Find us on Google+ LuckyRooster: Worse Than Voter-ID Find us on Google+

We Appreciate It - Thanks

Friday, August 10, 2012

Worse Than Voter-ID

fp31
fp31 (Photo credit: WillieBlue)














By

David Rosser



"Every GOP administration since 1952 has let the Military-Industrial Complex loot the Treasury and plunge the nation into debt on the excuse of a wartime economic emergency. Richard Nixon comes quickly to mind, along with Ronald Reagan and his ridiculous 'trickle-down' theory of U.S. economic policy. If the Rich get Richer, the theory goes, before long their pots will overflow and somehow 'trickle down' to the poor, who would rather eat scraps off the Bush family plates than eat nothing at all. Republicans have never approved of democracy, and they never will. It goes back to preindustrial America, when only white male property owners could vote." - Hunter S. Thompson


Hunter Thompson nailed it. The current GOP strategy of voter suppression is indeed an old one, for it actually predates the Republican Party itself. Then, it was the old "Jim Crow" Democrats from the South with all their poll taxes and ridiculous "Voter Eligibility Exams." After the Civil Rights and Voting Rights legislation was passed in the United States, these "Jim Crow" Democrats left the Democratic Party for the Republican Party as evidenced in Nixon's "Southern Strategy" of 1968.

It is no surprise, then, that when Republicans took control of of governor's offices and legislatures in 2010, that they would proceed with legislation that would limit voter turnout for certain parts of the electorate. These voting blocks were ALSO the SAME parts of the electorate who voted overwhelmingly for President Obama in 2008. The Republican Party decided, that limiting voter participation for large groups of voters likely to vote Democratic, would be a key element for their 2012 political campaigns.

However, in terms of the total election strategy Voter ID laws are just DISTRACTIONS. The REAL thievery is planned, coordinated, and executed via the electronic touch-screen voting systems and their tabulation procedures, where vote flipping is quick, easy, and not EVEN investigated. ALL they have to to is have PLAUSIBLE results that fall within the "margin of error" from a recent poll, and NOBODY will question them.

THEREFORE all they need to do is run the mathematical calculations to see how many votes they need to pilfer from what area that will not seem too out of line. A few hundred votes here, a few hundred there and BINGO your candidate carries the state. There are too many ways to do this to name them all, but this can be done in real-time, to adjust for conditions such as voter turnout.

Votes can be flipped by cellphones, smartphones, ipads, laptops, and a myriad of devices. Trojans and other malware such as zombies can also be dormant in the system, execute a one-time application and then delete itself and all traces that it has ever been in the system. So, I hope we've got the IT spooks or other such folks working these cases as we speak, gathering intelligence to prevent a repeat of 2000.

Obfuscation is time-worn tactic utilized in  voter suppression strategies. Many weapons are available to accomplish this. Voter requirements are often changed so that the voter is always confused about everything associated with voting. Voting precincts are changed, closed, and moved as part of the redistricting process. Voter requirements are also changed by state legislatures.

Among the most visible of these are State-Issued Photo-ID requirements. These are, by design, MEANT to confuse. A voter is required to produce the CORRECT official state documentation in order to qualify for the OFFICIAL State-Issued Photo-ID. For example, in South Carolina, even though STATE universities issue Photo-ID cards, THESE state-issued photo-IDs are NOT considered valid forms of identification for voting.

Also, in South Carolina, even though only SHORT-FORM birth certificates are issued at birth, the state REQUIRES a potential voter to produce a LONG-FORM birth certificate in order to obtain the OFFICIAL State-Issued Photo ID. In addition the State of South Carolina does NOT provide the Long-Form birth certificates free of charge. This creates a new version of poll tax.


However, in terms of the total election strategy Voter ID laws are just DISTRACTIONS. The REAL thievery is planned, coordinated, and executed via the electronic touch-screen voting systems and their tabulation procedures, where vote flipping is quick, easy, and not EVEN investigated. ALL they have to to is have PLAUSIBLE results that fall within the "margin of error" from a recent poll, and NOBODY will question them.

THEREFORE all they need to do is run the mathematical calculations to see how many votes they need to pilfer from what area that will not seem too out of line. A few hundred votes here, a few hundred there and BINGO your candidate carries the state. There are too many ways to do this to name them all, but this can be done in real-time, to adjust for conditions such as voter turnout.

Votes can be flipped by cellphones, smartphones, ipads, laptops, and a myriad of devices. Trojans and other malware such as zombies can also be dormant in the system, execute a one-time application and then delete itself and all traces that it has ever been in the system. So, I hope we've got the IT spooks or other such folks working these cases as we speak, gathering intelligence to prevent a repeat of 2000.
  
Enhanced by Zemanta

No comments: