Holy Kos trolls Batman! AnonymousArmy is Free Republic’s good friend!

AnonymousArmy, Free Republic’s good friend and all around nice guy, revealed – Part one of two

The following is a quote from Free Republic:

To: PJ-Comix; franksolich; KJC1; commonguymd; feefee; Repub4bush

My, my, my, my, my, my, my! It looks like our good friend Anonymous Army (Pitt’s arch-nemisis and all round good guy) managed to save Pitt’s raving, drunken rant to Skinner. Timing is everything! http://www.dailykos.com/story/2006/5/15/33446/1501.

AnonymousArmy, their good friend

StandupGuy, SomthingsGotaGive, Scamdy, MrNiceGuyDied, Techno Dog – the list is growing longer, and less and less distinguished.

He claims to be nothing more than a lefty chef from Canada, battling those on the left who make other lefties look bad.

Nothing could be further from the truth.

Please join me on the flip for more on one of Daily Kos’s most infamous trolls, AnonymousArmy.

He recruits people under the guise of going after moderate Democrats…

Hey John howzit going.
Hope all is well with you.

I have spent the last month building a site that would allow me to censor and ban moderates the way the DLC net is doing to us less inclined to work with these murderous btards.

lol

In early 2005, he pondered out loud about spoofing emails to go after others…

Imagine if you could send emails to people that looked like they were coming from someone else.

As of now I have no idea how or if it can be done.

But I do know that with some obfuscating we could get emails to look confusing with things like cc and header copies but the holy grail would be an email that looked like it came directly from a 3rd party and would redirect replies.

If we can find hackers that can do that we could start sending fishing expedition emails.

When confronted with evidence that he, was working with other doggie-style names to help discredit Jason Leopold via the “Jason and his sockpuppets” story, he pretended that TopsecretK9 was not right wing, or maybe Jason, and even spoke about his “army”…

hey moron… if you want to make yourself useful you could go through as many of those topsectr posts as you can find.

I found several alarming posts. I am going to prove it is him, don’t you worry about that, instead please look for alarming posts ASSUMING it is leopold playing both sides of the fence.

Either this guy is leopold linking to an image on a critics photobucket account which I couldn’t find a single public reference too, someone pretending to be leopold ie ts9 trying to defend leopold by slamming me and kos but slipping up by linking to his own account, leopold using ts9 as a sock to play both sides, or my army making this whole thing up.

Daily Kos needs to take immediate action against this lefty wannabe, who continues to mislead others in order to create chaos and dissension.

To be continued,

John

Trolls, Trojan Horse Trolls, and Diebold’s Robert Pelletier

Part 2 in a series…Part 1 can be found here.

Blackboxvoting.org recently released a report that irrefutably proves Robert Pelletier of Diebold has been conducting a covert campaign to harass and discredit Bev Harris, and other folks involved in BBV research.

There are some folks out these that would have you believe otherwise. In this diary, I will attempt to coherantly lay out the evidence that proves those folks wrong.

If there is a single thing I’d like readers to get out of this, it’s that Trojan Horse trolls exist – trolls that start off acting like real Dems or other lefties, in order to fool us.

Recent examples include:

  1.  Anonymousarmy (AA) at Daily Kos, who began his (known) operations at DU as StandupGuy, and then SomthingsGotaGive, before evolving into Andyscam, MrNiceGuyDied, and most recently, Techno Dog at DU.
  2.  Topsecretk9, at various sites.  Posted as a lefty last year, evolved, and is now immersed in a campaign along with AA to discredit Jason Leopold, by creating false evidence that AA then used, by creating the impression that Jason was emailing the link to this jpg as proof of real evidence.  I intend to diary about all of this soon.

    [UPDATE} – Wow, AA even fooled me for a change – contrary to his claim, the screen capture from the PACER system showing “Sealed vs Sealed” was genuine – I went to PACER, signed up, and saw it myself. It really does appear while the URL still ends in “login.pl”

    However, the purpose behind using the screen capture remains the same – AA used it to add more juice to the campaign to discredit Jason.

Now for the subject at hand…please join me on the flip side for more on Diebold’s Robert Pelletier, and his covert campaign.

David Allen, Bev’s former, fired publisher, has this to say about the recent expose’ on Diebold’s Robert Pelletier: “She claims that the site hosting this MP3 is a Diebold front, but offers no proof.”

No proof David?
(courtesy of blackboxvoting.org)

Today, I will take people step-by-step through the evidence that proves Diebold’s Robert Pelletier is behind a covert campaign to harass and malign Bev Harris, and other folks involved in BBV research.

1.  WHOIS on blackboxwatchdog.com reveals:

Registrant, Admin and Technical:
Jean-Claude Van Camme
77 E. Main St, Tucker, GA (fake address)
jcvancamme@hotmail.com

IP: 69.93.182.85
Domain Servers
NS1.SYNERGYDESIGNS.NET
NS2.SYNERGYDESIGNS.NET

2.  WHOIS on synergydesigns.net reveals:

Registrant:
Synergy Designs
no spam
Vancouver, British Columbia v2b1a1
Canada

IP: 69.93.182.83
Domain Servers
NS2.SYNERGYDESIGNS.NET
NS1.SYNERGYDESIGNS.NET

3.  WHOIS on synergydesigns from 3/16/04 reveals:

Registrant and Admin:
Synergy Designs
4 South Main
Wilmington, NC 28403
aimee@synergydesigns.net

Domain Servers
NS1.SYNERGYDESIGNS.NET 69.93.182.82
NS2.SYNERGYDESIGNS.NET 69.93.182.83

4. Google on jcvancamme

5. This link is found via our Google search

6. Let’s examine the link…

6a) A poster by the name of therealrobp is complaining about Remarkable Hosting.

6b) “Remarkable” responds with the following quotes:

“Rob. My notice to Aimee was very clear and you are not proving all the information.”

“We were going to notify you, but Aimee canceled the account the very same night before we had the chance.”

6c) Rob responds: “…was because my wife “cancelled the account” right before…”

6d) Remarkable responds:

“Rob. I am sorry about that. We have refunded the charge back to your credit card. This was a mistake due having conflicting contact information. Your account was opened by Amiee and at sometime take over by you; we do not have accurate contact information. I found the account and removed the credit card from the system. The account is now closed.

BTW Your whois information is a bit misleading making it very hard to contact you.

Registered through: GoDaddy.com
Domain Name: CAMLIVES.COM
Administrative Contact:
Van Camme, Jean-Claude jcvancamme@hotmail.com
77 E Main St
Tucker, Georgia 30085
United States
(917) 210-6543 Fax —

SUMMARY SO FAR – www.blackboxwatchdog is registered by JC Van Camme, with a fake address of 77 E. Main St, Tucker, GA, under the name JC Van Camme, jcvancamme@hotmail.com.  The domain servers are synergydesigns.net.  Synergydesigns.net is now located in the Vancouver area (if the current WHOIS is correct, and I’ll prove it is), but used to be in Wilmington, NC – a beach city.  Registrant is Aimee.  Therealrobp has a wife named Aimee, goes by the same JC Van Camme name, has the same jcvancamme@hotmail.com email address, and is arguing about CAMLIVES.com.

Let’s look further…

7.  WHOIS on CAMLIVES.com reveals:

Registrant, Admin and Tech:
Jean-Claude Van Camme
4426 Hugh Howell Rd Ste B (a different address)
Tucker, Georgia 30084
United States
jcvancamme@hotmail.com

IP: 69.93.182.86
Domain Servers:
NS1.SYNERGYDESIGNS.NET
NS2.SYNERGYDESIGNS.NET

Reverse IP: 9 other sites hosted on this server

8.  Let’s see what sites are hosted on the server…

Search Results for 69.93.182.86 [reverse DNS – 56.b6.5d45.static.theplanet.com]

1. abadteen.com
2. acamcouple.com
3. acamgirl.com
4. acamgirl.net
5. aimeelive.com
6. applausecatering.net
7. applausecateringonline.com
8. camlives.com
9. furiosity.com
10. kevinjonesphotography.com

8a) WHOIS on acamgirl.com reveals:

Registrant, Admin and Tech:
Aimee Live
PMB 266
341-11 S College Rd
Wilmington, North Carolina 28405
United States
heyaimee@gmail.com

IP: 69.93.182.86
Domain Servers
NS2.SYNERGYDESIGNS.NET
NS1.SYNERGYDESIGNS.NET

8b) WHOIS on Aimeelive.com reveals the same stuff.

8c) WHOIS on furiosity.com reveals:

Registrant:
furiosity.com
P.O. Box 3879
Ottawa, Ontario K9K8K7 (we shall see that Robert Pelletier used to live in Ottawa before moving in April 2003 to Vancouver)

Administrative Contact: robp, president
omega_rob@hotmail.com

IP: 69.93.182.86
Domain Servers
NS1.SYNERGYDESIGNS.NET
NS2.SYNERGYDESIGNS.NET

SUMMARY – Therealrobp, aka robp, aka JC Van Camme, together with his wife Aimee, own/operate synergydesigns.net, which hosts 10 websites.  Synergydesigns.net also is the domain server for blackboxwatchdog.net.  JC Van Camme and Aimee’s fingerprints are everywhere.

But who are these people?  Let’s look closer…

9.  Yahoo! on therealrobp and we find stuff like this:

Yahoo! Message Boards: DBD. Re: Diebold’s Election Fraud 2. by: therealrobp (34/M/Wilmington, NC…

“feel free to find therealrobp…”
robp.livejournal.com/65208.html

“Anyway IM me (therealrobp) on AIM…”
furiosity.com/contact.php

So our boy posts at Yahoo’s Diebold (DBD) board.  Let’s go find out what he’s up to over there…

9a) Previous to therealrobp’s first appearance at the Yahoo DBD board, a still-unidentified poster known as compsysengineer has been posting anti-BBV and anti-Bev Harris messages.  Compsysengineer first shows up on 7/24/03, and his IP (via a pointofmail email I sent him) tracks to Honolulu, Hawaii.

9b) On 8/11/04, therealrobp shows up for the very first time at the DBD board in post 8397.

9c) Just four posts later, the entity lalaneytrue shows up for the very first time in post 8401, and immediately slams Andy Stephenson.

9d) Thus begins therealrobp and lalaneytrue’s history of posting at the DBD board, always pro-Diebold, anti-Bev Harris and anti-others involved in BBV research.

As we look further in another chapter in this series, we’ll see that these two entities have never said a single negative thing about either David Allen or Roxanne Jekot – instead, we’ll see numerous examples of posting the same talking points, linking to comments at DU, and DU comments that link back to therealrobp and/or lalaneytrue.

But this chapter is devoted to proving that Diebold’s Robert Pelletier is JC Van Camme, the owner of blackboxwatchdog.com, and I need to continue lol (there is so much shit on these people it is incredible!)

10a) Canadian White Pages for Robert and Aimee Pelletier:

10b) Links to photos of therealrobp and Aimee’s house, all captured by Google, with URLs that prove they came from acamgirl.com – my sincere thanks to “the Kos poster known as bvac for finding these links, since therealrobp has scrubbed the site of these photos.  Please note the small photo at the top of each of these links:

Note the green Kia out front.

Photo #2    Photo #3    Photo #4.

10c) Compare those photos with the photos taken by Bev Harris and Kathleen Wynne of blackboxvoting.org a few weeks ago, when they drove to Robert and Aimee Pelletier’s house and took pictures:

http://www.bbvdocs.org/diebold-disinfo/house3.jpg
http://www.bbvdocs.org/diebold-disinfo/house3.jpg
http://www.bbvdocs.org/diebold-disinfo/yellowcar1.jpg
http://www.bbvdocs.org/diebold-disinfo/kia1-redacted.GIF

They are one and the same.  Robert and Aimee Pelletier of Surrey, BC, ARE therealrobp and his wife Aimee, owners of synergydesigns.net, which includes aimeelive.com, acamgirl.com, RobP’s old site furiosity.com, and blackboxwatchdog.com.

11. Is there a Robert Pelletier at Diebold?

Of course!  Dial Diebold Vancouver at 1-604-261-6313.  If you call right now, you’ll here a computer voice.  Option 4 allows you to select a person by name.  Press 4, and follow the instructions, and before you know it, you’ll reach Robert Pelletier’s extension, #106.

12. Well maybe there’s two different Robert Pelletiers in the Vancouver area, and one works for Diebold, and the other likes to bash Bev Harris online at places like blackboxwatchdog.com and the Yahoo DBD board!…..

Well, Bev and Kathleen were prepared for such a preposterous claim, so a few weeks ago, they actually drove to the Diebold parking lot, and videotaped Robert Pelletier, husband of Aimee, who lives at the address noted above in the White Pages search, and drives a yellow sports car just like RobP claims in his journal at furiosity.com, as he drove into the Diebold parking lot.

http://www.bbvforums.org/cgi-bin/forums/board-auth.cgi?file=/2197/30502.html

SUMMARY – contrary to both David Allen and Anonymousarmy’s claims of no proof, Diebold’s Robert Pelletier has been shown to be the owner of blackboxwatchdog.com.

Coming highlights!

Robert Pelletier at DU as Tinfoilhatprogrammer and NC Beach Girl
David Allen posting Robert Pelletier stuff from the DBD board
Robert Pelletier posting David Allen stuff
Robert Pelletier posting Roxanne Jekot stuff

And so much more.

Thanks for reading,

John

Hope is on the way! Unredacted Harri Hursti Report II is Released!

The first of a series…

I’m John Dean, from Santa Ana, CA.  For a brief period of time, I served as a volunteer research assistant for blackboxvoting.org.  I assisted in research that irrefutably proves Robert Pelletier of Diebold is conducting a covert internet campaign to harass and malign various folks involved in BBV research, especially Bev Harris.  Now that the research has been published, I have resumed my independent campaign to stop trolls and disinformation, while Bev Harris has turned the results of our investigation over to her lawyers.

Perhaps Independence Day has come early – Blackboxvoting.org has just released the unredacted version of the Harri Hursti Report II.

Please join me on the flip side.

Contrary to David Allen’s ridiculous assertion – “There you have it folks, Bev Harris recycling something known about for three years.” the original, redacted-version of the Hursti Report II had been hailed in the NY Times for exposing the “most severe security flaw ever discovered in a voting system.

And now, on this glorious holiday weekend, Bev Harris has served notice to those who refuse to do anything about the machines that can cheat, by releasing the unredacted version, including TSX source code and lots of photographs.

When the redacted-version of the Hursti Report II was released back In May, Diebold’s Robert Pelletier and various other entities misled others about the importance of the report, and origination of the discoveries.  When blackboxvoting.org released the expose’ on Robert Pelletier, these same entities attempted to cast doubt on the expose’.

Diebold’s Robert Pelletier, aka JC van Camme, therealrobp, Tinfoilhatprogrammer, NC Beach Girl, probably Neil B Forzod, omega_rob, probably lalaneytrue, yada yada yada, has been exposed as the owner of blackboxwatchdog.com.  If you visit his site, always keep that in mind.  When you see others refer people to his site, find out why.

I know why.  A simple Google search can open doors quickly, for those interested in more right now.  And for those who want to defend Bev’s fired, former publisher, just go here and ask yourself why this man is chumming it up so much with Anonymousarmy aka Andyscam, the entity that hounded Andy Stephenson last year.

Stay tuned for more fireworks!

John

AN URGENT PUBLIC SERVICE ANNOUNCEMENT

John Dean here, from Santa Ana, CA.  I have resumed my hobby as an independent troll fighter, after recently assisting blackboxvoting.org as a volunteer researcher.  That very important story – the outing of Robert Pelletier of Diebold as owner of blackboxwatchdog.com, can be viewed here.

Please understand upfront that I do not know if Jason Leopold’s story is true or not…but recent discoveries are leading me to believe that it is.

In the past 24 hours, I have discovered solid evidence that leads me to believe right-wing trolls, some who pretend to be non-right wingers, are using pointofmail.com, or similar sites, to send out fake emails.

For example, if I wanted to discredit Jason Leopold, I could send an email to someone that looks exactly like Jason sent it, and Jason would not be aware.  The only way the recipient of the email might notice something is “not right” is by looking at IP info from the full header, and comparing it with known IP info from the person you think sent it.

With pointofmail, anyone can send out an email and get IP information on whoever reads it.  That is its intended purpose, and it is a valuable tool to use when investigating trolls.  By using both “send confirmation” and “read confirmation” you can view progress.  Both send and read confirmations are delivered to the email account of the name used to send the email.

A person can add any other email address besides their initial address when they first sign up, without any verification that it is owned by the same person.

One can also “turn off” both the send and read confirmations.  By doing so, the owner of the actual email account will not receive send and read confirmations.

In other words, I can pretend to be someone, send out an email to myself and make it look like they sent it, and then post it online as if it is a legitimate email…and the actual owner of the email account will not know.

I strongly believe that this tactic is currently being used against Jason Leopold.  I have evidence that the same tactic was used against Bev Harris last year.

I will expose those who are involved very soon – I have collected a ton of evidence, but I need to make sure I’ve got this nailed down 100%, and I keep finding more and more.

John

Diebold’s Robert Pelletier Nailed in Covert Internet Disinfo Campaign

My name is John Dean, from Santa Ana, California.

On behalf of blackboxvoting.org, I’m proud to bring you the following.

The Diebold Persuasion Machine

By Black Box Voting staffers, with the assistance of citizen volunteers including John Dean, Linda Franz, John Howard and Catherine Ansbro (with a tip of the hat to Brad Friedman).

Permission granted to quote or reprint, with link to http://www.blackboxvoting.org.

INTRODUCTION

This is an investigative report about money and persuasion. It’s a report pertaining to public money spent on vulnerable voting machines, money which indirectly bankrolls a large lobbying and public relations machine designed to persuade taxpayers to accept voting machine purchases.

At the same time, employees of one vendor are engaging in activities to disrupt and discredit those who question the wisdom of purchasing these machines.

The public money used to purchase these machines belongs to you, the taxpayer. You control it. You are picking up the tab for voting machine vendors who ultimately control your elections through the software, hardware and “updates” they provide, through their technicians, and through their election management services. Thus, the truthfulness, business practices, and ethics of these voting machine vendors are very much your concern.

After reading about security vulnerabilities(1) built into Diebold voting machines, you may be wondering how your tax dollars manage to keep buying them. In fact, taxpayer money helps underwrite not just the machines, but the vendor’s attorneys who fight lawsuits filed by citizen groups.(2) Your money indirectly underwrites party boats and luncheons and open bars that curry favor with elections officials,(3) along with the salaries of employees who engage in deceptive practices to discredit critics.

You pay for it all.


The Persuaders Who Are Publicly Disclosed

Diebold Election Systems, one of the largest voting machine vendors in the US,(4) spends millions on PR and lobbying efforts, employing both in-house and outside personnel. Some of Diebold’s PR activities fall under the category of “Governmental Relations” (lobbying). Diebold’s elections division also employs an outside crisis management team, a corporate media specialist, and as you will see later in this report, certain Diebold employees engage in PR activities that are morally, ethically and legally questionable.

Two of Diebold’s crisis management experts (David Bear and Marvin Singleton) are employed by powerful and politically connected Texas-based Public Strategies Inc. According to check stubs obtained by Black Box Voting, Diebold has paid as much as $145,210 to Public Strategies in a single month.

Picture of June 1-29, 2004 Public Strategies Inc. invoices paid by Diebold Election Systems:http://www.bbvdocs.org/…

Diebold also employs Mark Radke, an unflappable media relations expert who skillfully frames the issues with reporters to favor Diebold’s point of view.

(Picture of Mark Radke): :http://www.bbvdocs.org/…

(Video of Mark Radke at work):

:http://www.bbvdocs.org/…

Dix & Eaton is a PR firm in Cleveland that shows up in the midst of a $100,000 “unidentified security expense” in Diebold’s general ledger listing.

(Picture of Dix & Eaton general ledger entries):

:http://www.bbvdocs.org/…

The account number for the unidentified $100,000 gives a connection to Dix & Eaton

Diebold “Governmental Relations” Experts

It’s no surprise that a company the size of Diebold has many governmental relations experts. Who are some of Diebold’s lobbyists?

– Greenberg-Traurig, the firm associated with convicted power-lobbyist Jack Abramoff (2 felony counts), has done work for Diebold.

(Picture of Greenberg-Traurig check stub from Diebold)

:http://www.bbvdocs.org/…

– Darrell W. Hunt, investigated by the FBI in connection with a bribery scandal in Louisiana, “works the halls” for Diebold(5):

Link to bribery scandal story:http://www.bbvforums.org/…

Photo of internal memo from Diebold about Hunt: http://www.bbvdocs.org/…

Link to documents showing Hunt worked for Diebold:

http://www.bbvdocs.org/…

– Gilbert Genn, a lobbyist paid by Diebold, also worked for Science Applications International Corp. (SAIC) while the SAIC was commissioned to evaluate Diebold’s product.(6)

Picture of Disbursement to Gilbert Genn from Diebold Election Systems General Ledger:

http://www.bbvdocs.org/…

– Rose & Kindel’s senior communications manager, Adan Ortega Jr., received an appointment with Calif. Secretary of State Bruce McPherson’s new administration. Hiring an executive from Diebold’s lobbying firm raised eyebrows among election integrity groups because it was an apparent conflict of interest. At the time, the Secretary of State was in the process of deciding whether to certify Diebold machines. Other concerns have been raised about the accuracy and truthfulness of reported Diebold payments to Rose & Kindel. California law requires reporting of how much lobbyists are paid by their clients. There is a discrepancy in what was reported to the state (April-June, 2004 only $7,526 was reported) — yet check stubs obtained by Black Box Voting reveal actual payments for May and June alone totaled $45,248.

Picture of Rose & Kindel check stub from Diebold — This is six times as large as Diebold reported in required lobbying disclosure forms:

http://www.bbvdocs.org/…

Link to more on Rose & Kindel: http://www.bbvforums.org/…

– According to disclosure forms, Diebold Election Systems’ Ohio lobbyists simultaneously acted as lobbyists for the Ohio Association of Elections Officials:

Picture of lobbyist information from Ohio:

diebold-disinfo/lobbyists1.JPG

http://www.bbvdocs.org/…

In 2005, the same “State Street” lobbyists are representing Diebold voting machines and Ohio elections officials.

Here is the Ohio Lobbyist list for 2005: http://www.bbvdocs.org/…

Ohio is an important state. It’s not really surprising that Diebold would have 5 lobbyists representing their interests, although it is surprising that, at the same time, some of these same lobbyists would also be representing the interests of the Ohio Association of Election Officials, whose members are the very customers to whom Diebold sells.

– Diebold’s financial documents show hundreds of thousands of dollars in “success fees.” The term generally refers to contingent “pay to play” fees and therefore “success fees” are frowned on (or illegal) in the lobbying business. Paul Tipps, Diebold’s former Ohio lobbyist, became so disgusted with governmental “pay to play” that he left his lobbying firm to form an organization to clean up government.

Link to story about Ohio “pay to Play”: http://www.bayoubuzz.com/…  

Many states prohibit contingent fee lobbying, the usual connotation of “success fee.”

Picture of Diebold Election Systems general ledger showing “success fees”:

http://www.bbvdocs.org/…  

(click here for full general ledger page)

http://www.bbvdocs.org/…

The Undercover Persuaders

Clandestine attack campaigns are real. They can divide us and dilute our power as a united citizenry with a common goal.

Lobbyists and Public Relations practitioners are usually identified so that the public and the people being lobbied know the interests whom they represent.

Not so on the internet, where people with a vested interest sometimes hide behind a shield of assumed anonymity to conduct attacks against the targets of their choosing – for example, those who oppose their business interests.

Such is the case with at least one high level employee of Diebold Election Systems who has been using false identities to engage in aggressively distributed internet attacks targeting those who expose weaknesses in electronic voting systems. The disinformation spread through the Internet is vicious, and considerable effort has been taken to hide its origin.

At best, using a sham identity to conduct such practices may tread into the area of false advertising. At worst, it can be deemed a criminal offense. Under U.S. Code Title 47, Chapter 5 Subchapter II Part I § 223, utilizing a telecommunications device without disclosing identity and with intent to annoy, abuse, threaten, or harass is prohibited, and this definition does include use of the Internet.

Link to this law: http://www4.law.cornell.edu/…

Meet the cyberguys: “Wally O’Diebold”, “Jean-Claude Van Camme” and “therealrobp”

picture of Diebold’s “therealrobp” who administers “Blackboxwatchdog.com,” a Web site which specializes in skillfully written disinformation, attacking anyone who gets in the way of Diebold’s business interests:

http://www.bbvdocs.org/…  

Let’s have a look at the headline that appeared on the deceptive “Blackboxwatchdog ” Web site for 11 months, attacking the credibility of a specific reporter:

Picture of headline:

http://www.bbvdocs.org/…  

Ian Hoffman is an Oakland Tribune newspaper reporter who was one of the first mainstream news reporters to report flaws in Diebold voting systems. He published internal documents from Diebold’s law firm, Jones Day, in which lawyers were advising Diebold that continuing to deliver uncertified equipment could result in criminal charges. In the documents, Jones Day proposed a budget for Diebold’s criminal defense. A lawsuit over Hoffman’s publication of the Jones Day documents followed; when that did not succeed, a Web site was set up attacking Hoffman’s credibility.*

Although accusations against Hoffman remained on the website for 11 months, this was not the first attack to originate from the site. On May 26, 2005 in Leon County Florida, Black Box Voting sponsored a demonstration of some of the security vulnerabilities of a Diebold optical scan voting machine. The demonstration itself was conducted by Harri Hursti, a Finnish computer security expert.(7) Within hours of the demonstration, Blackboxwatchdog was launched, and a few days later the site promised to debunk Hursti’s report about Leon County.

The Blackboxwatchdog site posts general disinformation like this:

“Black Box Voting — an organization now thought by many to be fraudulent.”

(referring to the most recent Black Box Voting/Hursti report):

“OK, I plagiarized this too. So sue me.

The site began by hurling general accusations at election integrity activists, then posted the anti-Ian Hoffman story. The Hoffman attack was replaced by a new story, once again attacking security expert Harri Hursti, this time alleging that Hursti and employees of Black Box Voting (naming Kathleen Wynne, Bev Harris, Jim March) were soon to be arrested for felony vote-tampering.

Hursti had written two critical security alerts pertaining to Diebold voting systems, both of which have received strong support from the U.S. scientific community. His work has been reported by the Associated Press, Newsweek, the New York Times and the Washington Post and has resulted in negative media stories for Diebold Election Systems.

In addition, Blackboxwatchdog attacks the organization that sponsored Hursti’s studies, though these efforts consist primarily of ridiculing its founder, Bev Harris, with sarcastic statements like this:

“Ms. Harris rarely seems to do anything more significant than go to the bathroom without documenting her self-professed heroics on videotape.”

Hoffman, Hursti, Harris and Black Box Voting are not the only ones to feel the wrath of Blackboxwatchdog. The site lobs unfounded accusations of bogus financial misdeeds at Joan Krawitz, co-founder of Vote Trust USA (http://www.VoteTrustUSA.org).

Utah election reform advocate Kathy Dopp (http://www.utahcountvotes.org) is belittled by an editor for the site who conceals his real name, calling himself “zerocool” (a pseudonym taken from the movie “hackers”). Blackboxwatchdog also levels criticisms against products made by two of Diebold’s competitors, Sequoia Voting Systems and Election Systems & Software.

Attorneys who have dared to go up against Diebold are also subjected to Blackboxwatchdog attacks. Lowell Finley is currently suing to remove Diebold TSx touch-screens from our elections process with a groupThe site tries to  he co-founded, http://www.VoterAction.org. drag elections attorney Lowell Finley through the mud, dropping made-up hints of improprieties in his handling of funds for a client.

Considerable effort appears to have been taken to hide the origin of the Blackboxwatchdog Web site. Blackboxwatchdog displays the following banner:

Picture of banner claiming that the site has nothing to do with any vendor:

http://www.bbvdocs.org/…

This statement is false. Volunteer citizen researchers at Black Box Voting uncovered the following information tying the site to a Diebold employee who has been hiding behind various false identities.

“Jean-Claude Van Camme”

The current registration data for any web site can be reviewed through what is called a WHOIS search. A WHOIS search returns the name and address of the registrant, along with the required contact information. In addition, there are services available which provide the history of changes of WHOIS registrant information. (If you are unfamiliar with WHOIS searching, a check of your favorite search engine will help).

WHOIS registration information for Blackboxwatchdog.com:

Registrant:

Jean-Claude Van Camme

77 E Main St

Tucker, Georgia 30085

United States

(917) 210-6543

Registered through: GoDaddy.com, Inc. (http://www.godaddy.com)

Domain Name: BLACKBOXWATCHDOG.COM

Created on: 27-May-05

Expires on: 27-May-07

Last Updated on: 27-May-05

The address given is nonexistent; the phone number is a New York City-based cell phone account which, although it appears to be live, on numerous occasions has never been answered nor does it have voicemail.

As it turns out, “Jean-Claude Van Camme” owns another Web site: http://www.camlives.com

Jean-Claude Van Camme

4426 Hugh Howell Rd Ste B

Tucker, Georgia 30084

United States

Registered through: GoDaddy.com, Inc. (http://www.godaddy.com)

Domain Name: CAMLIVES.COM

Created on: 17-Feb-02

Expires on: 17-Feb-07

Last Updated on: 18-Mar-04

2063396085

Reader discretion is advised – the camlives.com site contains adult-oriented material. Although the address in Tucker Georgia is different, which might suggest that someone else was using the same name, a check of the registrant information change history shows that until mid-May 2006 the address used was 77 E. Main Street, Tucker Georgia, precisely the same as Blackboxwatchdog.com. The new address is actually a commercial mailbox service, and the phone number is a portable phone that goes to a messaging center.

An internet search for Jean-Claude Van Camme returns the following link:

http://www.webhostingtalk.com/…  

This link shows an apparent dispute between a representative of an internet hosting service, and an individual using the name “therealrobp” who signs himself “RobP,” in which the hosting company points out the misleading nature of the contact information for CAMLIVES.COM, the web site around which the dispute centers. In one message the hosting company chides RobP for registering the site with a false identity, “Jean-Claude Van Camme.” RobP identifies the site as being owned by his wife, and says that he is the administrator of the box.

In fact, there are numerous sites apparently owned or administered by RobP and his wife, a beach girl from North Carolina, most of which are teaser sites for a pay-per-click porn scheme.

abadteen.com

acamcouple.com

acamgirl.com

camlives.com

furiosity.com

It is the furiosity.com Web site that begins to lead us back to Diebold Election Systems. On furiosity, RobP reveals that he is a programmer who in April 2003 relocated to the Vancouver, BC area to take a job. [Vancouver happens to be where the Diebold Election Systems programmers office is located]. He continued to talk about himself until April 2004 when he explained that he has been too busy ‘…making the world safe for democracy…’ to update his diary.

Picture of saving democracy statement:

http://www.bbvdocs.org/…

RobP then claims, presumably in jest, that he’s been “working undercover for the government.” In this graphic from the furiosity site we get our first suggestion of RobP’s appearance.

Picture of “undercover for the government” statement:

http://www.bbvdocs.org/…

In his online profile at a site called LiveJournal.com, which he links to in his furiosity.com Web site, RobP describes himself as “an HTML ninja, a hotshot software guy and a spy.”

Picture of Jean-Claude, captured by own Webcam http://www.bbvdocs.org/…

Although usually only seen from behind, on one of the websites with which he is connected Jean-Claude (RobP etc.) has a live webcam where you can view some of his activities.

Rob P. refers to his more unsavory work in one of his diaries:

“…But enough said about boring work stuff. Nobody really wants to hear about HTTP tunneling or snooping on the illicit activities of other people on your subnet.”

In one of his online diaries, RobP describes the car he drives and the one he purchased for his wife. His wife is originally from Wilmington, North Carolina. She writes about staying at the family “beach house” (Kure Beach, NC). She says in her blog that she moved to the Vancouver area after marrying Rob in October 2003.

Picture of RobP’s statement about his yellow Toyota Celica: http://www.bbvdocs.org/…  

Picture of RobP’s statement about his wife’s green Kia:

http://www.bbvdocs.org/…  

Both RobP and his wife provide abundant information about themselves, including photographs of their Vancouver area home. (With a green Kia out front)

Pictures of RobP/Jean-Claude Van Camme house:

http://www.bbvdocs.org/…

http://www.bbvdocs.org/…

RobP also frequents the Diebold section of the Yahoo financial message board, where he’s been known to ridicule Diebold stockholders who are nervous about their position.

Picture of “therealrobp” statement ridiculing nervous stockholders

http://www.bbvdocs.org/…

While “therealrobp” character on Yahoo, claims to be from Wilmington, NC rather than from the Vancouver area of BC, Wilmington was the home of his wife prior to her moving to BC.

He repeatedly attacks Black Box Voting and its founder, Bev Harris, engaging in a pattern of talking points and inaccurate statements trying to convince stockholders to ignore whatever they read if it comes from Black Box Voting.

Picture of promise to “crush her like a bug”

http://www.bbvdocs.org/…

“Bev Harris says a lot of crazy-ass nonsense. That’s why she’s been thoroughly discredited…”

“…conspiracy nutcases like Bev Harris and ultra-leftwing blogger web sites.”

“Of course all the same information is available just by reading any of Ms. Harris’ crazy ramblings.”

“This crazy old woman and the organization she runs have exactly zero credibility. It boggles the mind that people believe her mindless drivel…”

“On the other had, I also totally know that the board of directors is made up entirely of friends and family of Ms. Harris…

But does Rob P work for Diebold?

A check of a Diebold staff list identifies only two employees whose name is Rob or Robert and whose surname begins with the letter ‘P’ – a Rob Pelletier whose location was unspecified, and a Robert Pickett located in North Carolina.

Picture of excerpt from Diebold staff list

http://www.bbvdocs.org/…

While the North Carolina employee may be the most obvious possibility, the other name proved to be correct.

Like most major metropolitan areas in North America, Vancouver, British Columbia is made up numerous adjoining municipalities each of which bears its own name. While a city in its own right, Surrey, BC is part of the greater Vancouver area.

Black Box Voting volunteers located an address in Surrey, BC belonging to a Rob and [redacted wife’s name] Pelletier. Photographs of the house taken by Black Box Voting researchers bear an uncanny resemblance to the home shown in the photographs posted by RobP and his wife. Even the rocking chair on the porch is the same.

Pictures of Rob Pelletier house

http://www.bbvdocs.org/…

http://www.bbvdocs.org/…

Outside the home, are two vehicles – a yellow Toyota Celica and a Green Kia, precisely as described by RobP in his blog.

Pictures of cars at Rob Pelletier’s house

http://www.bbvdocs.org/…

http://www.bbvdocs.org/…

The plate number of the Yellow Toyota Celica outside Rob Pelletier’s house is 722BJW:

Picture of license plate:

http://www.bbvdocs.org/…

Could this be a different Rob Pelletier than Diebold’s Pelletier?

We know that Rob Pelletier from Surrey drives a yellow Toyota Celica but is THIS Rob Pelletier connected with Diebold?

The offices of Diebold Election Systems in Vancouver BC are located at Suite 350-1200 73rd Avenue West, in a 14 story-high building known as Airport Square. This building is equipped with both ground level and underground parking.

Link to info on Diebold address: http://www.1200-west-73rd.com

Picture of Vancouver White Pages entry for Diebold Election Systems:

http://www.bbvdocs.org/…

Pictures of Airport Square: Front view & side view

http://www.bbvdocs.org/…

http://www.bbvdocs.org/…

Pictures of parking garage for the Airport Square Building:

http://www.bbvdocs.org/…

http://www.bbvdocs.org/…

Let’s go to the videotape:

http://www.bbvdocs.org/… (12-second video)

Watch as a yellow Toyota Celica drives into the garage at the Diebold election Systems Office and compare the plate number, 722BJW, with that of the vehicle outside the Surrey home of Rob Pelletier. An earlier phone call to the Diebold Election Systems office in Vancouver confirmed that Rob Pelletier does in fact work at that office.

What does Rob Pelletier do for Diebold?

He seems to have a key position which carries a high degree of trust. Here is Rob Pelletier (misspelled, as “Pelltier”) listed in a select group of the key Diebold people meeting with the Calif. Secretary of State’s staff in December:

Picture of nondisclosure for secret meeting with secretary of state’s office and Diebold personnel

http://www.bbvdocs.org/…

In late 2005 Black Box Voting was invited by the California Secretary of State to demonstrate some security vulnerabilities of one of the Diebold voting systems. The Secretary of State’s office sent Black Box Voting an electronic document outlining the test protocols that would be allowed.

Picture of sec. state test protocols, (inset) hidden ‘properties’ show written by Rob Pelletier

http://www.bbvdocs.org/…

At Black Box Voting, we referred to the above “hack test” proposal as “the turkey shoot” – not just because it was served to us at Thanksgiving, but also based on the absurdity of the test protocols. Internal details of the electronic document revealed that it was written by none other than Rob Pelletier, and was then distributed to Black Box Voting by the California Secretary of State’s office.

Does anyone else from Diebold promote Blackboxwatchdog?

According to public records obtained by Black Box Voting from San Joaquin county, another key Diebold employee, Steve Knecht, has been e-mailing California elections registrars recommending Pelletier’s site without disclosing that the site belongs to a Diebold employee.

Email from Steve Knecht to San Joaquin County elections registrar:

“Why don’t you put this URL out on elecnet after you’ve had a chance to review the web site. If you agree, let all the other registrars know about it. It finally goes after the biased reporting of Ian Hoffman, and goes after Bev as well. Let’s start promoting this site as a voice of reason!!!! Steve

New website to counter black box voting:

http://blackboxwatchdog.com/…

And there are more: Wally O’Diebold

“Wally O’Diebold,” is another fake name Internet harasser who also happens to post from Surrey, BC. When “Wally O’Diebold” came to the popular “BradBlog” site, its owner Brad Friedman spotted the disinfo. Friedman writes:

“While he may be too cowardly to give his real name publicly – even while sliming folks like myself, Bev Harris, Jim March, Avi Rubin, Sen. Debra Bowen and others who are not afraid to put our real names on our work and behind our beliefs – he’s a Diebold insider with a lot of knowledge of the systems, and (WARNING) a lot of mis/disinformation he’s suddenly very eager to spread.”

Friedman supplied “Wally O’Diebold’s” IP address to Black Box Voting volunteers and they found that “Wally O’Diebold’s” IP address traces back to the Vancouver, BC area – Surrey, to be precise. The same suburb where we found Diebold’s Rob Pelletier.

More: See Bradblog archive – It’s Hard Out Here for a Pimp; Diebold Gets Desperate, Sends a Pro to Work the Corner of BRAD Street…

Link to BradBlog article:http://www.bradblog.com/…

Whatever happened to Wally, anyway?

It seems that after his IP address in Surrey, BC was exposed on BradBlog, Wally quieted down (or at least changed his moniker; in a particularly creepy episode, a message promoting a new Blackboxwatchdog story appeared at DemocraticUnderground impersonating the name of Bev Harris’s children; another IP leading back to Blackboxwatchdog showed up at BradBlog pretending to be Catherine Ansbro, who helped to write this article).

It turns out that Wally O’Diebold has been roaming the Internet spreading disruption for at least a year and a half. When Black Box Voting compared the BradBlog Wally O’Diebold IP address with our own logs, we discovered that “Wally O’Diebold” spends a lot of time on our Web site.

His IP address – 24.86.46.74 – is the seventh most frequent IP visitor of all time at Black Box Voting.

Not all visits by Wally O’Diebold are benign. He is not shy about stealing the identities of others. An identity thief calling himself “The Real Pat Vesely” plagued the Black Box Voting web site with harassment posts for a while, imitating one of the writers who provides assistance to citizens in our consulting forum. The fake Pat Vesely’s IP was “24.86.46.74” – Wally O’Diebold.

A character who called himself “The Real Jim March” (at the time a Black Box Voting board member) also showed up to disrupt the site, as did a “JimsMarch” and a “Bev Harris” that was not the real Bev Harris.

“NC Beach Girl” on DemocraticUnderground forums once posted a series of three messages revealing the timing of several visits to Black Box Voting. Checking our IP logs for the same three time periods showed that only a half-dozen visitors had visited at coinciding times. The IP address that best matches the times of the “NC Beach Girl” posts is “24.86.46.74” – Wally O’Diebold.

“The Real Rob P” also has many names and co-distributors for his information. He visits slashdot under “omega_rob”; the DemocraticUnderground forums feature “NC Beach Girl” distributing information about Blackboxwatchdog.

These Internet troll messages are also distributed on the Yahoo financial message boards by a particularly vicious poster who goes by the name “lalaneytrue” (“the real Laney,” who is also signed up at one of Rob P’s sites). A “lalaneytrue” cybertrash message was, in turn, copied verbatim onto a heavily used programmers’ forum called “Fark.com” – this time, hijacking the identity of Linda Franz who was at that time president of the board of directors for Black Box Voting.

The distributors in this disinformation campaign are recognizable because they cut and paste from each other to swap talking points and copy them to multiple Internet sites under several different “screen names.”

Is any of this appropriate?

A Diebold employee under the persona of “Jean-Claude Van Camme” and other pseudonyms creates propaganda and spreads disruption around the Internet. When that same employee propagates disinformation to a financial message board frequented by stockholders, the question arises if such activities are appropriate – or legal – for a representative of a publicly held company

When a Diebold employee, Steve Knecht, recommends a deceptive Web site developed by another Diebold employee, Rob Pelletier, to public officials while they are involved in purchasing decisions, it’s time to look at whether false advertising and unfair business practice statutes apply.

When another Diebold employee, Knecht, asks a California public official to promote a deceptive web site using the private email list of the California counties election officials, Knecht exposes officials to embarrassment and potential repercussions. Knecht admits the site targets a newspaper reporter and the head of an elections-related nonprofit civil rights group. Propriety dictates that at the very least, he should have warned election officials – Diebold’s customer base – that the site was created and run by another Diebold employee.

Diebold is a company that already spends millions on advertising, PR, media relations and lobbying, indirectly paid for by taxpayer dollars. Those same dollars payroll certain employees engaged in Internet disinformation about activists, lawyers, and reporters.

As citizens, we have to ask: Don’t you think it’s time to bring back citizen oversight? If we allow this type of behavior to divide the election reform community, then perhaps we deserve what we get.

It’s up to you to decide. You’re paying for it.

Footnotes

(1) New York Times article

Salt Lake Tribune Article: http://www.sltrib.com/…

http://www.blackbovoting.org/…

http://www.blackboxvoting.org/…

http://www.blackboxvoting.org/…

(2) USA Today, June 4 2006, “Spate of Lawsuits Target e-Voting” — Lawsuits have been filed in at least six states, the most recent last week in Colorado, to block the purchase or use of computerized machines…

http://www.usatoday.com/…

(3) Party boats: http://www.votersunite.org/…

“Diebold Wines and Dines Elections Officials”: http://www.ejfi.org/…

“Guess Who’s Going to Hollywood?” http://www.votetrustusa.org/…

(4) The largest voting machine vendors are: Diebold Election Systems (statewide systems in Georgia, Maryland, Utah, and Mississippi and Alaska; widely used in California, Michigan, Minnesota, Wisconsin, Florida, Washington, and Massachusetts; Diebold systems are used in at least 30 states and count approximately one-third of all votes in federal elections); Election Systems and Software (closely rivals Diebold in size; very heavily used in Indiana, Oklahoma, Nebraska, Alabama, Arkansas, Texas, has a presence in most states); Sequoia Voting Systems (heavily used in New Jersey, in areas with heavy Hispanic populations including Riverside, San Bernardino and Santa Clara Counties (Calif.), also used in Palm Beach and Pinellas Counties (Fla.), in Chicago/Cook County (Ill.) and throughout the state of Nevada. Sequoia machines dominate many areas where the gambling industry is heavily represented and also are used in many areas with high Hispanic voting populations. The fourth-largest vendor, Hart Intercivic, is widely used in Texas and has a presence in Orange County Calif,; Yakima and Skagit counties (Washington); Boulder County (CO) and a few other outposts.

(5) The New Orleans Times-Picayune, 23 July 2000: “A DIFFERENT KIND OF GATED COMMUNITY” and Saturday State Times/Morning Advocate, 29 April 2000: “Judge frees Bankston case figure”

(6) Washington Post, 28 Sept. 2003: Ehrlich Seeks Probe Over Ballot Machines; Contractor, Reviewer Used Same Lobbyist. “… Gilbert J. Genn, a former Montgomery County delegate, is registered as a lobbyist for Diebold Election Systems Inc., the company that has a $55 million contract to provide the state with its electronic voting system, and Science Applications International Corp., the computer security company the state recently hired to examine the Diebold voting machines for flaws.

A FOLLOW UP: A formal ethics probe was launched by the state of Maryland, and ultimately concluded there was no wrongdoing. Nevertheless, Maryland taxpayers had to foot the bill for the ethics probe, which was a response to the appearance of impropriety. Maryland did not learn that Genn represented parties on both sides until after the report was completed.

(7) From California Voting Systems Technology Assessment Advisory Board (VSTAAB):

“Harri Hursti’s attack does work: Mr. Hursti’s attack on the AV-OS is definitely real. He was indeed able to change the election results by doing nothing more than modifying the contents of a memory card. He needed no passwords, no cryptographic keys, and no access to any other part of the voting system, including the GEMS election management server.”

http://www.ss.ca.gov/…

*The alleged leaker of the Jones Day documents, Stephen Heller, has since received retaliation in the form of felony charges. To donate to Stephen Heller’s defense, please visit http://www.hellerlegaldefensefund.com.

More on Heller: http://www.bbvforums.org/…

Thank you for reading.

John

Diebold Built-in Security Vulnerability – Major Threat to Honest Elections

Permission to reprint granted, and my sincere thanks, to www.blackboxvoting.org.

Posted on Thursday, May 11, 2006 – 12:34 pm, by Bev Harris of www.blackboxvoting.org.

Due to the nature of this report it is distributed in two different versions. Details of the attack are only in the restricted distribution version considered to be confidential. Fewer than 50 words have been redacted in the version below.

Overview

Click “more” for link to full report

Note: Please refrain from speculation or public discussion of inappropriate technical details.

This document describes several security issues with the Diebold electronic voting terminals TSx and TS6. These touch-pad terminals are widely used in US and Canadian elections and are among the most widely used touch pad voting systems in North America. Several vulnerabilities are described in this report.

One of them, however, seems to enable a malicious person to compromise the equipment even years before actually using the exploit, possibly leaving the voting terminal incurably compromised.

These architectural defects are not in the election-processing system itself. However, they compromise the underlying platform and therefore cast a serious question over the integrity of the vote. These exploits can be used to affect the trustworthiness of the system or to selectively disenfranchise groups of voters through denial of service.

http://www.blackboxvoting.org/BBVtsxstudy.pdf

Critical Security Alert: Diebold TSx and TS6 voting systems
by Harri Hursti, for Black Box Voting, Inc.

Three-layer architecture, 3 security problems

Each can stand alone or combine for 3-layer offense in depth

As an oversimplification, the systems in question have three major software layers: boot loader, operating system and application program. As appropriate for current designs, the first two layers should contain all hardware specific implementations and modifications, while the application layer should access the hardware – the touch pad, memory card, the network etc. – only via services and functions provided by the operating system and therefore be independent of the hardware design. Whether the architecture in question follows these basic guidelines is unknown.

Based on publicly available documentation, source code excerpts and testing performed with the system, there seem to be several backdoors to the system which are unacceptable from a security point of view. These backdoors exist in each of these three layers and they allow the system to be modified in extremely flexible ways without even basic levels of security involved.

In the worst case scenario, the architectural weaknesses incorporated in these voting terminals allow a sophisticated attacker to develop an “offense in depth” approach in which each compromised layer will also become the guardian against clean-up efforts in the other layers. This kind of deep attack is extremely persistent and it is noteworthy that the layers can conceal the contamination very effectively should the attacker wish that. A quite natural strategy in these types of situations is to penetrate, modify and make everything look normal.

Well documented viral attacks exist in similar systems deploying interception and falsification of hash-code calculations used to verify integrity in the higher application levels to avoid detection. The three-level attack is the worst possible attack. However, each layer can also be used to deploy a stand-alone attack. The TSx systems examined appear to offer opportunities for the three-level attack as well as the stand-alone attacks.

It is important to understand that these attacks are permanent in nature, surviving through the election cycles. Therefore, the contamination can happen at any point of the device’s life cycle and remain active and undetected from the point of contamination on through multiple election cycles and even software upgrade cycles.

Here is a rough analogy:

  • The application can be imagined as written instructions on a paper. If it is possible to replace these instructions, as it indeed seems, then the attacker can do whatever he wishes as long as the instructions are used.
  • The operating system is the man reading the instructions. If he can be brainwashed according to the wishes of the attacker, then even correct instructions on the paper solve nothing. The man can decide to selectively do something different than the instructions. New paper instructions come and go, and the attacker can decide which instructions to follow because the operating system itself is under his control.
  • The boot loader is the supreme entity that creates the man, the world and everything in it. In addition to creating, the boot loader also defines what is allowed in the world and delegates part of that responsibility to the operating system. If the attacker can replace the boot loader, trying to change the paper instructions or the man reading them does not work. The supreme entity will always have the power to replace the man with his own favorite, or perhaps he just modifies the man’s eyes and ears: Every time the man sees yellow, the supreme being makes him think he is seeing brown. The supreme entity can give the man two heads and a secret magic word to trigger switching the heads.

In the world of the Diebold touch-screen voting terminals, all of these attacks look possible.

The instructions (applications and files) can be changed. The man reading the files (Windows CE Operating System and the libraries) can be changed. Or the supreme entity (boot loader) can be changed, giving total control over the operating system and the files even if they are “clean software.”

Specific conceptual information is contained in the report, with details and filenames in the high-security version which is being delivered under cryptographic and/or personal signature controls to the EAC, Diebold CEO Tom Swidarski and CERT.

  1. Boot loader reflashing
  2. Operating system reflashing
  3. Selective file replacement

In addition, the casing of the TSx machines lack basic seals and security, and within the casing additional exploitations are found.

Conclusions and Recommendations

Because there is no way of having chain of custody or audit trail for machines, the machines need to be reflashed with a known good version (assessing the risks potentially inherited). Ideally this should be done by the proper governmental authorities rather than being outsourced.

After that, extensive chain of custody management has to be established to make sure that machines do not potentially get recontaminated. Less than five minutes is required for contamination.

The bootloader needs to be re-engineered.

The cases need to be properly and permanently sealed.

Further study is warranted around these issues and others in the May 15, 2006 Supplemental Report for the Emery County TSx study.

While these flaws in design are not in the vote-processing system itself, they potentially seriously compromise election security. It would be helpful to learn how existing oversight processes have failed to identify this threat.

A secondary report will be released on May 15, 2006. This report contains approximately 12 other areas of secondary concern to the problems described in this initial report.

Black Box Voting is a nonpartisan, nonprofit 501c(3) organization focusing on investigations related to ensure accurate and fair elections. This organization is supported entirely by citizen donations.

To support this work:
http://www.blackboxvoting.org/donate.html

Mailing Address:
Black Box Voting, Inc.
330 SW 43rd St Suite K
PMB 547
Renton WA 98055

I’d like to add that this is the jackpot folks – undeniable evidence, quickly being embraced by the scientific community, of an immediate threat to elections in this country.

John

Going after the trolls and phony sockpuppets at Daily Kos

I’ve read that this site is much friendlier towards those who seek the truth about controversial things than Daily Kos.  Nothing like testing it right off the bat.

My name is John Dean, from Santa Ana, California.  I am a real person, and I will not be silenced.  Former MSgt in the Air Force from 1976-1992, I spend most of my time online researching trolls, defending Bev Harris whom I consider to be a hero and have proven is a target of a malicious campaign to discredit, and playing fantasy baseball.

Contrary to what trolls such as Tlh lib, Avila and Vgebert have posted at Daily Kos, I have never, ever, called someone’s place of employment.  That’s just one of many things these assholes have put out there recently, in their attempt to dilute my research and efforts by diluting me.  After all, they’re worried now – my efforts to uncover what is going on with the anti-Bev movement are bearing fruit, and more and more folks, even at Daily Kos, are speaking out against the bashers and their total lack of real evidence.

This diary by Bev Harris is a perfect example…the tide is turning, and the trolls are starting to become unglued.  But they haven’t seen nothing yet 😉
Bev Harris really is a hero, and proof that even one real person can make a difference.  I had planned to write my first diary here as a summary of what she has done, and what the trolls have been up to…however, I noticed something rather cute a few minutes ago, and have decided to reveal it as an example of the complexity in dealing with the entire Bev Harris story.

Is the far-left wing really anti-Bev Harris like the right wing?  Or is the far-left infiltrated by right wing trolls pretending to be lefties?  Perhaps both?

A topic for a good debate I’m sure, just as the topic of whether we should spend some of our time trying to impeach George Bush while faced with a Congress that would never impeach him in a million years.  Please note that some who on the surface (the screenname Avila, for example) are involved in this effort…AN EFFORT THAT CANNOT POSSIBLY SUCCEED IF WE DO NOT TAKE BACK THE CONGRESS THIS YEAR, just happen to be anti-Bev Harris trolls.  I believe they are right wing trolls.  I believe they want us to waste our time on projects that cannot be successful.

Yes, George Bush is evil.  Yes, the machines can cheat.  Anti-BBV folks who want us to waste our time on trying to impeach Bush while faced with a right wing Congress that would never, ever, impeach him, are trolls IMO.

NOW FOR SOMETHING CUTE

Please see what my eyes see…

  1.  I’m sure many folks are aware of the screenname Meteor Blades at Daily Kos.  What many people might not be aware of though is that Meteor Blades is one of the anonymous screennames (with a hotmail email) behind the scenes in the anti-Bev Harris campaign.
  2.  In this diary by Bev Harris, a macho-sounding poster by the name of RedDan challenges Bev Harris.  Now this all by itself is cute – RedDan has a gmail email account, and he lists his homepage as http://www.isreview.org/, the homepage of the International Socialist Review.  Maybe that really is RedDan’s homepage, but I believe it’s more likely that RedDan is another right wing troll, and the linkage to “isreview” is meant to discredit Daily Kos, Dems, etc.  After all, why would someone on the far-left be so anti Bev Harris?  So anti-BBV research?  One would think that a far-lefty would embrace BBV research since the machines most like were used to cheat and put Bush in the White House, instead of post statements like “Until you can do that, you have NO evidence, NO proof, and NO case to make.” to Bev Harris.
  3.  Now notice who is handing out 4s to RedDan – there’s tlh lib, who says she is from Tallahassee, but also says she is from southern Georgia.  And there’s OCD is Funny, another troll who only posts anti-Bev comments.  And there’s Meteor Blades!
  4.  This morning, Meteor Blades posted this diary at 1:13:16 AM PST.  Look at the very first comment…
  5.  At 1:13:48 PST, only 32 seconds later, the anonymous screenname Miss Blue posted a comment.  Searching on Miss Blue’s reveals that this supposedly Wisconsin gal just happened to be up at 1:13 AM PST, and made her very first and only post for the (approximately) past 12 hours in Meteor Blades’ diary, of all places – according to the evidence, we are supposed to believe that Miss Blue read the diary, typed a comment, and posted it in just 32 seconds.

Now personally, I find this all sort of funny, but it’s also alarming – another anti-BBV person, cleverly behind the scenes of the effort to malign Bev Harris, posts a diary and then turns around and uses a sockpuppet apparently to post a comment 32 seconds later.

Anyone can post an anti-George Bush diary.  Lots of anonymous screennames post them.

But just wtf are these people?

Thanks for reading,

John