It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Voting Security Loophole (from ATSNN)

page: 1
0

log in

join
share:

posted on Sep, 15 2004 @ 08:59 AM
link   
John Kenny, a school teacher and patriot, has taken the most dramatic
step to date in the ongoing and desperate battle to wrest the control of
Americanelections out of the hands of corrupt corporations.


 




The five basic elements of voting security are:

1. Poll Book (personal sign in)

2. Paper ballot

3. Ballot box (transparent and locked)

4. Hand Count (of all paper ballots in the ballot
box)

5. Results Posted (prominently displayed at the
polling place)

All five of these basic elements are MISSING from many
voting systems in
America today, two months before an important
presidential election!

Many FOUGHT AND DIED for our right to vote.
Don't GIVE that right away!
Don't give it away to computers.
Don't give it away to the CEO's of private computer
companies.
Don't give it away to politicians taking kickbacks.
Don't give it away to ANYBODY.

Too much blood has been spilled...
Too many lives have been given to ensure our basic
freedoms

Don't let them take it away.
Honor those sacrifices for our free way of life.
Demand your right to vote and to have that vote count!
HUNGER FOR DEMOCRACY!!!


Please visit the link provided for the complete story.

This guy has the right idea.......Although protesters don't get much media coverage, especially when you have corporate media in the government's back pockets.

Help spread the word...

Related News Links:

www.ballotintegrity.org...
www.votersunite.org...
www.blackboxvoting.org...
www.truevoteMD.org...
www.votescam.com...
www.savedemocracy.org...



[edit on 15-9-2004 by TrueLies]

[edit on 15-9-2004 by TrueLies]



posted on Sep, 15 2004 @ 09:11 AM
link   
Manipulation technique found in the Diebold central tabulator --
1,000 of these systems are in place, and they count up to two million
votes at a time.
By entering a 2-digit code in a hidden location, a second set of votes
is created. This set of votes can be changed, so that it no longer
matches the correct votes. The voting system will then read the totals from
the bogus vote set. It takes only seconds to change the votes, and to
date not a single location in the U.S. has implemented security measures
to fully mitigate the risks.

Public officials: If you are in a county that uses GEMS 1.18.18, GEMS
1.18.19, or GEMS 1.18.23, your secretary or state may not have told you
about this. You're the one who'll be blamed if your election is
tampered with. Find out for yourself if you have this problem: Black Box
Voting will be happy to walk you through a diagnostic procedure over the
phone.

www.blackboxvoting.org.../view/78

This program is not "stupidity" or sloppiness. It was designed and
tested over a series of a dozen version adjustments.




[edit on 15-9-2004 by TrueLies]



new topics
 
0

log in

join