a close up of a typewriter with a paper that reads election fraud

Election Fraud

Most people think of election fraud in terms of "mail-in" fraud, fake registrations, and duplicating or supressing ballots. But modern, computerized election fraud is much more sophisticated, and can be nearly impossible to detect.

Absentee Ballot Fraud

Absentee and mail-in voting are less secure than in-person voting: Firstly, because mail-in ballots have no secure chain of custody. Secondly, because Idaho allows any registered voter to request an absentee ballot online.

Although numerous elections appear to have been skewed through absentee ballot fraud, Idaho legislative leaders refuse to restrict absentee voting.

Voter Roll Fraud

Corrupt voter rolls enable election fraud by creating a pool of "phantom" voters that can be used to generate false absentee ballot requests or machine-manipulated votes. We know this is a problem, since experts such as Dr. Douglas Frank have demonstrated that voter rolls in almost every county in the U.S. have been manipulated by sophisticated computer algorithms.

Online voter registration enables voter roll fraud, and prohibiting Electronic Voter Registration is one of the easiest things Idaho could do to secure its voter rolls.

Tabulator Fraud

Electronic Tabulators take physical ballots as input and produce images of scanned ballots, and "election results". The problem is, it's impossible to know exactly what the tabulator software is doing, and there are many reasons to suspect that electronic tabulators can be programmed to manipulate elections.

Neither "Logic and Accuracy" tests, nor "certification" prove that tabulators are trustworthy. As long as physical ballots are not verified against tabulator results, the opportunity for fraud remains.

International Cyber Fraud

Before, during and after Federal Elections, all network traffic related to elections are monitored by internet security experts associated with DHS.

Unfortunately, the very network put in place to protect elections can be spied on and manipulated by sophisticated cyber criminals, who employ "back doors" in network routing software. The only way to protect our elections from such interference is to return to precinct-based counting and manual poll books, because data that is not produced electronically cannot easily be spied on or manipulated.