How a Federal District Court Judge Weaponized Secret Algorithms to Stop Election Fraud Hidden in State Voter Rolls

Lastamender

Diamond Member
Joined
Dec 28, 2011
Messages
65,087
Reaction score
59,277
Points
3,600
We know how this is done and how to stop it. Thanks to this judge it will be much harder to commit this kind of fraud in AZ. Dems are pissed.

On September 27, 2024, Federal District Court Judge Michael T. Liburdi rendered a decision in American Encore v. Adrian Fontes that weaponized algorithms surreptitiously embedded in various state boards of elections official voter registration database, turning them into a tool to block elections that bear the modus operandi of mail-in ballot election fraud from being certified.




In his decision, Judge Liburdi referenced a provision in the Elections Procedures Manual (EPM) that Arizona Secretary of State Adrian Fontes, a Democrat, had issued. That provision required the Secretary of State to certify an election by excluding the votes of any county that refused to certify an election. Justice Liburdi quoted the EPM language that became known in Arizona as the “Canvass Provision.” The quoted EPM language, including the parenthetical remark included in the original EPM document, reads as follows:


If the official canvass of any county has not been received by this deadline, the Secretary of State may proceed with the state canvass without including the votes of the missing county (i.e., the Secretary of State is not permitted to use an unofficial vote count in lieu of the county’s official canvass).

Judge Liburdi characterized the rule as “probably unprecedented in the history of the United States” because it “gives the Secretary of State nearly carte blanche authority to disenfranchise the ballots of potentially millions of Americans.”

Therefore, he ruled that the Canvass Provision was unconstitutional under the Fourteenth Amendment:



Judge Liburdi’s ruling is a bulwark against secret algorithms in the state voter databases that create a pool of hidden “non-existent voters.” Beyond just creating “non-existent voters,” the cryptographic algorithms assign legitimate state voter IDs to the “non-existent voters.” This last step enables the criminal perpetrators to vote these “non-existent voters” as apparently “legal” mail-in votes in what could be sufficient quantities to steal otherwise losing elections.


Sponsored


7_74_19.gif




13








sharethis sharing button

















 
Last edited:
LOL....I'm gonna need a bigger brain to figure this one out. ;)
To put it in simpler terms.... Anytime votes transition from analog to digital they are open season for every type of fraud, manufactured statistical anomaly and manipulation you can possibly imagine. ( In this realm an algorithm can be created to do almost anything you want it to do) Unless and until both accounted by hand and matched one by one with voter registrations continue to have this issue.
 
To put it in simpler terms.... Anytime votes transition from analog to digital they are open season for every type of fraud, manufactured statistical anomaly and manipulation you can possibly imagine. ( In this realm an algorithm can be created to do almost anything you want it to do) Unless and until both accounted by hand and matched one by one with voter registrations continue to have this issue.
OK, thanks, I'll defer the more knowledgeable. :)
 
Seems to me this same technology could be used to commit election fraud...and maybe already has been. If that's true then this is effectively a "Cold Civil War".... because the Tit for Tat could go on forever with most people being clueless as to what's really going on and who really belongs in office at any given time. It's getting pretty scary.
 
Seems to me this same technology could be used to commit election fraud...and maybe already has been. If that's true then this is effectively a "Cold Civil War".... because the Tit for Tat could go on forever with most people being clueless as to what's really going on and who really belongs in office at any given time. It's getting pretty scary.
When it was first introduced I think there were a little more careful but now they realize they can cover their own tracks unless a forensic computer scientist looks at it to see what they're actually doing they're going to try it every year. And of course if you bring in the forensic scientist they'll sue you.
 
Back
Top Bottom