8/30/2004

Bev Harris on Diebold's central tabulators: By entering a 2-digit code in a hidden location, a second set of votes is created. This set of votes can be changed, so that it no longer matches the correct votes. The voting system will then read the totals from the bogus vote set. It takes only seconds to change the votes, and to date not a single location in the U.S. has implemented security measures to fully mitigate the risks. This program is not 'stupidity' or sloppiness. It was designed and tested over a series of a dozen version adjustments. Whether you vote absentee, on touch-screens, or on paper ballot (fill in the bubble) optical scan machines, all votes are ultimately brought to the 'mother ship,' the central tabulator at the county which adds them all up and creates the results report. These systems are used in over 30 states and each counts up to two million votes at once. The central tabulator is far more vulnerable than the touch screen terminals. Think about it: If you were going to tamper with an election, would you rather tamper with 4,500 individual voting machines, or with just one machine, the central tabulator which receives votes from all the machines? Of course, the central tabulator is the most desirable target.

0 Comments:

Post a Comment

<< Home