https://www.youtube.com/watch?v=ficae6x1Q5A&feature=youtu.be&t=145
Chris Wray
I feel like when I go on FR now, it’s just to see what the latest fraud cases are :)
I have to believe massive pressure is being put on many state legislatures to do an audit, like PA is
If someone has a running record of vote totals across the country, that info could identify glitches, indicating places where the electronic vote count probably does not match the paper ballots count.
Reformatted . . .
Everyone is talking about investigating paper ballots and evidence of dead voters, but there are other layers to our election IT infrastructure with glaring vulnerabilities! The vulnerabilities outlined below could allow quick and impossibly large vote count changes.
Russel Ramsland of Allied Security Operations Group, walks through vulnerabilities of software used in 2018 and 2020 elections:
Russel Ramsland of Allied Security Operations Group - YouTube video:
https://www.youtube.com/watch?v=ficae6x1Q5A
Russel Ramsland of Allied Security Operations Group:
https://asog.us/
As a result of the 2002 HAVA Act, most counties don’t run elections anymore. Private Companies with Private Shareholders under contract to counties run our elections. And these companies do it with virtually NO Transparency or Supervision.
The entire election system infrastructure is a complex patchwork of various private companies doing various parts of it. ALL of it is exposed to the internet, the idea of it being air-gapped is a myth. The voting companies own manuals show this. Some of these companies conduct elections all over the world, effectively being in a position to control some of the outcomes
Some of the companies are foreign owned with servers outside this country, and they are the last ones to actually control the so-called “unofficial” votes. BUT, it is the “Unofficial” votes that eventually control “Official” votes.
There are no security standards for election software. Hence any certifications are largely just agreed on an ad hoc basis between the certifying company and the election company and therefore don’t mean much.
Most State SOS offices fail to grasp the extent and vulnerabilities within their systems, and so they grant waiver to their State law and voting code to counties and election companies which exacerbate the problem.
Investigation revealed at least a dozen or more entry points where votes can and are being switched and the audit trails changed or erased so that a forensic investigation finds no trace. It has to be caught in real time. Even the operator of the election system can change votes undetected.
Found Voting Companies’ public facing sites to be vulnerable, such that:
— Admin names and passwords for critical information files are in the open, in a file, right before each file containing critical information
— Voter Registration lists by precinct (Worldwide) including all DL (Download?) info and Personally Identifiable Information (PII)
— All previous vote uploads
— All Source Code (Many companies are using the same basic source code structure)
Found software so vulnerable that operators and even some outside players can change votes utterly undetected, either NO audit trail (Hart) or erasable or changeable audit trail (ES&S, Dominion, etc.), so no evidence of vote changing can be found
— Access to the companies’ entire AWS (Amazon Cloud) databases
— All ballots
— All counting and tallying functions
Discovered they could make any candidate win or lose by directly altering votes at the server/database level for any election most companies conduct, worldwide.
Many state’s votes are stored, controlled, and reported by a company in Frankfurt, Germany.
Issue with tabulation software can ‘flip’ under votes to opposite candidate
Vulnerabilities explain how 138,339 ballots could be counted within 3 hours and go 100% to Biden
Explains ridiculous turnout numbers in many states
Log and scrape credentials for counties, as well as ability to login to password protected areas of their sites
Execute arbitrary code on a device
Steal config and log files
The only way to get rid of QSnatch is a full factory reset before patching a device. (QSnatch is able to dodge security patches that target itself)
“Ghosts” -— These are people using another person’s residence as their legal permanent address for voting purposes and no one living there has ever heard of them.
“Phantoms” -— These are people who check in under their own name, but their vote is somehow attributed to someone else. Or, people who check in to vote and find someone has already voted in their name.
“Purged” or “Tampered” -— These are voting records the County posts as having been voted, but then later are purged or otherwise tampered with, and sometimes re-instated with different data later at a later date. Dallas has approximately 57,000 instances of this thus far. Harris (county) has around 250,000 instances. On some days, the number of votes tampered with are so huge it can only be done by computer programming. However, some days the number of votes tampered with are small enough that local operators could be doing it.
DHS eventually had some employees in the field sit down with ASOG to look at gathered data. They agreed that the data was accurate and that the vulnerabilities are horrible. They have been unable to accelerate the issue to their supervisors effectively
FBI has no interest in the findings and turned ASOG away many times
I have sent this video through Trumps voter fraud form with some context - advising that they speak with Ramsland if they haven’t already.
Bookmark
Bttt
The FBI has had it in for The Donald since before his election and never stopped trying to take him down.
All the while ignoring the Clinton and Biden crime syndicates.
FBI is garbage.
You tube is making it hard to view that video. Knew that would be coming.
This works: https://altcensored.com/watch?v=ficae6x1Q5A
Interview with Source on Electronic Vote Fraud (Russel Ramsland, Allied Security Operations)
https://www.youtube.com/watch?v=ficae6x1Q5A&feature=emb_logo
Host L Todd Wood reveals the mechanics behind the electronic vote steal operation in an interview with powerful source.
Streamed live on Nov 5, 2020
FR Comments: https://www.freerepublic.com/focus/f-news/3902979/posts
Video=> https://www.youtube.com/watch?v=ficae6x1Q5A
Data Expert Describes How Democrats Can Fabricate Votes
Also Describes Critical Security Flaws That Have Not Been Addressed
https://andmagazine.com/talk/2020/11/06/data-security-specialist-outlines-key-election-system-flaws-and-vulnerabilities/
General Tom McInerney interview on (Bannon’s)The War Room
Ep 470 (Nov 2) starting about 19:06 as General McInerny starts speaking on this.
https://podcasts.apple.com/us/podcast/bannons-war-room/id1485351658?i=1000496960019
Ep 472 (Nov 3) at 19:32 McInerny relays to Bannon unfortunately systems are still up and running.
https://podcasts.apple.com/us/podcast/bannons-war-room/id1485351658?i=1000497093696
Who owns and controls Hammer and Scorecard?
https://www.freerepublic.com/focus/f-news/3902914/posts
THE HAMMER (aka HAMR) IS THE KEY TO THE COUP
https://www.theburningplatform.com/2020/11/07/the-hammer-is-the-key-to-the-coup/
bttt
They keep overlooking SMARTMATIC voting machines
LOL I am thinking that the next Black Hat conference should post a couple of bounties for hacks on voting machines.