Fitrakis v. Husted et al

Filing 3

MOTION for Temporary Restraining Order by Plaintiff Robert J Fitrakis. [ELECTION ISSUE(S) CITED] (Attachments: # 1 Affidavit, # 2 Exhibit A, # 3 Exhibit B, # 4 Exhibit C, # 5 Exhibit D, # 6 Affidavit, # 7 Attachment 1, # 8 Attachment 2, # 9 Attachment 3, # 10 Attachment 4, # 11 Attachment 5) (jcw1)

Download PDF
Declaration of James “Jim” March 1 I, JAMES “JIM” MARCH, hereby declare: 2 I make the following declaration regarding Ohio's election processes. I have 3 personal knowledge of the matters set forth below, and, if called upon to do 4 so, would testify competently thereto. 5 6 1) I have extensive professional experience working with computer technology 7 since 1984. 8 personal and professional work on election systems) totals approximately 17 9 years and includes computer technical support, systems administration, My experience in the computer industry (completely separate from 10 technical writing, training and security analysis. 11 and support certifications for Novell and IBM networking components, and have 12 received a broad range of ongoing industry training through my career in high- 13 tech computer industry. 14 15 I hold authorized install In recent years, I have used my experience to provide technical assistance to persons and organizations active in the analysis of computer-based voting systems. 16 17 18 19 20 21 22 23 24 25 2) Beginning in June of 2003 I was given access to a variety of materials related to Diebold Election Systems Incorporated (“Diebold”) and their corporate ancestors Global Election Systems Inc. and Spectrum Print and Mail. These materials were provided to me primarily by writer/activist Bev Harris, who obtained them from a public, unsecured Internet site run by Diebold. The first batch of materials obtained by Ms. Harris in January 2003 included running program files, a variety of election data files, system manuals, source code for some components, internal corporate memos (some marked “not for customer review”), industry-specific documents and the like. This material included functional copies of the Diebold “central tabulator” 26 software known as GEMS – Global Election Management Software. 27 3) After I assisted Ms. Harris in sorting through the material she had 28 obtained from the public, unsecured Diebold website, she posted much of this material, including the GEMS tabulator software code, on a public website. Page 1 of 5 Declaration of James “Jim” March 1 2 4) In the years since I have testified in numerous court cases, the most 3 recent in a mandamus and injunction action in Pima County AZ on Nov. 1st 2012. 4 My testimony is available and online at: http://youtu.be/IFY1iwE2qzI 5 6 5) I currently sit on the Pima County Election Integrity Commission, an 7 official advisory body to the Pima County Board of Supervisors. 8 unpaid position I meet in accordance with AZ's open meetings laws. 9 hold a position of member of the board of directors, Southern Arizona chapter, In this I also 10 ACLU, and I am a founding and current board member at 11 http://blackboxvoting.org – a nationally known 501(c)3 organization which 12 investigates and comments on electronic voting issues. 13 declaration on behalf of any of these named organizations. 14 15 16 17 18 19 20 21 I do not write this I am in possession of an electronic copy of a document titled “AGREEMENT BETWEEN THE OHIO SECRETARY OF STATE AND ELECTION SYSTEMS AND SOFTWARE LLC”. There is a contract number of “2013-004”. It is 28 pages long, in PDF format from what appears to be original scanned paper documents. There is no obvious evidence of tampering with the document – the resolution, fonts and other formatting/stylistic issues are consistent throughout. For the purposes of this declaration I will assume this document to be accurate and I will comment on it on that basis. 22 23 24 25 6) This document purports to describe a custom software application created by Election Systems and Software (“ES&S”) that will have the following characteristics: a) It will run on the primary central tabulator computers that add up the 26 vote totals for each county that is already an ES&S customer. 27 b) It will have access to the central tabulator database, extracting 28 information into a very simple, standard data format known as “comma separated values” or .CSV. These .CSV files will contain actual, live vote Page 2 of 5 Declaration of James “Jim” March 1 totals organized most likely by precinct, original voting method (precinct, 2 mail-in, early voting, provisional voting, etc.) and vote totals for 3 candidates, issues, etc. 4 5 7) For a number of reasons, I believe that this custom software is not 6 necessary for the conduct of elections and is in fact highly dangerous – the 7 presence of this software significantly reduces the odds that the election 8 results (on a county or statewide level) will be legally and/or 9 constitutionally correct. My analysis follows. 10 11 8) First, I have examined the election results created by the “normal” (or 12 “built in”) election reporting tools included with the standard, certified 13 ES&S central tabulator application. 14 15 16 17 18 19 The results reports so created are entirely adequate to figure out who won and lost, on a precinct or jurisdiction-wide level. The standard, certified ES&S system can also produce electronic data file results that can be written from the central tabulator to a CD-ROM or other such media for uploading to the Internet. Transcribing the results for use by some other system might take a little bit of time but is a simple enough matter. 20 21 22 23 24 25 9) Like any modern election management system the vote totals (along with candidate/race names, precinct numbers and the like) are stored in a database. ES&S uses a variant of SQL – Structured Query Language – which can be read to and written from a number of different programs. The situation is the same with world processing files – a Microsoft Word .DOC document file can also be read by and worked with in WordPerfect, AbiWord, OpenOffice, LibreOffice and 26 others. 27 28 10) What ES&S has chosen to do here is extremely dangerous and exactly what you'd want to do if you wanted to plant a “cheat” onto the central tabulator. Page 3 of 5 Declaration of James “Jim” March 1 Their custom application written in a variant of the COBOL programming 2 language would have full contact with the central tabulator database on both a 3 read and write basis, while running on the same computer as where the “master 4 vote records” (the central tabulator database – the “crown jewels” of the 5 whole process) are stored. 6 7 11) Under this structure a case of accidental damage to the “crown jewels” of 8 the election data is possible. 9 using uncertified, untested software would be child's play. A case of deliberate tampering of that data 10 11 12) What they should have done is perform the normal export of the election 12 results by way of the standard process built into the central tabulator, print 13 that out to paper, then write a program that runs on some other computer to 14 15 16 17 18 19 20 takes the electronic output from the standard central tabulator software as an “input” and then spit out industry-standard .CSV data as an “output”. In this scenario the new custom software to create .CSV files could not possibly change the “crown jewels” data because it doesn't have access to the original source records – only a copy. And if that new custom application messed up and mis-reported results, a quick eyeball check against the standard central tabulator results would reveal the issue in a matter of minutes. 21 22 23 24 25 13) What they have done instead is criminally negligent just from a standpoint of data security. To double-check the results after this new system is implemented you'd have to go back to the original paper and/or any remaining “poll tapes” from the precincts (“cash register” type paper strips containing that precinct's vote totals). “Poll tapes” from the mail-in vote process may 26 not even exist – most systems feed mail-in votes from scanners straight into 27 the central tabulator with no independent record of the vote. In either case 28 there would need to be public records access to either the poll tapes (if they exist or new ones haven't been faked up on a small PC printer meant for cash Page 4 of 5 Declaration of James “Jim” March 1 registers) or the original paper ballots. There has been widespread media 2 complaints about the lack of access to either sort of public records in Ohio 3 (esp. the 2004 election) and elsewhere. 4 access to those records would allow alteration or replacement of those 5 documents. Common public records delays in 6 7 14) In conclusion, the idea of producing industry-standard .CSV data files of 8 election results is not inherently bad. 9 however is unspeakably stupid, excessively complex and insanely risky. The method of execution chosen In 10 medical terms it is the equivalent of doing open heart surgery as part of a 11 method of removing somebody's hemorrhoids. 12 either the dumbest Information Technology “professional” in the US or has 13 criminal intent against the Ohio election process - and if I were to guess it 14 Whoever came up with this idea is would be the latter. 15 16 17 18 Pursuant to 28 U.S.C. §1746, I declare under penalty of perjury that the foregoing is true and correct. Executed this 3rd day of November, 2012 at Tucson, Arizona. 19 20 21 Jim March 22 23 24 25 26 27 28 Page 5 of 5

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?