TL;DR: Here’s my talk as a DRM-free .mp4 and my corrected English subtitles in .srt or .vtt format.Watch below, and the corrected subtitles are already inside the embed, but you’ll probably need to click the three vertical dots at the video’s bottom right and select “Captions” to turn them on (Chrome) or click the [cc] box at the video’s bottom right to toggle them on (Firefox). The subtitles greatly remediate editing errors and also gaps in my speech where I omitted transitions or didn’t make certain logical connections fully explicit. You’ll want to watch with them on. Don’t forget the recommended resource list.Enjoy!
Note: You might also be interested in my Foreign Policy article from two months ago about G, the global commons for public data collaboration. Gift hyperlink; alternate hyperlink.
On Oct. 9, the Hackers on Planet Earth (HOPE) staff made every talk from this summer’s HOPE XV conference in New York City available via their website. Buy them all on a thumbdrive or download individually. I bought just mine and embedded the DRM-free .MP4, meant for sharing, above. It’s also on my youtube. HOPE staff said then that sometime soon, they’ll put this year’s presentations on theirs.
I gave the talk on Friday, July 12 starting at 7 p.m. on the main Marillac Auditorium stage. Sure, there were technical difficulties and I used too many filler words—it was my first time presenting to adults without scripting it all before, and due to life/journactivism exigiencies, I’d prepared the outline just hours prior, meaning no rehearsals or revisions, especially as I was busy writing the 14-page recommended resource list (PDF) that accompanies my presentation, as mentioned in my talk.
But if your goal is to learn from a Survey and Scrutiny of Election Security, the video will meet that need, especially if you employ the corrected subtitles.
The $.99 downloadable from HOPE came with subtitles—English, German, Spanish, French—and the transcript .txt they’re based on. I edited the numerous errors, some at the hands of 2600 (I replaced these), others my own mistakes while speaking [fixed in brackets]. Here’s the corrected transcript and the corrected English subtitles (.srt; .vtt). If anyone wants to translate my corrected version to any language, email me and I’ll add your subtitles to this post for others to peruse.
Much of my talk is simply trying to steer you toward the recommended resource list—your homework, so to speak. That document definitely puts election security and activism knowledge in your hands so you can do something awesome with it—which would make a great story to leave in the comments. In my presentation, I also mention uploading the flowchart to my site; I’ll do that at some future date when I have time and can improve it. For my June post and one-minute video promoting this talk, go here.
Embedded below, the full Biden video I showed on stage during my talk (all 41 seconds). HOPE’s after-the-fact editing removed the audience gasp and shortened Biden’s three kisses to two. Following the full Biden video, a few final notes for my presentation overall, in quick bullet points.
Here are the two RAMRANTS tweet-thread URLs, mentioned in my talk, leading to many more examples of Biden being creepy, mostly C-SPAN footage:
In the Q&A, someone asked about the accuracy of recent U.S. elections. I gave two answers: we need more data, and second, that though former pollster Jonathan Simon’s exit poll forensics show many voting jurisdictions presenting legitimate results, there have also been enough jurisdictions with significant enough disparities between totals and exit polls to raise serious alarm.
A third answer would have been to give a bird’s eye view of the strength and frequency of official audits. These are voting jurisdiction staff doing sort of the same thing Simon is, but drawing on very different data sets, usually spot-checking handmarked paper ballots and comparing those samples with the vote totals, ideally according to Stark risk-limiting audit protocols. If you can see what’s going into a black box and what’s coming out of a black box, and it makes sense against a neutral standard (i.e., spot-checked handmarked paper ballots), then you don’t have to fear, say, the proprietary black box software so much—though people debate that too, particularly if audits aren’t conducted, as they should be, for every single contest regardless of margins of victory.
Here’s what the Senate Intelligence Committee wrote in 2018 in the first volume of their underexamined report on Kremlin election interference in the 2016 U.S. elections: “Statistically sound audits may be the simplest and most direct way to ensure confidence in the integrity of the vote. States should begin to implement audits of election results. Logic and accuracy tests of machines are a common step, but do not speak to the integrity of the actual vote counting. Risk-limiting audits, or some similarly rigorous alternative, are the future of ensuring that votes cast are votes counted. [Unnamed] State 8, State 12, State 21, State 9, State 2, State 16, and others already audit their results, and others are exploring additional pilot programs. However, as of August 2018, five states conducted no post-election audit and 14 states do not do a complete post-election audit. The Committee recognizes states’ concern about the potential cost of such audits and the necessary changes to state laws and procedures; however,the Committee believes the benefit of having a provably accurate vote is worth the cost.”
Verified Voting has a map/visualizer, as of 2022, for post-election audit law and practices. It appears that two years ago—i.e., four years after Senate Intelligence Committee passage above—we had five states carrying out risk-limiting audits, though not always binding or fully comprehensive ones. And we had eight states with no post-election audit law. The remaining states (and setting aside the territories) were somewhere in between: audits, but not the risk-limiting gold standard kind; or audits that were optional, partial, nonbinding, or otherwise deficient …
It’s a hodgepodge mess. The results are likely trustworthy, except where they aren’t; you just can’t trust ’em, except where you really can because of overlapping accountability layers of high-quality audits, statistical forensics, scrutineers, and more. And all of this is in motion every single day. It does seem to be slowly getting better…so the swing state majority who come to consensus for a particular presidential candidate can impose on the rest of the country, and more can feel confident that the destined-to-be-unfair hierarch will enter into the White House above them fairly.
In the video, I mention MAGA’s Stop the Steal lawsuits tanking except for one minor case in Pennsylvania. A great resource on all that is the July 2022 reportLost, Not Stolen: The Conservative Case that Trump Lost and Biden Won the 2020 Presidential Election.
One great thing about Scrutineers.org that I neglected to mention in the talk is that they’re specifically working to bring together—to bridge the gap between—on the one hand, the grassroots, boots-on-the-ground movement activists, often black activists, fighting decades-old voter suppression tactics—which stymie vote capture—with, on the other hand, the academic, cerebral, often white guys who are digging into the proprietary voting computer vulnerabilities, which interfere with the vote tallying side. These two disparate realms really need to come together, as they increasingly have in Coffee County, Georgia, for example.
I mention in the talk that Trump almost certainly owes China substantial money. Here’s my 2021 blog post on that (CTRL+F “China” to jump to the relevant section). Some other information on the topic worth checking out: Jan 2024 report on Chinese-owned or -backed entities spending millions of dollars at Trump’s properties while he was in office, likely a violation of the Constitution’s Foreign Emoluments Clause; in 2016 he described himself as the “king of debt,” saying, “I’ve made a fortune by using debt, and if things don’t work out I renegotiate the debt. I mean, that’s a smart thing, not a stupid thing” and explained, “You go back and you say, ‘Hey guess what, the economy crashed, I’m going to give you back half'”; In 2023 Trump said of Xi Jinping, who abolished his own term limits in 2018, “He runs 1.4 billion people with an iron fist. Smart, brilliant, everything perfect.”
Just two notes to self for future talks. First, I’m going to practice not using filler words when I leave voicemails on Signal or whatnot. Second, as in fiction, my examples should have been on theme. My example of a dominance hierarchy struggle, for instance, should have been political candidates vying to win the same office (on theme) instead of two boxers fighting (not on theme).
Finally, links to my election security journalism, all from 2023: Texas Observer article on whistleblower Reality Winner; investigative article on Coffee County Georgia and accompanying AM/FM nationally syndicated radio appearance on the BradCast; another investigative article related to Georgia not patching voting software despite the Coffee County elections office breach; Daily Dotinvestigative article about the missing laptop in Coffee County, GA with accompanying blog post. Those are all in the recommended resource list (PDF).
Today I emailed a PDF letter to the Coffee County Commissioners, the Board of Elections and Registration, the election supervisor, the county administrator, the County and/or elections board’s legal representation—Jennifer Herzog and Tony Rowell for Hall Booth Smith; Ben Perkins and Wes Rahn for Oliver Maner—and the only newsman in the otherwise news desert county, editor of Douglas Now Robert Preston. I separately sent the letter to multiple Coffee County residents who have a history of boldly speaking out during public meetings.
The four-page letter does what this blog post’s headline says. On Dec. 19 of last year, the Daily Dot published my latest investigative article, of some 4000 words. It concerns a federal lawsuit over procuring the county’s records related to the infamous elections office breach, most memorably the missing silver laptop used at work for years by then-election supervisor and now Trump co-defendant Misty Hampton. Also on Dec. 19, I self-published a blog post with additional important information cut from the article due to length considerations. My letter takes three revelations from the article, and some information from the blog post—mostly, truths I uncovered about the county not coughing up records—and compressed them down to bullet points for the county leaders’ convenience.
Of the many goals here, one of them is for Coffee County to produce all records from the breach, its run-up, and its aftermath (another interesting goal is Hudson’s proposal; see the article and blog post for more on that one). The unprecedented elections office intrusions in Coffee County were part of an unprecedented campaign planned by top Trumpers, even Trump himself, to arrange for technicians/operatives to make, and take off with, exact copies of the voting software still used across the battleground state of Georgia and myriad jurisdictions beyond. Amplifying this information, sending it to editors, or even advancing it in some useful way (via phone calls, emails, records requests, digging in trash bins outside Dominion Voting Systems offices, et cetera) might, I don’t know, affect some sort of huge upcoming election thing and (more important than that outcome) the narratives we are made to tell ourselves about it. Yeah, seems like there’s something happening later this year on the 5th of November, what could it be again? Remember remember…
Without further ado, the PDF letter as a fancy embed (or download):
Note: All four surveillance images in this post, previously unpublished, are published here for the first time.
Today the Daily Dot published my new investigative article, entitled EXCLUSIVE: A missing laptop could be key to prosecuting Trump. This rural Georgia county only recently admitted that it exists. Prior to publication, I worked on it for about half a year.
Some material was cut to make the article shorter and more focused on the missing silver laptop.
However, of the cut passages, I can post below as paragraphs in a bullet-point list the ones that are, in my view, urgent and important. Think of them as DVD extras showing you deleted scenes from the theatrical release.
To be serious, I believe it might help residents of Coffee County—in the swing state of Georgia—as well as interested people elsewhere to have access to this information immediately. Without further ado:
Here’s a summary of the breach by the federal judge presiding over Curling v. Raffensperger, Amy Totenberg in the Northern District of Georgia.
For her account of the intrusions, Totenberg drew on cybersecurity experts’ declarations—including their review of computer forensics and the surveillance footage—in a Nov. 10, 2023 ruling: the breach included “various individuals and entities (1) providing and gaining unauthorized access to Coffee County voting equipment, data, and software over the course of multiple dates; (2) copying, downloading, and imaging the County’s equipment, data, and software; (3) uploading and sharing that data and software on the internet via a file-sharing website; and (4) further distributing physical copies of forensic voting material downloaded from Coffee County.” (Online distribution was via private access, not public internet.)
Some, notably Coffee breach-funding lawyer and onetime Trump lieutenant Sidney Powell, who has pleaded guilty, have tried to justify the intrusions by claiming the elections board approved the electronic collection of the computers’ contents. They offer insufficient documentation to support this claim; further, no board quorum has ever been found to have authorized copying the elections data nor does the security video show any quorum in the elections office during the breach. In a deposition, then-Board of Elections chair Wendell Stone denied that the board gave permission to examine their systems. The civil disobedience or altruism arguments sometimes made are undercut by the plundered proprietary voting software, almost three years later, having never reached the public, nor rival political campaigns, only the breachers’ allies, as far as can be determined.
If the subpoenas lawsuit is successful, it might spell out why the county’s public statements, which have focused on Hampton, have been so careful not to mention by name then-elections board member Eric Chaney, who was caught on film participating in the breach. “I didn’t do anything without the direction of Eric Chaney,” Hampton said in deposition. The plaintiffs in the subpoenas case go further, saying Chaney, who has not been charged, “warned Ms. Hampton of her impending termination the evening before” and characterizing him as a “key participant[] in planning and executing the breach.”
A letter that counsel for the plaintiffs in the subpoenas case sent to county attorneys in April and filed this month argues that crucial Eric Chaney-related records were improperly withheld by county manager Wesley Vickers and senior county lawyer Tony Rowell, a pair multiple interviewees described to me as the area’s de facto diarchy.
Examples of how the lawyers seem to have more power than the people they represent:
Listening to their lawyer Ben Perkins discuss legal issues at their Nov. 14 meeting, every elections board member said they were not informed of the desktop seizure before it happened, which he told them their then-underling, former election supervisor Rachel Roberts, had been involved in. Ernestine Thomas-Clark, who has long sat on the board, asked the lawyer to clarify how they could in theory terminate him when they hadn’t hired him. Fireable like any board vendor, Perkins was retained by county manager Vickers this June—an appointment some members have described as appearing out of nowhere one day, without their input or vote, something Perkins acknowledged in the meeting. Except for the two initial Oct. 24 motions, he has provided lawsuit filings to board members only when asked, according to board members who told me such requests were rare.
Surveillance footage—procured by Coalition for Good Governance despite months of Coffee claiming it had been irrevocablylost— shows senior county lawyer Tony Rowell in December 2020 meetings with people who would go on to participate in the breach. The plaintiffs’ analysis of the video shows that prior to the intrusions, Rowell spent hours and hours in the elections office with, among others, Misty Hampton, Eric Chaney, Ed Voyles, and Cathy Latham. Voyles, who has not been charged in the Georgia-Trump RICO case, chaired the elections board two years prior to the meetings. Latham, like Hampton a Trump co-defendant who has pleaded not guilty, chaired the Coffee Republican party at the time of the intrusions. Also a Trump fake elector (imposter in the Electoral College process), Latham was in a position to have possibly connected Coffee County with MAGA D.C. shortly before the breach.
The Coffee County Commissioners, almost never mentioned in discussions on the breach and the most powerful county executives under law, have the ability to fire their vendor Hall Booth Smith—including Tony Rowell—and county manager Vickers, though not Oliver Maner (the elections board’s vendor for legal services). I repeatedly contacted all five commissioners with questions on the subpoenas lawsuit and a CCTV still of the silver laptop, asking if they’re satisfied with the performance of the county’s de facto diarchy. County commissioner Jimmy Kitchens told me “I have no comment”; county commissioner Oscar Paulk deferred to legal counsel Tony Rowell. The other three commissioners never responded.
In Judge Totenberg’s same Nov. 10, 2023 ruling, she concisely addressed the underexamined cybersecurity plight of state voting systems and the possible ripple effects of the breach: “The importance of the security, reliability, and functionality of state election systems, classified by the U.S. Homeland Security Department as critical national infrastructure, cannot be overstated in a world where cybersecurity challenges have exponentially increased in the last decade. The dynamics of how a breach in one part of a cyber system may potentially carry cybersecurity reverberations for the entire system for years to come exemplifies the important concerns raised in this case.”
The Curling v. Raffensperger plaintiffs seek to force the swing state of Georgia to (on the vote capture side) abandon mandatory electronic ballots and in most circumstances use hand-marked paper ones, that will (on the vote tallying side) still be scanned by computers but always audited.
The GBI report (critique; critique) omits reference to the silver Hewlett Packard altogether and instead, any laptops it mentions are either nondescript or an old black Toshiba. Their report acknowledges that the Toshiba had last been used in 2015—the Obama era, and thus not relevant to the breach, the run-up to it, or the aftermath, except as a red herring that the county many times brought up in place of the silver laptop.
Also per the GBI report, in August 2022, surrounded by three of his lawyers—including Rowell of the de facto diarchy—recently resigned elections board chair Wendell Stone refused to participate when the Bureau tried to interview him in person. Then, making his public statement in June 2023, Stone promised “transparent” elections to the locals in front of him—but did not share that eight days earlier, the GBI had seized their elections office desktop.
Local lawyer Jim Hudson’s proposal for independent and possibly pro bono counsel and the idea of asking the Department of Justice for help are not necessarily mutually exclusive. Hudson’s idea, while nebulous to some ears, at best would allow those most affected by the intrusions—Coffee voters—to participate in a bottom-up inquiry into all aspects of the breach and its aftermath, aided by the independent counsel and able to notify the Justice Department of any criminality discovered. The Department of Justice, by contrast, boasts multistate range and federal muscle, but without a strong defense of the local public interest in place, they would risk being seen, fairly or not, as just another set of politicized outsiders, at worst sparking more resentment than repair.
A November poll in the New York Times shows Trump ahead of President Joe Biden in five of six battleground states, including Georgia. Legally, nothing prevents an incarcerated individual from running for president, nor indeed, from serving as president. However, the Supreme Court might affirm state or local officials disqualifying Trump due to his inciting of the Jan.6 auto-coup attempt. If not, my guess is, Mar-a-Lago house arrest would be set up for such a presidency.
My final two paragraphs from an earlier iteration of the article:
With bold leadership missing like a silver laptop, jitters about the GBI or other law enforcement behind every Eastern red cedar—paranoid or justified—proliferate; simultaneously, the known extent of the Trumpers’ multistate breach plot grows, reminding voters from coast to coast that their jurisdiction could have been hit. “Scared to death” Matthew McCullough, fulminating against the Georgia Bureau of Investigation, must not be the only Coffee County official afraid “to go to jail.”
Aside from the immense force of the breach records lawsuit and its costs, it seems the only way the county’s status quo will change is if the region’s residents, perhaps in conjunction with the DOJ, perhaps aided by Hudson’s vision for independent counsel, reshape the area’s stepped landscape of power themselves. The Trump era cannot be locked up by any prosecutor, nor can it be compartmentalized away with the click of a television remote—the healing of truth and reconciliation would be more realistic. Cyber–vulnerable Election 2024 is less than a year away. Self-governance requires effort.
This blog post, Extra material for my Daily Dot investigative article about Coffee County, Georgia missing laptop likely relevant to Curling and Trump cases, by Douglas Lucas, is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (summary). The license is based on the work at this URL: https://douglaslucas.com/blog/2023/12/19/extra-material-dailydot-investigative-article-laptop/. You can find the full license (the legalese) here. To learn more about Creative Commons, I suggest this article and the Creative Commons Frequently Asked Questions. Please feel free to discuss this post (or the underlying article) in the comments section below, but if you’re seeking permissions beyond the scope of the license, or want to correspond with me about this post (or the article) one on one, email me: dal@riseup.net. And gimme all your money!
I'm a Seattle-based freelance writer/journalist originally from Texas. I'm also a substitute teacher in public education. I write about anything and everything, but usually philosophy tied to current events, liberatory mental health, science fiction and fantasy, investigative journalism, technology, justice, and more.
Email: DAL@RISEUP.NET (ask for pgp key or check keyservers if you want encryption)
Snailmail (United States Postal Service only): Douglas Lucas / PO Box 75656 / Seattle WA 98175 / United States
Snailmail (Private carriers such as UPS, Fedex, DHL, Amazon): Douglas Lucas / 11036 8th Ave NE #75656 / Seattle WA 98125 / United States
Note the single-character change in ZIP codes, between the address for USPS (98175) and the address for private carriers (98125), is not a typo.
Join the conversation