December 21, 2022

Certification of voting machine systems is a Pandora’s box. There are too many unforeseen means to exploit voting machine systems, from within and without, to justify the risk of abandoning paper ballots, same-day voting, and tabulation. It’s all about ethical behavior, feel-good policies, and sleight-of-hand con jobs—passing a chicken over a pot of boiling water and calling it chicken soup.

Maricopa County, Arizona, has many unresolved serious issues from the 2020 Election that raise questions about the election’s integrity and validity (here and here). The 2022 midterm results are also very troubling as well. See also, “Arizona Midterm Elections . . . Ballot Harvesting.”

In my professional experience investigating financial crimes, many employers in small businesses give the same person control of the business checkbook and responsibility for reconciling the checking statement. The owners then wonder why embezzlement happens.

Do our elections require security on par with our national strategic assets?

My answer is an unequivocal “yes” because of the severe implications to our national security if our voting system can be exploited. It’s all about managing acceptable risk. For example, there’s the risk “posed by Biden and his son’s alleged dealings with China…(e.g., was COVID a bio-weapon the CCP used either intentionally or accidentally to interfere with this election?)….”

Image: Russia’s KOIB computerized voting machine in 2012, by Petri Krohn. CC BY-SA 3.0.

During the 2020 election, COVID meant many things were ignored or exploited, e.g., voting machines, mass mailing early voting ballots, late suspicious ballot drops, and delays in counting that altered the final count. Consider this alleged vulnerability with ballot adjudication machines. See how that suggests fraud.

The media and government officials labeled anyone who questioned the results as an election denier. Notable election deniers who brought civil cases questioning the reliability of voting machine systems were sued for defamation. So much for free speech, as we experienced with COVID, Russiagate, the validity of Hunter’s laptop, the murder of Seth Rich and who has his laptop, and now election denial too? Only those murder organizations with large war chests can survive the lawfare battle and federal scrutiny and bullying

Computers are not infallible. Malevolent actors can manipulate computers. My two favorite examples are Star Trek (Original Series), Court Martial (fictional), and the book Cuckoo’s Egg by Clifford Stoll (non-fiction), which was made into a PBS NOVA episode.

The simple answer is to trust no one and question everything.

Certifying electronic voting systems has evolved since Congress passed the Help America Vote Act of 2002 (HAVA), which created the US Election Assistance Commission (EAC). The EAC accredits independent testing laboratories to certify voting systems and develops voluntary voting system standards. These guidelines are voluntary for the states (likely deferring to the Election Clause, US Const. Art I, Sec 4, Clause 1.) Many states have their own certification standards that require federal certification.