Site icon The Punching Bag Post

How to Steal an Election – Part 4 – Prevention and Mitigation

&NewLine;<p>Now that we have told you the ways the voting system can be attacked&comma; we should probably give you our take on what it will take to defend it and make it secure from the De-&comma; er&comma; I mean&comma; evildoers&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Most security professionals will start with the basics of security coverage&period; They are<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>1&period; Physical<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>2&period; Technical<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>3&period; Administrative<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Think about it&period; Without a physical barrier&comma; the technical measures are useless and without the administrative process to determine what is an attack or not&comma; the whole system is useless&period; Technical measures give greater vision into what you are trying to protect and help the administrative side organize&comma; coordinate information and determine threats and responses&period;  There are a number of different but similar guides to security&comma; but this is the age-old framework from my bad-old days&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The second principle is that security comes in layers&period; There is no silver bullet that ensures complete security&comma; any single measure can be penetrated by an expert attacker&period; But if you have three diverse layers of security &lpar;perhaps one each of physical&comma; technical and administrative&rpar; that each prevent 99&percnt; of breaches&comma; then your chances of being breached go to a million to one against&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>And for elections&comma; this must be done well&period; Remember that elections have trillion dollar consequences and countless people have died for American ideals and beliefs&comma; all hinging on the right to vote&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Voter ID<&sol;strong>  &&num;8211&semi; This is the most obvious&period; Positive identification of voters&comma; that they are who they say they are&comma; that they are in the right place and that they have only voted once&period;  I’m not saying that a lot of people are going from polling place to polling place&period; The point is that it makes it more difficult to fake the verification for the other methods of cheating&period; Those most effective techniques cannot work with positive voter ID&period;  And by the way&comma; no reason not to have security cameras around polling places&comma; drop off boxes&comma; etc&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>This also means maintaining the voter rolls so that the identities of dead and otherwise departed voters cannot be hijacked en masse&period; More on this below&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Signature Verification<&sol;strong> &&num;8211&semi; Signature verification has emerged as one of the giant loopholes in elections that have allowed cheating to occur&period; In multiple instances&comma; vote counters were NOT ALLOWED to throw out any ballots even when signatures were obviously not the same&period; &nbsp&semi;&nbsp&semi;At the very least some rudimentary handwriting analysis should be taught to vote counters&period; Note that this is not a 100&percnt; guarantee&comma; it is merely one of those layers that is 99&percnt; effective&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Secure the ballots<&sol;strong> – Did you know that a &dollar;20 bill contains four separate&comma; sophisticated security features&quest;&nbsp&semi; A &dollar;20 bill is almost impossible to counterfeit without very expensive and complex machinery&period; &nbsp&semi;Absentee ballots on the other hand are often produced locally&comma; often with standard office equipment&period; We recommend that they be produced with some of the security features not available to the average cheater&period; If fraudulent votes are discovered&comma; it makes it much easier to track the fraud back to the sources and the culprit&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>If an insider can get more of the exact same ballots from the same source&comma; there is a problem&period; &nbsp&semi;But duplicate ballots don’t help if Voter ID is used and the voter rolls are kept clean&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Integrated Auditing &sol; Secure the Chain of Custody for Votes<&sol;strong>  &&num;8211&semi; Procedures for packing&comma; logging&comma; transporting and accounting for ballots should be implemented along the lines of law enforcement&&num;8217&semi;s chain of custody process&period;  This must be strictly enforced&comma; all the way from the vendor who prints the ballots to the final storage and&sol;or destruction of completed ballots&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>However&comma;  like every other process&comma; an insider can corrupt any process&period; The chain of custody MUST have the participation of both Democrats and Republicans&period; Either side should be able to observe and verify proper procedures&comma; and object&comma; audit or halt the process &lpar;at least long enough to document&comma; perhaps long enough to investigate&rpar;when necessary&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>And please&comma; make the auditing process simple such that non-technical citizens can understand&period; Millions in research has gone into user interface design&comma; it is not rocket science to make detecting a problem really obvious&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Statistical analysis for anomalies<&sol;strong> – Any time a statistically unlikely event occurs&comma; like say&comma; 300&comma;000 votes coming in all at once at 3 am and favoring a particular candidate&comma; it should be logged and should prompt an immediate bipartisan investigation&period; this is easy enough&comma; there are plenty of polls out there to guide the statistic&period; We know that polls are never actually right&comma; but they are usually not that wrong either&period; Perhaps we can get polls from both sides of the political fence&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Auditing Voter Registration Records<&sol;strong> – As mentioned above&comma; states have not been good at purging dead&comma; nonexistent or geographically departed people from their voter rolls&period; Any reluctance to do this is really a support of vote fraud&comma; best I can tell&period; I can’t think of any other reason to not do it&period;  This kind of data reduction has been done with numerous government functions&comma; including drivers licenses&comma; it can be made routine&period; But it must be secure and accurate&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Throwing fraudsters in jail<&sol;strong> – This is perhaps the most important measure&period; It is very difficult in this environment to catch vote fraud&period; When it is caught&comma; or it is found that someone purposely did not follow the rules&comma; they should go to jail&period; That is what jail is for&comma; to discourage future lawbreaking&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>By the way&comma; the Biden Administration’s &OpenCurlyDoubleQuote;<em>Freedom to Vote Act<&sol;em>” &lpar;just defeated in Congress&comma; so it won’t become law&rpar;&comma; almost explicitly encourages measures that facilitate cheating and open opportunities by make the process more difficult to secure&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Take a quick look at some of its major features&period; See if you can match those features to a particular method of cheating &lpar;go ahead&comma; its not hard…&rpar; and leave them in the comment section below&colon;&nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list"><li>Expanded access to early voting<&sol;li><li>Making it illegal to prevent someone from registering to vote&period;<&sol;li><li>Expansions to same-day voter registration&colon; 56&percnt; for&comma; 30&percnt; against&period;<&sol;li><li>Expanded access to mail-in voting&colon; 55&percnt; for&comma; 35&percnt; against&period;<&sol;li><li>Allowing felons to vote&colon; 54&percnt; for&comma; 32&percnt; against&period;<&sol;li><li>Expansions to automatic voter registration&colon; 51&percnt; for&comma; 33&percnt; against&period;<&sol;li><&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<p>And that completes the four part series&period; Cheating is easy&comma; securing our voting system is not&period; &nbsp&semi;We have a lot of work to do&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Some of the references for this article&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;f5&period;com&sol;labs&sol;articles&sol;threat-intelligence&sol;three-ways-to-hack-the-u-s--election">https&colon;&sol;&sol;www&period;f5&period;com&sol;labs&sol;articles&sol;threat-intelligence&sol;three-ways-to-hack-the-u-s&&num;8211&semi;election<&sol;a><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong><a href&equals;"https&colon;&sol;&sol;freedom-to-tinker&period;com&sol;2018&sol;10&sol;25&sol;ten-ways-to-make-voting-machines-cheat-with-plausible-deniability&sol;">Ten ways to make voting machines cheat with plausible deniability<&sol;a><&sol;strong><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;politico&period;com&sol;magazine&sol;story&sol;2016&sol;08&sol;2016-elections-russia-hack-how-to-hack-an-election-in-seven-minutes-214144&sol;">https&colon;&sol;&sol;www&period;politico&period;com&sol;magazine&sol;story&sol;2016&sol;08&sol;2016-elections-russia-hack-how-to-hack-an-election-in-seven-minutes-214144&sol;<&sol;a><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;gq&period;com&sol;story&sol;how-to-hack-an-election">https&colon;&sol;&sol;www&period;gq&period;com&sol;story&sol;how-to-hack-an-election<&sol;a><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><a href&equals;"https&colon;&sol;&sol;theweek&period;com&sol;articles&sol;810795&sol;how-republicans-cheat">https&colon;&sol;&sol;theweek&period;com&sol;articles&sol;810795&sol;how-republicans-cheat<&sol;a><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><a href&equals;"https&colon;&sol;&sol;en&period;wikipedia&period;org&sol;wiki&sol;Electoral&lowbar;fraud">https&colon;&sol;&sol;en&period;wikipedia&period;org&sol;wiki&sol;Electoral&lowbar;fraud<&sol;a><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;heritage&period;org&sol;election-integrity&sol;heritage-explains&sol;voter-fraud">https&colon;&sol;&sol;www&period;heritage&period;org&sol;election-integrity&sol;heritage-explains&sol;voter-fraud<&sol;a><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;newsmax&period;com&sol;us&sol;electoral-count-act-poll-voting-reform&sol;2022&sol;01&sol;12&sol;id&sol;1052047&sol;">https&colon;&sol;&sol;www&period;newsmax&period;com&sol;us&sol;electoral-count-act-poll-voting-reform&sol;2022&sol;01&sol;12&sol;id&sol;1052047&sol;<&sol;a><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;amazon&period;com&sol;Rules-Radicals-Practical-Primer-Realistic&sol;dp&sol;0679721134">https&colon;&sol;&sol;www&period;amazon&period;com&sol;Rules-Radicals-Practical-Primer-Realistic&sol;dp&sol;0679721134<&sol;a><a href&equals;"https&colon;&sol;&sol;www&period;washingtontimes&period;com&sol;news&sol;2021&sol;oct&sol;26&sol;virginia-gop-guarding-unattended-ballot-drop-boxes&sol;">https&colon;&sol;&sol;www&period;washingtontimes&period;com&sol;news&sol;2021&sol;oct&sol;26&sol;virginia-gop-guarding-unattended-ballot-drop-boxes&sol;<&sol;a><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<figure class&equals;"wp-block-embed is-type-wp-embed is-provider-the-punching-bag-post wp-block-embed-the-punching-bag-post"><div class&equals;"wp-block-embed&lowbar;&lowbar;wrapper">&NewLine;<blockquote class&equals;"wp-embedded-content" data-secret&equals;"5fxWGak7ld"><a href&equals;"https&colon;&sol;&sol;punchingbagpost&period;com&sol;obvious-blatant-voter-fraud-brenda-snipes-in-broward-county&sol;">Obvious&comma; Blatant Voter Fraud&colon; Brenda Snipes in Broward County<&sol;a><&sol;blockquote><iframe class&equals;"wp-embedded-content" sandbox&equals;"allow-scripts" security&equals;"restricted" style&equals;"position&colon; absolute&semi; clip&colon; rect&lpar;1px&comma; 1px&comma; 1px&comma; 1px&rpar;&semi;" title&equals;"&&num;8220&semi;Obvious&comma; Blatant Voter Fraud&colon; Brenda Snipes in Broward County&&num;8221&semi; &&num;8212&semi; The Punching Bag Post" src&equals;"https&colon;&sol;&sol;punchingbagpost&period;com&sol;obvious-blatant-voter-fraud-brenda-snipes-in-broward-county&sol;embed&sol;&num;&quest;secret&equals;5fxWGak7ld" data-secret&equals;"5fxWGak7ld" width&equals;"600" height&equals;"338" frameborder&equals;"0" marginwidth&equals;"0" marginheight&equals;"0" scrolling&equals;"no"><&sol;iframe>&NewLine;<&sol;div><&sol;figure>&NewLine;&NewLine;&NewLine;&NewLine;<figure class&equals;"wp-block-embed is-type-wp-embed is-provider-the-punching-bag-post wp-block-embed-the-punching-bag-post"><div class&equals;"wp-block-embed&lowbar;&lowbar;wrapper">&NewLine;<blockquote class&equals;"wp-embedded-content" data-secret&equals;"Y7njuCJepL"><a href&equals;"https&colon;&sol;&sol;punchingbagpost&period;com&sol;more-evidence-of-voter-fraud-found-in-florida&sol;">More Evidence of Voter Fraud Found in Florida<&sol;a><&sol;blockquote><iframe class&equals;"wp-embedded-content" sandbox&equals;"allow-scripts" security&equals;"restricted" style&equals;"position&colon; absolute&semi; clip&colon; rect&lpar;1px&comma; 1px&comma; 1px&comma; 1px&rpar;&semi;" title&equals;"&&num;8220&semi;More Evidence of Voter Fraud Found in Florida&&num;8221&semi; &&num;8212&semi; The Punching Bag Post" src&equals;"https&colon;&sol;&sol;punchingbagpost&period;com&sol;more-evidence-of-voter-fraud-found-in-florida&sol;embed&sol;&num;&quest;secret&equals;Y7njuCJepL" data-secret&equals;"Y7njuCJepL" width&equals;"600" height&equals;"338" frameborder&equals;"0" marginwidth&equals;"0" marginheight&equals;"0" scrolling&equals;"no"><&sol;iframe>&NewLine;<&sol;div><&sol;figure>&NewLine;&NewLine;&NewLine;&NewLine;<figure class&equals;"wp-block-embed is-type-wp-embed is-provider-the-punching-bag-post wp-block-embed-the-punching-bag-post"><div class&equals;"wp-block-embed&lowbar;&lowbar;wrapper">&NewLine;<blockquote class&equals;"wp-embedded-content" data-secret&equals;"pFR9q8F5Gz"><a href&equals;"https&colon;&sol;&sol;punchingbagpost&period;com&sol;the-media-lack-of-respect-for-russian-intelligence&sol;">The Media&&num;8217&semi;s Lack of Respect for Russian Intelligence<&sol;a><&sol;blockquote><iframe class&equals;"wp-embedded-content" sandbox&equals;"allow-scripts" security&equals;"restricted" style&equals;"position&colon; absolute&semi; clip&colon; rect&lpar;1px&comma; 1px&comma; 1px&comma; 1px&rpar;&semi;" title&equals;"&&num;8220&semi;The Media&&num;8217&semi;s Lack of Respect for Russian Intelligence&&num;8221&semi; &&num;8212&semi; The Punching Bag Post" src&equals;"https&colon;&sol;&sol;punchingbagpost&period;com&sol;the-media-lack-of-respect-for-russian-intelligence&sol;embed&sol;&num;&quest;secret&equals;pFR9q8F5Gz" data-secret&equals;"pFR9q8F5Gz" width&equals;"600" height&equals;"338" frameborder&equals;"0" marginwidth&equals;"0" marginheight&equals;"0" scrolling&equals;"no"><&sol;iframe>&NewLine;<&sol;div><&sol;figure>&NewLine;&NewLine;&NewLine;&NewLine;<p><a href&equals;"https&colon;&sol;&sol;www&period;currexy&period;com&sol;us-dollar-security-features">https&colon;&sol;&sol;www&period;currexy&period;com&sol;us-dollar-security-features<&sol;a><&sol;p>&NewLine;

Exit mobile version