Joe Oltmann (@joeoltmann) maps out the security vulnerabilities of our voting system in “The Deep Rig”.
Nefarious actors have the ability to bypass the integrity of the voting system by manipulating the signature inspection process, discarding envelopes of absentee ballots, adding fake ballots or phantom ballots during tabulation, and finally, through the adjudication process.
During adjudication, a new ballot image is created replacing the original ballot image.
Watch & Share: