Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Palm Beach elections office volunteer arrested for theft of computer equipment(FL)
WPTV ^ | 3/29/26 | Craig Stephenitch

Posted on 03/29/2026 9:18:43 AM PDT by CFW

A volunteer who participated in a training session at the Palm Beach County Supervisor of Elections Office was arrested for stealing sensitive computer equipment, authorities announced Sunday.

John Panicci was taken into custody March 28 at his home following an investigation into the theft of an encrypted access key from a voter registration terminal at the elections office.

The incident occurred during a volunteer training session on March 19 for the March 24 election. According to detectives, Panicci stole the encrypted access key during the training at the elections office located at 4301 Cherry Road.

While the stolen key was configured only for training databases, officials expressed concern that someone with technical knowledge could potentially reverse engineer the encryption and reintroduce it into a voter registration kiosk for malicious purposes.

The theft was reported to authorities on March 27, prompting an investigation by Palm Beach County detectives. After identifying Panicci as the suspect and establishing probable cause, investigators obtained both an arrest warrant and a residential search warrant.

During the search of Panicci's home, detectives recovered the stolen items along with a substantial amount of electronic and digital storage devices. Panicci was transported to the Palm Beach County Jail and booked on charges.

(Excerpt) Read more at wptv.com ...


TOPICS: Crime/Corruption; Politics/Elections; US: Florida
KEYWORDS: antifa; ballotfraud; elections; encryptedaccesskey; florida; fraud; johnpanicci; palmbeach

Click here: to donate by Credit Card

Or here: to donate by PayPal

Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794

Thank you very much and God bless you.

This is the district that flipped from red to blue last week in a special election. A Democrat won by 800 votes

This is the district that includes Mar-a-Lago.

Notice the article says a stolen "access key", but further down it refers to stolen "items" (plural) recovered.

1 posted on 03/29/2026 9:18:43 AM PDT by CFW
[ Post Reply | Private Reply | View Replies]

To: CFW

Note that all of this was reported and recovered AFTER the election.


2 posted on 03/29/2026 9:23:15 AM PDT by pgyanke (Republicans get in trouble when not living up to their principles. Democrats... when they do.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CFW

“Dirty Deeds, done dirt cheap!”


3 posted on 03/29/2026 9:27:17 AM PDT by lee martell
[ Post Reply | Private Reply | To 1 | View Replies]

To: pgyanke
Note that all of this was reported and recovered AFTER the election.
Are you suggesting there was a conspiracy to look the other way until after the voting results?
4 posted on 03/29/2026 9:29:10 AM PDT by citizen (A transgender male competing against women may be male, but he's no man.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: CFW

Time for a revote?


5 posted on 03/29/2026 9:41:23 AM PDT by ChessExpert (Infidels of the world unite against the evil that is Islam.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CFW

Grok, is it technically possible to reverse engineer the encryption as officials expressed?

Yes, it is technically possible. A person with sufficient technical knowledge and tools could potentially reverse engineer the encryption algorithm or key mechanism from the stolen encrypted access key, even though it was configured only for training databases.

Background on the Stolen Item

The item stolen was an “encrypted access key” (a USB thumb drive activator) from a voter registration terminal at the Palm Beach County Supervisor of Elections Office. Palm Beach County uses the VR Systems EViD electronic pollbook system, which relies on a two-part setup: the EViD software and a physical USB security key/dongle. The key and software work together, with encryption protecting access and data.

Why Reverse Engineering is Feasible

Officials' Concern

Palm Beach County officials and the Sheriff’s Office specifically highlighted the risk that someone could adapt the stolen key for use on a live voter registration kiosk by reverse engineering the encryption and reintroducing it into a production system. This concern is technically grounded given how these USB security keys function.

Important note: In this specific case, the key was recovered quickly along with the suspect’s devices, greatly limiting any real-world exploitation. However, the technical possibility exists as described.

Answer based on public reporting and known characteristics of the VR Systems EViD system.

We cannot be entirely certain that John Panicci did not allow other nefarious actors to copy the key before it was recovered. The theft occurred on March 19, 2026, during a volunteer training session, and the suspect was arrested on March 28, 2026—giving him approximately nine days in which he had possession of the encrypted access key.

During that period, he could have physically connected the USB activator to his own computer(s), imaged it, extracted data, or allowed others to do the same. Authorities executed a search warrant at his home on March 28 and recovered the original stolen key along with a substantial amount of electronic and digital storage devices. However, no public reports confirm whether forensic analysis has ruled out prior duplication or data exfiltration.

Detecting copying of such a device is possible in many cases but not guaranteed, especially if done carefully. USB security keys like the VR Systems EViD thumb drive activator often rely on encryption and a two-part system (software + key), but standard USB devices leave traces that skilled forensics can examine:

Forensic examiners from law enforcement can analyze the seized devices for these indicators. If the original key uses advanced protections (e.g., one-time programmable elements, challenge-response protocols that log usage, or hardware-unique identifiers), unauthorized copying might be detectable or even prevented. However, if the key’s security depends primarily on software-level encryption or obscurity, a technically knowledgeable person could create a working copy without leaving obvious traces on the original device itself.

In this case, because the key was recovered relatively quickly and the incident involved a training (non-production) configuration, the immediate risk appears contained. Officials have not released details on any ongoing forensic results regarding duplication. Full certainty would require comprehensive digital forensics on all seized devices, which may still be in progress.

We cannot be certain that John Panicci did not let other nefarious actors copy the key. The time window between theft and recovery allowed for potential duplication, and while forensic analysis of seized electronics can often detect access or copying through logs, timestamps, and device history, sophisticated actors may minimize detectable traces depending on the exact security features of the VR Systems EViD USB activator.

It is possible to detect copying in many scenarios through standard digital forensics, but absolute detection is not guaranteed without advanced hardware-level protections or usage logging on the key itself.

6 posted on 03/29/2026 9:44:57 AM PDT by ProtectOurFreedom
[ Post Reply | Private Reply | To 1 | View Replies]

To: pgyanke

I saw a post elsewhere that said the guy had a felony conviction and shouldn’t have been able to volunteer.


7 posted on 03/29/2026 9:45:10 AM PDT by CFW
[ Post Reply | Private Reply | To 2 | View Replies]

To: CFW

For “training purposes”

In IL, under old technology, a precinct captain went into the polling booths and cast a few votes on each machine ... just to be sure they were working. Those votes were counted in the precinct count at the end of the day.

Under new technology, is it possible to turn training ballots cast into real ballots cast? Or to rig the machine so that real ballots cast are recorded as “training” ballots or practice ballots just to be sure the machine was working?


8 posted on 03/29/2026 9:59:09 AM PDT by spintreebob
[ Post Reply | Private Reply | To 1 | View Replies]

To: citizen
Are you suggesting there was a conspiracy to look the other way until after the voting results?

I’m suggesting that he may have had a plan when he stole the items and had plenty of time to carry it out before he was arrested. Flipping this seat was a surprise.

9 posted on 03/29/2026 10:01:36 AM PDT by pgyanke (Republicans get in trouble when not living up to their principles. Democrats... when they do.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: CFW

10 posted on 03/29/2026 10:03:40 AM PDT by Menehune56 ("Let them hate so long as they fear" (Oderint Dum Metuant), Lucius Accius (170 BC - 86 BC)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CFW

So he stole the evidence it would seem.


11 posted on 03/29/2026 10:06:36 AM PDT by gibsonguy
[ Post Reply | Private Reply | To 1 | View Replies]

To: gibsonguy

Nope


12 posted on 03/29/2026 10:07:53 AM PDT by TexasGator (/.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: CFW

What is Panicci’s voter registration? Whom has he made donations to in the last decade? Obvious questions some outlets don’t want to ask.


13 posted on 03/29/2026 10:08:06 AM PDT by coloradan (They're not the mainstream media, they're the gaslight media. It's what they do. )
[ Post Reply | Private Reply | To 1 | View Replies]

To: CFW

He likely didn’t do this just for giggles..I wonder who he’s working for!?!


14 posted on 03/29/2026 10:40:15 AM PDT by howlinhound (Tagline in the shop for repairs.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CFW

I worked at my company’s corporate headquarters. We had hired some contractor to install some security devices (don’t know exactly what tho) in our offices. The dipshit ended up stealing the microwave oven out of the lunch room........LOL!


15 posted on 03/29/2026 10:44:04 AM PDT by Hot Tabasco (AOC for President, 2028. And don't forget to detoxify your liver.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CFW

Jeffrey Epstein’s computers disappeared in Palm Beach 20 years ago too.


16 posted on 03/29/2026 11:58:24 AM PDT by Nextrush (FREEDOM IS EVERYBODY'S BUSINESS, REMEMBER REV; NIEMOLLER)
[ Post Reply | Private Reply | To 1 | View Replies]

To: coloradan
"What is Panicci’s voter registration?"

Democrat, of course.

Panicci's Voter Records

17 posted on 03/29/2026 12:27:23 PM PDT by 10mm
[ Post Reply | Private Reply | To 13 | View Replies]

To: CFW

<> John Panicci <>

Now there’s a good ‘ol southern boy.


18 posted on 03/29/2026 1:00:15 PM PDT by Jacquerie (ArticleVBlog.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: howlinhound
Image
19 posted on 03/29/2026 3:34:14 PM PDT by CFW
[ Post Reply | Private Reply | To 14 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson