{"id":252,"date":"2012-07-10T13:20:07","date_gmt":"2012-07-10T18:20:07","guid":{"rendered":"http:\/\/independentconservativevoters.com\/icv\/?p=252"},"modified":"2012-07-10T13:22:30","modified_gmt":"2012-07-10T18:22:30","slug":"why-you-cant-vote-them-out","status":"publish","type":"post","link":"https:\/\/independentconservativevoters.com\/icv\/2012\/07\/why-you-cant-vote-them-out.html","title":{"rendered":"Why You Can&#8217;t Vote Them Out"},"content":{"rendered":"<p align=\"center\"><span style=\"font-size: large;\">Pt. 1: First, You Get A Vote<\/span><\/p>\n<p align=\"center\"><span style=\"font-size: large;\">A <span style=\"text-decoration: underline;\">Real<\/span> Vote<\/span><\/p>\n<p align=\"justify\"><span style=\"font-size: large;\">You&#8217;ve heard it before. They just nonchalantly say: &#8220;Well, why don&#8217;t you just vote them out?&#8221; But they don&#8217;t understand, as you are about to, that the reason you can&#8217;t vote them &#8220;out&#8221;, is because you probably have never actually voted them &#8220;in.&#8221; <\/span><\/p>\n<p align=\"justify\"><span style=\"font-size: large;\">The following trilogy of articles presents new evidence that the apparatus to steal the U.S. citizen vote not only exists, but has been with us since at least the 1880&#8217;s. Part 1 deals with its key element, the introduction of <em>vote secrecy<\/em> in the mid 1800s. Vote secrecy still remains in place and operative today, over 130 years later.<\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Wanna&#8217; Know A Secret?<\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The Vote Hasn&#8217;t Always Been &#8220;Secret&#8221;!<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Prior to the secret vote and for the better part of the first 100 years, voting in the U.S. was conducted <em>viva voce<\/em>, or by &#8220;voice vote&#8221;. The rolls were called, voters stepped forward and anyone within hearing distance could, in parallel with the registrar, <em>witness<\/em> and notate an individuals vote. The results were rightfully considered irrefutable, beyond dispute.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Then, before the Civil War, some states began to experiment with various kinds of &#8220;ballots&#8221;, that brought with them confidentiality at the expense of witness based verification. Later during the 1880s, the confidential vote formally morphed into the &#8220;secret ballot&#8221;, a ballot of <em>enhanced<\/em> secrecy which is sometimes called the &#8220;Australian ballot&#8221; where it first appeared.<br \/>\n<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The secret ballot is still with us today. I claim and will provide compelling evidence, that it was the subtle though lethal effect of confidentiality (secrecy), that has been the primary enabling characteristic of vote fraud over the last 130 years.<\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Vote Secrecy Doesn&#8217;t Eliminate Vote Fraud<small><small><small><small><small><small><br \/>\n<\/small><\/small><\/small><\/small><\/small><\/small><\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">It Enables It<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\"><em>Vote secrecy<\/em> has been so pervasively sold to the public, that the average person can&#8217;t even consider how inane it really is. Vote secrecy is very much like the shell game in which the \u201csucker\u201d can&#8217;t see the pea, because it is covered by an opaque shell. If the shells were made of clear glass so that the pea could be seen, the game would be impossible and the sucker couldn&#8217;t be fooled. Vote fraud through vote secrecy operates in the same manner. <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">At the core of this Orwellian head trick, is that the one term, &#8220;vote secrecy&#8221;, confusedly identifies two issues: <em>voter<\/em> secrecy and <em>vote<\/em> secrecy. This causes the confused voter to demand &#8220;the sanctity of the secret <em>vote<\/em>&#8220;, while all that&#8217;s actually required is, &#8220;the sanctity of the secret <em>voter<\/em>&#8220;<\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Voter Secrecy, Yes \u2013 Vote Secrecy, No<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Of course the voters identity should be kept secret, but why their vote? As an example, I am going to show you the actual votes for President in the 2004 election of ten of my neighbors. They have warned me that they will all sue me if I violate their &#8220;right&#8221; to vote secrecy, but I&#8217;m foolish and am going to do it anyway.<br \/>\n<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Their votes are: Bush, Kerry, Bush, Kerry, Kerry, Bush, Bush, Kerry, Kerry, Bush. Now, which one belongs to neighbor 1, neighbor 2&#8230;&#8230;. neighbor 9, neighbor 10, Do you get it? The votes can&#8217;t be linked to the voter because the voters <em>name<\/em> is secret, not their vote.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Consider that you and everyone else openly broadcasts sensitive personal information to everyone within visual distance. Information that is directly linked to your SSN, your address, your phone number and virtually every piece of private information about you.<br \/>\n<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Yet no one complains or even cares about it. I&#8217;m talking about the license plate on your automobile. An identifier that can be traced to you personally, but no one cares because it is an <span style=\"text-decoration: underline;\">anonymous<\/span> identifier that can only be accessed by authorities.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Why should you care if someone else sees your vote, if they can&#8217;t tell it&#8217;s you that cast it. The importance of this is that the ability to see your vote &#8220;as cast&#8221;, enables <em>you<\/em> to verify that the vote you cast is the vote that got counted, something that would halt vote fraud in its tracks.<br \/>\n<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The process is sometimes called E2E for end-to-end verification and is virtually identical to bankings time honored receipt\/statement audit system. It is also at the heart of the proposed &#8220;solution&#8221; to our problems in Pt. 3.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">This article has been drawn from a new eBook by M. J. Sperry entitled: Desiderata of the Citizen Vote &#8211; See: www.howtorescueamerica.bravehost.com &#8211; Email: voterverifiedaudit@gmail.com<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\"><span style=\"font-family: Tahoma,sans-serif;\">\u00a9<\/span>M. J. Sperry 12\/20\/07 &#8211; All rights to this work are released to the public domain, but only if reprinted in its entirety, including disclaimer.<\/span><\/span><\/p>\n<p align=\"center\">&#8230;<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: x-large;\"><span style=\"font-size: xx-large;\">Why You Can&#8217;t Vote Them Out<\/span> <\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: medium;\">By: mac Sperry<\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-size: large;\">Pt. 2: To Catch A Thief &#8211; Use A Spreadsheet!<\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The Mentality of a Thief<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Consider the thinking of a person who rigs an election. Their foremost thought would obviously be, the accomplishment of their task with as little chance of detection as possible. The initial number of votes they would have to swing to the other side would ideally be, as few as absolutely necessary. Too many and the other side might be alerted. Thus, it is reasonable to assume that the hallmark of vote fraud would be, the <em>close election<\/em>.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">In preparation for the eBook: Desiderata of the Citizen Vote, the author obtained the popular vote figures for all Presidential elections from the most recent back to 1824. The source was the archives of the U.S. governments official newspaper, The Federal Register found at: http:\/\/www.archives.gov\/ federal-register\/electoral-college\/scores.html. Using the spreadsheet program Excel, he then determined the difference in spread between the two front runners in each election and calculated the average. That average is 11.01%.<br \/>\n<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">In the entire history of Presidential elections, only six times have the popular vote margins of the two front runners come to within 1%. They were the 1880, 1884, 1888, 1960, 1968 and 2000 elections.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">We know the 2000 election was the subject of tampering because we saw it on TV. The 1960 election was also because FBI director J. Edgar Hoover had wiretap evidence proving it. That evidence was later forwarded to the new Attorney General Robert Kennedy, with whom it languished and died. <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The 1968 election was also a probable victim of vote fraud, as asserted by investigative journalists\/brothers James and Kenneth Collier (now deceased), in their widely banned book: Votescam: The Stealing of America. They claimed that during the time after the Kennedy assassination, a shadow government was controlling media, elections and even exit polls. The numbers would seem to support that claim.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">As to the 1880s, observe in the chart below the 1880, 1884 and 1888 elections. They were all within 1%. Specifically, the 1880 election was within .02%, the 1884 election .26% and the 1888 election .83%. Note: The 1880 margin is so small that it may be difficult to observe on the chart.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.howtorescueamerica.org\/chart.gif\" alt=\"Presidential Elections 1824-2004\" \/><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The odds that an election would be within these narrow margins are: <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">1880 election 11.01% divided by .02%, or 550.5 to 1 <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">1884 election 11.01% divided by .26%, or 42.3 to 1<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">1888 election 11.01% divided by .83%, or 13.3 to 1<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The odds that these three narrow elections could have occurred sequentially are: 550.5 X 42.3 X 13.3 = <span style=\"font-size: large;\"><em>309706<\/em><\/span> to 1. That&#8217;s almost <em>a third of a million<\/em> to 1, that these three elections of narrow margin could have occurred in a row. To lend context to that figure, consider that the &#8220;casual association&#8221; (odds) between cigarette smoking and lung cancer is only 4.2 to 1. <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The odds these narrow elections could have sequentially occurred, coupled with their occurrence <em>shortly after<\/em> the introduction of the confidential vote and <em>during<\/em> the introduction of the secret ballot, would have to lead any person of reason to the obvious conclusion; it was at this point orchestrated, grand scale election fraud began in the United States and that vote secrecy played the major role in its occurrence.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Think something like that couldn&#8217;t have happened? That things are being stretched here just to make a point? Think again, because it did happen, just 4 years earlier in the election of 1876, but this time it was the<span style=\"text-decoration: underline;\"> documented<\/span> theft of the <em>electoral<\/em> vote.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\"><br \/>\n<\/span><\/span><\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.howtorescueamerica.org\/sickles.gif\" alt=\"General Sickles after Gettysburg\" align=\"top\" \/><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Meet &#8220;Devil Dan&#8221; Sickles<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">History would record his being a one-legged Union General of little note and &#8220;disreputable&#8221;, former U.S. Ambassador. He lost his leg at Gettysburg and found himself in Washington D.C. the night of the 1876 election. On returning late from the theater, he decided to drop in on the vote counting and noticed that though the Democrat Samuel Tilden was far ahead of Republican Rutherford B. Hayes in the popular vote, there were still three states that had not reported in; South Carolina, Louisiana and Florida.<br \/>\n<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">All three states were solidly Tilden in popular vote, but all three (southern) states were also controlled by governors who were all solidly <em>Republican<\/em>. By itself a curious circumstance, given the fact that the south had just been beaten into subjugation by the north and that the Republican party was considered the north&#8217;s political flagship. In any case, together the three possessed the three electoral votes needed for a Hayes win.<\/span><\/span><small><small><small><small><\/small><\/small><br \/>\n<\/small><\/small><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Smelling ill-gotten victory, Sickles attempted to confer with the Chairman of the Republican National Committee, one Zachariah Chandler, who had retired in defeat to his hotel room around 6PM. There he proceeded to assuage his loss in collaboration with a bottle of whiskey, to the extent that Sickles best efforts could not rouse him from his drunken stupor. <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Sickles then made his way to the telegraph office where on his own volition (and in Chandlers name), sent the following telegram to the three state governors: &#8220;With your state sure for Hayes, he is elected. Hold your state&#8221; &#8211; &#8216;Hold your state&#8217; was politico-speak of the time for &#8220;cheat&#8221;, &#8220;cook the numbers&#8221;, numbers that could not have been cooked had they been in the open and not <em>secret<\/em>. <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Within a few hours South Carolina wired back that it had gone for Hayes and additionally requested with implied urgency, that Washington should send &#8220;more troops&#8221;. By the next day, with a little help from friends in high places, both Louisiana and Florida were in the Hayes column giving him one more electoral vote than Tilden. What I&#8217;ve just related is historically documented, had quite an aftermath and was the subject of Congressional investigation. See: Steal This Vote by: Andrew Gumbel &#8211; ISBN 1-56025-676-1.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The point here is that the mechanism of grand scale vote fraud was actually used just prior to the three sequentially &#8220;impossible&#8221; elections of 1880-1888. Certainly subsequent vote fraud of the 1880s and beyond, was modeled on the 1876 machinations of General &#8220;Devil Dan&#8221; Sickles. Fraud that could have only occurred within the context of vote secrecy.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The people of the time certainly knew, as voter turnouts began to drop precipitously immediately after the 1892 election, the first election where all states voted under the secret ballot. Turnout immediately dropped from over 90% since the late 1820s to 50% by 1920. It has remained low ever since. Yes, the people knew, but with the coerced silence of media and<\/span><\/span><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\"> later generations<\/span><\/span><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">, vote fraud was eventually relegated to myth and the talk of &#8220;wackos&#8221;.<\/span><\/span><\/p>\n<p><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">With the election of 1876, we now have four elections in a row that we can demonstrate were victims of fraud, all enabled by <em>vote secrecy. <\/em>In the 131 years since the election of 1876, nothing has changed in regard to vote secrecy. It is still with us just as much today as it was then. And now, the election law called HAVA for Help America Vote Act, actually requires a \u201csecret vote\u201d. The very thing that enables vote fraud, is now a codified legal requirement.<\/span><\/span><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\"><em><br \/>\n<\/em><\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">&#8220;Secrecy is the beginning of tyranny&#8221;<br \/>\nRobert A. Heinlein<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\"><em>Without the vote we become slaves<br \/>\nnot metaphorically, but actually.<\/em><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">This article has been drawn from a new eBook by M. J. Sperry entitled: Desiderata of the Citizen Vote.<br \/>\nSee: www.howtorescueamerica.bravehost.com<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Email: voterverifiedaudit@gmail.com<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\"><span style=\"font-family: Tahoma,sans-serif;\">\u00a9<\/span>M. J. Sperry 12\/20\/07 &#8211; All rights to this work are released to the public domain, but only if reprinted in its entirety, including disclaimer.<\/span><\/span><\/p>\n<p align=\"center\">&#8230;<\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: x-large;\"><span style=\"font-size: xx-large;\">Why You Can&#8217;t Vote Them Out<\/span> <\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: medium;\">By: mac Sperry<\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-size: large;\">Pt. 3: Vva &#8211; Voter verified audit<\/span><\/p>\n<p align=\"center\"><span style=\"font-size: large;\"> A New Tactic:<br \/>\n<\/span><span style=\"font-size: large;\">Alternate Verification<\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">A case was made in Part 1, that the introduction of the confidential\/secret vote in the middle of the 19th century, brought with it the ability to conduct invisible, virtually undetectable vote fraud. It appears reasonable that vote fraud is not only still possible, but certainly occurs and with regularity.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Solving the problem might best begin by identifying the characteristics of an ideal solution: It would be powerful, peaceful, doable by ordinary citizens without permission or license of government and it would be inexpensive in terms of time and money. Such a solution has recently surfaced. It is an audit system called Vva.<\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The Voter verified audit<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Vva would be conducted by ordinary citizens who would gather together in ad hoc fashion for the single purpose of <em>irrefutably<\/em> verifying the integrity of the vote. It would not require permission or license of government, since it is an <em>independent check<\/em> of that government. As such it would be independent of the Registrar of Voters. Checking the veracity of the vote should not be the exclusive domain of government. Government checking its own vote count , a count that decides whether that very government retains or relinquiches power, constitutes a clear conflict of interest.<\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Who Can Best Be Trusted?<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Vva&#8217;s titanic power stems from its affirmative response to the one big question no vote security system in use today can satisfactorily answer: &#8220;Who can best be trusted to <em>incorruptibly<\/em> verify the vote?&#8221; Vva&#8217;s resounding answer is; &#8220;the voters themselves&#8221;. <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-size: large;\"><span style=\"font-family: Times New Roman,serif;\">In this particular case, it must be assumed that if a voter wanted to somehow alter (tamper with) their own vote, they would <em>choose<\/em> their &#8220;alteration&#8221; in the voting booth rather than later. If in the process of tampering they make a &#8220;different&#8221; choice for whatever reason, they aren&#8217;t <em>tampering<\/em>, they&#8217;re <em>voting<\/em>. That is, in the voting booth all a voter can do is either <em>vote<\/em> or <em>not vote, <\/em>both of which are acceptable, no matter who they vote for. This makes the voter them self a virtually incorruptible verifier of their own vote.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Consider who verifies your own personal checking account. The bank president? A friend? Your bookkeeper? No, you do. Why? Because there is no one with a greater interest in the correct management of your affairs than yourself. It is the same with your vote. It is quite simply in your singular best interest, to ensure that the vote you cast is the vote that actually gets counted.<\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">An Overview<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Vva is conducted using a multi-copy business type form, copies of which are later separated and used for verification. In the voting booth, as the vote is made, it is copied from the previously filled out form to the registrars ballot and is effectively <em>witnessed <\/em>by the voter them self. The form, which is retained by the voter, thus becomes a documented <em>receipt<\/em> of the transaction.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">After voting, the form is dropped off with the group conducting the Vva. Later, the voter verifies their uniquely numbered <em>copy<\/em> (called the &#8220;receipt&#8221;), by comparing it to a copy of the original (called the \u201cstatement\u201d) which is placed on the Internet by the Vva group. If anything changes, the voter will see it when comparing their receipt to the statement on verification. <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">This \u201cend-to-end\u201d verification makes Vva <em>almost <\/em>irrefutable and is what gives Vva its teeth. As long as a voter votes and checks their vote (provision is made to ensure they do), there is little chance of error and virtually no chance of fraud. Note: <em>By nature Vva is ambivalent in that it cannot be manipulated &#8220;for&#8221; or &#8220;against&#8221; any candidate or measure.<\/em><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Vva is also entirely anonymous. In order to conduct a Vva it isn&#8217;t necessary to know the voters name, only that they did indeed vote. Anonymity is thus &#8220;built in&#8221; to Vva.<\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">A Vva &#8211; The Authenticated Vva<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Notice the words \u201c<em>almost<\/em> irrefutable\u201d a couple of paragraphs back. The Vva described in the last few paragraphs is only \u201cverified\u201d by <em>one<\/em> person, the voter. It is the most basic form of Vva and while simple, it is quite formidable when compared to the systems fielded election day by virtually all U.S. Registrars.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">If a Vva were to ever get to court, expect a full court press on the part of opposition attorneys. They will almost certainly attack even the slightest anomaly. If they have nothing else, expect them to blow the least little molehill up to the size of mountains. <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">One such thing that may be challenged is the voter them self. Did the voter possibly lie? Were they mistaken? Did they forget? Did they change their mind? Could they have altered their own vote to purposely skew and discredit the Vva&#8217;s results? These and other questions could be used to sway a judge, a judge that may require very little in the way of &#8216;sway&#8217;. <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The ideal would be <em>another person<\/em> in the voting booth with the voter. A person who could verify, witness and <em>authenticate<\/em> the selections of the voter. In California a voter may bring another person into the booth to <em>assist<\/em> them. I assume this is allowed in other states as well and if it isn\u2019t, then it should be. After all, it\u2019s your vote. If those who steal it are possibly seeing it, then why shouldn\u2019t a verifier of <em>known good character <\/em>be allowed in, <em>with your permission<\/em>, to prevent that theft. The authenticator would thus <em>authenticate<\/em> and <em>corroborate <\/em>(with the voter) each individual vote, eliminating <em>any question<\/em> as to the veracity of each, individual <em>verified<\/em> vote. <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">This type of Vva is the A Vva, or Authenticated Voter verified audit. It is important to understand its vital components and their significance. First, the A Vva is considered to be irrefutable, because it covers all contingencies with human authenticated verification. In an A Vva the <em>authenticator<\/em> would also later check through the Internet all votes they verified the previous day. This way <em>end-to-end<\/em> verification of each vote is provided by <em>two<\/em> human witnesses, the <em>voter<\/em> and the <em>authenticator<\/em>, who were actually present at the precise <em>moment<\/em> and <em>place<\/em> the vote was cast. <\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Note: If an A Vva cannot be used for any reason, the ordinary Vva is still available and quite powerful.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Second, Vva&#8217;s data source isn&#8217;t taken from the vote. Just the opposite. The data source of the <em>vote<\/em> is taken from Vva. You see, Vva&#8217;s source is the &#8220;original&#8221; form upon which the voter imprints their choices. What the registrar gets is only <em>copied<\/em> from that original. Therefore, Vva&#8217;s data source is created previous to the time and place the vote is actually made. Any one tampering with the vote on the <em>registrars side<\/em> is only acting &#8220;after the fact&#8221; so far as time and place is concerned, making it inherently impossible to <em>alter<\/em> Vva&#8217;s data, before that data is sampled and run through another <em>separate<\/em> and <em>entirely<\/em> <em>independent<\/em> system.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\"><em>These two features are something no vote count of any Registrar of Voters in the United States can presently provide, thus throwing their vote count into serious question should a discrepancy arise. Currently the Registrars final vote tally is accepted without question because, though clearly problematic, it is more robust than any other alternative (primarily because &#8211; there is no other alternative). <strong>Vva will change that.<\/strong> In a court of law, Vva must be considered the more robust system and thus trump any discrepancy.<\/em><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">This article has been drawn from a new eBook by M. J. Sperry entitled: Desiderata of the Citizen Vote<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">See: <a href=\"http:\/\/www.howtorescueamerica.bravehost.com\" target=\"_blank\">www.howtorescueamerica.bravehost.com <\/a><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">The book details Vva and presents Jefferson, the protocol for conducting Vva, as well as other innovative solutions to world and national problems.<\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\">Email: <a href=\"mailto:voterverifiedaudit@gmail.com \" target=\"_blank\">voterverifiedaudit@gmail.com <\/a><\/span><\/span><\/p>\n<p align=\"justify\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: large;\"><span style=\"font-family: Tahoma,sans-serif;\">\u00a9<\/span>M. J. Sperry 12\/20\/07 &#8211; All rights to this work are released to the public domain, but only if reprinted in its entirety, including disclaimer.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>Take from <a href=\"http:\/\/howtorescueamerica.org\/trilogy.html\" target=\"_blank\">Rescue America website<\/a><\/p>\n<div style=\"float: right; margin-left: 10px;\"><a href=\"https:\/\/twitter.com\/share\" class=\"twitter-share-button\" data-count=\"vertical\" data-url=\"https:\/\/independentconservativevoters.com\/icv\/2012\/07\/why-you-cant-vote-them-out.html\">Tweet<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Pt. 1: First, You Get A Vote A Real Vote You&#8217;ve heard it before. They just nonchalantly say: &#8220;Well, why don&#8217;t you just vote them out?&#8221; But they don&#8217;t understand, as you are about to, that the reason you can&#8217;t vote them &#8220;out&#8221;, is because you probably have never actually voted them &#8220;in.&#8221; The following [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[4,3],"tags":[],"class_list":["post-252","post","type-post","status-publish","format-standard","hentry","category-articles","category-featured"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2oOxx-44","_links":{"self":[{"href":"https:\/\/independentconservativevoters.com\/icv\/wp-json\/wp\/v2\/posts\/252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/independentconservativevoters.com\/icv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/independentconservativevoters.com\/icv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/independentconservativevoters.com\/icv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/independentconservativevoters.com\/icv\/wp-json\/wp\/v2\/comments?post=252"}],"version-history":[{"count":3,"href":"https:\/\/independentconservativevoters.com\/icv\/wp-json\/wp\/v2\/posts\/252\/revisions"}],"predecessor-version":[{"id":254,"href":"https:\/\/independentconservativevoters.com\/icv\/wp-json\/wp\/v2\/posts\/252\/revisions\/254"}],"wp:attachment":[{"href":"https:\/\/independentconservativevoters.com\/icv\/wp-json\/wp\/v2\/media?parent=252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/independentconservativevoters.com\/icv\/wp-json\/wp\/v2\/categories?post=252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/independentconservativevoters.com\/icv\/wp-json\/wp\/v2\/tags?post=252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}