[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[no subject]



Also, if it was legitimate, it would be a menu item in the GEMS program, not
executed in a hidden location triggered by a secret 2-digit code. Nothing in
the GEMS documentation describes the use of any feature like this
whatsoever.

Here's why we need to involve CPAs in vote tabulation regulations,
procedures, and design:
If changing election data is required, the corrective entry must be made not
by overwriting vote totals, but by making a corrective entry.
It is never acceptable to make changes by overwriting. Data corrections
should not be prohibited, but must always be done by indicating changes
through a clearly marked line item that preserves each transaction.
However, according to elections officials we interviewed, GEMS is improperly
designed, and cannot perform an adjustment, and you can't journal changes
that occur for weird reasons that really happen. (For example, a poll worker
might accidentally run ballots through twice. You need to be able to correct
this and still show your work.)
Instead of doing an adjustment and showing the explanation, retaining a
permanent record of everything that happened, a common procedure is to wipe
out the mistake, and simply overwrite it with new data. This is completely
improper, from an auditing standpoint.
It is certainly improper to have the summary reports come from the second
ledger, while pulling the spot check reports from the first ledger, with a
provision in the back door to allow these two ledgers to be mismatched.
But there is more evidence that these extra sets of books are illicit: If
the extra set of books is legitimate, the county officials, whose
jurisdiction paid for and own the voting system, should be informed of such
functions. Yet Diebold has not explained to county officials why it is there
at all, and in most cases, never even told them these functions exist.
As a member of slashdot.org commented when we originally published this
information: "This is not a bug, it's a feature."
Solutions to GEMS central tabulator problem
Recommendations:

*         County officials should be required to maintain the following
procedures to mitigate risk:
*         Control access to the central tabulator through key logs and
access cards
*         Get rid of all modems and any wireless communications. The use of
the digiboard modem bank attached to GEMS has got to stop.
*         All corrective entries should be journaled and documented and
publicly available, whether or not "they would change the outcome of the
election."
*         Maintain a list of everyone who enters the central tabulator room,
with log in and out times and dates
*         Any Diebold techs or county IT people who are allowed access the
central tabulator room should be formally deputized or certified and sworn
as election officials. Their names and credentials should be available to
the public. The names of all individuals allowed access to central
tabulators should be posted publicly during elections, and all individuals
who have access the central tabulator should be available to citizens
through public records requests.
*         Physical control, in addition to keys to the room, should include
blocking off access through ceiling panels and limiting physical access
through all other means.
*         In Diebold counties especially, the touch screens have got to go.
The combination of a central tabulator that can be hacked six ways from
Sunday in seconds, including the option of melting down the entire election,
destroying the data, cannot be combined with unauditable electronic systems
which keep no physical record of the vote.

Short term corrective action for touch screen counties

All counties who have touch screens also have central count machines for
paper ballots, for counting absentee votes. In November, use paper ballots
and count them all in the high speed central count machine used for
absentees.
Polling place tapes

State officials should require all counties to post polling place tapes
containing all results before votes are transmitted to the central count
facility.
*         Two copies should be printed, one to be posted at the polling
place and the other to be attached to the vote data, sealed, and transported
to the county in front of at least two witnesses.
*         A one hundred percent audit of all polling place tapes against the
data in GEMS should be performed. This must include summing up the data on
all polling place tapes, to compare totals from polling place vs. central
tabulator. Remember: The way GEMS is constructed, it will pass the polling
place comparison unless data is also totalled on both reports.
The importance of the second copy: The first copy is sent privately to the
county elections official. A second copy is needed in order to make an audit
set of data available to the public simultaneously.
*         Quit co-mingling of data. Absentee and provisional/challenge/early
votes must not be mixed together with polling place votes, but must be
accounted for as a separate line item.
*         There must be consequences for failure to follow risk reduction
procedures.
*         Taxpayers should demand that their local government dump Diebold
and seek restitution of their money under consumer protection laws.

Ways to get taxpayer restitution
Attorneys

Black Box Voting may join in your county, state, or federal Qui Tam actions,
waiving our right to the whistleblower bounty, retaining your own for
attorneys fees if possible, providing the evidence we have (and it fills a
small warehouse by now), in order to get taxpayer restitution for the
purchase of this system.
What about the Qui Tam requirement to seal the evidence?

We believe that in this case, the fraudulent claims cases should be filed
anyway, with a refusal to seal the evidence, to recover money for the
taxpayer.
Yes, there are some who say that to prevail with a false claims act, the
evidence must be sealed, and some have kept quiet about what they are
gathering, saying "nothing can be done until after the election." We
disagree. We, all of us, have an obligation to head off this train wreck.
All evidence must be put into the hands of the public, so that we can have a
fair election. Let us go forth with preventive actions instead of sabotaging
the election in order to profit on the back end.
Consumer fraud cases are needed to achieve taxpayer restitution. The
evidence must not be sealed, because it is needed in order to put approprate
security procedures in place to protect the election.
California is expected to announce on September 6, 2004, whether they will
help seek taxpayer restitution in the existing Qui Tam

We predict that the California Attorney General will reject the effort to
seek taxpayer restitution. Instead, they will try to rehabilitate Diebold.
Two members of the California Voting Systems Panel have told Black Box
Voting that they intend to deal with Diebold after the election.
Diebold has just demonstrated its "voter verified paper ballot" to
California. Yet, this system really doesn't matter, if you don't have
security in place, don't audit, and can hack the central tabulator.
More predictions

Diebold (and many public officials) will claim, again, that they have
corrected the problem. Public officials will omit any mention of the messy
little business where the embezzler put the election-manipulation program
into the central tabulator, or the uncomfortable fact that Diebold left it
there for years, for anyone to use or sell.

The GEMS software will remain secret, and even the county officials won't
examine it, because they are forbidden to do so by their contract with
Diebold.

While we are walking local officials through the problems with GEMS over the
phone, showing them it exists, we expect high ranking officials and the
Diebold company to justify their decision to do nothing by attacking the
messenger, (Black Box Voting). We will be called nuts, kooks, and cranks.
How much taxpayer money is involved?

You can't run the multimillion dollar Diebold voting system without GEMS.
*         State of Georgia: $52 million
*         State of Maryland: We hear it is up to $70 million by now.
*         State of Arizona: Approx. $50 million
*         State of California: In total, approx. $100 million

All in all, the Diebold system is used in about three dozen states, and the
amount of money spent nationwide is between 1/2 and 3/4 billion.
This nasty situation reminds us of the Savings and Loan crisis in the 1980s,
in that it is such a boondoggle that one hardly wants to admit that it
exists. But, like the S&L scandal, the train wreck is approaching.

It's not too late.
*         Voters want and deserve security procedures to protect the
integrity of their vote this fall.
*         Taxpayers want and deserve their money back.
*         Public officials must be informed, and if they refuse to look, it
must be documented so that they can be held accountable.
*         Anyone who looks has a moral obligation to do something about
this. Any public official who looks has a legal obligation to take the
appropriate steps.

--



------=_NextPart_000_0014_01C498B6.6E52B380
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!doctype html public "-//W3C//DTD W3 HTML//EN">
<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns=3D"http://www.w3.org/TR/REC-html40";>

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<meta name=3DProgId content=3DWord.Document>
<meta name=3DGenerator content=3D"Microsoft Word 9">
<meta name=3DOriginator content=3D"Microsoft Word 9">
<link rel=3DFile-List href=3D"cid:filelist.xml@xxxxxxxxxxxxxxxxx";>
<link rel=3DEdit-Time-Data href=3D"cid:editdata.mso@xxxxxxxxxxxxxxxxx";>
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title>Problems with El Paso County Diebold election machines</title>
<!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:RelyOnVML/>
  <o:DoNotRelyOnCSS/>
 </o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:Zoom>BestFit</w:Zoom>
  <w:DocumentKind>DocumentEmail</w:DocumentKind>
  <w:EnvelopeVis/>
  <w:DrawingGridHorizontalSpacing>4.5 =
pt</w:DrawingGridHorizontalSpacing>
  <w:DrawingGridVerticalSpacing>12.25 pt</w:DrawingGridVerticalSpacing>
  <w:Compatibility>
   <w:ForgetLastTabAlignment/>
  </w:Compatibility>
  <w:DocumentVariables>
   <w:ACTIVE>Normal.dot</w:ACTIVE>
   <w:VTCASE>4</w:VTCASE>
   <w:VTCommandPending>NONE</w:VTCommandPending>
   <w:VTCurMacroFlags_x0024_>NNNN</w:VTCurMacroFlags_x0024_>
   <w:VTINIT>1</w:VTINIT>
   <w:VTypeCAPFlag_x0024_>TRUE</w:VTypeCAPFlag_x0024_>
   <w:VTypeJoinDigitFlag_x0024_>FALSE</w:VTypeJoinDigitFlag_x0024_>
   <w:VTypeLCFlag_x0024_>FALSE</w:VTypeLCFlag_x0024_>
   <w:VTypeNoSpaceFlag_x0024_>TRUE</w:VTypeNoSpaceFlag_x0024_>
   <w:VTypeSpaceFlag_x0024_>FALSE</w:VTypeSpaceFlag_x0024_>
   <w:VTypeUCFlag_x0024_>FALSE</w:VTypeUCFlag_x0024_>
  </w:DocumentVariables>
 </w:WordDocument>
</xml><![endif]-->
<style>
<!--
 /* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;
	mso-font-charset:2;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:0 268435456 0 0 -2147483648 0;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;
	mso-font-charset:0;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:16792199 0 0 0 65791 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-parent:"";
	margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:Arial;
	mso-fareast-font-family:"Times New Roman";}
p.MsoEnvelopeAddress, li.MsoEnvelopeAddress, div.MsoEnvelopeAddress
	{margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:2.0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	mso-element:frame;
	mso-element-frame-width:5.5in;
	mso-element-frame-height:99.0pt;
	mso-element-frame-hspace:9.0pt;
	mso-element-wrap:auto;
	mso-element-anchor-horizontal:page;
	mso-element-left:center;
	mso-element-top:bottom;
	mso-height-rule:exactly;
	font-size:12.0pt;
	font-family:Arial;
	mso-fareast-font-family:"Times New Roman";
	font-weight:bold;
	mso-bidi-font-weight:normal;}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;
	text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;
	text-underline:single;}
p.MsoAutoSig, li.MsoAutoSig, div.MsoAutoSig
	{margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:Arial;
	mso-fareast-font-family:"Times New Roman";}
tt
	{mso-ascii-font-family:Arial;
	mso-fareast-font-family:"Courier New";
	mso-hansi-font-family:Arial;
	mso-bidi-font-family:Arial;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	mso-ansi-font-size:12.0pt;
	mso-ascii-font-family:Arial;
	mso-hansi-font-family:Arial;
	mso-bidi-font-family:Arial;
	color:blue;}
@page Section1
	{size:8.5in 11.0in;
	margin:.5in .75in .55in .75in;
	mso-header-margin:.5in;
	mso-footer-margin:.5in;
	mso-title-page:yes;
	mso-paper-source:0;}
div.Section1
	{page:Section1;}
 /* List Definitions */
@list l0
	{mso-list-id:50232439;
	mso-list-type:hybrid;
	mso-list-template-ids:2009887432 -755970864 -157362976 1130530984 =
500571552 98623472 -1534707104 -1061009860 -258437098 600850024;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1
	{mso-list-id:166556035;
	mso-list-type:hybrid;
	mso-list-template-ids:366742540 2008714664 251403240 -459493156 =
-1773769888 -941437900 -1645413174 1546023748 1793491846 867349360;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l2
	{mso-list-id:278337150;
	mso-list-type:hybrid;
	mso-list-template-ids:769145934 -4818720 -1694051102 1951685376 =
1845282706 -989697572 -1670625994 -1135856576 127439176 90601846;}
@list l2:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l3
	{mso-list-id:505872749;
	mso-list-type:hybrid;
	mso-list-template-ids:-1492468950 -437496812 -717877852 -1420157706 =
1889065458 -973960274 -107960818 278401444 66476356 -348770340;}
@list l3:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l4
	{mso-list-id:695927397;
	mso-list-type:hybrid;
	mso-list-template-ids:459856238 -857709306 217481422 -818094294 =
-265679198 -1661205514 1115718542 2110312890 1775673146 601631870;}
@list l4:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l5
	{mso-list-id:811287770;
	mso-list-type:hybrid;
	mso-list-template-ids:711246716 604158688 -788886010 -63173144 =
-852559122 704299768 551596598 1440271312 1843051670 1439571722;}
@list l5:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l6
	{mso-list-id:865601387;
	mso-list-type:hybrid;
	mso-list-template-ids:2086425594 702304338 -709168152 -1269384084 =
-162756718 2041188742 -1522376922 -953236506 -762278622 -385479890;}
@list l6:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue style=3D'tab-interval:.5in'>

<div class=3DSection1>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D3 =
color=3Dblue face=3DArial><span
style=3D'font-size:12.0pt'><![if =
!supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D3 =
color=3Dblue face=3DArial><span
style=3D'font-size:12.0pt'><![if =
!supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></font></span></p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D2 =
color=3Dblack
face=3DTahoma><span =
style=3D'font-size:10.0pt;font-family:Tahoma;color:black'>-----Original
Message-----<br>
<b><span style=3D'font-weight:bold'>From:</span></b> Dr. Charles E. =
Corry
[mailto:ccorry@xxxxxxxx]<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Sunday, September =
12, 2004
10:26 AM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Wayne Williams (Dist =
1); Tom
Huffman (Dist 2); Chuck Brown (Dist 3); Jeri Howells (Dist 4); Jim =
Bensberg
(Dist 5)<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> Douglas Bruce; Sallie =
and
Welling Clark; Dennis Hisey; Robert Balink; Terry Sholdt; John Gardner; =
Bill
Compton; Ed Quillen; Kevin Simpson; Ed Sealover; Joe Barber; Mike =
Cacioppo;
Michael Gardner; Lou Kilzer RMN; Rep. Dave Schultheis; Senator Andy =
McElhany;
Senator Ron May; Rep. Keith King<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> Problems with El =
Paso
County Diebold election machines</span></font></p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
face=3DArial><span
style=3D'font-size:12.0pt'><![if =
!supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'>Dear El Paso =
County
Commissioners,</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp; On
August 31st I sent the County Clerk, Robert Balink, the following notice =
of a
severe security problem with the Diebold election system used in this =
county,
together with the included documentation of the issue. Bill Compton, =
Esq.,
elections director for the State of Colorado, was also copied on the =
notice.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;
As of this date I have not received any acknowledgement or response from =
either
Mr. Balink or Mr. Compton.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;
Ms. Bev Harris, the author of the security report below, has a =
well-established
track record of accurately describing problems with the Diebold election =
system
in use here. Other authors, e.g. Bill Vaughn, are describing our system
as&nbsp; <a
href=3D"http://www.processor.com/editorial/article.asp?article=3Darticles=
%2Fp2636%2F06bp36%2F06bp36%2Easp&amp;guid=3D2355A4F03BF04EA79CC16DB6527DA=
AA0&amp;searchtype=3D&amp;WordList=3D&amp;bJumpTo=3DTrue">Toy
Voting Machines</a>. Publications as diverse as Vanity Fair (April 2004) =
and
Playboy (September 2004), and as prestigious as the <a
href=3D"http://nytimes.com/ref/opinion/making-votes-count.html?pagewanted=
=3Dall">New
York Times</a> (almost every week for months), have been carrying =
article after
article describing the problems and failures of Diebold election =
systems. There
can be no question at this point that the shortcomings of Diebold voting
equipment are real and pose a definite threat to the integrity of our
elections. Yet I can't even get a response or acknowledgement from our =
County
Clerk that he is aware of the problems, nor what steps he may or may not =
have
taken to fix them.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;
It is no secret that El Paso County hopes to double their sales tax in =
the
coming election, and that school districts also have tax measures on the
ballot. In other areas, e.g., Riverside County, California, such =
measures have
mysteriously passed after a switch to electronic vote counting despite =
having
been repeatedly defeated in previous elections. And that says nothing of =
the
fact this is a presidential and senatorial election where citizen =
confidence in
the entire election process is at stake due to the effectively infinite =
number
of reported election problems involving electronic voting machines, e.g. =
see <a
href=3D"http://www.ejfi.org/Voting/Voting.htm";>Vote Fraud and Election =
Issues</a>.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;
There is also the open question of whether the Diebold election system
currently in use in this county has been tested and certified. In August =
I once
again asked the Deputy County Clerk, Terry Sholdt, if she would obtain =
current
certification for the Diebold election system from the Secretary of =
State. On
August 9th, Deputy Clerk Sholdt sent me the following =
email:</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>


<div class=3DMsoNormal align=3Dcenter =
style=3D'margin-left:.5in;text-align:center'><font
size=3D3 color=3Dblack face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>


<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Subject: RE: forwarding a =
question about
voting in Colorado</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Date: Mon, 9 Aug 2004 08:03:44 =
-0600</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>To: &quot;Dr. Charles E. =
Corry&quot;
&lt;ccorry@xxxxxxxx&gt;,</span></font><font color=3Dblack><span =
style=3D'color:
black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><x-tab>&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;
</x-tab>&quot;Ruth Barton&quot; =
&lt;RBarton@xxxxxxxxxxxxxxxxxxx&gt;</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Cc: &quot;Robert Balink&quot;
&lt;RobertBalink@xxxxxxxxxxxx&gt;</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Dr. Corry,</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>I have forwarded your request for =
the
certifications to Drew Durham,</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Director of HAVA for the =
Secretary of
State.</span></font><font color=3Dblack><span =
style=3D'color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Terry Sholdt</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Chief Deputy</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>


<div class=3DMsoNormal align=3Dcenter =
style=3D'margin-left:.5in;text-align:center'><font
size=3D3 color=3Dblack face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>


<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'>However, no =
documentation
for the certification of the Diebold election system has yet been =
received.
Thus, to the best of my knowledge, the coming election will be conducted =
with
uncertified voting equipment.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;
Supposed testing by &quot;Independent&quot; Testing Authorities (ITAs) =
isn't.
The ITAs are hired and paid by the voting equipment manufacturers, e.g.,
Diebold. Further, the testing methods and results used by the ITAs are =
secret.
But what has leaked clearly shows what testing does take place is =
minimal, the
competency of the individuals and laboratories doing the work has been =
severely
questioned, and the testing is demonstrably grossly =
inadequate.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
Having been a member of the <a =
href=3D"http://grouper.ieee.org/groups/scc38/1583/";>IEEE
Voting Equipment Standards</a> committee since its inception, I am all =
too painfully
aware that no uniform standards exist to which our electronic voting =
machines
can be tested.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;
Therefore, it is incumbent upon our county election officials, namely =
Mr.
Balink and his staff, to take all reasonable steps and precautions to =
ensure
the Diebold equipment that is, unfortunately, currently being used is as =
secure
and accurate as possible in the coming election. As Mr. Balink and his =
staff
have been very cooperative in the past, I am extremely disappointed at =
the lack
of response from him and his staff to the grave security threat =
described
below.</span></font><font color=3Dblack><span =
style=3D'color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><b><font size=3D4 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:13.5pt;color:black;font-weight:bold'>Requests</span></=
font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
I call on the El Paso County Commission to request a<i><span =
style=3D'font-style:
italic'> public</span></i> report from the County Clerk on what steps he =
has
taken to ensure the security of the Diebold system he is using, e.g., =
removal
of all modem connections to precincts or elsewhere, background checks on =
any
and all individuals, especially Diebold employees or temps, who had, =
have or
will have access to the voting equipment, a moratorium on the use of his =
DREs,
etc. Most such reasonable precautions that can be accomplished prior to =
the
coming election are outlined in the article by Ms. Harris =
below.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
Further, computer security is a subject beyond the established scope and =
competence
of Mr. Balink and his staff. As many of the United States best experts =
on
computer security work and reside in El Paso County, I call on the =
County
Commission to establish a<i><span style=3D'font-style:italic'> =
citizen</span></i>
committee of computer security experts to review the measures taken by =
the
County Clerk and to suggest such further precautions that might =
reasonably be
instituted to ensure a fair, open, and honest election this November, as =
well
as in succeeding years. I feel confident such individuals, who hold or =
have
held the highest security clearances this nation awards, can be trusted =
to keep
any information confidential that may be provided them during such an
investigation. A nondisclosure agreement signed by each member of such a
committee might also be deemed reasonable.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
Thank you for you help in this, an issue that is a cornerstone of our
democracy.</span></font><font color=3Dblack><span =
style=3D'color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal align=3Dright =
style=3D'margin-left:.5in;text-align:right'><i><font
size=3D3 color=3Dblack face=3DArial><span =
style=3D'font-size:12.0pt;color:black;
font-style:italic'>Charles E. Corry, Ph.D., =
F.G.S.A.</span></font></i><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>


<div class=3DMsoNormal align=3Dcenter =
style=3D'margin-left:.5in;text-align:center'><font
size=3D3 color=3Dblack face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>


<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'>President, =
Equal Justice
Foundation http://www.ejfi.org/</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'>455 Bear Creek =
Road</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'>Colorado =
Springs,
Colorado 80906-5820</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'>Telephone: =
(719) 520-1089</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'>Personal home =
page:
http://corry.ws</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'>Curriculum =
vitae:
http://www.marquiswhoswho.net/charleselmocorry/Default.aspx</span></font>=
<font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D1 color=3Dnavy =
face=3DArial><span
style=3D'font-size:7.5pt;color:navy;font-weight:bold'>The good men may =
do
separately is small compared with what they may do =
collectively.</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal align=3Dright =
style=3D'margin-left:.5in;text-align:right'><b><i><font
size=3D1 color=3Dnavy face=3DArial><span =
style=3D'font-size:7.5pt;color:navy;
font-weight:bold;font-style:italic'>Benjamin =
Franklin</span></font></i></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>


<div class=3DMsoNormal align=3Dcenter =
style=3D'margin-left:.5in;text-align:center'><font
size=3D3 color=3Dblack face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>


<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Date: Tue, 31 Aug 2004 06:28:45 =
-0600</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>To: Robert Balink
&lt;RobertBalink@xxxxxxxxxxxx&gt;<br>
From: &quot;Dr. Charles E. Corry&quot; &lt;ccorry@xxxxxxxx&gt;<br>
Subject: Diebold GEMS security problem</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Cc: &quot;Bill Compton&quot;
&lt;Bill.Compton@xxxxxxxxxxxxxxx&gt;</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Bcc:</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>X-Attachments:</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Dear Mr. =
Balink,</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp; I have =
copied
below portions of a <a =
href=3D"http://www.blackboxvoting.org/?q=3Dnode/view/78";>recent
article</a> documenting a severe security problem with the Diebold GEMS
software in use in El Paso County elections. Despite the sensationalism
inherent in her reporting, the level of detail and documentation, =
combined with
the credibility the author has established through her previous efforts, =
leaves
little doubt that the problem she describes exists.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp; Further, the =
probability
for exploitation of this security hole in Diebold's GEMS software is
sufficiently high that, in my professional opinion, this breach =
constitutes a
palpable threat to the integrity of the forthcoming election in this =
county and
other counties in Colorado using Diebold election =
systems.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp; In her =
article
Ms. Harris proposes a series of straightforward remedial measures that =
could
easily be implemented prior to the November election. I note that you =
already
have some of the measures she recommends in place but urge you and your
elections department to follow through with the rest of the steps =
necessary to
close this &quot;backdoor.&quot;</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp; As one =
can
reasonably predict that Ms. Harris' article will draw national =
attention, may I
suggest that you also provide a public description of the steps you have =
taken
to alleviate this threat when they have been =
completed.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp; If I can =
be of
any further help in this matter I would be glad to offer my =
services.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp;&nbsp;&nbsp; Your =
attention to
this critical threat to the security of our elections is deeply =
appreciated.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><i><font size=3D3 color=3Dblack =
face=3DArial><span
style=3D'font-size:12.0pt;color:black;font-style:italic'>Charles E. =
Corry, Ph.D.,
F.G.S.A.</span></font></i><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>cc: Bill Compton, Esq., Colorado =
Elections
Director </span></font><font color=3Dblack><span =
style=3D'color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:1.0in;mso-margin-top-alt:auto;
mso-margin-bottom-alt:auto;margin-left:1.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>


<div class=3DMsoNormal align=3Dcenter =
style=3D'margin-right:.5in;mso-margin-top-alt:
auto;mso-margin-bottom-alt:auto;margin-left:1.0in;text-align:center'><fon=
t
size=3D3 color=3Dblack face=3DArial><span =
style=3D'font-size:12.0pt;color:black'>

<hr size=3D2 width=3D"100%" align=3Dcenter>

</span></font></div>


<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D5 color=3Dblack face=3DArial><span
style=3D'font-size:18.0pt;color:black'>Diebold GEMS central tabulator =
contains a
stunning security hole</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><i><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold;font-style:italic'=
>by Bev
Harris</span></font></i></b><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>http://www.blackboxvoting.org/?q=3D=
node/view/78</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D5 color=3Dblack =
face=3DArial><span
style=3D'font-size:18.0pt;color:black;font-weight:bold'>Issue</span></fon=
t></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>A vote manipulation technique has =
been
found in the Diebold central tabulator. By entering a 2-digit code in a =
hidden
location, a second set of votes is created. This set of votes can be =
changed,
so that it no longer matches the correct votes. The voting system will =
then
read the totals from the bogus vote set. It takes only seconds to change =
the
votes, and to date not a single location in the U.S. has implemented =
security
measures to fully mitigate the risks.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>This program is not =
&quot;stupidity&quot;
or sloppiness. It was designed and tested over a series of a dozen =
version
adjustments.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Whether you vote absentee, on
touch-screens, or on paper ballot (fill in the bubble) optical scan =
machines,
all votes are ultimately brought to the &quot;mother ship,&quot; the =
central
tabulator at the county which adds them all up and creates the results =
report.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>These systems are used in over 30 =
states
and each counts up to two million votes at once.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>The central tabulator is far more
vulnerable than the touch screen terminals. Think about it: If you were =
going
to tamper with an election, would you rather tamper with 4,500 =
individual
voting machines, or with just one machine, the central tabulator which =
receives
votes from all the machines? Of course, the central tabulator is the =
most
desirable target.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>Public =
officials</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>If you are in a county that uses =
GEMS
1.18.18, GEMS 1.18.19, or GEMS 1.18.23, your secretary or state may not =
have
told you about this. You're the one who'll be blamed if your election is
tampered with. Find out for yourself if you have this problem: Black Box =
Voting
will be happy to walk you through a diagnostic procedure over the phone. =
E-mail
Bev Harris or Andy Stephenson to set up a time to do =
this.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D5 color=3Dblack =
face=3DArial><span
style=3D'font-size:18.0pt;color:black;font-weight:bold'>Findings</span></=
font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>The GEMS central tabulator =
program is
incorrectly designed and highly vulnerable to fraud. Election results =
can be
changed in a matter of seconds. Part of the program we examined appears =
to be
designed with election tampering in mind. We have also learned that =
election
officials maintain inadequate controls over access to the central =
tabulator. We
need to beef up procedures to mitigate risks.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Much of this information, =
originally
published on July 8, 2003, has since been corroborated by formal studies =
(RABA)
and by Diebold's own internal memos written by its =
programmers.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Not a single location has yet =
implemented
the security measures needed to mitigate the risk. Yet, it is not too =
late. We
need to tackle this one, folks, roll up our sleeves, and implement =
corrective measures.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>In November 2003, Black Box =
Voting founder
Bev Harris, and director Jim March, filed a Qui Tam lawsuit in =
California
citing fraudulent claims by Diebold, seeking restitution for the =
taxpayer.
Diebold claimed its voting system was secure. It is, in fact, highly =
vulnerable
to and appears to be designed for fraud.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D5 color=3Dblack =
face=3DArial><span
style=3D'font-size:18.0pt;color:black;font-weight:bold'>Problems with =
GEMS
Central Tabulator</span></font></b><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>This problem appears to =
demonstrate intent
to manipulate elections, and was installed in the program under the =
watch of a
programmer who is a convicted embezzler.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>According to election industry =
officials,
the central tabulator is secure, because it is protected by passwords =
and audit
logs. But it turns out that the GEMS passwords can easily be bypassed, =
and the
audit logs can be altered and erased. Worse, the votes can be changed =
without
anyone knowing, including the officials who run the =
election.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>Multiple sets of =
books</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>The GEMS program runs on a =
Microsoft
Access database. It typically receives incoming votes by modem, though =
some
counties follow better security by disconnecting modems and bringing =
votes in
physically.</span></font><font color=3Dblack><span =
style=3D'color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>GEMS stores the votes in a vote =
ledger,
built in Microsoft Access. Any properly designed accounting program will =
allow
only one set of books. You can't enter your expense report in three =
different
places. All data must be drawn from the same place, and multiple =
versions are
never acceptable. But in the files we examined, we found that the GEMS =
system
contained three sets of &quot;books.&quot;</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>The elections official never sees =
the
different sets of books. All she sees is the reports she can run: =
Election
summary (totals, county wide) or a &quot;Statement of Votes Cast&quot; =
(totals
for each precinct). She has no way of knowing that her GEMS system uses =
a
different set of data for the detail report (used to spot check) than it =
does
for the election totals. The Access database, which contains the hidden =
set of
votes, can't be seen unless you know how to get in the back door - which =
takes
only seconds.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>Ask an =
accountant</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>It is never appropriate to have =
two sets
of books inside accounting software. It is possible to do computer =
programming
to create two sets of books, but dual sets of books are prohibited in
accounting, for this simple reason: Two sets of books can easily allow =
fraud to
go undetected. Especially if the two sets are hidden from the =
user.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>A hidden =
trigger</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>The data tables in accounting =
software
automatically link up to each other to prevent illicit back door =
entries. In
GEMS, however, by typing a two-digit code into a hidden location, you =
can
decouple the books, so that the voting system will draw information from =
a
combination of the real votes and a set of fake votes, which you can =
alter any
way you see fit.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>That's right, GEMS comes with a =
secret
digital &quot;on-off&quot; switch to link and unlink its multiple vote =
tables.
Someone who tests GEMS, not knowing this, will not see the mismatched =
sets of
books. When you put a two-digit code into a secret location can you =
disengage
the vote tables, so that tampered totals table don't have to match =
precinct by
precinct results. This way, it will pass a spot check - even with paper =
ballots
- but can still be rigged.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>How and when did =
the
double set of books get into GEMS?</span></font></b><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Black Box Voting has traced the
implementation of the double set of books to October 13, 2000, shortly =
after
embezzler Jeffrey Dean became the senior programmer. Dean was hired as =
Vice
President of Research and Development in September 2000, and his access =
to the
programs is well documented through internal memos from Diebold. The =
double set
of books appeared in GEMS version 1.17.7.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Almost immediately, according to =
the
Diebold memos, another Diebold programmer, Dmitry Papushin, flagged a =
problem
with bogus votes appearing in the vote tables. The double set of books =
remained,
though, going through several tweaks and refinements. From the time =
Jeffrey
Dean was hired in September, until shortly before the Nov. 2000 =
election, GEMS
went through over a dozen changes, all retaining the new hidden vote =
tables.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>For four years, anyone who has =
known how
to trigger the double set of books has been able to use, or sell, the
information to anyone they want.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Black Box Voting Associate =
Director Andy
Stephenson has obtained the court and police records of Jeffrey Dean. It =
is
clear that he was under severe financial stress, because the King County
prosecutor was chasing him for over $500,000 in =
restitution.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>During this time, while Jeffrey =
Dean was
telling the prosecutor (who operated from the ninth floor of the King =
County
[Washington] Courthouse) that he was unemployed, he was in fact =
employed, with
24-hour access to the King County GEMS central tabulator - and he was =
working
on GEMS on the fifth floor of the King County Courthouse. (Dean may now =
be
spending his nights on the tenth floor of the same building; after our
investigations appeared in Vanity Fair and the Seattle Times, Dean was =
remanded
to a work release program, and may be staying in the lockup in the =
courthouse
now.)</span></font><font color=3Dblack><span =
style=3D'color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Jeffrey Dean, according to his =
own
admissions, is subject to blackmail as well as financial pressure over =
his
restitution obligation. Police records from his embezzlement arrest, =
which
involved &quot;sophisticated&quot; manipulation of computer accounting =
records,
report that Dean claimed he was embezzling in order to pay blackmail =
over a
fight he was involved in, in which a person died.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>So now we have someone who's =
admitted that
he's been blackmailed over killing someone, who pleaded guilty to 23 =
counts of
embezzlement, who is given the position of senior programmer over the =
GEMS
central tabulator system that counts approximately 50 percent of the =
votes in
the elections in 30 states, both paper ballot and touch =
screen.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>And just after he is hired, =
multiple sets
of books appear in GEMS, which can be decoupled, so that they don't need =
to
match, by typing in a secret 2-digit code in a specific =
location.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Dr. David Jefferson, technical =
advisor for
California voting systems, told Black Box Voting that he could see no
legitimate reason to have the double set of books in a voting program. =
He
surmised that it might be incredible stupidity.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Dr. Jefferson should speak to =
Jeffrey
Dean's partners and those who worked with him. &quot;Stupid&quot; is not =
how he
is described. The descriptions we get, from Dean's former business =
partner, and
from others who worked with him, are &quot;sophisticated,&quot;
&quot;cunning,&quot; &quot;very bright,&quot; &quot;highly =
skilled,&quot; and
&quot;a con man.&quot;</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>This is the man who supervised =
the
programming for GEMS when the multiple set of books was installed. =
Diebold,
however, is the company that did nothing about it.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Internal memos show that Dean was =
sent the
passwords to the GEMS 1.18.x files months after Diebold took over the =
elections
company. Diebold clearly did not examine the GEMS program before selling =
it,
or, if it did, chose not to correct the flaws. And after exposing this =
problem
in 2003, Diebold still failed to correct it.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Elections were run on this =
tamper-inviting
system for more than three years, and anyone who knew could sell the
vote-tampering secrets to anyone they wanted to, at any time.<br>
It has been a year since this report was first printed, and Diebold has =
never
explained any legitimate reason for this design, which is rather elegant =
and
certainly is not accidental.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D5 color=3Dblack =
face=3DArial><span
style=3D'font-size:18.0pt;color:black;font-weight:bold'>More GEMS =
problems, and
why current solutions/explanations won't work</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>But do new =
security
measures solve the problem?</span></font></b><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>The MS Access database is not =
passworded
and can be accessed illicitly through the back door simply by =
double-clicking
the vote file. After we published this report, we observed unpassworded =
access
on the very latest, GEMS 1.18.19 system in a county elections =
office.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Some locations removed the =
Microsoft
Access software from their GEMS computer, leaving the back door intact =
but,
essentially, removing the ability to easily view and edit the =
file.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>However, you can easily edit the =
election,
with or without Microsoft Access installed on the GEMS computer. As =
computer
security expert Hugh Thompson demonstrated at the August 18 California
Secretary of State meeting, you simply open any text editor, like =
&quot;Notepad,&quot;
and type a six-line Visual Basic Script, and you own the =
election.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Some election officials claim =
that their
GEMS central tabulator is not vulnerable to this back door, because they =
limit
access to the GEMS tabulator room and they require a password to turn on =
the
GEMS computer.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>However...</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Any county that uses modems to =
transfer
votes may inadvertently be giving control of the entire central =
tabulator to
anyone who gets at the computer through the modem phone lines (even if =
it is
not attached to the Internet). This allows Diebold, or any individual, =
to
manipulate votes at their leisure, from any personal computer anywhere =
in the
world.</span></font><font color=3Dblack><span =
style=3D'color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>Let's talk about =
getting
at the central tabulator through telephone lines</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Mohave County, Arizona, for =
example, has
six modems attached to its GEMS computer on election night. King County,
Washington has had up to four dozen modems attached at =
once.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>You will hear that the GEMS =
machine is
stand alone, and is never connected to the Internet. It does have an =
Internet
component, called &quot;jresults,&quot; but nowadays most counties say =
that
they do not hook GEMS up to the Internet. They say that they remove the =
disk
from the GEMS computer and physically take it to another computer, from =
whence
the Internet feed comes. Very nice - BUT:</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>You can access a computer through =
phone
lines as well as through the Internet. In fact, famous hacker Kevin =
Mitnick
liked to hack through telephone lines, not the =
Internet.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>If you have the dial-in numbers, =
it is
possible to get at the GEMS computer from anywhere, using RAS. The =
dial-in
protocols are given to poll workers, many people in Diebold have them, =
lots of
temps have them, and the configurations have been sitting on the =
Internet for
several years.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>What if your =
county
doesn't use any modems at all?</span></font></b><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>That's excellent, but here's what =
we
found: Harris and Stephenson visited county elections officials to ask =
for
lists of names. We asked who was allowed to access the central =
tabulator, after
it was already turned on, and who is given a password and permission to =
sit at
the terminal?</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Several officials told us they =
don't keep
a list. Those who did, gave us the names of too many people - County =
employees
(sometimes limited to one or two). Diebold employees. Techs who work for =
the
county, like county database technicians, also get access to GEMS. =
Printshops
who do the ballots have some access also.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Diebold &quot;contractors,&quot; =
who are
temporary workers hired by subcontractors to Diebold were also reported =
to have
gained access to the GEMS tabulator. (Diebold accounts payable reports =
obtained
by Black Box Voting indicate that Diebold advertises for temps on =
Monster.com,
hotjobs.com, and uses several temporary employment firms, including =
Coast to
Coast Temporary, Ran Temps Inc, and also works with many subcontractors, =
like
Wright Technologies, Total Technical Services, and PDS Technical =
Services.)</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>What if there is =
a
password even to get onto the GEMS computer =
itself?</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>There usually is. The problem is =
this:
Once that computer is open and running GEMS (on election night, for =
example),
that password doesn't much matter. Votes are pouring in pell-mell, and =
they
aren't about to shut that computer down until hours later, sometimes =
days later.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Also, Black Box Voting found =
another
problem with the design of GEMS: Check out the Audit Log, which is =
supposed to
record everything that happens. In every database, you find everyone =
logging is
as the same person, &quot;admin.&quot;</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>There is a reason for this. We =
did not
find a way in GEMS to log in as a new user unless you close GEMS and =
reopen the
file. Now who, on election night, with votes pouring in, is going to =
close and
reopen the file? They don't. Instead, everyone calls themselves the same =
name,
&quot;admin,&quot; thereby ruining the audit log (which can be easily =
erased
and changed anyway.)</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>What about =
counties that
limit access to just one person, the county elections =
supervisor?</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>We've found nowhere that actually =
does
this. The reason: Elections officials are dependent on the vendor, =
Diebold,
during the election.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Suppose we have a computer whiz =
county
official who is the only person who can access GEMS?</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Unlikely, but if you do: =
&quot;Trust, but
verify.&quot; We should never have to trust the sanctity of a million =
votes to
just one person.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>The following =
things can
be done when you go in the back door in GEMS using Microsoft =
Access</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l2 level1 =
lfo1;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>You can change vote totals. </span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l2 level1 =
lfo1;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>You can change flags, which act as digital &quot;on-off&quot; =
switches,
to cause the program to function differently.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:1.5in;mso-margin-top-alt:auto;
mso-margin-bottom-alt:auto;margin-left:2.0in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'>According to =
internal
Diebold memos, there are 32 combinations of on-off flags. Even the =
programmers
have trouble keeping track of all the changes these flags can =
produce.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>You can alter the audit log. </span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l1 level1 =
lfo2;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>You can change passwords, access privileges, and add new =
users.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>Let's talk about
passwords</span></font></b><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>How many people can have =
passwords to
GEMS? A sociable GEMS user can give all his friends access to the vote
database. We added 50 people, and gave them all the same password, which =
was
&quot;password&quot; - so far, we haven't found a limit to how many =
people can
be granted access to the election database.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D5 color=3Dblack =
face=3DArial><span
style=3D'font-size:18.0pt;color:black;font-weight:bold'>Election =
meltdown</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>We found that you can melt down =
an
election in six seconds, simply by using the menu items in GEMS. You can
destroy all data with two mouse clicks, and with four mouse clicks, you =
can
destroy the configuration of the election making it very difficult to =
reload
the original data.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D5 color=3Dblack =
face=3DArial><span
style=3D'font-size:18.0pt;color:black;font-weight:bold'>Does GEMS even =
work as
advertised?</span></font></b><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>According to testimony given =
before the
Cuyahoga Elections Board, the Microsoft Access database design used by
Diebold's GEMS program apparently becomes unstable with high volume =
input. This
problem, according to Diebold, resulted in thousands of votes being =
allocated
to the wrong candidate in San Diego County in March =
2004.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D5 color=3Dblack =
face=3DArial><span
style=3D'font-size:18.0pt;color:black;font-weight:bold'>The Audit =
Log</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Britain J. Williams, Ph.D., is =
the
official voting machine certifier for the state of Georgia, and he sits =
on the
committee that decides how voting machines will be tested and evaluated. =
Here's
what he had to say about the security of Diebold voting machines, in a =
letter
dated April 23, 2003:</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:1.0in;mso-margin-top-alt:auto;
mso-margin-bottom-alt:auto;margin-left:1.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'>&quot;Computer =
System
Security Features: The computer portion of the election system contains
features that facilitate overall security of the election system. =
Primary among
these features is a comprehensive set of audit data. For transactions =
that
occur on the system, a record is made of the nature of the transaction, =
the
time of the transaction, and the person that initiated the transaction. =
This
record is written to the audit log. If an incident occurs on the system, =
this
audit log allows an investigator to reconstruct the sequence of events =
that
occurred surrounding the incident.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Since Dr. Williams listed the =
audit data
as the primary security feature, we decided to find out how hard it is =
to alter
the audit log.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>We went in the front door in GEMS =
and
added a user named &quot;Evildoer.&quot; We had Evildoer perform various
functions, including running reports to check his vote-rigging work, but =
only
some of his activities showed up on the audit log. When we had Evildoer =
melt
down the election, by hitting &quot;reset election&quot; and declining =
to back
up the files, he showed up in the audit log.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>No matter. It was a simple matter =
to
eliminate Evildoer. We went in through the back door and simply deleted =
all the
references to Evildoer.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Microsoft Access encourages those =
who
create audit logs to use auto-numbering, so that every logged entry has =
an
uneditable log number. Then, if one deletes audit entries, a gap in the
numbering sequence will appear. However, we found that this feature was
disabled, allowing us to write in our own log numbers. We were able to =
add and
delete from the audit without leaving a trace.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>Could the double =
set of
books be legitimate?</span></font></b><font color=3Dblack><span =
style=3D'color:
black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>From a programming standpoint, =
there might
be reasons to have a special vote ledger that disengages from the real =
one. For
example, election officials might say they need to be able to alter the =
votes
to add provisional ballots or absentee ballots. If so, this calls into =
question
the training of these officials. If election officials are taught to =
deal with
changes by overwriting votes, regardless of whether they do this in vote =
ledger
1 or vote ledger 2, this is improper.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Also, if it was legitimate, it =
would be a
menu item in the GEMS program, not executed in a hidden location =
triggered by a
secret 2-digit code. Nothing in the GEMS documentation describes the use =
of any
feature like this whatsoever.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Here's why we need to involve =
CPAs in vote
tabulation regulations, procedures, and design:<br>
If changing election data is required, the corrective entry must be made =
not by
overwriting vote totals, but by making a corrective =
entry.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>It is never acceptable to make =
changes by
overwriting. Data corrections should not be prohibited, but must always =
be done
by indicating changes through a clearly marked line item that preserves =
each
transaction.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>However, according to elections =
officials
we interviewed, GEMS is improperly designed, and cannot perform an =
adjustment,
and you can't journal changes that occur for weird reasons that really =
happen.
(For example, a poll worker might accidentally run ballots through =
twice. You
need to be able to correct this and still show your =
work.)</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Instead of doing an adjustment =
and showing
the explanation, retaining a permanent record of everything that =
happened, a
common procedure is to wipe out the mistake, and simply overwrite it =
with new
data. This is completely improper, from an auditing =
standpoint.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>It is certainly improper to have =
the
summary reports come from the second ledger, while pulling the spot =
check
reports from the first ledger, with a provision in the back door to =
allow these
two ledgers to be mismatched.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>But there is more evidence that =
these
extra sets of books are illicit: If the extra set of books is =
legitimate, the county
officials, whose jurisdiction paid for and own the voting system, should =
be
informed of such functions. Yet Diebold has not explained to county =
officials
why it is there at all, and in most cases, never even told them these =
functions
exist.</span></font><font color=3Dblack><span =
style=3D'color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>As a member of slashdot.org =
commented when
we originally published this information: &quot;This is not a bug, it's =
a
feature.&quot;</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D5 color=3Dblack =
face=3DArial><span
style=3D'font-size:18.0pt;color:black;font-weight:bold'>Solutions to =
GEMS central
tabulator problem</span></font></b><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>Recommendations:<=
/span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l6 level1 =
lfo3;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>County officials should be required to maintain the following =
procedures
to mitigate risk: </span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l6 level1 =
lfo3;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Control access to the central tabulator through key logs and =
access
cards </span></font><font color=3Dblack><span =
style=3D'color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l6 level1 =
lfo3;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Get rid of all modems and any wireless communications. The use of =
the
digiboard modem bank attached to GEMS has got to stop. =
</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l6 level1 =
lfo3;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>All corrective entries should be journaled and documented and =
publicly
available, whether or not &quot;they would change the outcome of the
election.&quot; </span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l6 level1 =
lfo3;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Maintain a list of everyone who enters the central tabulator =
room, with
log in and out times and dates </span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l6 level1 =
lfo3;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Any Diebold techs or county IT people who are allowed access the =
central
tabulator room should be formally deputized or certified and sworn as =
election
officials. Their names and credentials should be available to the =
public. The
names of all individuals allowed access to central tabulators should be =
posted
publicly during elections, and all individuals who have access the =
central
tabulator should be available to citizens through public records =
requests. </span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l6 level1 =
lfo3;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Physical control, in addition to keys to the room, should include
blocking off access through ceiling panels and limiting physical access =
through
all other means. </span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l6 level1 =
lfo3;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>In Diebold counties especially, the touch screens have got to go. =
The
combination of a central tabulator that can be hacked six ways from =
Sunday in seconds,
including the option of melting down the entire election, destroying the =
data,
cannot be combined with unauditable electronic systems which keep no =
physical
record of the vote.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>Short term =
corrective
action for touch screen counties</span></font></b><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>All counties who have touch =
screens also
have central count machines for paper ballots, for counting absentee =
votes. In
November, use paper ballots and count them all in the high speed central =
count
machine used for absentees.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>Polling place =
tapes</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>State officials should require =
all
counties to post polling place tapes containing all results before votes =
are
transmitted to the central count facility.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l4 level1 =
lfo4;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Two copies should be printed, one to be posted at the polling =
place and
the other to be attached to the vote data, sealed, and transported to =
the
county in front of at least two witnesses. </span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l4 level1 =
lfo4;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>A one hundred percent audit of all polling place tapes against =
the data
in GEMS should be performed. This must include summing up the data on =
all
polling place tapes, to compare totals from polling place vs. central
tabulator. Remember: The way GEMS is constructed, it will pass the =
polling
place comparison unless data is also totalled on both =
reports.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:1.5in;mso-margin-top-alt:auto;
mso-margin-bottom-alt:auto;margin-left:2.0in'><i><font size=3D3 =
color=3Dblack
face=3DArial><span =
style=3D'font-size:12.0pt;color:black;font-style:italic'>The
importance of the second copy:</span></font></i><font =
color=3Dblack><span
style=3D'color:black'> The first copy is sent privately to the county =
elections
official. A second copy is needed in order to make an audit set of data
available to the public simultaneously.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l3 level1 =
lfo5;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Quit co-mingling of data. Absentee and =
provisional/challenge/early votes
must not be mixed together with polling place votes, but must be =
accounted for
as a separate line item. </span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l3 level1 =
lfo5;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>There must be consequences for failure to follow risk reduction
procedures. </span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l3 level1 =
lfo5;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Taxpayers should demand that their local government dump Diebold =
and
seek restitution of their money under consumer protection =
laws.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D5 color=3Dblack =
face=3DArial><span
style=3D'font-size:18.0pt;color:black;font-weight:bold'>Ways to get =
taxpayer
restitution</span></font></b><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>Attorneys</span><=
/font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Black Box Voting may join in your =
county,
state, or federal Qui Tam actions, waiving our right to the =
whistleblower
bounty, retaining your own for attorneys fees if possible, providing the
evidence we have (and it fills a small warehouse by now), in order to =
get
taxpayer restitution for the purchase of this system.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>What about the =
Qui Tam
requirement to seal the evidence?</span></font></b><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>We believe that in this case, the
fraudulent claims cases should be filed anyway, with a refusal to seal =
the
evidence, to recover money for the taxpayer.</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Yes, there are some who say that =
to
prevail with a false claims act, the evidence must be sealed, and some =
have
kept quiet about what they are gathering, saying &quot;nothing can be =
done
until after the election.&quot; We disagree. We, all of us, have an =
obligation
to head off this train wreck.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>All evidence must be put into the =
hands of
the public, so that we can have a fair election. Let us go forth with
preventive actions instead of sabotaging the election in order to profit =
on the
back end.</span></font><font color=3Dblack><span =
style=3D'color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Consumer fraud cases are needed =
to achieve
taxpayer restitution. The evidence must not be sealed, because it is =
needed in
order to put approprate security procedures in place to protect the =
election.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D4 color=3Dblack =
face=3DArial><span
style=3D'font-size:13.5pt;color:black;font-weight:bold'>California is =
expected to
announce on September 6, 2004, whether they will help seek taxpayer =
restitution
in the existing Qui Tam</span></font></b><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>We predict that the California =
Attorney
General will reject the effort to seek taxpayer restitution. Instead, =
they will
try to rehabilitate Diebold.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Two members of the California =
Voting
Systems Panel have told Black Box Voting that they intend to deal with =
Diebold
after the election.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Diebold has just demonstrated its
&quot;voter verified paper ballot&quot; to California. Yet, this system =
really
doesn't matter, if you don't have security in place, don't audit, and =
can hack
the central tabulator.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D5 color=3Dblack =
face=3DArial><span
style=3D'font-size:18.0pt;color:black;font-weight:bold'>More =
predictions</span></font></b><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>Diebold (and many public =
officials) will
claim,<i><span style=3D'font-style:italic'> again</span></i>, that they =
have
corrected the problem. Public officials will omit any mention of the =
messy
little business where the embezzler put the election-manipulation =
program into
the central tabulator, or the uncomfortable fact that Diebold left it =
there for
years, for anyone to use or sell.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>The GEMS software will remain =
secret, and
even the county officials won't examine it, because they are forbidden =
to do so
by their contract with Diebold.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>While we are walking local =
officials
through the problems with GEMS over the phone, showing them it exists, =
we
expect high ranking officials and the Diebold company to justify their =
decision
to do nothing by attacking the messenger, (Black Box Voting). We will be =
called
nuts, kooks, and cranks.</span></font><font color=3Dblack><span =
style=3D'color:
black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><b><font size=3D5 color=3Dblack =
face=3DArial><span
style=3D'font-size:18.0pt;color:black;font-weight:bold'>How much =
taxpayer money
is involved?</span></font></b><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>You can't run the multimillion =
dollar Diebold
voting system without GEMS.</span></font><font color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l5 level1 =
lfo6;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>State of Georgia: $52 million </span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l5 level1 =
lfo6;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>State of Maryland: We hear it is up to $70 million by now. =
</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l5 level1 =
lfo6;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>State of Arizona: Approx. $50 million </span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l5 level1 =
lfo6;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>State of California: In total, approx. $100 =
million</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>All in all, the Diebold system is =
used in
about three dozen states, and the amount of money spent nationwide is =
between
1/2 and 3/4 billion.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>This nasty situation reminds us =
of the
Savings and Loan crisis in the 1980s, in that it is such a boondoggle =
that one
hardly wants to admit that it exists. But, like the S&amp;L scandal, the =
train
wreck is approaching.</span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><i><font size=3D3 color=3Dblack =
face=3DArial><span
style=3D'font-size:12.0pt;color:black;font-style:italic'>It's not too =
late.</span></font></i><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l0 level1 =
lfo7;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Voters want and deserve security procedures to protect the =
integrity of
their vote this fall. </span></font><font color=3Dblack><span =
style=3D'color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l0 level1 =
lfo7;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Taxpayers want and deserve their money back. </span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l0 level1 =
lfo7;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Public officials must be informed, and if they refuse to look, it =
must
be documented so that they can be held accountable. </span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.5in;text-indent:-.25in;mso-list:l0 level1 =
lfo7;tab-stops:
list 1.0in'><![if !supportLists]><font size=3D2 color=3Dblack =
face=3DSymbol><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Symbol;
color:black;mso-color-alt:windowtext'>=B7<font size=3D1 face=3D"Times =
New Roman"><span
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></font></span></font><![endif]><font color=3Dblack><span =
style=3D'color:
black'>Anyone who looks has a moral obligation to do something about =
this. Any
public official who looks has a legal obligation to take the appropriate =
steps.</span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><tt><font size=3D2 color=3Dblack =
face=3DArial><span
style=3D'font-size:10.0pt;color:black'>--</span></font></tt><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal =
style=3D'margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:=

auto;margin-left:1.0in'><font size=3D3 color=3Dblack face=3DArial><span
style=3D'font-size:12.0pt;color:black'>&nbsp;</span></font><font =
color=3Dblack><span
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dblack
face=3DArial><span style=3D'font-size:12.0pt;color:black'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dblack><span =
style=3D'color:black;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

</div>

</body>

</html>

------=_NextPart_000_0014_01C498B6.6E52B380--