Skip Nav | Home | Mobile | Editorial Guidelines | Mission Statement | About Us | Contact | Help | Security | Support Us

World

US-elections: Proof that Diebold machines were modem-connected!

voter revolter | 24.12.2005 04:55 | Analysis | Technology | World

The public and voting officials have been assured, time and again, that Diebold vote-counting machines are not connected to the iNet. But now we know, based on physical evidence and testimony, that Diebold machines in Georgia were connected to iNet for hacking on election night!

Proof: Diebold machines modem-connected!
author: voter revolter
The public and voting officials have been assured, time and again, that Diebold vote-counting machines are not connected to the iNet. But now we know, based on physical evidence and testimony, that Diebold machines in Georgia were connected to iNet for hacking on election night!

The physical evidence is in the "Diebold files" -- which show a diagram exposing such a connection. This diagram is available on-line at --

link to www.scoop.co.nz
Bev Harris of BlackBoxVoting:

Diebold voting machines are used in 37 states. The entire state of Ohio is considering dumping its old system to buy Diebold. Georgia already did.

The Diebold files, supposedly secret voting machine files left on an unprotected web site for nearly six years, are unlocking the truth.

What was the program patch known as rob-georgia.zip used for? What were they doing with that ftp site, anyway?

CNBC asked Diebold CEO Wally O'Dell this question on election day, Nov. 5, 2002: "How tamper proof are these voting machines? That seems to be a concern of some who feel that it only takes one person, one hacker who can screw up an entire election. How valid is that criticism Mr. O`Dell?"

"Well, there`s always risks," replied O'Dell, "but, you know, these things are not connected to the Internet. They`re individual precinct by precinct, location by location. They`re double checked before they`re sent out. We think the technology is fabulous and very bulletproof.

"The GEMS computers are not connected to any communication system, including the Internet, and contain no software other than the Windows operating system and the Global Election Management System object code," wrote Dr. Brit Williams on Apr. 23, 2003. He is the official voting machine certifier for the state of Georgia, and a key member of the panel that chooses national Independent Testing Labs for voting machines.

"The central host system (GEMS Software) is generally a stand-alone system so that no physical access via network is allowed . . . This computer can download files for the Internet with dial-out only capability, but is generally not allowed to be linked to the Internet for obvious security concerns." This, in documents submitted during a purchasing decision, answering questions from Santa Clara County, California on Feb. 7, 2003.

If the GEMS computer isn't connected to anything, why is the following diagram found in a file named GApresentation3-02.zip, found on the Diebold ftp site? This diagram depicts the GEMS computer connecting directly to the Internet on election night. (Georgia, 2004.)

link to www.scoop.co.nz
_________
Bev Harris also has made available interview with James Rellinger, the technician who installed all 159 GEMS host computers in Georgia.

See, article titled "Bald-Faced Lies About Black Box Voting Machine and The Truth About the Rob-Georgia File" by Bev Harris --

 http://www.scoop.co.nz/stories/HL0307/S00078.htm

Not connected to any communication system are they, Dr. Williams? I spoke with James Rellinger, the technician who installed all 159 GEMS host computers in Georgia.
________________

Bev Harris is the author of the soon to be published book "Black Box Voting: Ballot Tampering In The 21st Century" --

 http://www.blackboxvoting.com

But the major BlackBox webpage is at --

 http://www.blackboxvoting.org/

Scoop has made available the location of a complete online copy of the original data set ("the Diebold files"). Scoop" "As we anticipate attempts to prevent the distribution of this information we encourage supporters of democracy to make copies of these files and to make them available on websites and file sharing networks." Download the Diebold files --

 http://users.actrix.co.nz/dolly/

See also --

"Inside A U.S. Election Vote Counting Program" --

 http://www.scoop.co.nz/mason/stories/HL0307/S00065.htm

and

"Sludge Report #154 - Bigger Than Watergate!"

 http://www.scoop.co.nz/mason/stories/HL0307/S00064.htm
___________

ALSO see, recent Indymedia article --

"Voting Machine Security for Diebold, not voter"

 http://portland.indymedia.org/en/2005/12/330773.shtml

Not only Diebold, but also ES&S and Sequoia blatantly REFUSE to allow election officials to look at their source code or otherwise conduct valid testing on their voting equipment!
___________

ALSO, see --

VR's demands for voting machine companies --

 http://www.velvetrevolution.us/Campaigns/DV4D/

ALSO, see BradBlog (special report)

 http://www.bradblog.com/Diebold.htm

voter revolter

Comments

Display the following comment

  1. I wonder — freddie

Publish

Publish your news

Do you need help with publishing?

/regional publish include --> /regional search include -->

World Topics

Afghanistan
Analysis
Animal Liberation
Anti-Nuclear
Anti-militarism
Anti-racism
Bio-technology
Climate Chaos
Culture
Ecology
Education
Energy Crisis
Fracking
Free Spaces
Gender
Globalisation
Health
History
Indymedia
Iraq
Migration
Ocean Defence
Other Press
Palestine
Policing
Public sector cuts
Repression
Social Struggles
Technology
Terror War
Workers' Movements
Zapatista

Kollektives

Birmingham
Cambridge
Liverpool
London
Oxford
Sheffield
South Coast
Wales
World

Other UK IMCs
Bristol/South West
London
Northern Indymedia
Scotland

Server Appeal Radio Page Video Page Indymedia Cinema Offline Newsheet

secure Encrypted Page

You are viewing this page using an encrypted connection. If you bookmark this page or send its address in an email you might want to use the un-encrypted address of this page.

If you recieved a warning about an untrusted root certificate please install the CAcert root certificate, for more information see the security page.

IMCs


www.indymedia.org

Projects
print
radio
satellite tv
video

Africa

Europe
antwerpen
armenia
athens
austria
barcelona
belarus
belgium
belgrade
brussels
bulgaria
calabria
croatia
cyprus
emilia-romagna
estrecho / madiaq
galiza
germany
grenoble
hungary
ireland
istanbul
italy
la plana
liege
liguria
lille
linksunten
lombardia
madrid
malta
marseille
nantes
napoli
netherlands
northern england
nottingham imc
paris/île-de-france
patras
piemonte
poland
portugal
roma
romania
russia
sardegna
scotland
sverige
switzerland
torun
toscana
ukraine
united kingdom
valencia

Latin America
argentina
bolivia
chiapas
chile
chile sur
cmi brasil
cmi sucre
colombia
ecuador
mexico
peru
puerto rico
qollasuyu
rosario
santiago
tijuana
uruguay
valparaiso
venezuela

Oceania
aotearoa
brisbane
burma
darwin
jakarta
manila
melbourne
perth
qc
sydney

South Asia
india


United States
arizona
arkansas
asheville
atlanta
Austin
binghamton
boston
buffalo
chicago
cleveland
colorado
columbus
dc
hawaii
houston
hudson mohawk
kansas city
la
madison
maine
miami
michigan
milwaukee
minneapolis/st. paul
new hampshire
new jersey
new mexico
new orleans
north carolina
north texas
nyc
oklahoma
philadelphia
pittsburgh
portland
richmond
rochester
rogue valley
saint louis
san diego
san francisco
san francisco bay area
santa barbara
santa cruz, ca
sarasota
seattle
tampa bay
united states
urbana-champaign
vermont
western mass
worcester

West Asia
Armenia
Beirut
Israel
Palestine

Topics
biotech

Process
fbi/legal updates
mailing lists
process & imc docs
tech