Jump to content
IndiaDivine.org

Bev Harris on the Feeney Story

Rate this topic


Guest guest

Recommended Posts

T

Tue, 7 Dec 2004 13:21:03 -0800 (PST)

Bev Harris on the Feeney Story

 

TUESDAY DEC 7 2004:

Why the Feeney vote-rigging story sounds like disinformation

 

ABOUT DISINFORMATION: Like a good lie, it has elements of truth.

Trouble is, the truth doesn't relate to the nuts and bolts of the

story. For example in the Tom Feeney vote-manipulation story, people

are documenting relationships between Tom Feeney and Yang, and between

the writer of the story and other scandals, but so far the evidence

presented does not back up the vote manipulation story itself.

 

DISINFORMATION IS DANGEROUS TO THE CLEAN VOTING MOVEMENT: Black Box

Voting is finding real evidence consistent with fraud. We are even

finding, in one of our investigations, evidence consistent with a

systemic, or widespread breakdown in security, possibly exploited.

Getting the facts is tedious, unexciting work, consisting of auditing

and personal interviews, and it takes time. Many Americans want a

magic bullet, a single shot that will blow the lid off everything at once.

 

That's risky. If the mainstream media continues to be bombarded with

stories that sound credible, but aren't, when the real thing comes

down the pike it will be ignored.

 

While MSNBC's Keith Olbermann and I had a run-in last week, I agree

absolutely with Olbermann's earlier critique of the Madsen homeland

security story, and this new Madsen story is just as weak. Most of

both Madsen stories are bait and switch.

 

While real journalists " write tight " and include only the information

directly relevant to the topic, Madsen wanders all over the place,

recapping unrelated information from real news agencies, piggybacking

onto their credibility, with only the most tenuous ties to what he is

actually trying to prove. Analyze the meat of the story, taking out

all the loose references to other stories, and Madsen's work gets very

weak indeed.

 

Here are questions raised by the Feeney vote-manipulation story:

 

1. One of the most significant problems is that, while Clint Curtis

describes a technique of writing a program, he never mentions HOW he

supposedly got this program into the voting machines.

 

2. A second significant problem is that several of the Florida

counties used different software in 2000 than they do now, and that

various Florida counties use different manufacturers and different

systems. Writing one program that would tamper with ES & S punch cards

and Diebold optical scans at the same time is somewhat unrealistic.

The questions this raises are these:

 

a. Which specific counties was this software supposedly used in for

2000, 2002 and 2004? Actually, from reading both the affidavit and the

Madsen article, there is no evidence it was used anywhere.

- Madsen does a bait and switch when he discusses Volusia County. He

starts by saying it is Feeney's district, and then actually goes on to

report a story broken by Black Box Voting in October, 2003, about

minus 16,022 votes for Bush in Volusia -- which appears to have

nothing to do with the Feeney story. What systems was his vote rigging

program for? Which manufacturers?

 

3. The techniques used to program a vote-rigging system in the Madsen

article don't actually match the techniques in the affidavit by Clint

Curtis, and neither one makes much sense. It's a simple matter to

re-map a touch-screen to flip votes, and you don't need a special

program for it. Simply switch the candidate ID numbers and it's done.

 

4. Most political shenanigans are not conducted by the candidate

himself, but by operatives. It is certainly possible for a politician

to hold several meetings in which he commits a felony in front of

several witnesses, but that's not usually how it is done. A more

common technique is an envelope full of cash left in a drawer of an

operative, with at least one, sometimes more, buffer layers between

the operative and the politician.

 

Clint Curtis says Feeney himself had meeting after meeting to directly

discuss election rigging software. Could happen, certainly, but this

seems unusual.

 

5. There are some statements that don't hang together from a

programming standpoint. The author says that it will be difficult to

write a program that will escape notice if the source code is

examined. That's not quite true.

 

Writing a trigger into a program can involve a very small amount of

code and there are several ways to do it. The idea is you write a very

simple, hard to detect trigger with as little code as possible -- or

you comment the code such that it looks like it is there for another

purpose. The trigger can do several kinds of things -- allow a user to

open up remote access without authentication, for example, or change

permissions so that the user can do things that are supposed to be

forbidden. In other words, the more complex program certainly would

not reside on the voting system, but would appear only when triggered,

or inserted by someone with access, or by remote access through

telephone lines.

 

5. Why write a whole software program anyway? You can do what needs to

be done with a VBA script, which never goes through certification,

never gets compiled, and enters the system like a virus. The program

described by the author is not a VBA script, but a compiled software

program. You can do anything you want if you obtain remote access such

that penetration of the computer itself is enabled. Why lock yourself

in, by writing a specific program into the source code?

 

6. The originator of the story, Clint, says he has filed a " QUITAM "

whistleblower suit, that is " pending. " This is one of the least

credible parts of the story. First, he doesn't spell it correctly. The

correct spelling is two words, " Qui Tam. " Next, Qui Tam cases MUST be

filed under seal. If a Qui Tam is filed in Florida, both the evidence

and the existence of the case must be sealed, and only the Florida

Attorney General can unseal it.

 

Black Box Voting Executive Director Bev Harris, and Black Box Voting

board member Jim March, filed a Qui Tam suit in California. Using a

California law, they refused to seal the evidence, but still had to

keep the existence of the case under seal. It did not come out from

under seal until the California Attorney General got the court to

unseal it, and the Associated Press covered the unsealing of the case.

You cannot keep the unsealing of a Qui Tam case away from the press.

The press has mentioned no such Qui Tam in Florida.

 

This leaves two possibilities: (1) He filed the Qui Tam and is

violating the court order to keep the case under seal, or (2) There is

no Qui Tam case on this.

 

To develop a more credible story, we'd like to see answers for the

following:

 

1. How the program got into the machine. Not " theoretically " how it

got in, but how Clint Curtis says he got it in there.

 

2. What systems were used (which manufacturers, and were they punch

card, optical scan or touch screen) in each of the counties, during

each of the years this manipulation supposedly occurred.

 

3. What's the deal on the Qui Tam, and how is he getting around the

sealing of the case?

 

http://blackboxvoting.org/#feeney

Link to comment
Share on other sites

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...