Add this Page to Facebook!   Submit to Twitter   Submit to Reddit   Submit to Stumble Upon   Pin It!   Fark It!   Tell A Friend  
Printer Friendly Page Save As Favorite Save As Favorite View Article Stats
4 comments

OpEdNews Op Eds

Princeton University Reveals How the GOP Steals Election

By (about the author)     Permalink       (Page 1 of 2 pages)
Related Topic(s): ; ; ; ; ; ; ; ; ; ; (more...) ; ; ; ; , Add Tags  (less...) Add to My Group(s)

View Ratings | Rate It


opednews.com

Unless something is done, the GOP will steal the next election as well. Unless something is done, this series of primaries means absolutely nothing. The fix is undoubtedly in. Unless something is done, the GOP will walk away with another stolen election, another GOP nincompoop will foist upon the nation his personal and vainglorious ambitions of empire. The Military/Industrial complex is licking its chops and theocrats are lining up to play Torquemada.

The following video was produced by Princeton University. It explains precisely how the votes are stolen and will be stolen again.

Princeton Study Exposes Diebold Flaws

Princeton tested an AccuVote-TS which it obtained from a private party. The experiements were designed to determine whether the machine could be hacked under "real election practices", realistic scenarios in the real world. Princeton found the machine vulnerable to a number of "extremely serious attacks" that "undermine undermine the accuracy and credibility of the vote counts it produces." In other words, DieBold machines can be hacked and most have been.

Princeton points out that computer specialists are skeptical of Direct Recording Machines (DRE), essentially general purpose machines running specialized election software. The biggest flaw, according to Princeton, is that DREs are dependent upon the "correct and secure operation of complex software programs" In the real word, that simply does not happen. Ominously, DRE failures most likely go undetected.
Main Findings The main findings of our study are:
  1. Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss. We have constructed demonstration software that carries out this vote-stealing attack.

  2. Anyone who has physical access to a voting machine, or to a memory card that will later be inserted into a machine, can install said malicious software using a simple method that takes as little as one minute. In practice, poll workers and others often have unsupervised access to the machines.

  3. AccuVote-TS machines are susceptible to voting-machine viruses - computer viruses that can spread malicious software automatically and invisibly from machine to machine during normal pre-and post-election activity. We have constructed a demonstration virus that spreads in this way, installing our demonstration vote-stealing program on every machine it infects.

  4. While some of these problems can be eliminated by improving Diebold's software, others cannot be remedied without replacing the machines' hardware. Changes to election procedures would also be required to ensure security.

    ...

    Abstract This paper presents a fully independent security study of a Diebold AccuVote-TS voting machine, including its hardware and software. We obtained the machine from a private party. Analysis of the machine, in light of real election procedures, shows that it is vulnerable to extremely serious attacks. For example, an attacker who gets physical access to a machine or its removable memory card for as little as one minute could install malicious code; malicious code on a machine could steal votes undetectably, modifying all records, logs, and counters to be consistent with the fraudulent vote count it creates. An attacker could also create malicious code that spreads automatically and silently from machine to machine during normal election activities - a voting-machine virus. We have constructed working demonstrations of these attacks in our lab. Mitigating these threats will require changes to the voting machine's hardware and software and the adoption of more rigorous election procedures.

    --Ariel J. Feldman, J. Alex Halderman, and Edward W. Felten,Security Analysis of the Diebold AccuVote-TS Voting Machine

See also: If your money was in a bank which had the safe guards of a "voting machine", you would be dead broke in a week!

Exit Polls: Obama Won New Hampshire Corporations control America's elections with secrecy and criminal fraud. Your vote means absolutely nothing! American Democracy is dead! It's nothing less than an insidious corporate revolution, an insidious subversion by corporatist vote snatchers. In less tolerant times, such culprits might hang. Perhaps, they should today.

Once again there is an "unexplainable" and a highly improbable descrepancy between exit polling and balloting. According to New Hampshire exit polls, Barack Obama won the New Hampshire primary 39% to 35%. In every other count, the exit polls have been spot on! Once again, questions arise about the credibility of Diebold voting machine, indeed, the credibility of the electorial process itself.

Here are the exit poll results at 8:01 PM when the polls closed and here is a chart with the final tabulation.

With voting over in New Hampshire, the big network exit poll is out and according to Fox News it shows:

Democratic candidates:

Obama 39%
Clinton 34%
Edwards 18%

Republican candidates:

Next Page  1  |  2

 

http://existentialistcowboy.blogspot.com/

Len Hart is a Houston based film/video producer specializing in shorts and full-length documentaries. He is a former major market and network correspondent; credits include CBS, ABC-TV and UPI. He maintains the progressive blog: more...)
 
Add this Page to Facebook!   Submit to Twitter   Submit to Reddit   Submit to Stumble Upon   Pin It!   Fark It!   Tell A Friend
The views expressed in this article are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.

Writers Guidelines

Contact Author Contact Editor View Authors' Articles

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

High Treason: 'Pentagon Lied to the 911 Commission' ; Bush's Theory Falls Apart

Assassinations, White House Child Prostitution, Cover-ups, and Terrorism

How Progressives Can Take Back America

The Movement to Try George W. Bush et al for War Crimes

How the GOP Turned the US Into a Hideous Police State

Bush Proves Karl Marx Right About 'Capitalism'

Comments

The time limit for entering new comments on this article has expired.

This limit can be removed. Our paid membership program is designed to give you many benefits, such as removing this time limit. To learn more, please click here.

Comments: Expand   Shrink   Hide  
4 people are discussing this page, with 4 comments
To view all comments:
Expand Comments
(Or you can set your preferences to show all comments, always)

I am bowled over by how technology can make o... by John Sanchez Jr. on Saturday, Jan 12, 2008 at 8:46:58 AM
McCain stole NH and he was racist in the SC debate... by Lorring II on Saturday, Jan 12, 2008 at 10:44:39 AM
IF they gave us these machines to vote on in Can... by dave stanley on Sunday, Jan 13, 2008 at 10:13:17 AM
These Republican Election Crooks think t... by Dom Jermano on Monday, Jan 14, 2008 at 4:51:47 AM