While a majority of states have blocked President Trump’s order to hand over voting data, one entrepreneur on the dark web is looking to profit off of their refusal.
During the 2016 election, Americans were forced to face some disturbing realities surrounding the efficacy of the electoral process, particularly as it pertained to the democrats’ use of fraudulent voter data. Not only was it simple to realize that the democrats’ incessant denial of the existence of voter fraud was an ineffective coverup for their employment of the tactic, but the rampant abuse of voting privileges by illegal and undocumented immigrants occurred by the millions. Case after case of long-dead, democratic zombie voters came to light before, during, and after the election as well, painting a picture of a liberally-led scheme to thwart Trump using every trick imaginable.
Now, as the President has been repeatedly rebuked in asking for states’ individual voter data, in order to get to the bottom of this meddling, one entrepreneurial dark web internet user has posted a classified ad looking to sell at least 40 million voters’ personal data.
“The data was discovered by Jonathan Tomek, the director of threat research at LookingGlass Cyber Solutions, a cybersecurity services firm. The ‘dark web’ refers to a part of the internet accessible only via a special internet browser that allows for semi-anonymity. The voter data for sale includes first, last, and middle names, voter ID numbers, birthdates, voter status, party affiliation, and addresses for some voters in Arkansas, Colorado, Connecticut, Delaware, Florida, Michigan, Ohio, Oklahoma, and Washington state.“Tomek told Dark Reading that the seller, known only as ‘Logan,’ had already sold at least two copies of the databases earlier this week—the ones in Arkansas and Ohio—for only $2 each, although the identity of the purchaser is unclear. The low price indicates that ‘financial gain is not the primary reason for the activity,’ Dark Reading wrote. ‘Logan’ likely obtained the databases through open records requests to states or pulling data directly from state election websites. Another strategy is known as social engineering, in which someone is talked into providing access to otherwise restricted material by an individual who pretends to be someone they are not—in this case a candidate, election official, or representative from a political party.”