Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Feeney Implicated in Vote Fraud Congressman sought to alter totals, testimony in Ohio case says
Seminole Chronicle ^ | December 16, 2004 | By Alex Babcock

Posted on 12/20/2004 8:24:57 PM PST by Uncle Vlad

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-43 last
To: Cold Heat
A prom programmer. But I do not know what type of system they are using. A good one would require a computer, like a lap top and a interface program, or a specially made device.

And how is some nefarious Republican outsider who wants to hijack the election manage to access and reprogram hundreds of voting machines in Democrat-run precincts ... without being noticed and stopped?

That's what these conspiracy theories claim.
41 posted on 12/21/2004 7:00:51 AM PST by TexasGreg ("Democrats Piss Me Off")
[ Post Reply | Private Reply | To 32 | View Replies]

To: mewzilla
And look at the way they phrase the lead sentence:

Republican Congressman Tom Feeney of Oviedo asked a computer programmer in September 2000, prior to that year's contested presidential vote in Florida, to write software that could alter vote totals on touch-screen voting machines, the programmer said.

Think there might be an agenda there on the part of the reporter?

42 posted on 12/21/2004 7:24:15 AM PST by Uncle Vlad
[ Post Reply | Private Reply | To 40 | View Replies]

To: TexasGreg
While it might not be that hard to write the software, how are you going to get it into voting machines that are maintained, operated, programmed, and kept by Democrats in Democrat voting districts?????????

If the software has already been written, they should pony up with it. Let's see it!!!!!

The Supervisors of Elections do not "program" the voting machines. They configure the machines within the constraints of the operating systems source code.

One way to change the vote totals would be as follows: The programmer builds in hidden routines during development of the source code that would allow manipulation of vote totals at a later time. These hidden routines could be in the form of multiple code fragments located in many different areas of the program. These fragments would not be documented thus making it very difficult for other programmers to understand the function of those fragments even if they had access to the source code.

Since the source code would not be available to the end users the Supervisors of Elections would never even see the code much less understand its true function. The hidden code would be constructed in such a way as to allow the manipulation of vote totals for any candidate in any location on the ballot. This would be necessary because many States require the positions of candidates to rotate on the ballot between precincts. In other words in some precincts candidate A is position 1 and in other precincts candidate B is in position 1 and A is in 2.

Remember the programmer is writing generic code that will be used for many different elections in different States thus he has to provide for manipulating the totals for any position on the ballot.

After the code is distributed to the end users the programmer can manipulate the vote totals in the following manner.

The programmer (or his flunkies) obtain fake voter registration in all precincts where they want to manipulate the votes. When he votes he marks the ballot in a way that no one would normally use.

For example he could mark every position on the ballot, for all candidates, except for the candidate that he wants to support, lets use candidate B for our example. The voting machine correctly rejects the ballot as being marked incorrectly and alerts the voter that he needs to recheck his ballot. This is normal operation for the machine but the hidden code has now been activated. The hidden code could tell the voting machine to shift 10% of candidate A's votes on that machine over to candidate B.

Now the person manipulating the vote totals completes his ballot in the normal correct method and moves on to the next precinct and his next fraudulent identity.

If the voting machine does not produce a paper ballot there is no way to detect the fraud.

Touch screen voting machines that do not produce a paper trail are an open invitation to fraud. If they haven't already been used to steal votes they certainly will be before long.

43 posted on 12/23/2004 1:15:47 PM PST by LPM1888 (What are the facts? Again and again and again -- what are the facts? - Lazarus Long)
[ Post Reply | Private Reply | To 27 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-43 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson