Posted on 03/29/2026 9:18:43 AM PDT by CFW
A volunteer who participated in a training session at the Palm Beach County Supervisor of Elections Office was arrested for stealing sensitive computer equipment, authorities announced Sunday.
John Panicci was taken into custody March 28 at his home following an investigation into the theft of an encrypted access key from a voter registration terminal at the elections office.
The incident occurred during a volunteer training session on March 19 for the March 24 election. According to detectives, Panicci stole the encrypted access key during the training at the elections office located at 4301 Cherry Road.
While the stolen key was configured only for training databases, officials expressed concern that someone with technical knowledge could potentially reverse engineer the encryption and reintroduce it into a voter registration kiosk for malicious purposes.
The theft was reported to authorities on March 27, prompting an investigation by Palm Beach County detectives. After identifying Panicci as the suspect and establishing probable cause, investigators obtained both an arrest warrant and a residential search warrant.
During the search of Panicci's home, detectives recovered the stolen items along with a substantial amount of electronic and digital storage devices. Panicci was transported to the Palm Beach County Jail and booked on charges.
(Excerpt) Read more at wptv.com ...
|
Click here: to donate by Credit Card Or here: to donate by PayPal Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794 Thank you very much and God bless you. |
This is the district that includes Mar-a-Lago.
Notice the article says a stolen "access key", but further down it refers to stolen "items" (plural) recovered.
Note that all of this was reported and recovered AFTER the election.
“Dirty Deeds, done dirt cheap!”
Time for a revote?
Yes, it is technically possible. A person with sufficient technical knowledge and tools could potentially reverse engineer the encryption algorithm or key mechanism from the stolen encrypted access key, even though it was configured only for training databases.
The item stolen was an “encrypted access key” (a USB thumb drive activator) from a voter registration terminal at the Palm Beach County Supervisor of Elections Office. Palm Beach County uses the VR Systems EViD electronic pollbook system, which relies on a two-part setup: the EViD software and a physical USB security key/dongle. The key and software work together, with encryption protecting access and data.
Palm Beach County officials and the Sheriff’s Office specifically highlighted the risk that someone could adapt the stolen key for use on a live voter registration kiosk by reverse engineering the encryption and reintroducing it into a production system. This concern is technically grounded given how these USB security keys function.
Important note: In this specific case, the key was recovered quickly along with the suspect’s devices, greatly limiting any real-world exploitation. However, the technical possibility exists as described.
Answer based on public reporting and known characteristics of the VR Systems EViD system.
We cannot be entirely certain that John Panicci did not allow other nefarious actors to copy the key before it was recovered. The theft occurred on March 19, 2026, during a volunteer training session, and the suspect was arrested on March 28, 2026—giving him approximately nine days in which he had possession of the encrypted access key.
During that period, he could have physically connected the USB activator to his own computer(s), imaged it, extracted data, or allowed others to do the same. Authorities executed a search warrant at his home on March 28 and recovered the original stolen key along with a substantial amount of electronic and digital storage devices. However, no public reports confirm whether forensic analysis has ruled out prior duplication or data exfiltration.
Detecting copying of such a device is possible in many cases but not guaranteed, especially if done carefully. USB security keys like the VR Systems EViD thumb drive activator often rely on encryption and a two-part system (software + key), but standard USB devices leave traces that skilled forensics can examine:
Forensic examiners from law enforcement can analyze the seized devices for these indicators. If the original key uses advanced protections (e.g., one-time programmable elements, challenge-response protocols that log usage, or hardware-unique identifiers), unauthorized copying might be detectable or even prevented. However, if the key’s security depends primarily on software-level encryption or obscurity, a technically knowledgeable person could create a working copy without leaving obvious traces on the original device itself.
In this case, because the key was recovered relatively quickly and the incident involved a training (non-production) configuration, the immediate risk appears contained. Officials have not released details on any ongoing forensic results regarding duplication. Full certainty would require comprehensive digital forensics on all seized devices, which may still be in progress.
We cannot be certain that John Panicci did not let other nefarious actors copy the key. The time window between theft and recovery allowed for potential duplication, and while forensic analysis of seized electronics can often detect access or copying through logs, timestamps, and device history, sophisticated actors may minimize detectable traces depending on the exact security features of the VR Systems EViD USB activator.
It is possible to detect copying in many scenarios through standard digital forensics, but absolute detection is not guaranteed without advanced hardware-level protections or usage logging on the key itself.
I saw a post elsewhere that said the guy had a felony conviction and shouldn’t have been able to volunteer.
For “training purposes”
In IL, under old technology, a precinct captain went into the polling booths and cast a few votes on each machine ... just to be sure they were working. Those votes were counted in the precinct count at the end of the day.
Under new technology, is it possible to turn training ballots cast into real ballots cast? Or to rig the machine so that real ballots cast are recorded as “training” ballots or practice ballots just to be sure the machine was working?
I’m suggesting that he may have had a plan when he stole the items and had plenty of time to carry it out before he was arrested. Flipping this seat was a surprise.
So he stole the evidence it would seem.
Nope
What is Panicci’s voter registration? Whom has he made donations to in the last decade? Obvious questions some outlets don’t want to ask.
He likely didn’t do this just for giggles..I wonder who he’s working for!?!
I worked at my company’s corporate headquarters. We had hired some contractor to install some security devices (don’t know exactly what tho) in our offices. The dipshit ended up stealing the microwave oven out of the lunch room........LOL!
Jeffrey Epstein’s computers disappeared in Palm Beach 20 years ago too.
Democrat, of course.
<> John Panicci <>
Now there’s a good ‘ol southern boy.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.