Real cases of election tampering
Despite the mounting evidence that election fraud is real and pervasive, many still dismiss it as a "conspiracy theory." I've explained why this label doesn't make sense, but not everyone will buy that explanation. So instead, let's focus on some real-world examples of election rigging being caught.
I'm not talking about inferential examples, based on exit polls and statistical irregularities. These are the results of activists getting evidence of tampering directly from the machines. Such evidence paints an undeniable picture of election fraud happening.
Volusia County used the AccuVote OS optical scanner in 2000. Each precinct has an AccuVote OS unit, with a memory card to store results. As ballots are scanned through on election day, the vote counts on the memory card are updated. Once polls close, the memory card is removed and brought to county headquarters, where it's uploaded into the GEMS central tabulator.
Precinct 216 initially had a memory card uploaded with the correct results. One hour later, however, somebody put in a second memory card for that same precinct. This second memory card replaced the original results and gave Al Gore -16022 (negative) votes, causing his statewide total to drop significantly.
The media called the election for Bush because of this, and Al Gore was about to concede. Luckily, a Volusia County official discovered the issue and reloaded the first memory card, which contained the correct results. A staffer stopped Al Gore and told him this right before he was set to give his concession speech.
Was it just a glitch? Only if there was a legitimate reason to have a second memory card at all. This issue was fixed by reloading the first memory card, meaning the first card was correct. There was never any reason to load a second one. Someone intentionally created a fraudulent memory card with -16022 Gore votes and loaded it into GEMS.
The Diebold central tabulator, GEMS, keeps an audit log of every action you take within the program. Opening/closing the database, modifying the election, and printing results summaries all show up in this log.
Black Box Voting obtained the GEMS audit log for King County. They found that over 3 hours on election night, from 9:52 PM to 1:31 AM, were completely missing. Yet 5 results summaries, which show up in the log, were printed during that period. Somehow, all the log entries in that timeframe were erased.
Could it just be an innocent glitch? The audit log spans 4 months, and the only time period missing from it is those 3 hours on election night. 3 hours in which results are pouring in, and tampering is likely to take place. Combine that with how easy it is to alter the audit log (a chimp can be trained to do it), and King County's history of doing so in the past.
It's almost certain, then, that the audit log was intentionally erased. The only reason for someone to do that would be to hide their activities, and the only reason to do that would be to hide that they were altering an election.
Black Box Voting examined Shelby County's GEMS tabulator in 2006. What they found was a brazen set of security violations, all indicating tampering:
- Microsoft Access, the software that can alter GEMS database, was installed on the system and frequently used. The only Access files on the system are GEMS databases, so that's all that the program could have been opening.
- An HTML editor was also loaded and used. The only major HTML files on the system are election results summaries, so that's almost certainly all the program would have been opening.
- PC Anywhere, a remote access tool, was installed on the GEMS computer. This computer was connected to the Internet, and through PC Anywhere, someone could have logged into the GEMS tabulator from the comfort of their home. Its installation was clearly meant to enable that kind of remote access.
- All of this software, which is blatantly illegal to put on the GEMS computer, was loaded through an encrypted USB flash drive. This would have prevented anyone from proving what was on it. Hiding activities like that during an election would only happen if it was something illicit.
While there was no direct smoking gun, the pieces are all there. The election database and results summaries were being edited, a tool was installed to allow that kind of tampering from any private location, and the installation of the programs to do all this was concealed from everyone.