Clinton Eugene Curtis

0

Clinton Eugene Curtis – Programmer Under Oath Admits Computers Rig Elections

“http://Lybio.net
The Accurate Source To Find Transcript To Clinton Eugene Curtis – Programmer Under Oath Admits Computers Rig Elections.”

[Clinton Eugene Curtis – Programmer Under Oath Admits Computers Rig Elections]

[Cliff Arnebeck:] Source: LYBIO.net
Mr. Curtis, would you please state your full name for the record.

[Mr. Curtis:]
My name is Clinton Eugene Curtis.

[Cliff Arnebeck:]
And where do you reside?

[Mr. Curtis:]
Tallahassee, Florida.

[Cliff Arnebeck:]
And what is your profession?

[Mr. Curtis:]
I’m a computer programmer.

[Cliff Arnebeck:]
Would you please speak into the microphone so that the audience can hear your testimony.

[Mr. Curtis:]
I’m a computer programmer.

[Cliff Arnebeck:]
Mr Curtis, are there programs that can be used to secretly fix elections?

[Mr. Curtis:]
Yes.

[Cliff Arnebeck:]
How do you know that to be the case?

[Mr. Curtis:]
Because in October of 2000 I wrote a prototype for present Congressman Tom Feeney, at the company I work for in Oviedo, Florida, that did just that.

[Cliff Arnebeck:]
And when you say, “Did just that,” it would rig an election?

[Mr. Curtis:]
It would flip the vote fifty-one forty-nine to whoever you wanted it to go to, and whichever race you wanted it to win.

[Cliff Arnebeck:]
And would that program that you designed be something that elections officials, that might be on county boards of elections, could detect?

[Mr. Curtis:]
They’d never see it.

[Audience: “Hmmm!”]

[Cliff Arnebeck:]
Mr….[Audience speaks “… question again”] Would you answer that question once again?

[Mr. Curtis:]
They would never see it.

[Cliff Arnebeck:]
So how would such a program, a secret program that fixes the election, how could it be detected?

[Mr. Curtis:]
You would have to view it either in the source code, or you’d have to have a receipt, and then count the hard paper against the actual vote total. Other than that, you won’t see it.

[Cliff Arnebeck:]
Alright, Mr. Curtis, if you had been asked, you or others with your professional expertise, had been asked to design a protective program, a program that would protect the Ohio elections from against such software to fix the election, could you have done so?

[Mr. Curtis:]
If we’d been asked to make a program that could fix the election? Sure, anybody can do it.

[Cliff Arnebeck:]
No, could you have designed a program, a procedure, a protocol, that would have protected Ohio against this kind of rigging?

[Mr. Curtis:]
No, you have to look at the source code. You have to get, probably, programmers from both, or all, parties to look at the source code, and determine if there’s anything in there that shouldn’t be there. I mean, it’s a simple program, you’re adding one, two persons total. It’s a hundreds lines of code, tops. There’s.. [unintelligible]

[Cliff Arnebeck:]
Are you aware of whether there was any protective action in Ohio against this kind of vote rigging through software?

[Mr. Curtis:]
I don’t know.

[Cliff Arnebeck:]
You don’t know?

[Mr. Curtis:]
I don’t know.

[Cliff Arnebeck:]
You were not asked to assist in the development of any protective system, is that correct?

[Mr. Curtis:]
No I was not.

In your op.. uh..have you reviewed at all the elections results in Ohio?

[Mr. Curtis:]
No I haven’t.

[Cliff Arnebeck:]
OK. Given the availability of such vote-rigging software, and the testimony that has been given under oath of substantial statistical anomalies, and gross differences between exit polling data and the actual tabulated results, do you have an opinion whether or not the Ohio election, the Presidential election, was hacked?

[Mr. Curtis:]
Yes I would say it was. I mean, if you … have exit polling data that is significantly off from the vote, then it’s probably hacked.

[Cliff Arnebeck:]
And your testimony is under oath?

[Mr. Curtis:]
Yes, sir.

[Cliff Arnebeck:]
And the testimony you’ve given is true?

[Mr. Curtis:]
Yes, sir.

Thank you.

[Applause, considerable.]

[Congresswoman Stephanie Tubbs Jones:]
Congresswoman Waters and I have the same question:

[Curtis is directed: “Back to the podium.” Curtis returns to podium.]

[Congresswoman Stephanie Tubbs Jones:]
What did you say you were asked to prepare?

[Mr. Curtis:]
I was asked by Tom Feeney, he’s now Congressman, at that time he was Speaker of the House of Florida; Yang Enterprises’ — which is the company I worked for — lobbyist; and their corporate attorney. He wore a lotta hats.

[Congresswoman Stephanie Tubbs Jones:]
And at that time, he was the Speaker of the House of Florida, is that what you said?

[Mr. Curtis:]
Yes.

[Congresswoman Stephanie Tubbs Jones:]
Ok, thank you.

[Congressman Jerrold Nadler:]
You say he was the lobbyist for the voting machine company at the same time he was Speaker of the House?

[Mr. Curtis:]
I don’t know what the voting machine company, but he was a lobbyist for Yang Enterprises. We had NASA contracts…

[Congressman Jerrold Nadler:]
Yang Enterprises did what, computers?

[Mr. Curtis:]
Computers.

[Congressman Jerrold Nadler:]
OK. And he was your lobbyist, your company’s lobbyist?

[Mr. Curtis:]
He was the lobbyist for Yang Enterprises.

[Congressman Jerrold Nadler:]
And he asked you to design a code to rig an election?

[Mr. Curtis:]
Yes.

[Congressman Jerrold Nadler:]
While he was Speaker of the Florida House?

[Mr. Curtis:]
Yes.

[Congressman Jerrold Nadler:]
Was that during, or previous to, the 2000 election?

[Mr. Curtis:]
Yes, October, end of September.

[Congressman Jerrold Nadler:]
Did he ever express why he wanted the code to rig an election?

[Mr. Curtis:]
No. I immediately assumed that they were trying to keep you guys from cheating on them. [Audience laughs.] So I wrote up the documentation of what you would look for in the source code, how you would make sure that you didn’t get, you know, taken advantage of, make sure that all voting machines had receipts, because that way you could back count the ones that looked funny.

[Congressman Jerrold Nadler:]
By “receipts,” you mean a paper trail?

[Mr. Curtis:]
Yes, paper trail. And I handed that in to Mrs. Yang and said, “Here’s your report, here’s your program.” And she said, “You don’t understand. We need to hide the fraud in the source, in the source code.”

[Congressman Jerrold Nadler:]
Hide the fraud, not reveal it?

[Mr. Curtis:]
Not reveal the fraud, “Because we need it to control the vote in South Florida.” That’s what she it said.

[Audience: “Woh!!”]

[Congressman Jerrold Nadler:]
To your knowledge, was this used?

[Mr. Curtis:]
I have no idea, I, I was ready to leave. [Audience/Curtis laugh.] I retired and left the company.

[Congressman Jerrold Nadler:] Source: LYBIO.net
Your testimony just a moment ago I think you said just before you left in answer to Congresswoman … Jones’ question, would you just repeat what you said in reference to the exit polls?

[Mr. Curtis:]
The exit polls should not be significantly different from the vote.

[Congressman Jerrold Nadler:]
And if they were, you would conclude what?

[Mr. Curtis:]
I would conclude someone’s playing with the vote.

[Congressman Jerrold Nadler:]
Not with the exit polls?

[Mr. Curtis:]
That’s possible too.

[Congressman Jerrold Nadler:]
OK.

[Mr. Curtis:]
Something is definitely skewed.

[Congressman Jerrold Nadler:]
Something is skewed in one or the other?

[Mr. Curtis:]
Right. To select which one, you’d have to see where the problem is.

[Congressman Jerrold Nadler:]
Let me ask you one further question. Assuming for the moment that such software, that’s what you call it? such software to rig a vote, was used, in one or more machines in Ohio or in Florida, could you today detect that, if you looked at the source code?

[Mr. Curtis:]
If you could get the machines, and they had not been patched yet, I mean once they get in and touch ‘em, anything could happen. You could also set timers to do that, but then you’d see the timers. Then you’d have to take those machines, decompile ‘em, which I couldn’t do, but possibly a Microsoft or MIT something, could do, you might, you might, be able to do.

[Congressman Jerrold Nadler:]
You might.

[Mr. Curtis:]
Depends on how good they are at destroying what they had.

[Congressman Jerrold Nadler:]
Destroying what they had by tampering with the machine afterwards, or by programming it with destroying instruction in the first place?

[Mr. Curtis:]
Right.

[Congressman Jerrold Nadler:]
Either or both?

[Mr. Curtis:]
Either or both. Because since you didn’t actually see what’s in there. So you don’t actually know if the code is running in single executable, or running in various modules. If it’s running in modules, you can make the code actually eat itself.

[Audience murmurs, then “Wow!”]

[Congressman Jerrold Nadler:]
Let me ask you just one further question. We’ve been told, I’ve been told, that people who assume that lots of the election results, a large fraction of the election results in this state may have been affected by computerware fraud in the computer are paranoid, because in order to do that you would have to have access to thousands of machines, and that would be readily detectable. Is that true?

[Mr. Curtis:]
It depends on the technology used. If you did a central tabulation machine that fed in, all you would have to do is set a flag. If you set a flag, the central tabulation machine would then flip your vote.

[Congressman Jerrold Nadler:]
So if you, so one person putting in bad code in a central tabulation machine could affect thousands and thousands, or tens of thousands, of votes?

[Mr. Curtis:]
Right. And you could activate it …

[Congressman Nadler starts to speak, but stops]

[Mr. Curtis:]
…you could activate it either automatically, or you could make it so that there’s code existing on like an automic [?] machine that feeds it, where you would punch it in, it would set the flag, server would receive the flag, and then…

[Congressman Jerrold Nadler:]
And if you had a recount … [unclear] … no paper trail — assuming that would happen — would that be revealable by seeing a discrepancy between what the tabulator, the central tabulator trail [unclear] the individual machines which had not been tampered with, have?

[Mr. Curtis:]
Not if I wrote it.

[Congressman Jerrold Nadler:]
Why not?

[Mr. Curtis:]
I would make it match.

[Congressman Jerrold Nadler:]
You could work back from the tabulator to the individual machines? So the tabulator would tell the machines to switch their results?

[Mr. Curtis:]
Yes. It talks both ways. You can flip it to do whatever you need.

[Congressman Jerrold Nadler:]
And they actually do talk to each other, the machines…?

[Mr. Curtis:]
Yes, once it’s hooked up, if it’s networked together, they can talk to each other.

[Congressman Jerrold Nadler:]
So there’s absolutely no assurance whatsoever that anything could be [right?] with these machines?

[Mr. Curtis:]
Absolutely none, unless you look at the source code, and make sure it’s safe before it goes out.

[Congressman Jerrold Nadler:]
Thank you very much.

[Madam Chair:]
Thank you, Congressman Nadler. I know that Congresswoman Waters has questions, and then Senator Miller, and then Congresswoman Stephanie Tubbs-Jones.

[Congresswoman Maxine Waters:]
This will only a moment, if you will come back to the uh, microphone.

[Audience laughs]

[Curtis: ]
I’m new at this.

[Congresswoman Maxine Waters:]
As you know, there has been a lot of discussion about, I think it was Diebold Company, their relationship to the President, and the administration, and supposedly comments about helping to insure that the President was re-elected. In your world, in your environment, have you heard any of this kind of discussion? Do you know people at Diebold? Do you have any sense of any actions that may have been taken?

[Mr. Curtis:]
Uh, I don’t know anything about that at all.

[Congresswoman Maxine Waters:]
Thank you.

[Madam Chair calls Dr. Miller]

[Dr. Miller:]
I suspect that people will attack you in terms of your credibility. Could you restate once again your, your credentials.

[Mr. Curtis:]
Uh, I’m a programmer, I worked for NASA, I worked for Exxon Mobil, I worked for um, Florida Department of Transportation, and other elements of my story, because this company, well, let’s get into it. Why not? This company also had a NASA contract, and they were basically downloading tons of information, I mean, gigabytes’ worth, and handing them off to this little Chinese guy named Henry Nee (?) And, it didn’t seem right, and, he was hacking things

I wrote a program for DOT that allowed contractors to send information into DOT, and he was kind of the quality assurance guy for software. He put a wiretapping module into the program that went out to the contractors so that it actually sent everything they sent, back to Yang. So I reported all this, and just last March I think, he was arrested for attempting to send anti-tank missile chips to the capital of Communist China.

If that’s correct, this is like a small thing…

Of course I think he only got a hundred dollar fine.

[Audience: Hmmmm! Hmmm!]

And no time.

[Audience: Oh God!] Source: LYBIO.net

[Madam Chair:]
Thank you. Congresswoman Stephanie Tubbs-Jones….

[Audience: long, hearty applause]
We are now going to um go back to the public testimony and…

Clinton Eugene Curtis – Programmer Under Oath Admits Computers Rig Elections. It would flip the vote fifty-one forty-nine to whoever you wanted it to go to, and whichever race you wanted it to win. Complete Full Transcript, Dialogue, Remarks, Saying, Quotes, Words And Text.