Educational CyberPlayGround ®☰ Menu

Election Voter Education for Americans

We hang the petty thieves and appoint the great ones to public office. ~ Aesop

PAGE 2 Video shows Fraudsters explain in Court

Can the 2016 Election Be Hacked or Disrupted? Congress Listens to Tech Experts - or doesn't listen!

Keep voting systems disconnected

Despite what your local election officials may tell you, you can’t trust the Internet with your vote. MIT Tech Review Keep voting systems disconnected
This election year we’ve seen foreign hackers infiltrate the Democratic National Committee’s e-mail system as well as voter databases in Arizona and Illinois. These attacks have reinforced what political scientists and technical experts alike have been saying for more than a decade: public elections should stay offline. It’s not yet feasible to build a secure and truly democratic Internet-connected voting system.
Vendors like the Spanish company Scytl, which supplied Alaska’s system, and Southern California-based Everyone Counts keep marketing these systems to election boards against the advice of security experts. And they haven’t opened their systems to public security testing.

A very good outline of the digital voting problem in its entirety was given by Bill Arbaugh in a brief but important piece in IEEE Computer:

Where the #news gets the news of #Hillary #Clinton #Falling down in #NY #Video #9/11

Campaign Finance Violations Leaked documents reveal secretive influence of corporate cash on politics published in their entirety. The cache consists of a stack of evidence gathered by official prosecutors in Wisconsin who were conducting what was called a “John Doe investigation” into suspected campaign finance violations by Walker's campaign and its network. The Guardian’s documents – consisting of email exchanges between Walker, his advisers, Republican leaders and major donors who included none other than Trump himself, together with court filings held under seal – amount to a rich chronicle of the electoral health of the United States in the wake of Citizens United.
For more than 60 years, it was an explicit federal rule that profit-making corporations were not allowed to intervene directly in elections. Then along came Citizens United v FEC, the US supreme court's highly contentious 2010 decision. The ruling gave corporations – and by extension labor unions - the same first amendment rights to free political speech as any human being. It opened the floodgates for corporate cash to pour into elections.
Scott Walker Put Wisconsin Up for Sale And,now we know who bought it.
We pause here for a brief public service announcement from Supreme Court Justice Anthony Kennedy: "Independent expenditures do not lead to, or create the appearance of, quid pro quo corruption." This has been a public-service announcement on behalf of Americans Abroad In La-La Land. We now continue with our regularly scheduled programming.

ProPublica created Election Databot that makes it easier for journalists, researchers and citizens to quickly find newsworthy information about the presidential race and congressional campaigns in their states. It collects huge amounts of data and reports the most interesting details, in real time — details about campaign finance filings, congressional votes, polls and Google Trends data, among other things. How to use the Election DataBot

The system really is rigged: Why “winner-take-all” voting is killing our democracy
The Electoral College makes it virtually impossible for a third party to challenge the system. In almost every state, the candidate with the majority of votes wins all of the Electoral College votes. So voting for a third party can really skew the outcome. Even worse, it usually skews it away from your likely second-choice candidate toward the person you fear winning the most. . In an interview with Green Party candidate Jill Stein for Redacted Tonight VIP, Lee Camp asked Stein how voters could justify “wasting” a vote on her. Stein said the answer was simple: change the system from winner take all to ranked choice voting. As explains, ranked choice voting makes democracy more fair and functional.

The Political Industrial Complex: Government of, by and for… Consultants! Politics is a battlefield for a new breed of war profiteer.

Clinton’s pledge to forgive student debt of entrepreneurs, not workers, will benefit elite Hillary's "Initiative on Technology & Innovation" reflects her Reaganite, neoliberal world view. One student loan debtor recently got a sense of how the gov't views students who come from low-income backgrounds - Student Debtors need to be bailed out. The DNC PAC committee of super delegates drafted the TTP Pacific Rim trade pact that Clinton endorsed but because of Bernie now rejects shows that the DNC wants TPP no matter what. Democrats on Friday voted down an amendment to the party's platform that would have opposed the Trans-Pacific Partnership trade deal.

Debbie Wasserman Schultz resigned as DNC chair on the eve of July's Democratic National Convention after WikiLeaks published a trove of hacked DNC emails that showed party officials favoring eventual nominee Hillary Clinton over Senator Bernie Sanders during the party's nominating contests.

Did the Press take down Bernie Sanders?
In his essential book, Out of Order — still, 23 years after publication, the best analysis of election coverage — Harvard political scientist Thomas Patterson said there are only four press narratives in an election campaign: “a candidate is leading, or trailing, or gaining ground or losing ground.” And: “The press dumps on losers and those who are losing support, criticizes front-runners and praises those who catch fire — at least as long as the bandwagon lasts.”
This may be the first time that social media compelled the MSM to change its narrative — from losing candidate to gaining candidate, or what Patterson calls the “bandwagon effect.” In turn, Sanders’ crowds were huge. His fundraising was large and notable for the number of small donations. And most of all, his poll numbers began rising.

The massive hacking of the confidential biometric files of voters stored in the Commission on Elections (Comelec) databank.

In a Facebook post before midnight Monday, March 28, 2016 a group calling itself LulzSec Pilipinas wrote, “A great lol to Commission on Elections, here’s your whoooooole database.” This appears to be the first major open leak of elections-related data by a hacker group in the Philippines.

Election Education and Fraud


Why the Democratic establishment fears Bernie Sanders
Money = Power! Clinton is doing more to boost the party's 2016 prospects than Sanders by a proportion of 26,000 to one. A fear that having Sanders as a nominee will decimate progressive candidates down the ballot — and leave Republicans in control of the House, and state capitals, for another decade or two. Clinton has raised more than $26 million for the Democratic National Committee and state Democratic parties so far this campaign. And Sanders? $1,000.
Obama was a disaster. Democrats are at their weakest position in state capitols in nearly a century; they have unified control of only 11 legislatures, while Republicans control 30 (31 if you include nominally nonpartisan Nebraska). Obama's decision to bypass the Democratic Party apparatus in favor of his own, parallel network, now known as Organizing for Action. Under the theory that Obama could directly rally supporters (and therefore didn't need to rely as much on party operatives or on congressional Democrats), this outgrowth of Obama's 2008 campaign apparatus competed with the party and wound up starving the party for funds.

Obama endorsed entrenched incumbent DWS 5 months before the primary because she is the pro-corporate Democratic Party establishment.

Democate Superdelegate PAC Insiders
They were created in the 70's to get rid of grass roots candidates a corrupt process designed to let insiders and lobbyists overturn the will of voters.
No one elected these bums, drunkards, loosers - they can be anybody willing to protect the party of money.

At least 67 lobbyists who will attend the convention as superdelegates. 21 governors, 40 senators and 193 representatives, which only makes up about a third of the superdelegates. The remaining 463 convention delegates are establishment insiders that will cast votes at the Democratic National Convention for whomever they want, regardless of primary and caucus outcomes. In fact, there are 437 delegates in the DNC member category and when you remove elected officials from the superdelegate pool, at least one in seven of the rest are former or current lobbyists registered on the federal and state level, according to lobbing disclosure records.

Unelected, Clinton-supporting superdelegates that simultaneously work in the lobbying industry to steal your votes away!

Superdelegates ripping off Sanders supporters

Why the Electoral College Ruins Democracy

The U.S. Electoral College and Spatial Biases in Voter Power: The United States does not provide for direct election of its chief executive but utilizes the Electoral College to represent voter choices. Central to this institution is the “winner-take-all” model by which electoral votes in all states but two are awarded to the candidate who garners a plurality of that state's popular vote. As game theorists have long pointed out, this system introduces several biases in voter power that differentially reward or punish voters based on each state's population or electorate. This article offers a historical overview of the Electoral College and the geographic biases in voter power it introduces.
- All men and women are created equal, but their votes sure aren't. Members of the political establishment, called superdelegates, are going against the will of the voters in their own states to support Clinton over Sanders. Will of the people be damned, the superdelegates in Washington all said they are voting for Clinton. Clinton supporters are quick to say, “these are the rules the candidates agreed upon,” and maybe that’s true, but voters are being ripped off. We didn’t decide on these rules and these officials are clearly going against the will of the people in their own states to support the establishment candidate who arranged for their support long before this election began. Don’t say superdelegates aren’t determining this race. They are, and the practice should be abolished — immediately.

What's the difference between ignorance and apathy?
Who knows?
Who cares?

Why Rigging Elections Is Completely Legal - how political parties are able to predetermine election winners through a process called gerrymandering.

The true purpose of #VoterID
Voter ID law will help defeat Democrats in November. Rep. Glenn Grothman made the comment to the local NBC affiliate, in an interview at Ted Cruz’s primary victory party in Milwaukee. Grothman said, “And now we have photo ID — and I think photo ID is gonna make a little bit of a difference, as well.” (ISSUE THE LINE TO GET A STUDENT ID IS LONGER THAN THE LINE TO VOTE)

2016 In 15 states, new voting laws will be in place for the first time in the 2016 election. Meet the 94-Year-Old Civil-Rights Activist Rosanell Eaton Who Is Now Challenging North Carolina’s Voter-ID Law

Un-Democratic Party: DNC chair says superdelegates [are party insiders] ensure elites don’t have to run “against grassroots activists” Critics say the unelected superdelegate system is rigged. Debbie Wasserman Schultz basically admitted this is true. “Unpledged delegates exist really to make sure that party leaders and elected officials don’t have to be in a position where they are running against grassroots activists,” Wasserman Schultz calmly explained. Sanders could technically win the primary election, earning a majority of the 1,670 delegates determined by actual voting, but still lose the Democratic Party’s nomination, if Clinton gets most of the party’s 712 unelected unpledged delegates. Clinton’s campaign boasted that it had secured the endorsements of well over 500 superdelegates. Superdelegates are Democratic Party officials and elected officeholders have direct votes in the presidential nomination process. They're automatic delegates to the national convention, which will take place in Philadelphia in the summer of 2016. They can change their commitments at any time.

Ready PAC, formerly Ready for Hillary PAC, earned $202,892 by selling or renting supporters’ personal info.

#RULE 28 COIN TOSS @HillaryClinton steals the delegates



This caucus process is not meant to ELECT anyone but to give contestants an opportunity to display their leadership skills by showing people who can lead.

#Rule28, no one realizes the rule and the 6 coin-tosses means #BernieWon.

The Independent (UK): "The Sanders campaign challenged the results" in Ames 2-4, meaning they were going to "lose" a delegate. So: #Rule28.

Apply #Rule28 #BernieWon 701.49 to 693.57

Per CNN, Iowa Dem Chair says Bernie is behind by 4 delegates. If he applies #Rule28--as he is obligated to do--#BernieWon, 701.49 to 693.57.

#Rule28 is an Iowa Democratic Party rule designed to protect _voters_. The parties cannot agree to ignore it just because they feel like it.

"Imagine #Rule28 had been worded 'a coin shall be tossed to determine who WINS the delegate'--it'd be clear. So is this." Party rules call for a coin flip when support for candidates is even but a precinct has an odd number of delegates to award.

If this is correct, Bernie won Iowa 701-694. If what Clinton won was 6 county delegates (not at all likely) Bernie may _still_ have won.

  1. #*Rule28* reveals each "win" actually cost her a delegate
    - 6 Clinton coin-toss "wins" actually meant 6 more delegates for BERNIE.

Here is Iowa Dem #*RULE28* , proving #*BernieWon* . 6 Clinton coin-toss "wins" actually meant 6 more delegates for BERNIE. The rules read: 'Note: In a case where two or more preference groups are tied for the loss of a delegate, a coin shall be tossed to determine who loses the delegate.'

*The Des Moines Register reports that Clinton won coin tosses in at least six precincts.* The newspaper says party officials ordered coin flips in Ames, Newton, West Branch, Davenport and two in Des Moines. Iowa Democratic Party spokesman Sam Lau noted that the flips were to determine county convention delegates, which are only fractions of the state delegates awarded to candidates. Univision reporter Fernando Peinado, who was present at the precinct 70 caucus in Des Moines, tweeted a picture of what he said was a guide for Democratic precinct chairs showing rule 28, which contains the stipulation about tossing a coin to break ties.

USA Rigged Elections


America's Voting Fraud | Worst Machines
Hanging Chad Vote Fraud

HOW TO HACK AN ELECTION 2016 Andrés Sepúlveda RIGGED ELECTIONS throughout Latin America for almost a decade. He was dismantling what he says was a secret history of one of the dirtiest Latin American campaigns in recent memory. For decades, Latin American elections were rigged, not won, and the methods were pretty straightforward. For eight years, Sepúlveda, now 31, says he traveled the continent rigging major political campaigns. Usually, he says, he was on the payroll of Juan José Rendón, a Miami-based political consultant who’s been called the Karl Rove of Latin America.

From the real, unfiltered, violence laden past of Spartanburg, South Carolina testimony of whippings and torture from freed slaves in the county in the 1860s and 1870s. Atrocities that happened to freed African Americans at the hands of the Ku Klux Klan and other white supremacists during Reconstruction.


IT started with this, a plank adopted by the Democratic national convention of 1948: "The Democratic party commits itself to continuing efforts to eradicate all racial, religious, and economic discrimination." That was enough to bring the devil howling out of his hole, that foot-on-the-neck-of-the-black-man devil of the Jim Crow, hookworm, lynch-prone south – “the solid south” that reliably delivered its votes to the Democratic party every four years. Trump's Scottish roots.
Scots were influential in founding the Ku Klux Klan
, including the traditional Scottish symbol of the burning cross and the KKK's oath ceremony, which originated from a Highland custom.
Many of the "crackers" were Scots-Irish Protestants who had left Ireland in the 18th century.

The flash was the breakaway States’ Rights Democratic party, aka the Dixiecrats (motto: “segregation forever”), who recoiled from the regular Democrats’ spasm of conscience and put forward their own candidate for president, South Carolina governor Strom Thurmond. Thurmond campaigned on a platform that decried civil rights as “infamous and iniquitous”, “totalitarian” and an attempt by the federal government to impose “a police nation” on the land of the free. That fall, the Dixiecrats took four deep south states and 39 electoral votes from Harry Truman, a rippling of racist muscle that kept the Democratic party’s egalitarian impulse in check throughout the 1950s. Two architects of modern conservative politics: a young Richard Nixon congratulates Strom Thurmond as he is sworn in as a senator in 1955.

How to make racism suitable for prime time.
"dog-whistle politics, that coded language Lee Atwater was talking about." The Emerging Republican Majority by Nixon advisor Kevin Phillips, the Southern Strategy was a considered, premeditated, highly disciplined appeal to southern whites, and more generally to the deep-seated racism of America.
“Southern Strategy” Republican strategist Lee Atwater, by then an operative in the Reagan White House
You start out in 1954 by saying, ‘Nigger, nigger, nigger’. By 1968 you can’t say ‘nigger’ – that hurts you. Backfires. So you say stuff like, uh, forced busing, states’ rights and all that stuff. You’re getting so abstract now you’re talking about cutting taxes, and all these things you’re talking about are totally economic things and a byproduct of them is blacks get hurt worse than whites.

An "open" primary means the rules allow independents and republicans to vote not just democrates. Which means registered independents can walk in and vote for [Bernie Sanders] without needing to register as democrats. It also means, to whatever extent this phenomenon is taking place, republicans who want to trip up Hillary can walk in and vote for Bernie just to drag out the democratic primary further. Open primaries could be this easily hijacked by outsiders.

Trump explains what a Dictator is to the American Voter.


Donald's Father Fred Trump was arrested when anti-Catholic Ku Klux Klansmen attacked police in New York in 1927,

Stanley Leibowitz, the rental agent, talked to his boss, Fred C. Trump. “I asked him what to do and he says, ‘Take the application and put it in a drawer and leave it there,’” Mr. Leibowitz, now 88, recalled in an interview. It was late 1963 — just months before President Lyndon B. Johnson signed the landmark Civil Rights Act — and the tall, mustachioed Fred Trump was approaching the apex of his building career. He was about to complete the jewel in the crown of his middle-class housing empire: seven 23-story towers, called Trump Village, spread across nearly 40 acres in Coney Island.
The complaints of discrimination were not limited to New York. Mr. Cash was repeatedly rejected by the Trumps’ rental agent, according to court records and notes kept by Housing Opportunities Made Equal of Cincinnati, which sent in white testers posing as a young couple while he waited in the car. After the agent, Irving Wolper, offered the testers an apartment, they brought in Mr. Cash. Mr. Wolper grew furious, shoving them out of the office and calling the young female tester, Maggie Durham, a “nigger-lover,” according to court records. A former Trump superintendent named Thomas Miranda testified that multiple Trump Management employees had instructed him to attach a separate piece of paper with a big letter “C” on it — for “colored” — to any rental application filed by a black apartment-seeker.

2016 Woody Guthrie, 'Old Man Trump' and a real estate empire's racist foundations.
Woody Guthrie lived in Fred Trump’s Beach Haven apartment complex for two years. Guthrie’s most bitter writings clearly pit America’s national balladeer against the racist foundations of the Trump real estate empire..


5/28/14 Hack the Vote: The Perils of the Online Ballot Box
Hackers could manipulate enough votes to change the results of local and national elections. And a skilled hacker can do so without leaving any evidence.
Over 30 states and territories allow some form of Internet voting (such as by email or through a direct portal) for some classes of voters, including members of the military or absentees. Utah just passed a law allowing disabled voters to vote online; and Alaska allows anyone to cast their ballots online. And there were recent news reports that Democratic and Republican national committees are contemplating holding primaries and caucuses online. We estimate that over three million voters now are eligible to vote online in the U.S.
Estonia is the world leader in using online voting for its national elections. Its government has done a great deal to improve the security of the system, which is now used by up to 25% of voters. The country's "I-voting system" is touted by proponents of online voting in the U.S. to claim that secure Internet voting is possible. It isn't. Early in May an international team of independent security experts accredited by the Estonian government reported severe security vulnerabilities in that country's "I-voting system." Elections, the researchers found, "could be stolen, disrupted, or cast into disrepute." The team recommended that Estonia's online voting system "be immediately discontinued." One researcher, J. Alex Halderman of the University of Michigan, has said that "Estonia's Internet voting system blindly trusts the election servers and the voters' computers. Either of these would be an attractive target for state-level attackers, such as Russia." Another researcher, Harri Hursti from Finland, concluded, "With today's security technology, no country in the world is able to provide a secure Internet voting system."
NIST's report noted, "it is extremely difficult to protect against software attacks" on personal computers outside the control of election officials "that could violate ballot secrecy or integrity or steal a voter's authentication credentials." Second, "remote electronic voter authentication is a difficult problem." Third is the problem of "ensuring remote electronic voting systems are auditable," with "no current or proposed technologies offering a viable solution." <source>

4/2012 E-voting system awards election to wrong candidates in Florida village. Analysts warn that same Dominion Sequoia machines are used in nearly 300 U.S. municipalities.
Dominion Voting Inc.'s Sequoia Voting Systems device mistakenly awarded two Wellington Village Council seats to candidates who were found in a post-election audit to have lost their races. The results were officially changed last weekend after a court-sanctioned public hand count of the votes.

2012 Internet voting systems are inherently insecure and should not be allowed in the upcoming general elections. { 1 }
The insecurity and the inability to audit such voting practices are unacceptable, says Jefferson.David Jefferson, a computer scientist at Lawrence Livermore National Laboratories and chairman of the election watchdog group Verified Voting, called on election officials around the country to drop plans to allow an estimated 3.5 million voters to cast their ballots over the Internet in this year's general elections. Jefferson warned that the systems that enable such voting are far too insecure to be trusted and should be jettisoned altogether. Cryptographer and security guru Ron Rivest, who is the "R" in RSA, and Alex Halderman, an academic whose research on security vulnerabilities in e-voting systems prompted elections officials in Washington to drop plans to use an e-voting system in 2010. "There's a wave of interest across the country, mostly among election officials and one agency of the [Department of Defense], to offer Internet voting" to overseas citizens and members of the military, Jefferson said. "From a security point of view, it is an insane thing to do." A total of 33 states allow citizens to use the Internet to cast their ballots. In a majority of cases, those eligible to vote over the Internet receive their blank ballots over the Web, fill them in and submit their ballots via email as a PDF attachment. Some states, such as Arizona, have begun piloting projects that allow eligible voters to log in to a web portal, authenticate themselves and submit their ballots via the portal. Ballots sent via email, for instance, are transmitted in the clear without encryption. That means any entity, such as an ISP or a malicious hacker that sits between the voter and the county where the vote is being cast, can view, filter, substitute or modify the ballot, he said.


2011 - 20 million do not have a government issued photo ID.
Several states have passed a new law requiring individuals to show government-issued photo IDs to vote. The law's supporters say it will help deter voter fraud, while opponents argue it will make it difficult for minorities, students and the elderly to cast their ballots. Host Michel Martin discusses both arguments with long-time civil rights activist and former Presidential candidate Rev. Jesse Jackson, as well as Republican political strategist Ron Christie.


One of the most frightening examples Johnston has turned up is in one of the nation's most treasured franchises: the right to vote. He said he's found that most voting machines have almost no security to reveal tampering. Thus, he said, it's a fairly simple matter to tinker with the electronics while machines are in storage or being transported by the truckload. He has even demonstrated how he can turn cheating mechanisms in voting machines on and off by remote control.

"It's much easier to steal the election, right at the electronic voting machine," said Johnston."In many cases, we see security devices or electronic voting machines where we really have to wonder, 'Did anybody spend 60 seconds figuring out the security issues?"

Johnston and his team said they have learned that all too often, the highest tech systems can be cracked by the lowest tech methods



Sequoia Voting Systems has inadvertently released the SQL (Structured Query Language) code for its voting databases. The existence of such code appears to violate Federal voting law.

Sequoia is controlling the elections from within the database itself. Since they didn't strip this controlling SQL code out, we have the chance to study it, and since it came from a purely legal source, we can for the first time study a voting system from the inside out, in public.

Jim March to Open Voting Consortium - OVC-discuss] Something really big: Sequoia source code, free to download and study, no NDAs.

"Folks, you'll love this. Sequoia blew it on a public records response.  We (basically EDA) have election databases from Riverside County that Sequoia insisted on "redacting" first, for which we paid cold cash.  They appear instead to have just vandalized the data as valid databases by stripping the MS-SQL header data off, assuming that would stop us cold.
They were wrong.
The Linux "strings" command was able to peel it apart.  Nedit was able to digest 800meg text files.  What was revealed was thousands of lines of MS-SQL source code that appears to control or at least influence the logical flow of the election, in violation of a bunch of clauses in the FEC voting system rulebook banning interpreted code, machine modified code and mandating hash checks of voting system code.
I've got it all organized for commentary and download in wiki form.
This is the first time we can legally study a voting system's innards without NDAs or court-ordered secrecy. Join the fun :).  
First goal is to prove that Sequoia did in fact vandalize the data files by stripping the MS-SQL headers - if so that will affect other public records inquiries against Sequoia.
Second goal: what does the code do, what are the security implications, is it as big a violation of the FEC rulebook as it appears?

Thanks, Jim March "

Among other issues, this raises the possibility that Sequoia and Riverside county collectively violated the California Public Records Act. It is obviously legal to distribute MS-SQL data files that you create; Microsoft holds no "secrecy claim" to them. Sequoia claimed to be "removing their trade secrets but given the amount of source code found it's obvious that's not what happened.
Legally speaking, redaction of a data file is allowed. Vandalism isn't. Establishing which one happened is an important project goal, as it could allow us to go to court and get an unedited set of the files for further study.


9/09 Diebold sold its voting-machine business to Election Systems & Software of Omaha Diebold decided in 2006 to focus on key markets, including A.T.M.'s and security systems, said Mike Jacobsen, a Diebold spokesman. Election Systems & Software operates election services in 39 states and overseas. Now they are controlling all the votes in the U.S. S. Candice Hoke, an election law professor at Cleveland State University, said the sale raises questions about the consolidation of election services. “It's a massive consolidation of voting-system vendors,” she said. Premier has about 180 employees in the U.S. & Canada - operates in 33 states.

Google Sequoia AVC Advantage montgomery county pennsylvania election problems.

Voting Systems Used in Pennsylvania The Board of Elections in each of Pennsylvania's sixty-seven counties can choose which system voters in the county will use. There are currently ten different systems or combinations of systems in use throughout the Commonwealth:[30] Failures by State


Premier (Diebold) admits to flaw that drops votes 8/21/08

2008 Election Timeline
Timeline and related material about presidential debates, primaries, and caucuses for the 2008 presidential election. Also includes news stories and a list of presidential candidates with links to websites.


"Diebold says"glitch-free," just don't touch those touchscreens" Apparently Diebold has gotten the machines to work relatively well     together, but only when using a mouse. If the touchscreen is tapped,   the machine loses contact with its peers. Diebold is touting this mouse thing as a fix, and is offering to provide 5,500 mice for their e-poll books if state officials in Maryland give the go-ahead. Unfortunately, during a recent mock election, a poll-worker tapped the touchscreen despite repeated warnings to the contrary, and screwed up the system, requiring a reboot which took 30 seconds.

Happy Voting
"The access panel door on a Diebold AccuVote-TS voting machine — the door that protects the memory card that stores the votes, and is the main barrier to the injection of a virus — can be opened with a standard key that is widely available on the Internet. [snip]
"Chris's key was left over from a previous job, maybe fifteen years ago. He said the key had opened either a file cabinet or the access panel on an old VAX computer."

"How to steal an election by hacking the vote"

Diebold demands that HBO cancel documentary on voting machines. Film saying they can be manipulated 'inaccurate' 2006 Diebold Inc. insisted that cable network HBO cancel a documentary that questions the integrity of its voting machines, calling the program inaccurate and unfair.Diebold Election System President David Byrd said in a   letter to HBO President and Chief Executive Chris Albrecht posted on Diebold's Web site. Short of pulling the film, Monday's letter asks for disclaimers to be aired and for HBO to post Diebold's response on its Web site. "We stand by the film," said Jeff Cusson, a spokesman for HBO, which is a unit of Time Warner Inc. "We have no intention of withdrawing it from our schedule. It appears that the film Diebold is responding to is not the film HBO is airing." The HBO documentary is based on the work of Bev Harris, the Renton   woman who founded, which monitors election accuracy. In 2004 the attorney general of California took up a whistle-blower claim filed by Harris against Diebold and settled with the company for $2.6 million in December.


California voting systems code review now released 8/2007 - Matt Blaze

GAO Presentation that evote problems are very real. Randolph C. Hite at (202) 512-3439 or by e-mail at

Most vote machines lose test to hackers July 28, 2007
State-sanctioned teams of computer hackers were able to break through   the security of virtually every model of California's voting machines   and change results or take control of some of the systems' electronic   functions, according to a University of California study released   Friday. The researchers "were able to bypass physical and software security in   every machine they tested,'' said Secretary of State Debra Bowen, who   authorized the "top to bottom review" of every voting system certified   by the state.


"The cryptographer David Chaum, through discussion with top cryptographers such as Ron Rivest, has designed a secure and verifiable voting system. One of the goals of his design is that anyone can verify that votes were tabulated correctly. It's good to see real security/crypto people working on this problem. They also have a press release."



Diebold knew of legal risks,1674,82%257E1865%257E2095811,00.html
Oakland Tribune By Ian Hoffman 4/04 Diebold knew of legal risks Attorneys warned firm that use of uncertified vote-counting software violated state law.

2003 Voting Machine Fraud

Voting Machine Fiasco: SAIC, VoteHere and Diebold SAIC is a behemoth military defense contractor with a shadowy, if not tarnished, reputation, while former SAIC executives also have ties to VoteHere. Why is that important? Former President, Chief Operating Officer, and Vice Chairman of SAIC is Admiral Bill Owens, who is now Chairman of the Board for VoteHere. Owens also served as Vice Chairman of the Joint Chiefs of Staff and was a senior military assistant to Secretaries of Defense Frank Carlucci and Dick Cheney. Carlucci's company is Carlyle Group, while Vice President Dick Cheney's former employer is Halliburton.

Computer Voting Is Open to Easy Fraud, Experts Say By John Schwartz
The software that runs many high-tech voting machines contains serious flaws that would allow voters to cast extra votes and permit poll workers to alter ballots without being detected, computer security researchers said yesterday. "We found some stunning, stunning flaws," said Aviel D. Rubin, technical director of the Information Security Institute at Johns Hopkins University, who led a team that examined the software from Diebold Election Systems, which has about 33,000 voting machines operating in the United States read the paper at

Jennifer Granick, Hackers vs. Diebold Election Systems
Black Hat 2015 keynote speaker Jennifer Granick is director of civil liberties at the Stanford Center for Internet and Society. She previously held the same position at the Electronic Frontier Foundation -- and is known for defending some of the more notorious criminal hackers around, including Kevin Poulsen, Aaron Swartz, Jerome Heckenkamp and the hackers in the Diebold Election Systems case.

Hacking Democracy - HBO
This cautionary documentary exposes the vulnerability of computers - which count approximately 80% of America's votes in county, state and federal elections - suggesting that if our votes aren't safe, then our democracy isn't safe either. Don't allow vendors hack the vote. Don't allow states to privatize elections demand open software.



Black Box Voting - Eliminate Secrecy Consumer Protection for Elections
Paper ballots are the 'Currency of Democracy'. They've been helping to curb election fraud since 139 BCE! In this election year let me recommend this site run by the Annenberg School at UPenn and Teach Your Children - use this one for the kids.

Historians are great at telling linear stories and written narratives that have a specific point of view, and an agenda. Historians try to make define a moment in time with a certain set of facts while they leave out others. Now with the advent of web 2.0 pictures might prove to be history's next frontier. The Internet uses pictures to show off the natural social process that history actually is.

We are always concerned with "trusted" sources of information. We want to believe that journalism is honest and that we get honest reporting from print, television, and online sources. We need to understand these relationships.

History and Myth Making

What is the Difference Between Information and Propaganda when Trusted Media Sources are The Official Story Tellers?

The House Sneaker, Starring "Fats" Hastert, & his sidekick "Sneaks" Foley.

The Sneaky "Sneaks" from Sneaksville © Dan Cassidy
Starring: The House Sneaker, "Fats" Hastert, & his sidekick "Sneaks" Foley.
Sneak, v., to move or walk in a stealthy or slinking manner; to creep or crawl furtively; to slink, or skulk.
Sneak, n., a sneaking, shifty, underhanded person. One who steals in a sneaking manner; a sneaking, shifty, underhanded person.
Sneak: “Of doubtful origin...”   ( Oxford English Dictionary) Dictionary Dicks are the thought police.
Like the words "slang," "vagabond cant," and "thieves' jargon," “doubtful origin” is often a sneaky Anglo-Saxon code for the Irish language.

  • Snighe, (pron. shniγə), n., crawling (as a snail);
  • snigheach, (pron. shniγaÄ‹), adj., creeping, crawling;
  • snighim, (shniγəm), v., I creep, I crawl. Snag, n., a small creeping thing or person; a “crawler;” (ornithology), a tree-creeper.
  • Snagadh, (pron. snagah), vn., creeping.
  • Snagaim, v., I creep, crawl, or move slowly.
  • Snagach, adj., creeping, crawling, snail-like.
  • Snagaire, al. snagóir,n., a sneak, a creeper. (Dineen, 1071, 1078, í“ Dónaill, 1121, 1122)    

Although “sneak” sneaks into works by William Shakespeare in the 16 th century, it was still classified as “Cant” by slang dictionaries as late as the 19 th century. Interestingly, the Barnhart Dictionary of English Etymology traces the English “sneak” back to the Irish snighim, I creep or crawl.   . . .  

  • “A poore... Out~law, sneaking home. “(Shakespeare, Henry. IV, 1596)
  • Sneak, a pilferer. Morning sneak; one who pilfers early in the morning...To go upon the sneak; to steal into houses whose doors are carelessly left open. Cant.” (Grose, Egan, Dictionary of the Vulgar Tongue, 1785, 1811)
  • Sneaker, n., someone who sneaks, creeps, crawls, acts surreptitiously; an athletic shoe.
  • Snagaire, n., a sneak, a creeper, a crawler. (Dineen, 1071)
  • Sneaky,adj., creeping, crawling, shifty, underhanded.
  • Snagach, adj., creeping, crawling. Snagaí­, n., creeper, crawler. (Dineen, 1071)
  • Snigheach, (pron. shniγaÄ‹), adj., creeping, crawling. (Dineen, 1078)
  • “Jesus at the Movies: Some prominent proselytizers hope to save America -- and the world -- by doing some 'sneaky preaching' through a new movie they're calling 'one of the greatest outreach tools of the church in this century.'" (Sarah Posner, Alternet, Oct. 12, 2006)





2004 Rupert Murdock controls the news WATCH - OUTFOXED
Rupert Murdoch's War on Journalism
Bravenew Films 1 hr 17 min 41 sec Sep 14, 2004
Outfoxed examines how media empires, led by Rupert Murdoch's Fox News, have been running a "race to the bottom" in television news. This film provides an in-depth look at Fox News and the dangers of ever-enlarging corporations taking control of the public's right to know.  

Fox News has once again identified a Republican as a Democrat and vice-versa.
October 4th 2006 Fox News labeled disgraced Republican Mark Foley as a Democrat multiple times in one night and they've done it again today, reversing the party affiliation of Sheldon Whitehouse and Lincoln Chafee in the Rhode Island Senate race.

About News Sniffer
The News Sniffer project aims to monitor corporate news organisations to uncover bias. Latest articles, Latest revisions. Blog

Tampering with Wikipedia
Keith Olbermann's story on the interesting authorship of many Wikipedia edits - Fox News, NSA over 100 entries. Aug. 16 2007:   A young computer scientist has developed a program called Wikipedia Scanner that can show who makes changes to Wikipedia articles by tracing their computer address.   Kevin Poulsen, senior editor of discusses.
Taking a cue from Lincoln's Gettysburg Address, the nonprofit Center for Media and Democracy (CMD) is interested in promoting media literacy and citizen journalism "of, by and for the people."  
To achieve this goal, they publish a quarterly investigative journal, their "Spin of the Day", and the very useful PR Watch website. On the site, they investigate and craft critical appraisals of various public relations media. Recently, they have looked at the "green" claims made by print advertisements for various automobiles and media claims about other products.Overall, the site is a good resource for journalists and for people who are just plaincurious about the world of journalism and investigative reporting.


Who Contributed to their Campaigns?


Did you send in some money to someone's presidential campaign? Did your neighbor? How much and to who? Type in your address and see who your neighbors have donated money to. Or type in someone's name to see who they contributed to.

Links to individual state campaign finance disclosure agencies

Open Secrets Federal Level Data

NewsMeat - tracks celebraties, ceo's everyone you want to know about.

FEC Filings From Prospective 2008 Presidential Campaigns
Official records of Federal Election Commission (FEC) filings for the 2008 presidential election, including Statement of Organization and Statement of Candidacy forms. "This list includes campaigns who have raised or spent $50,000 or more (the threshold for mandatory electronic filing) from sources or to payees other than the candidate him or herself." Additional forms filed are listed under the candidate's committee, including quarterly reports of receipts and disbursements.

Most States Now Offering Campaign Data Online


The US Public Policy Committee of the ACM has released a study on statewide voter registration databases.   We looked at accurancy, privacy, usability, security, and reliability issues of such databases.
The home page for the study is ; it contains the committee membership, executive study, and (of course) a link to the full study.

Center for Governmental Studies

Public Citizen founded by Ralph Nader

Douglas Jones University of Iowa associate professor
of computer science has become a leading expert on voting security in the United States and heads the Iowa State Board of Voting Machines and launched a National Science Foundation project called ACCURATE, or A Center for Correct, Usable, Reliable, Auditable and Transparent Elections. Jones said hand-marked paper ballots that can be counted by local machines are probably the best ballot choice.

Project Vote Smart​
A national library of factual information on 40,000 candidates for public office including President of the United States to state legislature to local elected officials. We cover them in five basic areas: backgrounds, issue positions, voting records, campaign finances and performance evaluations made by over 100 liberal to conservative special interest groups.
In addition we interview presidential, congressional, gubernatorial and state legislative candidates and provide special services on issues for journalists, teachers and students. All information and services can be obtained in the following ways:

* The Voter's Research Hotline 1-800-622-SMART
* The Voter's Self-Denfense Manual
Information available through the above sources:
- Biographical and Political Backgrounds
- Addresses and Phone Numbers
- Voting Records
- Campaign Finance Data


USA Election Equipment: Standard
Click on a state or territory to see more information
Voters' Guide to Electronic Voting Verified Voting:
Mandatory Manual Audits of Voter-Verified Paper Records
State-by-State Guidelines for Who Can Observe Elections Processes
  Current Congressional Schedule
One Third of Nation's Voters To Face New Voting Equipment in 2006 Statewide Databases of Registered Voters
Digital Divide Information Digital Divide Tools

1940 article from Popular Science about   "modern" vote counting.   Thought people might get a kick out of it in   the context of the present voting machine discussions.

Tar and Feather all Electronic Voting Machine Vendors and Election Officials who tamper with our vote.

1800 The real-life election of 1800 was even wilder than Hamilton the musical lets on the actual election of 1800 was far more complex and dramatic — it brought the nation to a constitutional crisis and even, some thought, the brink of open violence.

And Burr's real-life conduct was even more opportunistic and duplicitous than it was in the musical (which features, overall, a toned-down version of the man who'd later be accused of trying to seize American territory to create a new empire for himself). Because Burr was in fact Jefferson's running mate, who was understood by practically everyone to be truly running for vice president.

Until, that is, he saw an opportunity.

Badly flawed constitutional design made the crisis possible

The odd constitutional flaw that led to the electoral crisis of 1800-'01 was a simple one: There was no way the electoral college could distinguish between candidates for president and candidates for vice president.

The way the system initially worked, each state's electors (members of the electoral college) got to cast two votes. When all the votes were in, the person with the most electoral votes would become president (if he had the support of a majority of electors), and the person with the second highest number of votes would become vice president (as Burr notes in "The Adams Administration").

The system was created without any expectation or understanding that organized parties would soon dominate US politics. So once the first parties started putting up both presidential and vice presidential candidates, it quickly became clear that there was a huge potential problem.

Namely: Even if a presidential candidate won a majority of electors, if his vice presidential running mate got those same electors' votes, they'd technically end up in a tie.

© Educational CyberPlayGround ® All rights reserved world wide.