Site icon The Punching Bag Post

How to Steal an Election – Part 2, The Insider

&NewLine;<p>This is Part 2 of a four part series&comma; this time focused on the damage that an insider can do&period; &nbsp&semi;Any intelligence officer will tell you there is no defense against an inside traitor&period; But when the traitors are running the whole show&comma; not only are you screwed&comma; but the traitors can fix it so there is no investigation&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Insider&nbsp&semi; Plays<&sol;strong><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The &OpenCurlyDoubleQuote;insider” methods specifically require that a voting official or elected official or both are involved in the conspiracy&period;&nbsp&semi; &nbsp&semi;You might think it takes a lot of guts to do this&comma; but if you think about it&comma; when they win &lpar;by cheating&rpar; they can control any investigation that happens afterward&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Insiders have a huge advantage&period; They can literally plan for months to rig an election&comma; make sure all bases are covered and there is little possibility of being caught&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Also remember that once a person votes&comma; the relationship between the person and the vote is severed&period; This means that in one pile you have the record that people voted&comma; and in the other pile you have the anonymous votes&period; For auditing&comma; you may be able to match the number of voters with the number of votes&comma; but if you find a bunch of fraud in the voter’s pile&comma; you have no way of knowing from which candidate to deduct the votes&period; And as we saw in Wisconsin and Pennsylvania&comma; a court will not necessarily throw votes out of an election even in the face of massive fraud&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Out of Date<&sol;strong> <strong>Voter Registration<&sol;strong> – Public officials control the voter registration data&period; They can purposefully leave inaccurate information on the rolls &lpar;e&period;g&period;&comma; dead people&rpar; or even add people to the rolls who have not actually registered to vote&period;  &lpar;I have not seen a case where fictitious voters were added&comma; this may be too easy to catch&period; But then again&comma; who is checking&quest;&rpar;&period;  This in itself does not change the vote count it merely allows many of the Outsider methods to work&period;  <strong>Effectiveness – high&comma; enables everything else&period; Risk &&num;8211&semi; zero&comma; this is done in the open&period;<&sol;strong><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Adding or Destroying ballots in the counting process<&sol;strong> – If you control who counts the votes&comma; then you control the election&period; This is the philosophy in such pseudo-democracies as Russia&comma; Venezuela and China&period; But it applies in the U&period;S&period; as well&period; In the last presidential election we saw evidence that boxes of unaccounted for ballots were trucked in and counted&comma; and even an episode where all of the workers were cleared out because of a &OpenCurlyDoubleQuote;water pipe break” with allegations that boxes of votes were brought in while everyone else was outside&period;  In a previous election&comma; in Broward County&comma; <a href&equals;"https&colon;&sol;&sol;punchingbagpost&period;com&sol;fraud-ballot-box-stuffed-with-nelson-gillum-votes-found-at-ft-lauderdale-airport&sol;"><strong>boxes of ballots were found in an airport locker<&sol;strong>&period;<&sol;a> Did anyone go to jail for this&quest; No&period;  <strong><em>Effectiveness – High for local and Congress&comma; these methods are designed to ensure a win&period; Risk – low&period; To do this one requires a high level conspiracy&comma; planned for months&comma; no audit trail&period; Professionals would never get caught&period;<&sol;em><&sol;strong><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Gaming the Voting Machines&sol;Running Votes Multiple times<&sol;strong> – One method for cheating that was discovered &lpar;and no one knows if or how much it was used&rpar;&comma; was that by physically manipulating the ballot insertion you could count a vote multiple times&period;   A corrupt vote counter who knows the voting machines well will have all kinds of techniques for this&comma; especially if they were able to have conversations with technicians from the company that build the machine&period;  Remember the votes become anonymous&comma; so even if the totals are off&comma; no one knows who to subtract votes from&period;  <strong><em>Effectiveness – Medium&comma; the volume can be relatively high for local elections&period; Statewide and National&comma; no&period;  Risk – medium&comma;  it takes a bit of tradecraft to not be noticed if you are counting in a room with others&period;<&sol;em><&sol;strong><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Making your own ballots with dead people<&sol;strong> – This is great for large scale cheating&period; Since voter registrations are public&comma; and they almost always are not purged of dead people or people who have moved out of the area&comma; it is easy enough to get a list of people who are dead but still eligible to vote&period; In fact&comma; you will be safe if you get the people who have not voted for 10 years or more&comma; they are not likely to vote this election&period; And if a few of them do happen to vote&comma; the rules say they get to vote anyway&period; Nothing is auditable&period; A good data operation can easily get enough to swing an election in a moderately close race&period;  Then you print up your own ballots that are exactly like the ones sent out &lpar;no special security on those&rpar; you fill them out&comma; sign them and send them in&period; Effectiveness – High in any election&period; Risk – low&period; Without an audit trail almost impossible to trace&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The variations on these methods are endless&period;&nbsp&semi; Without bi-partisan supervision of the complete chain of custody of the vote and proper security on absentee ballots&comma; these methods are bulletproof for the corrupt insider&period; In the next installment&comma; Part 3&comma; we will talk about attacks on the vulnerabilities of the voting machines themselves&period; Which come to find out&comma; are plentiful&comma; and some of them on purpose&period;<&sol;p>&NewLine;

Exit mobile version