[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Bev Harris/BBV Press Kit
I didn't see this "press kit" PDF conspicuously at the BBV homepage, rather I noticed someone pointed to it at a blog.
http://www.blackboxvoting.com/bbv/1216presskit.pdf TEXT FOLLOWS, please disseminate to media outlets! -Tom Rategan
snip
Contact: Bev Harris 425-228-7131 Bevharriscontact@xxxxxxx
Or Andy Stephenson 206-778-0524 stephenson_for_sos@xxxxxxxxx
Bev Harris, author of Black Box Voting, and Andy Stephenson, Democratic candidate for
Washington Secretary of State, have uncovered information that brings concerns about electronic
voting to a new level. This information affects both optical scans and touch-screens; it also affects
the security of absentee ballots.
What we have, in Washington State, is this:
We?ve got the state election director misstating when versions were certified, somebody at the
secretary of state?s office signing off on software with no NASED number, and when we try to
find out what software is actually authorized, we get the buffalo shuffle. We?ve got a convicted
drug dealer printing our ballots, a 23-count embezzler programming our voting system, and our
absentee ballots are being funneled through a private company that hires mainly immigrants but
also people straight out of prison.
We?ve now documented 10 states that are using unauthorized software, and internal memos
that indicate that five Diebold programmers uploaded these unauthorized programs, knowing that
this was not allowed.
Voter Security Concerns
Diebold left 40,000 files on an unprotected FTP Web site. On this site, they left their own
software, but also left software belonging to other companies. Also sitting on that Web site was
the private information for 310,000 Texans.
Distributing voter registration ?walking lists,? especially on the Internet, creates significant
security risks. Identity thieves can work anonymously from anywhere in the world and, armed
with your social security number and a few other details, can quite literally ruin your life. And all
they need is your name, address and birthday to get your Social Security number.
Voter registration information can be misused by:
? Identity thieves
? Stalkers
? Child molestors
People have a right to privacy, even in the Internet age. Any woman who has an abusive exboyfriend
will tell you that she doesn't want her apartment number published on an open web site.
Child custody cases can get nasty.
Voter registration files typically contain birthdays. First, middle and last names. Street
addresses. Apartment numbers. School districts. Political affiliations. Voting habits.
As we rethink public policy to bring it up to date with new computerized voting methods, we
need to create public policy to prevent people who are patriotic and want to vote from having
their personal security jeopardized. We also need to prohibit making these databases available for
purchase unless they are privacy protected.
Sources to call:
Bev Harris - 425-228-7131 Bevharriscontact@xxxxxxx
Andy Stephenson - 206-778-0524 - stephenson_for_sos@xxxxxxxxx
Expert on Identity Theft: Johnny May 248-745-0286 E-mail: SECRES@xxxxxxxxxxx
Contact: Bev Harris 425-228-7131 Bevharriscontact@xxxxxxx
Or Andy Stephenson 206-778-0524 stephenson_for_sos@xxxxxxxxx
Security of Absentee Ballots
Perhaps like most people, you believe that your absentee ballot goes from the elections office
through the U.S. Post Office to you. After you cast your votes, you then send it through the U.S.
Post Office to the elections division.
Not quite. There is a middleman, and apparently no regulations, criminal background checks,
or auditing procedures apply to the middleman.
King County has been subcontracting out the processing for its 500,000 absentee ballots to
Diebold Election Systems, who then subcontracts to PSI Group, Inc., a private for-profit company
based in Omaha, Nebraska.
According to the ?community release plan? obtained for two felons, Jeffrey W. Dean and John
L. Elder, this absentee ballot sorting firm, PSI Group Inc., had agreed to hire them upon leaving
prison, after they served time for embezzlement and drug dealing, respectively.
There are two ways to manipulate absentee election results if an unscrupulous person gains
access to the mail sorting process:
? Vote suppression ? Lose outgoing ballots to a portion of voters in key precincts, forcing
them to call and ask for a replacement ballot.
? Vote reduction ? Lose or replace incoming ballots for a portion of voters in key precincts.
PSI Group Inc. initially sorted just outgoing ballots, but now also sorts the incoming ballots.
PSI Group employees have access to the most high-risk attack point for absentee ballot security.
Though King County may claim that it employs an audit method, counting the ballots received
before they go out to PSI Group, in fact they are unable to do this consistently. Indeed, it would
make no sense to sort them into precincts and count them and then contract with someone else to
sort them. Also, on some days up to 60,000 ballots at a time arrive, and King County is not
staffed to do this. Therefore ? any ballots that disappear will have no audit trail.
We need some procedural safeguards:
1. Criminal background checks on anyone sorting absentee ballots, either outgoing or
incoming
2. Tighter audit procedures designed to deter absentee ballot fraud.
Contact numbers:
Bev Harris - 425-228-7131 Bevharriscontact@xxxxxxx
Andy Stephenson - 206-778-0524 - stephenson_for_sos@xxxxxxxxx
King County Elections Office - Dean Logan - 206-296-1540
.
Use of unauthorized voting programs
While the certified version of the voting software sits in escrow at the secretary of state?s
office, unauthorized versions have been installed on our voting systems in four Washington State
counties and in locations in California, Arizona, New Mexico, Kentucky, Kansas, Maryland,
Florida, Colorado and Georgia.
Diebold programmers in Vancouver have been writing the software, uploading it to the FTP
site and, from there, election officials and Diebold field techs have been downloading and
installing it, overwriting the approved software.
You can determine whether the authorized version is being used by comparing the NASED
version number to the version number installed on the voting system. After looking at every ITAtested
NASED authorized version number available, there can be no other conclusion: Diebold
has been putting unauthorized software into our voting systems.
When Georgia Secretary of State Cathy Cox says, of ballot-tampering, ?It would take a
conspiracy beyond belief, of all these different poll workers ? I don?t see how this could happen
in the real world,? she?s dead wrong. It doesn?t take a conspiracy beyond belief. It takes one
person, working alone at the office at night.
* * * * *
The Diebold Memos made their first public appearance on BlackBoxVoting.org when 24
internal Diebold memos with a commentary about use of unapproved software appeared on
BlackBoxVoting.org. Everyone yawned except Diebold, who hit BlackBoxVoting.org with a
cease and desist.
You might be yawning now.
Boring. Mundane. Someone used 1.18.4 instead of 1.17.23. Ho hum.
Except for this: A programmer never changes a version number unless he changes the
underlying computer code. If the versions are never submitted for certification, only the single
individual who programmed the change knows for sure what he put in there.
?Maybe they?ll say it was just to fix bugs,? one reporter suggested. Sure. They?ll say that. And
they?ll say it was just to add features and just to create a new report format. And that might all be
true, but before you breathe a sigh of relief, let me give you a taste of just how out of control this
problem has been.
Two of the five programmers who put uncertified software on the Diebold FTP site ? Talbot
Iredale and Guy Lancaster ? were hired during the ?Vancouver Maneuver? era, while the
company was managed and promoted by a money launderer and an individual who had gone to
jail for defrauding the Canadian government. We know little about Iredale and Lancaster and
nothing about the other three programmers.
Through the HAVA Act, we?re investing four billion dollars in voting machines, and
certification is the foundation of the structure. Remove it, and the whole house of cards tumbles.
* * * * *
?As far as we know, some guy from Russia could be controlling the outcome of computerized
elections in the United States,? Lynn Landes wrote.
Lynn, meet Dmitry Papushin, some guy from Russia. He is one of the five Diebold
programmers who has been putting programs on the FTP site. Take a look at his memos. What
he?s doing here is placing uncertified software versions on a Web site, and people are using it.
Underlines represent versions that were never certified, or the implementation of poor security
procedures.
18 Jan 2000 memo from Dmitry Papushin: ?GEMS 1-14-5 is ready. The password is: ik12lld2n4mpd.?
January 25, 2000 memo from Steve Knecht: ?Will all future 1.14x versions be compatible with 1.14.5 if we
burn mem cards in San Luis Obispo now??
15 January 2003 memo from Dmitry Papushin: ?Ballot Station 4-3-14 for Windows CE and Windows NT are
ready.?
10 February 2003 memo from Cathy Smothers: ?Can anyone send me the BS CE 4.3.14 .ins file? I have a
demo tomorrow morning and I need this to upgrade the TS units ...?