How to Rig an Election the G.O.P

Total Page:16

File Type:pdf, Size:1020Kb

How to Rig an Election the G.O.P REPORT how to rIg an electIon The G.O.P. aims to paint the country red By Victoria Collier t was a hot summer in 1932 when tion to the defendants. Election rig- By the beginning of the last centu- LouisianaI senator Huey “Kingfish” ging, Long might have quipped, ry, however, sentiment had begun to Long arranged to rig the vote on a had become downright ex- shift. In 1915, the Supreme Court number of amendments to his state’s hausting. But it worked. ruled that vote suppression could be constitution that would be advanta- federally prosecuted. In Terre Haute, geous to his financial interests. Long rom the earliest days of the repub- Indiana, more than a hundred men was no stranger to rigged votes. This lic,F American politicians (and much of had already been indicted for conspir- time around, however, the fix deliv- a cynical populace) saw vote rigging as ing to fix the 1914 elections for mayor, ered by his machine was blatant and sheriff, and circuit judge. The incum- sloppy: his favored amendments won bent sheriff and judge went to jail for unanimously in sixteen New Orleans five years, and Mayor Donn M. Roberts precincts and garnered identical vote spent six years in Leavenworth. totals in twenty-eight others. Roberts and his gang, declared the Eugene Stanley, the incorruptible New York Times, had failed to grasp district attorney for Orleans Parish, that “what is safe and even commend- presented evidence of fraud to a able one year may be dangerous and grand jury. Louisiana’s attorney gen- reprehensible the next.” Almost over- eral, the less morally encumbered night, commonplace corruption had Gaston Porterie, stepped in to sabo- become unacceptable, and vote rigging tage the case for Long. Nonetheless, a serious crime. It took a strongman two judges demanded a recount, at like Huey Long to remain an exception which point Governor O. K. Allen to the rule. But the overall trajectory obliged Long by declaring martial seemed to point toward reform, ac- law. Intimidated jurors found them- countability, and security. In 1920, the selves sorting ballots under the super- Nineteenth Amendment was passed, vision of National Guardsmen, who seventy-two years after Elizabeth Cady stood by to “protect” them with ma- Stanton first demanded women’s chine guns. suffrage—the right that would, in When this effort failed, another a necessary evil. Since the opposition Stanton’s words, “secure all others.” By grand jury was convened. Their even- was assumed to be playing equally the 1960s, Northern Democrats aban- tual finding of a massive conspiracy dirty, how could you avoid it? Most doned their Southern allies and pushed led to the indictment of 513 New Americans would probably have con- to end the mass suppression of black Orleans election officials. Once again, fessed to a grudging admiration for votes below the Mason–Dixon line. Long used his famous powers of per- New York City’s Tammany Hall ma- With the Voting Rights Act of 1965, suasion. At his behest, the Louisiana chine, which bought off judges, politi- many Americans began to believe that legislature modified the state’s elec- cians, and ward captains, ensured the the bad old days of stolen elections tion law, giving ex post facto protec- suppression of thousands of votes, and might soon be behind us. Victoria Collier is a writer and election- controlled Democratic Party nomina- But as the twentieth century came to integrity activist living in Mexico. tions for more than a century. a close, a brave new world of election Illustration (detail) by John Ritter REPORT 33 (33-41) Collier Final 5 CX.indd_0925 33 9/25/12 3:13 PM rigging emerged, on a scale that might dents favoring each candidate. David since a state law specified that recounts have prompted Huey Long’s stunned Moore, who was then managing editor had to be conducted using the very admiration. Tracing the sea changes in of the Gallup Poll, told the paper, “We same “vote-counting device” that was our electoral process, we see that two can’t predict the outcome.” used to begin with—in this case, the major events have paved the way for Hagel’s victory in the general elec- ES&S optical scanners. this lethal form of election manipula- tion, invariably referred to as an “up- Meanwhile, the new millennium, far tion: the mass adoption of computerized set,” handed the seat to the G.O.P. for from delivering a democratic promised voting technology, and the outsourcing the first time in eighteen years. Hagel land, presented Americans with the of our elections to a handful of corpora- trounced Nelson by fifteen points. debacle of the 2000 presidential elec- tions that operate in the shadows, with Even for those who had factored in the tion, whose fate hung absurdly on little oversight or accountability. governor’s deteriorating numbers and “hanging chads”—the little pieces of This privatization of our elections a last-minute barrage of negative ads, punched-out ballot so contentiously has occurred without public knowledge this divergence from pre-election poll- examined during the monthlong re- or consent, leading to one of the most ing was enough to raise eyebrows count. Few Americans knew (and many dangerous and least understood crises across the nation. still do not know) that a faulty com- in the history of American democracy. Few Americans knew that until puter memory card triggered this fiasco. We have actually lost the ability to shortly before the election, Hagel had Late on Election Night, Al Gore’s total verify election results. been chairman of the company whose in Volusia County, Florida, suddenly The use of computers in elections computerized voting machines would dropped when one precinct reported began around the time of the Voting soon count his own votes: Election Sys- 16,000 negative votes. Fox News was Rights Act. Throughout the 1980s and tems & Software (then called Ameri- immediately prompted by Florida gov- 1990s, the use of optical scanners to can Information Systems). Hagel ernor Jeb Bush to call the election for process paper ballots became wide- stepped down from his post just two his brother. On his way to a 3 a.m. spread, usurping local hand counting. weeks before announcing his candidacy. public concession, Gore changed course The media, anxious to get on the air Yet he retained millions of dollars in when a campaign staffer discovered that with vote totals, hailed the faster and stock in the McCarthy Group, which he was actually ahead in Volusia more efficient computerized count. In owned ES&S. And Michael McCarthy, County by 13,000 votes. the twenty-first century, a new tech- the parent company’s founder, was But the damage was done. Gore was nology became ubiquitous: Direct Hagel’s campaign treasurer. cast as a sore loser in a hostile media Recording Electronic (DRE) voting, Whether Hagel’s relationship to environment. His effort to obtain a which permits touchscreen machines ES&S ensured his victory is open to recount was described by Sean Hannity and does not require a paper trail. speculation. But the surprising scale of on Fox News as an attempt to “steal the Old-school ballot-box fraud at its his win awakened a new fear among election.” Meanwhile, George W. Bush most egregious was localized and lim- voting-rights activists and raised a dis- invoked his duty to get on with the ited in scope. But new electronic voting turbing question: Who controls the business of running the country. The systems allow insiders to rig elections new technology of Election Night? rest, as they say, is history. on a statewide or even national scale. “Why would someone who owns a We are now in the midst of yet And whereas once you could catch the voting-machine company want to run another election season. And as guilty parties in the act, and even for office?” asked Charlie Matulka, a November 6 approaches, only one dredge the ballot boxes out of the Democrat who contested Hagel’s Sen- thing is certain: American voters will bayou, the virtual vote count can be ate seat in 2002. Speaking at a press have no ability to know with cer- manipulated in total secrecy. By means conference shortly before the election, tainty who wins any given race, from of proprietary, corporate-owned soft- he added: “Is this the fox guarding the dogcatcher to president. Nor will we ware, just one programmer could steal henhouse?” A construction worker know the true results of ballot initia- hundreds, thousands, potentially even with limited funding and name recog- tives and referenda affecting some of millions of votes with the stroke of a nition, Matulka was obviously a less the most vital issues of our day, in- key. It’s the electoral equiva- formidable competitor than Nelson. cluding fracking, abortion, gay mar- lent of a drone strike. Still, Hagel won an astonishing riage, GMO-food labeling, and elec- 83 percent of the vote—among the toral reform itself. Our faith-based ymbolically speaking, this era was largest margins of victory in any state- elections are the result of a new Dark inauguratedS by Chuck Hagel, an wide race in Nebraska’s history. And Age in American democracy, brought unknown millionaire who ran for one with nearly 400,000 registered Demo- on, paradoxically, by tech- of Nebraska’s U.S. Senate seats in crats on the rolls, Matulka managed nological progress. 1996. Initially Hagel trailed the popu- to scrape up only 70,290 votes. lar Democratic governor, Ben Nelson, Hagel had never actually disclosed he spread of computerized voting who had been elected in a landslide his financial ties to ES&S, and hasT carried with it an enormous poten- two years earlier.
Recommended publications
  • Black Box Voting Ballot Tampering in the 21St Century
    This free internet version is available at www.BlackBoxVoting.org Black Box Voting — © 2004 Bev Harris Rights reserved to Talion Publishing/ Black Box Voting ISBN 1-890916-90-0. You can purchase copies of this book at www.Amazon.com. Black Box Voting Ballot Tampering in the 21st Century By Bev Harris Talion Publishing / Black Box Voting This free internet version is available at www.BlackBoxVoting.org Contents © 2004 by Bev Harris ISBN 1-890916-90-0 Jan. 2004 All rights reserved. No part of this book may be reproduced in any form whatsoever except as provided for by U.S. copyright law. For information on this book and the investigation into the voting machine industry, please go to: www.blackboxvoting.org Black Box Voting 330 SW 43rd St PMB K-547 • Renton, WA • 98055 Fax: 425-228-3965 • [email protected] • Tel. 425-228-7131 This free internet version is available at www.BlackBoxVoting.org Black Box Voting © 2004 Bev Harris • ISBN 1-890916-90-0 Dedication First of all, thank you Lord. I dedicate this work to my husband, Sonny, my rock and my mentor, who tolerated being ignored and bored and galled by this thing every day for a year, and without fail, stood fast with affection and support and encouragement. He must be nuts. And to my father, who fought and took a hit in Germany, who lived through Hitler and saw first-hand what can happen when a country gets suckered out of democracy. And to my sweet mother, whose an- cestors hosted a stop on the Underground Railroad, who gets that disapproving look on her face when people don’t do the right thing.
    [Show full text]
  • Grassroots, Geeks, Pros, and Pols: the Election Integrity Movement's Rise and the Nonstop Battle to Win Back the People's Vote, 2000-2008
    MARTA STEELE Grassroots, Geeks, Pros, and Pols: The Election Integrity Movement's Rise and the Nonstop Battle to Win Back the People's Vote, 2000-2008 A Columbus Institute for Contemporary Journalism Book i MARTA STEELE Grassroots, Geeks, Pros, and Pols Grassroots, Geeks, Pros, and Pols: The Election Integrity Movement's Rise and the Nonstop Battle to Win Back the People's Vote, 2000-2008 Copyright© 2012 by Marta Steele. All rights reserved. Printed in the United States of America. No part of this book may be used or reproduced in any manner whatsoever without written permission, except in the case of brief quotations embedded in critical articles and reviews. For information, address the Columbus Institute for Contemporary Journalism, 1021 E. Broad St., Columbus, Ohio 43205. The Columbus Institute for Contemporary Journalism is a 501(c) (3) nonprofit organization. The Educational Publisher www.EduPublisher.com BiblioPublishing.com ISBN:978-1-62249-026-4 ii Contents FOREWORD By Greg Palast …….iv PREFACE By Danny Schechter …….vi INTRODUCTION …….ix By Bob Fitrakis and Harvey Wasserman ACKNOWLEDGMENTS …...xii AUTHOR’S INTRODUCTION …..xix CHAPTER 1 Origins of the Election ….….1 Integrity Movement CHAPTER 2A Preliminary Reactions to ……..9 Election 2000: Academic/Mainstream Political CHAPTER 2B Preliminary Reactions to ……26 Election 2000: Grassroots CHAPTER 3 Havoc and HAVA ……40 CHAPTER 4 The Battle Begins ……72 CHAPTER 5 Election 2004 in Ohio ……99 and Elsewhere CHAPTER 6 Reactions to Election 2004, .….143 the Scandalous Firing of the Federal
    [Show full text]
  • Voting System Failures: a Database Solution
    B R E N N A N CENTER FOR JUSTICE voting system failures: a database solution Lawrence Norden Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at New York University School of Law is a non-partisan public policy and law institute that focuses on fundamental issues of democracy and justice. Our work ranges from voting rights to campaign finance reform, from racial justice in criminal law to presidential power in the fight against terrorism. A singular institution – part think tank, part public interest law firm, part advocacy group – the Brennan Center combines scholarship, legislative and legal advocacy, and communication to win meaningful, measurable change in the public sector. about the brennan center’s voting rights and elections project The Brennan Center promotes policies that protect rights, equal electoral access, and increased political participation on the national, state and local levels. The Voting Rights and Elections Project works to expend the franchise, to make it as simple as possible for every eligible American to vote, and to ensure that every vote cast is accurately recorded and counted. The Center’s staff provides top-flight legal and policy assistance on a broad range of election administration issues, including voter registration systems, voting technology, voter identification, statewide voter registration list maintenance, and provisional ballots. The Help America Vote Act in 2002 required states to replace antiquated voting machines with new electronic voting systems, but jurisdictions had little guidance on how to evaluate new voting technology. The Center convened four panels of experts, who conducted the first comprehensive analyses of electronic voting systems.
    [Show full text]
  • Black Box Voting Ballot Tampering in the 21St Century
    Chapter 11 Black Box Voting Ballot Tampering in the 21st Century by Bev Harris with David Allen Edited by Lex Alexander Cover Art by Brad Guigar This work is licensed under a Creative Commons License with the follow- ing additional provisos: 1) You must place the text: "If you would like to support the author and publisher of this work, please go to www.blackboxvoting.com/support.html" on the same page as the download, or on the first or last page on which the PNG images appear. 2) The notice: "This book is available for purchase in paperback from Plan Nine Publishing, www.plan9.org." Must appear on the download page or on the first or last page of the PNG images. If you have any questions about this license or posting our work to your own web site, call Plan Nine Publishing at 336.454.7766 226 11 Election Procedures and Physical Security These solve all the problems. (Really?) San Diego County and the states of Maryland, Arizona and Ohio planned to buy new voting machines, and Diebold planned to sell the machines to them. All told, these contracts were worth over a quarter of a billion dollars. By August 2003, the following information was available to purchasing agents who represent the taxpayers: • 40,000 Diebold voting system files were left on an unsecured Web site. • 22,000 uncertified last-minute program modifications were put on voting ma- chines in Georgia by Diebold Election Systems. • Georgia machines malfunctioned so badly that it called the state's certification into question.
    [Show full text]
  • The 2004 Presidential Election: Who Won the Popular Vote? an Examination of the Comparative Validity of Exit Poll and Vote Count Data
    The 2004 Presidential Election: Who Won The Popular Vote? An Examination of the Comparative Validity of Exit Poll and Vote Count Data Jonathan D. Simon, J.D. Verified Vote 2004 [email protected] Ron P. Baiman, Ph.D. Institute of Government and Public Affairs University of Illinois at Chicago [email protected] Published by the Free Press (http://freepress.org) The views expressed are the authors’ own and are not necessarily representative of the views of their respective institutions. Comments or questions directed to the authors are welcome. Editor’s Note: The Dec. 28 document has been edited very slightly for greater clarity and accuracy without any substantive changes to its content. Executive Summary • There is a substantial discrepancy—well outside the margin of error and outcome- determinative—between the national exit poll and the popular vote count. • The possible causes of the discrepancy would be random error, a skewed exit poll, or breakdown in the fairness of the voting process and accuracy of the vote count. • Analysis shows that the discrepancy cannot reasonably be accounted for by chance or random error. • Evidence does not support hypotheses that the discrepancy was produced by problems with the exit poll. • Widespread breakdown in the fairness of the voting process and accuracy of the vote count are the most likely explanations for the discrepancy. • In an accurate count of a free and fair election, the strong likelihood is that Kerry would have been the winner of the popular vote. 2 The Significance of a Popular Vote Victory Although it is the Electoral College and not the popular vote that legally elects the president, winning the popular vote does have considerable psychological and practical significance.
    [Show full text]
  • Vote Counting, Technology, and Unintended Consequences
    St. John's Law Review Volume 79 Number 3 Volume 79, Summer 2005, Number 3 Article 3 February 2012 Vote Counting, Technology, and Unintended Consequences Michael A. Carrier Follow this and additional works at: https://scholarship.law.stjohns.edu/lawreview Recommended Citation Carrier, Michael A. (2005) "Vote Counting, Technology, and Unintended Consequences," St. John's Law Review: Vol. 79 : No. 3 , Article 3. Available at: https://scholarship.law.stjohns.edu/lawreview/vol79/iss3/3 This Article is brought to you for free and open access by the Journals at St. John's Law Scholarship Repository. It has been accepted for inclusion in St. John's Law Review by an authorized editor of St. John's Law Scholarship Repository. For more information, please contact [email protected]. VOTE COUNTING, TECHNOLOGY, AND UNINTENDED CONSEQUENCES MICHAEL A. CARRIERt TABLE OF CONTENTS INTRODU CTION .............................................................................. 646 I. VOTING SYSTEMS, ERRORS, AND FRAUD ................................... 647 A . Voting System s .............................................................. 647 B . Errors ............................................................................. 649 1. Residual V otes .................................................... 650 2. O ther Errors ....................................................... 650 C .F raud ............................................................................. 653 1. Non-DRE Technologies ...................................... 653 2. D R E s ..................................................................
    [Show full text]
  • (Parts 1-5) Black Box Voting Bev Harris Is a Writer and Founder Of
    May 12, 2016 (parts 1-5) Black Box Voting (Formatted to PDF by Dick Atlee, w/size changes on some illustrations) Bev Harris is a writer and founder of Black Box Voting. She has researched and written about election transparency and computerized voting systems since 2002. Harris was featured in the Emmy-nominated HBO documentary Hacking Democracy, and is the author of Black Box Voting: Ballot Tampering in the 21st Century, a book purchased by the White House Library and also reportedly found on Osama bin Laden’s bookshelf. Harris’s research has been covered in The New York Times, Vanity Fair, Time Magazine, CNN and several international publications, including the Philippine Daily Inquirer and Agence France Presse. Contact by text or phone 206- 335-7747 for media inquiries. Bennie Smith is a Memphis-based application developer for an electrical manufacturing company. He is also a political strategist who has developed a micro-targeting application that predicts voter turnout. In August 2014 he was approached by a number of candidates who insisted that their elections had been stolen. He disagreed with the group and offered to look into how the system works. After discovering a number of irregularities, Smith began to research how votes that originate from the same source can change once they get into the GEMS vote tabulation program. Smith’s attention to these anomalies uncovered an extraordinarily high-risk tampering mechanism and ultimately provided a new infrastructure for analyzing questionable election results. Contents Part 1: Votes
    [Show full text]
  • Black Box Voting Ballot Tampering in the 21St Century
    Chapter 2 Black Box Voting Ballot Tampering in the 21st Century by Bev Harris with David Allen Edited by Lex Alexander Cover Art by Brad Guigar Special "Open-Source" License - The electronic form of this book in Adobe PDF format and PNG format may be distributed freely with the following restrictions: 1) The content may not be altered in any way. 2) You must place the text: "If you would like to support the author and publisher of this work, please go to www.blackboxvoting.com/support.html" on the same page as the download, or on the first or last page on which the PNG images appear. 3) The notice: "This book is available for purchase in paperback from Plan Nine Publishing, www.plan9.org." Must appear on the download page or on the first or last page of the PNG images. 4) The files may not be sold, nor any compensation be asked for by the licensee to read or download the files or images. THAT'S ALL FOLKS! 16 2 Do Voting Machines Ever Get it Wrong? I refer to this chapter as the “I don’t believe there is a problem” chapter. I wrote this obese section for the people who, when you give them the short but horrifying version, insist on minimizing the problem. When you jump into the fray, you’ll soon meet them: You tell them about an election that lost 25 percent of its votes, and they say “that’s just an isolated incident.” When you add that another election had a 100 percent error, they call it a “glitch.” When you tell them a voting machine was videotaped recording votes for the opposite candidate than the one selected, they say, “There are problems in every election.” No.
    [Show full text]
  • Vote Counting, Technology, and Unintended Consequences
    St. John's Law Review Volume 79 Number 3 Volume 79, Summer 2005, Number 3 Article 3 Vote Counting, Technology, and Unintended Consequences Michael A. Carrier Follow this and additional works at: https://scholarship.law.stjohns.edu/lawreview This Article is brought to you for free and open access by the Journals at St. John's Law Scholarship Repository. It has been accepted for inclusion in St. John's Law Review by an authorized editor of St. John's Law Scholarship Repository. For more information, please contact [email protected]. VOTE COUNTING, TECHNOLOGY, AND UNINTENDED CONSEQUENCES MICHAEL A. CARRIERt TABLE OF CONTENTS INTRODU CTION .............................................................................. 646 I. VOTING SYSTEMS, ERRORS, AND FRAUD ................................... 647 A . Voting System s .............................................................. 647 B . Errors ............................................................................. 649 1. Residual V otes .................................................... 650 2. O ther Errors ....................................................... 650 C .F raud ............................................................................. 653 1. Non-DRE Technologies ...................................... 653 2. D R E s ................................................................... 654 a. Homebrew Smartcards .................................. 657 b. AdministratorSmartcards ............................ 658 c. Ballot Definition ............................................
    [Show full text]
  • Hacking Elections Is Easy! Part 1: Tactics, Techniques, and Procedures
    Hacking Elections is Easy! Part 1: Tactics, Techniques, and Procedures September 2016 Authors James Scott (Senior Fellow – Institute for Critical Infrastructure Technology) Drew Spaniel (Researcher – Institute for Critical Infrastructure Technology) Thought Leadership Contributions from the Following Experts: Rob Roy (ICIT Fellow & CTO, HPE Federal) Underwritten by: Copyright 2016 – Institute for Critical Infrastructure Technology (ICIT) 1 Join ICIT at HPE Protect 2016 Gaylord National Resort and Convention Center National Harbor, MD September 13-16, 2016 http://h41382.www4.hpe.com/hpe_protect/ www.ICITGala.org Publication Alert “Hacking Elections is Easy! Part Two” will be available for download the week of September 5th: http://icitech.org/icit-analysis-hacking-elections-is-easy-part-two/ 2 Contents Introduction .................................................................................................................................................. 3 Breached Trust .............................................................................................................................................. 3 A Global Target ............................................................................................................................................. 5 Hacking Campaigns and Candidates ............................................................................................................. 6 The Black Box Legacy ...................................................................................................................................
    [Show full text]
  • Black Box Voting Ballot Tampering in the 21St Century
    Chapter 2 Black Box Voting Ballot Tampering in the 21st Century by Bev Harris with David Allen Edited by Lex Alexander Cover Art by Brad Guigar Special "Open-Source" License - The electronic form of this book in Adobe PDF format and PNG format may be distributed freely with the following restrictions: 1) The content may not be altered in any way. 2) You must place the text: "If you would like to support the author and publisher of this work, please go to www.blackboxvoting.com/support.html" on the same page as the download, or on the first or last page on which the PNG images appear. 3) The notice: "This book is available for purchase in paperback from Plan Nine Publishing, www.plan9.org." Must appear on the download page or on the first or last page of the PNG images. 4) The files may not be sold, nor any compensation be asked for by the licensee to read or download the files or images. THAT'S ALL FOLKS! 16 2 Do Voting Machines Ever Get it Wrong? I refer to this chapter as the “I don’t believe there is a problem” chapter. I wrote this obese section for the people who, when you give them the short but horrifying version, insist on minimizing the problem. When you jump into the fray, you’ll soon meet them: You tell them about an election that lost 25 percent of its votes, and they say “that’s just an isolated incident.” When you add that another election had a 100 percent error, they call it a “glitch.” When you tell them a voting machine was videotaped recording votes for the opposite candidate than the one selected, they say, “There are problems in every election.” No.
    [Show full text]
  • 09-10-Swim-Guide.Pdf
    Carolina Swimming and Diving • General Information 2009-10 Table of Contents All-Americas, NCAA Qualifiers & All-ACC Honorees . Front Cover 2008-09 Team Pictures in Color . Inside Front Cover General Information . 1 2009-10 Women’s Roster. 2 2009-10 Men’s Roster . 3 2009-10 Women’s Season Preview . 4 2009-10 Men’s Season Preview. 5 2009-10 Preseason Men’s Depth Chart . 6 2009-10 Preseason Women’s Depth Chart . 7 2008-09 Final Men’s Depth Chart. 8 2008-09 Final Women’s Depth Chart . 9 2009-10 Schedule, 2008-09 Team Results, Koury Natatorium Information . 10 General Carolina Athletic Department Information . 11 Head Coach Rich DeSelm . 12 Diving Coach Kevin Lawrence . 15 Chief Assistant Coach Mike Litzinger . 16 Assistant Coach Eric Stefanski . 17 Assistant Coaches Christy Garth & Sean Quinn . 18 2009-10 North Carolina Swimming & Diving Quick Facts Assistant Coaches Griff Helfrich & Jon Fox, Location: Chapel Hill, N.C. Carolina Swimming Support Staff. 19 Established: December 11, 1789 2009-10 Tar Heel Men’s Swimming & Diving Biographies . 20 Enrollment: 28,136 (17,895 undergraduates, 8,275 postgraduates) 2009-10 Tar Heel Women’s Swimming & Diving Biographies . 36 Chancellor: Dr. Holden Thorp 2009-10 Team Pictures in Black & White . 50 Director of Athletics: Dick Baddour Senior Associate Athletic Director for Olympic Sports: Dr. Beth Miller Great Moments in Carolina Swimming & Diving History . 51 National Affiliation: NCAA Division I Carolina Swimming History and Tradition . 54 Conference: Atlantic Coast Conference All-Americas . 60 Nickname: Tar Heels ACC Champions. 63 Mascot: Rameses the Ram (Both Live and Costumed) Conference Award Winners .
    [Show full text]