Election fraud stories

I as I said in my previous post I work with computer security. I know how tough that is to do right and how easy it is to believe things are security when it’s actually, for all practical purposes, a wide open system.

I only had one story from the election security world and I didn’t think that was sufficient to make my point. Just a few minutes ago I found another story which may help to prove the point that my concerns about election security also being a very difficult problem. The information was from a somewhat private forum so I’m removing the attribution:

I recently had an old guy from Northeast Philly tell me they used to grow beards for Election Day. Because you could get 3 or 4 votes out of a good beard by shaving a little off before revoting.

My personal story comes from an acquaintance of mine who used to live in Indiana. They were a volunteer who helped count ballots. Ballots, by law, would be discarded if there were extraneous marks on it. The ballot counters would put a small piece of pencil lead under their thumbnail. When a ballot came through that was a “straight ticket” of the opposing party, which became relatively ease to identify with a little practice, they would give the ballot a swipe with their leaded thumbnail and then show it to the opposition ballot counter who would agree the ballot should be discarded.

It is this sort of thing that makes me believe all the testimony from numerous election officials and elected politicians claiming the elections were fair and honest are meaningless. Even if they watched the process with their own eyes a skilled fraudster could get away with massive fraud and the observer would be clueless.

Good security is very, very difficult.

A security story

My job is computer security. My job, among other things, is to think like a bad guy and then prevent security breaches and/or catch them soon after they have begun executing their “kill chain”. Most people, even many very smart people, do not have the capacity to think like a bad guy. I have a real life story to illustrate.

Just because this is computer security don’t think this isn’t relevant to current events of a vital importance to the entire nation. I’ll tie all together before the end.

Please do not assume this happened at the company I work for. I have contacts with many other people in the security industry. We often share stories. Sometimes this story sharing is to warn others of how clever the bad guys are and how they succeeded or almost succeeded. Other times stories are shared about how mind bogglingly stupid and numerous some of the mistakes were in the implementation of a computer network system.

This story is about how stupid and numerous the mistakes were.

The type of business and other potentially identifying aspects of the story have been changed to protect the guilty. But the critical aspects of the story are true.

The company penetration testers were asked to test a tool used by customer facing employees. This tool allowed employees to assist the customers with their business with the company. It gave the employees access to personal information about the customer. The personal information access was required for the employee to do their job. The tool had been “released to production” months before the penetration testers (and apparently or other security professionals) took a look at things.

A simplified view of the tool architecture looked something like this:image

Database Servers A & B are the only servers applicable to the Customer Assist Tool. The other Database Servers are for other web applications unrelated to the Customer Assist Tool.

Everything from the Load Balancer up were Internet facing. It wasn’t originally designed that way. Originally everything seen in this diagram was inside the corporate network. But because of COVID they had “reasons” and they changed the design so employees working from home could easily access the Customer Assist Tool.

The Internet facing Customer Assist Tool required a company network username and password. The Load Balancer did not. The Load Balancer accepted connections from anyone on the Internet. The Database Servers did not require any security tokens or login. Anything coming from the Load Balancer was considered valid.

The penetration testers didn’t bother trying to do a brute force attack on the login to the Customer Assist tool. They connected directly to the Internet facing Load Balancer and sent queries to the Database Servers. If they knew just a tiny bit of unique public information about the customers, say an email address, phone number, street address, or Social Security Number, they could then get access to extremely personal information from the database.

The penetration testers sounded the ALL HANDS ON DECK alarm. The incident response people (IR) showed up.

The software developers (SDs) of the system were brought into the virtual room and told this is a really big problem. Except for biologically required breaks you’re not leaving the room until this is fixed.

SDs: “We don’t see why this is such a big deal. Someone would have to know the URL for the load balancer. And the only people that might know it are the users of the tool. And we don’t think very many, if any of them are smart enough to figure it out.”

IRs: <blink><blink> “The penetration testers figured it out. And the bad guys out there do this sort of stuff all the time. It’s how they make their money. I’m not going to waste our time explaining this to you. Fix the problem. NOW!”

The IRs then asked how far the logs go back, “You do have logs, right?” The software developers assured the IRs they had logs. The logs went back 90 days. There probably were a few days of missing traffic between when the system was released to production and the oldest log files but most of it was there.

IRs: “Okay, good. We can find out if there was actually any customer information lost.”
SDs: “Oh. You want logs for that? We just log activity at the Customer Assist Tool Web Application. The penetration testers, and any bad guy activity, won’t be in those logs.”
IRs: “Okay…. are there ANY log on the database servers?”

The SDs go looking and find there are generic web logs available that go back to the beginning of the release to production. The IRs looked at the logs for a few seconds and realized the IP addresses of all the requests are of the Load Balancer. There is no indication of the origin of the request. Requests from the Customer Assist Tool are indistinguishable from a request from anywhere else on the Internet.

What about load balancer logs? Maybe. But they don’t go back very far. And if they do exist, all the data is intermixed with the other web applications and other Database Servers.

Within a few hours the SDs have a fix.

IRs: “Tell me about your fix.”

SDs: “The login credentials of the employee used to login to the Customer Assist Tool are passed to the Database Server which validates the credentials before responding.”

IRs: “Okay, we should improve upon that, but maybe that will be good enough that we don’t have to shut down the application until a permanent fix is in place. But that’s a question for our VPs to discuss. Oh, by the way, how many employees do you have authorized to use this tool?”

SDs: “Uhhh… all company employees can use this tool.”

IRs: <blink><blink> “Everyone in the company? Really?” <IRs go to the tool and verify they have access>

SDs: “Yes. If someone improperly used the tool to gain access to customer information when they weren’t supposed to they could be caught and could lose their job. Therefore the customer information is safe from misuse.

IRs: <some facepalm><others bang their heads against the wall> “This is a large company. There are thousands of employees. Anyone on the Internet can find valid company credentials in five minutes or less. We disable hundreds of accounts per week as we find credentials on the web ourselves.”

SDs: <blink><blink>

The story goes on but the important part is that the SDs, not stupid people, made a ton of errors. These errors started with not getting a security professional in the room when they changed the design. The errors compounded dramatically from there.

They had a world view much different than the bad guys and the security professionals.Things which could not even be imagined by the SDs were child’s play to the penetration testers and the IRs.

Now to tie this to current events. Our recent election.

Several courts reviewing the lawsuits claiming foul play have concluded the election was fair and honest.or, at least, there was insufficient evidence of widespread fraud to change the results.

As seen in the story above there are failures modes which not only allow unauthorized access/fraud but make it impossible to determine if such access/fraud occurred. Furthermore, unless someone is experienced in thinking like a bad guy they can honestly believe everything is “fair and honest” and be completely, totally, catastrophically, wrong.

I trust the courts to know their profession. I don’t trust them with security issues. I trust them to accurately asses the integrity of our election far less than the SDs could accurately asses the security of their system. The system they designed and built.

The legal professionals of the court did not design or build the election system. They did not evaluate the security after the (supposedly) COVID inspired changes were made from the viewpoint of a security professional. The original election security features had evolved over hundreds of years and thousands of people poking at it, finding faults, and attempting to prevent future fraud and errors. In the span of a few months a few people made changes which did not go through nearly as rigorous review as the pre COVID system.

I don’t know with a 100% guarantee that sufficient fraud occurred to change the election results. I do know, with 100% certainty, that many people were highly motivated to commit fraud. I do know, with 100% certainly, that some fraud occurred. I’m nearly certain the system in use has issues which make it impossible to detect fraud after the fact.

The bottom line to this is that anyone who says the election was fair and honest because the courts say it was is either lying or placing their trust in a body of people that don’t know anywhere enough about security to make that call.

Quote of the day—John F. Kennedy

Those who make peaceful revolution impossible will make violent revolution inevitable.

John F. Kennedy
March 13, 1962
Address on the first Anniversary of the Alliance for Progress
[I grew up with this being part of my understanding of what made the U.S. different from so many other governments of the world throughout history. I never imagined this might be a prophecy for our future.

We now have a situation where essentially half of the population believes a fraudulent election gave the presidency to a candidate who openly, and proudly, states they plan to deny every citizen their basic, inalienable, human rights.

See also the other times when I referenced this same quote.

Today there are other Kennedy quotes which are also applicable:

We live in interesting times.—Joe]

Quote of the day—Petr Svab

An elections supervisor in Coffee County, Georgia, demonstrated in recent videos posted online how Dominion Voting Systems voting software allows votes to be changed through an “adjudication” process. The process allows the operator to add vote marks to a scanned ballot as well as invalidate vote marks already on the ballot.

Adjudication should only serve to resolve issues of voters marking ballots incorrectly, such as filling the bubbles in a way that doesn’t clearly show who he or she voted for. Yet it appears a substantial number of ballots went through that process, at least in some Georgia counties. As the Coffee County supervisor, Misty Martin, showed, the system can be set to allow adjudication of all scanned ballots, even blank ones, and effectively allow the operator to vote those ballots.

Petr Svab
December 10, 2020
How Dominion Software Allows Changing, Adding Votes
[Interesting.

The article makes it sounds like tampering with the vote is fairly easy and perhaps undetectable.

After thinking about this problem for all of 30 seconds… If I were writing the software for this feature it would print out a copy of the original ballot with the adjudicated vote indicated, a GUID (Globally Unique Identifier) and a hash of votes and the GUID. The GUID and hash would be stored in the database with the other vote results. This would make an audit relatively easy and resistant to tampering.

Perhaps they did that or even something far better. But the article doesn’t indicate that. Concerns such as this need to be investigated.—Joe]

Quote of the day—Samuel Alito

The application for injunctive relief presented to Justice Alito and by him referred to the Court is denied.

Samuel Alito
Supreme Court Justice
December 8, 2020
Supreme Court Denies to Block Pennsylvania From Certifying Election Results
[For some reason I find it amusing this is the entire order from the court on this case.—Joe]

Quote of the day—Mitchell Harrison

Upon arrival in the processing room located on Level S of State Farm Arena, we were supposed to watch the processing of the Absentee Ballots from the observation area which was delineated by a fenced area of roping secured by posts. This observation area we were put in was very distant from the staff actually processing the ballots. The room where the ballot processing took place is a very large room, and this distance effectively prevented our actual observation of the process. In addition other areas of this – again very large – room were not visible at all from our observation area.

For example, the machine that copied the UOCAVA electronically received ballots (sometimes called military ballots) onto a paper copy of the same could only be viewed from the side and the doors to that area were positioned in a way that prevented us from viewing of this process. Additionally, the scanners that scanned the absentee ballots were not visible to us at all.

Sometime after 10 o’clock p.m., the counting activity slowed. Shortly afterward, a younger lady with long braided but blog hair yelled out to all of them they should stop working and come back tomorrow (the next day, November 4th) at 8:30 A.M.. Thereafter all but 4 election employees left State Farm, leaving just the blond haired lady (who Michelle and I assumed was the supervisor), to older ladies and Regina Waller at the location. This lady had appeared through the night and Michelle and I believed her to be the supervisor.

Another task we had been given by Brandon was to inquire how many ballots had been processed and how many were still left to go. We posed these questions to Regina Waller, the Public Affairs Manager for Elections. She seem uncomfortable at times answering us, and she called someone which we interpreted as asking for help on how to respond to us. Ultimately she refused to answer our questions and told us we had to “look it up on the website”. In all, we asked Regina Waller for this information at least three separate times and she would not give us an answer.

Mitchell Harrison
November 2020
Attachment 28 Exhibit Affidavit of Mitchell Harrison
[This is directly related to this post.

I post this in response to those who say:

Nobody told them to stay. Nobody told them to leave. Nobody gave them any advice on what they should do. And It was still open for them or the public to come back in to view at whatever time they wanted to, as long as they were still working.

I would like to point out that to the best of my knowledge none of the responses from the poll workers are under oath or submitted such that they can be punished for perjury if they lied. If the affidavits in the court documents are knowingly in error then the providers of those documents are subject to criminal prosecution.

While it may be true the observers were not specifically told to leave the observation area there was no meaningful observation possible. The behavior toward of the poll workers was very suspicious (read Michelle Branton’s affidavit as well).

If they want to reassure the public the ballot counting was honest they should:

  • Provide the video showing appropriate chain of custody of the ballot boxes from opening to when they were scanned and stored for recount.
  • Do signature verification of all ballots with functional observation
  • Recount the ballots with functional observation.

All case documents are here.—Joe]

Quote of the day—Donald J Trump

Video footage from #Georgia shows that poll workers were told to stop counting and leave, while 4 people stayed behind to continue counting ballots in private.

Donald J Trump
December 3, 2020
Comment on YouTube
[Via daughter Jaime.

Watch both videos. They’re short.

I find it “interesting” these people weren’t concerned with the video surveillance cameras. Have they done this so many times and gotten away with it that they just didn’t have any concern about this time being different?

It certainly looks to me like a bunch of people need to be prosecuted.

We live in interesting times.—Joe]

Quote of the day—Predator

It is very rare indeed that one gets to witness a completely naked individual walk up to a large hornet’s nest and begin striking it with a stick after handcuffing himself to the tree the nest is in.

I’m reminded of that line from the movie, “I’m not locked in here with you, you’re locked in here with me.”

Predator
December 1, 2020
[I’m not so sure it’s as clear cut as that. But, still, we certainly do live in interesting times.—Joe]

Quote of the day—Republican state lawmakers in Pennsylvania

RESOLVED, That the House of Representatives:

(1) Recognize allegations of substantial irregularities and improprieties associated with mail-in balloting, precanvassing and canvassing during the November 3, 2020, election.

(2) Disapprove of the infringement on the General Assembly’s authority pursuant to the Constitution of the United States to regulate elections.

(3) Disapprove of and disagree with the Secretary of the Commonwealth’s premature certification of the results of the November 3, 2020, election regarding presidential electors.

(4) Declare that the selection of presidential electors and other Statewide electoral contest results in this Commonwealth is in dispute. 2020D13219 – 4 – 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 (5) Urge the Secretary of the Commonwealth and the Governor to withdraw or vacate the certification of presidential electors and to delay certification of results in other Statewide electoral contests voted on at the 2020 general election.

(6) Urge the United States Congress to declare the selection of presidential electors in this Commonwealth to be in dispute.

Republican state lawmakers in Pennsylvania
November 30, 2020
THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE RESOLUTION No. 1094 Session of 2020 (also available here)
Introduced by DIAMOND, NELSON, SCHEMEL, ROTHMAN, RYAN, KEEFER, JONES, ROWE, PUSKARIC, GLEIM, COOK, DUSH, BOROWICZ, ZIMMERMAN, METCALFE, MALONEY, MOUL, ROAE, RAPP, COX, KAUFFMAN, DAVANZO, DOWLING, IRVIN, BERNSTINE, LEWIS, GREINER, WARNER, OWLETT, TOBASH, MACKENZIE, METZGAR, SANKEY, KNOWLES, WHEELAND, JOZWIAK, B. MILLER, RIGBY AND HICKERNELL
[Read the whole thing, less than five pages, and attempt to convince me that there should not be a bunch of people, including members of the Pennsylvania Supreme Court, going to prison over the crap they pulled.

I was talking to a friend yesterday. And a friend of his lives in Pennsylvania and saw a lot of unethical, if not illegal, stuff. Among other things, there were people wheeling people that were total “vegetables” in on wheelchairs to vote. Their “helper” would get them through the voter ID stuff and then vote for them. They were also also places where people could vote and votes were being counted but were called something other than a “polling place”. And because they where a “polling place” there were no observers required.

I urged that this person report the activities to law enforcement. My friend said he would forward the suggestion to his friend.

We live in interesting times.—Joe]

Withholding information

From The Epoch Times:

At a public hearing in Arizona with select members of the state legislature and members of President Donald Trump’s legal team, lawmakers called for their colleagues to support an upcoming resolution that would delay the release of the state’s Electoral College votes.

Arizona state Rep. Mark Finchem told reporters during the Nov. 30 hearing that they hope to have a resolution “within the next 24 to 48 hours.” The state holds 11 Electoral College votes.

“We are clawing our Electoral College votes back, we will not release them,” Finchem said. “That’s what I’m calling on our colleagues in both the House and Senate to do—exercise our plenary authority under the U.S. Constitution.

From National File:

After the state’s hearing into election integrity was only halfway through, Arizona State Rep. Mark Finchem, a Republican, issued a call for his colleagues to withhold the state’s Electoral College votes, as he believes there is enough significant evidence of fraud to invalidate the state’s votes.

From USSA News:

After the state’s hearing into election integrity was only halfway through, Arizona State Rep. Mark Finchem, a Republican, issued a call for his colleagues to withhold the state’s Electoral College votes, as he believes there is enough significant evidence of fraud to invalidate the state’s votes.

“We are clawing our electoral college votes back, we will not release them. That’s what I’m calling our colleagues in both the House and the Senate to do,” added Finchem. “Exercise our plenary authority under the U.S. Constitution.”

From Before Before It’s News:

Arizona State Rep. Mark Finchem ““We are clawing our electoral college votes back, we will not release them”, Gosar: “Biden’s thugs will not steal this election.”

From (We) Are The News:

Arizona Rep. Mark Finchem seeks to prevent the state from assigning its Electoral College votes to Joe Biden

After the state’s hearing into election integrity was only halfway through, Arizona State Rep. Mark Finchem, a Republican, issued a call for his colleagues to withhold the state’s Electoral College votes, as he believes there is enough significant evidence of fraud to invalidate the state’s votes.

“We are clawing our electoral college votes back, we will not release them. That’s what I’m calling our colleagues in both the House and the Senate to do,” added Finchem. “Exercise our plenary authority under the U.S. Constitution.”

Those reports on the hearing, and many, many, more, were found using a Bing search for the set of words (no quotations):

We are clawing our Electoral College votes back

No reference to the hearing was found in any major media outlet.

The same search with Google yielded one article in the Citizens Journal and one Twitter post.

The same search with Google News yielded nothing.

That news sources and major corporations withhold the activities of state legislatures from the people proves we live in a very different world from the one I believed we lived in when I took classes in U.S. history and U.S. government when I was in High School.

I’m reminded of the often reported story from when the concentration and death camps were liberated after WWII. The residents of the nearby cities were (perhaps figuratively)dragged through the camps to see the horrors. These nearby residents claimed they did not know what was happening in the camps. The Nazis had controlled the flow of information and given, at least semi-, plausible reasons for the orders and trains full of people brought to the camp.

And so it is with the parties of evil today that withhold information from the people to hide their activities.

We live in interesting times.

Respond appropriately.

Quote of the day—Patrick Basham

Despite poor recent performances, media and academic polls have an impressive 80 percent record predicting the winner during the modern era. But, when the polls err, non-polling metrics do not; the latter have a 100 percent record. Every non-polling metric forecast Trump’s reelection. For Trump to lose this election, the mainstream polls needed to be correct, which they were not. Furthermore, for Trump to lose, not only did one or more of these metrics have to be wrong for the first time ever, but every single one had to be wrong, and at the very same time…

Patrick Basham
November 27, 2020
Reasons why the 2020 presidential election is deeply puzzling
[Via Scott Adams and daughter Jaime.

We live in interesting times.—Joe]

Quote of the day—Navid Keshavarz-Nia, Ph.D., Ed.D.

I conclude with high confidence that the election 2020 data were altered in all battleground states resulting in a hundreds of thousands of votes that were cast for President Trump to be transferred to Vice President Biden. These alterations were the result of systemic and widespread exploitable vulnerabilities in DVS, Scytl/SOE Software and Smartmatic systems that enabled operators to achieve the desired results. In my view, the evidence is overwhelming and incontrovertible.

Navid Keshavarz-Nia, Ph.D., Ed.D.
November 25, 2020
DECLERATION OF DR. NAVID KESHAVARZ-NIA
[I wish the lawyer writing this up knew how to use a spell checker.

Via daughter Jaime.

See also HUGE! Sidney Powell Witness Whom NY Times Described as “Always the Smartest Person in the Room” Concludes Hundreds of Thousands of Votes Transferred from Trump to Biden IN ALL BATTLEGROUND STATES.

Some of Keshavarz-Nia credentials:

I have a Bachelor’s degree in Electrical and Computer Engineering and a Master’s degree in Electronics and Computer Engineering from George Mason University, a Ph.D. degree in Management of Engineering and Technology from CalSouthern University and a Doctoral (Ed.D) degree in Education from George Washington University. I have advanced training from the Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), National Security Agency (NSA), DHS office of Intelligence & Analysis (I&A) and Massachusetts Institute of Technology (MIT).

I am employed by a large defense contractor as a chief cyber security engineer and a subject-matter expert in cyber security. During my career, I have conducted security assessment, data analysis and security counterintelligence, and forensics investigations on hundreds of systems. My experience spans 35 years performing technical assessment, mathematical modeling, cyber-attack pattern analysis, and security counterintelligence linked to FIS operators, including China, Iran, North Korea, and Russia. I have worked as a consultant and subject-matter expert supporting the Department of Defense, FBI and US Intelligence Community (USIC) agencies such as the DIA, CIA, NSA, NGA, and the DHS I&A supporting counterintelligence, including supporting law enforcement investigations.

Also:

11. Despite DVS’s constant denial about the flaws of its systems, the company’s ImageCast Precinct optical scanner system was totally hacked in August 2019. This occurred during the largest and most notable hacker convention, called DEFCON Voting Machine Hacking Village in Nevada. The DVS ImageCast Precinct is an integrated hybrid voting equipment by combining an optical paper ballot and ballot marking device to allow accessibility for the visually impaired. The system runs the Busybox Linux 1.7.4 operating system, which has known medium to high level exploitable vulnerabilities to allow remote attackers to compromise the VDS. (J. Moss, H. Hurtsi, M. Blaze et al., Voting Village Report, DEFCON Village Report in association with and Georgetown University Law Studies; Online Source: https://media.defcon.org/DEF%20CON%2027/voting-village-report-defcon27.pdf). The report indicated that “many of the specific vulnerabilities reported over a decade earlier (in the California and Ohio studies, for example) are still present in these systems today (A. Padilla, Consolidated report by California Secretary of State, Top-to-Bottom Review summary and detailed report, Page 4 (Online Source: https://www.sos.ca.gov/elections/ovsta/frequently-requested-information/top-bottom-review)

The operating system software is Busybox Linux 1.7.4. This was released in 2008. Yes, the O/S of the voting software in states of the most interest to the entire nation has not been updated in over 12 years. In the computer security world this is regarded as something close to highly radioactive and the hardware using this software should be immediately removed from network connections then decommissioned or updated.

In my job I report, on a weekly basis, computers which I have found that have reached end of life and are no longer supported when they are just one day past the date of last support. Something 12 years past support with a connection to the Internet would have my VP talking to someone else’s VP in a very stern tone of voice.

I know of some cases where the offending computer has been immediately disconnected from the network with no effort to contact the owners. The attitude being something along the lines of, “If they are this ignorant, stupid, and/or careless, they don’t deserve to be notified. Let them figure it out on there own—if they can.”

In this case the company has known for “over a decade” the system was insecure. My inclination is that this was no accident or carelessness. There is a high probability this was deliberate. People should go to prison for this.

It looks as if the Kraken has been released.—Joe]

Quote of the day—Matt Braynard

It’s unfortunate, but short of a judge ordering a do-over, another election … short of that, I really don’t see how you fix this.

This election, it appears to me, has been decided by ballots that are highly questionable. They’re anomalous.

I cannot say with confidence who won this election. I don’t think anybody can.

Matt Braynard
November 25, 2020
Election Findings Could ‘Easily’ Overturn 3 States, Data Analyst Concludes
[We live in interesting times.—Joe]

Quote of the day—Sherry Bodin

There is no doubt in my mind that President Trump was appointed by God to clean up all the corruption that we have endured throughout the United States of America for the past 40 to 50 years. President Trump offers hope for us all, so we, our children and grandchildren will live better lives once the corruption is cleaned up. We will then endure a more peaceful, loving and kind world.

Sherry Bodin
November 16, 2020
Comment to:

[Video link via brother Doug.

I have a strong interest in psychology. I took a bunch of psych classes in college and I think I got straight A’s on them. I find the whole Trump as president thing extremely interesting. We have such an extreme division in this country about his character. From “racist, fascist, criminal, and all supporters and enablers must be ‘dealt with’ so our country can heal” to “appointed by God”.

How can two sets of people, all working with access to the same dataset, arrive at such different conclusions? Some, perhaps even most, are living in an alternate universes.

Reality is really, really tough. I get that. But still, it’s such a wide range of reactions that I find it difficult to imagine that I could intentionally create a data set such that some group of people could examine the data and divide into such an extreme range of opinions on what the data means.

If it weren’t for the deadly seriousness of our situation I would stock up on popcorn. Then, every night I would sit down with a full bowl and have myself a good laugh at the absurdity of human nature.—Joe]

Quote of the day—Chris Metz

We currently have over a year’s worth of orders for ammunition in excess of $1 billion. With demand far outstripping supply and inventory levels in the channel at all-time lows, we see strong demand continuing, and this metric informs our viewpoint of what a recovery or normalization could look like.

Chris Metz
CEO of Vista Outdoor Inc.
November 5, 2020
Vista Outdoors reports ammunition backlog of over $1B
[We live in interesting times.—Joe]

Quote of the day—Kit Knightly

This is about a principle. Donald Trump is the elected head of state, and he is being denied a platform to address the people he represents by the faceless servants of corporate media oligarchs.

This is a terrible, terrifyingly awful precedent to set.

The owners of Comcast or Warner Bros or Disney or Facebook or Twitter are not elected officials. They have no legal authority, and thus no accountability. Yet they are claiming the right to determine what elected officials can and cannot say to the people who elected them.

There is a strain of thought that this kind of censorship is justified. “Spreading disinformation puts lives at risk”, they say. “If the media stopped people lying we wouldn’t be in this mess” or “the news should only broadcast the truth!”.

The argument goes that “allowing Donald Trump to “publicly undermine our democratic institutions will erode the public trust and could lead to violence.”

But I would argue that empowering billionaires to hold a monopoly on “the truth” is far more dangerous to democracy than anything Trump could ever say.

To people inclined to disagree, I leave these five questions. Answer them, if you can:

  1. Who made the decision to censor the elected President of the United States?

  2. Who granted them this power?

  3. Whose interests do they serve?

  4. To whom are they accountable?

  5. In the future, who gets to decide “the truth”?

Kit Knightly
November 8, 2020
Censoring Donald Trump is more “dangerous to democracy” than anything he could ever say
[The main stream media and social media platforms don’t seem to have a problem publishing things about gun ownership that’s fractally wrong. Hence, this isn’t about truth or falsity. This is about deliberate suppression of political opposition.—Joe] 

Foreshadowing

Via a Tweet from Chuck Petras:

ElectionSCOTUSJustices

Also from Chuck on the same topic:

5DChess

And reassurance that it is, at least mostly, true from CNN:

Supreme Court is about to have 3 Bush v. Gore alumni sitting on the bench

Judge Amy Coney Barrett, once confirmed, will be one of three current Supreme Court justices who assisted the legal team of then-Texas Gov. George W. Bush in the Florida ballot-recount battle that came down to a single vote at the Supreme Court.

The court’s December 12, 2000, decision cutting off Florida recounts tore apart the justices and the nation, and the case hovers in the air today as America approaches the November 3 presidential election.

We live in interesting times.

Quote of the day—Sidney Powell

There has been a massive and coordinated effort to steal this election from We The People of the United States of America to delegitimize and destroy votes for Donald Trump. To manufacture votes for Joe Biden. They’ve done it in every way imaginable, from having dead people vote in record numbers, to absolutely fraudulently creating ballots that exist only for voting for Biden. We’ve identified over 450,000 ballots that miraculously only have a vote for Joe Biden on them and no other candidate.

Sidney Powell
November 8, 2020
We’ve Identified 450,000 Ballots that Miraculously ONLY have a Vote for Joe Biden” – Sidney Powell Drops a BOMB on Sunday Morning Futures (Video)

[We live in interesting times.—Joe]

The math doesn’t lie—Benford’s Law

Benford’s Law seems sort of magical but it was first observed in 1881 and is frequently used by statisticians/accountants to detect anomalies.

As it applies to our current situation is explained here and reposted here.

Voting law violations confirmed

Spoiled Bucks County Ballots Found in Trash; Top County Election Official: ‘The Judge of Elections Didn’t Do It Correctly;’ Pennsylvania Law: Hold Spoiled Ballots for 22 Months

We live in interesting times.