0
quade

Is it just a conspiracy theory or is it actually possible?

Recommended Posts

I'm not saying this is the way it went down, but when you first hear the conspiracy you think, "nawww, it's impossible". However . . .

First look at this.

http://news.yahoo.com/electionresults

Then, consider that the ONE state that could have flipped the entire election is Ohio with it's 20 electoral votes.

Then . . . take a look at this article from the Cleveland Plain Dealer from August 28, 2003.

http://www.commondreams.org/headlines03/0828-08.htm

Now . . . read this from November 11, 2004

http://www.msnbc.msn.com/id/6418513/

So, lemme ask ya . . . is it a wacko conspiracy theory or . . . is it -just- possible that somehow, somewhere, somebody fooled around with the system just enough to give Ohio to GWB and therefore the rest of the country as well?

Lemme take it one step further . . .

Suppose you where the guy in charge of the voting machines and found out there had been something fishy going on . . . would you say anything?
quade -
The World's Most Boring Skydiver

Share this post


Link to post
Share on other sites
I'm not saying anything - one way or the other but you aren't a RISKS Digest reader are you:)
Diebold seem to have little problem in getting "mentioned" have a search of comp.risks for Diebold and have a read of what turns up.

The complete RISKS archives can be found here.

Ooroo
Mark F...

Share this post


Link to post
Share on other sites
I understand that the manufacturers of the voting machines have categorically ststed that tampering would be completely impossible.:)
Unfortunately I can't find the exact quote from "The Halliburton (voting-Machine) Mfg. Co." of London, Moscow & Kabul.:D:ph34r: But I'm sure that's what was said.... Something like: "Our voting machines are engineered to be 100% reliable and are guaranteed to give the proper result."

So there you are.:S

Seriously, without the benefit of hindsight, how would you REALLY know which voting machines to rig?

Mike.

Taking the piss out of the FrenchAmericans since before it was fashionable.

Prenait la pisse hors du FrançaisCanadiens méridionaux puisqu'avant lui à la mode.

Share this post


Link to post
Share on other sites
Quote


Seriously, without the benefit of hindsight, how would you REALLY know which voting machines to rig?



Well, if I was going to rig only certain machines (presumably to limit the risk of getting caught), I'd pick the ones in the states with the highest number of electoral votes that were "close". It doesn't make any sense to rig a state like Utah where you only have 5 electoral votes and it's a landslide state anyway.

So, you pick a state with a good number of votes that's close and you only rig enough machines to give your candidate a couple of percentage points advantage. A few votes here and a few votes there (maybe just a few on each machine) probably aren't going to get noticed.

And again, I'm not saying this is what actually happened, but it certainly seems like it could -- especially when there's no paper trail to check.
quade -
The World's Most Boring Skydiver

Share this post


Link to post
Share on other sites
Do you really think just one person could screw with enough places to really affect even one significant state?

Without witnesses?

Without tracks?

etc, etc, etc
witty subliminal message
Guard your honor, let your reputation fall where it will, and outlast the bastards.
1*

Share this post


Link to post
Share on other sites
Quote


So, lemme ask ya . . . is it a wacko conspiracy theory or . . . is it -just- possible that somehow, somewhere, somebody fooled around with the system just enough to give Ohio to GWB and therefore the rest of the country as well?



It's really hard to know what "just enough" is in advance. And when you pick a value that is certainly enough, it stands out.

Simpler explanation - he lost a close race - makes more sense.

Mind you, I think touch screens should be required to spit out a confirmation receipt that indicates the votes, at least for the representative races. Can be coded if they need to compress the information.

Share this post


Link to post
Share on other sites
On a computer? Yes. You can hide anything you want within a computer - it can be programmed anywhere you want (on a software or hardware level)within the product and you can also program it to erase any history of wrong doing. Computers do not make mistakes, the people that program them do.

I found it interesting that many of these machines produced no proof of the votes cast.

I have yet to see a neutral party fully exam any of the eVoting machines out there. Most of the tests were done either by the company that made them or the local voting officials in test runs. There are more standards/laws and examinations on electronic slot machines than there are for voting machines. :S

I've beta tested a bunch of different software over the years. I'd love to get my hands on one of these machines and see how easy it would be to produce irregularities in vote counts.

Long before this election came along I mentioned the issues I had with the Diebold company and how ODell had promised to bring votes to Bush. I thought it was a conflict of interests. It wasn't until early 2004 that ODell promised he would stop campaigning for GW when it was mentioned he could lose the contract to provide the machines.

There have been enough stories on voting machine errors to issue an examination.

I'm sure some Bush supporter will come in and say "get over it" or some bs like that. Whatever. If you are that confident that nothing was wrong, then you should push even harder than anyone else to make sure these machines were not doing something illegal.
_________________________________________
you can burn the land and boil the sea, but you can't take the sky from me....
I WILL fly again.....

Share this post


Link to post
Share on other sites
Quote

loop
If $Vote = "Bush"
$Bush = $Bush+1;
Endif
If $Vote = Kerry
$Kerry = $Kerry+1;
If $Date=$ElectionDate
$Bush = $Bush+1;
Endif
Endif
end loop

We would need some serious reverse engineering to detect something like this.



haha! Does it make me a geek if a programming joke made me laugh?

Yup, a small sub-routine that would replace every third vote (for example) could be very easy to hide in thousands of lines of code. But I'm all for a third party neutral line-by-line examination of the code to prove me wrong.
_________________________________________
you can burn the land and boil the sea, but you can't take the sky from me....
I WILL fly again.....

Share this post


Link to post
Share on other sites
Quote


I have yet to see a neutral party fully exam any of the eVoting machines out there. Most of the tests were done either by the company that made them or the local voting officials in test runs. There are more standards/laws and examinations on electronic slot machines than there are for voting machines. :S



People are examing the data output, but it's not a 2 week job. Obvious irregularities would be in the total votes cast, and then a big divergence of the vote from party registrations, or from votes for the other offices on the ballot.

Share this post


Link to post
Share on other sites
Quote

Do you really think just one person could screw with enough places to really affect even one significant state?

Without witnesses?

Without tracks?

etc, etc, etc



Many many years ago, when the Apple II was King of the Hill, Apple Logo was the latest greatest programming language (!!) for schoolkids to learn on, one Apple programmer inserted a political message in the code (don't remember what it was now, something like "Nuclear Disarmament Now!"). It went totally undetected until a hacker who went by the handle of "Long John Silver" was trying to break the copy protection and noticed it, and wrote it up for BYTE magazine, along with a Logo program to print out the message.

Writing here as a reformed hacker, I can assure you that this is not hearsay.:)
So yes, I do think a single programmer can do stuff like this.
...

The only sure way to survive a canopy collision is not to have one.

Share this post


Link to post
Share on other sites
Quote

People are examing the data output, but it's not a 2 week job.

What good is it to exam the output if the process to produce it is flawed or corrupted?

Quote

Obvious irregularities would be in the total votes cast, and then a big divergence of the vote from party registrations, or from votes for the other offices on the ballot.



Yes, obvious irregularities would stick out. But that process produces an error margin, maybe 3-5%. A smart coder could use that error margin to produce enough votes across an entire state to generate quite a few extra votes. Now the real question is - could that be done in such a way that it couldn't be traced?
_________________________________________
you can burn the land and boil the sea, but you can't take the sky from me....
I WILL fly again.....

Share this post


Link to post
Share on other sites
Quote

So yes, I do think a single programmer can do stuff like this.



Indeed, any new system or software that gets released has hackers picking it apart within minutes in most cases. That's why if there was one who picked it apart, there would be 20 right behind him/her doing the same thing. Back when the Apple II was king, hackers were an outcast-type-anomoly. That's not really the case anymore.
So I try and I scream and I beg and I sigh
Just to prove I'm alive, and it's alright
'Cause tonight there's a way I'll make light of my treacherous life
Make light!

Share this post


Link to post
Share on other sites
Quote


Yes, obvious irregularities would stick out. But that process produces an error margin, maybe 3-5%. A smart coder could use that error margin to produce enough votes across an entire state to generate quite a few extra votes. Now the real question is - could that be done in such a way that it couldn't be traced?



With great difficulty. It's very difficult to throw in enough errors to help you, but not show up. The one plus is the lack of a paper trail. If you do it properly, no one even suspects. But if the manipulation is done on a machine by machine basis, no way can you alter enough of them without being caught.

It's not like the code has the variables "Bush" and "Kerry" to make things simple. And many states randomize the ordering of all the candidates, so you don't have a fixed slot.

The concern is legitimate, but in application to this election smacks more of sour grapes. We've had frequent protests in San Francisco since the election. It's a bit unsettling when you see signs suggesting that 51% of the people are wrong. This is how democracy works. Same to talk about suceeding from the union.

Share this post


Link to post
Share on other sites
Quote

With great difficulty. It's very difficult to throw in enough errors to help you, but not show up. The one plus is the lack of a paper trail. If you do it properly, no one even suspects. But if the manipulation is done on a machine by machine basis, no way can you alter enough of them without being caught.

If all of the machines were affected by someone within Diebold it would be easy enough to get access to all machines since they would be coding the OS it runs on. A typical hacker working from outside the company would certainly have a difficult time making any impact on a larger scale.

Quote

It's not like the code has the variables "Bush" and "Kerry" to make things simple. And many states randomize the ordering of all the candidates, so you don't have a fixed slot.

It's hard to say what variables the manufacture used at the plant. Most machines (from my understanding) arrived onsite to the voting judges ready to be used.

Quote

The concern is legitimate, but in application to this election smacks more of sour grapes.

To a certain extent, I agree with that.

Quote

It's a bit unsettling when you see signs suggesting that 51% of the people are wrong. This is how democracy works. Same to talk about suceeding from the union.



Attacking those that voted for Bush is the wrong way to go. Half of this population is fed up and has very little trust in Bush as a leader. Many of us feel, with good reasons, that he is a cheat, liar and dangerous to this country. Also, we do feel that he did manipulate both of his elections. Transference of that anger/frustration comes out in many ways and it sounds like those folks out there have wrongly pointed their anger at those that voted for Bush.
_________________________________________
you can burn the land and boil the sea, but you can't take the sky from me....
I WILL fly again.....

Share this post


Link to post
Share on other sites
I dont buy it.
Corporate directors are completely corruptable, for sure, but corporate directors are not the one's writing the programming code. A project of this size would involve more than a handful of geeky techies at the bottom of the corporate ladder who write and test the code, assemble the machines and perfom QA, etc.
It's extremely difficult, in my opinion, to contain a scam as big as this amongst several low-level employees. Small "salary bonuses" would not be enough to make them conspire to a federal crime and large bonuses would raise too many flags elsewhere in the company.


-
No 'mericans were harmed during the making of this post.

Share this post


Link to post
Share on other sites
Quote

Quote

So yes, I do think a single programmer can do stuff like this.



Indeed, any new system or software that gets released has hackers picking it apart within minutes in most cases. That's why if there was one who picked it apart, there would be 20 right behind him/her doing the same thing. Back when the Apple II was king, hackers were an outcast-type-anomoly. That's not really the case anymore.



Hacking has gotten harder over the years due the increasing complexity of the hardware and software.
_________________________________________
you can burn the land and boil the sea, but you can't take the sky from me....
I WILL fly again.....

Share this post


Link to post
Share on other sites
Speaking as one thats involved in computer security as his job, no hacker has been able to get access to the voting machines to see what they are really made of. The machines were only allowed out of storage for election day and to have the voting data keyed into them via a flash upgrade. The rest of the time they are stored locked away.

The same electronic voting machines turned up large republican votes in at least 7 heavly registered democratic districts in FL also.

I used to sneak in seperate subroutines in my code to do things like tell me how many times did people change their choices or to change their answers if they took too long in answering things.:ph34r:
Yesterday is history
And tomorrow is a mystery

Parachutemanuals.com

Share this post


Link to post
Share on other sites
Quote

Back when the Apple II was king, hackers were an outcast-type-anomoly. That's not really the case anymore.



Sure it is, when you're talking about real hackers, anyway. All the idiots out there now with hAk3rz T00Lz, phreakz and crackz they download off the internet don't count. Whoopie, they can hack completely unsecured software and systems.

Show me a guy with a laptop running a packet sniffer and who has no clue why in the hell anyone would want a GUI, and that's a hacker.

Share this post


Link to post
Share on other sites
Quote


Can we just make that a sticky?



No and here's why . . . that's not actually what this thread is about.

Right up until this point we've been having a fairly interesting and somewhat intelligent conversation on the subject, but if you reduce everything to "Kerry lost, get over it." -- how lame is that?
quade -
The World's Most Boring Skydiver

Share this post


Link to post
Share on other sites
Quote

Quote


Can we just make that a sticky?



No and here's why . . . that's not actually what this thread is about.

Right up until this point we've been having a fairly interesting and somewhat intelligent conversation on the subject, but if you reduce everything to "Kerry lost, get over it." -- how lame is that?



We've had several discussions that have basically come down to "Bush cheated" - how lame is THAT?
Mike
I love you, Shannon and Jim.
POPS 9708 , SCR 14706

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

0