top of page

2 FREE DOWNLOADS: Count the Votes + Mail-in Ballots Board Games

Just in time for election season comes two new hit board game the whole family will love! These game are 100% playable. You can play them with your kids (and your county clerk). Who knows... they might learn a thing or two! The first voter to get their vote counted without it being flipped, cancelled, or stolen is the winner.



Count the Mail-in Ballots Board Game Vulnerabilities

Each blue space in the vote by mail version of the board game is a risk the player is trying to avoid. They all have consequences for landing on that space, such as moving backwards or skipping a turn.

Here is a list of each vulnerability shown on the board game, with some additional explanation or information.

Extra Ballots: Keeping track of the ballots issued and created should be simple, and all should be accounted for. In WA, when comparing the list of people the ballot printer received to the people who turned in a ballot, there were large discrepancies. One county had discrepancies in the tens of thousands. The county has not provided a record for where those people’s ballots originated. Every extra fraudulent ballot voids an eligible voter’s legal ballot.

Mail Thief: Packages and other mail are lost and stolen all the time. Remember, ballots have

value. They distribute the power. Some people can never get enough of that.

Post Office accident: Please see “mail thief”

Ballot switched or altered: When our ballots aren’t personally delivered by the voter, we can never be certain it was tampered with or not. Through USPS there is plenty of unsupervised access to the ballots. Who knows what they have going on there, or who may have been

able to corrupt the process, or even build it that way intentionally.

Drop box vandalized: Often times there are not cameras on drop boxes, and even ones that do have them may lack quality or public access. There are reports which document the notes and details of each drop box pickup. If there are ballots being transported anywhere, there should be chain of custody records to accompany it. There can be notes of broken seals, damaged boxes, number of ballots, and other interesting information on there. The problem is, it doesn’t appear any of those issues are looked into any further at that point.

Internet connection: We all know what this would mean. Remote access, manipulation, vulnerabilities galore.

Secure storage: It sounds good, sure. But it is actually used against us to prevent us from disclosure of certain election records. Secure storage must be maintained for period, and we can only open it under court order, or a couple other things that we cannot gain access through.

Scanner alters ballot image: Please see this UNCLEAR BALLOT report.

Sent to adjudication: Adjudication is when the machine or a human looks at the image and determines the voter’s intent, then records that vote accordingly. Or lots of improperly recorded ballot selections.

Tabulator algorithm: This is the ultimate worst nightmare. (Hence the reason it sets you so far back in the game.)

Random audit materials not chosen at random: “Audits” only consider a small portion of the total ballots cast in an election. If someone knew which ballots were fraudulent, or anything like that, they could ensure those were never selected for an audit.

Fake audit: What you consider an audit is probably much different than what they are calling

an audit. We’ll leave it at that.

Late vote dumps: These are the middle of the night ballots and after the deadline adjustment

periods. Similar to what we all woke up to on the morning of November 4th, 2020.


It would be hard to design an election system with more vulnerabilities. #BadByDesign

Recent Posts

See All

Vote in person on election day! Do NOT absentee vote, and if you are required to do so, drop off your ballot in person at your county...

bottom of page