Monday, November 14, 2016

Action against Dakota Pipeline University of Denver Tuesday at 4


     For everyone in Colorado, this is an important action.  Some of the protest will begin at noon and continue....4 o'clock is the rally at Anderson Academic Commons:


What: Day of Action against the Dakota Access pipeline 
Where: University of Denver - Anderson Academic Common, 2150 E Evans Avenue, Denver
When: 4:00 PM-7 PM November 15, 2016 
University of Denver - Anderson Academic Common  2150 E Evans Avenue, Denver, CO 80210
Host Contact Info: micah@350colorado.org
Map data ©2016 Google
Map
Satellite
The movement to stop the Dakota Access Pipeline is growing stronger by the day, and it’s time for all of us to rise up and play a role in this fight.
Join us on Tuesday, November 15 for a solidarity action and rally at DU, where pipeline companies such as Transcanada, Enbridge and Michels (DAPL funders) are convening for a 2-day "Pipeline Leadership Conference". Students and non-students will make sure they know that they are not welcome and will call on the Obama Administration and the Corps of Engineers to revoke the permits for this dirty oil pipeline.
The Army Corps fast-tracked the Dakota Access Pipeline without proper consultation, and as a result, bulldozers are approaching Standing Rock as we speak. But with coordinated, massive demonstrations across the country, we’ll make it clear that this powerful movement will not allow the Obama administration or the incoming President to sacrifice Indigenous rights, our water, or our climate - they must reject this pipeline.
This day of action is one of many calls for solidarity actions targeting not only the Army Corps, but stakeholders at every level -- including the banks who are funding Dakota Access and the companies building the project.
Please bring a candle, art and posters/banners -- and be sure to share on social media with #NoDAPL. Here's the FB event page link: https://www.facebook.com/events/336430943396264/ 
Some sample messages for art include:
  • People over Pipelines
  • #NoDAPL
  • In Solidarity with Standing Rock
  • Obama: Stop the Dakota Access Pipeline
Participating organizations: Native Student Alliance, Black Student Alliance, Divest DU, Sustainable International Development Initiatives, Multicultural Social Justice, Latino Student Alliance, unaffiliated students, Four Winds American Indian Council, American Indian Movement of Colorado, 350 Colorado, Earth Guardians, Greenpeace, Permaculture Action Network, Center for Biological Diversity, Food & Water Watch and many other national partners (Please email micah@350colorado.org if your group would like to join in!)

Friday, November 11, 2016

Basho



I met Basho on the street this morning

There was no hotel to stay in

Ginsberg Waldman Corso DJ

No boarding house to stay in

curled with drink

met worndown womenchildren

High rises of the empty

no studio apartment

no forest paths

do not value art or life

or marijuana

robbers

window-reflected 

bare sidewalktree

Smart shop


Or make a place even on pavement

smokecurling

sunlight

in the brightcold

for poets

I met Basho on the street this morning

the smell of coffee

child with blind eyes

rousted by police

somewhere

a keyboard

refuses



to rest

Saturday, November 5, 2016

My account of Standing Rock water-protectors in Greater Park Hill Community News


       The Greater Park Hill Community News, edited by Cara Degette,  has published since 1961.  Park Hill, a vibrant and pretty integrated community, is one where I lived for a long time.  2 longer articles of mine, emphasizing the importance of sacred stones and sacred land, appeared in the Daily Beast here and in Who.What.Why here.


***

Firsthand Account At Standing Rock

FIRSTHAND ACCOUNT AT STANDING ROCK

Efforts To Halt Oil Pipeline, And Destruction of Sacred Lands
By Alan Gilbert, Photos by Paula Bard, Special to the GPHN
On April 1, some 70 men and women from the Standing Rock Indian Reservation, which straddles North and South Dakota, erected an encampment on private land owned by LaDonna Brave Bull Allard. They were there, on what they hold to be sacred land, to protest the poisoning of their water – water that they hold to be equally sacred.
11-16-standing-rock-4
11-16-standing-rock-111-16-standing-rock-camp11-16-standing-rock-bulldozers-211-16-standing-rock-bulldozers-111-16-standing-rock-marchingWithout consulting the Sioux tribes, a conglomerate oil company in Texas—Energy Transfer Partners—had gotten permission from the U.S. Army Corps of Engineers to construct the $3.8 billion Dakota Access Pipeline (DAP), an oil pipeline that would run near the reservation and beneath the Missouri River, the reservation’s sole source of water.
11-16-standing-rock-5The Dakota and Lakota tribes have long lived in this territory. Here, led by Sitting Bull and Red Cloud, they fought off the U.S. Army and were defeated after long battles. Here, on Sept. 3, 1863, the army committed the Whitestone Massacre of 300 men, women, and children. The tribes still hold treaty rights to this land. Their ancestors are buried here.
11-16-standing-rock-flagBut the Lakota were not consulted by the Army Corps of Engineers, either about their gravesites nor the waters, in the most recent plan to build an oil pipeline.
The pipeline was originally supposed to go above Bismarck, in territory mainly inhabited by whites. But the company shifted it to go south through Standing Rock, crossing under Lake Oahe (part of the Missouri River) and the Missouri twice.
The Sacred Land encampment is a vibrant, spiritual place. It had grown into a second camp of some 2,000 people on nearby public land by the time we arrived on Aug. 30. Over the weekend, the numbers swelled. According to news reports, some 3,000 to 4,000 protesters were encamped at the site.
Since April, word about protecting the waters has spread, and many indigenous peoples have sent support. As you enter Red Warrior camp, the flags of 154 tribes flutter along both sides of the road. People come locally and from as far away as Manitoba, Sasketchwan, California, Oklahoma, and Minnesota.
Here, water does not just give life. Water is an extension of the people. Mni Wiconi is the Lakota phrase: “Water is life.”
11-16-standing-rock-6We spent five days with the land protectors (they do not call themselves protesters, but protectors or defenders). We listened to drumming and prayer songs, sometimes late into the night. We met three Cheyenne and Arapaho women who had just driven 15 hours from Oklahoma, and a man from Minnesota who had been at Standing Rock for a week, gone away, and had just returned.
11-16-standing-rock-2We heard a Minnesota woman who lived near Lake Superior speak about how when she was growing up, you could catch and eat a fish every day. One day, her grandfather warned that there would be a fight over the purity of the water. This had seemed unimaginable to her, the water blue or gray, shifting with sun or clouds.
Now, the waters are murkier, and a pregnant woman may eat only one fish caught in the lake in nine months.
The Lakota is also a women’s culture, so there were two large circle prayer meetings of women while we were there. One went down to the river. The other lifted its voice to the pure waters in the sky. Women sought the maintenance of the Missouri and Lake Oahe for children, grandchildren, and seven generations to come.
In April, young Lakotas said they would not acquiesce to oil pipes under the water. At one evening gathering, a Pawnee counselor who had worked for 12 years to prevent teenage suicides told of the vibrancy and initiative of the runners who spoke to Congress about the DAP.
When the Lakota people pray and sing, they speak naturally of the earth, the mother. The water and the land are given by grandfather spirit—tunkashila in Lakota—to make the life of all tribes, animals, and humans good. Tim Mentz, an elder, spoke of the understandings and instructions, passed through the grandmothers, of 19 generations. And Dave Archambault, Standing Rock Sioux tribal chairman, said that the prayers, which began in April, had yielded guidance, as the elders conjured a vision of a nonviolent resistance movement to protect the water.
Despite dispossession from the lands, the ethnic cleansing, the treaties broken by the U.S. government, and the associated trans-generational trauma, the people at the encampment display an immediate, rich sense of the continuity of their ancestors and the sacredness of the earth.
As 13-year-old Anna Lee Rain Yellowhammer put it in a petition: “Oil companies keep telling us that this is perfectly safe, but we’ve learned that that’s a lie: from 2012-2013 alone, there were 300 oil pipeline breaks in the state of North Dakota. With such a high chance that this pipeline will leak, I can only guess that the oil industry keeps pushing for it because they don’t care about our health and safety. It’s like they think our lives are more expendable than others.”
A substantial leak would poison the waters all the way down to where the Missouri flows into the Mississippi, all the way down to Mexico.
Many of us drink the Missouri’s water, and most of the country eats the crops grown in the region. This pipeline threatens every American.
Editor’s Note: Alan Gilbert is a Distinguished Professor of International Studies at the University of Denver. Paula Bard is a fine-art photographer. They traveled to the Sacred Stone encampment in North Dakota, where efforts are underway to save the waters of the Missouri and sacred gravesites from destruction by the Dakota Access Pipeline. A version of this account first appeared in the online magazine Who.What.Why. In late October, more than 100 protectors were arrested at a peaceful march after they were confronted by police in riot gear. Hundreds of defenders are getting ready to settle in for the winter. 

Monday, October 31, 2016

WhoWhatWhy: How easy-to-hack voting machines endanger democracy


    If this article does not reprint fully, the web address of this Who.What.Why. article is http://whowhatwhy.org/2016/10/31/easy-hack-voting-machines-endanger-democracy/
OCTOBER 31, 2016 | ALAN GILBERT
HOW EASY-TO-HACK VOTING MACHINES ENDANGER DEMOCRACY
Seven Minutes Per Machine
to Steal an Election

Andrew Appel and a Sequoia AVC Advantage voting machine. Photo credit: Andrew Appel / Princeton
Andrew Appel and a Sequoia AVC Advantage voting machine. Photo credit: Andrew Appel / Princeton

Since the “Help America Vote Act” in 2002, tallying votes in
our elections has become dependent on machines that sometimes  leave no paper trail. Manufacturers have “proprietary” programs and will not let any public officials or independent experts examine them.

On a cold winter day in 2007, Andrew Appel, a Princeton computer professor and election specialist, changed the outcome on one of these machines in seven minutes. He proved something that should alarm everyone: in effect, it took seven minutes per machine to steal an election.

In testimony to a House of Representatives Technology Committee on September 28, 2016, which is now suddenly paying attention because of the fear of “Russian” hacking,
Appel noted:

“Installing new software in a voting machine is not really much different from installing new software in any other kind of computer. Installing new software is how you hack a voting machine to cheat. In 2009, in the courtroom of the Superior
Court of New Jersey, I demonstrated how to hack a voting machine. I wrote a vote-stealing computer program that shifts votes from one candidate to another. Installing that vote-stealing program in a voting machine takes seven minutes, per machine, with a screwdriver.”

Machines were initially adopted for vote counting over a
century ago, because they promised speed and convenience. They can tally results more quickly than a more reliable and re-checkable hand count.

From the beginning, there were ways to corrupt non-computerized machines, Appel said. One such ploy was the “pencil shaving trick.” Putting shavings on the lever of an opposition party would choke off counting ballots until the shavings came loose and fell free.

While this left a tell-tale discrepancy between the counted results and the number of voters who signed in at that polling place to vote, the scam worked if no one checked.

Latest Computers Easier to
Hack
.
You might think the advent of computerized voting machines, starting around 2002, would have made it harder to corrupt
vote counting. In fact, even the latest generation of such machines are much easier to hack without leaving a trace.
These machines are big money-makers for private
corporations, which lobbied legislators about their
supposed advantages. But they also pose a serious threat
to the integrity of our elections.

DRE Direct-Recording Electronic or “touchscreen” voting machines that leave no paper trail will be mainly used by voters in 14 states, according to the Brennan Center. Those states include Georgia, and Pennsylvania  —  which are in play this year. Even large regions of Ohio, Virginia, North Carolina and many other states still use them. Among the brand names are Shouptronic, AVC Advantage, AccuVote OS, Optech-III Eagle.
Most of these machines are over 10 years old, and the local authorities have no  manuals for maintenance and repair.

Claiming a lack of funds, state legislatures have refused to replace them.

In 14 states, either computer error or Appel-like reprogramming  could distort results. Without a paper trail, the only way to check the tally is through “initial” exit polling conducted throughout the full span of voting hours and ending when the polls close.
Voting machines: Danaher Shouptronic 1242, Sequoia (Dominion) AVC Advantage, Premier/Diebold (Dominion) AccuVote OS and Optech IIIP-Eagle Photo credit: Verified Voting
Voting machines: Danaher Shouptronic 1242, Sequoia (Dominion) AVC Advantage, Premier/Diebold (Dominion) AccuVote OS and Optech IIIP-Eagle. Photo credit: Verified Voting

Touchscreen machines were widely used in Ohio in the 2004 Kerry-Bush election, the only one of 154 American contests that year in which initial exit polling, which is ordinarily reliable, was markedly out of sync with the officially announced total. Those who know about computers have long been skeptical of this result.

As Appel has demonstrated, tt takes no super-hacking skills to alter voting counts: “I did this in a secure facility and I’m confident my program has not leaked out to affect real elections, but really the software I built was not rocket science — any computer programmer could write the same code. Once it’s installed, it could steal elections without detection for years to come.”

But if computer experts can hack every variety of touchscreen machine, what about foreign governments or domestic organizations?

“Other computer scientists have demonstrated similar hacks on many models of machine,” Appel added. “This is not just one glitch in one manufacturer’s machine, it’s the very nature of computers.”

In late July and early August, columns by Hiawatha Bray in the Boston Globe, and Zeynep Tufekci of The New York Times questioned for the first time whether voting in American elections is secure from such hacking — with suspicion directed, though without evidence, primarily at Russia. Suddenly, the disorganization and lack of transparency of American vote counting had become a National Security Issue.

In late September, the US House of Representatives Subcommittee on Information Technology held hearings on “Cybersecurity: Ensuring the Integrity of the Ballot Box.”

Weighing in on the issue, President Barack Obama pointed out that most American elections are local or state, done under diverse procedures and laws, and involving a large number of voters. Even if particular computers, or a system of computers connected to the Internet, could be hacked from the outside, it would be hard for a foreign or domestic outlaw to falsify the results of a national election.

On the surface, this is a heartening thought. But consider a close election like 2004.  A targeted hack — say, altering one candidate’s vote by an algorithm that kicks in as precincts increase in size — might alter the outcome in certain key counties in a swing state

In addition, voter registration lists are centralized and kept on the Internet. During the Arizona and New York primaries, many Democrats, often younger ones, reported that their registration was changed without their knowledge. They were listed as a Republican or Independent or with no year of registration indicated; as a result, they couldn’t vote in their party’s primary.
This turned out to have been done by election officials “by accident,” and perhaps also by hackers via Internet access.

Bones to Pick with Bipartisan Watchdogs
.
Now elections are watched over by bipartisan committees in which Appel has some confidence. At least, he points out, such supervision does not depend on a single powerful party or leader:
“When we elect our government officials, sometimes we are voting for or against the very person or political party who is in office right now, running that very election! How can we trust that this person is running the election fairly? The answer is, we organize our elections so we don’t have to trust any single person or party.

“That’s why, when you go to the polls in most places, there are typically two poll-workers there, often (by law) from different political parties; and there are poll-watchers, representing the parties to make sure everything is done right. That’s why recounts are done in the presence of witnesses from both parties. We run our elections transparently so the parties can watch each other, and the result is that even the losing candidate can trust that the election was run fairly. “

But there are two problems here. So-called bipartisanship means that third parties, such as the Green Party and the Libertarian Party, are by definition excluded.

In addition, many aspects of the process end up in the hands of a single individual. Chief Clerk of Elections Diane Haslett-Rudiano arbitrarily stripped 123,000 people from the Brooklyn voter rolls in this year’s New York Democratic primary. She  was later fired by the Board of Elections — after the.election was over.

Systemic Weak Points
.
But Appel is even more worried about a systemic weak point in the electoral process.

“Voting machines are often delivered to polling places several days before the election — to elementary schools, churches, firehouses. In these locations anyone could gain access to a voting machine for 10 minutes. Between elections the machines are routinely opened up for maintenance by county employees or private contractors. Let’s assume they have the utmost integrity, but still, in the US we try to run our elections so that we can trust the election results without relying on any one individual.”






An error occurred.

Try watching this video on www.youtube.com, or enable JavaScript if it is disabled in your browser.
The Necessity of Recountable Paper Ballots
.
The only sure way to run a fair election, Appel says, is to use and keep paper ballots. In 2009, Germany adopted a system in which an initial exit poll is announced immediately after voting closes — this determines a range of plausible results within a margin of error — and then paper ballots are counted by hand. They have, since that time, had no major controversies about electoral fairness.

Appel testified that newer, optical screen voting machines can be equally secure if paper ballots are kept and checked. Premier Optical Scan with Automark is used, in parts of California, Colorado, and since 2008, under Secretary of State Jennifer Brunner, in parts of Ohio. Often, these involve entering your vote, and leaving a record, which you see in the machine, on a paper tape, of how your ballot was cast.

But there are two striking problems with even these somewhat better machines. First, in 2014, the Environmental Protection Agency discovered that Volkswagens had an internal computer program which had long passed US emission tests, but polluted forty times more on the road. The cars were able to recognize when they were being tested (and had to keep the emission controls switched on) and when they were on the road and could pollute at will without fear of being caught.  As Barbara Simons of Verified Voting aptly put it, we do not want “VW-style elections.”

Appel’s mantra is: “any computer can be hacked.”

Separating paper ballots physically from a computerized tape and keeping them in a different location, many computer experts believe, would provide further insurance against hacking even on optical scan machines.

Second, challenging the results, particularly in a presidential election and even starting from an automatic recount, as Al Gore did in Florida in 2000, is very difficult. It would take a long time to recount the votes, even if the party in power were not trying to sabotage it…

So the most important thing, as in Germany, is to get each election right in the first place. Why, we might ask, have officials sold public elections and the equal right to vote — again, the most important public feature of our democracy — to private, profit-making corporations? Once again, these corporations, claiming their programs are “proprietary” secrets, do not allow any independent check of how they operate.

A few states like New Mexico have adopted, Appel says, a model procedure for close or controversial elections:

*Immediately conduct a random recount of part of the paper ballots.

*If there is an error, do a full recount.

*Do not certify an election until both are done.”

Appel and nine other experts, including Lawrence Norden from the Democracy Program of the Brennan Center at the New York University Law School and John McCarthy of the Verified Voting Foundation, offered 10 suggestions for securing existing machines and registration lists. For instance, they underline that “without voter-verified paper ballots, effective audits are impossible; they recommend checking samples from the voting system with hand counts of matched sets of paper ballots, recruiting technical experts to help with such tests, and publicizing the results, before certification of the election.

They also recommend a new, detailed ballot accounting by each polling center and reconciliation with the number of those who signed in to vote there. Still, to put these procedures into practice would probably require sustained pressure from the voting public.

Moreover, anyone familiar with vote counting in precincts across the country knows that many computer checking and security measures these experts recommend are far too sophisticated for most poll-watchers to implement before the November 8 election. Further, all Secretaries of State, who are often unabashed political partisans, would have to have good intentions — an assumption hard to reconcile with the actions of Kenneth Blackwell in Ohio in 2004 or Katherine Harris in Florida in 2000.

In contrast, consider the record of  Dana Debeauvoir, election clerk in Travis County which includes the University of Texas (Austin).  She has worked with critics and computer experts, to propose a new type of encryption plus a paper record (it will not be ready, unfortunately, until the 2020 election).

A federal law requiring oversight of elections by politically independent or neutral state officials would vastly improve the security of the American electoral process. But Appel is not optimistic about the prospect of Congressionally mandated  reforms. For the upcoming election, some of the recommended measures will be in place in some jurisdictions across the country.

After this election, however, with a strong democratic push from below, it might be possible to outlaw the highly insecure DREs (touch-screen machines), provide adequate funding as well as training for election officials nationwide, and ensure an independent paper trail on optical scan machines.

In fact, it might even be possible to go to a paper ballot backed up by an initial exit poll. In contrast to this November 8 — when, at best, only the large scale of the election makes likely a trustworthy result — such reforms would ensure that our elections are, both in appearance and in reality, fair.


Related front page panorama photo credit: Adapted by WhoWhatWhy from Andrew Appel (cromulentflavor / YouTube)