Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Fred

And there is no way to know how the machines will tally the results. It is the perfect way to steal an election.


71 posted on 10/26/2010 4:48:30 PM PDT by Blood of Tyrants (Islam is the religion of Satan and Mohammed was his minion.)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Blood of Tyrants
In a state that was built on rigged gaming machines , fraud and intimidation , stealing an election is child's play .
72 posted on 10/26/2010 4:51:32 PM PDT by fantom (,)
[ Post Reply | Private Reply | To 71 | View Replies ]

To: Blood of Tyrants
Exactly Blood. You are correct. With paper ballots, while ballot boxes can be lost, the initial vote count is made at the local precinct. Party volunteers are present as observers during the count. The count is recorded and the boxes sealed and sent to a vault. If there are challenges or discrepancies the boxes are unsealed. That is called an audit trail. There is some evidence of malfeasence. Today, there is, with a very few exceptions, no audit trail anywhere in the country, and our votes are counted by people who feel their survival depends upon controlling the vote.

Last week (please pardon that I haven’t time to chase down the story which was published at “verifiablevoting.com) a small team of engineers (who may have been from Yale) pursued a challenge to find fault with voting machines in an East Coast precinct. Within an hour they had hacked the machine, without having to physically access to it, and reprogrammed it to report what they predicted. There was no trace, no audit trail. This is not new. Our pundits let us down again, perhaps out of ignorance, perhaps out of self preservation, by telling us (Mark Levine) that we need to win by a more significant amount than the statists are able to cheat. That is surrender. They are fraudulently electing thugs who are leading us to Chavez and Castro.

This is one of few visible signs of our corrupt government. Most of the work of SEIU cadre is out of our sight. Here there is some interface with the public which reveals some of what they are doing. Why they do it is no secret. As legislators satisfy special interests they steal the production of the remaining free productive sector. As in Atlas Shrugged, they are destroying private productivity because they are not among the productive. There is no such thing as public capitalist productivity. The public sector employees know that if they don't steal, their overgenerous retirement guarantees are meaningless. Their overpayment for being drones will disappear. Their standards of living with be threatened. This is a war against capitalism. We know the background of our British-born president, who our legislative and judicial branches have protected.

We must use our energy to battle illegal activity. That means learning more about the cheating. John Fund's book, Stealing Votes is pretty good. If you can find Votescam, the true story of two left-wing brothers who decided to take no contributions and run a true grass roots campaign agains Claude Pepper. This was thirty years ago. They found themselves fighting the FBI, Attorney General, and finally, an Asst. Attorney General in Broward County name Janet Reno dismissed their case, a violation with no statute of limitations, on statute of limitations charges.

They will make up the laws as they go along, as Murkoski of Alaska opined today, because we have a “living Constitution.” Miller of Alaska is a real threat because he is a Constitutional Originalist. Murkoski has always been in the pocket of the SEIU, supported by the Republican leadership as well as the Dems. That she lost the primary is a real blow because squeezing natural resource production of Alaska is important to destroying capitalism.

91 posted on 10/26/2010 6:29:10 PM PDT by Spaulding
[ Post Reply | Private Reply | To 71 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson