Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: Allosaurs_r_us
Nope. never heard another word after I asked her if having obviously protected government code, if she herself was not committing a crime.

Your grasp of facts is not impressive. The code is not "government code." It is claimed to be owned by a corporation. However, that is not the code we used to hack the system. (Which should be even more disturbing -- any ol' person can write their own program and stick it in place of the voting machine program. Nice.)

After researching it, I found she has been "working on this report" for better than a year.

Post link. "This report" is ambiguous. We post many reports. We are working on THIS report, meaning the one regarding the memory card hack of the Diebold optical scan machine (which is different from the central tabulator hack, and the one we did in Leon County is a different central tabulator hack than we did a year ago -- yes, these machines are as full of holes as swiss cheese...)

After googling the possibility of embedded code in the diebold machines, every article on the net with this accusation has her name on it somewhere.

Well, that's progress. At least now we are being credited for our research.

It is all supposition.

The Leon County Election Supervisor corroborated the report on the Leon County Web site. So now it is Black Box Voting (Bev Harris and Kathleen Wynne) AND the documentary film guy AND professor Herbert Thompson AND European computer expert Harri Hursti AND Leon County Supervisor of Elections Ion Sancho, all conspiring to make up a story. Sounds like you are a conspiracy theorist.

I would think if there were any truth to it every DemonRat with any 'puter experience at all would get involved.

As pointed out in the story, the system we hacked is especially popular in democratic jurisdictions.

After close to a year of the first time she made this accusation, she is the only one doing any research.

"This accusation" -- you are mixing your accusations. We are talking about specific hacks, in this case an optical scan memory card hack, which is new. By the way, the central tabulator hack you are referring to was published by me two years ago, not "a year ago." For what it's worth, you have me going under six different names: "Bev Harris" "Kathleen Wynne" "Professor Herbert Thompson" "Harri Hursti" "Thomas James" and "Ion Sancho".

That sure makes it look like a tin foil hat, left wing, moon bat, piece of propaganda to me.

So, acting in the capacity of these six names, I then convinced a television reporter from Tampa and a newspaper reporter from the Tallahassee Democrat that these discoveries are real. Apparently I am a linguist (some of the people in this have foreign accents) and also I do excellent voice impersonations, including being able to switch between men's and women's voices. I also faked the physical voting machine tapes, and did this on camera in front of six witnesses, while being videotaped by two different groups. Wow. I'm very impressive.

(And you say I'm the one wearing a tinfoil hat?)

Well well. I'm off to work now.

Bev Harris

147 posted on 06/08/2005 8:21:34 AM PDT by BevHarris
[ Post Reply | Private Reply | To 146 | View Replies ]


To: BevHarris
You know what Bev, I have yet to see any evidence of what you claim. You are pretty good at innuendo and accusations. We here at FR require little more than that. In other words PUT YOUR MONEY WHERE YOUR MOUTH IS!
 
You told me and Nonlinear you were going to furnish us the code so we could form an opinion. You never even replied other than to ask us what should be in your "report". Since then we have heard nothing but crickets chirping from you. Don't come over here acting all indignant when we question your lack of facts and you don't provide any.
 
It is quite apparent you lurk around here reading our comments, yet have nothing to say. Again I say we look at FACTS, not supposition. If you have something, put it out their where someone can form an opinion.
 
Crawling around in the shadows of FR is not my idea of honesty, or very good ethics for that matter. Or don't ethics mean anything to you and your buddies? From some of the stunts I have seen you pull, I pretty much doubt you have any. If you have to lie, cheat and steal to get what you want, you are no better than those you are trying to expose. And please don't take that as an accusation, I am merely stating that the ethics of an investigation make all the difference on whether or not the investigator is credible.

149 posted on 06/08/2005 10:59:26 AM PDT by Allosaurs_r_us (for a fee........I'm happy to be........Your BACKDOOR MAN!....Dirty Deeds Done Dirt Cheap!)
[ Post Reply | Private Reply | To 147 | View Replies ]

To: BevHarris
Allosaurs_r_us
Nope. never heard another word after I asked her if having obviously protected government code, if she herself was not committing a crime.

Bev Harris
Your grasp of facts is not impressive. The code is not "government code." It is claimed to be owned by a corporation. However, that is not the code we used to hack the system. (Which should be even more disturbing -- any ol' person can write their own program and stick it in place of the voting machine program. Nice.)

I, personally, am still waiting for the executable code found resident on memory cards for the voting machines and/or tabulators.

My understanding from your posts in a previous thread, is that this code was not something your group wrote to hack machines, but rather was resident code on the memory cards that you found and felt did not belong there.

-NL
150 posted on 06/08/2005 11:10:19 AM PDT by NonLinear ("If not instantaneous, then extraordinarily fast" - Galileo re. speed of light. circa 1600)
[ Post Reply | Private Reply | To 147 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson