Bev Harris has been screaming all along about the inherent security vulnerabilities of the vote tabulators. Apparently the GEMS software running on those systems stores all of its voter data in an Access database. And any chimp with a
modem and basic computer skills could potentially log in to the GEMS system and change the vote tally to their liking. Changing data manually through the Access interface, rather than through the GEMS software, would leave no record of the transaction in the system's log.
But there is a way to see if someone has been fooling around where they shouldn't....
Check the phone records! After all, every connection to the tabulator would have to go through the phone line; and the phone company should have records of every call they have terminated at that number. A simple crosscheck of the numbers that dialed in on November 2nd with the numbers from the polling stations should allow you eliminate all but the intruder(s). Follow this with reverse phone number look-up and you have your man. Don't be surprised if you call the number and someone answers with
"Thank you, for calling the RNC."