News

Get The Latest

News

Get The Latest

Support Joe's Work

Subscribe

Help support Joe's work

Choose an amount

UNITED SOVEREIGN AMERICANS: Executive Order on Local Preparedness Highlights Election Vulnerabilities

Executive Order on Local Preparedness Highlights Election Vulnerabilities

Guest post by Harry Haury and Marly Hornik from United Sovereign Americans

The White House has ordered a review of how to share responsibility for securing critical infrastructure with the states. This wise move harnesses local ability over a national, one-size-fits-all monolithic approach that often leads to fraud, waste and abuse of taxpayer funds.

ADVERTISEMENT

Possibly the worst example of derelict critical infrastructure management is our voting systems. In fact, staggering failures of compliance at federal and state levels have resulted in a national emergency, as reported by credentialed cyber auditors and experts from the non-partisan election validity organization United Sovereign Americans (USA). Using official state records of the 2020, 2022 and 2024 elections, USA conducted novel research proving the invalidity of voters, votes, counts and audit records.

What is the federal government’s role in securing elections? Recent articles claim that cutting funds at the Cybersecurity Infrastructure Security Agency (CISA), within the US Department of Homeland Security, will result in election security vulnerabilities. These articles mislead the American people into believing that CISA serves the people’s interests by routinely waiving security requirements on critical infrastructure and forming public-private censorship campaigns directed at conservatives and funded by CISA. All of this in direct violation of the first amendment rights of Americans concerned about election integrity.

The reality is quite different. The first step to assuring our deviously complex voting systems are impenetrable is to define and lock down control of the operational security (OpSec) boundary. Compliance of equipment, personnel and process within can now be guaranteed, but in our current delusion, security rules are routinely violated systemwide. Officials have abandoned 15 CFR VII and 31 CFR VIII as optional, leaving supply chains for election infrastructure wide open to hostile penetration and capture.

When voting equipment is sourced abroad, CISA must prove that imported elements do not grant America’s enemies a backdoor into subverting our culture or stealing trillions of dollars through their Manchurian candidates. All proposed system components go to the Committee on Foreign Investment in the United States (CFIUS), chaired by the Secretary of the US Department of Commerce, for security review. Checking “internet connectivity” is a naive over-simplification of the many threat controls needed to deliver legitimate representation. The entire process, from purchasing equipment, reviewing software code, hiring and training voter registrars and pollworkers to certification and storage of records, should have been analyzed by CISA and CFIUS through the Federal Information Systems Modernization Act’s (FISMA) Risk Management Framework (RMF).

ADVERTISEMENT

If Information Assurance (IA) experts at CISA did their duty, that would have happened. Every step in election process must be scrutinized for risks, vulnerabilities and compliance, as it will be used. This includes IA officers accountable to federal law at every polling site, and wherever the votes are received, counted, monitored, and stored. CISA’s mission is to secure the OpSec boundary like a national border against digital or other invasion, and continually monitor the perimeter for dynamic, evolving threats.

Did CISA perform a comprehensive RMF analysis before authorizing systems for use in federal elections? No. Did states comply with required protocols for critical infrastructure? No. Because of apathetic or disloyal officials, USA identified 8.5 million votes ascribed to voters who do not exist, or do not track to any voter at all, counted in the 2022 midterms in California, Illinois, New York, Michigan, Pennsylvania, Georgia and Ohio. Official state records of California’s 2024 election show 35% of votes came from materially deficient voter registrations. This disaster was just used to install 52 House members and Senator Schiff.

An investigation into the critical infrastructure security posture of California, Illinois, New York and other pivotal states’ voting systems cannot wait. The federal government guarantees the citizens of each state a republican form of government, and protection from invasion. Penetration into elections must be investigated, prosecuted where warranted, and fixed. In distributing tasks between the federal government and states, we must ask if we really have the resources, human, material and economic, to successfully control digital voting systems?

Harry Haury is the Chairman of United Sovereign Americans, a Cyber Security SME, and a former senior information assurance architect for the federal government.

Marly Hornik is the CEO of United Sovereign Americans and founder of New York Citizens Audit.

 

ADVERTISEMENT

8 thoughts on “UNITED SOVEREIGN AMERICANS: Executive Order on Local Preparedness Highlights Election Vulnerabilities”

  1. Get rid of the machines and large tally centers that have circumvented the people’s election with central control and black boxes. The states are taking elections away from locals and threatening them if they count their own votes, even to verify machine counts.

    Go back to the Article 4 Section 4 (A4S4) Republican form of government that aligns with survey lines and small precincts.

    Make easily hand-countable ballots that are put back in local hands for counting at the polls.

    Call in tallies to SOS, or enter them through a secure SOS website that makes tallies transparent to all. Clerks should post certifiable tallies online and local polls can verify the math throughout the election.

    Limit campaign finance donations and make it illegal to receive donations from outside a jurisdiction related to a particular office. No influence from outside the jurisdiction for the office on the ballot.

    Make the BOC real again, not just a rubber stamp for machine tallies and to block audits and recounts with rules that put machines over humans.

    One day elections used to be a community event. Now it’s a black box event controlled by the state and special interest contractors, and machine companies.

    Give it back to the people.

  2. Who decided to install machines anyway?

    What can anyone say to justify the machine boondoggle created for what reason … centralization of control and counting?

    Can the machine be it’s own witness even though it’s not a human?

  3. Get rid of the machines and large tally centers that have circumvented the people’s election with central control and black boxes. The states are taking elections away from locals and threatening them if they count their own votes, even to verify machine counts.

    Go back to the Article 4 Section 4 (A4S4) Republican form of government that aligns with survey lines and small precincts.

    Make easily hand-countable ballots that are put back in local hands for counting at the polls.

    Call in tallies to SOS, or enter them through a secure SOS website that makes tallies transparent to all. Clerks should post certifiable tallies online and local polls can verify the math throughout the election.

    Limit campaign finance donations and make it illegal to receive donations from outside a jurisdiction related to a particular office. No influence from outside the jurisdiction for the office on the ballot.

    Make the BOC real again, not just a rubber stamp for machine tallies and to block audits and recounts with rules that put machines over humans.

    One day elections used to be a community event. Now it’s a black box event controlled by the state and special interest contractors, and machine companies.

    Give it back to the people.

  4. Who decided to install machines anyway?

    What can anyone say to justify the machine boondoggle created for what reason … centralization of control and counting?

    Can the machine be it’s own witness even though it’s not a human?

  5. The “Great Firewall” to protect our elections is to reinstate local control of counting and certifying real elections with real hand counting, and real human eyes on scribbled dots on paper.

    This kind of election is impossible to rig at state and federal levels because every 3000-5000 people in a precinct know the people personally that run the elections, count the votes and certify the counts, and do the reporting. It provides unique, simple arena of citizen participation without influence from outside the jurisdiction.

    Counties make up blocks of precincts. The counties add together the certified precinct counts. The County Board of Canvassers confirms the math and the security of the hand-counted votes, and the county submits the totals to the Secretary of State’s office and the State Board of Canvassers, who add together all the “called-in/submitted” vote totals into an aggregate state tally.

    Security comes in the form of inability to influence all the precincts at one time. Large counting centers took this firewall away, and so did the mail-in ballot scheme. Neither of these corrupt practices can operate without the magical machine that does fuzzy math that is never forensically audited.

    Add in the bulk-registration practices done by evasive special interest groups. These registration harvesters rely on bogus voter roles and historically non-voting profiles on the state record. These are exploited by the mail-in ballot ruse that sends ballots to places they should not go The ballots are somehow still harvested and tallied at the central counting centers that have made null-and-void the precincts that contribute to the flood of untraceable ballots.

    The system we have is contrived, foolish, expensive and corrupt.
    The simple system that follows Constitutional principles is affordable, simple, justifiable, verifiable, and requires personal involvement of the people who elect representatives.

  6. Media influence on elections is unprecedented. Libel, slander and money have way too much influence on campaigns for which the media outlet has no jurisdictional connection.

    The FCC has done nothing about equal time violations. And when an outlet is partisan, their negative bias hit pieces used as equal time fulfillment is a bastardization of the law. It’s not ethical, moral or just to slander an unfavored candidate and lie about unrealized accomplishments of the favored candidate.

    The media circumvents campaign finance laws at will. There is no accountability for who donates to the media, or writes hit-pieces. The media are not owned by the people. Add the corporate money that influences elections, probably illegally. Corporations are not citizen voters. The Citizen voter should be the only donor to campaigns, and the donation is matter of public record physically viewable in the precinct, not broadcast by big tech.

    Big problems need big solutions. We can enforce the first amendment legitimately, but the money people would hate the solution.

  7. The “Great Firewall” to protect our elections is to reinstate local control of counting and certifying real elections with real hand counting, and real human eyes on scribbled dots on paper.

    This kind of election is impossible to rig at state and federal levels because every 3000-5000 people in a precinct know the people personally that run the elections, count the votes and certify the counts, and do the reporting. It provides unique, simple arena of citizen participation without influence from outside the jurisdiction.

    Counties make up blocks of precincts. The counties add together the certified precinct counts. The County Board of Canvassers confirms the math and the security of the hand-counted votes, and the county submits the totals to the Secretary of State’s office and the State Board of Canvassers, who add together all the “called-in/submitted” vote totals into an aggregate state tally.

    Security comes in the form of inability to influence all the precincts at one time. Large counting centers took this firewall away, and so did the mail-in ballot scheme. Neither of these corrupt practices can operate without the magical machine that does fuzzy math that is never forensically audited.

    Add in the bulk-registration practices done by evasive special interest groups. These registration harvesters rely on bogus voter roles and historically non-voting profiles on the state record. These are exploited by the mail-in ballot ruse that sends ballots to places they should not go The ballots are somehow still harvested and tallied at the central counting centers that have made null-and-void the precincts that contribute to the flood of untraceable ballots.

    The system we have is contrived, foolish, expensive and corrupt.
    The simple system that follows Constitutional principles is affordable, simple, justifiable, verifiable, and requires personal involvement of the people who elect representatives.

  8. Media influence on elections is unprecedented. Libel, slander and money have way too much influence on campaigns for which the media outlet has no jurisdictional connection.

    The FCC has done nothing about equal time violations. And when an outlet is partisan, their negative bias hit pieces used as equal time fulfillment is a bastardization of the law. It’s not ethical, moral or just to slander an unfavored candidate and lie about unrealized accomplishments of the favored candidate.

    The media circumvents campaign finance laws at will. There is no accountability for who donates to the media, or writes hit-pieces. The media are not owned by the people. Add the corporate money that influences elections, probably illegally. Corporations are not citizen voters. The Citizen voter should be the only donor to campaigns, and the donation is matter of public record physically viewable in the precinct, not broadcast by big tech.

    Big problems need big solutions. We can enforce the first amendment legitimately, but the money people would hate the solution.

Comments are closed.