-Caveat Lector-

RadTimes # 118 November, 2000

An informally produced compendium of vital irregularities.

"We're living in rad times!"
-----------------------------------------------------------------------------------------------------------
QUOTE:
"In the larger life of society, the people are made to submit to the orders
of those who were originally meant to serve them--the government and its
agents. Once you do that, the power you have delegated will be used against
you and your interests every time. And then you complain that your leaders
"misuse their power." No, my friend, they don't misuse it; they only use
it, for it is the *use* of power which is itself the worst misuse."
--Alexander Berkman, 'What Is Communist Anarchism?'
-----------------------------------------------------------------------------------------------------------
How to assist RadTimes--> (See ** at end.)
-----------------------------------------------------------------------------------------------------------
Contents:
---------------
--Free Speech In America -- If You Dare?
--The Republican right prepares for violence
--Vote of No Confidence [how to steal elections]
Linked stories:
        *The US election crisis: why is Ralph Nader silent?
-----------------------------------------------------------------------------------------------------------
Begin stories:
-----------------------------------------------------------------------------------------------------------
Free Speech In America -- If You Dare?

From: Ross <[EMAIL PROTECTED]>

In Military Style--Police NOW SWEEP America's streets and buildings for
law--abiding protestors: Increasingly, police interrogate and arrest
citizens who police believe are planning to attend demonstrations. Is it
now, Free Speech In America--If You Dare?

How Far Can Law Enforcement Go--TO CRUSH POLITICAL DISSENT? During the
2000 Republican Convention in Philadelphia, Police Squads arrested on
streets and private property, law--abiding protestors, bystanders and
tourists--to prevent them from attending demonstrations. LAPD on
10--22--00 used clubs and rubber bullets, to attack and run off
lawful--demonstrators supporting the (October 22nd Coalition) PROTEST
against--police brutality. The coalition had secured a city permit for the
demonstration. In American, police now--arrest, jail, and execute, a
citizen's (Right To Free Speech and Assembly).

When Do Demonstrators Become--Terrorists? The Anti--Terrorist Act of 1996
appears aimed at public dissent: The Act contains language which can
charge law--abiding citizens of being agents or affording support to
terrorist organizations: Broadly written--intent to commit terrorist acts
is defined: (Appeared To Be Intended Toward Violence or Activities Which
Could Intimidate or Coerce a Civilian Population; or To Influence the
Policy of a Government). (18USC Sec. 2331): Any picket line or
demonstration, alleged by police to have blocked or obstructed public
access, could qualify as Terrorist Activities to intimidate or coerce a
civilian population: Terrorist charges make it possible for police to
forfeit attending demonstrators' homes used for meetings and the vehicles
they used for transportation to the event. Concern: Police agencies may
selectively charge a person or organization with either a low level
offense, or Terrorist Offense, for the same illegal act: Example: A fist
fight between union demonstrators and persons crossing a picket line, can
be upgraded by police to charge union members with (Terrorist
Activity).The 1996 Anti-Terrorist Act, broadly--redefined (Terrorist Acts)
as (involving any violent act or acts dangerous to human life that are a
violation of the criminal laws of the United States or any state). The
violent or physical act need not cause bodily harm: The Act can be used by
police to target any group of persons--that would dare demonstrate for or
against any issue.

Secret Hearings--Secret Witnesses: U.S. Police routinely purchase court
testimony to convict defendants: Under the 1996 Anti-Terrorist and Death
Penalty Act, prosecutors may use secret/paid informants, secret testimony,
secret witnesses, and other hidden evidence to convict citizens for
terrorist acts: Defense against government terrorist charges, even against
the Death Penalty, may be difficult where citizens have no access to know
the alleged evidence against them or the right to cross examine government
secret witnesses: Secret--Hearings, Witnesses, Jurors: can be invoked by
Government to allegedly protect national security, government
investigations, jurors and witnesses. Conviction for terrorist activities
can result in huge fines, property forfeiture, prison sentences and
execution. Should citizens be allowed to have access to the evidence the
U.S. Government is using to convict them? Are secret--witnesses, hearings,
and jurors, in the best interests of a free society?

-----------------------------------------------------------------------------------------------------------
The Republican right prepares for violence

<http://www.wsws.org/articles/2000/nov2000/elec-n24.shtml>

By the Editorial Board
24 November 2000

The frenzied response of the Bush campaign and its allies in the media to
Tuesday's ruling by the Florida Supreme Court has highlighted a political
fact of immense significance: the Republican Party has become the organ of
extreme right-wing forces that are prepared to use extra-parliamentary and
violent methods to achieve their aims.
Spokesmen for George W. Bush and pro-Republican media outlets reacted to
the court's decision, which simply affirmed the constitutional requirement
that all votes be fairly counted, with calls for the Florida legislature to
defy the court and appeals to the military of a semi-insurrectionary character.
The barrage of lies and misinformation, charging the court with "changing
the rules" and "rewriting the election statutes," denouncing Democratic
candidate Al Gore as a thug out to steal the election, appealing to racist
and anti-Semitic sentiments, had its intended effect.  On Wednesday morning
a mob of Bush supporters besieged the Miami/Dade County board of
canvassers, grabbing a Democratic lawyer and threatening to assault those
involved in manually recounting the ballots. A few hours later the
Democratic-controlled board announced it was abandoning its recount,
effectively disenfranchising hundreds of Gore supporters whose votes were
not registered in the original machine tally.
The official responses of the Gore and Bush campaigns to the court ruling
provided a stark contrast. Gore went on national television late Tuesday to
appeal for a show of national unity and a public commitment by the Bush
campaign to abide by the ultimate result of the Florida recount.  Repeating
his offer to meet with his Republican opponent, Gore spoke as a bourgeois
politician worried over the prospect of an open breach within the political
establishment that could undermine an orderly transfer of power, with
unpredictable and potentially explosive consequences.
Bush's representative, former Secretary of State James Baker, did not even
bother to acknowledge Gore's appeals for unity or his offer to meet with
the Texas governor. Instead he denounced the Supreme Court ruling as
"unacceptable" and incited the Republican-controlled state legislature to
defy the court, saying, "One should not now be surprised if the Florida
legislature seeks to affirm the original rules."
Baker was taking his cue from the Wall Street Journal, which had
editorialized in advance of the court decision: "The legislature has an
option, it seems to us a duty, to make clear that it stands ready to
resolve any dispute between Mrs. Harris [the Republican Secretary of State
and co-chair of the Bush campaign in Florida] and the Supreme Court
Democrats. Since the Republicans now solidly control the legislature, they
hold the winning hand."
Paralleling its role in the impeachment conspiracy against Bill Clinton,
the Wall Street Journal has served as the mouthpiece for the extreme-right
forces that have sought from election day on to pollute public opinion with
wild accusations and disinformation and hijack the election for the
Republicans. It has spearheaded the effort to foster a veritable mutiny
within the military against a possible Gore victory, using as the pretext
the rejection of several hundred legally deficient absentee ballots from
overseas military personnel.
On Wednesday the Journal carried an incendiary column entitled "The
Democratic Party's War on the Military." Calling the exclusion of the
military ballots "one more battle in the ongoing culture war between the
core of the Democratic Party and the US military," the column exuded
racism, homophobia and hatred for the working class. The author spoke of
the "twitching carcass" of the Democratic Party's "left""teachers' unions,
feminist activists, gay victimologists, black churches, faculty clubs."
As the election crisis has progressed, thinly disguised appeals to racism
and anti-Semitism have with increasing frequency appeared in the broadsides
of Bush supporters. Republican backers have seized on the role of Jesse
Jackson to whip up anti-black prejudice and fastened on the large number of
Jewish retirees in Palm Beach to galvanize their fundamentalist partisans.
The Journal has not refrained from such methods. In the editorial cited
above it employed loaded terms to take a swipe at Florida's Jewish
population, charging that Mrs. Harris is "under fire for being a Southern
aristocrat rather than a New York sophisticate." It went on to denounce the
Democrats for "import[ing] Jesse Jackson for some race-baiting."
The editorial as a whole was a call for the Republican Party to forego
traditional constitutional restraints in its drive to capture the White
House.  It concluded with a barely disguised injunction for a victorious
Bush campaign to fashion an administration along authoritarian lines:
"The conventional wisdom is that if with this hassle Governor Bush does
become President he will be a crippled one. Perhaps. But we find it equally
plausible that facing down the kind of assault now being waged in Florida
would be precisely the best preparation for what may lie ahead.  It is
Governor Bush's nature to extend the velvet glove, but he will be much more
successful if he and his party can show that within it there is some steel."
Significantly, the editorial was entitled "The Squeamish GOP?" The Journal
chooses its words advisedly, in this case employing a term that connotes an
aversion to bloodshed. The meaning of the newspaper's editors was
unmistakable, a Republican president must be prepared to use violence and
repression to impose its reactionary social agenda.  Gaining the White
House by suppressing votes and riding roughshod over the popular will is an
excellent preparation for dealing with "what may lie ahead" i.e.,
widespread popular opposition.
It is high time to stop masking the character of the Republican right with
the complacent term "conservative." These are fascistic elements who are
breaking with the traditional methods of bourgeois democracy.
There is a logic to politics. Once influential sections of the ruling elite
conclude they cannot achieve their aims through democratic means and take
the path of conspiracy and repression, they are well on the way to civil war.
It is not here a matter of predicting the imminent imposition of a military
dictatorship. But it would be the height of folly to ignore the signposts
of such a danger looming ahead. If the campaign the Republicans are waging
to gain the White House begins to resemble a covert operation akin to those
mounted by the CIA against US imperialism's liberal and leftist opponents
in Latin America, for example, in Chile, then it must follow that an option
under serious consideration is the Pinochet solution.  No one should doubt
that Wall Street Journal editor Robert Bartley and the reactionaries on his
staff are already working out the arguments to justify the use of violence
against their political opponents and the working class.
The Wall Street Journal speaks for powerful sections of American big
business. These forces within the financial elite have increasingly adopted
the standpoint of the extreme right, and sponsored, financially and
otherwise, the growth of this fascistic element, precisely because they
have come to realize that they cannot impose their social agenda through
normal democratic channels.
They rely on the right-wing rabble that populate the corporate-controlled
media to conceal their anti-democratic aims and fill the airwaves with
half-truths and lies. Their strength does not lie in any great popular
support, on the contrary, their support in the general population is marginal.
Rather, the strength of the Republican right consists in the fact that it
articulates more consistently and uncompromisingly than any other bourgeois
political grouping the requirements of the American corporate elite. The
radical right knows what it wants and is prepared to ride roughshod over
public opinion in order to get it. The Republicans do not play by the
normal constitutional rules, while their bourgeois opponents in the
Democratic Party wring their hands as impotent and passive onlookers. They
embody a demoralized liberalism, whose watered-down perspective of reform
has been discarded by the ruling class.
At the same time the Republican right senses that it has a narrow window of
opportunity for realizing its ambitions. It was staggered by the results of
the election, which registered a victory in the popular vote for Gore and,
if the intent of Florida voters were officially acknowledged, a Democratic
victory in the electoral vote as well. The combined vote for Gore and Green
Party candidate Ralph Nader showed, broadly speaking, that a significant
majority of the electorate supported policies of a liberal and leftist
character, and opposed the increasingly naked domination of corporate power
over American politics.
A look at the electoral map underscores the fact that the overall
trajectory of American society does not favor the forces of the radical
right. Bush piled up the vast majority of his electoral votes in the more
backward and rural regions of the country, the South, the Southwest,
sections of the Midwest. The more urbanized, industrialized, densely
populated and culturally vibrant regions went for Gore. Within this general
scheme, the decisive pro-Gore margin in the popular vote was provided by
blacks and other highly oppressed sections of the working class, whose vote
expressed deep distrust of the Republicans and a determination to defend
past gains in civil rights and social conditions.
Moreover, the economic conditions fostering the rise of nouveau riche
layers that comprise a critical component of the Republican right's social
base are clearly receding. The stock market boom, based to a considerable
extent on speculative capital, parasitism and outright swindling, is
breaking up, leaving in its wake a society more economically polarized than
at any other period in the past half-century, and a spectacle of corporate
greed and criminality of unprecedented dimensions.
The response of the Republican right is growing hysteria. Its frenzy and
recklessness bespeak a rebellion by a minority that feels it must stake all
on immediate victory, because its future prospects are dwindling. The
Republicans sense that the 2000 election is their best, and perhaps last,
chance to seize hold of all the branches of government. If they lose the
White House, they face the prospect of internal warfare and political
disintegration.
Notwithstanding the many obvious differences, there are striking parallels
between the political crisis arising from the 2000 election and the
convulsive period that led up to the Civil War of 1861. One of these is the
similarity in psychology and methods between the Republican right of today
and the political representatives of the Southern slave owners 150 years
ago. In both cases, the most reactionary social forces in the nation were
driven by a sense of desperation, arising from the fact that the momentum
of historical development was moving against them, to employ the most
provocative and reckless methods.
One great difference, to extend the historical analogy, is the absence
within any faction of bourgeois politics today of a force either willing or
able to take on and defeat the radical right. As they have repeatedly
demonstrated, the flaccid ranks of liberalism, institutionalized in the
Democratic Party, are organically incapable of waging a serious struggle in
defense of democratic rights. That task now falls to the working class,
which must construct its own mass, socialist party to carry it out.

-----------------------------------------------------------------------------------------------------------
Vote of No Confidence

<http://www.conspire.com/vote-fraud.html>

Everything you need to know about stealing elections

Reprinted in abridged form from
"Metro: Silicon Valley's Weekly Newspaper," Sept. 28, 1989.
The author makes grateful acknowledgment to Dan Pulcrano.

The next president of the United States may not be chosen by the
voters of the United States. Instead, he or she may be the choice of
whomever controls or manipulates the computer systems that tally the
votes. A single, Berkeley- based firm manufactures the software used
in the machines that compile more than two-thirds of the nation's
electronically-counted votes. Analysts describe the software
as "spaghetti code," tangled strands of instructions indecipherable
to outsiders. The experts say the code could be manipulated without
detection. In fact, that may have happened already.

  Vote fraud by computer is an even greater threat to local elections,
the experts fear. With the entire system shrouded in mystery and
absent of assurances that the voting process is tamper-proof, voters
these days have more reason than ever to ask, "Does my vote count?"

"The whole damn thing is mind-boggling," says Ronnie Dugger, a Texas-
based writer who investigates computerized elections. "They could
steal the presidency." "Any use of computer technology is
subvertable," Peter Neumann of the Menlo Park research firm SRI
confirms. "The consensus is that elections can be rigged easily
locally, but nationally takes a lot more work." However, Neumann
says, the task of fixing a presidential election is "doable."

Election-rigging is a time-honored tradition in the US, from the days
of New York's Boss Tweed and Tammany Hall to Chicago's legendary
Mayor Richard Daley, who, historians believe, engineered President
Kennedy's narrow margin of victory over Richard Nixon in the 1960
general election by stealing a key bloc of Illinois votes. And Lyndon
Johnson's 1948 Senate victory, according to a biographer, was the
result of vote-rigging in Southern Texas, where ballots were burned
before a recount could take place.

As recently as 1984, a US Senate race in Florida, in which Republican
Connie Mack defeated incumbent Buddy MacKay by just 35,000 out of
four million votes, stirred deep suspicion though no fraud was ever
proved. The question, however, is whether a well-executed computer
vote fraud ever would yield enough evidence to constitute "proof."

Ballot boxes can be stolen and stuffed, mechanical lever machines can
be tinkered with, paper ballots can be forged. But computers seem
somehow more sinister. Though defended, as one would expect, by
professionals in the field who insist that computers are less
vulnerable to error and tampering than counting paper ballots, the
invisibility of computer functions and the esoteric languages they
use make that assurance difficult to accept.

"Computerized elections could be made more difficult to defraud than
hand-counted elections, but they're not that way now," says Erik
Nilsson, a Portland, Ore., software engineer who monitors
computerized voting for the Palo Alto-based Computer Professionals
for Social Responsibility (CPSR). "If you believe election officials
deliberately defraud elections, if you really believe people are that
dishonest, then we're kind of stuck."

Nilsson echoes many computer professionals who say that the internal
security/measures of most vote-counting systems make tampering
difficult to detect. He is cautious on the subject of widespread
computer tampering. "Our feeling has been that while we know vote
fraud exists, the larger problem is error," he said in an interview.

Other critics go a step further. "CPSR has been very conservative on
this issue," Dugger says. The journalist is a native of South Texas,
where, he says, election-rigging is a matter of course. "If they're
asking me to trust politicians and election officials," he
quips, "they'll have to ask Someone else."

Even if elections were never corrupted, the vulnerability of
computerized vote-counting could so damage public confidence as to
render elections virtually useless.

"The public's perception of the security (as well as the accuracy) of
the vote tabulation process is as important as the actual security
measures," said a 1988 report by the Pennsylvania research firm
ECRI." And care must be taken to avoid even minor nuisances that can
give the public and political leaders the impression that the
system's integrity is not sound."

Unfortunately, the problem is more than simply "public perception,"
more than "minor nuisances." In many important ways, the system is
not sound. "The complex systems that tally 55 percent of our
electorate are badly designed, hard to monitor and subject to a host
of technological threats," Nilsson wrote in a CPSR "Election Watch"
report. "Worse yet, detection of error or sabotage is more difficult
than in traditional elections." In the report, Nilsson and a co-
author listed ways in which vote-counting software can be "secretly
changed." The possibilities include adding extra ballots,' discarding
some ballots, misreading ballots, turning off the computer's internal
record-keeping system or simply changing the results.

"Any of these threats can be accomplished by a single computer expert
or, in many instances, by a non-professional," Nilsson's report
states.

So far, there have been no legally established cases of computerized
vote fraud, or at least of fraudulent software tampering. "There's
probably been some we don't know about," claims one computer company
executive. If a computerized vote fraud were successful, would the
public ever know?  A Los Angeles Times article earlier this year
raised that very point, quoting former California state prosecutor
Steve White, who pointed out that "if you did it right, no one would
ever know. You just change a few votes in a few precincts in a few
states and no one would ever know."

The technique of fixing a relatively small number of votes could be
used to swing a close election to a designated candidate. Just as
troublesome is the prospect of increasing a candidate's  margin of
victory. Presidential elections are rarely won by margins of more
than a few percentage points, and more than 8 percent is considered a
crushing margin of victory. Altering a small percentage of votes in
various districts across the country could turn an indecisive
election into an artificial "landslide," creating a false "mandate"
for the winning candidate.

But who on Earth would do such a thing? In Chicago in 1982, 58
Democratic party bosses were convicted of fraud after they were
caught stuffing not the ballot box, but the computer. They had
punched out fraudulent cards for falsely registered and nonexistent
voters, then run them through the card-reader.

There have been numerous other ambiguous cases. Many of them have
involved Berkeley's Computer Election Service (CES)-which recently
changed its name to Business Records Corporation Election Service.
The company is the dominant force In the American election industry;
an estimated 33 to 40 percent of all American votes are cast on and
counted by CES systems. CES uses aversion of the punch-card voting
system prevalent in California.

In 1985, the National Security Agency (NSA)-the government's most
expansive and most secretive intelligence service-took an interest in
CES. According to the New York Times, NSA was following a directive
from then-President Reagan to improve the security of major non-
military computer systems.

Government officials were queasy at the prospect of a top-secret
military spy agency-particularly NSA, whose domain is high-tech
intelligence gathering-delving into the nation's electoral process.
According to the Times, an official of the government's General
Accounting Office told a Senate committee that NSA's involvement with
CES "raises basic questions concerning the extent to which the
defense establishment should be involved in policy formulation within
the government's civilian agencies."

The chair of the House Science and Technology Subcommittee at that
time, Rep. Ron Glicksman, also expressed "serious reservations "
about NSA's involvement with CES. The Times story of Sept. 24, 1985
(which ran in the San Francisco Chronicle the following day) ,
announced that NSA was "investigating" CES to determine if its
systems were open to fraud, but the NSA now says the Times got the
story wrong. "There never really was an investigation," says Cynthia
Berecek, an NSA public information officer. Berecek said the National
Security Agency's interest in CES was in "data gathering,"
not "investigating." The NSA, according to Berecek, no longer has
responsibility for computer security outside of government
operations. She says the Times misquoted an NSA spokesperson as
saying, "We have no interest in any particular election." The correct
quote, according to Berecek, should have been, "We have no interest
in elections per se." (Berecek says the NSA spokesperson interviewed
by the Times kept a written record of the conversation.) Exactly
what "improvement" the NSA was supposed to have made in the CES
system was never announced. Berecek says there were "no results to
talk about" because there was no "investigation," only "data
gathering."

"If you sit and read a magazine that has an article about a computer
company, that's gathering data," Berecek says. The NSA is the
government's electronic intelligence bureau, responsible for
monitoring telephone calls, telex messages and other electronic
communications. It also gets information from spy satellites..
According to some reports, the secrecy-obsessed agency possesses the
most powerful computer system in the world. In addition to the
concerns raised by NSA's "data gathering," doubts about the company's
integrity have been raised in several civil lawsuits. In these civil
lawsuits (no criminal charges were filed), CES has been accused of
actually participating in election fraud. Despite the fact that CES
has never lost a court case, the company's public image certainly
hasn't been helped by the litigation. In 1983, several losing
candidates in Indiana (a state where a county clerk once pronounced
vote-buying as "a way of life") sued CES and local election
officials, charging them with "false and fraudulent" vote counts.

CES President John Kemp denied in the press that his company
participated in wrongdoing of any kind, though he did admit to the
New York Times, "It is totally economically unfeasible to have a
fraud-proof system." CES also has been challenged in at least three
other states. When investigators have tried to unravel the CES
counting program, however, they inevitably have gotten lost in the
linguini-like mess. In the Indiana case, the defeated candidates
brought in computer consultant Deloris Davisson to analyze the CES
vote-counting software. She found it hopelessly obscure and hard to
follow. Her report termed the program's source code (the key to
understanding the program) "convoluted, unstructured and
undocumented."

Davisson called its memory functions -- where die vote counts are
actually stored within the computer -- "a shell game," and noted that
the program doesn't stop running or even give a warning if "there are
more votes recorded than, there are registered voters."

Davisson's report may be open to accusations of bias. After all, she
was a paid consultant hired by people who had a vested interest in
proving CES faulty. But her finding are echoed in the ECRI report,
which was funded by a grant from an independent foundation.
Criticizing the software of "some vendors" (indicting CES only by
implication), the report states that the vote-counting software has
been modified so many times that "the resulting 'spaghetti code' may
bide routines that could affect the -accuracy of results in subtle
ways, and it would be virtually impossible to find deliberately
erroneous routines." (Emphasis added.) The source codes of CES
programs, and those manufactured by companies with a smaller market
share, are usually impenetrably obscure, incapable of being
understood by "me voting public and even by the election officials
who run the programs. "They treat it like it was something handed
down on stone tablets. The codes should be in the public domain,"
says Robert Naegle, a federal elections consultant based in La Selva
Beach, south of Santa Cruz. Naegle authored the government's new
voluntary standards for computerized election tallying. But some of
his best suggestions were refused. , Naegle recommended to the
Federal Elections Commission (FEC) that all source codes be written
in "high level language," a computer language resembling English.
While still hard to understand for the uninitiated, the codes would
be more accessible than those written -- as most codes currently are -
- in digital "assembly language."

The FEC rejected Naegle's recommendation.

A 1980 Pennsylvania study, not related to any court case, found that
one CES program was so complex and jumbled that "it is possible to
alter its functioning without any record." the study's author,
University of Pittsburgh Professor Michael Shamos, recommended that
the state refuse to certify CES. The state ignored him.

State elections boards are being "buffeted by elections systems
salespeople," Shamos was quoted as saying in Datamation
magazine. "Punch cards result in disenfranchisement. The CES system
is riddled with scandal potential."

According to Santa Clara County Registrar of Voters George Mann, the
system is subject to a "logic and accuracy test" run before the
election, in which up to 45,000 pre-punched cards are fed through the
computer. The computer's count is matched against the actual count.
Members of news media and political office holders are invited to
view the test. Mann, however, concedes that the system's accuracy
could never be verified unless someone wanted to hand count
personally 45,O00 computer cards. They just have to take his -- and
the computer's -- word for it.

The punch-card system used by CES, called the Votomatic, has another
disadvantage that has long concerned computer voting critics: the
problem of the "hanging chad," The issue concerns the little
perforated squares that voters punch out of computer-voting cards,
known as "chad." When the paper rectangles aren't punched fully, they
hang from the card, creating an ambiguous ballot. Elections workers,
however, "sweep" the chad from the cards. The workers are put in the
questionable position of deciding whether voters intended to vote for
candidates where chad is incompletely punched. There are no laws in
California governing how voter intent is to be determined in the case
of ambiguous ballots. Usually, though, workers are not supposed to
remove chad unless it is hanging from the card by one or two
perforated corners.

Mann estimates that "less than five percent" of all punch cards come
into the counting room with hanging chad. But there has been many an
election decided by less than five percent of the vote. He also says
that when a ballot fails to run through the card-reading machine
correctly, election workers simply punch out a new ballot, attempting
to duplicate the one filled out by the voter. There is a rich history
of elections botched because of faulty card reading and counting. In
a 1970 election in Los Angeles, a computer assigned votes to the
wrong candidates and failed to read other votes at all. A Carroll
County, Maryland, school board election in 1984 was thrown into
confusion after a CES computer picked the wrong winner (the "true"
victor was later determined by a manual recount). Somehow, the
correct counting program had been replaced with a test program.

A four-way Dallas mayor's race in 1985 also featured oddities. When
the second-place finisher requested a recount, vote-totals changed in
161 of the city's 250 precincts. Roy Saltman, a government consultant
who wrote a 1988 report on "Accuracy, Integrity and Security in
Computerized Vote-Tallying," calls the count changes "perplexing" in
his report. The second-place candidate's campaign manager alleged
that the vote-counting computer's "instructions" were changed after
the count showed her candidate leading by 400 votes. At around 8 pm
on election night, her candidate was ahead when the computer went
down. When it came back up, he was trailing.

And election that same year in Arizona experienced a near-miss when a
mistake that would have given all Democratic votes to Republicans.

Those are just a few of the sizable list of elections that have been
distorted by faulty computerized counting. in 1985, the wrong man was
elected to the Moline, Ill., board of aldermen. In the 1986 general
election, the computer simply skipped two percent of the ballots in
Oklahoma County, Okla., effectively disenfranchising hundreds of
voters.

And so on.

Since CES changed its name to Business Records Corporation there is
now a new Computer Election Services. This separate company was
founded by Robert Varni, a founder of the original CES in the 1960s.
His company, located in a Benecia industrial park, is planning to
market a "chad free" punch card system and hopes to reestablish what
Varni says was the original, sterling reputation of CES -- a
reputation that has been tarnished in the original company's later
years.

Another founder of the "first" CES has a similar idea. Jack Gerbel's
company, Unilect of Dublin, Calif., is also selling a chad-free punch
manufactured by Triad of Ohio. In fact, Gerbel says he has "no
knowledge" of any other chad-free punch and was surprised to hear of
Varni's system.

But punch-card voting may be on the way out, replaced by more
advanced technology. the trend in the computer elections business is
toward "direct recording" machines -- basically, automatic teller
machines for voters. These machines increase the convenience of
voting and the speed with which votes can be tabulated on election
night. But since there are no ballots,, there is no way to manually
verify the machine's counts. Some direct recording devices are
capable of transmitting counts immediately over phone lines or even
via satellite.

Consultant Naegle recommended to the Federal Elections Commission
that direct recording machines should have some way of recording
votes independent of its own internal memory. Again, the FEC rejected
what seems like a sensible, even crucial, suggestion.

One of the most widely used direct recording machines is called
the "Shouptronic" named for its company, R.F. Shoup. The president of
that company, Ransom Shoup II,  was convicted in 1979 of conspiracy
and obstruction of justice related to an FBI inquiry into a lever
machine-counted election in Philadelphia.

New York City is now prepared to spend up to $50 million to convert
its elections to direct recording machines or another electronic
system known as "optical mark." the Shouptronic is among the
candidates in a furious campaign to win the Big Apple contract.

-----------------------------------------------------------------------------------------------------------
Linked stories:
                        ********************
The US election crisis: why is Ralph Nader silent?
<http://www.wsws.org/articles/2000/nov2000/nad-n24.shtml>

                        ********************
======================================================
"Anarchy doesn't mean out of control. It means out of 'their' control."
        -Jim Dodge
======================================================
"Communications without intelligence is noise;
intelligence without communications is irrelevant."
        -Gen. Alfred. M. Gray, USMC
======================================================
"It is not a sign of good health to be well adjusted to a sick society."
        -J. Krishnamurti
______________________________________________________________
To subscribe/unsubscribe or for a sample copy or a list of back issues,
send appropriate email to <[EMAIL PROTECTED]>.
______________________________________________________________
**How to assist RadTimes:
An account is available at <www.paypal.com> which enables direct donations.
If you are a current PayPal user, use this email address:
<[EMAIL PROTECTED]>, to contribute. If you are not a current user, use this
link: <https://secure.paypal.com/refer/pal=resist%40best.com> to sign up
and contribute. The only information passed on to me via this process is
your email address and the amount you transfer.
Thanks!
______________________________________________________________

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to