To The [State] Board of Elections,[Address of the Board of Elections][City, State, Zip Code]
Subject: Legal Notice for Compliance with Election Resource Allocation and Voter Accessibility
Dear Members of the [State] Board of Elections,
This letter serves as an official notice regarding your statutory and fiduciary duties to ensure an adequately resourced and accessible election process for all citizens of [State]. As the entity charged with overseeing election administration at the state level, your compliance with both state and federal election laws is paramount.
Legal Obligations:
Voting Rights Act of 1965: This federal law ensures that all citizens have equal opportunity to participate in the electoral process without discrimination.
Help America Vote Act (HAVA) of 2002: Among other mandates, HAVA requires accessibility for voters with disabilities and improvements in election technology and procedures.
[State Election Code, e.g., Title XX, Chapter YY]: These statutes detail specific requirements for election resource allocation, including the number of voting machines per capita, staff training, and voter education efforts.
Americans with Disabilities Act (ADA): Requires that public services, including voting, be accessible to individuals with disabilities.
Required Measures:
Adequate Resource Deployment: Ensure sufficient voting equipment, polling locations, and staff, as outlined in [State Election Statute], to manage voter turnout without excessive wait times.
Training Programs: Implement rigorous training for all election workers to handle voting procedures, emergency protocols, and accessibility accommodations as per state directives.
Public Voter Education: Execute a thorough campaign to inform voters of their rights, polling place changes, voter ID requirements, and other pertinent information.
Disaster and Emergency Planning: Develop comprehensive strategies to address potential voting disruptions caused by unforeseen events.
Legal Ramifications of Non-Compliance:
Legal Challenges: Failure to adhere to these laws could precipitate lawsuits alleging voter suppression or discrimination, potentially under Section 2 of the Voting Rights Act or state equivalents.
Regulatory Actions: The Board could face investigations or corrective actions from state or federal election oversight bodies, potentially including fines or mandates for operational changes.
Public Trust: Any failure in election administration can severely undermine voter confidence and could lead to questions regarding the legitimacy of election outcomes.
Court Mandates: Courts might intervene with injunctions or consent decrees to enforce compliance with election laws, leading to direct judicial oversight.
This notice is intended to underscore the gravity of maintaining an election system that operates smoothly, fairly, and within legal bounds. It is crucial that your Board takes all necessary steps to meet these legal requirements to prevent any disenfranchisement or legal disputes.
Please consider this communication as a formal request for your attention to these critical issues, ensuring that every eligible voter in [State] can participate in the democratic process without undue hindrance.
Thank you for your cooperation and dedication to upholding our state’s election integrity.
Sincerely,
[Your Signature (if sending a hard copy)][Your Printed Name]
Ensure to verify all cited laws and regulations with an attorney or legal expert in election law for accuracy and to tailor the specifics to the laws of your state before sending this notice.
For Secretary of State
October 20, 2024
THE FOLLOWING IS JUST A SAMPLE AND IS NOT LEGAL ADVICE
The Honorable [Secretary of State’s Name]Secretary of State,[State Capitol Address][City, State, Zip Code]
Subject: Formal Legal Notice Regarding State Election Resource Management and Voter Accessibility
Dear Secretary [Last Name],
I am writing to formally address the critical responsibilities of your office in overseeing state elections, ensuring compliance with both federal and state election laws. This letter serves as a legal reminder of the obligations to provide adequate resources for the upcoming election to facilitate an efficient voting process for all eligible voters, ensuring they are not required to wait longer than one hour to cast their vote.
Legal Framework:
The Voting Rights Act of 1965: Requires that no voting qualification or prerequisite to voting be imposed or applied in a manner which results in a denial or abridgment of the right to vote on account of race or color.
The Help America Vote Act (HAVA): Mandates improvements to the administration of elections, including the accessibility and efficiency of the voting process.
[State-specific Election Statutes, e.g., State Election Code Section XX]: This includes regulations on voter wait times, the ratio of voting equipment to voters, and the accessibility of voting locations.
Americans with Disabilities Act (ADA): Requires that all public entities, including state election processes, ensure accessibility for individuals with disabilities.
Mandatory Election Preparations:
Resource Allocation: Ensure there are enough voting machines, ballots, and polling staff as mandated by [State Law Reference], to prevent undue delays.
Staff Training: All election officials and volunteers must be adequately trained in accordance with state guidelines to handle voter registration, machine operation, and accessibility accommodations.
Voter Information Dissemination: Implement comprehensive outreach to inform voters about their rights, polling locations, and any changes in voting procedures, fulfilling the educational mandates of HAVA.
Emergency Preparedness: Establish and communicate clear protocols for addressing potential disruptions to the voting process.
Legal Consequences for Non-Compliance:
Litigation: Your office could face lawsuits for violations of the Voting Rights Act, ADA compliance issues, or state-specific election laws, potentially leading to court-mandated election oversight.
Administrative Penalties: Non-compliance might attract sanctions or fines from federal or state election commissions or other regulatory bodies.
Public Accountability: Failure to ensure an efficient election could lead to a significant erosion of public trust, potentially impacting future electoral participation and legitimacy of election outcomes.
Injunctive Relief: Courts may issue injunctions requiring immediate action to rectify identified deficiencies in election preparation or execution.
This notice is not merely a formality but a call to ensure that the democratic process in [State Name] is accessible, fair, and efficient for all citizens. Your office’s proactive engagement in addressing these concerns will be crucial in upholding the integrity of our electoral system.
Please treat this notice with the urgency and seriousness it warrants. Should there be any lapses identified on election day or in pre-election preparations, be advised that such could prompt legal scrutiny and action.
Thank you for your attention to this vital democratic matter.
Yours sincerely,
[Your Signature (if sending a hard copy)][Your Printed Name]
Please ensure all legal references are accurate and tailored to the specific laws of your state, and consider having this document reviewed by an attorney to maximize its legal efficacy.
For Election Departments Regarding Election Day
October 20, 2024
THE FOLLOWING IS JUST A SAMPLE AND IS NOT LEGAL ADVICE
Subject: Legal Notice for Compliance with Election Resource Allocation and Voter Accessibility Laws
Dear Election Department Officials,
I am writing to formally remind your department of its legal obligations under federal, state, and local election laws to ensure that all eligible voters can exercise their right to vote within a reasonable time frame, specifically within no more than one hour, on election day. This letter serves to underscore the importance of compliance with these laws to avoid legal repercussions.
Legal Grounds:
The Voting Rights Act of 1965, as amended: This federal law prohibits racial discrimination in voting. Inadequate resources leading to long wait times can disproportionately affect minority voters, potentially constituting a violation.
The Help America Vote Act (HAVA) of 2002: Requires states to upgrade their election administration, including ensuring accessibility for individuals with disabilities and providing adequate voting systems.
[State-specific Election Laws]: Many states have laws specifying the maximum allowable wait times, the required number of voting machines per number of registered voters, and accessibility requirements. Please refer to [State Code or Statute Number], which mandates these provisions.
Americans with Disabilities Act (ADA): Polling places must be accessible to people with disabilities, ensuring that facilities are equipped to handle all voters.
Required Actions:
Adequate Staffing and Training: Ensure sufficient and well-trained staff to manage voter turnout effectively, as per [Relevant State Law or Election Code Section].
Voting Machine Availability: Per [State Election Law], there must be an adequate number of operational voting machines. Malfunctions or shortages could be considered non-compliance.
Voter Information and Accessibility: Provide comprehensive voter education and ensure all polling locations meet accessibility standards, adhering to both ADA and state requirements.
Contingency Plans: Develop emergency plans for unforeseen circumstances, as failure to do so can lead to violations under emergency management statutes or implied duties of care.
Consequences of Non-Compliance:
Legal Actions: Failure to comply with these legal standards could result in lawsuits under federal and state laws for voter suppression or disenfranchisement. This might include class-action lawsuits or actions by advocacy groups.
Fines and Sanctions: Regulatory bodies or courts might impose fines or administrative sanctions against the election officials or the department for failing to uphold voter rights.
Corrective Orders: Courts could issue mandates requiring immediate corrective actions, potentially overseeing election processes to ensure compliance.
Loss of Public Trust: Beyond legal ramifications, there’s a significant risk of diminishing public confidence in the electoral process, which could lead to broader democratic issues.
This notice is intended to ensure that all necessary precautions are taken to uphold the integrity of our electoral system. It is crucial for your department to review and implement these requirements diligently.
Please consider this a formal demand for compliance to prevent any legal actions that might arise from neglect of these duties.
Thank you for your immediate attention to this critical matter.
Sincerely,
[Your Signature (if sending a hard copy)][Your Printed Name]
Note: Before sending this notice, it is imperative to verify all legal references and possibly consult with an attorney specializing in election law to ensure that all cited laws are current and applicable in your jurisdiction. This will make the notice as legally binding as possible within your specific legal context.
Good intentions can result in Big Problems
October 20, 2024
The claim from Jeff Boungiorno about there being a ‘massive breach’ Dominion’s server is NOT TRUE!!! I’m trying to reach him to let him know. If you know him or you are him, please contact me! This is the kind of thing that happens when someone thinks they know more than they do, and jumps to conclusions without having it reviewed by people that have more knowledge. I certainly am not a fan of Dominion, and am perfectly happy to shine a light on what they do that is wrong, but in this case, I must defend Dominion on this because this claim being made is UNTRUE. The claim is that this an indication of a virus:
Someone mistook uncompressed virus definitions in the pagefile as nefarious commands in the voting system. It is a FALSE POSITIVE and will serve only as a distraction and discredit vector for legitimate work and people. The part of the screen he shows is the part of the virus definitions for PowerShell/Timestomp.A and PowerShell/Timestomp/G viruses. Here are the Microsoft links on them:
Virus definitions are benign parts of a computer virus that the antivirus engine uses in order to detect the real virus. The names of the viruses are actually there in the screen shot, but someone that doesn’t have the proper knowledge/experience may not realize what they are looking at. I’m not saying he is lying to be malicious. I have no reason to believe it is anything other than an honest mistake at this time.
It is incredibly important that any claims are peer reviewed by people with the proper knowledge and experience to discern fact from fiction. We cannot afford the movement to secure our elections to be discredited, or anyone in our movement to be discredited.
Where did Jeff get this? Well, he got it from a previously-DEBUNKED ‘Mesa County EMS Server 2020 Election Investigation’ done by Josh Merritt. The report that Josh produced was full of assumptions and incorrect conclusions. That was communicated to Josh, but he refused to listen. I’m not sure why anyone with integrity would push something that is factually false and misleading unless they are attempting to discredit and distract people. I’m sorry to see that his work is still causing damage to people’s reputation.
Here is a screen shot from the video in the article, showing the same document that I already debunked in March 2023:
DO NOT SHARE THE LINK BELOW BECAUSE IT IS NOT TRUE. I am including it only for reference.
I have already let Miami Independent know this and suggested they take it down. They have put a notice on their page with a reference to this page.
For those that say “I trust the computers”
October 20, 2024
Why? Why do trust them? Do you trust them because you are a programmer and have personally looked through the tens of thousands to millions of lines of code and examined exactly what it does, then compiled that to ensure that the resulting file hashes match those that are running on each of the voting machines you are using? Or do you just blindly trust them because someone you perceive as smarter and more qualified than you are told you to trust them? And that person that told you to trust them…are THEY a programmer that personally looked through the tens of thousands to millions of lines of code and examined exactly what it does, then compiled that to ensure that the resulting file hashes match those that are running on each of the voting machines you are using? Or are they just blindly trusting the person above them? And is the person above them just blindly trusting the certification lab that never looked at the source code? Did the certification lab just blindly trust the testing lab that didn’t even examine the logic of the source code, and has even missed blatant security requirements that the software has failed, yet they passed it in their testing despite that?
Or is your answer “I trust it because I tested it and it came out with the right answer!”? Do you realize that any programmer can program their software to detect it is being tested and behave perfectly in that instance, then do whatever they want it to do at any other time? No? Really? Did you hear about the Volkswagen Scandal in 2015?
Volkswagen installed emissions software on more than a half-million diesel cars in the U.S.—and roughly 10.5 million more worldwide—that allows them to sense the unique parameters of an emissions drive cycle set by the Environmental Protection Agency. According to the EPA and the California Air Resources Board, which were tipped off by researchers in 2014, these so-called “defeat devices” detect steering, throttle, and other inputs used in the test to switch between two distinct operating modes.
In the test mode, the cars are fully compliant with all federal emissions levels. But when driving normally, the computer switches to a separate mode—significantly changing the fuel pressure, injection timing, exhaust-gas recirculation, and, in models with AdBlue, the amount of urea fluid sprayed into the exhaust. While this mode likely delivers higher mileage and power, it also permits heavier nitrogen-oxide emissions (NOx)—a smog-forming pollutant linked to lung cancer—up to 40 times higher than the federal limit. That doesn’t mean every TDI is pumping 40 times as much NOx as it should. Some cars may emit just a few times over the limit, depending on driving style and load.
Do you realize that if a car manufacturer can do it, a voting system manufacturer can also do the same thing? The car manufacturer benefited by selling millions of vehicles. A voting system manufacturer can benefit by controlling all the money and power in every country that uses their systems. Which do you think is a higher value target for bad actors? And that ‘voting system’ can just as easily be a ‘voter registration database’, an ‘electronic poll book’, and an ‘election night reporting tool’.
At some point, the citizens of America need to pull their heads out of their asses and realize that they will never have freedom again if they don’t IMMEDIATELY stop using computers for their voter registration lists, poll books, tabulation, totals aggregation, and election night reporting. If they realize this is the NATIONAL EMERGENCY that it IS, 2024 may very well be the end of the United States of America experiment.
If we do lose our beloved Country, I would certainly not want be any of those individuals that decided to keep their heads up their asses and take part in indirectly destroying this country that over 300M people call their home. I can’t imagine those 300M+ people are going to be too happy with them.
So the time to decide is right now. Will you keep your head up your ass? Or are you willing to pull it out and reconsider your actions? Do you want to be on the list of people that destroyed the United States of America, or do you want to be on the list that saved the United States of America? Tick, tock…
After that, watch my most recent presentation by clicking here. Don’t forget to click on the slides just below the recording so you have those to flip through too!
CrowdStrike Falcon Worldwide Outage
October 20, 2024
What it is
CrowdStrike is a network security company. A Falcon Sensor is part of their Cloud-based endpoint protection platform. Think of Endpoint Protection as a firewall on each device that is part of a network. The ‘cloud’ part of it is similar to a conductor in a orchestra, with the endpoints being those playing the instruments, and the instruments are the individual computers/servers.
What caused it
CrowdStrike sent out an update to their software that conflicted with Microsoft Windows, which caused a BSOD (blue screen of death – a ‘crash’ of the software). Following the software crash, the computer gets stuck during reboot and won’t load the operating system, leaving it dead in the water.
How this affects our elections
The idiots that implemented our cloud-based voter registration and poll-book systems have created a HUGE abuse vector in our election ecosystem and I’d be shocked if those election systems weren’t also affected by this. And there is nothing that can prevent their being another accidental (or intentional) abuse! Have you considered that this may just be cover for an election hack just prior to/during an election? It would be perfect cover.
Maricopa County Voting Locations Impacted – and they aren’t alone!
Outages locally have included Maricopa County voting locations, multiple Valley police dispatch centers, several airlines at Phoenix Sky Harbor International Airport and all flights to and from Mesa Gateway Airport.
Gov. Katie Hobbs said on social media that her team is “closely monitoring all services that have been impacted and is working to ensure that we continue delivering the critical services that Arizonans rely on.”
A worldwide IT outage has impacted some State of Arizona systems and agency operations.
My team is closely monitoring all services that have been impacted and is working to ensure that we continue delivering the critical services that Arizonans rely on.
As we work to address…
— Governor Katie Hobbs (@GovernorHobbs) July 19, 2024
Speaking of Elections…let’s not leave out Dominion just yet…
The idiots at Dominion Voting Systems also leave their election management server database server open to Named Pipes (notice the red box above!):
Is this yet another example of their incredible incompetence? Or is it instead, intentional ‘incompetence’? And we trust them with WHAT? (And yes of course, Named-Pipes is not the only problem showing there.)
According to CISA:
For this system deemed CRITICAL INFRASTRUCTURE, how convenient for Dominion to not even follow standard STIGs. Here’s V-79185:
Did Dominion do anything else wrong?
Lol…oh boy. This is barely even the tip of the iceberg. But in Dominion’s defense, it’s not just Dominion that’s the problem. Every company that electronically centralizes any aspect of our elections creates a superhighway of attack vectors leading into our Nation’s entire foundation, our Election System. The shear incompetence and inability to protect any system in the industry from abuse is the elephant in the room. When you have a bad actor inside the company, you’re done. For instance, look at this very accurate quote from an atsec source code review of Dominion that is applicable to ANY system:
“Backdoors are extremely hard to find because a seasoned programmer can obfuscate code to look benign. The atsec team would like to stress that, when facing a competent and sufficiently motivated maliciousdeveloper, it is extremely difficult to prove that all backdoors in a system have been identified. The famous Turing award lecture by Ken Thompson in 1984 entitled Reflections on Trusting Trust [TRUST] demonstrated how fundamentally easy it is to undermine all security mechanisms when the developers cannot be trusted. This voting system is no exception.”
Yes, I know CISA claims to secure our systems. Unfortunately, the same types of incompetence in these vendors exist in CISA as well. Not to mention, they are also lying right to our face about many things.
So what is the connection between CrowdStrike and Dominion?
Well…it is interesting that CrowdStrike is intercepting Named-Pipes and Dominion also left their database connected to Named-Pipes. Coincidence? Possibly. Convenient as yet another possible attack vector? Absolutely!
So what are you trying to say?
Simply put, the people wielding this technology are wholly irresponsible (at best). At worst, what if there are bad actors at Dominion? Even worse (if that’s even possible), what if there are bad actors at CrowdStrike? What do those bad actors now have access to? How many millions of computers around the world does CrowdStrike have LOW LEVEL control of? (8.5 Million at the last count according to David Weston, Microsoft VP, Enterprise and OS Security in a blog post Saturday). Who owns CrowdStrike? Who works there? THINK ABOUT ALL THAT…
Our election officials are sitting ducks and in no way knowledgeable enough to secure (nonetheless even understand) this threat landscape. How can any election official claim their system is secure when they don’t know it to be such, and they are merely blindly believing what someone they trust tells them? What happens when those that they trust are LYING TO THEM? Our election officials need to accept the reality that is in front of their faces: They cannot control or secure that which they cannot fully see and do not fully understand. The solution is simple…boot all the electronic systems out of our elections and go back to a simple system with a much smaller and controllable threat model, then use technology to add transparency instead of obscurity.
How to fix this current CrowdStrike issue:
The affected file in the update is a particular ‘driver’ that was updated. A ‘driver’ is a program that runs on the computer that performs a task. This driver is the Falcon driver. To repair it, the affected ‘driver’ must be removed in order to allow the operating system to boot up, then the new fixed version of the driver must be installed. The huge complication here is that the driver must be removed MANUALLY. A further complication is for servers that have encrypted hard drives because extra steps must be performed to decrypt the hard drive in order for the repair to be implemented. For companies that didn’t follow best-practices on their encryption passwords, their systems will be permanently locked out and unrecoverable.
Details on repair
The morning of 2024-07-19, a content update was sent to some CrowdStrike Falcon clients on Windows devices which resulted in “Blue Screen” errors for those devices. If you have a Windows device stuck on a blue screen at boot, this issue is almost certainly the cause.
The fix for this issue requires booting the Windows device into Safe Mode or Recovery Mode and deleting a file. Instructions for doing this are below. This post and these instructions may be updated as the situation develops.
If you are affected by this, we happen to know someone VERY good with solving these types of issues! Contact Mark Cook here.
Workaround Steps for individual hosts:
Reboot the host to give it an opportunity to download the reverted channel file. If the host crashes again, then:
Boot Windows into Safe Mode or the Windows Recovery Environment
NOTE: Putting the host on a wired network (as opposed to WiFi) and using Safe Mode with Networking can help remediation. (** NOTE: This is the same type of backdoor that many of our electronic voting systems including electronic poll books have)
Navigate to the %WINDIR%\System32\drivers\CrowdStrike directory
Locate the file matching “C-00000291*.sys”, and delete it.
Boot the host normally.
Workaround Steps for public cloud or similar environment including virtual:
Option 1:
Detach the operating system disk volume from the impacted virtual server
Create a snapshot or backup of the disk volume before proceeding further as a precaution against unintended changes (** NOTE: This type of backup is essentially same thing that Clerk Tina Peters had done to her election system before the SoS and Dominion showed up to remove the QR code feature, that they later attacked her for!)
Attach/mount the volume to to a new virtual server
Navigate to the %WINDIR%\System32\drivers\CrowdStrike directory
Locate the file matching “C-00000291*.sys”, and delete it.
Detach the volume from the new virtual server
Reattach the fixed volume to the impacted virtual server
User Access to Recovery Key in the Workspace ONE Portal
When this setting is enabled, users can retrieve the BitLocker Recovery Key from the Workspace ONE portal without the need to contact the HelpDesk for assistance. To turn on the recovery key in the Workspace ONE portal, follow the next steps. Please see this Omnissa article for more information.
You may find out if your voting identity was previously stolen.
Your ballot can’t get intercepted along the way to the polling location.
Citizen Unity and Social Restoration, standing side-by-side your fellow citizens.
Election Day Exit Polling is much easier to implement in order to compare the election-day results with the exit-polling results.
None
Safer
Close to Election Day
Convenience for those that are unable to vote on Election Day without showing hand early
Something could happen to your ballot before it makes it to tabulation day.
Election results can be estimated before polls close, allowing last-minute FEEDBACK LOOP manipulation.
Your envelope could be thrown out by someone and your ballot never counted.
Unsafe
Early
None
Something could happen to your ballot before it makes it to tabulation day.
Election results can be estimated before polls close, allowing easy FEEDBACK LOOP manipulation.
Your envelope could be thrown out by someone and your ballot never counted.
MAIL BALLOTS
Mass Mail Ballot State
Vote In-Person – bring your unopened mail ballot with you
Pros
If you are told that you already voted by mail, you have real evidence to expose/address it and file an identity theft complaint with Sheriff prior to election day
You eliminate time/space between events, and therefore reduce the election abuse surface
Cons
None
Vote by Mail
Pros
You can be lazy
Cons
You increase the election abuse surface
Bad actors know when you return your ballot using the mail ballot tracking system to feed their election model
Your identity is directly connected to your ballot (violates voter secrecy) via the barcode keep in mind that not all states use a secrecy sleeve, for instance, Colorado.
Your party affiliations is often shown on the envelope (sometimes covertly)
There is no guarantee that your ballot won’t be swapped out for another
There is no guarantee that your ballot will ever make it to be counted
Non-Mass Mail Ballot State
Vote In Person
NOT Request Mail Ballot
Pros
You don’t give them data to substantiate use of mail ballots
Less mail ballots in circulation results in smaller attack surface
If a mail ballot is shown as having been sent, you can expose/address it and file an identity theft complaint with Sheriff prior to election day
If one or more mail ballot shows up anyway, you can expose/address it prior to election day (and bring with you on election day to PROVE you didn’t vote with it)
If a mail ballot is shown as being received, you can expose/address it and file an identity theft complaint with Sheriff prior to election day
County Mail in tracking database
If a mail ballot is recorded as having been sent that shouldn’t have been, election officials can see it and deal with it prior to election day
If a mail ballot is recorded as being received that shouldn’t have been sent, election officials can see it and deal with it prior to election day
When arriving on Election Day, if you are told you already voted and you bring your sealed mail ballot in your hand, you expose/address it and file an identity theft complaint with Sheriff
Post-election voted lists
If a mail ballot is recorded as having been sent, you can expose it
If a mail ballot is recorded as being received, you can expose it
Exposed voter identity theft is great evidence to support not being able to certify an election
Cons
None
Opt-Out of Mail Ballot (where possible)
Pros
You demonstrate that citizens don’t want mail ballots
Less mail ballots in circulation results in smaller attack surface
If one or more mail ballot shows up anyway, you can expose/address it prior to election day (and bring with you on election day to PROVE you didn’t vote with it)
Public-facing Mail in ballot tracking system (pre-election-day)
If a mail ballot is shown as having been sent, you can expose/address it and file an identity theft complaint with Sheriff prior to election day
If a mail ballot is shown as being received, you can expose/address it and file an identity theft complaint with Sheriff prior to election day
County Mail in tracking database
If a mail ballot is recorded as having been sent, election officials can see it and deal with it prior to election day
If a mail ballot is recorded as being received, election officials can see it and deal with it prior to election day
When arriving on Election Day, if you are told you already voted and you bring your sealed mail ballot in your hand, you expose/address it and file an identity theft complaint with Sheriff
Post-election voted lists
If a mail ballot is recorded as having been sent, you can expose it
If a mail ballot is recorded as being received, you can expose it
Exposed voter identity theft is great evidence to support not being able to certify an election
You may get assigned a higher voting propensity which would make your vote less attractive to abuse
Cons
None
Request Mail Ballot but still Vote in Person
Pros
If you don’t receive your mail ballot you know it has been ‘lost’
Cons
If you go in to vote in person, but you have requested a mail ballot, you may be forced to vote a provisional ballot instead, which may not be tabulated.
If you don’t receive your mail ballot, you have put another phantom ballot into circulation
Ballots lose chain of custody as soon as they are sent out
You put more mail ballots in circulation increasing election attack surface
You provide evidence that can be used to justify the receipt of a mail ballot in your name
You provide feedback to bad actors that raise your voting propensity score used to decide which records to use for ballot injection
You put yourself at risk being able to vote on a non-mail ballot on election day, and your in-person vote could end up provisional
Election staff may force you to use your mail ballot (less chain of custody and far more abuse vectors) to vote in person instead of depositing your non-identifiable ballot in a ballot box.
Vote by Mail
Pros
You can be lazy
Cons
You increase the election abuse surface
Bad actors know when you return your ballot using the mail ballot tracking system to feed their election model
Your identity is directly connected to your ballot (violates voter secrecy) via the barcode keep in mind that not all states use a secrecy sleeve, for instance, Colorado.
Your party affiliations is often shown on the envelope (sometimes covertly)
There is no guarantee that your ballot won’t be swapped out for another
There is no guarantee that your ballot will ever make it to be counted
DROP BOXES
Isolated – Not at your County polling place
Pros
None
Cons
No chain of custody
There is no guarantee that your ballot won’t be swapped out for another
There is no guarantee that your ballot will ever make it to be counted
At County Polling Place
Pros
More secure than isolated
Better chain of custody than isolated
Cons
Less chain of custody than traditional voting on paper
You increase the election abuse surface
Bad actors know when you return your ballot using the mail ballot tracking system to feed their election model
Your identity is directly connected to your ballot (violates voter secrecy) via the barcode keep in mind that not all states use a secrecy sleeve, for instance, Colorado.
Your party affiliations is often shown on the envelope (sometimes covertly)
There is no guarantee that your ballot won’t be swapped out for another
There is no guarantee that your ballot will ever make it to be counted
Comparative Analysis
To determine the safest method, I compare the methods based on exposure to known and unknown vulnerabilities and the feasibility of exploitation, assuming typical U.S. safeguards (paper trails, audits, verification) are in place but could have gaps.
Exposure to Known Vulnerabilities:
Mail-In (Early or Election Day): Most exposed due to multiple touchpoints (voters, postal services, drop boxes, processing centers). Interception, theft, or forgery is possible. Errors, small-scale fraud, and large-scale fraud are possible.
In-Person (Early or Election Day): Less exposed, as ballots are cast and stored in controlled environments. Electronic systems risk hacking, but paper backups and proper chain of custody and audits can limit impact. Insider fraud is possible.
Exposure to Unknown Vulnerabilities:
Mail-In: Higher risk due to complexity (e.g., postal systems, drop boxes, voter databases). Hypothetical attacks like AI-driven forgery or coordinated theft could exploit undiscovered flaws in distributed processes.
In-Person (Electronic): Moderate risk due to potential software or hardware flaws in voting machines. Complex code or supply chain attacks could introduce undetectable issues.
In-Person (Paper): Lowest risk, as simple paper ballots avoid technological vulnerabilities. Unknown risks are limited to physical tampering or novel social engineering.
Ease of Exploitation:
Mail-In: Small-scale exploitation (e.g., stealing a few ballots) is easier but unlikely to affect outcomes. Large-scale fraud can significantly impact elections.
In-Person (Early): Extended timeline increases opportunities for tampering or hacking, though proper audits can catch some issues. Insider fraud needs coordination.
In-Person (Election Day): Short timeline limits exploitation windows, especially for outsiders. Insider fraud is possible but heavily constrained by immediate counting and oversight. (Count Where Cast!)
Safeguard Effectiveness:
All methods benefit from audits, paper trails, and verification, but in-person voting simplifies chain-of-custody and reduces external touchpoints (e.g., postal services).
Election Day in-person voting minimizes storage time, reducing risks of tampering or loss compared to early voting.
Safest Voting Method
Election Day In-Person Voting with Paper Ballots is the safest method against potential vulnerabilities and exploitation, for these reasons:
Minimized Exposure: The single-day process reduces the time window for attacks, limiting opportunities for both known (e.g., hacking, tampering) and unknown exploits compared to early voting or mail-in systems.
Simpler System: Paper ballots avoid technological vulnerabilities (e.g., software bugs, hardware tampering) that electronic systems face, reducing unknown risks. Hand-counting ensures accuracy.
Controlled Environment: Voting and counting occur in supervised polling stations, minimizing external touchpoints (e.g., postal services) and simplifying chain-of-custody compared to mail-in voting.
Auditability: Paper ballots provide a verifiable record, making it easier to detect and correct errors or fraud compared to electronic-only or distributed mail-in systems.
Unknown Risk Mitigation: By avoiding complex technology and extended timelines, this method limits exposure to hypothetical flaws in software, hardware, or distributed processes.
Caveats
Assumption of Safeguards: This conclusion assumes basic safeguards like voter ID, secure polling stations, chain of custody records, and audits are in place. Without them, no method is safe.
Local Variations: Security varies by jurisdiction. A poorly managed polling station may be less secure, but the impact of issues is typically contained.
Access Trade-Offs: Election Day in-person voting may reduce accessibility for some (e.g., those with work conflicts), but the prioritizes safety for all voters over convenience of some.
Unknown Unknowns: No method is immune to completely unforeseen exploits (e.g., a novel attack on voter psychology). Paper-based, in-person voting minimizes technological risks but not human or physical ones.
Rankings
Election Day In-Person (Paper Ballots): Safest due to simplicity, short timeline, and minimal technological risks.
Early In-Person (Paper Ballots): Slightly less safe due to longer storage time, increasing tampering risks.
Election Day In-Person (Electronic with Paper Trail): Based on blind trust and vulnerable to technological abuse and flaws.
Early In-Person (Electronic with Paper Trail): Even more exposure due to extended timeline.
Election Day Mail-In: Distributed process increases touchpoints, but shorter window limits some risks.
Early Mail-In: Most vulnerable due to multiple touchpoints, longer timeline, and reliance on external systems.
Conclusion
Election Day in-person voting with paper ballots is the safest method, as it minimizes known and unknown vulnerabilities by using a simple, controlled, and auditable process with a short timeline. While no method is invulnerable, this approach reduces exposure to technological, distributed, or prolonged risks, making exploitation harder for both known and hypothetical attacks.
* If you have any input on the above, PLEASE feel free to contact us directly.
Mass Psychosis – Killing of the Mind
October 20, 2024
BOONE CUTLER | Surviving the Psyop: Military Intelligence Strategies for the Everyday American to Survive 2024
These lying idiots at Dominion were running an exploitable Serv-U FTP server on their public-facing dvsfileshare.dominionvoting.com IP address. When they got caught, they took place in a 17-hour cover-up operation. They initially took their page down, then edited it so it didn’t show the SolarWinds name, just leaving Serv-U (but the morons left it in the page source code), then later they removed even the Serv-U portion, but still again left SolarWinds in the page source code (they weren’t smart enough to remove it entirely). If they can’t even figure out how to cover their tracks on something this simple, they have no business writing software to handle our elections. Not to mention, innocent people DO NOT TRY TO CONCEAL THINGS LIKE THIS!
Then everyone freaked out because of the SolarWinds Orion Platform hack and Dominion misdirected all the pleebs at that and then claimed they don’t use Orion. What the pleebs didn’t realize is that there was ALSO a zero-day exploit on the Serv-U ‘FTP’ software that Dominion was using up until and at that time, and they bought the BS from Dominion, hook, line, and sinker. Nobody that falls for this should be using electronic voting systems (or much less, anything electronic). I don’t mean to come down on those deceived by Dominion, but at some point they do need to take responsibility for not having enough knowledge to protect a domain that they claim to be responsible or making decisions for. It is UNFAIR to put them in these positions, but it is important to notify them that they ARE in these positions so they can’t claim ignorance after being put on friendly notice.
So let’s walk through it. First, sometimes people at Dominion are honest, and I am happy to point that out when I see it.
Eric is not a stupid person by any means. I do wish he used his intelligence to help his fellow man, though.
Based on the evidence I have seen that clearly Eric knows about, as he is listed as a sender and/or recipient of many of the emails that shed a bright light on what is going on inside Dominion that those who blindly trust them don’t know about, Eric Coomer’s conclusion in the above email is very accurate.
On December 13, 2020, CISA the Cybersecurity & Infrastructure Security Agency charged with keeping our elections secure, came out with this:
Valeri Shilov (IT Operations Support in San Francisco CA) sent an email to David Moren and Travis Kester of Dominion Voting Systems regarding Dominion’s public fileshare running on SolarWinds:
December 14, 2020 23:59, prior to the cover-up, their public file-sharing site looked like this:
I certainly hope it wasn’t Eric Coomer that was responsible for trying to cover up the fact that they were using SolarWinds Serv-U from the public, because if it was, I guess Eric is including himself in the “we” he claims “sucks”. So in summary, over a 17 hour period:
Dominion, in all the time you spent covering up your use of a compromised product on one of your public-facing file-sharing websites (and you know what files you shared on it), did you notify any government agencies about that? Did you notify any election officials? I would LOVE to ask you a lot more questions as well in a very public setting.