By Robert Willmann
An election has three parts — a voter registration list, voting procedures, and counting the votes — unless you divide the last one into two. That will make it: a voter registration list, voting procedures, counting the votes, and an official announcement of the results.
If we wanted to rig and steal an election, which of the four parts would we use? If you think about it, there are opportunities in all four, especially in this computer age with electronic databases.
In the old days, the technique was to have friendly counties or precincts delay in counting or producing the ballots until you knew how many votes you needed to win. Lyndon Johnson used this technique when running for the U.S. Senate in the 1948 Democratic Primary in Texas. Around 200 extra votes were “discovered” in Jim Wells County which gave Johnson an 87 vote win and his nickname, Landslide Lyndon.
Human nature has not changed, but technology has. Electronic voting and counting machines can be designed and programmed to make voting fraud very difficult or impossible to detect, especially when related to voting procedures. The electricity flowing through the machine is not visible to the voter or to election workers who are to count votes. When used with electronic voter registration lists and databases, the opportunity for shenanigans is amplified.
After problems were revealed with voting in the 2020 presidential election, nothing helpful has changed. Nothing. No details of the construction and operation of electronic voting and counting machines have been disclosed to the public. Everything remains hidden: the software source code; the hardware microcode; the design of all semiconductor chips and their manufacturer; the design of any central processing unit (cpu) and its manufacturer; the design of any memory chips and storage medium; any connection ports and interfaces on the machine; the design of the circuit board (or motherboard, or logic board, as Apple Computer calls it); the machine’s ability to communicate externally by a wired, wireless, infrared, or other connection; and so forth. The creation, maintenance, vetting, and use of voter registration lists is not thoroughly explained, and keeping the lists current and accurate is turning into a bad joke.