Difference between revisions of "Election/Fraud"

From Wikispooks
Jump to navigation Jump to search
 
(13 intermediate revisions by 4 users not shown)
Line 1: Line 1:
 
{{concept
 
{{concept
 +
|ON_constitutes=Conspiracy theory
 
|wikipedia=https://en.wikipedia.org/wiki/Electoral_fraud
 
|wikipedia=https://en.wikipedia.org/wiki/Electoral_fraud
 
|constitutes=fraud, statecraft
 
|constitutes=fraud, statecraft
 
|powerbase=http://www.powerbase.info/index.php/Voting_fraud
 
|powerbase=http://www.powerbase.info/index.php/Voting_fraud
 +
|description=Only happens in Third World countries your [[American]] [[oil]] hawks don't like.
 
|image=Voting fraud.jpg
 
|image=Voting fraud.jpg
 
}}
 
}}
 
'''Voting fraud''' is ''greatly'' facilitated if there is no paper trail of votes cast; [[deep states]] naturally push for electronic voting to provide them with another means of controlling governments. The drive for electronic voting is a subject of concern of many people,<ref>https://www.unhackthevote.com/category/voting-machines/</ref> which is rarely if ever reported by  the {{ccm}}. [[Diebold]] Election Solutions was renamed [[Premier Election Solutions]] after leaks of their source code revealed the software permitted election fraud.<ref>https://www.computerworld.com/article/2547648/security0/diebold-source-code-leaked-again.html</ref>
 
'''Voting fraud''' is ''greatly'' facilitated if there is no paper trail of votes cast; [[deep states]] naturally push for electronic voting to provide them with another means of controlling governments. The drive for electronic voting is a subject of concern of many people,<ref>https://www.unhackthevote.com/category/voting-machines/</ref> which is rarely if ever reported by  the {{ccm}}. [[Diebold]] Election Solutions was renamed [[Premier Election Solutions]] after leaks of their source code revealed the software permitted election fraud.<ref>https://www.computerworld.com/article/2547648/security0/diebold-source-code-leaked-again.html</ref>
  
==Europe==
+
[[File:Ballot Box Silhouette.svg|thumb|right|150px|There are over 50 [[Election/List of ways to rig elections|ways to rig elections]].]]
The [[Langemann Papers]] revealed that [[Le Cercle]] was active attempting to influence [[elections]] in Europe in the [[1970s]].   
+
 
 +
== Ways to rig elections ==
 +
 
 +
{{FA|Election/List of ways to rig elections}}
 +
 
 +
There are over 50 ways to manipulate voters, steal elections, and rig politics.
 +
 
 +
== Postal voting ==
 +
 
 +
{{FA|Postal voting}}
 +
 
 +
A [[2005]] report from the [[Commission on Federal Election Reform]], headed by [[Jimmy Carter]], found that absentee ballots remain the largest source of potential voter fraud.<ref>https://www.wsj.com/articles/heed-jimmy-carter-on-the-danger-of-mail-in-voting-11586557667</ref>
 +
 
 +
== Europe ==
 +
 
 +
[[image:VotingError2.jpg|right|300px]]
 +
 
 +
The [[Langemann Papers]] revealed that [[Le Cercle]] was active at influencing [[elections]] in Europe in the [[1970s]].   
 +
 
 +
=== UK ===
 +
 
 +
[[MI5]] carried out [[Operation Clockwork Orange]] to unseat [[UK Prime minister]] [[Harold Wilson]] in the [[1970s]]. [[Margaret Thatcher]] was elected in the [[1979 General Election]] after input from [[Brian Crozier]]'s [[Shield]] group.
 +
 
 +
=== Integrity Initiative ===
  
===Integrity Initiative===
 
 
{{FA|Integrity Initiative}}
 
{{FA|Integrity Initiative}}
 +
 
In 2018, the [[first Integrity Initiative Leak]] included a file {{t|xCountry.pdf}} which alphabetically listed the large [[nation states]] of Europe, and the [[US]], together with the timing of their next [[election]]. Along side most of these countries were a set of people, email address and institutional affiliation. Traditionally, voting systems used paper, and were carried out according to protocols intended to minimize the chance of fraud. In recent years, especially in the US, there has been a push towards more easily defrauded, digital systems.
 
In 2018, the [[first Integrity Initiative Leak]] included a file {{t|xCountry.pdf}} which alphabetically listed the large [[nation states]] of Europe, and the [[US]], together with the timing of their next [[election]]. Along side most of these countries were a set of people, email address and institutional affiliation. Traditionally, voting systems used paper, and were carried out according to protocols intended to minimize the chance of fraud. In recent years, especially in the US, there has been a push towards more easily defrauded, digital systems.
  
===UK===
+
== South Korea ==
[[Margaret Thatcher]] was elected in the [[1979 General Election]] after input from [[Brian Crozier]]'s [[Shield]] group.
 
  
==South Korea==
 
 
[[WhoWhatWhy]] reported in 2017 that "[[Park Geun-hye|Park]] benefited from the Korean National Intelligence Service's unlawful [[rigging of the election]] in her favor. It hired [[trolls]] to set up numerous fake [[Twitter]] accounts to create the illusion of widespread public support for Park."<ref name=www2017>http://whowhatwhy.org/2017/02/13/privileges-power-comparing-trump-south-koreas-impeached-president/</ref>
 
[[WhoWhatWhy]] reported in 2017 that "[[Park Geun-hye|Park]] benefited from the Korean National Intelligence Service's unlawful [[rigging of the election]] in her favor. It hired [[trolls]] to set up numerous fake [[Twitter]] accounts to create the illusion of widespread public support for Park."<ref name=www2017>http://whowhatwhy.org/2017/02/13/privileges-power-comparing-trump-south-koreas-impeached-president/</ref>
  
==US==
+
== US ==
 +
 
 +
{{YouTubeVideo
 +
|code=svEuG_ekNT0
 +
|align=left
 +
|width=
 +
|caption='' Voting Machines: Last Week Tonight with John Oliver (HBO) '', 4 November 2019, HBO
 +
}}
 +
 
 
{{SMWQ
 
{{SMWQ
 
|text=It is more likely that time, rather than the voting booth, will erode the secret power of [[Skull and Bones|this Yale group]], Nothing this outrageous can survive forever.  
 
|text=It is more likely that time, rather than the voting booth, will erode the secret power of [[Skull and Bones|this Yale group]], Nothing this outrageous can survive forever.  
Line 29: Line 60:
 
|subjects=voting, US deep state, Skull and Bones
 
|subjects=voting, US deep state, Skull and Bones
 
}}
 
}}
 +
 
In [[USA]] in particular, paper ballots have been either partly or wholly replaced by electronic voting systems, after measures such as the [[2001]] [[Help America Vote Act]].  
 
In [[USA]] in particular, paper ballots have been either partly or wholly replaced by electronic voting systems, after measures such as the [[2001]] [[Help America Vote Act]].  
{{YouTubeVideo
+
ce voting machines leave no conventional paper trail, they are open to abuse, which [[Jonathan Simon]] claims has happened on multiple occasions.<ref>https://t.co/Bqcz5chj8N</ref> A mound of evidence exists both that many of the voting machines are easily hacked<ref>http://www.activistpost.com/2015/08/flashback-voting-machines-can-be-hacked-with-26-and-an-8th-grade-education.html</ref>, that this is ''not'' accidental<ref>http://www.westernjournalism.com/vote-fraud-diebold-whistleblower-speaks-out/</ref>, and that the 2004 US election was decided as a result of fraudulent use of voting technology.<ref>http://www.unwelcomeguests.net/163</ref><ref>http://www.dkosopedia.com/wiki/Election_integrity_timeline</ref>
|align=left
 
|caption="Princeton University Exposes Diebold Flaws"
 
|code=6-Qcvqxuy5o
 
}}
 
Since voting machines leave no conventional paper trail, they are open to abuse, which [[Jonathan Simon]] claims has happened on multiple occasions.<ref>https://t.co/Bqcz5chj8N</ref> A mound of evidence exists both that many of the voting machines are easily hacked<ref>http://www.activistpost.com/2015/08/flashback-voting-machines-can-be-hacked-with-26-and-an-8th-grade-education.html</ref>, that this is ''not'' accidental<ref>http://www.westernjournalism.com/vote-fraud-diebold-whistleblower-speaks-out/</ref>, and that the 2004 US election was decided as a result of fraudulent use of voting technology.<ref>http://www.unwelcomeguests.net/163</ref><ref>http://www.dkosopedia.com/wiki/Election_integrity_timeline</ref>
 
  
 
=== 2020 Presidential Election ===
 
=== 2020 Presidential Election ===
 +
 
{{FA|US/2020 Presidential election}}
 
{{FA|US/2020 Presidential election}}
 +
 
Starting from the [[US/2020 Presidential election/Iowa DNC Caucuses|Iowa DNC Caucuses]], election fraud was very widely alleged in the [[2020 Presidential Election]].<ref>https://www.thegatewaypundit.com/2020/11/breaking-michigan-county-discovered-omitting-votes-trump/</ref> [[Social media]] such as [[Twitter]]<ref>https://twitter.com/Partisangirl/status/1324657679000719360</ref>, [[Facebook]]<ref>https://www.thegatewaypundit.com/2020/11/breaking-facebook-bans-pro-trump-stop-steal-page-gained-350000-followers-since-announced-wednesday/</ref> and [[Reddit]] were active in censoring such thoughts, as were {{ccm}} such as [[MSNBC]].<ref>https://www.azibase.com/2020/11/president-trump-cut-off-by-msnbc-abc.html?m=1</ref>
 
Starting from the [[US/2020 Presidential election/Iowa DNC Caucuses|Iowa DNC Caucuses]], election fraud was very widely alleged in the [[2020 Presidential Election]].<ref>https://www.thegatewaypundit.com/2020/11/breaking-michigan-county-discovered-omitting-votes-trump/</ref> [[Social media]] such as [[Twitter]]<ref>https://twitter.com/Partisangirl/status/1324657679000719360</ref>, [[Facebook]]<ref>https://www.thegatewaypundit.com/2020/11/breaking-facebook-bans-pro-trump-stop-steal-page-gained-350000-followers-since-announced-wednesday/</ref> and [[Reddit]] were active in censoring such thoughts, as were {{ccm}} such as [[MSNBC]].<ref>https://www.azibase.com/2020/11/president-trump-cut-off-by-msnbc-abc.html?m=1</ref>
  
 
=== 2000 presidential election ===
 
=== 2000 presidential election ===
 +
 
{{FA|US/2000 Presidential Election}}
 
{{FA|US/2000 Presidential Election}}
 +
 
The '''2000 United States presidential election''' is considered one of the closest elections in US history.
 
The '''2000 United States presidential election''' is considered one of the closest elections in US history.
  
===Diebold source leaks===
+
=== Diebold source leaks ===
 +
 
 +
{{YouTubeVideo
 +
|align=left
 +
|caption="Princeton University Exposes Diebold Flaws"
 +
|code=6-Qcvqxuy5o
 +
}}
 +
 
 
In 2003, the source code to all [[Diebold]]'s voting machines was leaked. Researchers at [[Johns Hopkins University]] and [[Rice University]] published a damning critique of the products, based on an analysis of the software. They stated that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth. Another leak of source code occurred in 2006.<ref>https://www.computerworld.com/article/2547648/security0/diebold-source-code-leaked-again.html</ref><ref>http://archive.today/2020.11.25-013509/https://en.wikipedia.org/wiki/Hacking_Democracy</ref>
 
In 2003, the source code to all [[Diebold]]'s voting machines was leaked. Researchers at [[Johns Hopkins University]] and [[Rice University]] published a damning critique of the products, based on an analysis of the software. They stated that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth. Another leak of source code occurred in 2006.<ref>https://www.computerworld.com/article/2547648/security0/diebold-source-code-leaked-again.html</ref><ref>http://archive.today/2020.11.25-013509/https://en.wikipedia.org/wiki/Hacking_Democracy</ref>
  
====Diebold Princeton analysis====
+
==== Diebold Princeton analysis ====
 +
 
 
Main findings are: Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss. We have constructed demonstration software that carries out this vote-stealing attack. Anyone who has physical access to a voting machine, or to a memory card that will later be inserted into a machine, can install said malicious software using a simple method that takes as little as one minute. In practice, poll workers and others often have unsupervised access to the machines. AccuVote-TS machines are susceptible to voting-machine viruses and computer viruses that can spread malicious software automatically and invisibly from machine to machine during normal pre and post-election activity. We have constructed a demonstration virus that spreads in this way, installing our demonstration vote-stealing program on every machine it infects. While some of these problems can be eliminated by improving Diebold's software, others cannot be remedied without replacing the machines' hardware. Changes to election procedures would also be required to ensure security.<ref>http://web.archive.org/web/20200906145401/https://jhalderm.com/pub/papers/diebold-ttbr07.pdf</ref><ref>https://www.princeton.edu/news/2006/09/13/researchers-reveal-extremely-serious-vulnerabilities-e-voting-machines</ref><ref>https://citp.princeton.edu/our-work/voting/videos/</ref>
 
Main findings are: Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss. We have constructed demonstration software that carries out this vote-stealing attack. Anyone who has physical access to a voting machine, or to a memory card that will later be inserted into a machine, can install said malicious software using a simple method that takes as little as one minute. In practice, poll workers and others often have unsupervised access to the machines. AccuVote-TS machines are susceptible to voting-machine viruses and computer viruses that can spread malicious software automatically and invisibly from machine to machine during normal pre and post-election activity. We have constructed a demonstration virus that spreads in this way, installing our demonstration vote-stealing program on every machine it infects. While some of these problems can be eliminated by improving Diebold's software, others cannot be remedied without replacing the machines' hardware. Changes to election procedures would also be required to ensure security.<ref>http://web.archive.org/web/20200906145401/https://jhalderm.com/pub/papers/diebold-ttbr07.pdf</ref><ref>https://www.princeton.edu/news/2006/09/13/researchers-reveal-extremely-serious-vulnerabilities-e-voting-machines</ref><ref>https://citp.princeton.edu/our-work/voting/videos/</ref>
  
===Hillary Clinton===
+
=== Hillary Clinton ===
 +
 
 
In 2016, a recording of [[Hillary Clinton]] was published. In 2006 she stated that {{SMWQ
 
In 2016, a recording of [[Hillary Clinton]] was published. In 2006 she stated that {{SMWQ
 
|text=I do not think we should have pushed for an election in the [[Palestinian]] territories. I think that was a big mistake. And if we were going to push for an election, then we should have made sure that we did something to determine who was going to win.
 
|text=I do not think we should have pushed for an election in the [[Palestinian]] territories. I think that was a big mistake. And if we were going to push for an election, then we should have made sure that we did something to determine who was going to win.
Line 62: Line 102:
 
}}
 
}}
  
===Georgia investigation===
+
=== Georgia investigation ===
 +
 
 
In an effort to force the state to scrap the electronic voting system, a number of Georgia voters banded together and sued for use of paper votes, but in September 2018 District Court [[judge]] [[Amy Totenberg]] ruled that the midterm elections in Georgia must proceed with touchscreen voting machines.<ref>https://whowhatwhy.org/2018/09/18/breaking-news-federal-judge-rules-no-on-paper-ballots-in-georgia/</ref> The group had asked for an independent security review of the server, expecting to find flaws that would lend weight to their argument for investment in a more modern and secure system. After a [[Freedom of Information Act]] request, emails were released in October 2017 that reveal that technicians at the election center deleted the server's data on July 7 – just days after the lawsuit was filed. ''[[The Register]]'' reported that "That same email also notes that backups of the server data were also deleted more than a month after the initial wipe – just as the lawsuit moved to a federal court. It is unclear who ordered the destruction of the data."<ref>http://www.theregister.co.uk/2017/10/26/voting_server_georgia_wiped/</ref> A cybersecurity official pointed out “critical vulnerabilities” just a month before the 2016 November election, but the state did not address them.<ref>https://whowhatwhy.org/2018/08/06/georgia-officials-knew-equipment-was-vulnerable-before-the-2016-election/</ref>
 
In an effort to force the state to scrap the electronic voting system, a number of Georgia voters banded together and sued for use of paper votes, but in September 2018 District Court [[judge]] [[Amy Totenberg]] ruled that the midterm elections in Georgia must proceed with touchscreen voting machines.<ref>https://whowhatwhy.org/2018/09/18/breaking-news-federal-judge-rules-no-on-paper-ballots-in-georgia/</ref> The group had asked for an independent security review of the server, expecting to find flaws that would lend weight to their argument for investment in a more modern and secure system. After a [[Freedom of Information Act]] request, emails were released in October 2017 that reveal that technicians at the election center deleted the server's data on July 7 – just days after the lawsuit was filed. ''[[The Register]]'' reported that "That same email also notes that backups of the server data were also deleted more than a month after the initial wipe – just as the lawsuit moved to a federal court. It is unclear who ordered the destruction of the data."<ref>http://www.theregister.co.uk/2017/10/26/voting_server_georgia_wiped/</ref> A cybersecurity official pointed out “critical vulnerabilities” just a month before the 2016 November election, but the state did not address them.<ref>https://whowhatwhy.org/2018/08/06/georgia-officials-knew-equipment-was-vulnerable-before-the-2016-election/</ref>
  
==="Charade" of elections===
+
=== "Charade" of elections ===
 +
 
 
In April 2016, [[Ron Paul]] stated that the American electoral system is rigged to keep "independent thinkers" from succeeding, adding that “I see elections as so much of a charade”.<ref>http://www.blacklistednews.com/Ron_Paul%3A_US_Elections_Are_Rigged%2C_Voting_Simply_Used_to_Pacify_the_Public/50500/0/38/38/Y/M.html</ref>
 
In April 2016, [[Ron Paul]] stated that the American electoral system is rigged to keep "independent thinkers" from succeeding, adding that “I see elections as so much of a charade”.<ref>http://www.blacklistednews.com/Ron_Paul%3A_US_Elections_Are_Rigged%2C_Voting_Simply_Used_to_Pacify_the_Public/50500/0/38/38/Y/M.html</ref>
  
 
{{SMWDocs}}
 
{{SMWDocs}}
  
==References==
+
== References ==
 +
 
 
{{reflist}}
 
{{reflist}}

Latest revision as of 21:03, 3 March 2023

Concept.png Election/Fraud 
(fraud,  statecraftPowerbaseRdf-entity.pngRdf-icon.png
Voting fraud.jpg
Interest of• Dominion voting systems
• Athan Gibbs
• Katie Hobbs
• Tony Navarrete
Only happens in Third World countries your American oil hawks don't like.

Voting fraud is greatly facilitated if there is no paper trail of votes cast; deep states naturally push for electronic voting to provide them with another means of controlling governments. The drive for electronic voting is a subject of concern of many people,[1] which is rarely if ever reported by the commercially-controlled media. Diebold Election Solutions was renamed Premier Election Solutions after leaks of their source code revealed the software permitted election fraud.[2]

There are over 50 ways to rig elections.

Ways to rig elections

Full article: Stub class article Election/List of ways to rig elections

There are over 50 ways to manipulate voters, steal elections, and rig politics.

Postal voting

Full article: Postal voting

A 2005 report from the Commission on Federal Election Reform, headed by Jimmy Carter, found that absentee ballots remain the largest source of potential voter fraud.[3]

Europe

VotingError2.jpg

The Langemann Papers revealed that Le Cercle was active at influencing elections in Europe in the 1970s.

UK

MI5 carried out Operation Clockwork Orange to unseat UK Prime minister Harold Wilson in the 1970s. Margaret Thatcher was elected in the 1979 General Election after input from Brian Crozier's Shield group.

Integrity Initiative

Full article: Integrity Initiative

In 2018, the first Integrity Initiative Leak included a file xCountry.pdf which alphabetically listed the large nation states of Europe, and the US, together with the timing of their next election. Along side most of these countries were a set of people, email address and institutional affiliation. Traditionally, voting systems used paper, and were carried out according to protocols intended to minimize the chance of fraud. In recent years, especially in the US, there has been a push towards more easily defrauded, digital systems.

South Korea

WhoWhatWhy reported in 2017 that "Park benefited from the Korean National Intelligence Service's unlawful rigging of the election in her favor. It hired trolls to set up numerous fake Twitter accounts to create the illusion of widespread public support for Park."[4]

US

Voting Machines: Last Week Tonight with John Oliver (HBO) , 4 November 2019, HBO

“It is more likely that time, rather than the voting booth, will erode the secret power of this Yale group, Nothing this outrageous can survive forever.”
Anthony Sutton (2002)  [5]

In USA in particular, paper ballots have been either partly or wholly replaced by electronic voting systems, after measures such as the 2001 Help America Vote Act. ce voting machines leave no conventional paper trail, they are open to abuse, which Jonathan Simon claims has happened on multiple occasions.[6] A mound of evidence exists both that many of the voting machines are easily hacked[7], that this is not accidental[8], and that the 2004 US election was decided as a result of fraudulent use of voting technology.[9][10]

2020 Presidential Election

Full article: US/2020 Presidential election

Starting from the Iowa DNC Caucuses, election fraud was very widely alleged in the 2020 Presidential Election.[11] Social media such as Twitter[12], Facebook[13] and Reddit were active in censoring such thoughts, as were commercially-controlled media such as MSNBC.[14]

2000 presidential election

Full article: US/2000 Presidential Election

The 2000 United States presidential election is considered one of the closest elections in US history.

Diebold source leaks

"Princeton University Exposes Diebold Flaws"

In 2003, the source code to all Diebold's voting machines was leaked. Researchers at Johns Hopkins University and Rice University published a damning critique of the products, based on an analysis of the software. They stated that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth. Another leak of source code occurred in 2006.[15][16]

Diebold Princeton analysis

Main findings are: Malicious software running on a single voting machine can steal votes with little if any risk of detection. The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss. We have constructed demonstration software that carries out this vote-stealing attack. Anyone who has physical access to a voting machine, or to a memory card that will later be inserted into a machine, can install said malicious software using a simple method that takes as little as one minute. In practice, poll workers and others often have unsupervised access to the machines. AccuVote-TS machines are susceptible to voting-machine viruses and computer viruses that can spread malicious software automatically and invisibly from machine to machine during normal pre and post-election activity. We have constructed a demonstration virus that spreads in this way, installing our demonstration vote-stealing program on every machine it infects. While some of these problems can be eliminated by improving Diebold's software, others cannot be remedied without replacing the machines' hardware. Changes to election procedures would also be required to ensure security.[17][18][19]

Hillary Clinton

In 2016, a recording of Hillary Clinton was published. In 2006 she stated that “I do not think we should have pushed for an election in the Palestinian territories. I think that was a big mistake. And if we were going to push for an election, then we should have made sure that we did something to determine who was going to win.” [20]

Georgia investigation

In an effort to force the state to scrap the electronic voting system, a number of Georgia voters banded together and sued for use of paper votes, but in September 2018 District Court judge Amy Totenberg ruled that the midterm elections in Georgia must proceed with touchscreen voting machines.[21] The group had asked for an independent security review of the server, expecting to find flaws that would lend weight to their argument for investment in a more modern and secure system. After a Freedom of Information Act request, emails were released in October 2017 that reveal that technicians at the election center deleted the server's data on July 7 – just days after the lawsuit was filed. The Register reported that "That same email also notes that backups of the server data were also deleted more than a month after the initial wipe – just as the lawsuit moved to a federal court. It is unclear who ordered the destruction of the data."[22] A cybersecurity official pointed out “critical vulnerabilities” just a month before the 2016 November election, but the state did not address them.[23]

"Charade" of elections

In April 2016, Ron Paul stated that the American electoral system is rigged to keep "independent thinkers" from succeeding, adding that “I see elections as so much of a charade”.[24]


 

Examples

Page nameDescription
2021 Newfoundland and Labrador general electionThe first postal voting-only election in Canada. Hampered by COVID-19 , the voting process was not simple. Unsurprisingly, the results couldn't have been better for the governing Liberals.
US/2020 Presidential election/Iowa DNC CaucusesMore proof that voting is a rigged joke.
Voting pencilWikipedia considers concerns over election integrity a "conspiracy theory"

 

A Election/Fraud victim on Wikispooks

TitleDescription
Kari LakeUS politician aligned with Trump

 

Related Quotations

PageQuoteAuthorDate
George Carlin“On Election Day, I stay home. Two reasons: first of all, voting is meaningless; this country was bought and paid for a long time ago. That empty shit they shuffle around and repackage every four years doesn't mean a thing. Second, I don't vote, because I firmly believe that if you vote, you have no right to complain. I know some people like to twist that around and say, "If you don't vote, you have no right to complain." But where's the logic in that? Think it through: If you vote, and you elect dishonest, incompetent politicians, and you screw things up, then you're responsible for what they've done. You voted them in. You caused the problem. You have no right to complain. I, on the other hand, who did not vote—who, in fact, did not even leave the house on Election Day—am in no way responsible for what these politicians have done and have every right to complain about the mess you created. Which I had nothing to do with. Why can't people see that?”George Carlin
Corporate media/Censorship“would through a lurid light of distrust and disbelief onto our entire electoral system, political system and basically our democracy”Jonathan Simon24 November 2016
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.



References

  1. https://www.unhackthevote.com/category/voting-machines/
  2. https://www.computerworld.com/article/2547648/security0/diebold-source-code-leaked-again.html
  3. https://www.wsj.com/articles/heed-jimmy-carter-on-the-danger-of-mail-in-voting-11586557667
  4. http://whowhatwhy.org/2017/02/13/privileges-power-comparing-trump-south-koreas-impeached-president/
  5. America's Secret Establishment Introduction for 2002 Edition
  6. https://t.co/Bqcz5chj8N
  7. http://www.activistpost.com/2015/08/flashback-voting-machines-can-be-hacked-with-26-and-an-8th-grade-education.html
  8. http://www.westernjournalism.com/vote-fraud-diebold-whistleblower-speaks-out/
  9. http://www.unwelcomeguests.net/163
  10. http://www.dkosopedia.com/wiki/Election_integrity_timeline
  11. https://www.thegatewaypundit.com/2020/11/breaking-michigan-county-discovered-omitting-votes-trump/
  12. https://twitter.com/Partisangirl/status/1324657679000719360
  13. https://www.thegatewaypundit.com/2020/11/breaking-facebook-bans-pro-trump-stop-steal-page-gained-350000-followers-since-announced-wednesday/
  14. https://www.azibase.com/2020/11/president-trump-cut-off-by-msnbc-abc.html?m=1
  15. https://www.computerworld.com/article/2547648/security0/diebold-source-code-leaked-again.html
  16. http://archive.today/2020.11.25-013509/https://en.wikipedia.org/wiki/Hacking_Democracy
  17. http://web.archive.org/web/20200906145401/https://jhalderm.com/pub/papers/diebold-ttbr07.pdf
  18. https://www.princeton.edu/news/2006/09/13/researchers-reveal-extremely-serious-vulnerabilities-e-voting-machines
  19. https://citp.princeton.edu/our-work/voting/videos/
  20. http://observer.com/2016/10/2006-audio-emerges-of-hillary-clinton-proposing-rigging-palestine-election/ Observer.com , 2006
  21. https://whowhatwhy.org/2018/09/18/breaking-news-federal-judge-rules-no-on-paper-ballots-in-georgia/
  22. http://www.theregister.co.uk/2017/10/26/voting_server_georgia_wiped/
  23. https://whowhatwhy.org/2018/08/06/georgia-officials-knew-equipment-was-vulnerable-before-the-2016-election/
  24. http://www.blacklistednews.com/Ron_Paul%3A_US_Elections_Are_Rigged%2C_Voting_Simply_Used_to_Pacify_the_Public/50500/0/38/38/Y/M.html