J Michael Waller Profile picture
Sep 17, 2024 14 tweets 6 min read Read on X
🧵In 2005, the bipartisan Commission on Election Reform, co-chaired by Jimmy Carter and James A. Baker III, expressed concerns about electronic voting systems.

Since then, the Carter Center & Baker Institute scrubbed their websites of the report. 👉
web.archive.org/web/2005092212…
2) Carter-Baker report, pp. 25-27: Voting machines lack transparency.

“Voting machines must … be transparent. They must allow for recounts and for audits, and thereby giver voters confidence in the accuracy of the vote tallies.”

“The accessibility and accuracy of DREs [direct recording electronic machines], however, are offset by a lack of transparency, which has raised concerns about security and verifiability. In most of the DREs used in 2004, voters could not check that their ballot was recorded correctly. Some DREs had no capacity for an independent recount.”Image
3) Carter-Baker report, p. 27 says there are no standards of transparency for voting machines (and, by implication, software):

"The standards for voting systems ... should assure ... transparency in all voting machines. Because these standards usually guide the decisions of voting machine manufacturers, the manufacturers should be encouraged to build machines in the future that are both accessible and transparent ….”Image
4) Recommendations: “Congress should pass a law requiring that all voting machines be equipped with a voter-verifiable paper audit trail …. This is especially important for direct recording electronic (DRE) machines for four reasons ...." Image
5) The 2005 Carter-Baker Commission on Federal Election Reform called for "regular audits" of "all voting machines."

Page 28: "If DREs can be manipulated to alter the vote tallies, the same can be done with paper audit trails. Such manipulation can be detected and deterred by regular audits of voting machines. Regular audits should be done of all voting machines, including DREs and optical scan systems."Image
6) Carter-Baker cited the vulnerability of electronic voting system software, especially from "insiders" (p. 28).

"The greater threat to most systems comes not from external hackers, but from insiders who have direct access to the machines. Software can be modified maliciously before being installed into individual voting machines. There is no reason to trust insiders in the election industry any more than in other industries, such as gambling, where sophisticated insider fraud has occurred despite extraordinary measures to prevent it."Image
7) Candidates and ordinary citizens should be allowed to audit "the inside process of programming" electronic voting systems, Carter-Baker said:

"In addition to the output of DREs, which can be verified through a paper audit trail, the inside process of programming DREs should be open to scrutiny by candidates, their supporters, independent experts, and other interested citizens, so that problems can be detected, deterred, or corrected, and so that the public will have confidence in the machines."Image
8) Carter-Baker: Electronic voting companies should provide their source code to the National Institute of Standards and Technology, and make "the source code available for inspection on a restricted basis to qualified individuals." Image
9) Carter-Baker, p. 29: "Independent inspection of source codes would strengthen the security of voting systems software by encouraging manufacturers to improve voting system security. Expert reviews may also detect software design flaws or vulnerabilities." Image
10) Carter-Baker commission also discusses software problems:

"In addition to the source codes, the software and the voting machines themselves are potentially vulnerable to manipulation.... . When voting machines are tested for certification, a digital fingerprint, also known as a 'hash,' of their software is often sent to NIST. Following the delivery of new voting machines, a local jurisdiction can compare the software on these machines to the digital fingerprint at NIST. This comparison either will identify changes made to the software before delivery or, if the software is unaltered, will confirm that the software on the individual machines meets the certified standards." (p. 29)

[My comment: The comparison can be made after delivery/voting, too.]Image
11) Carter-Baker anticipated "deliberate manipulation of vote results" in electronic systems & said that manufacturers "unwilling to submit their source codes for...supervised testing and for review by independent experts should be prohibited from selling their voting machines." Image
12) Carter-Baker: "Fraud in any degree and in any circumstance is subversive to the electoral process. The best way to maintain ballot integrity is to investigate all credible allegations of election fraud and otherwise prevent fraud before it can affect an election."
BONUS: In 2005, the bipartisan Commission on Electoral Reform, co-chaired by Jimmy Carter and James A. Baker, found that foreigners had already (illegally) registered to vote in American elections. web.archive.org/web/2005092212…
Image
ANOTHER BONUS: The 2005 Carter-Baker Commission on Federal Election Reform called for Voter ID, audits of voter databases, and more. No wonder they purged the Web of this when circumstances changed. Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with J Michael Waller

J Michael Waller Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @JMichaelWaller

Oct 10
🧵 It can be a joy to read J. Edgar Hoover's speeches, articles, and books.

Here's a selection from "The Twin Enemies of Freedom," a 1956 speech the FBI Director made about Crime and Communism.

Excerpts below. Image
J. Edgar Hoover:

"Communism, like crime, advances and takes hold because men ignore God."

"The real danger in Communism lies in the fact that it is atheistic and seeks to replace the Supreme Being."

"Either the Faith of our fathers will triumph or communism will engulf us."
leb.fbi.gov/file-repositor…Image
Fighting crime and defending against Communism start at home, with both parents, Hoover said.

"A child above all needs the firm moral backing of a conscientious mother and father and the love, understanding, and security that a good Christian home affords." Image
Read 7 tweets
Oct 9
🧵 "Angelo Codevilla was one of the finest strategic minds America has ever produced, and his lessons are more urgent than ever," writes @ToryAnarchist in the @nypost.

A new @ClaremontInst book recalls his "scrappy rise from penniless immigrant to MAGA guru." Image
@ToryAnarchist @nypost @ClaremontInst Character matters.

Angelo Codevilla was forged in a smithy for a purpose.

We can spend the rest of our lives learning from him and emulating him to get our country back. amazon.com/Fighting-Enemi…Image
Thomas Codevilla recounts how his dad grew up ready to fight the destroyers:

"You learn English from John Wayne movies and perfect your accent by repeating Winston cigarette ads. You deliver newspapers to mobsters; you learn to knife fight to protect yourself in school ..."
nypost.com/2025/10/06/opi…Image
Read 5 tweets
Oct 9
Terrorist groups and movements have their own family trees.

It isn't hard to track them.

Private experts are usually far ahead of national intelligence services.

To tear out these networks by the roots, follow the Red Thread.

h/t @realDianaWest. See comment below. Image
@realDianaWest We've dusted off an unpublished paper I wrote in 2002, marking the first anniversary of 9/11. The paper was a 25-year retrospective on Stefan Possony's "International Terrorism - The Communist Connection," published in 1977.
centerforsecuritypolicy.org/wp-content/upl…Image
@realDianaWest The point of publishing it now is to show, historically, that private analysts can be years ahead of the intelligence community in documenting the linkage of terrorist networks and movements.

It's going to take a lot of private expertise to face the terror threats of today.
Read 6 tweets
Oct 5
🧵 Core principles of Marxism include what Marx called imposition of "terror" and "dictatorship."

Anybody who even flirts with Marxist ideology implicitly accepts these notions, or will accept them as the price of staying in office. Image
Marx: "When our turn comes, we shall not make excuses for the terror."

(Neue Rheinische Zeitung, May 19, 1849)

marxists.org/archive/marx/w…Image
For decades, Marx wrote about imposing a "dictatorship" to achieve his goals. He called it a "dictatorship of the proletariat."

For Marxists to achieve this in the US, it would require the violent overthrow of the Constitution.
marxists.org/archive/marx/w…
Read 5 tweets
Oct 2
🧵 The Trump administration really knows what it's doing to smash violent anarchist and Marxist radicals and to go after their intellectual and financial sponsors.

National Security Presidential Memorandum 7 shows a comprehensive, legally based vision and action plan. whitehouse.gov/presidential-a…Image
"This political violence is not a series of isolated incidents and does not emerge organically. Instead, it is a culmination of sophisticated, organized campaigns of targeted intimidation, radicalization, threats, and violence designed to silence opposing speech, limit political activity, change or direct policy outcomes, and prevent the functioning of a democratic society."
"A new law enforcement strategy that investigates all participants in these criminal and terroristic conspiracies — including the organized structures, networks, entities, organizations, funding sources, and predicate actions behind them — is required."
Read 18 tweets
Sep 29
🧵 The most solid brief yet on the extremist networks in Utah. Law enforcement in other states can learn from this report. So can federal authorities. By my colleague @morganwirthlin at @securefreedom.

Armed Queers of Salt Lake City is a focal point. centerforsecuritypolicy.org/wp-content/upl…Image
Direct action: "In accordance with the concept of “diversity of tactics,” individuals are expected to participate in activities that they are comfortable with and align with their values and priorities, while at the same time refusing to judge, criticize, or even notify authorities about the criminal or violent activities of others."
In horizontal networks, "All participants can act and react instantly without waiting for orders – yet with a clear idea of what to expect from one another,” according to CrimethInc, an anarchist and antifascist site."

The "antifascists" view everything they don't like as fascist.
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(