%s1 / %s2
 
NEDERLANDS  |  ENGLISH
  • economy
  • iran
  • e-voting
  • 9/11
  • media
  • top stories
  • read
  • news archive
  • by deepjournal
10 November 2002  |     mail this article   |     print   |   
This article is part of the series: E-voting
1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16 - 17 ]
Stemfraude Verkiezingen VS 2000 - deel 8

Door Daan de Wit
De beste dieven zijn bescheiden. Steeds een klein beetje stelen, valt niet zo snel op. Ze vallen meestal door de mand als ze te inhalig worden. In Florida werden ze te inhalig. In vorige delen van onze serie over het stelen van de verkiezingen door W. Bush hebben we dat al verteld. In dit deel (en in het vorige en in volgende delen) komen we met aanwijzingen dat in Amerikaanse verkiezingen stelselmatig wordt gefaudeerd.


Fraude door gebruik computers
De belangen bij verkiezingen zijn gigantisch. Met die gedachte in het achterhoofd vraagt Philip M. O’Halloran in 1996: 'Could such an illegal scheme [om de stemcomputers te manipuleren] work on a national scale? In a rare major media treatment of this taboo subject on election eve in 1988, CBS Evening News anchor Dan Rather asked [computer expert] Howard Strauss about the possibility of computer vote-rigging:
Rather: Realistically, could the fix be put on a national election?
Howard Strauss: Get me a job with the company that writes the software for this program. Then I’d have access to one third of the votes. Is that enough to fix a general election? [...] Strauss summed up the unverifiable nature of the system: "When it comes to computerized elections, there are no safeguards. It’s not a door without locks, it’s a house without windows". O'Halloran citeert Ronnie Dugger, schrijver van een 32 pagina's lang artikel in The New Yorker van 7 november 1988 genaamd Annals of Democracy – Counting Votes: '"All the computer experts I have spoken with agreed that no computer program can be made completely secure against fraud."

Voorbeelden van fraude
'Critics say "where’s the beef?" Have any of these computer programs ever been shown to malfunction? Saltman’s 1988 report cited an extensive series of tests of the computer counting systems used in Illinois from 1983-87 which tested tens of thousands of ballots instead of the usual three or four dozen used in most pre-election tests. In the Illinois test series, it was discovered that significant errors in the computers’ basic counting instructions were found in twenty percent of the tests.'

O'Halloran citeert wederom uit het New Yorker-artikel: '"[Computer expert Wayne] Nunn, with one punch card, added ten thousand votes to the total of one of the candidates in a mock race for president". [...] Nunn subsequently gave a deposition under cross-examination and revealed seven ways in which the system could be deliberately caused to miscount votes, including by manipulation of the toggle switch on the front of the machine to alter vote totals and by inserting a set of secret Trojan Horse commands into the source-code software as described earlier.'

Uitgebreid gaat O'Halloran in op de zaak die Jim Condit in 1979 aanspande omdat hij zich door fraude benadeeld voelde in een lokale verkiezing die hij had verloren. Hij werd gebeld door Leonard Gates van telefoonbedrijf Cincinnati Bell die hem bekende dat ondermeer hij apparatuur had geplaatst waardoor de stemmachines konden worden beïnvloed. In 1987 schreef de Cincinnati Post uitgebreid over de zaak. Onder ede verklaarde Gates dat 'a security supervisor for the telephone company told him in 1979 that the firm had obtained a computer program through the FBI that gave it access to the county computer used to count votes.' Een andere getuige in de zaak, was Robert Strunk. 'Strunk testified: Because the RCC computer system has many terminals attached to it, the vote counting system is open to alteration by parties unseen and unknown to any observers. These terminals are both local (usually within the same building) and remote accessed by modem over both private lines and the switched network [...].' Slachtoffer Condit is overigens niet te stoppen, getuige zijn Jim Condit for Congress-website. Hij is tevens de man achter de site VoteFraud. Hij pleit voor het gebruik van papieren stembiljetten om computerfraude tegen te gaan.


Modems in stemmachines
'On hearing an unconfirmed report in Michigan of a vendor representative in this month’s [het artikel van O'Halloran stamt uit november 1996] election re-booting a computer that had "crashed" by holding a cell phone up to it, your editor popped the question to Jeff Ryan, a BRC spokesman in Chicago: Could the counting computers be accessed remotely by cell phone or other device? His previously cordial tone instantly changed to a rude, insulting one. [...].' BRC staat voor Business Records Corporation. Dat bedrijf is overgegaan in Election Systems & Software. Maakt ESS tegenwoording nog gebruik van modems? Jazeker, getuige dit PDF-file of deze foto met een kleurige grafische weergave van hoe het systeem werkt. 'Relevance [het periodiek waarvoor O'Halloran dit artikel schreef] then asked Penelope Bonsall [directeur] of the Federal Elections Commission whether dangers to voting integrity could be posed by the modems in the vote-counting computers. She paused then responded: "There could potentially be a problem with that."' Stel dat ESS ondanks al zijn mogelijkheden om ongezien te knoeien met de stemmen te goedertrouw is. Stel dat het bedrijf niet werkt voor mensen/organisaties die opdracht geven om de uitslagen te vervalsen, zou dan een hacker van buitenaf kunnen inbreken? '"It’s certainly theoretically possible, but it has never happened, as far as we know"', is de reactie die O'Halloran optekent uit de mond van P.J. Lyon, een van de makers van de ultra-geheime software van wat toen nog BRC was.


In ESS we trust
'To paraphrase Churchill: Never in the field of human politics have so many votes been entrusted by so many to so few.' ESS haakt daarop in met een op de eigen site geplaatst artikel over het bedrijf: '[... ESS'] machines are counting about half the ballots cast today in the United States. [...] Election Systems & Software, the largest U.S. provider of voting equipment. [...] When the federal government said after the 2000 election that it planned to reform elections and to pay for it, local and state spending on voting equipment froze nearly everywhere. Sales were "awful" last year for ES&S, Limas said, and the company's two largest competitors were put up for sale. Global Elections Systems of McKinney, Texas, was purchased by Diebold, the Ohio-based ATM maker. Sequoia Election Systems of Oakland, Calif., was bought by De La Rue of Great Britain. [...] President Bush signed federal legislation last week that provided $3.86 billion over the next four years for states to upgrade election equipment.' Ondanks deze upgrades en de daarmee gepaarde 'vooruitgang', is de bedrijfskreet van ESS dubieus te noemen: 'Better elections every day'. Wie zich nu terecht afvraagt hoe het dan gisteren was, hoeft alleen maar voorgaande te lezen. Wie wil weten hoe het morgen is, leest verder.


Stem op techniek
Ondanks (?) alle fantastische mogelijkheden tot fraude zal het gebruikmaken van gecomputeriseerde stemmachines die via modems of zonder draadje hun gegevens doorzenden alleen maar toenemen. '[Doug Lewis, directeur van het Election Center] estimated that 18 percent of the nation's voting jurisdictions are using the latest in electronic voting machines today. In six years, the total should be closer to 75 percent or 80 percent, he said. [...] Limas [van ESS] said 2003 should be a good year for the voting-machine industry as jurisdictions make buying decisions. ES&S is setting record sales and earnings this year, he said. ES&S declined [geheel in stijl] to disclose specific financial details.'
Ook zeven jaar gelden waren er al stemmachines die geen papier nodig hadden. Susan Bernacker, die we al kennen uit de vorige DeepJournal in deze serie (waaruit bleek dat zij als kandidaat heeft verloren door frauduleuze stemmachines) komen we ook tegen bij O'Halloran: 'She cites another female candidate in the Orleans Parish who got 33% of the vote in every precinct. Bernecker noted that the candidate also contested her election, but the technical expert she hired wasn’t allowed to examine the machines. She states that the two parishes were the only ones in the state that used Sequoia Pacific’s direct-record computers.' Degene die het artikel van O'Halloran op het net heeft gezet, schrijft tussen diens regels: 'Direct-record voting machines or DREs are the newest and most popular in the industry, but they are viewed by many to be the systems with the most potential for fraud, because there is no paper audit trail.'

____________________________________________________________________________

DeepJournal
Sign up for the free mailing list.
12 September 2013  |  
Why is Syria under attack? - Part 4
When you peek below the surface, it becomes clear that Syria is under attack due to the interests of the parties involved. ‘Syria’ is about power, money, influence and energy.
10 September 2013  |  
Why is Syria under attack? - 3
8 September 2013  |  
Why is Syria under attack? - Part 2
In the event of major military conflicts that risk considerable humanitarian and economic consequences, it is useful to examine the interests of all parties involved as well as the role that the media plays in reporting the events.
7 September 2013  |  
Why is Syria under attack? - Part 1
On the surface it’s straightforward: the U.S. wants to liberate Syria from a brutal dictator who is attacking his own people with poison gas. But beneath the surface there is something very different going on.
28 August 2012
Daan de Wit (DeepJournal) interviewt Webster Tarpley op het Magneetfestival
Het Magneetfestival gaat de diepte in met vier interviews. Daan de Wit interviewt Webster Tarpley, Albert Spits, en Mike Donkers.
Contact - About - Donate - RSS Feeds - Copyright © 2006 DeepJournal, All rights reserved