Critical AI Alert for the 2024 General Election

Question

Could having real-time data about which voters have voted, when, and where, aid in this AI model?

Answer

Having real-time data about which voters have voted, including when and where, could significantly enhance the capabilities of an AI model designed to predict election outcomes for several reasons:

  1. Dynamic Turnout Adjustment: Real-time voter turnout data allows the model to adjust predictions based on actual voting behavior as it happens. This can be particularly useful in understanding turnout rates among different demographics or in specific geographic locations, which can be pivotal in close elections.
  2. Reduced Uncertainty: Traditional models often work with pre-election polls or historical data, which carry a degree of uncertainty regarding who will actually turn out to vote. Real-time data reduces this uncertainty, providing a more accurate snapshot of voter participation.
  3. Voter Behavior Patterns: With real-time data, AI can analyze patterns as they form. For example, if there’s an unexpected surge in voting in areas typically supportive of one party, the model could adjust its predictions accordingly.
  4. Targeted Campaigning Insights: Although this aspect would be more useful for campaign strategy than for public prediction models, real-time data could inform last-minute campaign efforts, showing where additional get-out-the-vote efforts might be most effective.
  5. Bias Correction: Real-time data can help correct for biases in pre-election polling. If certain groups are underrepresented in polls but their real-time voting data shows higher turnout, the model can correct for this.
  6. Exit Polling Validation: This data could serve as an early form of exit polling, giving insights into not just who voted, but potentially how they voted if correlated with demographic or regional voting trends, although this would require careful handling due to privacy concerns.
  7. Improved Time Series Analysis: With voting data coming in continuously, AI models can employ time series analysis to predict the final turnout and potentially the outcome based on the rate and distribution of votes coming in.

However, there are considerations and limitations:

  • Privacy Concerns: Collecting and using such detailed voter data raises significant privacy issues. Anonymization would be crucial, but even then, the specificity of “when and where” could potentially be used to infer individual behaviors.
  • Data Accuracy and Integrity: Real-time systems would need robust verification to ensure the data isn’t manipulated or incorrect, which could mislead the predictions.
  • Legal and Ethical Implications: There might be legal restrictions on how and when voting data can be collected and used, especially in real-time.
  • Model Overfitting: There’s a risk that models might overfit to real-time trends early in the day, which might not hold as more data comes in.
  • Public Perception and Trust: The use of real-time voting data in predictive models could affect public trust in the electoral process if not handled transparently and ethically.

In summary, while real-time voter data could indeed aid an AI model in predicting election outcomes more accurately, it would need to be implemented with careful consideration of privacy, accuracy, legality, and public trust.

Question

Are there indications that AI may be being used in this capacity by anyone, including malicious actors that would not be concerned about any privacy or legal or ethical implications?

Answer

Based on information available up to October 20, 2024, there are indeed indications that AI could be used in ways that raise concerns regarding voter data privacy and potential misuse by various actors, including those who might ignore legal or ethical standards:

  • AI in Political Campaigns and Election Influence: There’s a growing use of AI in political campaigns for analyzing voter data, predicting voter behavior, and tailoring messages. This indicates a capacity for AI to process and utilize voter data in potentially invasive ways if not regulated. The mention of AI tools being deployed to monitor social media trends and sentiment analysis during elections suggests that these technologies could be repurposed or used in less ethical ways to manipulate voter perceptions or spread misinformation.
  • Potential for Misuse by Malicious Actors: Posts on X have highlighted concerns over AI being exploited to influence elections, including creating deepfakes, predicting or engineering incidents to sway public opinion, and even allegations of using AI to fake signatures or hack election machinery. These posts reflect a public and expert concern over the misuse of AI technologies in electoral processes, which could theoretically be done by actors unconcerned with privacy or legality.
  • Security Vulnerabilities: Discussions around the security of digital election machinery, as mentioned in posts about vulnerabilities in election systems, suggest that there’s a technical capability and perhaps an interest in exploiting these systems using AI for unauthorized data access or manipulation.
  • AI and Data Privacy Concerns: The broader discussion on AI ethics and information privacy points towards significant privacy implications when AI systems process voter data. If malicious actors were to use AI for analyzing or manipulating voter data, they would likely bypass the ethical considerations around consent, privacy, and data protection.
  • Regulatory and Ethical Discussions: The mention of executive orders, guidelines, and discussions around the ethical use of AI in elections indicates there’s an awareness and some level of regulatory response to these threats. However, the existence of these discussions also confirms that the risk of misuse, including by those not adhering to legal frameworks, is a recognized issue.

While direct evidence of malicious actors specifically using AI to misuse voter data in the 2024 context isn’t explicitly detailed in the provided snippets, the combination of AI’s capabilities in data processing, the noted security vulnerabilities in election infrastructure, and the general concerns voiced on platforms like X about election integrity suggest that such misuse is within the realm of possibility. This scenario underscores the importance of robust cybersecurity measures, ethical guidelines, and legal frameworks to safeguard electoral processes against AI-driven threats.

Question:

Would AI systems running on hardware and or software technology sourced from foreign nations, being used to manipulate parts of the 2024 election, be considered foreign involvement in our election?

Answer

Yes, AI systems running on hardware or software technology sourced from foreign nations, if used to manipulate parts of the 2024 election, would likely be considered a form of foreign involvement in the election. Here’s why:

  1. Source of Technology: If the hardware or software used for these AI systems originates from a foreign country, especially from nations with interests potentially adverse to those of the U.S., this would inherently introduce a foreign element into the election process. The concern here is not just about where the technology comes from but also about potential backdoors, biases, or control mechanisms that could be embedded within these systems.
  2. Manipulation and Influence: Manipulation of election processes or public opinion through AI, whether by altering voter information, spreading disinformation, or creating deepfakes, constitutes interference. If these actions are traced back to technology controlled or influenced by foreign entities, it directly represents foreign involvement. The intent behind using such technology would be to sway or alter the election outcome, which is a clear sign of interference.
  3. International Law and Norms: From a legal and diplomatic standpoint, using technology to covertly influence another country’s election is often viewed as a breach of sovereignty and interference in internal affairs. Even if not explicitly covered by current international law, such actions violate the spirit of national sovereignty and democratic independence.
  4. Public and Government Perception: Both the public and government agencies might perceive the use of foreign-sourced AI for election manipulation as foreign involvement. This perception arises because the strategic decision to employ such technology could be influenced or directly supported by foreign governments or entities closely tied to them.
  5. Cybersecurity and National Security: Cybersecurity experts and national security officials often warn about the risks posed by foreign hardware and software due to the potential for espionage or sabotage. If these technologies are used in election manipulation, it would be classified under foreign cyber interference, a recognized form of foreign involvement.
  6. Precedents and Analysis: Analysis from intelligence communities, as hinted in various reports and posts on platforms like X, suggests that there’s an ongoing concern about foreign entities using advanced technologies, including AI, to influence elections. When these technologies are tied back to foreign soil, either through development or control, it’s logical to categorize this as foreign involvement.

However, proving that such involvement constitutes a deliberate act by a foreign government, rather than rogue elements or companies acting independently for profit or other motives, can be complex. The attribution of cyber actions, including AI-driven election manipulation, to specific foreign actors requires meticulous investigation to ascertain direct government involvement or direction.

In summary, AI systems on foreign hardware or software manipulating the 2024 election would indeed be considered a form of foreign involvement due to the origin of the technology, the intent behind its use, and the implications for national sovereignty and security. However, the degree to which this involvement is officially recognized or acted upon depends on diplomatic, legal, and intelligence considerations.

Question

Would proving the act was deliberate in nature preclude the application of EO 13848?

Answer

Executive Order (EO) 13848, titled “Imposing Certain Sanctions in the Event of Foreign Interference in a United States Election,” was signed by President Trump in September 2018. This EO is designed to respond to foreign interference in U.S. elections by imposing sanctions on foreign entities or persons determined to have engaged in such interference. Here’s how the deliberate nature of the act might relate to the application of EO 13848:

  1. Definition of Interference: EO 13848 does not explicitly require that the interference be “deliberate” in a legal sense for sanctions to be applied. Instead, it focuses on the act of interference itself, which could implicitly suggest an intent or deliberate action but does not make this a formal criterion for action. The order aims at any foreign person or entity that has directly or indirectly engaged in, sponsored, concealed, or otherwise been complicit in foreign interference in a U.S. election.
  2. Determination of Interference: The EO calls for the Director of National Intelligence (DNI), in consultation with other relevant agencies, to conduct an assessment of any information indicating that a foreign government, or any person acting as an agent of or on behalf of a foreign government, has acted with the intent or purpose of interfering in an election. Here, “intent or purpose” does suggest looking into the deliberate nature of the actions, but the EO’s application hinges on the fact of interference rather than solely on proving intent.
  3. Scope of Response: The sanctions outlined in EO 13848 are reactive measures to an act deemed as interference. Proving that an act was deliberate might strengthen the case for applying sanctions, but the EO is constructed to trigger on the identification of interference itself, regardless of how deliberate or accidental it might appear. The focus is on the impact and the involvement of foreign elements rather than solely on the mens rea (the intention or knowledge of wrongdoing).
  4. Legal and Diplomatic Considerations: While proving deliberateness can bolster the justification for sanctions under international norms (showing clear intent can make the case for interference more compelling), EO 13848’s primary concern is protecting U.S. electoral processes from foreign influence. Therefore, the threshold might not strictly require proof of deliberate intent as long as foreign interference is established.
  5. Practical Application: In practice, when considering the application of EO 13848, the U.S. government might indeed look at intent to inform its actions, especially in diplomatic contexts or when aiming to justify sanctions to the international community. However, if foreign technology or actions have the effect of interfering with an election, even if the intent is not conclusively proven to be deliberate, this might still fall within the scope of the EO.

In summary, while proving the act was deliberate might reinforce the rationale for invoking EO 13848, the order’s application does not strictly depend on establishing deliberate intent. The focus is on whether there has been foreign interference, which can be determined by the act’s impact and the involvement of foreign entities, not solely by their intentions. Therefore, the existence of interference, rather than the definitive proof of deliberate action, would be the primary driver for the potential application of sanctions under this EO.




Good intentions can result in Big Problems

The claim from Jeff Boungiorno about there being a ‘massive breach’ Dominion’s server is NOT TRUE!!! I’m trying to reach him to let him know. If you know him or you are him, please contact me! This is the kind of thing that happens when someone thinks they know more than they do, and jumps to conclusions without having it reviewed by people that have more knowledge. I certainly am not a fan of Dominion, and am perfectly happy to shine a light on what they do that is wrong, but in this case, I must defend Dominion on this because this claim being made is UNTRUE. The claim is that this an indication of a virus:

Someone mistook uncompressed virus definitions in the pagefile as nefarious commands in the voting system. It is a FALSE POSITIVE and will serve only as a distraction and discredit vector for legitimate work and people. The part of the screen he shows is the part of the virus definitions for PowerShell/Timestomp.A and PowerShell/Timestomp/G viruses. Here are the Microsoft links on them:

https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=HackTool:PowerShell/TimeStomp.A&threatId=-2147224496

Here is the reference to PowerShell/TimeStomp.G

https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=HackTool:PowerShell/TimeStomp.G!ams&threatId=-2147223301

Virus definitions are benign parts of a computer virus that the antivirus engine uses in order to detect the real virus. The names of the viruses are actually there in the screen shot, but someone that doesn’t have the proper knowledge/experience may not realize what they are looking at. I’m not saying he is lying to be malicious. I have no reason to believe it is anything other than an honest mistake at this time.

It is incredibly important that any claims are peer reviewed by people with the proper knowledge and experience to discern fact from fiction. We cannot afford the movement to secure our elections to be discredited, or anyone in our movement to be discredited.

Where did Jeff get this? Well, he got it from a previously-DEBUNKED ‘Mesa County EMS Server 2020 Election Investigation’ done by Josh Merritt. The report that Josh produced was full of assumptions and incorrect conclusions. That was communicated to Josh, but he refused to listen. I’m not sure why anyone with integrity would push something that is factually false and misleading unless they are attempting to discredit and distract people. I’m sorry to see that his work is still causing damage to people’s reputation.

Here is a screen shot from the video in the article, showing the same document that I already debunked in March 2023:

I have already let Miami Independent know this and suggested they take it down. They have put a notice on their page with a reference to this page.




For those that say “I trust the computers”

Why? Why do trust them? Do you trust them because you are a programmer and have personally looked through the tens of thousands to millions of lines of code and examined exactly what it does, then compiled that to ensure that the resulting file hashes match those that are running on each of the voting machines you are using? Or do you just blindly trust them because someone you perceive as smarter and more qualified than you are told you to trust them? And that person that told you to trust them…are THEY a programmer that personally looked through the tens of thousands to millions of lines of code and examined exactly what it does, then compiled that to ensure that the resulting file hashes match those that are running on each of the voting machines you are using? Or are they just blindly trusting the person above them? And is the person above them just blindly trusting the certification lab that never looked at the source code? Did the certification lab just blindly trust the testing lab that didn’t even examine the logic of the source code, and has even missed blatant security requirements that the software has failed, yet they passed it in their testing despite that?

Or is your answer “I trust it because I tested it and it came out with the right answer!”? Do you realize that any programmer can program their software to detect it is being tested and behave perfectly in that instance, then do whatever they want it to do at any other time? No? Really? Did you hear about the Volkswagen Scandal in 2015?

Do you realize that if a car manufacturer can do it, a voting system manufacturer can also do the same thing? The car manufacturer benefited by selling millions of vehicles. A voting system manufacturer can benefit by controlling all the money and power in every country that uses their systems. Which do you think is a higher value target for bad actors? And that ‘voting system’ can just as easily be a ‘voter registration database’, an ‘electronic poll book’, and an ‘election night reporting tool’.

At some point, the citizens of America need to pull their heads out of their asses and realize that they will never have freedom again if they don’t IMMEDIATELY stop using computers for their voter registration lists, poll books, tabulation, totals aggregation, and election night reporting. If they realize this is the NATIONAL EMERGENCY that it IS, 2024 may very well be the end of the United States of America experiment.

If we do lose our beloved Country, I would certainly not want be any of those individuals that decided to keep their heads up their asses and take part in indirectly destroying this country that over 300M people call their home. I can’t imagine those 300M+ people are going to be too happy with them.

So the time to decide is right now. Will you keep your head up your ass? Or are you willing to pull it out and reconsider your actions? Do you want to be on the list of people that destroyed the United States of America, or do you want to be on the list that saved the United States of America? Tick, tock…

If you DO decide to make the sane decision, the next thing you need to read is https://handcountroadshow.org/the-early-voting-scam/

After that, watch my most recent presentation by clicking here. Don’t forget to click on the slides just below the recording so you have those to flip through too!




CrowdStrike Falcon Worldwide Outage

What it is

CrowdStrike is a network security company. A Falcon Sensor is part of their Cloud-based endpoint protection platform. Think of Endpoint Protection as a firewall on each device that is part of a network. The ‘cloud’ part of it is similar to a conductor in a orchestra, with the endpoints being those playing the instruments, and the instruments are the individual computers/servers.

What caused it

CrowdStrike sent out an update to their software that conflicted with Microsoft Windows, which caused a BSOD (blue screen of death – a ‘crash’ of the software). Following the software crash, the computer gets stuck during reboot and won’t load the operating system, leaving it dead in the water.

How this affects our elections

The idiots that implemented our cloud-based voter registration and poll-book systems have created a HUGE abuse vector in our election ecosystem and I’d be shocked if those election systems weren’t also affected by this. And there is nothing that can prevent their being another accidental (or intentional) abuse! Have you considered that this may just be cover for an election hack just prior to/during an election? It would be perfect cover.

Maricopa County Voting Locations Impacted – and they aren’t alone!

Outages locally have included Maricopa County voting locations, multiple Valley police dispatch centers, several airlines at Phoenix Sky Harbor International Airport and all flights to and from Mesa Gateway Airport.

Gov. Katie Hobbs said on social media that her team is “closely monitoring all services that have been impacted and is working to ensure that we continue delivering the critical services that Arizonans rely on.”

But wait…There’s more! New update from CrowdStrike:

(Source: https://www.crowdstrike.com/blog/falcon-update-for-windows-hosts-technical-details/)

Speaking of Elections…let’s not leave out Dominion just yet…

The idiots at Dominion Voting Systems also leave their election management server database server open to Named Pipes (notice the red box above!):

Is this yet another example of their incredible incompetence? Or is it instead, intentional ‘incompetence’? And we trust them with WHAT? (And yes of course, Named-Pipes is not the only problem showing there.)

According to CISA:

For this system deemed CRITICAL INFRASTRUCTURE, how convenient for Dominion to not even follow standard STIGs. Here’s V-79185:

Did Dominion do anything else wrong?

Lol…oh boy. This is barely even the tip of the iceberg. But in Dominion’s defense, it’s not just Dominion that’s the problem. Every company that electronically centralizes any aspect of our elections creates a superhighway of attack vectors leading into our Nation’s entire foundation, our Election System. The shear incompetence and inability to protect any system in the industry from abuse is the elephant in the room. When you have a bad actor inside the company, you’re done. For instance, look at this very accurate quote from an atsec source code review of Dominion that is applicable to ANY system:

“Backdoors are extremely hard to find because a seasoned programmer can obfuscate code to look benign. The atsec team would like to stress that, when facing a competent and sufficiently motivated maliciousdeveloper, it is extremely difficult to prove that all backdoors in a system have been identified. The famous Turing award lecture by Ken Thompson in 1984 entitled Reflections on Trusting Trust [TRUST] demonstrated how fundamentally easy it is to undermine all security mechanisms when the developers cannot be trusted. This voting system is no exception.”

Yes, I know CISA claims to secure our systems. Unfortunately, the same types of incompetence in these vendors exist in CISA as well. Not to mention, they are also lying right to our face about many things.

So what is the connection between CrowdStrike and Dominion?

Well…it is interesting that CrowdStrike is intercepting Named-Pipes and Dominion also left their database connected to Named-Pipes. Coincidence? Possibly. Convenient as yet another possible attack vector? Absolutely!

So what are you trying to say?

Simply put, the people wielding this technology are wholly irresponsible (at best). At worst, what if there are bad actors at Dominion? Even worse (if that’s even possible), what if there are bad actors at CrowdStrike? What do those bad actors now have access to? How many millions of computers around the world does CrowdStrike have LOW LEVEL control of? (8.5 Million at the last count according to David Weston, Microsoft VP, Enterprise and OS Security in a blog post Saturday). Who owns CrowdStrike? Who works there? THINK ABOUT ALL THAT…

Our election officials are sitting ducks and in no way knowledgeable enough to secure (nonetheless even understand) this threat landscape. How can any election official claim their system is secure when they don’t know it to be such, and they are merely blindly believing what someone they trust tells them? What happens when those that they trust are LYING TO THEM? Our election officials need to accept the reality that is in front of their faces: They cannot control or secure that which they cannot fully see and do not fully understand. The solution is simple…boot all the electronic systems out of our elections and go back to a simple system with a much smaller and controllable threat model, then use technology to add transparency instead of obscurity.

How to fix this current CrowdStrike issue:

The affected file in the update is a particular ‘driver’ that was updated. A ‘driver’ is a program that runs on the computer that performs a task. This driver is the Falcon driver. To repair it, the affected ‘driver’ must be removed in order to allow the operating system to boot up, then the new fixed version of the driver must be installed. The huge complication here is that the driver must be removed MANUALLY. A further complication is for servers that have encrypted hard drives because extra steps must be performed to decrypt the hard drive in order for the repair to be implemented. For companies that didn’t follow best-practices on their encryption passwords, their systems will be permanently locked out and unrecoverable.

Details on repair

The morning of 2024-07-19, a content update was sent to some CrowdStrike Falcon clients on Windows devices which resulted in “Blue Screen” errors for those devices. If you have a Windows device stuck on a blue screen at boot, this issue is almost certainly the cause.

The fix for this issue requires booting the Windows device into Safe Mode or Recovery Mode and deleting a file. Instructions for doing this are below. This post and these instructions may be updated as the situation develops.

FIXING THE WINDOWS DEVICE PROBLEM

Direct link to CrowdStrike instructions: https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/

If you are affected by this, we happen to know someone VERY good with solving these types of issues! Contact Mark Cook here.

Workaround Steps for individual hosts:

  • Reboot the host to give it an opportunity to download the reverted channel file. If the host crashes again, then:

    • Boot Windows into Safe Mode or the Windows Recovery Environment

      • NOTE: Putting the host on a wired network (as opposed to WiFi) and using Safe Mode with Networking can help remediation. (** NOTE: This is the same type of backdoor that many of our electronic voting systems including electronic poll books have)

    • Navigate to the %WINDIR%\System32\drivers\CrowdStrike directory
    • Locate the file matching “C-00000291*.sys”, and delete it.
    • Boot the host normally.

Workaround Steps for public cloud or similar environment including virtual:

Option 1:

  • ​​​​​​​Detach the operating system disk volume from the impacted virtual server
  • Create a snapshot or backup of the disk volume before proceeding further as a precaution against unintended changes (** NOTE: This type of backup is essentially same thing that Clerk Tina Peters had done to her election system before the SoS and Dominion showed up to remove the QR code feature, that they later attacked her for!)
  • Attach/mount the volume to to a new virtual server
  • Navigate to the %WINDIR%\System32\drivers\CrowdStrike directory
  • Locate the file matching “C-00000291*.sys”, and delete it.
  • Detach the volume from the new virtual server
  • Reattach the fixed volume to the impacted virtual server

Option 2:

  • ​​​​​​​Roll back to a snapshot before 0409 UTC.

AWS-specific documentation:

Azure environments:

User Access to Recovery Key in the Workspace ONE Portal

When this setting is enabled, users can retrieve the BitLocker Recovery Key from the Workspace ONE portal without the need to contact the HelpDesk for assistance. To turn on the recovery key in the Workspace ONE portal, follow the next steps. Please see this Omnissa article for more information.

Bitlocker recovery-related KBs:




    #RightWayVoting

    EARLY vs ELECTION DAY voting

    Best to Worst When Pros Cons
    Safest Election Day You may find out if your voting identity was previously stolen.

    Your ballot can’t get intercepted along the way to the polling location.

    Citizen Unity and Social Restoration, standing side-by-side your fellow citizens.

    Election Day Exit Polling is much easier to implement in order to compare the election-day results with the exit-polling results.

    None
    Safer Close to Election Day Convenience for those that are unable to vote on Election Day without showing hand early Something could happen to your ballot before it makes it to tabulation day.

    Election results can be estimated before polls close, allowing last-minute FEEDBACK LOOP manipulation.

    Your envelope could be thrown out by someone and your ballot never counted.

    Unsafe Early None Something could happen to your ballot before it makes it to tabulation day.

    Election results can be estimated before polls close, allowing easy FEEDBACK LOOP manipulation.

    Your envelope could be thrown out by someone and your ballot never counted.

    MAIL BALLOTS

    Mass Mail Ballot State

    • Vote In-Person – bring your unopened mail ballot with you

      • Pros

        • If you are told that you already voted by mail, you have real evidence to expose/address it and file an identity theft complaint with Sheriff prior to election day
        • You eliminate time/space between events, and therefore reduce the election abuse surface

      • Cons

        • None

    • Vote by Mail

      • Pros

        • You can be lazy

      • Cons

        • You increase the election abuse surface
        • Bad actors know when you return your ballot using the mail ballot tracking system to feed their election model
        • Your identity is directly connected to your ballot (violates voter secrecy) via the barcode keep in mind that not all states use a secrecy sleeve, for instance, Colorado.
        • Your party affiliations is often shown on the envelope (sometimes covertly)
        • There is no guarantee that your ballot won’t be swapped out for another
        • There is no guarantee that your ballot will ever make it to be counted

    Non-Mass Mail Ballot State

    • Vote In Person

      • NOT Request Mail Ballot

        • Pros

          • You don’t give them data to substantiate use of mail ballots
          • Less mail ballots in circulation results in smaller attack surface
          • If a mail ballot is shown as having been sent, you can expose/address it and file an identity theft complaint with Sheriff prior to election day
          • If one or more mail ballot shows up anyway, you can expose/address it prior to election day (and bring with you on election day to PROVE you didn’t vote with it)
          • If a mail ballot is shown as being received, you can expose/address it and file an identity theft complaint with Sheriff prior to election day
          • County Mail in tracking database

            • If a mail ballot is recorded as having been sent that shouldn’t have been, election officials can see it and deal with it prior to election day
            • If a mail ballot is recorded as being received that shouldn’t have been sent, election officials can see it and deal with it prior to election day
            • When arriving on Election Day, if you are told you already voted and you bring your sealed mail ballot in your hand, you expose/address it and file an identity theft complaint with Sheriff

          • Post-election voted lists

            • If a mail ballot is recorded as having been sent, you can expose it
            • If a mail ballot is recorded as being received, you can expose it

          • Exposed voter identity theft is great evidence to support not being able to certify an election

        • Cons

          • None

      • Opt-Out of Mail Ballot (where possible)

        • Pros

          • You demonstrate that citizens don’t want mail ballots
          • Less mail ballots in circulation results in smaller attack surface
          • If one or more mail ballot shows up anyway, you can expose/address it prior to election day (and bring with you on election day to PROVE you didn’t vote with it)
          • Public-facing Mail in ballot tracking system (pre-election-day)
          • If a mail ballot is shown as having been sent, you can expose/address it and file an identity theft complaint with Sheriff prior to election day
          • If a mail ballot is shown as being received, you can expose/address it and file an identity theft complaint with Sheriff prior to election day
          • County Mail in tracking database

            • If a mail ballot is recorded as having been sent, election officials can see it and deal with it prior to election day
            • If a mail ballot is recorded as being received, election officials can see it and deal with it prior to election day
            • When arriving on Election Day, if you are told you already voted and you bring your sealed mail ballot in your hand, you expose/address it and file an identity theft complaint with Sheriff

          • Post-election voted lists

            • If a mail ballot is recorded as having been sent, you can expose it
            • If a mail ballot is recorded as being received, you can expose it

          • Exposed voter identity theft is great evidence to support not being able to certify an election
          • You may get assigned a higher voting propensity which would make your vote less attractive to abuse

        • Cons

          • None

      • Request Mail Ballot but still Vote in Person

        • Pros

          • If you don’t receive your mail ballot you know it has been ‘lost’

        • Cons

          • If you go in to vote in person, but you have requested a mail ballot, you may be forced to vote a provisional ballot instead, which may not be tabulated.
          • If you don’t receive your mail ballot, you have put another phantom ballot into circulation
          • Ballots lose chain of custody as soon as they are sent out
          • You put more mail ballots in circulation increasing election attack surface
          • You provide evidence that can be used to justify the receipt of a mail ballot in your name
          • You provide feedback to bad actors that raise your voting propensity score used to decide which records to use for ballot injection
          • You put yourself at risk being able to vote on a non-mail ballot on election day, and your in-person vote could end up provisional
          • Election staff may force you to use your mail ballot (less chain of custody and far more abuse vectors) to vote in person instead of depositing your non-identifiable ballot in a ballot box.

    • Vote by Mail

      • Pros

        • You can be lazy

      • Cons

        • You increase the election abuse surface
        • Bad actors know when you return your ballot using the mail ballot tracking system to feed their election model
        • Your identity is directly connected to your ballot (violates voter secrecy) via the barcode keep in mind that not all states use a secrecy sleeve, for instance, Colorado.
        • Your party affiliations is often shown on the envelope (sometimes covertly)
        • There is no guarantee that your ballot won’t be swapped out for another
        • There is no guarantee that your ballot will ever make it to be counted

    DROP BOXES

    • Isolated – Not at your County polling place

      • Pros

        • None

      • Cons

        • No chain of custody
        • There is no guarantee that your ballot won’t be swapped out for another
        • There is no guarantee that your ballot will ever make it to be counted

    • At County Polling Place

      • Pros

        • More secure than isolated
        • Better chain of custody than isolated

      • Cons

        • Less chain of custody than traditional voting on paper
        • You increase the election abuse surface
        • Bad actors know when you return your ballot using the mail ballot tracking system to feed their election model
        • Your identity is directly connected to your ballot (violates voter secrecy) via the barcode keep in mind that not all states use a secrecy sleeve, for instance, Colorado.
        • Your party affiliations is often shown on the envelope (sometimes covertly)
        • There is no guarantee that your ballot won’t be swapped out for another
        • There is no guarantee that your ballot will ever make it to be counted

    Comparative Analysis

    To determine the safest method, I compare the methods based on exposure to known and unknown vulnerabilities and the feasibility of exploitation, assuming typical U.S. safeguards (paper trails, audits, verification) are in place but could have gaps.

    • Exposure to Known Vulnerabilities:

      • Mail-In (Early or Election Day): Most exposed due to multiple touchpoints (voters, postal services, drop boxes, processing centers). Interception, theft, or forgery is possible. Errors, small-scale fraud, and large-scale fraud are possible.
      • In-Person (Early or Election Day): Less exposed, as ballots are cast and stored in controlled environments. Electronic systems risk hacking, but paper backups and proper chain of custody and audits can limit impact. Insider fraud is possible.

    • Exposure to Unknown Vulnerabilities:

      • Mail-In: Higher risk due to complexity (e.g., postal systems, drop boxes, voter databases). Hypothetical attacks like AI-driven forgery or coordinated theft could exploit undiscovered flaws in distributed processes.
      • In-Person (Electronic): Moderate risk due to potential software or hardware flaws in voting machines. Complex code or supply chain attacks could introduce undetectable issues.
      • In-Person (Paper): Lowest risk, as simple paper ballots avoid technological vulnerabilities. Unknown risks are limited to physical tampering or novel social engineering.

    • Ease of Exploitation:

      • Mail-In: Small-scale exploitation (e.g., stealing a few ballots) is easier but unlikely to affect outcomes. Large-scale fraud can significantly impact elections.
      • In-Person (Early): Extended timeline increases opportunities for tampering or hacking, though proper audits can catch some issues. Insider fraud needs coordination.
      • In-Person (Election Day): Short timeline limits exploitation windows, especially for outsiders. Insider fraud is possible but heavily constrained by immediate counting and oversight. (Count Where Cast!)

    • Safeguard Effectiveness:

      • All methods benefit from audits, paper trails, and verification, but in-person voting simplifies chain-of-custody and reduces external touchpoints (e.g., postal services).
      • Election Day in-person voting minimizes storage time, reducing risks of tampering or loss compared to early voting.

    Safest Voting Method

    Election Day In-Person Voting with Paper Ballots is the safest method against potential vulnerabilities and exploitation, for these reasons:

    • Minimized Exposure: The single-day process reduces the time window for attacks, limiting opportunities for both known (e.g., hacking, tampering) and unknown exploits compared to early voting or mail-in systems.
    • Simpler System: Paper ballots avoid technological vulnerabilities (e.g., software bugs, hardware tampering) that electronic systems face, reducing unknown risks. Hand-counting ensures accuracy.
    • Controlled Environment: Voting and counting occur in supervised polling stations, minimizing external touchpoints (e.g., postal services) and simplifying chain-of-custody compared to mail-in voting.
    • Auditability: Paper ballots provide a verifiable record, making it easier to detect and correct errors or fraud compared to electronic-only or distributed mail-in systems.
    • Unknown Risk Mitigation: By avoiding complex technology and extended timelines, this method limits exposure to hypothetical flaws in software, hardware, or distributed processes.

    Caveats

    • Assumption of Safeguards: This conclusion assumes basic safeguards like voter ID, secure polling stations, chain of custody records, and audits are in place. Without them, no method is safe.
    • Local Variations: Security varies by jurisdiction. A poorly managed polling station may be less secure, but the impact of issues is typically contained.
    • Access Trade-Offs: Election Day in-person voting may reduce accessibility for some (e.g., those with work conflicts), but the prioritizes safety for all voters over convenience of some.
    • Unknown Unknowns: No method is immune to completely unforeseen exploits (e.g., a novel attack on voter psychology). Paper-based, in-person voting minimizes technological risks but not human or physical ones.

    Rankings

    1. Election Day In-Person (Paper Ballots): Safest due to simplicity, short timeline, and minimal technological risks.
    2. Early In-Person (Paper Ballots): Slightly less safe due to longer storage time, increasing tampering risks.
    3. Election Day In-Person (Electronic with Paper Trail): Based on blind trust and vulnerable to technological abuse and flaws.
    4. Early In-Person (Electronic with Paper Trail): Even more exposure due to extended timeline.
    5. Election Day Mail-In: Distributed process increases touchpoints, but shorter window limits some risks.
    6. Early Mail-In: Most vulnerable due to multiple touchpoints, longer timeline, and reliance on external systems.

    Conclusion

    Election Day in-person voting with paper ballots is the safest method, as it minimizes known and unknown vulnerabilities by using a simple, controlled, and auditable process with a short timeline. While no method is invulnerable, this approach reduces exposure to technological, distributed, or prolonged risks, making exploitation harder for both known and hypothetical attacks.




    Bank-Your-Vote and Early Voting Scam

    2 U.S. Code § 7 – Time of election: The Tuesday next after the 1st Monday in November, in every even numbered year, is established as the day for the election, in each of the States and Territories of the United States, of Representatives and Delegates to the Congress commencing on the 3d day of January next thereafter. (R.S. § 25; Mar. 3, 1875, ch. 130, § 6, 18 Stat. 400; June 5, 1934, ch. 390, § 2, 48 Stat. 879.)

    There are two groups of people pushing Early Voting and Vote By Mail. Group 1 is benefiting from election manipulation. Group 2 has fallen for the con because they don’t understand it. We can’t do anything about Group 1. But we CAN educate Group 2.

    How much more is your vote worth if you vote on the first day of early voting versus voting on Election Day? EXACTLY THE SAME, right? Well, exactly the same to YOU, yes. But to someone that would want to manipulate the election, you voting early is worth MUCH more to THEM. Why is that?

    First, let’s identify some facts:

    • If someone knew your party affiliation, they probably know how you will vote.
    • If they didn’t know your affiliation or you are PND (party-not-designated, or independent), there is still an incredible amount of information that is already collected about you from your social media posts, products you buy, websites you visit, clubs you’re in, email lists you’re in, terms you search for, contents of your emails, etc. With that information, it would be easy for an algorithm to determine how you will vote.
    • Notice how those committing election fraud aren’t trying to stop the voice of those pushing early voting. Why do you think that is? Think hard…

    So then, if someone didn’t have access to look at the actual ballots, but wanted to build a estimate of the election results, the only other thing they would need to know is who has voted so far, right? But HOW could they monitor that? Do they follow people around and watch them drop ballots in mailboxes/dropboxes or sit and watch them go vote in person? No, of course not, they don’t need to!

    Some very smart and devious people got us to pay for two systems that allow them to build a model of the election results before a single ballot is even tabulated. You’ve probably heard of and used one of these systems without even knowing. What are they?

    • Mail-in Ballot Tracking – We were told that this is so we can track our mail-in ballot so we feel more CONfident in using mail-in ballots. (Did you know that CON in CON-artist stands for ‘confidence’?) The mail-in Ballot Tracking isn’t for US. It’s for THEM. It’s for THEM to know when we have voted and what precinct we are in. They just feed that right into their estimation without needing to look at our ballot. You might be thinking “well, they won’t know when I vote, because I’m smart enough to vote in person!”. Well, you aren’t that smart…and here’s why:
    • Electronic Poll Books – We were told this was to make checking in to vote more convenient. Well, another thing it does is allow certain people to know when you vote (and of course what your voting precinct is). And they get this data in realtime as well, and they can add it to their election result model before you even finish filling out your ballot! How smart do you feel now?

    So what good does a model of the election results do for someone? Well, I’m going to put on my ‘BAD GUY’ hat and speak to you from that perspective:

    So how do we BREAK their control? Well, if we all VOTE IN PERSON ON ELECTION DAY, we break most of this feedback loop they created, and if they want to cheat, they have to cheat out in the open where we can see them instead of the dark where we couldn’t. This is what they did in Maricopa County AZ during the 2022 election. Yes, I know they still cheated, but at least WE CAUGHT THEM and now we have confirmation of the feedback loop. Can you imagine what’s going to happen when far more people vote in person on election day that it completely crushes their ability to cheat on that kind of a large scale? VICTORY FOR THE PEOPLE! The real vote will far overwhelm the injected votes and the bad guys will have to think of some other way to cheat. If we all can spread the word fast and wide enough, we the people will finally have a massive win against the psychopath globalists.

    “But Scott Presler, Charlie Kirk, and Lara Trump say to vote early!”

    Lara Trump has bad advisors around her. I have ZERO doubt of her integrity or intentions. I do hope she will contact me so I can walk her through this. However, Scott Presler told me directly face-to-face “Every expert has told me the same thing you’re telling me, and I DON’T CARE. I’m not stopping.” Why would Scott purposely mislead the people he claims to be helping? Charlie refuses to even listen to any of the experts. Isn’t that foolish to ignore people that actually studied the mechanics? Why would Charlie refuse to even listen? It’s bizarre at the least.

    JP Sears does a fantastic job explaining it from a high level:

    Share this video EVERYWHERE! Seriously, share it to everyone you know on every platform you can and ask every person to do the same. (and share this webpage as well, so everyone has the full detailed explanation)

    If you cannot vote on election day, vote AS CLOSE TO ELECTION DAY AS POSSIBLE, and of course, IN PERSON. Remove as much time and space between events in an election, and you will reduce the opportunities for induction of fraud.

    For more details, see #RightWayVoting.