. I always thought WE should hack the machines in a REAL obvious way, like
having Bush win in Baltimore City or in DC by 100% to 0

Would **that** get reported in the MSM?
Printer Friendly | Permalink |  | Top
 
slackmaster Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-09-04 10:43 AM
Response to Reply #26
27. That would get someone's attention
:D
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Wed May 01st 2024, 06:35 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC