So, after you wipe away the sand from your eyes, it’s time to step back into reality.
There has been a lot of speculation about contrived/fixed polling and also voter fraud in the upcoming 2016 POTUS elections, but how much do you know about there real voter fraud threat? It’s time to do some research, if you’re invested in turning the country around, and get involved, because you can do something that will make a difference.
Here’s a little something from Constitutional Rising about the basics of the threats the come in the form of electronic voting machines.
There is an electronic voting system called the GEMS election management system, which is utilized by approximately 25 percent of the country. The unfortunate reality is that it has at its core, designed into it, the ability to commit election fraud through vote manipulation. One of the key methods the fraud is committed is through a fractional vote feature.
Fractional vote tabulating is embedded in each GEMS application. Votes can be altered through the pre-setting of vote percentages to redistribute votes to predetermined levels, completely disregarding the actual votes cast. The process is invisible and impossible to detect to the poll watchers and others lacking the computer expertise and a trip under the hood of the machine.
The compromised machines in question were, at the time of the writing of their document, used in the states of Alaska, Connecticut, Georgia, Mississippi, New Hampshire, Utah and Vermont, as well as counties in Arizona, California, Colorado, Florida, Illinois, Indiana, Iowa, Kansas, Kentucky, Massachusetts, Michigan, Missouri, Ohio, Pennsylvania, Tennessee, Texas, Virginia, Washington, Wisconsin and Wyoming. The GEMS system is also used in Canada.
Overall percentages can also be manipulated, such as assigning one candidate with 45% of the votes, another with 35% and the other 10% to another. Those will be the final results regardless of the actual votes cast.
Fractions are not visible in the final reports by default, with decimals reported as whole numbers. All evidence of tampering or that fractional values ever existed can be instantly cleared from the underlying database using a setting in the GEMS data tables.
If that isn’t enough to convince you, then you really need to read this. And, ironically enough, it was featured in a lefty site, Bloomberg. It’s a fascinating, and chilling story of a computer geek who has been a paid election hacker, around the world.
It was just before midnight when Enrique Peña Nieto declared victory as the newly elected president of Mexico. Peña Nieto was a lawyer and a millionaire, from a family of mayors and governors. His wife was a telenovela star. He beamed as he was showered with red, green, and white confetti at the Mexico City headquarters of the Institutional Revolutionary Party, or PRI, which had ruled for more than 70 years before being forced out in 2000. Returning the party to power on that night in July 2012, Peña Nieto vowed to tame drug violence, fight corruption, and open a more transparent era in Mexican politics.
Two thousand miles away, in an apartment in Bogotá’s upscale Chicó Navarra neighborhood, Andrés Sepúlveda sat before six computer screens. Sepúlveda is Colombian, bricklike, with a shaved head, goatee, and a tattoo of a QR code containing an encryption key on the back of his head. On his nape are the words “</head>” and “<body>” stacked atop each other, dark riffs on coding. He was watching a live feed of Peña Nieto’s victory party, waiting for an official declaration of the results.
When Peña Nieto won, Sepúlveda began destroying evidence. He drilled holes in flash drives, hard drives, and cell phones, fried their circuits in a microwave, then broke them to shards with a hammer. He shredded documents and flushed them down the toilet and erased servers in Russia and Ukraine rented anonymously with Bitcoins. He was dismantling what he says was a secret history of one of the dirtiest Latin American campaigns in recent memory.
For eight years, Sepúlveda, now 31, says he traveled the continent rigging major political campaigns. With a budget of $600,000, the Peña Nieto job was by far his most complex. He led a team of hackers that stole campaign strategies, manipulated social media to create false waves of enthusiasm and derision, and installed spyware in opposition offices, all to help Peña Nieto, a right-of-center candidate, eke out a victory. On that July night, he cracked bottle after bottle of Colón Negra beer in celebration. As usual on election night, he was alone.
Sepúlveda’s career began in 2005, and his first jobs were small—mostly defacing campaign websites and breaking into opponents’ donor databases. Within a few years he was assembling teams that spied, stole, and smeared on behalf of presidential campaigns across Latin America. He wasn’t cheap, but his services were extensive. For $12,000 a month, a customer hired a crew that could hack smartphones, spoof and clone Web pages, and send mass e-mails and texts. The premium package, at $20,000 a month, also included a full range of digital interception, attack, decryption, and defense. The jobs were carefully laundered through layers of middlemen and consultants. Sepúlveda says many of the candidates he helped might not even have known about his role; he says he met only a few.
So, while there are lots of benefit in the computerized world, voting is one thing that doesn’t benefit from computer help. Make sure your vote is backed up with a paper ballot, and if your local election authority isn’t feeling the love of the paper ballot, it’s time to start a local revolution there and get them on board before November.