Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

RE: Blackbox: Elections fraud in 2004
From: "Ben" <psilo () spunge org>
Date: Mon, 8 Nov 2004 11:50:51 +1100

See also.

http://www.commondreams.org/headlines04/1106-30.htm

-----Original Message-----
From: J.A. Terranson [mailto:measl () mfn org]
Sent: Monday, 8 November 2004 9:09 AM
To: antisocial () mfn org
Cc: full-disclosure () lists netsys com; cypherpunks () al-qaeda net
Subject: [Full-disclosure] Blackbox: Elections fraud in 2004


http://www.blackboxvoting.org/

BREAKING -- SUNDAY Nov. 7 2004: Freedom of Information requests at
http://www.blackboxvoting.org have unearthed two Ciber certification
reports indicating that security and tamperability was NOT TESTED and that
several state elections directors, a secretary of state, and computer
consultant Dr. Britain Williams signed off on the report anyway,
certifying it.

Black Box Voting has taken the position that fraud took place in the 2004
election through electronic voting machines. We base this on hard
evidence, documents obtained in public records requests, inside
information, and other data indicative of manipulation of electronic
voting systems. What we do not know is the specific scope of the fraud. We
are working now to compile the proof, based not on soft evidence -- red
flags, exit polls -- but core documents obtained by Black Box Voting in
the most massive Freedom of Information action in history.

-----------------------------------------------

SUNDAY Nov. 7 2004: We.re awaiting independent analysis on some pretty
crooked-looking elections. In the mean time, here.s something to chew on.

Your local elections officials trusted a group called NASED -- the
National Association of State Election Directors -- to certify that your
voting system is safe.

This trust was breached.

NASED certified the systems based on the recommendation of an .Independent
Testing Authority. (ITA).

What no one told local officials was that the ITA did not test for
security (and NASED didn.t seem to mind).

The ITA reports are considered so secret that even the California
Secretary of State.s office had trouble getting its hands on one. The ITA
refused to answer any questions about what it does. Imagine our surprise
when, due to Freedom of Information requests, a couple of them showed up
in our mailbox.

The most important test on the ITA report is called the .penetration
analysis.. This test is supposed to tell us whether anyone can break into
the system to tamper with the votes.

.Not applicable,. wrote Shawn Southworth, of Ciber Labs, the ITA that
tested the Diebold GEMS central tabulator software. .Did not test..

Shawn Southworth .tested. whether every candidate on the ballot has a
name. But we were shocked to find out that, when asked the most important
question -- about vulnerable entry points -- Southworth.s report says .not
reviewed..

 Ciber .tested.whether the manual gives a description of the voting
system. But when asked to identify methods of attack (which we think the
American voter would consider pretty important), the top-secret report
says .not applicable..

Ciber .tested. whether ballots comply with local regulations, but when Bev
Harris asked Shawn Southworth what he thinks about Diebold tabulators
accepting large numbers of .minus. votes, he said he didn.t mention that
in his report because .the vendors don.t like him to put anything
negative. in his report. After all, he said, he is paid by the vendors.

Shawn Southworth didn.t do the penetration analysis, but check out what he
wrote:

.Ciber recommends to the NASED committee that GEMS software version
1.18.15 be certified and assigned NASED certification number
N03060011815..

Was this just a one-time oversight?

Nope. It appears to be more like a habit. Here is the same Ciber
certification section for VoteHere; as you can see, the critical security
test, the .penetration analysis. was again marked .not applicable. and was
not done.

Maybe another ITA did the penetration analysis?

Apparently not. We discovered an even more bizarre Wyle Laboratories
report. In it, the lab admits the Sequoia voting system has problems, but
says that since they were not corrected earlier, Sequoia could continue
with the same flaws. At one point the Wyle report omits its testing
altogether, hoping the vendor will do the test.

Computer Guys: Be your own ITA certifier.

Here is a copy of the full Ciber report (part 1, 2, 3, 4) on GEMS 1.18.15.
Here is a zip file download for the GEMS 1.18.15 program. Here is a real
live Diebold vote database. Compare your findings against the official
testing lab and see if you agree with what Ciber says. E-mail us your
findings.

TIPS: The password for the vote database is .password. and you should
place it in the .LocalDB. directory in the GEMS folder, which you.ll find
in .program files..

Who the heck is NASED?

They are the people who certified this stuff.

You.ve gotta ask yourself: Are they nuts? Some of them are computer
experts. Well, it seems that several of these people suddenly want to
retire, and the whole NASED voting systems board is becoming somewhat
defunct, but these are the people responsible for today's shoddy voting
systems.

If the security of the U.S. electoral system depends on you to certify a
voting system, and you get a report that plainly states that security was
.not tested. and .not applicable. -- what would you do?

Perhaps we should ask them. Go ahead. Let's hold them accountable for the
election we just had. (Please, e-mail us their answers) They don't make it
very easy to get their e-mail and fax information; when you find it, let
us know and we'll post it here.

NASED VOTING SYSTEMS/ITA ACCREDITATION BOARD

Thomas R. Wilkey, Executive Director, New York State Board of Elections

David Elliott, (former) Asst. Director of Elections, Washington State

James Hendrix, Executive Director, State Election Commission, South
Carolina

Denise Lamb, Director, State Bureau of Elections, New Mexico

Sandy Steinbach, Director of Elections, Iowa

Donetta Davidson, Secretary of State, Colorado

Connie Schmidt, Commissioner, Johnson County Election Commission, Kansas

(the late) Robert Naegele, President Granite Creek Technology, Pacific
Grove, California

Brit Williams, Professor, CSIS Dept, Kennesaw State College, Georgia

Paul Craft, Computer Audit Analyst, Florida State Division of Elections
Florida

Steve Freeman, Software Consultant, League City, Texas

Jay W. Nispel, Senior Principal Engineer, Computer Sciences Corporation
Annapolis Junction, Maryland

Yvonne Smith (Member Emeritus), Former Assistant to the Executive Director
Illinois State Board of Elections, Illinois

Penelope Bonsall, Director, Office of Election Administration, Federal
Election Commission, Washington, D.C.

Committee Secretariat: The Election Center, R. Doug Lewis, Executive
Director Houston, Texas, Tele: 281-293-0101

# # # # #

THURSDAY Nov. 4 2004: If you are concerned about what happened Tuesday,
Nov. 2, you have found a home with our organization. Help America Audit.

Black Box Voting has taken the position that fraud took place in the 2004
election through electronic voting machines. We base this on hard
evidence, documents obtained in public records requests, inside
information, and other data indicative of manipulation of electronic
voting systems. What we do not know is the specific scope of the fraud. We
are working now to compile the proof, based not on soft evidence -- red
flags, exit polls -- but core documents obtained by Black Box Voting in
the most massive Freedom of Information action in history.

We need: Lawyers to enforce public records laws. Some counties have
already notified us that they plan to stonewall by delaying delivery of
the records. We need citizen volunteers for a number of specific actions.
We need computer security professionals willing to GO PUBLIC with formal
opinions on the evidence we provide, whether or not it involves DMCA
complications. We need funds to pay for copies of the evidence.

TUESDAY Nov 2 2004: BREAKING NEWS: New information indicates that hackers
may have targeted the central computers that are counting our votes.

Freedom of Information requests are not free. We need to raise $50,000 as
quickly as possible to pay for records and the fees some states charge for
them. We launched one major FOIA action last night, and have two more on
the way, pell-mell. Now is the time. If you can't donate funds, please
donate time. E-mail to join the Cleanup Crew.

Important: Watch this 30-minute film clip
Voting without auditing. (Are we insane?)

SEATTLE, WASHINGTON Nov 3 2004 -- Did the voting machines trump exit
polls? There.s a way to find out.

Black Box Voting (.ORG) is conducting the largest Freedom of Information
action in history. At 8:30 p.m. Election Night, Black Box Voting blanketed
the U.S. with the first in a series of public records requests, to obtain
internal computer logs and other documents from 3,000 individual counties
and townships. Networks called the election before anyone bothered to
perform even the most rudimentary audit.

America: We have permission to say No to unaudited voting. It is our
right.

Among the first requests sent to counties (with all kinds of voting
systems -- optical scan, touch-screen, and punch card) is a formal records
request for internal audit logs, polling place results slips, modem
transmission logs, and computer trouble slips.

An earlier FOIA is more sensitive, and has not been disclosed here. We
will notify you as soon as we can go public with it.

Such a request filed in King County, Washington on Sept. 15, following the
primary election six weeks ago, uncovered an internal audit log containing
a three-hour deletion on election night; .trouble slips. revealing
suspicious modem activity; and profound problems with security, including
accidental disclosure of critically sensitive remote access information to
poll workers, office personnel, and even, in a shocking blunder, to Black
Box Voting activists.

Black Box Voting is a nonpartisan, nonprofit consumer protection group for
elections. You may view the first volley of public records requests here:
Freedom of Information requests here

Responses from public officials will be posted in the forum, is organized
by state and county, so that any news organization or citizens group has
access to the information. Black Box Voting will assist in analysis, by
providing expertise in evaluating the records. Watch for the records
online; Black Box Voting will be posting the results as they come in. And
by the way, these are not free. The more donations we get, the more FOIAs
we are empowered to do. Time's a'wasting.

We look forward to seeing you participate in this process. Join us in
evaluating the previously undisclosed inside information about how our
voting system works.

Play a part in reclaiming transparency. It.s the only way.

# # # # #

Public Records Request - November 2, 2004
From: Black Box Voting
To: Elections division

Pursuant to public records law and the spirit of fair, trustworthy,
transparent elections, we request the following documents.

We are requesting these as a nonprofit, noncommercial group acting in the
capacity of a news and consumer interest organization, and ask that if
possible, the fees be waived for this request. If this is not possible,
please let us know which records will be provided and the cost. Please
provide records in electronic form, by e-mail, if possible -
crew () blackboxvoting org 

We realize you are very, very busy with the elections canvass. To the
extent possible, we do ask that you expedite this request, since we are
conducting consumer audits and time is of the essence.

We request the following records.

Item 1. All notes, emails, memos, and other communications pertaining to
any and all problems experienced with the voting system, ballots, voter
registration, or any component of your elections process, beginning
October 12, through November 3, 2004.

Item 2. Copies of the results slips from all polling places for the Nov.
2, 2004 election. If you have more than one copy, we would like the copy
that is signed by your poll workers and/or election judges.

Item 3: The internal audit log for each of your Unity, GEMS, WinEds, Hart
Intercivic or other central tabulating machine. Because different
manufacturers call this program by different names, for purposes of
clarification we mean the programs that tally the composite of votes from
all locations.

Item 4: If you are in the special category of having Diebold equipment, or
the VTS or GEMS tabulator, we request the following additional audit logs:

a. The transmission logs for all votes, whether sent by modem or uploaded
directly. You will find these logs in the GEMS menu under .Accuvote OS
Server. and/or .Accuvote TS Server.

b. The .audit log. referred to in Item 3 for Diebold is found in the GEMS
menu and is called .Audit Log.

c. All .Poster logs.. These can be found in the GEMS menu under .poster.
and also in the GEMS directory under Program Files, GEMS, Data, as a text
file. Simply print this out and provide it.

d. Also in the Data file directory under Program Files, GEMS, Data, please
provide any and all logs titled .CCLog,. .PosterLog., and Pserver Log, and
any logs found within the .Download,. .Log,. .Poster. or .Results.
directories.

e. We are also requesting the Election Night Statement of Votes Cast, as
of the time you stopped uploading polling place memory cards for Nov. 2,
2004 election.

Item 5: We are requesting every iteration of every interim results report,
from the time the polls close until 5 p.m. November 3.

Item 6: If you are in the special category of counties who have modems
attached, whether or not they were used and whether or not they were
turned on, we are requesting the following:

a. internal logs showing transmission times from each voting machine used
in a polling place

b. The Windows Event Viewer log. You will find this in administrative
tools, Event Viewer, and within that, print a copy of each log beginning
October 12, 2004 through Nov. 3, 2004.

Item 7: All e-mails, letters, notes, and other correspondence between any
employee of your elections division and any other person, pertaining to
your voting system, any anomalies or problems with any component of the
voting system, any written communications with vendors for any component
of your voting system, and any records pertaining to upgrades,
improvements, performance enhancement or any other changes to your voting
system, between Oct. 12, 2004 and Nov. 3, 2004.

Item 8: So that we may efficiently clarify any questions pertaining to
your specific county, please provide letterhead for the most recent
non-confidential correspondence between your office and your county
counsel, or, in lieu of this, just e-mail us the contact information for
your county counsel.

Because time is of the essence, if you cannot provide all items, please
provide them in increments as soon as you have them, and please notify us
by telephone (206-335-7747) or email (Bevharrismail () aol com) as soon as
you have any portion of the above public records request available for
review.

Thank you very much, and here.s hoping for a smooth and simple canvass
which works out perfectly for you. We very, very much appreciate your help
with this, and we do realize how stressful this election has been.

If you need a local address, please let me know, and we will provide a
local member for this public records request. In the interest of keeping
your life simple, we thought it best to coordinate all records through one
entity so that you don.t get multiple local requests.

# # # # #

We now have evidence that certainly looks like altering a computerized
voting system during a real election, and it happened just six weeks ago.

MONDAY Nov 1 2004: New information indicates that hackers may be targeting
the central computers counting our votes tomorrow. All county elections
officials who use modems to transfer votes from polling places to the
central vote-counting server should disconnect the modems now.

There is no down side to removing the modems. Simply drive the vote
cartridges from each polling place in to the central vote-counting
location by car, instead of transmitting by modem. .Turning off. the
modems may not be sufficient. Disconnect the central vote counting server
from all modems, INCLUDING PHONE LINES, not just Internet.

In a very large county, this will add at most one hour to the
vote-counting time, while offering significant protection from outside
intrusion.

It appears that such an attack may already have taken place, in a primary
election 6 weeks ago in King County, Washington -- a large jurisdiction
with over one million registered voters. Documents, including internal
audit logs for the central vote-counting computer, along with modem
.trouble slips. consistent with hacker activity, show that the system may
have been hacked on Sept. 14, 2004. Three hours is now missing from the
vote-counting computer's "audit log," an automatically generated record,
similar to the black box in an airplane, which registers certain kinds of
events.

COMPUTER FOLKS:

Here are the details about remote access vulnerability through the modem
connecting polling place voting machines with the central vote-counting
server in each county elections office. This applies specifically to all
Diebold systems (1,000 counties and townships), and may also apply to
other vendors. The prudent course of action is to disconnect all modems,
since the downside is small and the danger is significant.

The central servers are installed on unpatched, open Windows computers and
use RAS (Remote Access Server) to connect to the voting machines through
telephone lines. Since RAS is not adequately protected, anyone in the
world, even terrorists, who can figure out the server's phone number can
change vote totals without being detected by observers.

The passwords in many locations are easily guessed, and the access phone
numbers can be learned through social engineering or war dialing.

ELECTION OFFICIALS: The only way to protect tomorrow's election from this
type of attack is to disconnect the servers from the modems now. Under
some configurations, attacks by remote access are possible even if the
modem appears to be turned off. The modem lines should be physically
disconnected.

We obtained these documents through a public records request. The video
was taken at a press conference held by the King County elections chief
Friday Oct 29.

The audit log is a computer-generated automatic record similar to the
"black box" in an airplane, that automatically records access to the
Diebold GEMS central tabulator (unless, of course, you go into it in the
clandestine way we demonstrated on September 22 in Washington DC at the
National Press club.)

The central tabulator audit log is an FEC-required security feature. The
kinds of things it detects are the kinds of things you might see if
someone was tampering with the votes: Opening the vote file, previewing
and/or printing interim results, altering candidate definitions (a method
that can be used to flip votes).

Three hours is missing altogether from the Sept. 14 Washington State
primary held six weeks ago.

Here is a copy of the GEMS audit log.

Note that all entries from 9:52 p.m. until 1:31 a.m. are missing.

One report that GEMS automatically puts in the audit log is the "summary
report." This is the interim results report. We obtained the actual Sept.
14 summary reports, printed directly from the King County tabulator GEMS
program, because we went there and watched on election night and collected
these reports. These reports were also collected by party observers,
candidates, and were on the Web site for King County.

Here are summary reports which are now missing from the audit log.

Note the time and date stamps on the reports. Note also that they are
signed by Dean Logan, King County elections chief. We have the original
reports signed in ink on election night.

What does all this mean?

We know that summary reports show up in the audit log.

There are other audit logs, like the one that tracks modem transmissions,
but this audit log tracks summary reports.

Dean Logan held a press conference Friday morning, Oct. 29. Kathleen
Wynne, a citizen investigator for Black Box Voting, attended the press
conference and asked Dean Logan why three hours are missing from the audit
log.

Here is a video clip

Logan said the empty three hours is because no reports were printed. OK.
But we have summary reports from 10:34 p.m., 11:38 p.m., 12:11 a.m., 12:46
a.m., and 1:33 p.m. These reports were during the time he said no reports
were run. Either the software malfunctioned, or audit log items were
deleted. Because remote access through the modems is possible, the system
may have been hacked, audit log deleted, without Logan realizing it.

Perhaps there are two of this particular kind of audit log? Perhaps this
is an incomplete one?

Bev Harris called King County elections office records employee Mary Stoa,
asking if perhaps there are any other audit logs at all. Mary Stoa called
back, reporting that according to Bill Huennikens of King County
elections, the audit log supplied to us in our public records request is
the only one and the comprehensive and complete one.

Perhaps it is a computer glitch?

The audit log is 168 pages long and spans 120 days, and the 3 hours just
happen to be missing during the most critical three hours on election
night.

Diebold says altering the audit log cannot be done. Of course, we know a
chimpanzee can't get into an elections office and play with the computer,
but to demonstrate how easy it is to delete audit log entries, we taught a
chimpanzee to delete audit records using an illicit "back door" to get
into the program, Diebold told reporters it was a "magic show." Yet,
Diebold's own internal memos show they have known the audit log could be
altered since 2001!

Here is a Diebold memo from October 2001, titled "Altering the audit log,"
written by Diebold principal engineer Ken Clark:

"King County is famous for it" [altering the audit log]

Here is Dean Logan, telling a Channel 5 King-TV News reporter that there
were no unexpected problems with the Diebold programs. This was at the
"MBOS" central ballot counting facility in King County in the wee hours of
Sept. 15, on Election Night.

Dean Logan on Election Night, Sept 14 2004

Note that he says there were no problems with modem transmission.

When we obtained the trouble slips, in a public records request --
documentation that indeed the modems were not working fine, we were
accidentally given the access phone number for King County.

Were we so inclined, if we had simply kept this under our hat, we could
take control of your central server on election night from our living
room.

Here are the trouble slips showing problems with modems. Note that King
County generously provided us with the "secret" information needed to hack
in by remote access. We did redact the specific information that gives
this information to you.

Here are more trouble tickets. One that is a concern: "OK to format memory
card?" (This would wipe out the votes in the electronic ballot box.)

Election officials: Disconnect those modems NOW. If you don't: You gotta
be replaced.
Reporters: Some election officials will lie to you. Show your kids what
bravery looks like. Be courageous. Report the truth.
Citizens: Please help us by joining the Cleanup Crew. For now, e-mail
crew () blackboxvoting org to join, since our signup form has been taken out.
Candidates: Make a statement. Do not concede on Election Night. Wait until
audits and records can be examined.

# # # # #

HOW TO MONITOR THE CENTRAL TABULATOR: Black Box Voting developed these
guidelines to help you create an audit log, which can then be compared
with the FEC-required computer-generated audit log inside the computer.

Yes, this is a lot of stuff, and it might feel overwhelming, but whatever
you can do -- it is very much appreciated.

THINGS TO BRING WITH YOU
- A notebook and pen. Preferably a notebook with a sewn binding, if you
can find one. Do not take notes on a computer.
- A cell phone
- Binoculars
If you can, also bring these:
- A camera
- A small tape recorder
- A video camera, with a zoom lens if possible

Note that some counties will require you to turn off your video camera
during the entering of passwords, a valid request. You should, however, be
able to videotape the rest. Don.t pull your camera out right away. Avoid
confrontation by leaving your video camera in the bag -- better yet, a
purse. Pull it out only when there is an event of significance.

HUMAN FACTORS

You can.t be effective if you make assumptions or let others intimidate
you.
- Don.t let others make you feel dumb.
- Make no assumptions about security. It might be worse than you expect.
- Don.t count on the accuracy of anything other people tell you, even if
they work for the county or the vendor.
- About party observers, techies, or lawyers: Remember that they have not
examined the actual software or setup, and they are operating on
assumptions, hearsay, or in some cases, may be trying to misdirect your
attention.
- Vendor contracts prohibit county officials from examining their own
software. Elections officials may just be repeating what someone else (the
vendor) has told them.

YOUR ROLE AS AN OBSERVER: CREATE YOUR OWN AUDIT LOG so it can be compared
to the real audit log.

Write down the following. For every event, write the date, time, including
minutes.

1. NAMES & AFFILIATIONS: Get the names of everyone there. Find out
affiliation.

2. WHERE ARE THE COMPUTERS: Establish the number and location of all vote
tabulation computers. They call them different things: tabulators,
servers. What you want is the computer that adds up all the votes from
everywhere in the county.
- Some counties have only one. If there are more than one, find out where
each one is. If there is more than one tabulator, ask if they are
networked together and find out if any of them are in places you can.t
observe.

3. SYNCHRONIZE YOUR WATCH with the central vote-tally computer. Ask
officials to tell you the time on the computer. If more than one, ask for
the time of each and the ID number of each.

log the date and time, to the minute, in this format:
Nov 02 2004 11:25 p.m.
Nov. 03 2004 01:15 a.m.

CREATE A LOG FOR THE FOLLOWING:

People: Ask names and affiliations for, and log the START and STOP time
for:

a. Who accesses the terminal (the keyboard and screen)
b. Who sits at the terminal
c. Who accesses the server (the computer the screen is hooked up to)
d. Who enters and leaves the room

COMPUTER ACTIVITIES: Log the START and STOP time for the following events
and write down the name of the person involved:

a. Putting disks, CDs, or any other item in the computer
b. Taking disks, CDs, or any other item out of the computer
c. Uploading disks, CDs, or any other item
d. Viewing a preview of a report
e. Putting a report on the Web, even if this is done from another computer
f. Printing a report
g. NOTE WHAT.S ON THE SCREEN: Use binoculars to view the screen.
- Note upload icons.
- Use binoculars to read and record error messages. Note the time.
- Note indicators of processes, when a status bar shows how much is left
to do

h. PROGRAM CRASHES:
- Watch to see if the program suddenly disappears from the screen (a
program crash) or any system error message appears. If so, note the time
and other details, and see below for how to record system crashes.
- Get the date and time and note who was at the computer
- Note whether any results were being transmitted or uploaded at the time
the crash occurred.
- Did the crash take down the whole computer or did it just close the
tabulator program unexpectedly.
- Log all activities and conversations that occur just after the crash. If
have a tape recorder, leave it in your purse, now is the time to turn it
on. But keep making notes regardless of whether you have tape, and trust
your gut. What you think might be important is probably important.

WRITE DOWN EVERYTHING YOU CAN FIND OUT ABOUT MODEMS.

i. Note when, where, and who feeds ballot data into the computer in the
central office. Describe what they are feeding the cards into, where the
items are located, who does it, and when.

j. DISK MANAGEMENT:

- Note what kind of data storage device is used to move data around. You
are looking for floppy disks, CDs, USB keys (about the size of a pack of
gum).
- Note where they get the disk from originally (whether it was from the
machine, meaning it could have a program or data on it already, or out of
a package of new disks).
- Track the chain of custody: Where it is taken, and have someone watch it
when taken to any other machine, note what programs you can see on the
other machine
- Note whether (and what time) it comes back and if it is put into the
machine again.
k. Moving the results: They have to move the results somehow. Ask
questions about their procedures.
- Is someone coming and going every hour or so with paper results?
- Are they moving results to the Internet with a floppy or CD or USB key
(looks like a little piece of plastic, about the size of a piece of gum)
- If no one is leaving the machine to post the results, chances are they
are doing this at the computer, meaning they are probably hooked up to a
network or the Internet. Ask questions about the details and record what
they say, and the name of the person who says it.
l. If you see somebody open a web page or they do something that lets you
know there has been Internet access, write it down.

m. BEHAVIORAL CUES:

- Note whether people look worried or stressed. Log the time it begins and
the time it ends and who they are.
- A now a word about .wranglers.. Some elections offices appoint a person
-- sometimes a party observer they are chummy with -- to act as
.wranglers.. They identify any person who might ask troublesome questions,
and if an event occurs that could cause embarrassment, the appointed
wrangler then goes over to distract the observers. Really. This is an
elections procedure in some jurisdictions. They actually call it a
wrangler.
- If someone comes over and engages you in conversation, look around, and
see if officials have suddenly congregated into an office or people are
huddling over a computer. See if you can find out what you are not
supposed to see.
- Log behavior that is distracting, noting the time and person.
- Log time and people involved in other distraction events, for example:
The lights suddenly go out; a fire alarm goes off; someone spills
something, loud noises, someone knocks something over.

RECORDS TO REQUEST:

Each state has a public records act, but in most cases, you can get
records you ask for if you are nice. Here are important records you.ll
want:

1. Get a copy of each INTERIM RESULTS REPORT. Stand guard over what you
have. If someone comes in to remove or .replace one with a better copy.
hang onto the first and take the replacement, marking it. Make sure all
interim reports are time-stamped by the computer. If they aren.t, note the
exact time you see them appear.

2. Request the COMPUTER AUDIT LOG for Oct. 29-Nov 2 (actually, it is
important to get the printout BEFORE YOU LEAVE that night. It will only be
a few pages, and can be printed from the vote-tally program.s menu.

3. Ask for a copy of all the POLLING PLACE RESULTS SLIPS. These are sent
in with the results cartridges. Try to get copies before you leave that
night. If they won.t give copies to you then, put in a public records
request and ask how soon you can pick them up.

4. Ask for a copy of THE UPLOAD LOGS. These are on the computer and can be
printed out on election night. They list each polling place and the time
results were uploaded.

5. There are ADDITIONAL LOGS in the Diebold GEMS programs you can request:
From the GEMS folder .data., ask for the poster logs. There may be folders
in the GEMS .data. directory titled .download., .log., .poster. and
.results.. Ask for copies of these logs.

6. Here.s a report that is very long but incredibly important and
valuable. Ask if you can have the ELECTION NIGHT DETAIL REPORT -- the
precinct by precinct results as of the time all memory cards are uploaded
from all precincts. Depending on the system, they.ll call it different
things -- in Diebold, it is called the Statement of Votes Cast (SOVC)
report.

7. Let us know which REPORTS THEY REFUSE to give you on Election Night. We
can then put in Freedom of Information (public records) requests formally.

Once we have your observation log, and the records you obtain on Election
Night, we can start matching up events and data to audit for anomalies.

# # # # #

Post information in the county and state at BlackBoxVoting.ORG. If the
site is hacked out, come back as soon as it is up and post the
information.

Thank you, and let.s have an orderly election.

# # # # #

Now, there is a film crew who has been brave enough to capture what's
really going on:

THIS IS THE ONE: Here's the film that's breaking new ground on voting
machine investigations. Includes never before seen footage and
information:

download 30 minute preview of the upcoming feature film.

NOTE: Please give your attention to the real film by the real
investigators: Russell Michaels, Simon Ardizzone, and Robert Carrillo
Cohen -- they are the real deal. (Someone who ran off with a portion of
the proprietary footage has been pitching a similarly named, inferior
production which is missing most of the good stuff.) By the way, we've
worked with most of the documentary producers out there, and Russell
Michaels, Simon Ardizzone and Robert Carrillo Cohen are in a class by
themselves -- In my opinion, they are the only filmmakers who have been
doing real, in-depth, long-term in-the-field investigations on this issue
-- Bev Harris.

Remember:

- Don't concede: Candidates, make a statement about voting without
auditing. Hold off on your concession until the canvass is done
- Gotta be replaced: If your county melts down into litigation, hold
officials accountable if they chose to ignore warnings and failed to
mitigate risks with preventive actions (like disconnecting telephone
modems).

Note that most voting machine problems will be found between Nov. 3-12,
during the canvass, and a few weeks later, when public records requests
are obtained.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault