How to get to the bottom of this?  Who to trust with the answers?

A *balanced* Presidential Commission, with open televised hearings might be
the only way to go.  Pick a staff of respected net experts, experts who are
trusted and can't be muzzled.

arthur

-----Original Message-----
From: Selma Singer [mailto:[EMAIL PROTECTED]
Sent: Wednesday, October 15, 2003 9:41 AM
To: [EMAIL PROTECTED]
Subject: [Futurework] Fw: All the President's votes? [long; important]


I believe this is the single most important issue facing Americans today,
bar none.

Selma





----- Original Message ----- 
: Tuesday, October 14, 2003 8:58 PM
Subject: All the President's votes?


> A quiet revolution is taking place in US politics. By the time it's over,
> the integrity of elections will be in the unchallenged, unscrutinised
> control of a few large - and pro-Republican - corporations. Andrew Gumbel
> wonders if democracy in America can survive
>
> http://news.independent.co.uk/world/americas/story.jsp?story=452972
>
> The Independent, London
> 14 October 2003
>
> Something very odd happened in the mid-term elections in Georgia last
> November. On the eve of the vote, opinion polls showed Roy Barnes, the
> incumbent Democratic governor, leading by between nine and 11 points. In a
> somewhat closer, keenly watched Senate race, polls indicated that Max
> Cleland, the popular Democrat up for re-election, was ahead by two to five
> points against his Republican challenger, Saxby Chambliss.
>
> Those figures were more or less what political experts would have expected
> in state with a long tradition of electing Democrats to statewide office.
> But then the results came in, and all of Georgia appeared to have been
> turned upside down. Barnes lost the governorship to the Republican, Sonny
> Perdue, 46 per cent to 51 per cent, a swing of as much as 16 percentage
> points from the last opinion polls. Cleland lost to Chambliss 46 per cent
> to 53, a last-minute swing of 9 to 12 points.
>
> Red-faced opinion pollsters suddenly had a lot of explaining to do and
> launched internal investigations. Political analysts credited the upset -
> part of a pattern of Republican successes around the country - to a huge
> campaigning push by President Bush in the final days of the race. They
> also said that Roy Barnes had lost because of a surge of "angry white men"
> punishing him for eradicating all but a vestige of the old confederate
> symbol from the state flag.
>
> But something about these explanations did not make sense, and they have
> made even less sense over time. When the Georgia secretary of state's
> office published its demographic breakdown of the election earlier this
> year, it turned out there was no surge of angry white men; in fact, the
> only subgroup showing even a modest increase in turnout was black women.
>
> There were also big, puzzling swings in partisan loyalties in different
> parts of the state. In 58 counties, the vote was broadly in line with the
> primary election. In 27 counties in Republican-dominated north Georgia,
> however, Max Cleland unaccountably scored 14 percentage points higher than
> he had in the primaries. And in 74 counties in the Democrat south, Saxby
> Chambliss garnered a whopping 22 points more for the Republicans than the
> party as a whole had won less than three months earlier.
>
> Now, weird things like this do occasionally occur in elections, and the
> figures, on their own, are not proof of anything except statistical
> anomalies worthy of further study. But in Georgia there was an extra
> reason to be suspicious. Last November, the state became the first in the
> country to conduct an election entirely with touchscreen voting machines,
> after lavishing $54m (33m) on a new system that promised to deliver the
> securest, most up-to-date, most voter-friendly election in the history of
> the republic. The machines, however, turned out to be anything but
> reliable. With academic studies showing the Georgia touchscreens to be
> poorly programmed, full of security holes and prone to tampering, and with
> thousands of similar machines from different companies being introduced at
> high speed across the country, computer voting may, in fact, be US
> democracy's own 21st-century nightmare.
>
> In many Georgia counties last November, the machines froze up, causing
> long delays as technicians tried to reboot them. In heavily Democratic
> Fulton County, in downtown Atlanta, 67 memory cards from the voting
> machines went missing, delaying certification of the results there for 10
> days. In neighbouring DeKalb County, 10 memory cards were unaccounted for;
> they were later recovered from terminals that had supposedly broken down
> and been taken out of service.
>
> It is still unclear exactly how results from these missing cards were
> tabulated, or if they were counted at all. And we will probably never
> know, for a highly disturbing reason. The vote count was not conducted by
> state elections officials, but by the private company that sold Georgia
> the voting machines in the first place, under a strict trade-secrecy
> contract that made it not only difficult but actually illegal - on pain of
> stiff criminal penalties - for the state to touch the equipment or examine
> the proprietary software to ensure the machines worked properly. There was
> not even a paper trail to follow up. The machines were fitted with thermal
> printing devices that could theoretically provide a written record of
> voters' choices, but these were not activated. Consequently, recounts were
> impossible. Had Diebold Inc, the manufacturer, been asked to review the
> votes, all it could have done was programme the computers to spit out the
> same data as before, flawed or not.
>
> Astonishingly, these are the terms under which America's top three
> computer voting machine manufacturers - Diebold, Sequoia and Election
> Systems and Software (ES&S) - have sold their products to election
> officials around the country. Far from questioning the need for rigid
> trade secrecy and the absence of a paper record, secretaries of state and
> their technical advisers - anxious to banish memories of the hanging chad
> fiasco and other associated disasters in the 2000 presidential recount in
> Florida - have, for the most part, welcomed the touchscreen voting
> machines as a technological miracle solution.
>
> Georgia was not the only state last November to see big last-minute swings
> in voting patterns. There were others in Colorado, Minnesota, Illinois and
> New Hampshire - all in races that had been flagged as key partisan
> battlegrounds, and all won by the Republican Party. Again, this was widely
> attributed to the campaigning efforts of President Bush and the
> demoralisation of a Democratic Party too timid to speak out against the
> looming war in Iraq.
>
> Strangely, however, the pollsters made no comparable howlers in lower-key
> races whose outcome was not seriously contested. Another anomaly, perhaps.
> What, then, is one to make of the fact that the owners of the three major
> computer voting machines are all prominent Republican Party donors? Or of
> a recent political fund-raising letter written to Ohio Republicans by
> Walden O'Dell, Diebold's chief executive, in which he said he was
> "committed to helping Ohio to deliver its electoral votes to the president
> next year" - even as his company was bidding for the contract on the
> state's new voting machinery?
>
> Alarmed and suspicious, a group of Georgia citizens began to look into
> last November's election to see whether there was any chance the results
> might have been deliberately or accidentally manipulated. Their research
> proved unexpectedly, and disturbingly, fruitful.
>
> First, they wanted to know if the software had undergone adequate
> checking. Under state and federal law, all voting machinery and component
> parts must be certified before use in an election. So an Atlanta graphic
> designer called Denis Wright wrote to the secretary of state's office for
> a copy of the certification letter. Clifford Tatum, assistant director of
> legal affairs for the election division, wrote back: "We have determined
> that no records exist in the Secretary of State's office regarding a
> certification letter from the lab certifying the version of software used
> on Election Day." Mr Tatum said it was possible the relevant documents
> were with Gary Powell, an official at the Georgia Technology Authority, so
> campaigners wrote to him as well. Mr Powell responded he was "not sure
> what you mean by the words 'please provide written certification
> documents' ".
>
> "If the machines were not certified, then right there the election was
> illegal," Mr Wright says. The secretary of state's office has yet to
> demonstrate anything to the contrary. The investigating citizens then
> considered the nature of the software itself. Shortly after the election,
> a Diebold technician called Rob Behler came forward and reported that,
> when the machines were about to be shipped to Georgia polling stations in
> the summer of 2002, they performed so erratically that their software had
> to be amended with a last-minute "patch". Instead of being transmitted via
> disk - a potentially time-consuming process, especially since its author
> was in Canada, not Georgia - the patch was posted, along with the entire
> election software package, on an open-access FTP, or file transfer
> protocol site, on the internet.
>
> That, according to computer experts, was a violation of the most basic of
> security precautions, opening all sorts of possibilities for the
> introduction of rogue or malicious code. At the same time, however, it
> gave campaigners a golden opportunity to circumvent Diebold's own secrecy
> demands and see exactly how the system worked. Roxanne Jekot, a computer
> programmer with 20 years' experience, and an occasional teacher at Lanier
> Technical College northeast of Atlanta, did a line-by-line review and
> found "enough to stand your hair on end".
>
> "There were security holes all over it," she says, "from the most basic
> display of the ballot on the screen all the way through the operating
> system." Although the programme was designed to be run on the Windows 2000
> NT operating system, which has numerous safeguards to keep out intruders,
> Ms Jekot found it worked just fine on the much less secure Windows 98; the
> 2000 NT security features were, as she put it, "nullified".
>
> Also embedded in the software were the comments of the programmers working
> on it. One described what he and his colleagues had just done as "a gross
> hack". Elsewhere was the remark: "This doesn't really work." "Not a
> confidence builder, would you say?" Ms Jekot says. "They were operating in
> panic mode, cobbling together something that would work for the moment,
> knowing that at some point they would have to go back to figure out how to
> make it work more permanently." She found some of the code downright
> suspect - for example, an overtly meaningless instruction to divide the
> number of write-in votes by 1. "From a logical standpoint there is
> absolutely no reason to do that," she says. "It raises an immediate red
> flag."
>
> Mostly, though, she was struck by the shoddiness of much of the
> programming. "I really expected to have some difficulty reviewing the
> source code because it would be at a higher level than I am accustomed
> to," she says. "In fact, a lot of this stuff looked like the homework my
> first-year students might have turned in." Diebold had no specific comment
> on Ms Jekot's interpretations, offering only a blanket caution about the
> complexity of election systems "often not well understood by individuals
> with little real-world experience".
>
> But Ms Jekot was not the only one to examine the Diebold software and find
> it lacking. In July, a group of researchers from the Information Security
> Institute at Johns Hopkins University in Baltimore discovered what they
> called "stunning flaws". These included putting the password in the source
> code, a basic security no-no; manipulating the voter smart-card function
> so one person could cast more than one vote; and other loopholes that
> could theoretically allow voters' ballot choices to be altered without
> their knowledge, either on the spot or by remote access.
>
> Diebold issued a detailed response, saying that the Johns Hopkins report
> was riddled with false assumptions, inadequate information and "a
> multitude of false conclusions". Substantially similar findings, however,
> were made in a follow-up study on behalf of the state of Maryland, in
> which a group of computer security experts catalogued 328 software flaws,
> 26 of them critical, putting the whole system "at high risk of
> compromise". "If these vulnerabilities are exploited, significant impact
> could occur on the accuracy, integrity, and availability of election
> results," their report says.
>
> Ever since the Johns Hopkins study, Diebold has sought to explain away the
> open FTP file as an old, incomplete version of its election package. The
> claim cannot be independently verified, because of the trade-secrecy
> agreement, and not everyone is buying it. "It is documented throughout the
> code who changed what and when. We have the history of this programme from
> 1996 to 2002," Ms Jekot says. "I have no doubt this is the software used
> in the elections." Diebold now says it has upgraded its encryption and
> password features - but only on its Maryland machines.
>
> A key security question concerned compatibility with Microsoft Windows,
> and Ms Jekot says just three programmers, all of them senior Diebold
> executives, were involved in this aspect of the system. One of these,
> Diebold's vice-president of research and development, Talbot Iredale,
> wrote an e-mail in April 2002 - later obtained by the campaigners - making
> it clear that he wanted to shield the operating system from Wylie Labs, an
> independent testing agency involved in the early certification process.
>
> The reason that emerges from the e-mail is that he wanted to make the
> software compatible with WinCE 3.0, an operating system used for handhelds
> and PDAs; in other words, a system that could be manipulated from a remote
> location. "We do not want Wyle [sic] reviewing and certifying the
> operating systems," the e-mail reads. "Therefore can we keep to a minimum
> the references to the WinCE 3.0 operating system."
>
> In an earlier intercepted e-mail, this one from Ken Clark in Diebold's
> research and development department, the company explained upfront to
> another independent testing lab that the supposedly secure software system
> could be accessed without a password, and its contents easily changed
> using the Microsoft Access programme. Mr Clark says he had considered
> putting in a password requirement to stop dealers and customers doing
> "stupid things", but that the easy access had often "got people out of a
> bind". Astonishingly, the representative from the independent testing lab
> did not see anything wrong with this and granted certification to the part
> of the software programme she was inspecting - a pattern of lackadaisical
> oversight that was replicated all the way to the top of the political
> chain of command in Georgia, and in many other parts of the country.
>
> Diebold has not contested the authenticity of the e-mails, now openly
> accessible on the internet. However, Diebold did caution that, as the
> e-mails were taken from a Diebold Election systems website in March 2003
> by an illegal hack, the nature of the information stolen could have been
> revised or manipulated.
>
> There are two reasons why the United States is rushing to overhaul its
> voting systems. The first is the Florida dbcle in the Bush-Gore election;
> no state wants to be the centre of that kind of attention again. And the
> second is the Help America Vote Act (HAVA), signed by President Bush last
> October, which promises an unprecedented $3.9bn (2.3bn) to the states to
> replace their old punchcard-and-lever machines. However, enthusiasm for
> the new technology seems to be motivated as much by a bureaucratic love of
> spending as by a love of democratic accountability. According to Rebecca
> Mercuri, a research fellow at Harvard's John F Kennedy School of
> Government and a specialist in voting systems, the shockingly high error
> rate of punchcard machines (3-5 per cent in Florida in 2000) has been
> known to people in the elections business for years. It was only after it
> became public knowledge in the last presidential election that anybody
> felt moved to do anything about it.
>
> The problem is, computer touchscreen machines and other so-called DRE
> (direct recording electronic) systems are significantly less reliable than
> punchcards, irrespective of their vulnerability to interference. In a
> series of research papers for the Voting Technology Project, a joint
> venture of the prestigious Massachussetts and California Institutes of
> Technology, DREs were found to be among the worst performing systems. No
> method, the MIT/CalTech study conceded, worked more reliably than
> hand-counting paper ballots - an option that US electoral officials seem
> to consider hopelessly antiquated, or at least impractical in elections
> combining multiple local, state and national races for offices from
> President down to dogcatcher.
>
> The clear disadvantages and dangers associated with DREs have not deterred
> state and county authorities from throwing themselves headlong into
> touchscreen technology. More than 40,000 machines made by Diebold alone
> are already in use in 37 states, and most are touchscreens. County after
> county is poised to spend hundreds of millions of dollars more on computer
> voting before next spring's presidential primaries. "They say this is the
> direction they have to go in to have fair elections, but the rush to go
> towards computerisation is very dubious," Dr Mercuri says. "One has to
> wonder why this is going on, because the way it is set up it takes away
> the checks and balances we have in a democratic society. That's the whole
> point of paper trails and recounts."
>
> Anyone who has struggled with an interactive display in a museum knows how
> dodgy touchscreens can be. If they don't freeze, they easily become
> misaligned, which means they can record the wrong data. In Dallas, during
> early voting before last November's election, people found that no matter
> how often they tried to press a Democrat button, the Republican
> candidate's name would light up. After a court hearing, Diebold agreed to
> take down 18 machines with apparent misalignment problems. "And those were
> the ones where you could visually spot a problem," Dr Mercuri says. "What
> about what you don't see? Just because your vote shows up on the screen
> for the Democrats, how do you know it is registering inside the machine
> for the Democrats?"
>
> Other problems have shown up periodically: machines that register zero
> votes, or machines that indicate voters coming to the polling station but
> not voting, even when a single race with just two candidates was on the
> ballot. Dr Mercuri was part of a lawsuit in Palm Beach County in which she
> and other plaintiffs tried to have a suspect Sequoia machine examined,
> only to run up against the brick wall of the trade-secret agreement. "It
> makes it really hard to show their product has been tampered with," she
> says, "if it's a felony to inspect it."
>
> As for the possibilities of foul play, Dr Mercuri says they are virtually
> limitless. "There are literally hundreds of ways to do this," she says.
> "There are hundreds of ways to embed a rogue series of commands into the
> code and nobody would ever know because the nature of programming is so
> complex. The numbers would all tally perfectly." Tampering with an
> election could be something as simple as a "denial-of-service" attack, in
> which the machines simply stop working for an extended period, deterring
> voters faced with the prospect of long lines. Or it could be done with
> invasive computer codes known in the trade by such nicknames as "Trojan
> horses" or "Easter eggs". Detecting one of these, Dr Mercuri says, would
> be almost impossible unless the investigator knew in advance it was there
> and how to trigger it. Computer researcher Theresa Hommel, who is alarmed
> by touchscreen systems, has constructed a simulated voting machine in
> which the same candidate always wins, no matter what data you put in. She
> calls her model the Fraud-o-matic, and it is available online at
> www.wheresthepaper.org.
>
> It is not just touchscreens which are at risk from error or malicious
> intrusion. Any computer system used to tabulate votes is vulnerable. An
> optical scan of ballots in Scurry County, Texas, last November erroneously
> declared a landslide victory for the Republican candidate for county
> commissioner; a subsequent hand recount showed that the Democrat had in
> fact won. In Comal County, Texas, a computerised optical scan found that
> three different candidates had won their races with exactly 18,181 votes.
> There was no recount or investigation, even though the coincidence, with
> those recurring 1s and 8s, looked highly suspicious. In heavily Democrat
> Broward County, Florida - which had switched to touchscreens in the wake
> of the hanging chad furore - more than 100,000 votes were found to have
> gone "missing" on election day. The votes were reinstated, but the glitch
> was not adequately explained. One local official blamed it on a "minor
> software thing".
>
> Most suspect of all was the governor's race in Alabama, where the
> incumbent Democrat, Don Siegelman, was initially declared the winner.
> Sometime after midnight, when polling station observers and most staff had
> gone home, the probate judge responsible for elections in rural Baldwin
> County suddenly "discovered" that Mr Siegelman had been awarded 7,000
> votes too many. In a tight election, the change was enough to hand victory
> to his Republican challenger, Bob Riley. County officials talked vaguely
> of a computer tabulation error, or a lightning strike messing up the
> machines, but the real reason was never ascertained because the state's
> Republican attorney general refused to authorise a recount or any
> independent ballot inspection.
>
> According to an analysis by James Gundlach, a sociology professor at
> Auburn University in Alabama, the result in Baldwin County was full of
> wild deviations from the statistical norms established both by this and
> preceding elections. And he adds: "There is simply no way that electronic
> vote counting can produce two sets of results without someone using
> computer programmes in ways that were not intended. In other words, the
> fact that two sets of results were reported is sufficient evidence in and
> of itself that the vote tabulation process was compromised." Although talk
> of voting fraud quickly subsided, Alabama has now amended its election
> laws to make recounts mandatory in close races.
>
> The possibility of flaws in the electoral process is not something that
> gets discussed much in the United States. The attitude seems to be: we are
> the greatest democracy in the world, so the system must be fair. That has
> certainly been the prevailing view in Georgia, where even leading
> Democrats - their prestige on the line for introducing touchscreen voting
> in the first place - have fought tooth-and-nail to defend the integrity of
> the system. In a phone interview, the head of the Georgia Technology
> Authority who brought Diebold machines to the state, Larry Singer, blamed
> the growing chorus of criticism on "fear of technology", despite the fact
> that many prominent critics are themselves computer scientists. He says:
> "Are these machines flawless? No. Would you have more confidence if they
> were completely flawless? Yes. Is there such a thing as a flawless system?
> No." Mr Singer, who left the GTA straight after the election and took a 50
> per cent pay cut to work for Sun Microsystems, insists that voters are
> more likely to have their credit card information stolen by a busboy in a
> restaurant than to have their vote compromised by touchscreen technology.
>
> Voting machines are sold in the United States in much the same way as
> other government contracts: through intensive lobbying, wining and dining.
> At a recent national conference of clerks, election officials and
> treasurers in Denver, attendees were treated to black-tie dinners and
> other perks, including free expensive briefcases stamped with Sequoia's
> company logo alongside the association's own symbol. Nobody in power seems
> to find this worrying, any more than they worried when Sequoia's southern
> regional sales manager, Phil Foster, was indicted in Louisiana a couple of
> years ago for "conspiracy to commit money laundering and malfeasance". The
> charges were dropped in exchange for his testimony against Louisiana's
> state commissioner of elections. Similarly, last year, the Arkansas
> secretary of state, Bill McCuen, pleaded guilty to taking bribes and
> kickbacks involving a precursor company to ES&S; the voting machine
> company executive who testified against him in exchange for immunity is
> now an ES&S vice-president.
>
> If much of the worry about vote-tampering is directed at the Republicans,
> it is largely because the big three touchscreen companies are all big
> Republican donors, pouring hundreds of thousands of dollars into party
> coffers in the past few years. The ownership issue is, of course,
> compounded by the lack of transparency. Or, as Dr Mercuri puts it: "If the
> machines were independently verifiable, who would give a crap who owns
> them?" As it is, fears that US democracy is being hijacked by corporate
> interests are being fuelled by links between the big three and broader
> business interests, as well as extremist organisations. Two of the early
> backers of American Information Systems, a company later merged into ES&S,
> are also prominent supporters of the Chalcedon Foundation, an organisation
> that espouses theocratic governance according to a literal reading of the
> Bible and advocates capital punishment for blasphemy and homosexuality.
>
> The chief executive of American Information Systems in the early Nineties
> was Chuck Hagel, who went on to run for elective office and became the
> first Republican in 24 years to be elected to the Senate from Nebraska,
> cheered on by the Omaha World-Herald newspaper which also happens to be a
> big investor in ES&S. In yet another clamorous conflict of interest, 80
> per cent of Mr Hagel's winning votes - both in 1996 and again in 2002 -
> were counted, under the usual terms of confidentiality, by his own
> company.
>
> In theory, the federal government should be monitoring the transition to
> computer technology and rooting out abuses. Under the Help America Vote
> Act, the Bush administration is supposed to establish a sizeable oversight
> committee, headed by two Democrats and two Republicans, as well as a
> technical panel to determine standards for new voting machinery. The four
> commission heads were supposed to have been in place by last February, but
> so far just one has been appointed. The technical panel also remains
> unconstituted, even though the new machines it is supposed to vet are
> already being sold in large quantities - a state of affairs Dr Mercuri
> denounces as "an abomination".
>
> One of the conditions states have to fulfil to receive federal funding for
> the new voting machines, meanwhile, is a consolidation of voter rolls at
> state rather than county level. This provision sends a chill down the
> spine of anyone who has studied how Florida consolidated its own voter
> rolls just before the 2000 election, purging the names of tens of
> thousands of eligible voters, most of them African Americans and most of
> them Democrats, through misuse of an erroneous list of convicted felons
> commissioned by Katherine Harris, the secretary of state doubling as
> George Bush's Florida campaign manager. Despite a volley of lawsuits, the
> incorrect list was still in operation in last November's mid-terms,
> raising all sorts of questions about what other states might now do with
> their own voter rolls. It is not that the Act's consolidation provision is
> in itself evidence of a conspiracy to throw elections, but it does leave
> open that possibility.
>
> Meanwhile, the administration has been pushing new voting technology of
> its own to help overseas citizens and military personnel, both natural
> Republican Party constituencies, to vote more easily over the internet.
> Internet voting is notoriously insecure and open to abuse by just about
> anyone with rudimentary hacking skills; just last January, an experiment
> in internet voting in Toronto was scuppered by a Slammer worm attack.
> Undeterred, the administration has gone ahead with its so-called SERVE
> project for overseas voting, via a private consortium made up of major
> defence contractors and a Saudi investment group. The contract for
> overseeing internet voting in the 2004 presidential election was recently
> awarded to Accenture, formerly part of the Arthur Andersen group (whose
> accountancy branch, a major campaign contributor to President Bush,
> imploded as a result of the Enron bankruptcy scandal).
>
> Not everyone in the United States has fallen under the spell of the big
> computer voting companies, and there are signs of growing wariness. Oregon
> decided even before HAVA to conduct all its voting by mail. Wisconsin has
> decided it wants nothing to do with touchscreen machines without a
> verifiable paper trail, and New York is considering a similar injunction,
> at least for its state assembly races. In California, a Stanford computer
> science professor called David Dill is screaming from the rooftops on the
> need for a paper trail in his state, so far without result. And a New
> Jersey Congressman called Rush Holt has introduced a bill in the House of
> Representatives, the Voter Confidence and Increased Accessibility Act,
> asking for much the same thing. Not everyone is heeding the warnings,
> though. In Ohio, publication of the letter from Diebold's chief executive
> promising to deliver the state to President Bush in 2004 has not deterred
> the secretary of state - a Republican - from putting Diebold on a list of
> preferred voting-machine vendors. Similarly, in Maryland, officials have
> not taken the recent state-sponsored study identifying hundreds of flaws
> in the Diebold software as any reason to change their plans to use Diebold
> machines in March's presidential primary.
>
> The question is whether the country will come to its senses before
> elections start getting distorted or tampered with on such a scale that
> the system becomes unmanageable. The sheer volume of money offered under
> HAVA is unlikely to be forthcoming again in a hurry, so if things aren't
> done right now it is doubtful the system can be fixed again for a long
> time. "This is frightening, really frightening," says Dr Mercuri, and a
> growing number of reasonable people are starting to agree with her. One
> such is John Zogby, arguably the most reliable pollster in the United
> States, who has freely admitted he "blew" last November's elections and
> does not exclude the possibility that foul play was one of the factors
> knocking his calculations off course. "We're ploughing into a brave new
> world here," he says, "where there are so many variables aside from
> out-and-out corruption that can change elections, especially in situations
> where the races are close. We have machines that break down, or are
> tampered with, or are simply misunderstood. It's a cause for great
> concern."
>
> Roxanne Jekot, who has put much of her professional and personal life on
> hold to work on the issue full time, puts it even more strongly.
> "Corporate America is very close to running this country. The only thing
> that is stopping them from taking total control are the pesky voters.
> That's why there's such a drive to control the vote. What we're seeing is
> the corporatisation of the last shred of democracy.
>
> "I feel that unless we stop it here and stop it now," she says, "my kids
> won't grow up to have a right to vote at all."
>


_______________________________________________
Futurework mailing list
[EMAIL PROTECTED]
http://scribe.uwaterloo.ca/mailman/listinfo/futurework
_______________________________________________
Futurework mailing list
[EMAIL PROTECTED]
http://scribe.uwaterloo.ca/mailman/listinfo/futurework

Reply via email to