"Method #2: Using a DRE only, enter any kind of odd entry. For example, enter 5 over votes in a sequence to "wake up' the CT. The voting machine rejects them all and then turns into a special, secret maintenance mode. At that point, commands will be directed to the CT at the end of Election Day when the election data memory cards are transferred, physically or electronically and vote counting begins.
"In a variation of method #2, embed a command for vote flipping in a voting machine or other fraud prior to the election. Have the activation react on the receipt of a code word or phrase like "All hail the king.' That activation triggers any vote flipping or other fraud desirable.
"Method #3: Use a power line communication and chips to transmit anything you want to a compromised central tabulator. Again, this alleviates the need for an Internet connection to the CT." Francois, October 30, 2012
Between private firms operating in secret, one a foreign firm, and demonstrated vulnerabilities, there are reasons for serious concern. These elections belong to us but our officials are unable to determine the accuracy, fairness, and security of the process.
A Second Look at Explanations for the Amazing Anomaly
The research group's conjecture is that central tabulators are the locus of the amazing anomaly for Romney in the 2012 primaries. The comparison of no anomaly results in Wisconsin no-tabulator counties is convincing evidence. Data recently acquired by Fran????ois et al. replicates the presence of the anomaly in the Wisconsin statewide count. Furthermore, it seems to indicate that partial or full use of paper ballots predicts an anomaly-free result. Further work on this just-received analysis will be forthcoming.
In addition to the suspected role of county-based central tabulators, there are other factors that lead to unexplainable election results.
First and foremost is the absence of open elections with every step of the process available to citizens for examination and evaluation. Watching the vote count is guaranteed in many state constitutions but it is rarely if ever offered. The ability to watch elections is denied outright by proprietary software and hardware held behind a corporate firewall of "intellectual property." Even with that restriction, citizens have to right to be present at vote taking and counting. That is often a struggle and always incomplete when electronic voting and tabulation are involved.
The fundamental cause of the suspected amazing anomaly and any of the other forms of election fraud is a fundamental disregard of the rights of citizens to vote and know that their vote counted.
Ironically, the politicians (supported by regulators and academic consultants) who make decisions about election systems are the very same people who are elected again and again by these flawed approaches, software, and equipment. Our public elected and appointed officials are the ultimate virus in the electoral system. It needs a good cleaning.
END
This article may be reproduced with attribution of authorship and a link to this article.
Very special thanks to Jill Hayroot for her contributions.
Research group articles on the amazing anomaly:
Primary Election 2012 Results: Amazing Statistical Anomalies, August 13, 2012
2008/2012 Election Anomalies, Results, Analysis and Concerns, September 2012
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).