2016: How digital balloting opens doors to election thieves, voter fraud

The constant kerfuffle about voting rights does get your attention, doesn’t it? To the left, it seems that attempts to embed a sense of order and integrity to our voting process is the right’s way of disenfranchising minorities and the elderly. To the right, every attempt to make voting easier and more remote—that is, you don’t have to be “there” to do it—represents just one more dilution what some say is our most precious right: to have our say at the ballot box.

Advertisement

Aren’t most of us somewhere in the middle? Don’t we hope that every legitimate voter cares enough about an issue or a candidate to make their voice known? Whatever their party or view? That’s the way we know what people are thinking. Right?

With at least nine different kinds of voter fraud available—as defined by The Heritage Foundation (“Does Your Vote Count?”)—it seems there’s no dearth of opportunity for those with initiative to cheat the rest of us out of our voice at the polls. Some say there’s very little evidence of voter fraud, so what’s the big deal? With voter impersonation, false registrations, duplicate voting, improper use of absentee ballots, buying votes, illegal “assistance” at the polls, ineligible voting, and ballot petition fraud, the crime—because that’s what it is—tends to be one-off or involve relatively small numbers.

Microsoft Word - Sequoia Optech Insight.instructions.doc

Even so, those phony votes may be large enough in number to throw close, local elections, and that, of course, is a big deal in all the mayoral, school board, zoning commission, and the numberless judicial contests. Then, the “thrown” local elections impact state totals. Another response to the “what’s the big deal?” crowd is the equally fair question, “Just how much fraud is too much?”
The ninth kind of vote fraud outlined by The Heritage Foundation is “Altering The Vote Count,” and of all of different ways our votes can be stolen, this one is the most understated, threatening, invisible, and probable.

Advertisement

For those who might challenge that statement, my answer is that our own life experience shouts an affirmative. Until the massive electronic thefts of credit card data at Target, Home Depot, and Bank of America, to name three—oh, and how about the latest at the USPS?—wouldn’t we suppose that executives at each of those institutions presumed their data was vault-safe?  Recently, we learned that the largest background investigations firm in the US lost its federal contracts because its database of highly sensitive personal data was hacked by a foreign power. There are untold—and as yet, undiscovered—other examples.

If credit card, personal, and security clearance data—all thought to have been Fort Knox protected—can be exposed for manipulation, what about our votes? Again, I’m not referring to Fido or residents of the local cemetery joining the voting queue. No, I’m describing a situation where in three or four battleground states, one party or the other arranges for an electronic heist—somewhere between the precinct where we vote and county seat, or between the county seat and the state capitol. With just a bit of electoral sophistication to shave votes here, add them there, like magic, the party’s candidate wins the state, or two or three, and is our president-elect. And how would we know it?

Advertisement

That’s the “big deal.” The 2016 quadrennial is on the horizon, and as far as I can tell, we are like the rube in a crowd waiting for the pickpocket. Because electronic voting is to an unsettling degree unregulated, unencrypted, and unsecured, the question is no longer “if.” Given what’s at stake in 2016, that’ll be the “when.”

John P. Warren is a political commentator with over thirty years of governmental and corporate experience, and describes how ambition and power combine to steal a national election in his political thriller, “Turnover,” available at Amazon, iBooks, and B&N.

Join the conversation as a VIP Member

Sponsored