Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Pressure Conyers et al to Impound the E Vote Equipment

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Topic Forums » Election Reform Donate to DU
 
JunkYardDogg Donating Member (618 posts) Send PM | Profile | Ignore Tue Dec-07-04 01:08 AM
Original message
Pressure Conyers et al to Impound the E Vote Equipment
This may be our only opportunity to be able to exert some leverage and pressure to get the Voting Equipment impounded and the servers backtraced
The contact/info link for the Conyers Committee is:

http://www.house.gov/judiciary_democrats /
props to Rock The Vote in Ma for getting me this GRRR back Dawg
On this site, it lists all the Congress Persons on the committee,
and separates the Dems and Repunks
guess what, sleezy Feeney is on it
If you clik the Staff tab you can get the "Members" and "The Staff"
Below is a paper which I wrote presenting an argument for impounding the Equipment-
In it, I avoided using the Word Fraud and I tried to make the Manipulating Problem so that any PC owner could personnally relate to.
I faxed this Argument to ALL(each one separately) Democratic Staff
counsel members. As they are really the ones who do the work, I wanted a copy in each staff member's hands so that they could read it and think about it. The time is really ripe for this. I did not have time to send a copy to each Rep.
I originally wrote this to send to all the lawyers who have filed Election cases. I sent them all copies Monday, but I doubt that I will hear anything back. I figured that it would make a good argument in court.
I think that all of us should start a blitzkrieg campaign on the committee, staff and members, and maybe all Dem Congress People on
this. We HAVE to take advantage NOW of the Conyers Committee- don't let it shrink, make it expand
Let's Exploit it
Let's make an "IMPOUND THE MACHINES" Campaign NOW!!!
You can use my paper as a guide and take info from my last posting
Make this phrase common talk all over the Country
Let's make Conyers et al REAL AMERICAN HEROES
I purposely faxed an individual page to each person. I did not E-Mail, figuring it is just to easy to delete and/or forget
Maybe faxed pages are more lasting and have more impact
Be Creative
here's the Paper:

ARGUMENT FOR IMPOUNDING THE E-VOTING MACHINES

As computers have now become an integral and indispensable part of everyday life, on the business, private and legal levels, so have the basic fundamentals of how computers function have
become an intrinsic part of common and public knowledge . It is no longer a mystery or “Black Magic” to the average computer user as to how a computer functions. Any reasonably knowledgeable computer user knows that a computer functions and operates on software programs and hardware designed and written by other human beings, not by some magical or mystical entity.
Hence, a person who has written a software program is ultimately responsible for how a computer functions and what it produces, even if that is not the person who has entered the data into the computer. Any deviation, aberration, or anomaly produced or generated by a computer, is ultimately traceable back to the software programs and applications installed in the operating system of any given computer. No matter what the supplier of a computer claims that it will do, the result of a computer’s work will always be a direct result of what the programming inside controls it to do, irregardless of what a salesman claims
The fact that malicious programs and applications not only exist on a widespread basis, but are commonly surreptitiously and covertly installed on computers on a daily basis is an indisputable fact in this day and age. One only has to look at the Mega-Million dollar industry of Anti Virus, Anti-Spyware, Anti-Spam, and Firewall Software companies, such as Norton Symantec, McAfee, Sygate, Pest Patrol, Ad-Aware, and many others to confirm the obvious existence of such malicious software programs and applications. So pervasive and rampant is the covertly and surreptitiously installed malicious programs and applications on personnel computers, that probably at a minimum, 95% of all computer users have had malicious programs installed in their computers, without their knowledge and/or permission. And how does a computer user know that there is a malicious program installed and operating in their computers? Easy, ask ANY computer owner/user who has ever had to deal with this. The computer produces/generates and performs work inconsistent with its’ originally designed and programmed purpose. This aberrant and deviant computer behavior is ALWAYS the Prima Facie indication and evidence of the installation and operation of malicious software. And how does one confirm the existence of malicious software programs inside a computer? A computer expert, with knowledge of how programs are written and installed in a computer’s operation system, must be able to examine the software installed in that given deviant, aberrant producing computer. And, upon such forensic examination, a qualified and knowledgeable computer software expert will be able to locate the programming source and cause of the deviant, aberrant computer behavior. And, if the computer is being controlled by remote access intrusion, i.e. hacking, it is done through the Internet server which connects the computer to the rest of the internet, making it accessible by offsite computers. And how can this offsite access and control be verified, by backtracing the servers. Again through the use of forensic examination and investigation.
And, what does this have to do with the discrepancies, aberrations, illogical anomalies, and deviant vote count productions produced by the various Electronic Voting machines in this election? It goes directly to the basic, fundamental way a computer functions. That is, by the installation of software programs and applications written and installed by real persons into a computer which command and control what a computer does, how it does it, and what a computer produces. Therefore, the discrepancies, aberrations, and deviant vote count production produced by the Electronic Voting Machines in this election could only have been the direct result of malicious software programs and/or remote access intrusion and manipulation ( i.e. hacking) through the servers of the central tabulators purposely and intentionally installed by other persons. The discrepancies, aberrations, and deviations did not happen by happenstance, or by some capricious and unexplainable mystical act of a magical unknown nature. They were the direct result of a person or persons. To deny this, is to deny the scientifically proven facts of how computers function.
Being that these discrepancies, aberrations, and deviant vote count behaviors can ONLY be scientifically explained as the direct result of a person or persons’ intervention, we can only
assert that these discrepancies, aberrations, and deviant vote counts were caused by Intentional Criminal Felony Acts with intent to Commit Fraud and therefore the only way to properly investigate and verify the true source and cause of these criminal acts is to impound and analyze the Electronic Voting Equipment.



I have to thank all of you who responded on my last posting on this, you debated me and got me to thinking more on this, I got real good feedback from that dialogue.
Printer Friendly | Permalink |  | Top
For PaisAn Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-07-04 01:21 AM
Response to Original message
1. You're 100% right
We need to go beyond just doing a recount. The equipment needs to be examined to determine if the results are certifiably accurate or if they were open to fraud and manipulation. Anything other than absolute certainty should warrant a new vote on legitimate voting equipment.
Printer Friendly | Permalink |  | Top
 
KaryninMiami Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-07-04 01:26 AM
Response to Original message
2. ok- so can you reduce that huge (but fascinating) paragraph?
We need one, clear, concise, bullet point statement. 3 paragraphis max- simple and to the point "We demand that you impound the machines in order to determine the credibility of the election."
Or something like that) followed up with 5 bullet points as to why this is so important.

Any chance that you feel inspired to write this? Then people can start faxing or emailing it which is a great idea.
Printer Friendly | Permalink |  | Top
 
proudbluestater Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-07-04 01:49 AM
Response to Original message
3. The hearings are actually a "forum," not legally binding
With just the Democrats (most) on the Judiciary Committee on board with this forum, nothing legally binding is likely to come out of it. Nobody will be able to ask anybody to impound anything.

The Republicans on the committe refused to get on board which is no big surprise.
Printer Friendly | Permalink |  | Top
 
JunkYardDogg Donating Member (618 posts) Send PM | Profile | Ignore Tue Dec-07-04 08:27 PM
Response to Original message
4. Here's my Original Version

KarininMiami
Thanks for the Good Review

Any way, here's the
original short version:

The following are core fundamentals upon which I think that we can pursue the E-Voting Fraud Issue:
The Direction which we should be pursuing , legal wise, should be as follows:
1. The numerous, documented cases of vote count discrepancies are NOT accidents, but Prima Facie EVIDENCE of FELONY CRIMINAL ACTIVITIES
2. As such, this amounts to PROBABLE CAUSE
3. The E-Voting Machines are Physical Evidence of CRIMINAL ACTIVITY
4. IMPOUND the Electronic Voting Machines in the Precincts in Question
5. ANALYZE (Forensic Investigation) by Neutral Software Experts- the Software Programs
(there are Experts in the E-Voting Software who know what to look for)-there are documented known programming "aids" to manipulate the vote count built into the machines-the Diebold machines have 2 sets of books, for example

6. Get Court Orders to Get the Server History Records on the Access History of the E-Machines-and the Central Tabulators
this is commonly done in White Collar Criminal Cases where internal E-Mails are used as evidence
We know that these machines and the vote counts were manipulated, but we cannot get the evidence until we
can impound the Machines and Central Tabulators and backtrace the servers' histories
The first machines which we can impound and analyze ( plus the servers) where manipulation can be found, can then be used to seize machines all over the country.

Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Wed Apr 24th 2024, 08:57 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Topic Forums » Election Reform Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC