Inside the Backroom Plot to Weaponize Commerce Supply Chains Against American Elections

Inside the Backroom Plot to Weaponize Commerce Supply Chains Against American Elections

White House aides and administration officials quietly attempted to disable voting infrastructure spanning more than half of the United States by executing an unprecedented bureaucratic maneuver. They pressured the Department of Commerce to declare standard commercial microchips inside voting machines national security risks. The sweeping, multi-agency effort aimed to bypass constitutional restrictions on federal election interference by exploiting international trade and supply chain regulations. The objective was to delegitimize and effectively ban hardware deployed across dozens of states, primarily targeting Dominion Voting Systems equipment, under the guise of purging foreign adversary technology.

The strategy, which reached the level of formal agency evaluation last autumn, ultimately buckled under its own logistical weight and a total absence of technical justification. It marks the most aggressive attempt by the executive branch to nationalize local election infrastructure since the founding of the republic. By shifting the battlefield from public courtrooms to the obscure offices of the Commerce Department, the administration sought a regulatory backdoor to achieve what dozens of judicial rulings had explicitly denied them.

The Supply Chain Backdoor

The plan did not originate within traditional election security agencies. Instead, it emerged from a series of closed-door brainstorming sessions led by White House adviser Kurt Olsen, a lawyer tasked with finding evidence to validate long-disproven theories regarding the 2020 presidential race. Olsen, working alongside figures like Paul McNamara—a senior aide to Director of National Intelligence Tulsi Gabbard—and Brian Sikma of the Domestic Policy Council, hit upon a novel mechanism. They realized that while the president lacks the constitutional authority to tell a county clerk in Ohio or Georgia how to run an election, the Secretary of Commerce possesses sweeping powers to restrict transactions involving technology tied to foreign adversaries.

Under existing supply chain executive orders, the Commerce Department can prohibit the use of foreign-sourced Information and Communications Technology (ICT) if it poses an undue risk to national infrastructure. The targeted adversaries listed under these rules include China, Russia, and the government of Venezuela. For years, fringe political factions have insisted that American voting systems contain malicious code engineered by foreign regimes. By reframing an unproven election theory as a supply chain emergency, the group believed they could invoke emergency commerce declarations to bypass state sovereignty entirely.

The legal theory was simple. If the federal government could declare a single essential chip inside a Dominion voting machine a national security hazard, the machines would be illegal to operate. Overnight, half the country's voting precincts would see their equipment sidelined.

The Puerto Rican Teardown

To build a factual foundation for this commercial blockade, the administration needed physical evidence. In May 2025, Olsen helped coordinate a federal mission to seize Dominion voting machines utilized during the 2024 gubernatorial election in Puerto Rico. The equipment was handed over to a private cyber contractor, Mojave Research Inc., for a forensic hardware teardown.

The investigators were hunting for a smoking gun. Specifically, they sought traces of Venezuelan-origin software or undocumented hardware implants that could corroborate their geopolitical claims.

The technical reality proved profoundly underwhelming. The physical inspection revealed standard off-the-shelf microprocessors. The headline discovery was a single chip packaged in China by the American corporation Intel. The remaining components were standard silicon packaged in Malaysia, South Korea, and Japan. None of these findings indicated an active threat or unauthorized access points.

[Seized Voting Machine] -> [Physical Teardown] -> [Intel Chip (Packaged in China)]
                                               -> [Standard East Asian Components]
                                               -> [No Malicious Code/Implants Found]

When the formal report was compiled later that summer, the failure to locate malicious foreign assets presented a bureaucratic obstacle. To circumvent this, the documentation deliberately generalized the findings, categorizing the hardware components broadly as "East Asian" rather than identifying them as standard commercial chips from friendly trading partners. The semantic shift was designed to maintain the illusion of an external threat when presenting the findings to high-level policy groups.

The Interagency Collapse

The initiative moved to the West Wing in September, culminating in a meeting that included cybersecurity experts from the National Security Council. During this session, Olsen’s team presented their findings and pushed the narrative that the hardware was fundamentally compromised.

Following the briefing, a political appointee within the Commerce Department formally requested that the office responsible for assessing foreign national security risks to tech supply chains review the matter. The request asked analysts to evaluate options for a federal intervention or restriction on the equipment.

The effort stalled inside the bureaucracy for a fundamental reason. The professional analysts and intelligence staff required a baseline of empirical evidence to trigger an international supply chain ban. A standard Intel microchip packaged in an Asian facility does not meet the legal threshold of an active foreign intelligence threat.

The Commerce Department’s specialized supply chain unit quietly let the matter drop, refusing to issue declarations that would have provoked instant, ruinous litigation from state governments and equipment manufacturers alike. White House spokesperson Davis Ingle subsequently dismissed accounts of the effort as selective leaks and misinformation, while a spokesperson for the Director of National Intelligence stated that accounts of the agency's involvement contained inaccuracies, though they declined to provide specifics.

The Reality of Local Control

The logistical absurdity of the proposed ban highlights a profound misunderstanding of how American democracy functions at the ground level. Elections are not managed from Washington; they are run by roughly 10,000 independent local jurisdictions.

According to data from the U.S. Election Assistance Commission, over 98% of election jurisdictions rely on systems that generate a verifiable paper trail. Voters typically mark a paper ballot by hand or use an electronic ballot-marking device that prints their choices onto paper. That paper is then fed into an optical scanner that tabulates the vote. The technology does not replace the paper; it counts it.

+---------------------------+
|  Voter Marks Paper Ballot |
+---------------------------+
              |
              v
+---------------------------+
|   Optical Scanner Counts   |
|      Electronic Vote      |
+---------------------------+
              |
              v
+---------------------------+
|  Paper Ballot Retained    |
|    For Physical Audit     |
+---------------------------+

Banning these machines would not return the country to an era of pristine, undisputed tallies. It would force thousands of underfunded counties to transition instantly to hand-counting millions of complex ballots featuring dozens of local, state, and federal races.

Academic and security consensus remains clear on this point. Hand-counting entire elections is notoriously slow, staggeringly expensive, and highly prone to human error. During trial runs and local pushbacks in states like Georgia, proposals to eliminate scanning technology have repeatedly collapsed because local officials realize that hand-tabulating a massive general election ballot introduces more vectors for mistakes and ballot-tampering than a disconnected electronic scanner ever could.

The Broader Push for Centralization

This aborted supply chain maneuver does not exist in a vacuum. It represents one prong of a broader campaign to strip states of their traditional role as the primary arbiters of voting procedures. Parallel efforts have emerged across the executive branch. The National Institute of Standards and Technology (NIST) recently took the unprecedented step of blocking qualified state election directors from joining the Technical Guidelines Development Committee, an advisory body that helps draft federal security standards for voting machinery.

By denying seats to experienced state officials, the federal administration creates a vacuum. It allows political appointees to rewrite the Voluntary Voting System Guidelines without input from the local professionals who actually manage polling places.

Simultaneously, the administration has pressured Congress to pass measures like the SAVE Act, which would impose strict federal documentation mandates for voter registration. This marks a stark ideological reversal for a political movement that historically championed states' rights and local autonomy. The new doctrine views state control not as a constitutional safeguard, but as a barrier to administrative uniformity.

The vulnerability exposed by this episode is not structural or electronic; it is institutional. The system held because career bureaucrats within the Commerce Department demanded actionable evidence before deploying the regulatory state against local governments. Had those analysts accepted vague nomenclature over hard forensics, the administration would have successfully used a trade mechanism to destabilize the mechanics of an upcoming election. The blueprint for federal intervention has been drawn, and its execution relies entirely on the compliance of the agencies holding the keys to the global supply chain.

AM

Alexander Murphy

Alexander Murphy combines academic expertise with journalistic flair, crafting stories that resonate with both experts and general readers alike.