#31 HACKING DEMOCRACY
Dr. Stephen Phinney: Cybercriminals, driven by various motives - political agendas to financial gain, and at times, international conspiracies to eliminate political figures & their influence.
In today’s digital age, the term “hacker” has become synonymous with a shadowy underworld of cybercriminals who exploit vulnerabilities for personal, cultural or political gain. These modern-day hackers, driven by greed and malice, infiltrate systems, steal sensitive information, and wreak havoc on individuals and organizations alike. Their actions not only compromise national, corporate, and personal privacy and security but also erode trust in the very technologies that are meant to enhance our lives like Substack. The depravity of these individuals lies in their willingness to cause widespread harm, often with little regard for the consequences of their actions and are rarely caught and indicted.
POLITICAL HACKING
Human nature, with its fallen condition, often reveals a propensity towards corruption. Since humanity is born into the complexities of the evil enemy of God - Satan, the bent toward corruption is an easy “hack” by evil influencers. This inclination can be traced back to the innate desires for power, wealth, and control, which can sometimes overshadow moral and ethical considerations.
Throughout history, we have seen countless examples of individuals and institutions succumbing to corrupt practices driven by self-interest, greed, and political gain. This tendency is not limited to any one culture or era; it is a universal aspect of the human condition of those who do not possess the indwelling Life of Yeshua/Jesus - meaning they have no moral compass. Despite the potential for goodness and altruism, the allure of personal gain can lead individuals down a path of dishonesty and exploitation. Recognizing this bent in human nature is crucial for fostering accountability and integrity in our personal and collective endeavors, particularly in a voting season.
Hate Motivates Corruption
Hate, with its powerful and destructive force, can be a significant motivator for politically corrupt decisions. When individuals harbor deep-seated animosity or resentment toward certain political candidates, it can cloud their judgment and lead them to act in ways that are unethical, harmful, and, at times, evil. This intense emotion can drive people to seek revenge, undermine others, or gain power at any cost, often disregarding moral, legal, and spiritual boundaries. Hate can distort one’s sense of right and wrong, making it easier to justify dishonest or exploitative actions that frequently affect the masses. In the grip of hatred, individuals may prioritize their desire to harm or dominate over the well-being of others, leading to decisions that perpetuate corruption and injustice. Recognizing the corrosive impact of hate is essential for advancing a more just and compassionate national society.
In light of our topic, Hacking Democracy, hatred is not always the motive. The hackers themselves are typically motivated by a paid arrangement. Basically, their cyber skills are hired by a group OF hatred. However, hackers DO need to be corrupt and depraved in nature.
The method of payment is called Five Layer Security.
In this method, the original group of hate conducts the payoff through five separate channels of payment. The person who is hired on the receiving end frequently is what is called a patsy. A patsy can be anyone from a teenager who is in need of a cause to a skilled corporate hacker. This method erodes into a conspiracy, which can go on for generations. Ultimately, the individual/group responsible completely avoids indictment. Some call it the perfect crime.
In an era where democracy hinges on the integrity of the electoral process, hackers’ interference in voting systems poses a grave threat.
One of the keyways to conspire a political conspiracy is through hacking the infrastructure of a voting system - starting with the candidates who are up for election. An example of this is Nixon’s Watergate. To this day, the original engineers were never caught, and only two of the layers within the five layers suffered consequences. Another case is the assassination of President John F. Kennedy, which remains a conspiracy to date. With the Dark Web being a reality, catching the culprit is next to impossible.
These cybercriminals, driven by various motives ranging from political agendas to financial gain, and at times, international conspiracies to eliminate political figures, exploit vulnerabilities in voting infrastructure to manipulate outcomes, steal sensitive data, and undermine public trust. Their actions not only jeopardize the fairness of elections but also erode the very foundation of democratic societies, which their efforts are “coined” as Hacking Democracy. The depravity of these hackers lies in their willingness to disrupt the democratic process, often with far-reaching and devastating consequences that are frequently enacted by nations who wish to stop a politician who will resist their political agenda.
Hackers can interfere with political management in several ways, causing significant disruptions, voter attitudes, and financial losses. Here are some common methods:
Social Engineering: Hackers manipulate voter campaign employees into revealing sensitive information or performing actions that compromise internal security. This can include phishing attacks, where employees are tricked into providing login credentials or other confidential data - not to mention, since “everyone can be bought,” frequently an exchange of money for data becomes common.
Password Attacks: By guessing or cracking passwords through advanced AI algorithm platforms, hackers can gain unauthorized access to campaign internal data systems. Weak or reused passwords make it easier for hackers to infiltrate networks, steal data, and sell it to the highest bidder.
Malware: Hackers use malicious software to infect corporate systems, which can lead to data theft, system damage, or even ransom demands. Malware developed by skilled hackers can be introduced through email attachments, infected websites, or compromised software updates.
Exploitation of Software Vulnerabilities: Hackers exploit weaknesses in software to gain access to corporate networks. This can involve exploiting unpatched software or using zero-day vulnerabilities that are unknown to the software vendor - meaning the largest and “most trusted” vendors can be infiltrated and used against their users.
Ransomware Attacks: Hackers encrypt candidate corporate data and demand a ransom for its release. This can disrupt the campaign operations and lead to significant voter fraud and financial losses. Some high-level hackers are well equipped at stealing digital dollars and transfer them to the engineers hidden behind the layers of the Dark Web’s deceptions/owners.
Data Breaches: Hackers steal sensitive information, such as voter data, financial donation records, or intellectual property, such as religious, political, and cultural beliefs the campaign office has recorded. This can result in stealing votes by selling them to the campaigns political opponent. Such an incident occurred from 2007-2009 when the leading social media giant sold its member data to a particular Presidential candidate.
THE DIGITAL POLITICAL WORLD
Long gone are the days when voting was a straightforward process, marked by paper ballots and manual counting.
In today’s complex digital landscape, the methods of voting have evolved, or should I say, devolved, dramatically, bringing with them a host of new challenges, opportunities for cybercrimes, and vulnerabilities. The simplicity of yesteryears has been replaced by sophisticated electronic systems, online voting platforms that open the doors to international hacking and weaken security protocols resulting in the platform being “up for grabs” by depraved marketeers.
While these advancements aim to enhance efficiency and accessibility, they also open the door to potential cyber threats and manipulation. The transition from traditional to modern voting methods reflects the broader technological shift in our present Dark Web society, highlighting both the intruders and the perils that come with it.
A recent example is the Trump campaign head office hack!
It is no news as to the level of hatred and animosity that Presidential candidate Donald Trump faces - twenty-four hours a day. It is said that no man in American history has been hated more. This might be true, however, the real war he faces is with global politicians who despise his policies on deep-state control and his compelling defense of the United States Constitution and the organic beliefs of America’s founding fathers. He knows this and he knows that those who hate America’s founding principles based on a representative democracy will do anything possible to keep him out of office.
Recently, the Trump campaign office confirmed a cybercrime, detailing a hacker steeling documents from their data system. Trump’s team believes Iran may have been behind the hack but has not released their inside information on the perpetrator.
Politico reports:
The campaign blamed “foreign sources hostile to the United States,” citing a Microsoft report on Friday that Iranian hackers “sent a spear phishing email in June to a high-ranking official on a presidential campaign.” Microsoft did not identify the campaign targeted by the email and declined to comment Saturday. POLITICO has not independently verified the identity of the hacker or their motivation, and a Trump campaign spokesperson, Steven Cheung, declined to say if they had further information substantiating the campaigns’ suggestion that it was targeted by Iran.
Well, this is another mystery that may never be solved, minimally made known to the public due to “national security” reasons. What we do know is hate groups will go to any measure possible to stop a candidate from reaching voter success. Since there are plenty of anti-representative-democracy combatants in the world today, we can expect more of the same in future years.
In the ever-devolving digital world, adhering to Biblical ethics remains a steadfast guide for doing the right thing in Christ.
The principles of honesty, integrity, and love for one’s neighbor, as taught in Scripture, are just as relevant online as they are in our daily lives. Whether it’s respecting others’ privacy, avoiding deceitful practices, or using technology to uplift and encourage, our actions in the digital realm should reflect our commitment to God’s Biblical mandates. By embracing these timeless TRUTHS, we can navigate the complexities of the digital age with a clear conscience, knowing that we are honoring God and serving others with righteousness and TRUTH.
Do as I do! Vote by paper and have poll workers print you a copy!
2025 PREDICTIONS
Within my other Substack channel, The End Times Chronicles, I will be publishing my guesstimates of how the Lord’s Biblical prophecies could play out in 2025. To guard against radical readers, this is our only paid subscriber’s venue. Join our year long series and learn more about how the Holy prophecies unfold in modern times.
Dr. Stephen Phinney
Mark and I would deeply appreciate a small financial gift to assist us in our writing endeavors. All donations are used to advance IOM America’s mission. DONATE
Identity Politics | Co-writer: Judge Mark T. Boonstra