US-elections: Proof that Diebold machines were modem-connected!
voter revolter | 24.12.2005 04:55 | Analysis | Technology | World
The public and voting officials have been assured, time and again, that Diebold vote-counting machines are not connected to the iNet. But now we know, based on physical evidence and testimony, that Diebold machines in Georgia were connected to iNet for hacking on election night!
Proof: Diebold machines modem-connected!
author: voter revolter
The public and voting officials have been assured, time and again, that Diebold vote-counting machines are not connected to the iNet. But now we know, based on physical evidence and testimony, that Diebold machines in Georgia were connected to iNet for hacking on election night!
The physical evidence is in the "Diebold files" -- which show a diagram exposing such a connection. This diagram is available on-line at --
link to www.scoop.co.nz
Bev Harris of BlackBoxVoting:
Diebold voting machines are used in 37 states. The entire state of Ohio is considering dumping its old system to buy Diebold. Georgia already did.
The Diebold files, supposedly secret voting machine files left on an unprotected web site for nearly six years, are unlocking the truth.
What was the program patch known as rob-georgia.zip used for? What were they doing with that ftp site, anyway?
CNBC asked Diebold CEO Wally O'Dell this question on election day, Nov. 5, 2002: "How tamper proof are these voting machines? That seems to be a concern of some who feel that it only takes one person, one hacker who can screw up an entire election. How valid is that criticism Mr. O`Dell?"
"Well, there`s always risks," replied O'Dell, "but, you know, these things are not connected to the Internet. They`re individual precinct by precinct, location by location. They`re double checked before they`re sent out. We think the technology is fabulous and very bulletproof.
"The GEMS computers are not connected to any communication system, including the Internet, and contain no software other than the Windows operating system and the Global Election Management System object code," wrote Dr. Brit Williams on Apr. 23, 2003. He is the official voting machine certifier for the state of Georgia, and a key member of the panel that chooses national Independent Testing Labs for voting machines.
"The central host system (GEMS Software) is generally a stand-alone system so that no physical access via network is allowed . . . This computer can download files for the Internet with dial-out only capability, but is generally not allowed to be linked to the Internet for obvious security concerns." This, in documents submitted during a purchasing decision, answering questions from Santa Clara County, California on Feb. 7, 2003.
If the GEMS computer isn't connected to anything, why is the following diagram found in a file named GApresentation3-02.zip, found on the Diebold ftp site? This diagram depicts the GEMS computer connecting directly to the Internet on election night. (Georgia, 2004.)
link to www.scoop.co.nz
_________
Bev Harris also has made available interview with James Rellinger, the technician who installed all 159 GEMS host computers in Georgia.
See, article titled "Bald-Faced Lies About Black Box Voting Machine and The Truth About the Rob-Georgia File" by Bev Harris --
http://www.scoop.co.nz/stories/HL0307/S00078.htm
Not connected to any communication system are they, Dr. Williams? I spoke with James Rellinger, the technician who installed all 159 GEMS host computers in Georgia.
________________
Bev Harris is the author of the soon to be published book "Black Box Voting: Ballot Tampering In The 21st Century" --
http://www.blackboxvoting.com
But the major BlackBox webpage is at --
http://www.blackboxvoting.org/
Scoop has made available the location of a complete online copy of the original data set ("the Diebold files"). Scoop" "As we anticipate attempts to prevent the distribution of this information we encourage supporters of democracy to make copies of these files and to make them available on websites and file sharing networks." Download the Diebold files --
http://users.actrix.co.nz/dolly/
See also --
"Inside A U.S. Election Vote Counting Program" --
http://www.scoop.co.nz/mason/stories/HL0307/S00065.htm
and
"Sludge Report #154 - Bigger Than Watergate!"
http://www.scoop.co.nz/mason/stories/HL0307/S00064.htm
___________
ALSO see, recent Indymedia article --
"Voting Machine Security for Diebold, not voter"
http://portland.indymedia.org/en/2005/12/330773.shtml
Not only Diebold, but also ES&S and Sequoia blatantly REFUSE to allow election officials to look at their source code or otherwise conduct valid testing on their voting equipment!
___________
ALSO, see --
VR's demands for voting machine companies --
http://www.velvetrevolution.us/Campaigns/DV4D/
ALSO, see BradBlog (special report)
http://www.bradblog.com/Diebold.htm
author: voter revolter
The public and voting officials have been assured, time and again, that Diebold vote-counting machines are not connected to the iNet. But now we know, based on physical evidence and testimony, that Diebold machines in Georgia were connected to iNet for hacking on election night!
The physical evidence is in the "Diebold files" -- which show a diagram exposing such a connection. This diagram is available on-line at --
link to www.scoop.co.nz
Bev Harris of BlackBoxVoting:
Diebold voting machines are used in 37 states. The entire state of Ohio is considering dumping its old system to buy Diebold. Georgia already did.
The Diebold files, supposedly secret voting machine files left on an unprotected web site for nearly six years, are unlocking the truth.
What was the program patch known as rob-georgia.zip used for? What were they doing with that ftp site, anyway?
CNBC asked Diebold CEO Wally O'Dell this question on election day, Nov. 5, 2002: "How tamper proof are these voting machines? That seems to be a concern of some who feel that it only takes one person, one hacker who can screw up an entire election. How valid is that criticism Mr. O`Dell?"
"Well, there`s always risks," replied O'Dell, "but, you know, these things are not connected to the Internet. They`re individual precinct by precinct, location by location. They`re double checked before they`re sent out. We think the technology is fabulous and very bulletproof.
"The GEMS computers are not connected to any communication system, including the Internet, and contain no software other than the Windows operating system and the Global Election Management System object code," wrote Dr. Brit Williams on Apr. 23, 2003. He is the official voting machine certifier for the state of Georgia, and a key member of the panel that chooses national Independent Testing Labs for voting machines.
"The central host system (GEMS Software) is generally a stand-alone system so that no physical access via network is allowed . . . This computer can download files for the Internet with dial-out only capability, but is generally not allowed to be linked to the Internet for obvious security concerns." This, in documents submitted during a purchasing decision, answering questions from Santa Clara County, California on Feb. 7, 2003.
If the GEMS computer isn't connected to anything, why is the following diagram found in a file named GApresentation3-02.zip, found on the Diebold ftp site? This diagram depicts the GEMS computer connecting directly to the Internet on election night. (Georgia, 2004.)
link to www.scoop.co.nz
_________
Bev Harris also has made available interview with James Rellinger, the technician who installed all 159 GEMS host computers in Georgia.
See, article titled "Bald-Faced Lies About Black Box Voting Machine and The Truth About the Rob-Georgia File" by Bev Harris --
http://www.scoop.co.nz/stories/HL0307/S00078.htm
Not connected to any communication system are they, Dr. Williams? I spoke with James Rellinger, the technician who installed all 159 GEMS host computers in Georgia.
________________
Bev Harris is the author of the soon to be published book "Black Box Voting: Ballot Tampering In The 21st Century" --
http://www.blackboxvoting.com
But the major BlackBox webpage is at --
http://www.blackboxvoting.org/
Scoop has made available the location of a complete online copy of the original data set ("the Diebold files"). Scoop" "As we anticipate attempts to prevent the distribution of this information we encourage supporters of democracy to make copies of these files and to make them available on websites and file sharing networks." Download the Diebold files --
http://users.actrix.co.nz/dolly/
See also --
"Inside A U.S. Election Vote Counting Program" --
http://www.scoop.co.nz/mason/stories/HL0307/S00065.htm
and
"Sludge Report #154 - Bigger Than Watergate!"
http://www.scoop.co.nz/mason/stories/HL0307/S00064.htm
___________
ALSO see, recent Indymedia article --
"Voting Machine Security for Diebold, not voter"
http://portland.indymedia.org/en/2005/12/330773.shtml
Not only Diebold, but also ES&S and Sequoia blatantly REFUSE to allow election officials to look at their source code or otherwise conduct valid testing on their voting equipment!
___________
ALSO, see --
VR's demands for voting machine companies --
http://www.velvetrevolution.us/Campaigns/DV4D/
ALSO, see BradBlog (special report)
http://www.bradblog.com/Diebold.htm
voter revolter
Comments
Display the following comment