How to Vote Fraudulently in a Voter ID State

No, I shouldn’t be revealing this information, but if it helps to illustrate how weak so-called “voter ID” law enforcement is, so be it.

Voter ID States

The National Conference of State Legislatures (NCSL) has identified 36 states that presently have some type of “voter ID” requirement, in which the strictest states require a government-issued photo ID.

And this number is increasing. In June, Nebraska approved Legislative Bill 514 which implements voter ID requirements for Nebraska elections beginning in May 2024. Nebraska will be a “strict” voter ID state.

As the NCSL states:

Proponents argue increasing identification requirements can prevent in-person voter impersonation and increase public confidence in the election process. 

From https://www.ncsl.org/elections-and-campaigns/voter-id

The exact IDs that are required vary from state to state, but all states accept a state-issued driver’s license or other state ID (REAL ID or not) as an acceptable form of identification for voting.

Sounds great, right?

But there’s a problem.

Making and detecting fake IDs

    I hope you’re sitting down for this.

    People create fake driver’s licenses.

    This wouldn’t be mistaken for a real driver’s license. At least I hope not. But other fake driver’s licenses are more sophisticated. From https://www.etsy.com/listing/1511398513/editable-little-drivers-license

    These range from the novelty types of driver’s licenses pictured above to ones that are more sophisticated.

    From https://www.youtube.com/watch?v=pYciy7UL2Cc

    Of course, there are ways to detect fake driver’s licenses.

    Transportation Security Administration Checkpoint at John Glenn Columbus International Airport. By Michael Ball – Own work, CC0, https://commons.wikimedia.org/w/index.php?curid=77279000
    • When you present your ID to a Transportation Security Agency official, they place the ID in a specialized machine which, among other things, can detect forgeries.
    • And if you win money at a Las Vegas casino, they will check your ID also before paying out (as an underage friend of mine learned the hard way).

    How can YOU detect a fake ID? Well, you can buy a book such as the “I.D. Checking Guide” or similar reference and compare the presented ID to the examples in the book.

    There are more robust ways to detect a fake ID. Nametag has five suggestions:

    1. Check the hologram. You can do this without using any special tools, so it’s an easy way to spot a fake ID…unless the fraudster has placed a hologram on their document.
    2. Check for tampering. Sometimes this is obvious to the naked eye, sometimes not so obvious. For example, a fraudster may have clumsily pasted another photo on top of the real photo. But maybe the tampering isn’t so obvious.
    3. Inspect the microprint. You’ll need a magnifying glass for this, but if you know what to look for, you can spot fraudulent IDs…unless the fraudster also added the appropriate microprinting to their document.
    4. Look for ultraviolet (UV) features. You’ll need a UV light for this, but again this can reveal forgeries…unless the fraudster also incorporated UV features into their document.
    5. Use Nametag products. These (and similar products from other companies such as Regula) can check for fraud that the untrained eye cannot detect.

    These fraud detection techniques are great if you work for the TSA or a casino full-time and have the appropriate training and equipment to detect fake IDs.

    Enter the untrained, unequipped fraud guardians

    But what about precinct workers?

    They work one or maybe a few days a year, and it’s very doubtful that the elections authorities:

    • Train and test precinct workers in the detection of fraudulent IDs.
    • Provide precinct workers with reference materials, magnifiying glasses, ultraviolet lights, or automated hardware and software to detect fraudulent IDs.

    If the precinct workers don’t have the training, equipment, and software, Phineas T. Bailey could walk up to a local precinct, show a fake ID saying that he is Joe Real, and if Joe Real is registered to vote in that precinct, Phineas can go ahead and vote.

    Some security.

    But no one would ever vote with a fake ID…would they?

    “But John,” you say. “No one would ever create a fake ID and use it to vote.”

    Well, let’s look at this ID.

    John Wahl’s Regional Press Secretary identification. From https://www.al.com/news/2022/10/alabama-gop-chairman-made-the-photo-id-he-used-to-vote.html

    On at least two occasions, John Wahl presented the ID above when voting.

    When poll workers asked Alabama GOP Chairman John Wahl for his voter ID, he gave them a card they’d never seen before. He texted this picture of it to the Limestone County Probate judge, who then approved him to vote.

    From https://www.al.com/news/2022/10/alabama-gop-chairman-made-the-photo-id-he-used-to-vote.html

    However, it was subsequently discovered that Wahl made the ID himself.

    (Why? Because Wahl and other members of his family object to biometric identification for religious reasons. Rather than submitting to the standard biometric identification processes used to create driver’s licenses and other government forms of identification, Wahl simply had an unnamed third party create his own ID, with the knowledge of the State Auditor.)

    This incident ended up being a little embarrassing…because John Wahl happens to head the Alabama Republican Party (as of December 2023).

    So how do you fix it?

    If you’re going to insist that people present legitimate IDs for voting, then you need to enforce it, both for people who present IDs in person and for people who present IDs remotely. There are a number of companies that provide hardware and software to verify the legitimacy of driver’s licenses and other government-issued documents.

    Of course, that costs money. Depending upon the solution you choose, it could cost tens or hundreds of millions of dollars to protect the more than 230,000 polling places from identity fraud.

    And some argue that there’s no need to spend a lot of money on this, because voting fraud isn’t a real problem. Even the Heritage Foundation’s 2020 report of “1,285 proven cases of voter fraud” looks a little less dramatic when you consider that there were 161,420,000 registered voters in the United States in 2022. So even if there were, let’s say, 11,000 proven cases of voter fraud, that’s only 0.007% of the total electorate.

    But for now, if you want to vote fraudulently, vote away.

    The Bredemarket Rule of Corporate Tool Adoption

    (12/7: Thanks for catching the typo, Orlando!)

    Whoops, I forgot something.

    Bredemarket hasn’t proposed any rules.

    This may not seem to be a significant gap to you, but it is to me.

    I’ve proposed rules on my prior platforms, but haven’t proposed one from Bredemarket. Here’s a list of some of the “Empoprises Rules” I’ve proposed in the past. My favorite:

    The Phineas-Hirshfield score measures, on a scale of 0 to 100, the probability that someone will ask exactly what the Phineas-Hirshfield score is.

    From https://empoprise-bi.blogspot.com/2012/12/what-is-your-phineas-hirshfield-score.html. The Phineas-Hirshfield score is copyright 2012 by John E. Bredehoft.
    Phineas T. Barnum. By unattributed – Harvard Library, Public Domain, https://commons.wikimedia.org/w/index.php?curid=47588191

    Time for me to make a cryptic LinkedIn post. Although now that I’m sharing the secret here, I’ll have to lower the score to 89.

    Bredemarket’s first rule

    But before I share my revised Phineas-Hirshfield score, I need to share the first Bredemarket Rule, the Bredemarket Rule of Corporate Tool Adoption. (Copyright 2023 Bredemarket.)

    In any organization, the number of adopted tools that perform the exact same function is always in excess of one.

    In other words, if there’s someone in your organization who is using an iPhone, there is someone else in your organization who is using an Android phone.

    Or someone has a Mac, and another person has a Windows computer.

    Or someone has one brand of software, while someone else has the competitior brand.

    Even if an organization dictates that everyone will use a single tool, there will be someone somewhere who will rebel against the organization and use a different tool.

    By Alberto Korda – Museo Che Guevara, Havana Cuba, Public Domain, https://commons.wikimedia.org/w/index.php?curid=6816940

    Three reasons why the Bredemarket Rule of Corporate Tool Adoption is true

    Here is why this rule is true:

    1. Except in very rare circumstances, there are always multiple tools that perform the exact same function.
    2. Except in very rare circumstances (Bredemarket being a counter-example), organizations are made up of multiple people.
    3. In all circumstances, different people have experienced different realities and therefore like different things.

    For example, on Wednesday morning I attended a Product Marketing Alliance-sponsored panel discussion in which one of the panelists mentioned that Asana was a valuable tool that helps product marketers get work done.

    Another panelist was a Monday user.

    Presumably the first panelist was exposed to Asana at one point and liked it, while the second panelist was exposed to Monday and liked it.

    Or, since the panelists were from two different companies, maybe each company standardized on one or the other. Or maybe the departments within their companies standardized on a particular tool, but if you poll the entire company, you’ll find some Monday departments and some Asana departments.

    Multiple tools in a single department

    Even in the same department you may find multiple tools. Let me cite an example.

    • Several of the people who were in the Marketing department of Incode Technologies have since left the company, and I’m working with one of them on a project this week.
    • I had to send a PDF to him, and was also going to also send him the source Microsoft Word document…until I remembered from our days at Incode that he was (and I guess still is) a Google Docs guy.
    • (As I’ve shared previously, I’m not a Google Docs guy except when a client requires it.)

    Even brute force will not invalidate the Rule

    Of course, there are times in which an entire organization agrees on a single tool, but those times never last.

    My mid-1990s employer, Printrak International, was preparing to go public. The head of Printrak determined that the company needed some help in this, and brought several staffers on board who were expert in Initial Public Offerings (IPOs).

    One of these people took the role of Chief Financial Officer, preparing Printrak for its IPO and for two post-IPO acquisitions, one of which profoundly and positively impacted the future of the firm.

    Along the way, he established the rule that Printrak would become a Lotus Notes shop.

    By Ndamanakis – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=126610779

    For those who don’t remember Lotus Notes, it was one of those Lotus-like products that could do multiple things out of the box. And because the CFO was the CFO, he could enforce Lotus Notes usage.

    Until the CFO left a couple of years later to assist another company, and the impetus to use Lotus Notes dropped off significantly.

    And that, my friends, is why my former colleagues in IDEMIA aren’t using HCL Notes (the successor to Lotus Notes and IBM Notes) today.

    So how do you settle the Tool Wars?

    Do you know how you settle the Tool Wars?

    You don’t. It’s an eternal battle.

    In the case of Bredemarket, I can dictate which tools I use…unless my clients tell me otherwise. Then the client’s word is law…unless there’s a compelling reason why my tool should be used instead of the client’s tool. In Bredemarket’s 3+ years of existence, I haven’t encountered such a compelling reason…yet.

    Just be flexible enough to use whatever tool you need to use, and you’ll be fine.

    Explaining the Confusion of Wildebeest

    I’ve been using the word “wildebeest” more often lately. In the Bredemarket blog, on Bredemarket’s LinkedIn pages, on my own LinkedIn page, and even in a job application cover letter.

    For those who don’t know why I’m so hot on wildebeest, let me explain.

    It all started with the dogs

    When I started Bredemarket as a marketing and writing service firm, it stood to reason that I would have to market and write about Bredemarket itself.

    There’s a common phrase for this practice: “eating your own dog food.”

    Another John (a Mr. Carson) took “eating your own dog food” literally. From NBC. This picture from Madly Odd, https://madlyodd.com/johnny-carson-alpo-dog-food-ad/

    It’s a VERY common phrase.

    And that’s a problem, because people who eat their own dog food sound just like everybody else.

    So I moved to iguanas

    It’s important to differentiate yourself from the competition. Trust me on this.

    So I stopped talking about eating my own dog food, and when I set my initial goals for 2021 in December 2020, one of my goals was “eat my own iguana food.”

    But then I moved on

    But for some reason the iguana emphasis left me cold, and I quietly pivoted back to mammals a little over a month later.

    Black wildebeest. By derekkeats – Flickr: IMG_4955_facebook, CC BY-SA 2.0, https://commons.wikimedia.org/w/index.php?curid=14620744

    Now I don’t always eat my own wildebeest food myself in this regard. I’ve previously noted that my Empoprise-NTN blog isn’t updated regularly…

    From https://bredemarket.com/2021/01/25/three-ways-to-prove-to-your-customers-that-your-firm-is-an-ongoing-viable-concern/

    (Which reminds me; time to update Empoprise-NTN again. If Buzztime even exists any more.)

    The following month I made it official in “When wildebeests propose.”

    You’ve heard the saying about eating your own dog food. That statement bored me, so I started talking about eating your own iguana food. Eventually I tired of iguanas and pivoted to wildebeests.

    From https://bredemarket.com/2021/02/09/when-wildebeests-propose/

    And for over 2 1/2 years I’ve continued to focus on the majestic wildebeest, both singly and in confusion (the correct term for a group of wildebeest). Let’s face it: how many other marketing and writing experts are talking about wildebeest? It’s my own little distinctive thingie.

    The problem with wildebeest

    But now I’m asking myself whether this is a GOOD distinction. After all, the common definition of “confusion” is NOT a positive one. Unless you’re a New Order fan.

    From https://www.youtube.com/watch?v=c_L_-CKg6pw

    So perhaps I’ll retire the wildebeest for something new that more closely reflects Bredemarket’s differentiators:

    I help firms win by explaining why the firm serves its customers, focusing on customer needs, and highlighting benefits.

    Yes, those are the same differentiators that I currently include in my personal LinkedIn profile. But after all, Bredemarket is a one-person operation.

    sin, a one-man band in New York City. By slgckgc – https://www.flickr.com/photos/slgc/8037345945/, CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=47370848

    If you have an idea of something that is better than a dog, an iguana, or a wildebeest, post it in the comments.

    Stand Out From the Identity Crowd

    A note to those of you in the identity/biometrics industry.

    From Sandeep Kumar, A. Sony, Rahul Hooda, Yashpal Singh, in Journal of Advances and Scholarly Researches in Allied Education | Multidisciplinary Academic Research, “Multimodal Biometric Authentication System for Automatic Certificate Generation.”

    Gartner has released a new report, “Emerging Tech: Security — How to Stay Relevant as an Identity Verification Vendor.” Because it’s better to be relevant than to be irrelevant.

    Anthropological Alphonse Bertillon. By Jebulon – Own work, stitching of archives of Service Regional d’Identité Judiciaire, Préfecture de Police, Paris., CC0, https://commons.wikimedia.org/w/index.php?curid=37546591

    When co-author Akif Khan promoted the report on LinkedIn, he made the following comment:

    Identity verification (which Gartner defines as the ID-plus-selfie process) is arguably the topic that I get the most inquiry calls about, but I also cover >70 vendors in this space. My end-user clients struggle to differentiate between them, and as the market evolves, it will become tougher to stand out in the crowd.

    From LinkedIn.

    C. Maxine Most of Acuity Market Intelligence advocates a similar message about the need to stand out. She provides the following to her clients:

    Innovate, differentiate, and outmaneuver the competition

    From https://www.acuitymi.com/.

    It is in the vendors’ interest to keep the identity market from becoming a commodity market. But how can vendors keep the market from becoming commoditized when (almost) everyone is sharing the exact same message?

    • Why are you in business? To provide trust.
    • What do you do? Trust stuff.
    • How do you do this? Trust us.

    If all the identity companies are peddling the exact same thing, the cheapest vendor wins.

    Which is why certain vendors strive to do things differently.

    And I’m here to help.

    I ask my clients questions before I start work so that we can craft the client’s unique message. Read Bredemarket’s e-book “Seven Questions Your Content Creator Should Ask You” for more details.

    Are you ready to craft a message that looks just like everybody else? Well, I CAN’T help you with that.

    Are you ready to craft your own message? Then let me tell you how Bredemarket CAN help you do this.

    Identification Perfection is Impossible

    (Part of the biometric product marketing expert series)

    There are many different types of perfection.

    Jehan Cauvin (we don’t spell his name like he spelled it). By Titian – Bridgeman Art Library: Object 80411, Public Domain, https://commons.wikimedia.org/w/index.php?curid=6016067

    This post concentrates on IDENTIFICATION perfection, or the ability to enjoy zero errors when identifying individuals.

    The risk of claiming identification perfection (or any perfection) is that a SINGLE counter-example disproves the claim.

    • If you assert that your biometric solution offers 100% accuracy, a SINGLE false positive or false negative shatters the assertion.
    • If you claim that your presentation attack detection solution exposes deepfakes (face, voice, or other), then a SINGLE deepfake that gets past your solution disproves your claim.
    • And as for the pre-2009 claim that latent fingerprint examiners never make a mistake in an identification…well, ask Brandon Mayfield about that one.

    In fact, I go so far as to avoid using the phrase “no two fingerprints are alike.” Many years ago (before 2009) in an International Association for Identification meeting, I heard someone justify the claim by saying, “We haven’t found a counter-example yet.” That doesn’t mean that we’ll NEVER find one.

    You’ve probably heard me tell the story before about how I misspelled the word “quality.”

    In a process improvement document.

    While employed by Motorola (pre-split).

    At first glance, it appears that Motorola would be the last place to make a boneheaded mistake like that. After all, Motorola is known for its focus on quality.

    But in actuality, Motorola was the perfect place to make such a mistake, since it was one of the champions of the “Six Sigma” philosophy (which targets a maximum of 3.4 defects per million opportunities). Motorola realized that manufacturing perfection is impossible, so manufacturers (and the people in Motorola’s weird Biometric Business Unit) should instead concentrate on reducing the error rate as much as possible.

    So one misspelling could be tolerated, but I shudder to think what would have happened if I had misspelled “quality” a second time.

    Announcing a WhatsApp Channel for Identity, Biometrics, ID Documents, and Geolocation

    From NIST.

    I’ve previously stated that Bredemarket is present on a bunch of social platforms.

    Well, if you’re a subscriber to the Bredemarket mailing list, or to the Bredemarket Threads account, then you already know what I’m about to say. Bredemarket is now on one additional social platform…kinda sorta.

    I’ll explain:

    • What WhatsApp channels are.
    • How this impacted me.
    • Most importantly, why this may, or may not, impact you.

    (Long-time readers of the Bredemarket blog see what I did there. In reverse.)

    What are WhatsApp channels?

    Meta, the company that owns Facebook, Instagram, WhatsApp, Threads, and half the known universe, wants to keep people on those social platforms. They can check out any time they like, but they can never leave.

    Scanned by Wikipedia user David Fell from the CD cover, Fair use, https://en.wikipedia.org/w/index.php?curid=14790284

    So now WhatsApp, the service that was originally intended for PRIVATE communications between people that knew each other’s phone numbers, is now your latest source for Kardashians news. Seriously; there are millions of people who follow the Daily Mail’s “Kardashians News” channel.

    No, this is NOT a Kardashian (yet), but this is something that @cultpopcult would post (with a misattribution) so I’m doing it myself. By Office of Congressman Greg Steube – https://twitter.com/RepGregSteube/status/1451579098606620673, Public Domain, https://commons.wikimedia.org/w/index.php?curid=112088903

    Some people are kinda sorta breathless about this, if you take the IMM Institute’s LinkedIn article “WhatsApp Channels: Revolutionising Business Communication” as evidence.

    WhatsApp, a widely used messaging platform, has recently introduced a revolutionary feature known as WhatsApp Channels. This innovation empowers businesses to thrive by effectively communicating with a broader audience, sharing vital information, and engaging with customers in a more personalised and efficient manner.

    From LinkedIn.

    Revolutionary? Frankly, this isn’t any more revolutionary than the similar broadcasting feature in Instagram, with one important difference: not everyone can create an Instagram channel, but anyone with WhatsApp channel access can set up their own channel.

      Which got me thinking.

      How I was impacted by WhatsApp Channels

      I began mulling over whether I should create my own WhatsApp channel, but initially decided against it. Bredemarket has enough social media properties already, and the need to put Bredemarket stuff on WhatsApp is not pressing (the “100” WhatsApp group members get enough Bredemarket stuff already). The chances of someone ONLY being on WhatsApp and not on ANY other channel are slim.

      I’d just follow the existing WhatsApp channels on identity, biometrics, and related topics.

      But I couldn’t find any.

      So I created my own channel last Friday entitled “Identity, Biometrics, ID Documents, and Geolocation.”

      Why should you care?

      Why should you care about my WhatsApp identity channel? Maybe you SHOULDN’T.

      If you don’t use WhatsApp, ignore the WhatsApp channel.

      If you use WhatsApp but have other sources for identity industry information (such as my Facebook group/LinkedIn page), ignore the WhatsApp channel.

      But if you love WhatsApp AND identity, here is the follow link for “Identity, Biometrics, ID Documents, and Geolocation.”

      https://whatsapp.com/channel/0029VaARoeEKbYMQE9OVDG3a

      Geolocation Identifies People (Who Don’t Want To Be Identified)

      From https://nextdoor.com/p/ks5wW5n_csJB?utm_source=share&extras=NDk4MjIxOTI%3D

      A person in Upland, California posted this on the local NextDoor. While anecdotal and not statistical, in this case the geolocation capabilities of a device (in this case AirPods) identified someone in possession of a stolen vehicle.

      https://nextdoor.com/p/ks5wW5n_csJB?utm_source=share&extras=NDk4MjIxOTI%3D

      Ransomware Doesn’t Celebrate a Holiday

      Government Technology posted an article on a ransomware attack that affected Ardent Health Services facilities in multiple U.S. states, including Texas, Idaho, New Mexico, Oklahoma, New Jersey, and Kansas over Thanksgiving Day, requiring some ambulances to be diverted and some services suspended.

      By Mangocove – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=133200606

      Government Technology observed:

      The Thanksgiving timing of the attack is unlikely to be coincidental. Hackers are believed to see holiday weekends as an opportunity to strike while network defenders and IT are likely “at limited capacity for an extended time,” the Cybersecurity and Infrastructure Security Agency (CISA) has noted

      From https://www.govtech.com/security/ransomware-impacts-health-care-systems-in-six-states

      And it’s not like the hackers are necessarily having to pass up on their turkey dinner. Few if any holidays are universal, and over 7 billion people (including many hackers) did NOT celebrate Thanksgiving last Thursday.

      Does this mean that companies need to INCREASE security staff during holiday periods?

      I’m Taking Small Business Saturday Off

      Although Bredemarket is a small business, I’m not doing anything for Small Business Saturday.

      Why not? Because Bredemarket is a B2B business and not a B2C business, most if not all of my clients have been closed since Wednesday afternoon enjoying the U.S. Thanksgiving holiday.

      Breakfast.

      So I’m celebrating a mostly non-business Saturday. Instead of filming Bredemarket content, I enjoyed a not-so-nutritious breakfast (skipping Starbucks AND Del Taco) and bought TWO birthday cards for my wife. (At 50¢ each, that’s an entire dollar!)

      Big birthday spender!

      See everyone Monday.