Please be at least a little careful when quoting "what Bev said" that you are remotely accurate. Specifically, this quote from whoever...
"Your argument that "Italian Mafia tried to buy votes by having cell phones with video capability used to record votes as proof of vote" does nothing more than make me worry all the more about the issue of vote-selling." --
The "your" refers to Bev, and I did not bother to answer, since I have no idea where this came from, but certainly not from me."
Then, the reply from Papau: "Bev's Mafia cell phone photo is a stretch in my opinion..."
There is no such quote, no such anything, from "Bev." I have never discussed the mafia in connection with voting, and vote-buying is not one of my discussion points.
I have a bit of a quandary: When people like tinfoilhatprogrammer come on the list and make up a bunch of poppycock from wherever, attributing it to me, I can either respond -- which sets up a whole chain of responses and hijacks the purpose of the thread -- or ignore -- which implies that they have their facts at least 10 percent straight.
Well, I'm not going to keep replying, because some of these people's objective is to hijack productive threads into personalities and quibbling. But PLEASE do not repeat stuff that someone misquoted, or made up altogether, and attributed to me. Check your facts, and quote from what I have written, not from what some disruptor claims I said.
This kind of thing is happening a lot lately, and is simply a way to dilute the message and confuse the issue.
Irritatedly yours,
Bev Harris
On Edit: And while I'm straightening out misattributions:
"Show me the code that demonstrates either the voting machines are miscounting or GEMS is changing the results."Go to
http://www.blackboxvoting.com for a few dozen documented cases where machines miscounted elections;
Machines miscounting: I have at least 112 footnoted and documented examples in my book; among the most egregious (which are also the easiest to spot; it is the smaller errors, which may go unnoticed, which are most dangerous) -- Allamakee County Iowa, Nov 2000 presidential election, machine was fed about 300 votes and reported 3.9 million votes cast. Orange County California, 1998, 100 percent error -- all the "yes" votes were counted as "no" and vice versa.
GEMS changing the results: You can easily replicate changing the votes in GEMS -- download from the New Zealand ftp site, install GEMS 1.17.17, (you can check from
http://www.FEC.gov -- that is the officially certified version) -- run a database, go in and alter votes in Table 2, run a GEMS report and you get bogus results.
"Despite all the noise made by the anti-Microsoft crowd about the use of Access as a database, I don't actually have a big problem with it"..."your most ardent supporters" etc... I'm sorry, but what you appear to be quoting is the jist of about 400 quotes at slashdot.org, which I don't belong to (why would I?) and never posted on. It might amaze you to know that citizens have independent opinions and Bev Harris doesn't instruct slashdotters on what to say.
"I suppose I can buy the argument that someone with direct access to the database could potentially manipulate totals in one of the tables."Which is what I said. I also showed that passwords and audit logs could easily be defeated, and provided letters from the certifiers indicating that the primary security for these voting machines is: passwords and the audit log.
"Your "two rooms" example is written up as pure sensationalism."Actually, it's plain English for people whose eyes glaze over in discussions of accounting and computer tables, and it's an appropriate comparison. I am a writer. Take notes please, this is called a metaphor.
"I fail to understand why someone intending to develop a system in which a savvy operator could change certain totals would be so incompetent as to trouble themselves with keeping another table or tables full of the original incriminating vote totals."Because the other table passes a spot check. Based on the fact that entire states are now making the precinct totals report inaccessible, and sometimes candidates don't see it until a week after the election, this may or may not be risky -- no one can get at Table #1 from GEMS, so how would they ever know the tables didn't match? There is no report in GEMS to allow comparison with Table 1 and Table 2. Furthermore, if you wait a whole week to give people the detail reports, all kinds of things can happen...
"
Second, and more importantly in my mind, nothing in what you've posted to date explains how these "hacked totals" are reconciled with the paper reports printed by each voting machine prior to upload."
Then you haven't read everything I've posted. In fact, the poll worker documentation is quite inconsistent -- it does NOT consistently say to print the reports prior to upload, and I have pointed that out as a worrisome procedure. If reports are printed after upload, there is no reason to believe that they are necessarily the original data, since data can transmit both ways.
"You've made (or certainly implied) some kind of conspiratorial connection between Diebold and ES&S, which I simply fail to see. Two brothers who originally worked at one company now work at competing companies. OK. Conspiracy? I'm unmoved, somehow."The word "conspiracy" is yours, not mine. What I said was the the same man who was the main programmer for ES&S supervised the programmers at Diebold, and the software is built on his architecture. The names are in the programming files, by the way, along with I-Mark Systems, which is specifically a company founded in Omaha by Bob Urosevich, who not only was a key programmer for ES&S, but founded that company. He is now CEO of Diebold. If something nefarious is found in the Diebold code, it absolutely indicates that ES&S code must be looked at too.
"Furthermore your crack team of programmers and analysts routinely misattributes program behavior from one company to the other (for example, your "181818" total -- by ES&S if I recall correctly from your original story -- being attributed to Diebold simply because, as far as I can understand the argument, that's what source code they happen to have.)"
Can you not get it through your head that individual citizens can have independent opinions? You are mischaracterizing them as "my" team of programmers, when actually we are all just people with opinions. I have corrected the Diebold attribution and the 18181 story. I have not said that Comal County's machines are Diebold. Stop misquoting. Now, I did say we are looking into 18181-like possibilities in the source code, and what that means is that we are looking at whether any preset formulas attach themselves to the vote-tallying process.
"I'm also in favor of getting a printed receipt after casting my vote, but it doesn't address the issue of potential widespread vote-selling. This is a prepared talking point by the voting machine vendors. At no time did I say print a receipt that voters carry out of the polling place. Using the official talking points, are you? That fools no one at DU, we've heard it all before, ad nauseum.
"The arguments in your talking points that "smart crooks wouldn't choose to try the paper way" is really pretty weak unless you've got a scientific poll of smart crooks to support it, and assume that there are no stupid crooks to worry about."Again, you are quoting someone else -- I am not sure who, perhaps Linda, who submitted talking points she has used? Quickly now, let's get up to speed: BlackBoxVoting.org is a CITIZEN ACTION site, with citizens encouraged to submit their work. Linda, by the way, has and outstanding record of getting ACTION -- she has already led the derailing on one bill that would take away our right to an audit trail.
Have I said the word "disruptor" yet? Oh yeah, I have.
By the way, on that makefile: The key was in what it made. You'll see.