Politics and Technology

Third-Party Voter Persuasion

Persuasion should be public, attributable, and contestable — not covert, automated, and unaccountable.

Liberty Scorecard: Rights • Privacy • Trust


The Power of the 3rd Party Voter (2026 Update)

Third-party candidates are not a “wasted vote.” In a close race, voters who reject the duopoly can be decisive — not just by the raw margin, but by changing what issues candidates have to address to earn support.

But there’s a second, less visible reality in modern elections: a growing share of persuasion is no longer delivered by the candidate, the party, or even local organizers. It’s delivered by third-party persuasion systems — data brokers, ad exchanges, advocacy networks, and algorithmic platforms — that can shape what voters see while operating outside the transparency most voters assume exists.

  • Your vote isn’t wasted when you vote your principles.
  • Your agency is weakened when persuasion becomes invisible, personalized, and unaccountable.

What’s changed since 2020

In 2020, many voters were debating the same question I still hear today: “Can a third-party vote matter?” Yes. What’s changed is how elections are influenced at scale.

  • Influence is more automated: AI-assisted targeting and rapid message iteration are now routine tools in political persuasion.
  • Influence is more distributed: “Issue ads,” influencers, advocacy groups, and shadow messaging can move faster than campaigns can respond.
  • Influence is more data-driven: Commercial surveillance and data brokerage enable profiling that most voters never knowingly consented to.

This isn’t a left-right complaint. It’s a transparency and accountability problem.


How third-party persuasion works today

Modern third-party persuasion systems tend to follow a pipeline:

  • Third-Party Voter Persuasion

    Persuasion should be public, attributable, and contestable — not covert, automated, and unaccountable.

    Liberty Scorecard: Rights • Privacy • Trust


    The Power of the 3rd Party Voter (2026 Update)

    Third-party candidates are not a “wasted vote.” In a close race, voters who reject the duopoly can be decisive — not just by the raw margin, but by changing what issues candidates have to address to earn support.

    But there’s a second, less visible reality in modern elections: a growing share of persuasion is no longer delivered by the candidate, the party, or even local organizers. It’s delivered by third-party persuasion systems — data brokers, ad exchanges, advocacy networks, and algorithmic platforms — that can shape what voters see while operating outside the transparency most voters assume exists.

    • Your vote isn’t wasted when you vote your principles.
    • Your agency is weakened when persuasion becomes invisible, personalized, and unaccountable.

    What’s changed since 2020

    In 2020, many voters were debating the same question I still hear today: “Can a third-party vote matter?” Yes. What’s changed is how elections are influenced at scale.

    • Influence is more automated: AI-assisted targeting and rapid message iteration are now routine tools in political persuasion.
    • Influence is more distributed: “Issue ads,” influencers, advocacy groups, and shadow messaging can move faster than campaigns can respond.
    • Influence is more data-driven: Commercial surveillance and data brokerage enable profiling that most voters never knowingly consented to.

    This isn’t a left-right complaint. It’s a transparency and accountability problem.


    How third-party persuasion works today

    Modern third-party persuasion systems tend to follow a pipeline:

  • How Election Results Are Verified

    Elections work best when results can be independently verified after voting is complete.

    This overview explains how verification works today and how it can be strengthened — without changing how people vote.


    How voting generally works

    • Voters cast secret ballots, usually on paper

    • Ballots are counted using scanners

    • Results are reported and certified

    Paper ballots provide physical evidence of voter intent.


    Why verification matters

    Counting votes involves software, procedures, and people.
    Verification ensures that:

    • Errors are detected

    • Mistakes can be corrected

    • Outcomes reflect voter intent

    Without verification, confidence depends on trust alone.


     

  • How We Protect Your Vote

    How We Protect Your Vote — With Proof, Not Promises

    You deserve to know your vote was counted correctly — and to have evidence that backs it up.

    That’s why strong elections don’t rely on blind trust in machines or officials.
    They rely on paper ballots, real audits, and transparency that anyone can check.


    What already works

    • You vote in person

    • Your ballot is private

    • Paper ballots are used in most places

    These are strengths worth protecting.


    Where confidence breaks down

    Even when elections are honest, doubt grows because:

    • Computer files can be changed quietly

    • Audits aren’t always visible or easy to understand

    • Voters are told “trust the system” without being shown proof

    That’s not good enough — for any voter.


     

  • How Voting Works — and How We Can Make It More Trustworthy

    A Plain-Language Guide for Voters


    The Big Question

    How do we know election results are correct — even if something goes wrong?

    Good elections don’t rely on blind trust.
    They rely on evidence that can be checked after the fact.


    How Most Elections Work Today

    https://verifiedvoting.org/wp-content/uploads/2020/08/OVO_diagram-768x622-2.jpghttps://www.afandpa.org/sites/default/files/styles/wide_large/public/2024-08/PaperBallotsProcess.jpg?itok=w-mBe1Gthttps://www.nist.gov/sites/default/files/images/2020/09/09/security-of-election-night-image01.png
    You vote ↓ Your ballot is counted ↓ Results are reported

    In many places:

    • You vote on paper

    • A scanner counts the ballot

    • Results are added up by a computer system

    • Officials certify the outcome

    What works well

    • Paper ballots exist

    • Votes are secret

    • Elections are run locally

    Where doubts come from

    • Most people never see what happens after Election Day

    • Computer files can be changed without leaving obvious traces

    • Audits may be limited or hard to understand

    Even when elections are honest, lack of visible proof creates doubt.


    The Key Idea: Evidence You Can Check

    Good systems answer three questions:

    1. Did the ballot match the voter’s intent?

    2. Was it counted correctly?

    3. Can changes be detected later?

    Paper ballots answer the first question.
    Audits answer the second.
    Transparency answers the third.

     

     

     

     


    A Stronger, More Transparent System

    https://elections.cdn.sos.ca.gov/images/risk-limiting-audit.pnghttps://csdl-images.ieeecomputer.org/trans/tq/2024/04/figures/schne1-3327859.gif
    You vote on paper ↓ You verify the ballot ↓ Ballot is scanned ↓ Random audits compare paper to results ↓ Results are certified ↓ A public record shows nothing was changed

    What Stays the Same (Important)

    This does not change:

    • How you vote

    • Ballot secrecy

    • In-person voting

    • Local control of elections

    You still vote the same way.
    Your ballot stays private.


    What Improves

    1. Paper ballots really matter

    • The paper ballot is the final authority

    • If there’s a question, officials check the paper — not just computers


     

  • A Government That Works in the Real World

    Americans don’t care about buzzwords. They care about whether the systems they rely on actually work.

    They care about payments that clear on time.
    Records that don’t disappear or get altered.
    Infrastructure that doesn’t fail quietly until it becomes a crisis.
    And privacy that doesn’t require surrendering every personal detail just to participate in daily life.

    In 2026, the question facing government isn’t whether technology should be involved in these systems. It already is. The question is whether we design modern systems deliberately—or keep patching outdated ones until they fail.

    Infrastructure, Not Ideology

    Too many political debates treat technology as ideology. Pro-tech versus anti-tech. Centralized versus decentralized. Public versus private.

    That framing misses the point.

    Technology is infrastructure. And like roads, power grids, and water systems, good infrastructure should be:

    • Reliable

    • Transparent

    • Secure

    • Resilient

    • Hard to abuse

    Modern digital systems can help deliver that—but only if policymakers understand how they actually work.

    Faster, Fairer Economic Systems

    Many everyday economic frustrations come from outdated systems:

    • Payments that take days to settle

    • Small businesses paying excessive transaction fees

    • Financial processes that rely on layers of intermediaries

    Modern digital infrastructure can reduce friction, lower costs, and increase reliability without eliminating oversight or consumer protections.

    This isn’t about replacing the dollar or destabilizing markets. It’s about ensuring that the systems Americans already depend on are efficient, competitive, and resilient in a digital economy.

    Transparency Without a Surveillance State

    People want accountability in government and finance—but they don’t want constant surveillance.

    That’s not a contradiction.

    It’s possible to design systems where records are transparent and auditable without tracking every individual by default. Where wrongdoing can be investigated without collecting everyone’s data “just in case.”

    A free society doesn’t require secrecy—but it also doesn’t require treating every citizen like a suspect.

    Resilient Systems Don’t Fail Quietly

    One of the biggest risks in modern governance is silent failure.

    Outdated systems often mask problems until they become emergencies—whether that’s financial instability, infrastructure breakdowns, or data breaches. Modern systems can be designed to surface issues earlier, make failures visible, and limit cascading damage.

    Resilience isn’t about pretending failure won’t happen. It’s about making sure failure doesn’t become catastrophic.

    Smarter Rules, Not Bigger Bureaucracy

    Good governance isn’t about choosing sides in a tech debate. It’s about setting clear rules that focus on outcomes:

    • Protect consumers

    • Reduce systemic risk

    • Encourage competition

    • Preserve civil liberties

    • Keep innovation domestic rather than offshore

    That requires precision, not blanket bans or unchecked adoption.

    When rules target the wrong layer of a system, they create paperwork without protection. When they target real points of control and risk, they work.

    Why This Matters for 2026

    By 2026, digital infrastructure will shape how money moves, how records are kept, and how trust is established—whether lawmakers engage with it or not.

    The choice isn’t between embracing technology or rejecting it.
    The choice is between understanding systems or being governed by them without oversight.

    Americans deserve leadership that focuses on results, not slogans. On systems that work, not talking points.

    That’s the approach I bring to public service: modern solutions grounded in accountability, resilience, and individual liberty—without turning technology into a political identity.

  • PVTL — Technical Report

    PVTL-X: Paper-Verified, Transparency-Log Voting System

    A Research-Grade Specification for Evidence-Based In-Person Elections

    Status: Draft for discussion
    Intended Audience: Election technologists, security engineers, standards bodies, independent researchers, election officials
    Keywords: software independence, risk-limiting audit, transparency log, Merkle tree, device attestation, evidentiary integrity


    Executive Summary

    PVTL-X specifies an in-person voting system architecture where voter-verified paper ballots remain the authoritative record, while cryptographic mechanisms provide tamper-evident integrity and public verifiability of election artifacts (e.g., ballot definitions, cast vote records, results reports, audit evidence). PVTL-X is not internet voting and does not store votes on a blockchain. Instead, it uses a Certificate Transparency (CT)-style append-only Merkle log (“Transparency Log”) to detect post-election alteration and to provide a consistent, auditable timeline of election operations.

    PVTL-X further specifies interfaces and formats to support ballot-level comparison Risk-Limiting Audits (RLAs), enabling statistically sound verification of outcomes against paper ballots. The specification emphasizes offline-first operation, separation of duties, threshold control for sensitive keys, and explicit defenses against equivocation by log operators.


  • Encrypted, Consent-Driven Data Sharing: A Framework for Innovation Without Exploitation

    Abstract

    Modern economies run on data, yet individuals rarely control how their data is collected, shared, monetized, or retained. This fuels two competing failures: (1) valuable data is “locked away” in silos due to privacy, liability, and interoperability constraints; and (2) valuable data is extracted and exploited without meaningful consent, often through opaque brokerage markets and dark-pattern interfaces. This paper proposes an encrypted data-sharing framework centered on granular, revocable consent and privacy-preserving computation. Individuals can authorize specific uses, restrict downstream sharing, and revoke access with practical enforcement mechanisms—while researchers, startups, and public agencies can still innovate via secure access, computation over encrypted data, and standardized permissioning. The approach aligns with established privacy principles and legal rights to withdraw consent, while using modern cryptography and standardized authorization protocols to make “you own your data” technically enforceable.

  • Permitting & Licensing Reform (Housing, Trades, Small Business)

    AI-assisted review, standardized digital submissions, and cryptographic license verification to cut delays, lower costs, and reduce barriers to work

    Abstract

    Permitting and licensing bottlenecks function as “hidden taxes” on housing and small business formation. Long approval timelines raise project soft costs, increase uncertainty, and delay housing supply—worsening affordability. Recent empirical work suggests that shortening regulatory approval timelines can materially increase housing production by pulling completions forward in time. SSRN+1 At the same time, fragmented occupational licensing regimes limit labor mobility across states and can restrict entry into trades—constraining the workforce needed to build housing and start businesses. whitehouse.gov+2U.S. Department of the Treasury+2 This paper proposes a pragmatic “digital-first” reform package: (1) standardized digital submissions with structured data, (2) AI-assisted pre-check and plan review support to reduce preventable rework, and (3) cryptographically verifiable professional credentials to enable faster, privacy-preserving cross-jurisdiction license verification.

  • Border & Port Security Without Mass Surveillance

    Securing Trade, Travel, and the Nation—Without Turning Inward on Its Own Citizens

    Executive Summary

    The United States faces a growing contradiction at its borders and ports of entry. Cargo volumes are rising, supply chains are under constant pressure, and transnational criminal networks exploit congestion and outdated inspection models. At the same time, domestic surveillance authorities have quietly expanded inward—often justified in the name of border security—raising serious constitutional and civil-liberty concerns.

    This paper proposes a different approach: border and port security that is technologically advanced, threat-focused, and privacy-preserving by design. By using AI-driven sensor fusion, object-level anomaly detection, and non-biometric risk scoring, the U.S. can harden its borders without constructing a permanent domestic surveillance apparatus.

    Security does not require watching everyone. It requires detecting the right threats—early, accurately, and lawfully.

  • Cyber-Resilient Energy & Utilities

    A research brief for the campaign website (with references) and a direct map back to voter-facing issues

    Abstract

    U.S. utilities—electric power, drinking water, wastewater, and natural gas—have become high-value targets for ransomware and disruptive cyber operations. Modern utility operations depend on interconnected IT/OT (information technology / operational technology) systems, remote access, and distributed assets that expand the attack surface. The strategic risk is no longer limited to data theft: cyber incidents can disrupt service, damage physical equipment, and trigger cascading failures across regions. This paper outlines a pragmatic, security-first modernization approach anchored in zero-trust architectures, AI-assisted anomaly detection, and decentralized / segmented control nodes designed to contain intrusions and keep essential services running safely. The policy goal is resilience—utilities that can degrade gracefully, isolate compromised components, and restore operations quickly without paying ransoms or endangering the public