Godlike Productions - Discussion Forum
Users Online Now: 1,915 (Who's On?)Visitors Today: 901,052
Pageviews Today: 1,549,422Threads Today: 612Posts Today: 11,368
05:09 PM


Back to Forum
Back to Forum
Back to Thread
Back to Thread
REPLY TO THREAD
Subject iVotronic voting machines used in PA and other states have a known hack that can change every vote in the central election system.
User Name
 
 
Font color:  Font:








In accordance with industry accepted best practices we ask that users limit their copy / paste of copyrighted material to the relevant portions of the article you wish to discuss and no more than 50% of the source material, provide a link back to the original article and provide your original comments / criticism in your post with the article.
Original Message Now here are your voting machines and the issue they admit about them, remember this is just what they admit to.


Things to Look Out For

• The PEB slot on the face of the iVotronic is particularly sensitive. The EVEREST study showed that a voter with a magnet and a properly programmed PDA (with an infrared port) could gain privileged access to the sensitive functions of the machine. If you see anyone spending a long time in an iVotronic voting booth and engaging in activity that appears to be centered around the upper-left part of the iVotronic, they might be messing with the PEB slot. Of course, they might also just be voting, so don’t cry wolf.

• The VVPAT printer (RTAL printer) is connected to the iVotronic via a cable that is connected to the top of the machine. This cable, unless the jurisdiction has purchased special cables or connectors, can be disconnected by a voter and various types of mischief could be performed (from printing extra VVPAT records to messing with the internals of the iVotronic). If you observe anyone disconnecting this cable, alert the pollworkers immediately. If a pollworker is disconnecting this cable, it should only be to swap out a printer and you should be able to observe the whole process.

• The PEB device is particularly sensitive. An attacker who gains access to a PEB for a short or extended period of time can change votes on the PEB or attack the central Election Management System when the PEB is returned to election headquarters. PEB devices should only be handled by pollworkers and pollworkers should keep a vigilant watch over their use of the PEBs throughout the day (that is, they should not be leaving them around casually and the area in which the PEBs are kept should be secure and monitored at all times). If you see a voter or non-pollworker with a PEB, notify election protection immediatey.


This page at the link with the info above was erased the day after the election! [link to www.verifiedvotingfoundation.org]









Here was the original post I did, or one of them anyway. Thread: Voting machines in N.C. are giving vote to Obama when voters cast ballot for Romney (Page 3)



Now going to take you all back to 2007 and what the same machines did.

After the primary election, Martin Cuellar beat incumbent Rick Flores by 37 votes. After the first recount, Flores beat Cuellar by 133 votes, a 170 vote swing. After the second recount, Cuellar came out on top by 39 votes. The second recount was monitored by the court and allowed poll watchers to actually watch. E&S [sic]software is blamed for difference in election day results versus second recount results.

[Webb County Elections Administrator Oscar Villarreal] said electronic voting machines use what is called a Personal Electronic Ballot (PEB), which is a cartridge that stores vote information. The PEB is inserted in a computer that tallies the votes.

"That (information) is downloaded into the computer, and the computer includes it into the totals," he said. "On a recount, you can't print ballot images from the PEB; you have to actually insert a flashcard."

He said Precinct 231 illustrated the problem.

"In 231, it was reported that 72 people voted (electronically) ... on election night through the PEB," he said. "When ballot images were shown from the flashcards, it was only showing 43."




[link to www.bbvforums.org]

Now going to quote the investigation of what happened.

Page 56 of the report, though read the whole thing it is crazy!

Attacks via input from precincts As discussed in Section 6.2, malicious input carried on iVotronic and M100 results media can take over the Unity system when it is loaded for counting. This enables many of the most serious and comprehensive attacks we discovered.


Right here above they admit the machines were hacked but the votes stood.
report in full [link to www.bbvdocs.org]
Pictures (click to insert)
5ahidingiamwithranttomatowtf
bsflagIdol1hfbumpyodayeahsure
banana2burnitafros226rockonredface
pigchefabductwhateverpeacecool2tounge
 | Next Page >>





GLP