Pages

1/20/24

Socialism in China

 Youtube poster Citizen Peng (Huang,) Australian college teacher or professor had all of his video content removed by Youtube some time before the CV19 pandemic. His videos showed his progress in building his own retirement greenhouse including hydroponically grown veggies and fish ponds, where some veggies fed the fish and the fish droppings fed the plants. His videos showed us how he designed his ingenious greenhouse and meticulously constructed it to provide not only self sufficiency of veggies and fish for home consumption plus marketable produce to exchange for taxes and other cash for necessities not home produced, but also his maximum conservation of water and other resources while balancing first cost with replacement costs. His greenhouse was up and running and operating as expected when Youtube deplatformed him.

Youtube probably did that because one of Citizen Peng's posts had to do with his life in mainland China. He was tapped to become a CCP member out of college. Insight that he provided in this one post was about how China's socialism works:

CCP

You are chosen by CCP to become member of CCP. You don't ask nor fill out a form to become a CCP member, you are selected, or not. In China, there are about 90 million CCP members and over 1.3 billion non-members. Approximately half Chinese population are either members of CCP or kin to members of CCP. Being CCP brings perks to member and their kin. CCP exists in pyramid of power strata, with most at base stratum of lower power and few at elite strata, as regional oligarchs who are responsible for their territory's extra funding to those CCP above them. 

Below bottom strata are non-CCP members of Chinese society. Non-member society have their strata as well, but power differences between their strata is always less than power difference between being CCP member or non member. Non-member strata based on kinship to CCP members, and political usefulness to CCP. Those with neither are tolerated as tax cattle unless and until they do anything to hurt CCP hegemony or cause CCP member to lose face. Then they are dealt with according to what will bring most benefit to CCP in their disposal.

CCP's first priority is to maintain itself in power. Distinct membership groups or alliances within CCP have competing interests for appropriation of China's resources determined from top down. Interpersonal relationships within CCP membership based upon strata of members, groups members associated with and perceived political mobility up or down. 

Example

CCP member "X" is in school administration for large city and responsible for selecting food supplier for school district's free lunch program. He oversees production of bidding documents for quality and quantity of foods agreed to be supplied by contractor. Chinese city schools are big, like ~ 1,700 students. All students required to eat in cafeteria same lunch cooked by school's kitchen staff. Parents not allowed to make lunches at home for their children to bring with them to school. 

Taxes from residents living within school district pays costs for lunches. Where you are allowed to live is also controlled by local government. If you live within one school boundary you have to get government permission to move into another school boundary. When not private schooled, most city elites' children go to same school and every other parent in school district would prefer that their children also go to that school. So local government controls who is allowed to move into that school's boundary area.

Large numbers of children in non-elite elementary school got sick from food poisoning. Angry parents were interviewed by local media. They said that it was the school lunches that made their children sick, food poisoning was not caused by the food they were fed at home. Parents voiced concerns at school meetings. News grew and spread. School officials were blamed. Then suddenly news stopped. Some parents (non-CCP affiliated) arrested for spreading propaganda against state. Eventually food got better and number of children getting sick decreased.

What happened?

Potential food suppliers bid on contract to supply food for school district. Bids are supposed to be awarded to lowest bidder, but school administation has right to eliminate bids they consider problematic. If bid is considered unreasonably low contractor might become unresponsive to fulfilling contract, or for other reasons, like bidder having some problem meeting food specifications, failures with prior contracts or on shaky financial footing, Mr X may select higher bid. Mr X knows how to award contract to whichever bidder he wants contract to go to. He has very powerful position. Because large number of lunches served in school district, huge amount of required food makes lucrative contract.

Each Bidder knows that to get contract as school district's food supplier they need to get Mr X to become inclined to accept their bid over those of other bidders. To ingratiate themselves to Mr X each bidder would do whatever possible. Chinese people have history going back many thousands of years studying and inventing new ways to ingratiate themselves to bureaucrats. Bidders know there are two things they must find out: how much and how to make transaction so as to prevent bureaucrat from any possibility of losing face. 

Determining how much is not as easy as it might seem on the surface. Bidder can't ask Mr X directly. That just isn't done. Bidder might be wearing a wire. Mr X will never say anything that might incriminate himself. Too little and bidder has as much as insulted Mr X. Another bidder might be given contract for spite. Also, other bidders also seeking to ingratiate themselves to Mr X. How much will competitors give? Too much and not only will contractor not make profit but will lose money on contract. Bidder will meet with family and friends to try to learn as much as possible about Mr X. If each school spends about ¥1 million per year for its lunch program, bidder's spreadsheet figures minimum deliverable food price, including what they can probably get away with by substitution of non-spec food products. If expected profit, including expected inflation is 25%, maybe half that would be considered appropriate to split with Mr X. Best approximate guess carefully estimated. ¥125,000 x 10 schools.

Figuring out which method to use to transfer funds without incriminating Mr X and preventing any possibility of Mr X losing face requires ingenuity, as old and current methods continually being found out. This is China's forte, discovering new methods to surreptitiously transfer funds to bureaucrats. One old fashioned method of transfer that is way out-dated and no longer used was losing at mahjong. Bidder's investigation found that Mrs X goes weekly to mahjong parlor and gambles. Bidder, Mr Y, goes to mahjong parlor and loses to Mrs X the pre-determined ¥amount. Wife goes home and casually mentions to Mr X that she won ¥1,250,000 from Mr Y at mahjong that day. Mr X smiles and understands what is expected.

Mr Y becomes successful bidder and obtains contract as food supplier for city's school lunch program. Lower quality foods substituted for those specified in contract documents and expected profits result. But then inflation goes up faster than expected, so even lower-priced, lower-quality foods have to be substituted. Eventually, cooks end up having to prepare lunches from rotten groceries and the school kids get food poisoning. City's police investigate and clear CCP member, Mr X, but non-CCP Mr Y loses contract and goes to prison, as do those non-CCP affiliated cooks and parent whistleblowers. 

Next lower bidder, Mr Z, was required under bidding documents to ensure that their bid remained valid over length of contract, just in case initially awarded bidder fails to fulfill contract. Mr Z's company is awarded remainder of contract. Mr X already received gratuity from Mr Z prior to initial bid, but it was less than he'd received from Mr Y. Mr Z furnishes specified quality food until media no longer interested in food poisoning story, then begins substituting non-spec groceries to meet required profits under ever-increasing inflation pressure.

West's globalist donor class and their minions in permanent ruling class love China as their prototype nation. Chinese institutions are designed to efficiently operate together, protecting and fulfilling needs and wants of CCP, not efficiently operating to fulfill needs of the Chinese people. Ownership of larger Chinese corporations is in hands of more politically powerful CCP members. CCP members manage China's institutions. China's system quietly ensures lavish lifestyles of CCP while also raising living standard of their non-CCP kin, provided they show fealty to CCP. 

Raising living standard of other half of China's population only gets more difficult. Not only are whistleblowers punished, but social credit system, tied to every aspect of daily life, ensures that negative public comments about CCP are punished. Disputes between CCP affiliated and non-affiliated parties are always decided in favor of the affiliated party. It's not just the school lunch programs. It's everything in daily life in China. This is the style of socialism they plan for America.

1/6/24

Globalist Elitists' Relationships With We the People

 We the People want to keep only people in positions of public trust who uplift us, whose presence in our institutions calls forth our best. False relationships can be hard to identify. Just as it's challenging to distinguish a mirage from an oasis in the vast desert of human interaction, in a world full of false meanings and mismatches where masks of cordiality and shared self-interest are skillfully worn. Discovering who truly cares for us is an art that requires not just intuition but also a sharp eye. And sometimes we end up believing too much in the goodness and good will of our donor and permanent ruling classes, when what's really happening is that We the People are just being used. 

Just like a skilled gardener who knows how to distinguish the plants that nourish from those that suck the nutrients from the soil, we must learn to identify those who in our lives are true allies. But we must also recognize those who are emotional parasites. Therefore, we will now talk about subtle signs and less obvious patterns that reveal the hidden intentions behind the forced smiles and empty promises of Deep-state Directed Candidate-Politicians (D2CP). 

We are interested in the positive development of institutions which We the People use, and whom it is that gets placed in their management positions. In this context, We the People seek wisdom needed to decipher human enigmas, Illuminating path towards electing managers who will create more authentic and rewarding relationships between We the People and our managed institutions. 

Failed Campaign Promises 

This act of D2CP, making and breaking promises, can be likened to a theatrical performance where words are the actors and actions are the neglected script. These D2CP have mastered the art of verbal persuasion, painting vivid pictures of commitment and support. However, D2CP's words are often devoid of the substance of action. D2CPs create expectations with the flourish of a painter, but when the time comes to turn these painted dreams into reality they falter, revealing the emptiness of their assurances. In such D2CP a pattern emerges, when their support is most needed, when their promise is due for delivery, these D2CP often vanish, leaving a void filled with disappointment and disillusionment. D2CPs absence in times of need, is not just a breach of trust, it is a clear indicator of their true motivations. 

D2CP promises are tools for manipulation, designed to extract value, trust or support, with no intention of reciprocation. Failure to fulfill promises therefore becomes a litmus test of sorts. It distinguishes between politicians who value governor-governed relationships as a two-way street of mutual respect and support, and D2CP who see such relationships merely as avenues for personal gain. For those voters left in the lurch, the experience often brings a painful but valuable lesson that not all promises are built on the foundation of honesty and integrity. 

So the failure to fulfill promises is a critical behavior to observe, and understanding and identifying D2CP who may only seek to use the electorate to obtain self-profit via positions of public trust. It is a behavior that speaks louder than the most eloquent of words, revealing a D2CP's true character and intention. And recognizing this pattern, We the People can learn to navigate the complex terrain of political relationships with a more discerning eye, safeguarding We the People's trust and emotional investment.


Diminishing, Disdainful Comments 

D2CPs who habitually use voters as stepping stones for their personal gain are adept at deploying diminutive remarks as a tool for eroding self-esteem, confidence and the sense of self-worth in their targets, competing populist candidates and their electorate. These comments, sometimes cloaked in the guise of humor or casual banter, are in fact barbed hooks designed to pull We the People down, rather than uplift. Such D2CP trivialize our successes, scoff at our aspirations, or appear disinterested and unresponsive to our struggles and challenges. 

D2CP behavior is akin to a subtle psychological warfare, by systematically undervaluing our populist candidates' achievements and aspirations. D2CP create an imbalance in their relationship with the entire electorate, not just those attacked. It's a calculated move to ensure that We the People remain in a position of self-doubt and diminished self-esteem, making us all the more susceptible to D2CP manipulation and control. In their eyes our diminished self worth elevates their status, solidifying their position of dominance in the relationship. 

Moreover, such disdainful remarks are often a reflection of D2CP own insecurities and feelings of inadequacy. By belittling others, D2CP attempt to mask their own vulnerabilities and project a facade of superiority. This behavior is a telltale sign of D2CP inability to engage in healthy, supportive and reciprocal relationships with We the People via the institutions they intend to manage. Recognizing and understanding this pattern of behavior is crucial to the continuation of our Republic. It enables us to see through the veil of superficial charm that D2CP often wear, and to understand the underlying toxic dynamics of D2CP intended relationship with We the People. It serves as a warning to either address the behavior with D2CP, directly setting clear boundaries, or to distance ourselves later from the toxic environments they seek to create.


Unilateral Benefit

This manifests in various facets of the relationship between D2CP and the positions of public trust they were selected to manage: financial, emotional or practical. Financially, D2CP frequently ask for money or resources from the electorate with promises of repayment via political reciprocity in institutional improvements that never materialize. Emotionally, D2CP lean heavily on the electorate for their support, validation and attention, yet offer little to nothing in return to We the People when they occupy their given roles in our institutions. Practically, D2CP habitually seek favors, assistance, or time, yet are conspicuously absent or too busy to be seen when We the People seek/need their help. 

This one-sidedness is akin to a parasitic relationship in nature, where one organism benefits at the expense of the other. D2CP, like parasites, draw nourishment, in this case emotional, financial or practical support, without contributing equally or adequately to the well-being of their host. Over time, this lack of reciprocity depletes We the Peoples' resources, be they emotional, financial or temporal, leaving us and our posterity drained and unfulfilled. The motives behind unilateral benefit are often rooted in a deep-seated self-centeredness and a lack of empathy of the D2CP. 

D2CP views relationships through a transactional lens, assessing interactions based on what they stand to gain, rather than what they can contribute. This approach to D2CP management relationship with We the People is fundamentally flawed as it overlooks the inherent value of mutual respect, support and give and take. Identifying this pattern requires a discerning eye. It involves recognizing the persistent lack of reciprocity and the feeling of being perpetually short changed in the electorate's relationship with these D2CP. It calls for an honest assessment of whether the interactions leave We the People feeling valued and respected, or used and undervalued. 


Disregard for Our Needs or Feelings

This pattern of behavior, where our emotional landscape is consistently ignored or devalued, is akin to tending a garden where only one flower is allowed to bloom, while others are neglected. In such interactions, candidate's needs and desires are prioritized while ours are sidelined or dismissed. D2CP actions and words become shears that trim away at our emotional well-being, leaving We the People feeling undervalued and invisible in the relationship. This disregard manifests in various forms. It's evident in the way D2CP routinely overlook our emotional needs, failing to provide support or understanding in times when we are vulnerable or in need. It's seen in D2CP indifference to our opinions and choices, where our voice is drowned out by their dominating narrative. D2CP neglect to acknowledge our achievements, and worse, minimize our struggles, making light of issues that weigh heavily on We the Peoples' hearts and minds. 

Such behavior is not merely insensitive, it's a calculated neglect. A tool used to maintain an upper hand in the relationship by invalidating our feelings and needs. D2CP creates an environment where our self worth is undermined, thereby making We the People more susceptible to D2CP influence and control. It is a form of emotional manipulation, subtly executed, but with significant impact. This dynamic is particularly damaging because it strikes at the very core of We the People's emotional well-being. Electorate's need to be heard, understood and valued is fundamental. When these needs are repeatedly ignored by D2CP and bureaucrats it leads to a decline in We the People's self-esteem and a feeling of isolation, even when we are in a seemingly active relationship. To navigate such waters it is essential to recognize the signs of D2CP emotional neglect of the electorate. This awareness becomes a beacon guiding us away from relationships where our emotional well-being is at risk. It empowers We the People to seek connections to populist candidates where reciprocity of respect and mutual care are the foundational pillars. 


Emotional Manipulation

 It often starts insidiously with the manipulator-D2CP presenting themselves as caring and attentive. However, this facade quickly morphs into a mechanism for inducing feelings of anxiety, inadequacy or guilt in their voter-target. These D2CP become adept at pushing emotional buttons, praising to elevate us when it suits their purpose, then sharply criticizing or undermining us to create self-doubt and dependency. Consider the analogy of a gardener and a delicate plant. A caring gardener nurtures, providing just the right amount of water and sunlight. In contrast, the D2CP, like a negligent gardener, alternates between overwatering and leaving the plant to wither in drought. 

D2CP use emotional extremes to destabilize, creating an environment where the target voters become emotionally dependent, constantly seeking D2CP approval and validation to regain that initial sense of warmth. This manipulation often targets the very core of our emotional wellbeing. D2CP may trivialize our accomplishments, or magnify our failures, to keep us in a perpetual state of self-doubt. D2CP twist situations to make us feel guilty for normal actions, shifting the blame to ensure we are always the ones apologizing. In relationships where D2CP hold sway, the balance of power is always skewed. 

D2CP hold the reigns, deciding when to offer affection and when to withdraw it, keeping their target voter-base off balance. This dynamic is not about mutual growth or support, it's about feeding D2CP's needs at the expense of We the People's emotional health. Identifying emotional manipulation of D2CP requires a keen awareness of these dynamics. It involves recognizing the patterns of interaction where our feelings are consistently toyed with. It calls for introspection to understand how these interactions affect We the People's sense of self and emotional well-being. 


Lack of Genuine Support 

Envision a tree in a vast forest. Ideally, it is supported by the surrounding trees and undergrowth, receiving nutrients, shelter and the companionship of a thriving ecosystem. Now imagine a tree standing alone in a barren landscape, with no other flora to offer support or protection. This is akin to living in a society controlled by D2CP managers who lack genuine interest in our well-being. We the People are made to stand alone unsupported. Our branches reaching out for camaraderie that never comes, because such camaraderie is seen as a threat to the stability of the permanent ruling class, to the donor class and to the D2CP. 

In such D2CP-We the People relationships our goals, projects and challenges are met with apathy or token gestures of support. D2CP may ask to hear our plans, offer a half-hearted good luck, or even verbalize support, but their actions, or lack thereof, speak louder when it comes to tangible assistance, meaningful advice or even a listening ear. During tough times their presence is conspicuously absent. D2CP help, if offered, tends to be superficial, more a matter of form than substance, and often evaporates when needed most. What's worse, D2CP work to block us from seeking or giving support to each other.

The reason behind this lack of genuine support is rooted in D2CP focus on self-interest. Our successes or failures, our challenges are of interest only if it serves D2CP's self-interests or the donor class's agenda, only as We the People affect D2CP or their goals. D2CP view relationships to the electorate through a transactional lens, where emotional investment is calculated based on their potential personal returns. This attitude creates an imbalance where We the People continuously gives, be it effort, care or resources, while D2CP takes, often leaving We the People feeling undervalued and unseen. 

Recognizing this lack of genuine support is crucial in understanding the nature of our relationship with each D2CP. It calls for an honest assessment of the reciprocity in our interactions with them. Identifying and addressing this lack of support is key to ensuring that we invest our time and energy in non-D2CP relationships that are nurturing, reciprocal and genuinely supportive. 


Constant Competition

Picture a game of chess where every move is calculated not just to advance one's position but also to systematically undermine the opponent. In a similar vein, a donor class owned D2CP who just want to use We the People for self gain will often treat our relationship to them as a strategic game. Each of our achievements, decisions or even challenges becomes an opportunity for them to assert superiority, whether it's overshadowing our populist candidate's political successes, one-upping our populist candidate's accomplishments, or subtly undermining We the People's voting decisions. D2CP's actions are driven by the need to stay ahead in this self-imposed competition, based on controlled polls from institutions owned by donor class. This constant competition manifests in various ways in a political setting. 

D2CP attempt to outshine populist candidates (who come out of We the People,) in public meetings, or take credit for our candidate's ideas. In political relationships, D2CP downplay our populist candidate's experiences or achievements, often juxtaposing their own to appear more significant. Even in casual conversations there's a palpable undercurrent of them trying to prove themselves better, smarter, or more successful. The root of this behavior lies in deep-seated insecurity and a skewed perception of self-worth, where value is measured not by their own merit, but by being superior to others, even if they are only ones who see themselves in that way. This perspective turns every interaction into a zero sum game, where for D2CP to win, others, in this case We the People, must lose. 

It's a mindset where mutual growth is overshadowed by desire to out do and overshadow. Engaging with D2CP who exhibit constant competition can be emotionally exhausting. It creates an environment of perpetual tension where genuine collaboration or support is replaced by rivalry. Our successes are not celebrated but viewed as challenges to D2CP dominance. Our struggles are not met with empathy but seen as opportunities for D2CP to gain an upper hand. Identifying and understanding this pattern is crucial. It helps in setting boundaries and recalibrating the relationship, if possible, to a more healthy and collaborative dynamic. It involves recognizing that the foundation of any constructive relationship between We the People and politicians who seek to manage our institutions is mutual respect and support, not a relentless race for superiority.


Absence in Critical Moments

This pattern of behavior is reminiscent of a tree that provides shade only when when the sun is gentle, but vanishes when the storm clouds gather for coming bad times. When the sailing is smooth, D2CP are there, basking in the shared light, and reaping the benefits of D2CP's relationship with We the People, as portrayed by donor class-owned legacy media. However, when the tides turn, when challenges arise, and when support is most needed, D2CP presence dwindles, leaving We the People to weather the storm alone. D2CP treat relationships as a convenience, a means to an end, where their involvement is weighed on a scale of personal benefit. 

D2CP support is superficial, extended only when it aligns with their interests, or when there is something to gain. In critical moments, be it a personal crisis, a professional setback, or emotional turmoil, D2CP absence is palpable. It's during these times, when genuine support and empathy are most needed, that D2CP true priorities and lack of commitment to the relationship are starkly revealed. 

The impact of this behavior on We the People, who are let down, is profound. It breeds a sense of betrayal and disillusionment, chipping away at the trust and reliability we think of as foundational to our relationship with our nation. It raises questions about the very nature of the bond, and often leads to a reassessment of We the People's role and value in the life of our American nation. 

Understanding this pattern is essential in recognizing the nature of the relationship, and the D2CP's true intentions. It requires acknowledging that consistent support both in times of joy and in times of adversity is a cornerstone of any meaningful relationship between governors and the governed. The realization that D2CP is absent during our critical moments serves as a litmus test, helping to distinguish between populist candidates who are genuinely invested in our wellbeing, and D2CP who are in the relationship merely for their personal gain. 


Lack of Reciprocity

Imagine a seesaw where one side is laden with the weight of efforts, sacrifices and commitments, while the other side is feather light, devoid of equivalent contributions. This image aptly represents a relationship lacking reciprocity. In such connections we find ourselves consistently investing time, energy and emotions, striving to nurture and sustain the bond between each other and our nation's government. 

Conversely, D2CP contributions are minimal, often tokenistic, or entirely absent. This disparity in effort can manifest in various ways: it might be us always initiating communication and offering plans, while D2CP responses are lukewarm or non-committal; it could be our continuous support and understanding, without receiving the same level of empathy or assistance when we need it; even in sharing personal experiences and vulnerabilities, we might find ourselves open and forthcoming, whereas D2CP remain guarded or disinterested. 

The reasons behind this lack of reciprocity are rooted in D2CP's self-centric approach to relationships. For D2CP, the relationship is a convenience, a resource to be tapped into as needed without the intention of a meaningful exchange. D2CP involvement is calculated and contingent on what benefits them, disregarding the needs and feelings of We the People. This approach is contrary to the essence of healthy governor-governed relationships, which thrive on mutual give and take, shared experiences and a balanced investment of emotional labor. 

Recognizing the lack of reciprocity requires a mindful observation of the relationship's dynamics. It involves asking whether the efforts to sustain and grow the connection are mutually shared, or disproportionately shouldered by We the People. It calls for an honest assessment of whether the relationship between We the People and D2CP feels enriching or draining, equal or skewed.


Gossip and Breach of Trust

This can be likened to a double-edged sword. On one edge the act of gossiping about others to you creates a false sense of camaraderie and trust. It can appear as if D2CP are confiding in you, drawing you into a seemingly exclusive circle of trust. However, the other edge of the sword is far more sinister. It involves the betrayal of our trust, where the intimate or sensitive information we unknowingly shared in confidence (federal agencies illegally collected) becomes fodder for D2CP gossip with donor class owned media. This betrayal is not just a violation of trust, it is a strategic move to erode our sense of security and privacy within the relationship. This conduct reveals a calculated disregard for the sanctity of We the Peoples' personal information and a blatant disrespect for the boundaries of confidentiality. 

D2CP's use of others leverages gossip as a tool for social maneuvering, often positioning themselves as a nexus of information by disseminating and twisting information. They seek to manipulate perceptions, create alliances or even discord, all for their political benefit. This behavior demonstrates a utilitarian approach to relationships, where people are seen as means to an end, and confidential information as currency to be traded. The impact of such actions on We the People, the victim, is multifaceted. It fosters an environment of mistrust and insecurity, undermining the very foundation of what could have been a supportive and trustworthy relationship, not only between electorate and government, but between We the People as well. It can lead to social and emotional repercussions, as the misuse of personal information can damage reputations, relationships and self-esteem. 

Identifying this pattern of behavior in D2CP is crucial for safeguarding ourselves against such relational predators. It involves being vigilant about how D2CP speak of others in their absence, and being cautious about the information shared with D2CP. Observing their disrespect for confidentiality and their propensity to engage in gossip can provide valuable insights into D2CP character and intentions. Recognizing and addressing this pattern in D2CP is fundamental to maintaining We the People's dignity and ensuring that personal boundaries are respected in all relationships. 


Select Availability 

We the People and our populist candidates-politicians are available, D2CP are not. Selective availability, in such a context, paints a picture of a one-sided relationship akin to a party phone line where only one party is always on a call. We the People, in this dynamic, are perpetually ready to lend an ear, extend a hand, or offer support. Our calendar, our emotions, and our resources are open books, readily accessible to D2CP. In stark contrast, D2CP's availability is as rare as a comet in the night sky, occasional, unpredictable, and always on their terms. 

This discrepancy, and availability, is not merely a matter of busy schedules or conflicting priorities, it is a deliberate choice, a strategic stance adopted by the D2CP. D2CP unavailability serves a dual purpose. It maintains a distance convenient for them, and it places them in a position of control by limiting their availability. D2CP create a dynamic where you are left wanting more, often feeling grateful for whatever time or attention they dain to offer. In such relationships our efforts to connect or engage are frequently met with excuses, delays, or outright neglect. Our texts go unanswered, our calls unreturned, our needs unacknowledged. 

When D2CP do engage it aligns with their needs or agenda, making the government-governed relationship into a one-way street where our role becomes that of a convenience, rather than a valued partner. The emotional toll of this pattern can be significant. It breeds feelings of inadequacy. As we begin to question the value of our contributions and our worth in the eyes of the D2CP, it creates an undercurrent of frustration and resentment, born out of the realization that our efforts and availability are not reciprocated. 

Recognizing the pattern of selective availability is crucial. It involves stepping back and objectively assessing the balance of effort and availability in the relationship. It calls for an understanding that healthy government-governed relationships are built on mutual respect, effort and presence.


Making You Feel Guilty

Envision a scenario where guilt is like a puppeteer string tugging at the conscience of the benevolent, leading them down a path they might not willingly choose. D2CP knows how to pull our strings, adeptly tapping into our sense of responsibility, empathy, or fairness. D2CP might frame requests in a way that refusal would make us seem uncaring or selfish. Alternatively, D2CP might remind you of past favors or incidents done for us, suggesting an unspoken debt that we are now obligated to repay. This tactic of inducing guilt is often subtle and insidious. 

It starts with small favors or concessions, gradually escalating to more significant demands over time. Our boundaries are eroded and our capacity to refuse diminishes, leaving We the People feeling trapped in a cycle of guilt and compliance. D2CP's needs and wants take center stage while our own are sidelined or entirely dismissed. The effectiveness of this tactic lies in its ability to tap into a fundamental aspect of human nature, the desire to be seen as good, helpful and caring. 

By making us feel guilty, D2CP distorts these virtues, turning them into levers of control. We the People find ourselves doing things, not out of genuine desire or mutual respect, but out of a sense of imposed obligation, often feeling resentful or drained. Recognizing when D2CP is using guilt to manipulate us is crucial for maintaining the Integrity of our personal boundaries and emotional well-being. 

It involves being mindful of the emotional undercurrents in our interactions, distinguishing between genuine requests for help and attempts to exploit our good will. It also requires the courage to question the motivations behind the requests and to assert our right to say no without feeling guilty. Identifying and addressing this manipulative tactic is essential for fostering healthier government-governed relationships based on mutual respect, genuine care and free choice, rather than obligation and guilt.


Lack of Personal Interest

Imagine a conversation as a two-way street, bustling with the traffic of thoughts, experiences and emotions, flowing back and forth in a healthy relationship. This street is alive with the exchange of mutual interest and care. However, when dealing with D2CP who just wants to use us, this street turns into a one-way lane. D2CP stories and experiences drive the conversation, while attempts to steer the dialogue towards our lives are met with detours or dead ends. 

This lack of personal interest manifests in various forms. Town hall conversations with D2CP often feel like monologues, dressed as dialogues. D2CP eagerly delve in into the minutia of their daily lives, their challenges and triumphs, expecting our attention and empathy. Yet when the spotlight shifts towards us, D2CP interest wanes. D2CP might respond with perfunctory nods, change the subject abruptly, or show visible disinterest or impatience. Our problems and experiences, no matter how significant, seem to barely register on D2CP radar of concern. 

This behavior is not merely a lack of of social etiquette or an absence of conversational skills, it is a deliberate indication of their priorities and Intentions. By dominating the conversation and disregarding our stories, D2CP establish a dynamic where D2CP needs, opinions and life take precedence. It's a subtle form of egocentrism, where the relationship revolves around D2CP axis, and our role is reduced to that of an audience or a sounding board. 

The impact of such interactions can be profoundly disheartening. It can lead to feelings of insignificance and frustration, as the fundamental human need for recognition and understanding goes unmet. Over time this imbalance can erode the foundation of the relationship, leaving We the People feeling more like an accessory to D2CP life than an equal partner. 

Recognizing this lack of personal interest is crucial. It involves being aware of the dynamics of our interactions and acknowledging the emotional impact these one-sided conversations have on us. It calls for an evaluation of whether the relationship is mutually enriching or draining. Identifying this imbalance paves the way for seeking more reciprocal and fulfilling relationships with populist candidate-politicians, rather than D2CP, where our stories and experiences are valued and respected as much as theirs. 


Superficial Closeness

It can be likened to the shimmering surface of a lake. It reflects the image of depth and substance, but upon closer inspection one finds it lacks the profundity it promises. In such interactions D2CP may mimic the behaviors of a close friend or a committed partner, D2CP might engage in frequent communication, share laughs and even partake in what seems like intimate conversations, however, this semblance of closeness never transcends into the realm of true depth. D2CP lack of genuine commitment manifests in various ways. 

We might notice that while D2CP are quick to enjoy the benefits of the government-governed relationship they are equally quick to distance themselves when it requires effort or sacrifice on D2CP's part. In times of need D2CP support is often flimsy or non-existent. D2CP may be present for the joys and celebrations, but conspicuously absent during moments of struggle or vulnerability. Moreover, this superficial closeness often lacks the key elements of trust and reliability that underpin authentic relationships. Plans might be made only to be casually broken. 

Promises might be given but seldom kept. D2CP participation in the relationship is on D2CP terms, guided by convenience and self-interest. The motive behind this behavior is often to maintain a circle of contacts that can be called upon when needed without investing in the emotional labor that true relationship require. It's a strategy of keeping people close enough for utility, but not close enough to demand reciprocal commitment. In a sense, it's a form of emotional hedging; reaping the benefits of closeness without the risk of real attachment or responsibility. 

Recognizing superficial closeness is crucial in understanding the dynamics at play in a D2CP (government) We the People (governed) relationship. It involves observing the patterns of interaction and questioning whether the perceived intimacy is matched by actions of genuine commitment and shared vulnerability. It's about discerning whether the relationship is balanced in terms of emotional investment or skewed towards serving only D2CP needs. It's a relationship characterized by a facade of intimacy lacking the foundation of genuine commitment and mutual growth. Identifying this pattern allows We the People to seek and nurture populist candidate-politician relationships that are rooted in authenticity, reciprocity and true emotional depth.


Persistent Lack of Respect

This is more than an occasional lapse in judgment, or a slip of the tongue in the heat of a moment. It is a continuous thread woven into the fabric of the D2CP-citizen relationship. It manifests in various forms. It could be through belittling comments, dismissive attitudes, or even blatant disregard for our feelings and boundaries. This behavior can be subtle like a series of small cuts, or overt like a glaring wound to the dignity. 

Imagine a garden where respect is the nourishment that helps relationships flourish. In its absence what's left is a barren landscape where nothing healthy can grow. In such a scenario, every attempt at conversation or connection becomes a path fraught with thorns of contempt and disregard. D2CP, exhibiting this lack of respect, uses it as a tool, whether consciously or unconsciously, to assert dominance or control in the relationship. 

It's a way of diminishing We the People, maintaining an upper hand in a dynamic, where equality and mutual regard should prevail. This consistent disrespect deeply undermines the relationship's foundation. When disagreements occur, instead of resolving them with understanding and empathy, they become battlefields with no regard for emotional casualties. The normal ebb and flow of relationship dynamics are disrupted, making it difficult, if not impossible, to return to a state of normality and mutual respect. 

Understanding and recognizing this pattern of persistent disrespect is vital. It involves looking beyond isolated incidents to see the broader pattern of behavior. It's about realizing that respect is not just about grand gestures, it's present in the daily interaction, the small acknowledgements, and the way disagreements are handled. 

A persistent lack of respect in a government-governed relationship is a significant indicator of D2CP who view We the People not as equal partners, but as a means to an end. This lack of regard for our feelings and dignity reveals a government-governed relationship that is fundamentally unbalanced and unhealthy. Identifying this trait in candidates is crucial for anyone who values their self-respect, American institutions, and seeks institutional relationships built on a foundation of mutual respect and equality. 

2/15/22

My Build Back Better

 Build Back Better... Lotsa deaths from bioweapons and jabs. Economy goes in dumpster. WEF type globalist stakeholders want us to beg them to surrender to their world communist system, where they control everything and we own nothing, eat bugs and like it (or die). Well, maybe we need some other proposals?

Here's mine FWIW:

To me the best period of American greatness was Jeffersonian America, which lasted from after John Adams to about the War of 1861, with the struggles of restraining those pushing for centralization of federal power. 

At the time of our nation's founding there were lots of unresolved conflicts within the founding group and between the states. Slavery was one such conflict which was eventually resolved by the result of the War of 1861. That resolution itself caused ripples downstream that have grown into the waves of destruction we now witness in our cities. Why?

 Another inherent conflict within the Constitution (which was also at the root of the slavery conflict) was centralization vs decentralization of federal power that existed between Hamiltonian-Lincolnian America and Jeffersonian-Jacksonian America. That was also improperly resolved by the result of the War of 1861. 

Hamilton wrote most of the Federalist Papers pushing for centralization of power - especially in monetary-commerce type institutions, in order to adopt USA Constitution as our foundational document to replace the original USA Confederation. 

Jeffersonian America was all about the decentralization of power envisaged by those of our founders popular with populists today. The Anti-Federalist Papers turned out to be the more prescient, foreseeing accurately the catastrophic results of the centralization of federal government power and its current abuses. There were terrible abuses such as racist slavery of blacks, and bad abuses of indentured servants at the start as well.

But it was central banks which were the most abusive element in America then as now. Jeffersonian American individuals, the common folk, improved their lot more than in any time in history before or since. Mr Lincoln was put into office by those pushing for the return to Hamiltonian centralization, where states, instead of being sovereign were reduced to glorified counties. America was moved from Jeffersonian "These" united states, to Lincolnian "The" united states.  Then, starting with Mr Lincoln's administration, America returned to Hamiltonian centralization of power. We ought to be devolving the power of the current USA federal government, not making it worse by switching our fealty to an even more abusive globalist stakeholders' hegemony.

Arguments against Jeffersonian America have always been that the rural character of Jeffersonian America is long gone and "we can't go back." America is too big, too urbane and too complex, and returning political power to the local level would cause a total system collapse. But what has our nation's centralization wrought? What has been the return on our investment - the turning over the power of our independent sovereign states to the ever-growing centralized power in the hands of the federal government?

For instance, the American government is currently over $30 trillion in debt, and the total current debt of America is over $86.5 trillion. That debt increase is growing at an exponential rate. America's currency and credit derivatives are about $612 trillion. The collapse is coming because those who pushed for centralization, the central and international banks knew it would and want it to collapse in a way that is controlled by them. They want total hegemony over the earth and its resources (including us) plus depopulation and slavery for those they allow to continue endeavoring to persevere.

If their controlled institutions were designed to fail to the globalist stakeholders' benefit, maybe we ought to take the opportunity to return our institutions to ones which operate to the benefit of We the People?

USA should become UNA (United Nations of America), sort of a regional UN with the sort of power the UN held over it's member nations in the 1950s (not much). UNA's purpose would be to protect it's member nations like NATO is supposed to protect Europe from invasion (not to go invading countries like Syria and Ukraine.) When America was founded, 4 million people called it home. Today there are nearly 333 million, or 6-2/3 million average per state. We are too big this way for Jeffersonian America to work.

USA's current 50 states should become 50 separate nations. Each of their prior existing counties become new states within that new nation. Each new state is also sovereign, under same constitutional provisions within new nation as originally intended for states by US founders. Each public elementary school boundary becomes a new county. City governments - especially those already bankrupt, have their charters revoked. Each new county responsible for upkeep of public utilities within their boundary. 

End all forms of taxation except import tariffs. Build lotsa new customs houses, or convert other unused facilities. Products made and sold within jurisdiction go untaxed. Goes for all new jurisdictions: county, state, nation & UNA. If I buy anything made in my own county, no tariff. If I buy something made in my own state but not in my county I pay a county tariff. Buy from another state I pay county and state tariffs. Buy from another nation I pay county, state & nation tariffs. Buy from outside UNA I pay county, state, nation & UNA tariffs. But no more sales, income, VAT nor property taxes. Hopefully, no use taxes, like toll bridges, and definitely no turning over existing public resources to foreign entities for profit. No use of traffic cameras nor black boxes in cars for speed traps and other fines and fees.

Corporations no longer "persons." Governments no longer have right of imminent domain without 2/3rd a separate vote of both houses to condemn each piece of property taken, and only then if paying current owner double real market value. Corporations required to be chartered to operate within each county, providing bond to each county to be forfeited when necessary to cover damages caused to inhabitants of county. Corporations damaging inhabitants lose their charter and operations (including sale of goods) banned within county. Corporation administrators, laborers, board members are all liable, punishable, for criminal acts and negligence.

Current US armed forces, other than space and naval, revert to state militias. Naval bases remain UNA territory. National Guard program ends. Pentagon and non-state resident territorial forts and bases remain under central UNA military command along with navy. UNA President may only ask new nations' presidents, and them may only ask their governors, to provide their state's militia to serve in time of war when declared by UNA Congress. Governors under no legal obligation to comply. UNA military is barred from operations against any member nation, except to come to aid of member nation invaded by another member nation.

Whichever new state (existing county) a member of existing armed forces is from - that state's new militia commanders becomes his governing chain of command. Member of armed forces may choose to permanently inhabit state his fort or base is in, or leave for home state. Forts and bases become part of state militia where they reside. Those states without militias build their own, or hire other states that have militias, forts, bases and armories to provide for their joint protection. Intel agencies placed under leadership and control of state militias. 

Currency becomes hard, but how hard depends upon each new nation in developing their own monetary system. Federal Reserve disappears when they pull the rug out from under America and declare jubilee for everyone holding paper-based assets. In lieu of declaring bankruptcy and turning over all public and private property in receivership to the globalist stakeholders, I believe UNA should mint one special $30 trillion dollar coin made from gold-plated zinc, with the image of Joe Biden on it, and turns that over to the private Western central bank BIS system, stating then that all ties to their organization thenceforth are permanently severed.

But that would be the wrong thing to do. Our enemy is not our teacher. We will - or ought to - cut government expenditures to half of revenues and/or increase taxes as required to pay off debts owed to central banks and international investment banks as quickly as possible, within at most 50 years. Much sooner if possible. Then, when debt is paid off, continue cutting government expenditures and collecting more in revenues until government has sufficient surplus revenue to be able to loan it's excess to other nations. Interest payment revenues from other nations' loan repayments ought to cover majority of costs for running national government.

Appropriations for state's militia, or to pay for rent-a-militia, becomes part of each state's budget. Total tariffs ought to be: 1.5% for UNA, 3% for nation, 6% for state and 10% for county. Disastrous debt-induced hyperinflation caused by Keynesian economics is discarded in favor of Ludwig von Mises economics. UNA government costs are reduced by 95%. National and State government costs are also reduced by a similar amount.

All UN property reserves in America returned to UNA ownership. Disconnect totally from UN (and NATO). Get UNA out of UN and UN out of America. Then UNA property outside of DC, turned over to nations in which they are sited, except for UNA naval bases and foreign territories. Each new nation in turn, turns over acquired property to the states in which the property resides. Native American reservations become sovereign states. Post offices become property of nations they reside in. Where public resources are sold to private interests they ought to be sold for fair market returns, which ought to go into funds available for loaning to other nations. Government to only grow when there are secure existing funding streams to cover costs of new programs.

Public schools, CRT, cancel culture, etc. are no longer. Brick and mortar school facilities become community program facilities, county sheriff office facilities, customs houses and armories. Education controlled by local community, churches or parents with cooperative, on-line, local-developed and self-directed curriculum. Just-in-time learning and business internships promoted with competitive gao-kaos every 4th year of student's education.

Costs for remediation of pollution of air, water and land by corporations comes out of bonds held by departments of environmental quality and by pre-agreement of corporation's county charter. If such pollution by individuals or other forms of business association on private land, then individuals involved are liable for remediation costs, including recovering of real  property and sale at auction if necessary. Also, in areas subject to wildfires, property owners to each provide 15 yard fire break along property lines. Otherwise, property owners have all rights to use of their property, including air rights, mineral rights, solar rights, etc.

8/10/21

Vote By Mail Example

 

[The above "Election Process" picture and the following text (except for italicized text in brackets which are my comments) are from on-line literature published by Denver Elections Division here:] 

[https://www.denvergov.org/Government/Departments/Elections-Division/Election-Security]

[I see potential problems with security of mail-in election systems which may allow possibility of methods of both voter and election fraud which might be used to overturn expressed will of people via elections. In republics with democratic principles, protecting accuracy and integrity of legally valid votes is most important duty of every elections division. Election divisions work for the people, not the special interests, to help the people to achieve accurate vote tallies.]

[Conflict appears to arise between those political influences pushing for greater technocracy control and seeking to influence the outcome of elections, and American citizens wanting fair and accurate elections. Elections divisions are not to receive funds from any source other than from taxpayers as normal to their practice. Other funds to be considered bribes and both those receiving and those giving such funds to be investigated, and when found by grand jury to warrant trial, tried for high crime of election tampering.]

[Legislature's laws regarding who may and may not vote (citizenship, age, criminal status, cognitive ability, etc.) as well as all other legislative general and specific legal requirements must be upheld by election division's election processes, as well as their staff's general attitudes towards their duty and responsibility toward providing a fair and legitimate election. Where partisan or issue politics of election division staff are known, or conflict of interests renders them unable to perform their elections duties fairly, such staff shall be removed from processing of elections relevant to them.] 

[Inserted herein are issues observed as needing further scrutiny, and suggested methods to eliminate potential fraudulent casting and recording of votes. Every election division should do what is best for electorate of their district, in accordance with laws and regulations passed by state legislature governing their public trust.] 

[Suggested revision to laws governing elections:] 

[1) Each state to maintain registry of voters received from each of the counties in their state. State to continually check for duplication of registration of voters between counties. Counties to continuously update their voter rolls. When secretary of state's office finds duplicate registrations in two or more counties, voter to be contacted and advised of violation of voting law, and voter is to ensure prompt deletion of their outdated registration in the previous county of registration. If old county does not, within one month, update deletion from their voters registration list to secretary of state's office, secretary of state to contact both counties and ensure voter looses voting rights in both counties voter registration lists.]

[2) Federal elections department to maintain registry of voters received from each of the states. Federal elections department to continually check for duplication of registration of voters between states. States to continuously update the federal elections department with their latest voter registration lists, as collected from their counties. When federal elections department finds duplication of voter registrations in two or more states, secretaries of state in which voter is registered to be notified and advised of violation of voting law. Voter is to be informed by each secretary of state wherein voter is found to be registered. After secretaries of state contact voter, that voter will promptly delete their outdated registrations. If old county does not, within one month of voter's notice from secretary of state, update deletion of registration by voter, each secretary of state to notify voter's county election division that that voter is to loose their voting rights. Registered voters with more than one simultaneous registration to lose their voter registration from all lists, and their voting rights from all voting districts. When duplications no longer exist federal elections department to notify secretary of state of voter's current residence that multiple voter registrations no longer exist and to allow voter to register in county of residence.]

[In cases of voter fraud, where voter is found to have voted in more than one precinct or otherwise acted unlawfully as a voter and leaves fingerprints, FBI to be notified to take case and prosecute violator to full extent of the law. FBI to run through all fingerprints of all states voter registration lists annually to ensure no duplications. Votes in which voter fraud is determined are not to be counted.]

[Denver's election district is used for an example only and is not my state of residence. However, Oregon, which is my state of residence (sort of, I live on a reservation held in trust by the federal government, within Oregon,) borrowed heavily from Colorado's mail-in voting system.]

[Either remove unopposed candidate positions from ballots, or make the positions easier to obtain competitive candidates.]

["Paper" envelopes to be treated paper or other material best suited to obtain fingerprints of intended voter or to find handling by others.] 

[Paper ballots to be treated paper or other material best suited to obtain fingerprints of intended voter or to find handling by others. Paper ballots to have domestically (created and secured within elections division facilities) produced embedded RFID strips similar to RFID used in US bills, except each strip to contain each ballot's ID number; individual machine-readable number. Ballots without machine-readable numbers to not be included in tabulation of votes. Voter to have ballot designed to meet voter requirements set forth during that voter's registration.]

Certification of Candidates and Issues:
Any candidate or issue that is to appear on a ballot must have paperwork filed with the County Clerk and Recorder or Secretary of State, depending on the office that is being sought. This includes a petition that must be signed by a certain number of eligible voters to qualify the candidate for participation in the election. Petitions may also be circulated to place special issues on the ballot.

[Election division processing of all legislature-enacted requirements of candidates for positions and all processing of legislature-enacted requirements for initiatives to be included in ballots to be video broadcast on Secretary of State's and election divisions websites available for electorate's review, and on each county clerk's website also available for electorate's review. All proceedings to be video taped and provide real-time viewing by electorate and be recorded for electorate and candidate's and position advocates and opponents review as well.]

All submitted signatures must be verified against the Colorado voter registration database (SCORE). If enough signatures are verified to qualify the candidate or issue for an election, the petition is deemed “sufficient” and the candidate/issue is referred to the ballot.

[Note that rules governing maintenance of Colorado's voter registration database can be found here:  https://www.sos.state.co.us/pubs/elections/LawsRules/committeeFiles/BEAClistMaintenance.pdf Note also that Colorado says that it complies with National Voter Registration Act's list-maintenance guidelines.]

[Signatures of legal voters for position candidates and petitions for issues to be incorporated into ballots to be checked against signatures on voter registration.]

[Non-matching signatures to be authenticated via scheduled and video-taped meeting between voter and county clerk's office wherein voter brings to meeting other ID selected from list produced by elections division and approved by state legislature, filled out voter signature form, along with whatever other evidence or witnesses voter wishes to produce. Voter's fingerprints to be checked against those on record for voter registration.]

Software Programming: 
Critical election information is input into various software programs. First, the specifics of the election—including offices up for election, candidates for those offices, office boundaries, and eligible electors—are programmed into the SCORE system. This system is used by all Colorado counties to maintain a single list of Colorado’s registered voters as well as to assist in administering elections.

[Each county needs to continually update their own roll of registered voters with simultaneous feedback to the voters, with input from the state and federal levels to help control voter fraud via abuse of the election system. They also need to do everything in their power to prevent election fraud via corrupt election systems.]

[Ballot initiatives need to be reviewed to contain only one clearly defined issue, with straightforward wording preventing deliberate confusion to voter's understanding of how their vote effects existing laws and what outcome of passing of initiative will mean to voters practically speaking.]

The Denver Elections Division then uploads the information contained in SCORE into software called EED (Election Event Designer), used to lay out the design of the ballot.

[Statewide COlorado voter Registration and Election (SCORE) implemented by Colorado Department of State to comply with Federal Help America Vote Act (HAVA). HAVA ought to be repealed to help reduce fraud in our election systems. If not repealed than state responses like SCORE need to be revised in how they respond to HAVA goals. Voter information of registered citizens may be better protected by states not selling US citizen information to corporations and foreign countries. SCORE falls down in: failure to maintain integrity of electoral process; failure to enable county electorate to have efficient, fair, and impartial elections; failure to provide state legislatures with an audit capability without corrupt county officials blocking their efforts; and because of the data coordination pushed by the proprietary election systems used, the resulting centralized election system produces greater and more widespread corruption. Response to HAVA, (eg SCORE) resulted in more helpful coordination of election fraud.]

[EED is product of Dominion, which is known to be proprietary software. Software code is not accessible to county clerk, state legislature nor to any elections division personnel nor contractors hired by legislature, county clerk or elections division personnel to fully review for potential of software program to allow change of election outcome via proprietary or 'blackbox' hardware or software.] 

[Proprietary software that cannot be scrutinized by government and electorate must not be used. All parties interested in election's accurate recording and tabulation of votes, including voters themselves, must be able to examine equipment and software to ensure that election hardware and software cannot possibly be hacked.] 

[Following is from Dominion's User Guide:
"NOTICE OF CONFIDENTIALITY AND NONDISCLOSURE
"This document contains information that is protected as an unpublished work by Dominion Voting Systems (Dominion) under applicable copyright laws. The Recipient is to retain this document in confidence and is not permitted to copy, reproduce, or to incorporate the contents hereof into any other media other than as permitted in a written agreement with Dominion. The below statutory copyright notice shall not imply or be deemed publication of this product."
https://www.sos.state.co.us/pubs/elections/VotingSystems/DVS-DemocracySuite/documentation/EMS_EED_UserGuide.pdf]
 
[No proprietary software, by itself, must be involved in any election. Buy or create software which is open sourced, open to review of the software code, and the elections division must ensure - themselves or via their (legislature approved) hired or appointed experts - that the hardware and software used cannot be used surreptitiously to corrupt any election result.]

[Unwillingness of Dominion or any other software producer to allow full forensic examination of their hardware and software only intensifies distrust of electorate in Dominion (or Diebold, or any other elections hardware and software manufacturers), feeling that their reticence is possibly based upon their collusion with others in corruption of the elections.]

A file is exported from EED and imported into a ballot tallying software program called ICC, or Image Cast Central. This program is used to collect election results from each individual counting machine and produce a single cumulative tally.

[Dominion software products and others' products not capable of being directly examined by elections division, nor anyone appointed by them, nor appointed by other interested parties to the elections, shall not be hackable, especially during the election process.] 

[People selected to review software and hardware for purity of processing of votes shall be subject to criminal prosecution when their failure to notify elections division of known potential for abuse of systems leads to corruption of an election.] 

[How can we know for sure that ballots printed off-site when ordered by elections division using an outside service (supposed to be compatible with their scanners) might not also be surreptitiously pre-printed with candidates pre-selected, to be used to either fill ballot collecting boxes in parking lots of elections divisions on election day, or to substitute for actual votes collected from USPS, stored in private warehouses and exchanged with actual votes under cover therein.] 

[Discontinue use of such products as those of Dominion machines and software in elections, unless a second open sourced system (software plus hardware)are simultaneously used during tests and elections to backcheck the accuracy of the proprietary Dominion or others' system. https://www.dominionvoting.com/imagecast-central/]

[Importing and exporting files from counting machines is scary to the electorate, and for good reason. Counting machines should not be exporting data and certainly should not be importing data. If the elections divisions continue running EED and ICC, then add to them another in-house open-sourced developed software program together with similar totally accessible and known to not contain wireless communications products, which count the votes in a more direct manner.] 

[Backchecking System: List every possible permutation of potential electorates' selections based on final version of each ballot. Suppose there are 10 positions with four candidates names successfully registered for each position on the ballot. First add one fifth potential selection for all null votes or write-ins under each position. Possible permutations for such a ballot will range from 1111111111 to 5555555555. There will be a very large number of all possible permutations for every ballot face. For instance, there will be 5x5x5x5x5x5x5x5x5x5 or 5^10 = 9,765,625 permutations for example given.] 

[Once voter has legally voted and votes are tabulated, voters to be given abut three weeks within which to:] 

[1) Access the elections division webpage, giving their registered voter names and entering their 10-digit ballot selection number, in proper sequence, corresponding to their numbered selected alternative choices on their ballot. That 10-digit number pulls up, on the election division's website, a summary of the choices made by the voter on their cast ballot, as well as the total count of voters who selected that same permutation of candidate selections.]
 
[2) Also shown will be that voter's cryptographic ID which they listed on the bottom of their ballot. If present, voters are assured that their selections have been properly tabulated.] 

[3) If not present, voter is to call elections division to advise of mistake in tabulation and set up meeting with elections division ombudsman personnel appropriate to adjudicate apparent errors.]

[4) Voter brings ID, phone whose number was entered on the ballot, and copy of ballot cast, or other proof of tabulation error.]

[5) Using voter's registration data ombudsman verifies ID of voter and checks to see if and when voter's ballot was received. If received too late to be counted, ombudsman informs voter that they have to be more prompt in submitting their vote in order to be received in time, and not to procrastinate next time. If voter posted their vote with USPS within reasonable time (time and date stamped by USPS) but USPS delayed returning ballot to elections division, with proper documentation of time and date ballot submitted to USPS on envelope, ombudsman will submit case for inclusion of voter's ballot to elections review board.]

[6) If voter's ballot RFID is indicated in elections division records as having been properly received on time, but still appears to have been improperly counted, cryptographic ID cross referenced in elections division relational database of votes, ombudsman will locate which permutation ballot has been tabulated in. When found, ombudsman will retrieve ballot from secure storage vault of physical ballots and will dial phone number on ballot. If voter's listed cell phone rings ombudsman will review voter's copy of the ballot and other proof and recommend to elections review board correction of any tabulation error.]

[7) If not found by cryptographic ID cross checking alone, ombudsman will cross check by ballot RFID to find which permutation stack of physical ballots voter's ballot is found. Ombudsman scans all ballots in stack to determine which ballot matches the voter's ballot RFID. Once ballot RFID is found, and neither cryptographic ID nor cell phone number matching those of the voter claiming miscount of their ballot, ombudsman will try to locate whomever cast the voter's ballot to query them to the circumstances of how they obtained and cast the wrong ballot. If not located or answers given do not sound plausible, ombudsman will turn over to DA personnel for prosecution. After review of voter's ID, ombudsman will submit recommendation to elections review board for correction of tabulation error.] 

[Post the backcheck voting system's results on-line and allow electorate to review. One voter may select first alternative option on every choice given on ballot or may choose the last, and every possible choice in-between. Simply count how many ballots fall into each permutation, allocate that number to each alternative choice which is associated with that permutation, and the total numbers for each alternative for each choice determines the winners of each contested choice. Totals of permutation groups for each ballot type then provides number of votes for each candidate in every separate voting district, as well as cumulative score for statewide and nation-wide elections. Alternative locally provided backcheck software provides an accurate check of the proprietary counting machines and software's accuracy. Allow thorough examination of local software by all concerned, including the electorate.]

Ballot Design:
The content of the ballot (which races appear and the order in which they appear) is dictated by federal, state, and local laws. In the City and County of Denver, all ballots must be produced in both English and Spanish.

[To verify and ensure that proper ballots get to proper voters, embed RFID strips in ballot paper with code ID'd to specific legally registered voter. During voter registration, voter gives language preference for ballot and literature. Do not print English on ballots and literature requesting Spanish and vice versa. Also print ballots in any specific language requested during voter registration.]

Ballot design is the layout of the ballot content and is dependent upon the judgment of the local election office running the election. For enhanced clarity and simplicity, the Denver Elections Division uses best practices established at the national level by experts in ballot readability.

[Local Practice: This is local peoples' election and ought to follow their will. Rather than rely on "practices established at national level by experts," use locally established rules agreed upon with local electorate within each voting precinct for ballot design. In timely manner, post proposed layout on-line or in person during meetings run under Roberts Rules of Order. Leave out security graphics for electorate previews, but add them later. Such graphics to be used for visual inspection to quickly determine (where missing or different) validity of ballots during ballot processing. Respond to electorate critiques appropriately and re-meet with public. Print physical ballots in-house (within election division) using election division owned printing equipment for ballots.]

[Envelope Paper: Make ballot return envelopes out of materials suitable for signatures at the signature space and material covering the rest of the envelope of best suited material for retaining fingerprints. Ballot handlers other than voters handling their own ballots are to wear clean gloves to prevent leaving unnecessary fingerprints on others' ballots. Voters to give their fingerprints as part of their registration.]

[Ballot Paper: Include embedded RFID strips, like those found in paper currency, to be scanned, just prior to ballots being counted, to ensure that only legitimate ballots printed in-house at election division are included in election outcome.] 

[Ballot Feedback: Based on election-division-determined number of approved alternative candidates and petition positions, from which voter of that ballot may select from; and for each different type of ballot needing to be printed, provide on-line county feedback webpage which will be made available for electorates' on-line review. Webpages to be un-hackable. Webpages to be subdivided into every possible voter choice, ballot permutation or result. Each ballot face to have separate webpage. Under or within each permutation, list cryptographic voter-placed marks in boxes on ballot.]

[Ballot Reproductions: Digitally record and store in on-site data storage device visual image of every ballot received by elections division. Arrange database of images in accordance with same set of possible ballot outcomes as noted above. Database to not be hackable and not placed on-line. Database to include how each recorded ballot was recorded or tabulated into election outcome. Database of ballot reproductions to be used to determine that voter's choices have been accurately recorded in election outcome.]

[Physical Ballot Storage: As well as on-line webpages, store physical ballots in secure fireproof facility within elections division, with ballots subdivided into every possible voter choice or ballot permutation as noted above. Physical ballots included in each grouping to be identical except for their selection markings and individually voter-filled boxes. Make physical ballots as well as envelopes available to forensic election auditors.]

[Ballot Sequencing: Number, in obvious sequence, choices for voter on ballot. For each selection made by voter, number in obvious sequence, options available. Each voter then writes list, according to ballot sequence, of numbers which corresponds to how he voted on ballot in boxes provided at bottom of ballot. Voters at home or in the voting booth can photograph or scan their vote choices together with time stamp, if needed, showing when their vote was cast and what that voters choices were at time of casting their vote.]

[Top Row of Boxes: At bottom of ballot, include 3 rows of 3/8" x 3/8" printed square boxes to optionally be hand-filled in by voter with same instrument used to mark the voter's choices in the ballot above. Box lines to be in faint color, enough to be discernable to voter but not so dark as to interfere with OCR scan of voter applied numbers and letters. Top row to have number of boxes necessary for voters to fill in their election choices - to be filled in in same sequence and with same choices marked in ballot above. If voter double marks ballot and attempts correction by erasing all but one of marks and machine kicks out ballot for adjudication because wrong marks not adequately erased, number in this box for questioned vote to be used to determine from among questioned intended selection.]

[Middle Row of Boxes: To be used for phone number, to include 16 boxes, including 3 boxes for nation code (left blank for those voting within USA), next 3 boxes for area code, plus usual seven boxes, plus 3 phone extension boxes (left blank if not used). Before elections division adjudicator selects voter's "intended" choices - where not obvious from ballot marks and filled top row of boxes, adjudicator to call voter's phone number and set up face-to-face meeting with that voter to verify voter's selections. Voter to bring to meeting any proof of their original selection.] 

[Bottom Row of Boxes: 18 boxes to be marked with whatever password each voter chooses to use, to recognize the identity of their own ballot. This is the cryptographic ID to be placed in the online webpage for user to verify whether or not their own ballot has been properly tabulated. If their ballot has not been tabulated correctly the voter is to call the elections division and set up an appointment to correct the improper tabulation of their vote. Again, voter to bring whatever proof they may have to show their original ballot selections.]

Proper ballot design also involves accurate data entry and proofing of the content. This process is highly complex because it involves data entry of multiple candidates and races on a large number of ballot faces.

[Proofing of content to be done in elections division facility on elections division equipment without leaking final ballot layout to others. Do not do ballot layout design on internet-connected equipment. Keep ballot layout secure, under lock and key, with similar provisions (laws) for spying on federal top secret documents.]

Because there are 346 precincts in the City and County of Denver, there are 346 different ballot faces for a general election. For primary elections, each party has a different ballot face in each precinct. Thus, any precinct may have up to four ballot faces and the county as whole may have as many as 1,029 ballot faces. Each of these ballot faces must be accurately proofed before ballot production can begin.

In addition to the design of paper ballots, electronic ballots must also be designed, produced, and proofed to be used on electronic voting machines. Electronic voting machines also contain audio ballots that must be recorded onto the machines.

[In lieu of using electronic voting machines to output paper ballots for scanners to read, use paper ballots marked by voters directly. Where voter is blind or cannot otherwise accurately mark their own ballot, their vote to be dictated to elections division ombudsman with someone known to and approved by voter present to witness or corroborate that voter's ballot is marked correctly.]

[Unless these proprietary machines can be totally investigated, able to be broken down into individual components to determine total functioning and function of each piece, do not use them. Swap them for voting machines which elections division hired investigators, approved by legislature, have found to be incapable of being manipulated by anyone other than legal voters in casting of their votes, and are also totally open to complete investigation by county elections division personnel and election auditors. If proprietary software continues to be used, provide an open-source backcheck system to be run simultaneously with the proprietary software and hardware. This backcheck software will provide quick verification of accuracy of proprietary software. Alternatively, backcheck equipment may be analog rather than digital, as long as it records number of ballots cast for each permutation.]

Equipment Testing:
Prior to and after every election, the equipment used to record, tabulate, and report votes must be tested according to state laws and regulations.

[Again, Dominion's (previously Diebold) tests are inadequate, by themselves, to ensure accuracy of actual election results. Provide open sourced elections division software in separate feed of physical ballots to backcheck any proprietary software and machines used in elections. Do not re-feed ballots to falsely increase count. Such practices are election tampering and shall result in stiff fines and imprisonment.]

The Hardware Diagnostic test is performed to verify that mechanical components of each electronic voting device are working correctly. After the successful completion of the test for each device, the devices are sealed. Documentation of the sealed information and all testing records for each device are maintained by the Denver Elections Division.

[Testing of Dominion machines may be designed to satisfy county elections division of accuracy during pre-election test, yet then allow election day actual results to be remotely or inherently revised, or skewed. Unless the software and equipment used is fully investigated by any and all people interested in fairness and accuracy of elections, they are not to be used without open-source backcheck systems. Provide elections division open-sourced software and open equipment used in separate simultaneous run to backcheck the validity of the proprietary equipment's results. Test not only the proprietary system, but also the open-source system.]

The Logic and Accuracy Test is a documented review of the Elections Division’s ability to produce accurate results of voter choices. It is performed by staff and an appointed testing board consisting of at least one representative from each major political party, and it is open to the public and media.

[Again, Dominion's (previously Diebold) tests are inadequate, by themselves, to ensure accuracy of actual election results. Provide separate open-source system of software and hardware known to not be accessible to outside manipulation, through which all ballots are to be run to verify the accurate counting of the proprietary system.]

For this test, staff prepare a test deck of ballots that includes every ballot style and a voted position for every candidate on every race, including write-in candidates, overvotes, and undervotes. This deck is run through high speed ballot scanners, and results are compared to a hand tally. The test board signs a Public Logic and Accuracy Testing Certification document verifying that all required testing was completed in a satisfactory manner.

[Again, Dominion's tests are inadequate to ensure accuracy of actual election results. Run test deck through back-check open source system as well. Test both proprietary and open source back-check systems simultaneously. Test results of both systems must match the hand count.]

After Election Day, a post-election audit takes place when the Secretary of State randomly selects which election machinery is to be audited. The machinery selected includes five percent of the ballot marking devices and at least one of the high speed ballot scanners. A report is generated, and the ballots are hand-tallied and compared to the report.

[Again, Dominion's tests are inadequate to ensure accuracy of actual election results. All election machines (ballot marking and scanning) and software must be thoroughly examined and tested before and after the election. Back-check open-source system to verify accuracy of proprietary system in sample ballots selected. Election results not final until two systems totals and hand counts of samples all match. Discrepancies in proprietary systems counts assumed to be corrupted by outside influencers until proven otherwise.]

Ballot Production:
Production includes both the printing of ballots and the insertion of those ballots into mail ballot packets. Ballots are printed using strict requirements from the Elections Division, such as proper paper weight and registration of the ballot image on the paper. With such strict requirements, only certain certified printers are able to produce ballots in Denver.

[Ensure that all printing is done in-house with appropriate paper and safety precautions observed as before. Ensure that the RFID chips embedded in all ballots are readable prior to mailing out of ballots. Failure of election division personnel to obey regulations and those caught conspiring to promote printing of illegal ballots to be severely punished to the extent of the law.]

Once printed, ballots are inserted into a generic ballot packet, then the individual voter’s name and barcode are imprinted onto the outside envelope. This process is complex and requires precise use of computer generated databases and insertion machinery, as every voter must be sent a ballot that corresponds to their correct precinct and ballot face.

[Delete barcode from outside envelope of ballots sent to those voters who request that their barcode be omitted. Provide complete mailing (physical) address of each registered voter on outside envelope. Those seeking to corrupt the accuracy of vote, will use whatever information they might obtain to verify number of voters in each precinct. Hacking or otherwise having access to computer records helps cheaters to coordinate their election theft with others. Also possible for voter returned envelopes to be intercepted and barcode scanned prior to being returned to elections division from USPS. Those envelopes whose barcode go with GOP or democrat voters may be discarded or even replaced prior to being returned to elections division. Reduce certainty of those attempting to perpetrate election fraud.]

Ballot TRACE:
The Denver Elections Division's BallotTRACE (Ballot Tracking, Reporting, and Communications Engine) allows Denver voters to track mail ballots from the printer to the mail facility and back to the elections office. Voters can choose to receive notifications by email or text message about the status of their ballot. 

[Delete barcode from outside envelope of ballots sent those voters who request that barcode be omitted. Provide complete mailing (physical) address of each registered voter on outside envelope. Elections division personnel responsible for directing ballots without barcodes to proper voting tabulation machines. Legal voters responsible for verifying, on-line, that their names and addresses are properly logged by county clerk to receive ballot in upcoming election. Failure of voter to verify their registration is current and correct results in their restriction from voting in election unless it is corrected at least one month prior to election. Provide continuous time-stamped online real time video of ballot mail deliveries between elections office and any other facility to be available to voters and auditors review. Record transport of mail for later review by election auditors.]

Ballot Delivery to USPS:
Denver Elections sends ballots to voters through the United States Postal Service. Ballots are sent between 22 and 18 days before Election Day and are automatically sent to all voters designated by Colorado election law as "active" voters.

[Verify accuracy of elections division's list of "active" voters just prior to printing out ballots. People handling ballots (other than voters handling only their own personal ballot) must wear gloves and have large legible numbers cross referenced to their identities on special colored vests designating them as ballot handlers. Also, people handling ballots (other than voters) must not handle nor be allowed access to any marking pens, similar to any kind of instrument which might be used by electorate to mark their ballots.] 

[Ballot handling to be fully video recorded and posted on-line real time on elections division's clearly designated website for voters' review. People caught handling ballots without proper gloves and vests subject to arrest, with large personal fines and stiff jail-sentences.] 

[Increase number of days before election day that ballots are turned over to voters to allow proper resolution of missing ballots or other problems.]

Once printed, ballots are packaged in trays and on pallets. These packages are then weighed by USPS representatives on location at the printer. The ballots are then transferred in secured trucks to the General Mail Facility in Denver. Once the ballot shipment arrives, the postal inspector and representatives from the Denver Elections Division are present to inspect the shipment to ensure the correct quantity. The mail ballots are scanned into the post office's mail tracking system and sorted into routes for delivery to Denver voters.

[Print ballots and envelopes at elections division facilities on in-house elections division equipment. Scan into USPS mail tracking system only those ballots on which barcodes are included. USPS personnel responsible for determining that unmarked ballots and other mail are promptly delivered.]

Ballot Delivery to Voters:
Ballots are delivered to voters via USPS carriers. Voters are encouraged to visit GoVoteColorado.gov to make sure their address is current. The deadline to make changes to a voter record and have a ballot delivered by mail is eight days before Election Day. After that, a voter may visit any Voter Service and Polling Center to vote in person or obtain a mail ballot.

[During process of verifying list of "active" voters, elections division verifies voters' associated addresses are correct. Mail carriers to wear gloves and ballot handling vests while delivering ballots to voters. Obtain signature of voter for receipt of ballot. Delivered ballots to be recorded online for voters to review and assure that they have received their ballot. Undelivered ballots recorded as being delivered, after voter ascertains that original ballot has been delivered to wrong voter, results in replacement ballot being provided.] 

[Embedded RFID chip of mis-delivered ballot will be recorded as invalid and will not be allowed to be counted during election. RFID scanning to find and eject duplicate cast ballot into pile to be scanned for fingerprints and referral to FBI for potential criminal prosecution. Anyone interfering with ballot handler's delivery of ballots to voters is to receive additional penalties to those incurred due to regular interference with mail carriers duties. Mail carriers not properly carrying out their deliveries subject to additional penalties.]

Return of Ballots to Elections Division:
Voted ballots may be returned through USPS or any other delivery service a voter might choose. To return a voted ballot by mail, the voter should affix the correct amount of postage. However, the Denver Elections Division will not refuse ballots that do not have the proper postage affixed. Once the post office receives a voted ballot, it is scanned into the USPS mail tracking system and delivered in bulk to the Denver Elections Division on a daily basis.

[Unless voter returns ballot in person, voter shall affix proper postage to USPS or other delivery service, otherwise elections division should not accept returned mailed ballot, except where required to do so by the state legislature. Ballots delivered in person to be promptly date and time stamped by elections division. Batches of mail returned by USPS to elections division to be real-time videoed for surveillance by electorate.]

Alternatively, a voter may return a ballot by dropping it off in person or having another person deliver it for them to any ballot drop-off location or Voter Service and Polling Center (VSPC). The Denver Elections Division has 37 24-hour ballot drop-off boxes available throughout the city. Drive-up ballot drop-offs are also provided outside all VSPCs. Colorado law restricts any one person from dropping off more than 10 ballots in an election. Voting site locations can be found by visiting DenverVotes.org.

[Drive-by drop off boxes at all locations to have at least 3 recording security cameras motion activated and posting video on-line to elections division website to catch voters depositing votes. Cameras aimed at openings into drop boxes, driver's face, handled mail, and license plate of vehicle at drive-up ballot deposit boxes.] 

[Interference with cameras and stuffing of ballots to entail heavy fines and long imprisonment. Fingerprints taken from ballots not consistent with intended voter's fingerprints will not be included in vote tally. Voters and others returning voted ballots are not to wear gloves when handling and depositing ballots in ballot collection boxes. Drop off boxes to have weight scales to detect when more than 10 envelopes are deposited within 10 seconds. Such envelopes to be deposited in separate box and kept separate until voters' and depositor's fingerprints are checked. If voter fraud suspected, begin case. Keep evidence separated until guilt or innocence of depositors and voters are determined.]

All voted ballots must be in the possession of the Denver Elections Division by 7 p.m. on Election Day in order to be counted.

[In-person vote submittals must be speedily processed by elections division. Remote ballot collection boxes to either have accurate clocks and mechanisms designed to prevent ballots from being deposited after date and time legally established by state legislatures, or elections division staff to man machines at the stated cutoff time and take only those envelopes deposited within date and time stated by the legislature. Provide known ballot collection box at county clerk's office, county facility parking lots, in every precinct and centrally located within every cluster of 25 city blocks or 1,000 voters.]

[Ballots in envelopes not received by due date and time to be disposed of and voter notified of their failure to submit vote in timely manner.]

Voter Services & Polling Service:
Voter Service and Polling Centers (VSPCs) are opened 8-15 days prior to Election Day depending on the type of election. Services include:
* Replacement ballots
* In-person paper and in-person accessible machine voting
* Ability to make an address change
* Ability to register to vote
* Return a voted mail ballot

[Increase VSPC days and hours before election day to respond to increased requirements to reduce and undo election irregularities. In person and accessible machine voters who were previously recorded as having received ballots are to bring their original ballots with them. If voters are not to be required to maintain their voter record accuracy, then provision of making address change and register to vote shall comply with laws of authority having jurisdiction over voting district.] 

[RFID of replacement ballots to be recorded and original ballot's RFID chip to be blocked from being counted in the election. Ballots without RFID not to be counted. Voted mail ballots ought to be returned directly to county clerk's office to reduce potential of mishandling of ballots by VSPCs.] 

[Again handlers of ballots by other than the voter of that ballot need to wear the ballot handler vests with IDs and be viewed on line real time and recorded during the time that they handle other peoples' ballots. Again, handlers of ballots by other than voters are not to have marking devices in their hands nor be allowed access to them. If voters return their ballots to ballet collection boxes inside VSPC offices they need to be videoed as for those using drive-up ballot collection boxes.]

Ballot Receiving:
All activities in ballot processing rooms can be witnessed by the public. For security, all rooms are card-keyed and video-monitored 24 hours a day, seven days a week. Every election worker in ballot processing rooms must wear a coordinating vest, identification badge, and party affiliation button.

[Security camera output to be broadcast real time via elections division website online, fully accessible to all of electorate to watch. Video is to be recorded on durable media and stored for later review by election forensic auditors.]

Mail ballots are delivered to the Denver Elections Division by USPS and by Elections Division staff from drop boxes located throughout the City. 

In this room, ballot boxes and mail trays are weighed and logged into the Elections Division’s ballot tracking system to record where and when voters have delivered their ballots. Ballots are then transferred by a ballot security team to the Signature Verification Room. Out-of-county ballots are time-stamped and sent back to the appropriate county. 

[USPS and election division staff delivering returned ballots to wear gloves and special colored vests with large number IDs on vest indicating staff members ID on video broadcast of their delivery procedure over entire trip from ballot boxes to secure locked storage vault into which ballots are delivered in elections division facility. All ballots to be under constant supervision by the electorate.] 

[Record and video report on-line of collecting and transporting, signature verification, and all handling of ballots within elections division facility. After time-stamping, report to other counties mis-delivered ballots noting their time stamping and return them to the USPS or await the other county's staff to retrieve them, as requested by the other county's election division staff. Continue to handle mis-delivered ballots in same manner as for handling appropriate county ballots.]

Ballot Verification:
Workers in this room are trained by a Certified Document Examiner. Ballots are run through the Bell and Howell Elevate Criterion machine, which date- and time-stamps the ballot, removes the secrecy tab, compares the barcode on the envelope to data from the voter registration database, and captures the signature image of all eligible voter signatures. Signatures are reviewed by bipartisan election judges.

[Handling of physical ballot envelopes (other than voters handling their own ballot envelope,) by staff of elections division and USPS staff and election judges to be supervised by not only partisan overseers but also by electorate via 24/7 online real-time video which is also to be fully recorded. Physical ballot envelope handling to be done with gloved hands and handlers to wear special vests with legible ID. Incidents of apparent malfeasance or work not in keeping with the public's trust to be reported by electorate via on-line feedback to county board of commissioners, sheriff's department, district attorney, legislature, political parties, public media, as well as any other individuals and groups interested in fair and accurate elections, as a form of election-related 911.] 
[Certified Document Examiner to be approved by state legislature prior to appointment by elections division.]

[Bell and Howell's Elevate Criterion machine must be able to be fully understood, repaired and verified by election division personnel, legislature-appointed experts and election auditors. Data derived from these machines must not be allowed to be real-time or otherwise shared with anyone outside of elections division.] 

[Otherwise, provide alternative machines which are not only capable of performing same function but are also able to be fully reviewed by legislature-appointed experts and determined by them that these machines' data cannot be falsely manipulated by anyone outside of those authorized to mend non-functioning machines.] 

[Date and time stamp locations printed by machine on non-mailed ballot envelopes not to interfere with legibility of marked ballots. Removal of "secrecy tabs"(?) not to mar ballots. Where barcode omitted on outer envelope, compare return address and RFID strip of ballot to voter's registration database which is to include RFID strip number of delivered ballot. In addition to signature scan, outer envelope and ballot to be scanned for voter fingerprints which are also to be compared to those included in voter's registration database.]

[In lieu of "bipartisan team" of signature judges, provide a multi-party team consisting of two democrats, two republicans, and three "independents" who are registered to non-democrat non-GOP parties, such as: libertarian party, socialist party, constitution party, green party, American independent party, communist party, tea party, working families party, no party affiliation, etc. No two or three of these three independent party members of the multi-party team of signature judges are to come from the same independent party, unless classed as "no-party affiliation" in their voter registration.]

[During voter registration voter shall indicate interest in their personal involvement whenever there are any questions regarding authenticity of their ballot. People who may wish to corrupt vote tabulation may wish to know who has and who has not returned their ballots in order to provide fake ballots "for" those who have not returned their ballots. Where barcode has been omitted by request of voter, questions as to authenticity of their ballot shall be addressed directly to voters themselves when so chosen by voter during registration. Schedule face to face meeting with elections division ombudsman and voter to verify signature.]

If the signature matches, the ballot is accepted and the voter’s record is updated to show that a ballot was verified. If the signature does not match, a bipartisan team of two compares signatures. Accepted ballots are sent to the Ballot Preparation Room. Voters with rejected ballots due to non-matching or missing signatures are sent a Signature Affidavit Form and must also submit a copy of acceptable identification.

[Handling of physical ballots (other than voters handling their own ballot,) by teams to be surveilled by electorate via 24/7 online real-time video on elections division website, which is also fully recorded. Physical ballot handling to be done with gloved hands and handlers to wear special vests with legible ID. Envelope and ballot handling staff are not to have in their possession and form of marking instrument of any kind which the electorate might use to mark their ballots. Incidents of apparent malfeasance or work not in keeping with the public's trust to be reported by electorate via on-line feedback to county board of commissioners, sheriff's department, district attorney, legislature, political parties, public media, as well as any other individuals and groups interested in fair and accurate elections.] 

[Replace "bipartisan team of two" with "multiparty team of seven".]

[Ballots of voters with rejected signatures (missing or non-matching) sent Signature Affidavit Form shall meet face to face with elections division ombudsman at appointed time in a video recorded and real-time online broadcast meeting available for electorate viewing. Electorate knowing voter may present evidence online for signature team and ombudsman's review.] 

[Copy of acceptable ID turned over to ombudsman and explanation for missing or non-matching signatures explained by voter. If signature of voter is impracticable due to known circumstances and signature made by someone else known to voter is acceptable, it shall be stated and approved during voter registration or re-registration and actual signer is also to be present during meeting with ombudsman.] 

[If voter is incapable of coming to meeting, then ombudsman will schedule meeting to take place at voter's location together with online video providers and signer if applicable. Cogency of such voters, ability to recall voting and choices at time of vote will be determined by ombudsman and reported to signature verification team.]

[In conjunction with signature verification, check ballots to ensure that RFID of ballot coincides with voter to whom ballot was to be delivered. Duplicate submitted ballots shall be checked to verify authenticity with ombudsman and registered voter.] 

[When signature is accepted, verification of accepted signature shall be posted on elections division website for registered voters to see that a ballot in their name has been received by elections division.] 

[Verified voters who appear to have submitted two ballots will have ballots pulled from processing until correct one is determined. Unlawful casting of duplicate ballots to be prosecuted to full extent of the law. Fingerprints of voter taken during registration compared with those found on envelopes.]

Ballot Preparation:
Ballots from the Signature Verification Room are delivered to the Ballot Preparation Room by a bipartisan ballot security team. In this room, batches of ballots are logged into the Elections Division’s ballot tracking system. Ballots are removed from envelopes with a high speed envelope opener/extractor, then a bipartisan team works together to remove any stray tabs left on the ballot, flatten out the folds in the ballot, and place the ballots in a ballot transfer case.

[Wherever "bipartisan" is written, substitute "multiparty".]

[High speed envelope opener/extractor not to mar ballot. Flattening of ballots to be accomplished by foot-operated press which has fabric covered platens which also removes static and any surface moisture from ballots. Reduce staff and others handling of ballots to minimum. Staff to handle ballots on the edges while wearing clean gloves.]

[Multiple video cameras broadcasting online real-time 24/7 and continuously recording all activities, and lack of activities, in all ballot processing and handling rooms and spaces fully available to electorate to view. All handling of ballots by staff of elections division and USPS personnel to be done wearing clean gloves and wearing special colored elections division vests with ID of persons handling ballots clearly legible and cross-referenced for online identification.] 


[All activities of ballot handlers to be discernable to online electorate watchers, just as casino employees are taught to be clear in their handling of cards and money to view of security cameras, so too are elections division and other handlers of ballots to be taught for online viewing by electorate. Any questionable behaviors detected by electorate to be immediately reported on the website which is also to be monitored by county sheriff and others who will send deputies and representatives to election division to examine election process, deter crime, arrest those abusing the public trust, and take custody of evidence where and as appropriate.] 

[Failure of sheriff deputies to act appropriately to questionable activities of ballot processing staff to entail referral of possible criminal activities to state police, DAs & legislative representatives. Election auditors to be advised of date and time of potential election fraud reported online by viewing electorate.]

Ballot Counting:
Ballots from the Ballot Preparation Room are delivered to the Ballot Counting Room by a ballot security team. In this room, election judges receive ballot transfer cases and log them into the Elections Division’s ballot tracking system. A unique number is imprinted onto every ballot card to determine the number of ballots in each batch, then an election judge processes ballots through high speed scanners.

[Activities having to do with handling of ballots to be done using gloves. Activities having to do with handling or processing of ballots to be done under video surveillance by electorate via online cameras and displayed on election division's website. While handling or processing ballots election division staff and others to have large legible ID readable by electorate online. Criminal penalties to be imposed against anyone involved with handling and processing of ballots without simultaneous surveillance by electorate. Eliminate imprinted number on ballots by using RFID strip number embedded within each ballot. Sealed ballot transfer cases to be marked with large ID recognizable to electorate when transporting them. Cross views of cameras to ensure continuous viewing of ballots being transferred between rooms.]

The scanners read the marks on the ballots that indicate a voter’s choice for candidates and issues, then pass the results to a tabulation computer. Ballots that are successfully scanned are sealed in a ballot transfer case, logged into the ballot tracking system, and are sent to the Ballot Storage Room where they will remain for 25 months before being destroyed.

[Video surveillance, gloves and special vests worn by ballot handlers including ballot security teams and election judges in ballot preparation, ballot counting and ballot storage rooms. In lieu of imprinting unique number on ballot cards, utilize embedded RFID strips in ballot paper and record to determine number of ballots in each batch.] 

[In addition to processing through proprietary high speed scanners, also process through election division scanners determined by all interested parties to be free from influence by outside input, other than voter's ballots. Back-checking counting machines use open-source software. Back-checking ballot counting machines pass on count of voter ballots to appropriate permutation group in tables in elections division website, together with OCR read cryptographic IDs for voter feedback.]

[Ballots from backcheck machines to be automatically (to extent practicable) redistributed into appropriate permutation groups, where all voter selections of ballots in each group are marked the same. Where outside of the 50 most commonly marked ballots, gloved staff will separate into appropriate groups. These common groups will then be sealed inside marked ballot transfer cases then to be stored in the secure storage room.]

Ballot Duplication:
In the rare instance that a scanner cannot read a damaged ballot, a bipartisan ballot resolution team examines the ballot and sends it to the ballot duplication team, who examines the damaged ballot to determine voter intent, then correctly makes a duplicate by marking a blank ballot. The teams keep a journal with important information about each ballot that is duplicated. All original and duplicated ballots are numbered the same so that they can be identified at a later time if necessary. Duplicated ballots are returned to the Ballot Counting Room. The damaged ballots are sealed in a ballot transfer case and sent to the Ballot Storage Room.

[Ballot resolution and ballot duplication teams to wear gloves and ID vests and be conspicuously videoed online to show to electorate real time their every move. Repeal use of all such ballot duplications to extent practicable. Ballot resolution as well as ballot duplication team to not only be bipartisan, but to incorporate all parties and individuals involved and interested in the election to extent practicable. American elections are not limited to the two main parties but must equally respect all individuals interested in the results of the election.] 

[Ballot duplication is open to such temptation to defraud that it must never be allowed to occur unless ballot is so damaged that voter's intent is not discernable. Do not make duplicate ballots without prior face-to-face contact between voter of questioned ballot, ombudsman, ballot resolution and ballot duplication teams to obtain voter's written approval of resulting duplicate ballot before returning it to ballot counting room to be rescanned by both proprietary and back-check vote scanners. Rejected ballot to be destroyed, and records of old RFID numbers to be changed to show that they have been deleted and what replacement ballot RFID number is recorded as used by voter. Only verified voter of ballot may touch ballot with ungloved hands.]

If a ballot has improper marks, over/under votes, or the voter intent is not clear, then the ballot is sent electronically to an adjudication team, a bipartisan team of two election judges that review the ballot and determine voter intent based on a Voter Intent Guide provided by the Secretary of State. The team marks the ballot digitally and a log of their decisions is attached to the ballot. 

[Wherever physical ballots are involved, everyone who is not the original intended voter of that ballot shall wear gloves when handling ballots.]

[In lieu of "bipartisan team" of election judges, provide multi-party team consisting of two democrats, two republicans, and three "independents" who are registered to non-democrat non-GOP parties, such as: libertarian party, socialist party, constitution party, green party, American independent party, communist party, tea party, working families party, no party affiliation, etc. No two or three of these three independent party members of the multi-party team of election judges are to come from the same independent party, unless classed as "no-party affiliation" in their voter registration.]

[To extent practicable, do not send ballots to multi-party adjudication teams until after physical ballots have been scanned by backcheck system which may resolve questions of voter's ballot choice. Reports of unusually large numbers of rejected ballots due to proprietary equipment settings being purposely set to reject high numbers of cast ballots, in order for unchecked partisan adjudication to change voter's intent must not be allowed to occur.] 

[If proprietary system scanner rejects ballot due to inability to read voter's intent, stack such ballots beside the backcheck system hardware and run them separately through the backcheck system. If backcheck system is capable of correctly selecting appropriate permutation group per it's hardware and software where proprietary system could not, then avoid any further elections division or adjudication team involvement with interpretation of physical or digital imaged ballots. Simply report outcome of ballots rejected by proprietary system as corrected by the backcheck system, so adjudication team may correct the proprietary system's count to match that of backcheck system.] 

[Backcheck system scanner will not only read and record ballot marks above, but also will OCR top row of boxes on ballot to read voter's intended choice between ballot alternatives provided for given ballot position or initiative choice.]

[Where ballot choice is left unselected or unread, the backcheck system will default to the null vote choice. Adjudication teams are not to fill in blanks left by voter and recount ballots.]

[Where ballot choice is marked for two or more competing alternatives and erasure not complete enough to prevent incorrect alternates to be read simultaneously with voter's intended alternative selection, then OCR for that position choice is read and overrides the mistaken duplicate reading. (Pro-Mayor Daly election workers in Chicago used to double mark ballots of voters whose votes they wanted to have thrown out.)]

[Where ballot alternative selections are double marked and the top row of boxes are blank or marked over, then send ballot to adjudication team who will contact voter and via face to face meeting provide correct duplicate ballot with voter's written approval, as described above.]

Ballot Tabulation:
Ballot tabulation takes place on a tabulation computer located in the Ballot Counting Room. Tabulation is accomplished by collecting scanned vote results from high speed ballot scanners and paper ballots from ballot marking devices. The results are sent to the ballot tabulation computer through an isolated secure network that has no ties to any other network or the internet.

[Electorate distrusts Dominion and any other proprietary system equipment. Voters believe proprietary systems might have secret pieces of equipment inside allowing ties to other networks or the internet, or internal processes by which the voters' will and count (one person one vote) might be changed, or corrupted. Proprietary systems ought not be allowed to be used at all. But if they are to be used, then validity of their tabulated votes needs to be back checked with system known not to allow for such outside manipulation.] 

[Machines whose every part has been inspected, diagnosed by legislature-appointed experts and verified not to contain any source within them which allows the elections equipment to output nor input data regarding the vote count other than manually by elections division staff under 24/7 online supervision of the electorate and subject to arrest, fines and imprisonment when caught manipulating the valid count results from the election. Election machines are to be 100 percent accurate. Such machines to be analog, or if digital, to use open-source software available to be reviewed by elections division staff, appointed experts, the electorate and election audit teams. Software also to be 100 percent accurate.] 

[Once scanned by proprietary scanners, ballots then to be immediately scanned by election division's open-source back check scanners.]

The computer collects and compiles all results using Results Tally Reporting (RTR). From this system, results are printed and downloaded to an external drive so that they can be uploaded to the Elections Division’s website.

[Again, RTR is a Dominion product. If elections division allows proprietary systems for their elections, then for the sake of the electorate provide an open-source backcheck system.]

Publication of Unofficial Results:
On Election Night, unofficial election results are posted at the Elections Division and on its website (www.denvervotes.org), beginning at 7 p.m. and are updated every 1.5 hours until counting is completed. These unofficial results are also provided to media organizations.

[Unofficial election result updates posted to elections division website to be supplemented with backcheck system electorate review. Backcheck system to display, on elections division website, top 49 permutations of most popular voters' choices of ballot selections, plus one catch-all category of remaining ballot selections made by electorate.] 

[Backcheck display to follow sequence of voters' ballot ID numbers for each ballot type and precinct.]

[Voters to go online and type into search box, provided on elections division website, same sequence of alternative selections which they made on their ballot. Online voter to be immediately directed to that ballot permutation. Website to continually update number of ballots received for each permutation for backcheck system. Along with display of number of ballots received matching that permutation, updates to display, via OCR, cryptographic IDs which voters placed in bottom row of boxes on their ballots.]

[If voter does not find their ballot tabulated in accordance with how they voted, they may seek, via their ballot ID number, in which ballot selection permutation their ballot has been placed by the elections division. When discovered that their ballot has been recorded in the wrong permutation, they may make an appointment with the elections division's voter ombudsman, to correct the permutation into which their ballot is to be placed.]

[In addition to their own ballot permutation and using cross-checking to ensure that voters ballot was properly counted (by finding their personal cryptographic ID there,) elections division website will also include spreadsheet, for voter review, of numbers of each permutation and continually updated subtotal for each candidate for each position as well as each initiative, based on numbers of ballots recorded for each ballot permutation returned.]

[Vote tabulations of proprietary systems not to be certified until they match tabulation of votes of backcheck system, unless otherwise directed by state legislature following findings of forensic audit of election in question.]

[Where proprietary system vote tabulations have been certified, but later findings of forensic audit of election in question determine that proprietary system vote tabulations do not accurately match the will of the people via either significant voter fraud, election fraud, or both, that election outcome will be vacated and a re-election will be made, using the above backcheck system to verify the proprietary system, with forensic audit also available to all interested parties.]

Post Election Activities:
After Election Day, various post-election activities occur prior to the official canvass of election and certification of results. These include: processing provisional ballots, reconciling forms used at Voter Service and Polling Centers, sending and receiving signature discrepancy letters, sending and receiving identification letters, assisting voters who come into the office to sign their ballots, and processing ballots received within eight days of the election from overseas electors.

[Also include proper resolution of voter-ombudsman claims of miscounted votes.]

Risk-limiting audit
A risk-limiting audit uses statistical analysis to allow election officials to review a few of all ballots cast in an election to double-check outcomes. Risk-limiting audits are required for all Colorado elections. These audits use a random number seed and a computer algorithm to select random ballots to check against tabulation software results. This ensures strong statistical confidence in election outcomes.

[In addition to risk-limiting audits, full forensic audits are required to verify accurate election results at direction of any of interested parties, including voters, competing politicians, political parties and other states where election results impact them legally or fiscally.]

Canvass of election and certification of results
The canvass of an election is the process by which the unofficial results are thoroughly examined and certified. The canvass is conducted by the Denver Canvass Board, which consists of one or more appointees from the two major political parties and the Denver Clerk and Recorder or designee. The Canvass Board reconciles the ballots cast in an election to confirm that the number of ballots counted in that election does not exceed the number of ballots cast in that election. The board also reconciles the ballots cast in each precinct to confirm that the number of ballots cast does not exceed the number of registered electors in the precinct.

[Board of canvassers to include not just the two political parties, but all other interested parties and independents as well. Canvas board to allow all parties and voters to ensure that their votes were properly tabulated, to ensure that no voter fraud nor election fraud took place. Where canvas board and interested parties observe differences, forensic audits to take place under strictest and most transparent conditions to logically satisfy all parties and voters thast one person - one vote occured. Where impasse remains, revote the election under tighter security and more open transparency. Everyone, including elections division personnel, sheriff and police department personnel, voting equipment manufacturers and support staff, voters, party staff, politicians, canvas boards, et al, subject to heavy fines and stiff prison sentences where found to contribute to voter fraud, election fraud, or both.]

The Canvass Board inspects documents that have been produced by the Elections Division and presented to the board during a meeting conducted approximately two weeks after the election. However, the Canvass Board can examine any election documents it desires and may be present to inspect any pre- or post-election activities.

[Change the "two weeks" to something longer, to allow resolution of all voter-observed discrepancies and re-tabulations of results.]

No later than the thirteenth day after a primary election or the seventeenth day after any other election, the Canvass Board certifies the abstract of votes cast and transmits the certification of election results to the Secretary of State, the City and County of Denver, and any other political subdivisions involved in the election.

[Change "thirteenth day" and "seventeenth day" to something longer, to allow resolution of all voter-observed ombudsman agreed discrepancies to be corrected and re-tabulations of results made. Also, revise dates by which discrepancies found in elections results may be filed in court, so that a more reasonable length of time is allowed for such filings. Standing to include vying candidates, voters, states, counties, et al., but not the English royalty.]

[These are only my thoughts and observations on ways and means to ensure accurate election results. Anything that can be adopted to help the electors see that the voting and tabulations are accurate will be appreciated.]