Deep Rig

Joe Oltmann (@joeoltmann) maps out the security vulnerabilities of our voting system in “The Deep Rig”.

Nefarious actors have the ability to bypass the integrity of the voting system by manipulating the signature inspection process, discarding envelopes of absentee ballots, adding fake ballots or phantom ballots during tabulation, and finally, through the adjudication process.

During adjudication, a new ballot image is created replacing the original ballot image.

Watch & Share:

By Radiopatriot

Retired Talk Radio Host, Retired TV reporter/anchor, Retired Aerospace Public Relations Mgr, Retired Newspaper Columnist, Political Activist * Telegram/Radiopatriot * Telegram/Andrea Shea King Gettr/radiopatriot * TRUTHsocial/Radiopatriot

Leave a Reply

%d bloggers like this: