Posted on 08/15/2022 7:25:26 AM PDT by Red Badger
There’s an election hack built before the 2020 election that can instantaneously swap the bubbles on your ballot. The “filled in” bubble of your candidate is moved to the hackers preferred candidate, and swapped out with that empty bubble. The change is made before the “ballot Image” is stored to the election server, and before it’s tabulated. By using the voter’s own marking style & penmanship, these changes are undetectable to the human eye.
Here’s the scenario. Using a blue pen you fill in the “Trump” bubble on a ballot. Election officials insert this ballot into a tabulator. Those pixels surrounding the Trump bubble are swapped in milliseconds with the empty Biden bubble pixels. After these changes are made, the ballot image is saved to the EMS, and the candidate selections update the election totals. If an election jurisdiction uses their digital “Ballot Images” to conduct an audit, they WILL NOT find these changed ballots.
Gateway Pundit created the below animation to provide a visual how this election attack works (or view here). Any real election attack using this method has no visual component. It operates behind the scenes, completely hidden.
To conduct this type of an election attack, bad actors just need a sample ballot. These are published well ahead of all elections. The sample ballot is used to located the exact bubble positions. The ballot is segmented into a grid, or “bounding boxes“. Vertical and horizontal lines sweep the ballot to precisely locate the targeted candidate’s bubbles. Bounding boxes are made around each bubble. Extra white space is added around the bubbles to account for penmanship that strays outside the bubble. This becomes the template for that election. The pixels inside these boxes is what they swap.
Prior to the election, the attacker specifies the template, which races they want to affect (Pres, Senate, etc), and by how much. While ballots are being scanned, this malicious software keeps a running tally of the “real” ballot results. Ballot images are changed on the fly to achieve the desired election outcome. To avoid detection, attackers can specify just enough manipulated images to win the race, but not by alarming amounts. The only way to catch this hack is to compare the original paper ballot to the ballot image.
Awhile back two University of Michigan students successfully wrote this malicious software using only 398 lines of code. Their “Automated Ballot Manipulation” video and 18 page whitepaper show the details. Undergrad Jeremy Wink and grad student Kart Kandula developed it while at UofM’s Security Lab. They were under the supervision of election expert J. Alex Halderman. Using the voters own handwriting markings to alter ballots is a truly devious approach. Depending on the computer, the entire process takes about 40 milliseconds (.04 seconds). It leaves no image artifacts behind, so the changes are undetectable.
The students tested it against EAC certified scanners. They also tested it against all six different ballots styles used in America. These come from manufacturers Dominion, ES&S, Clear Ballot, Diebold, and two styles from Hart InterCivic. The ballot styles for Dominion machines were the easiest to change. The Hart eScan ballots were the most difficult. The software can move all shapes used on election ballots including bubbles, circles, boxes, rectangles, ovals, etc.
This sophisticated software algorithm scores and rates the marked bubbles as Sensed, Ignored, or Marginal. Some voters might make excessive scribbles, or stray into the letters of a candidate name. If the pixel area can’t be perfectly swapped leaving no artifacts, the algorithm skips that ballot and moves onto the next one. Configuring the software settings very high, so it leaves no trace evidence, they were able to change votes on at least 50% of all ballots.
To illustrate an illegal election operation the two men created an attack package called “UnclearBallot”. They disguised the attack by inserting malicious code into the “Windows Driver” that allows the scanners to communicate with the election system. They created a “microdriver” that essentially “wraps” around the original driver. This is what changes the ballots. But their malicious software can run in any environment. It doesn’t have to be a driver. It can be rewritten for a machines firmware, installed on an Election Management Server (EMS), and so on.
They simulated an attack using 181,541 completed paper ballots from Clackamas County. Oregon. They changed the results of ballot proposition. UnclearBallot was configured to only modify marks with a “high confidence” the alteration would not be noticeable. They were able to alter 62,400 ballot images, which is 34%. Afterwards, they selected 1,000 altered ballots at random for examination. Human auditors could NOT detect any evidence of ballot manipulation. Had they lowered the “confidence” settings, they could have changed 89% of the ballots. Only 11% were rejected, had no chance of changes.
What’s most alarming is that Matthew Bernhard was involved, a Research Engineer at the hard left Voting Works. The Center For Democracy and Technology (CDT) created Voting Works, spun it out in 2018. CDT’s major donors are the Soros Open Society, Ford Foundation, MacArthur Foundation, Google, Facebook, Amazon. Others involved in this election project were Chinese speakers Henry Meng, Jensen Hwa, and Kevin Chang. In 2019 CISA and DHS partnered with Voting Works to push their bogus Risk Limiting Audits into many States before the 2020 election. It’s now used by 10 States. Voting Works has been an obnoxious proponent of mail-in ballots.
Students Jeremy and Kart noted there are technologies available that can detect this type of image manipulation on ballots. However, they were unable to find one election jurisdiction using any of this technology. Their team also suspects it would become an arms race. When the software that detects “image manipulation” advances, attackers will obtain it, and alter their malicious code to defeat it.
NOTE: A “driver” allows an external device like a printer or scanner to communicate with the operating system. The driver is the first thing the external device talks to. In a nutshell, the data flows from a scanner, to the driver, to the OS, and then to the hard drive. By putting the malicious code at the very begging of this flow, it can change ballots before the OS even knows about it. The ballot bubbles are changed before the “Ballot Image” gets stored on the election server.
Richard Baris if you are reading this please tell us your take on the Wyoming Voting situation in tomorrow’s primary election? I heard there’s some really scummy stuff going on that might end up giving Cheney a victory by a hair. Heard mail in ballots have been cooked and that 11,000 democrats have switched to republican who have already voted for her via mail in ...What do you think? Please need input!
Here's the .gif that's the heart of the matter.
Bkmk
Gateway Pundit’s articles are often very informative. Their headlines overstate ridiculously. They should make their headlines match their content. I wonder if they realize that many people won’t even look at their articles because of these headlines.
In a blockchain system each voter could take a tear-off strip from their ballot, for example, with a unique identifier. After voting they'd be able to use the ID to look up their vote in the (ongoing or completed) election system to see that their vote was in fact registered and is being counted accurately for each contest. Since no one else would have the identifier it would be completely private, and the overall results on the blockchain would be transarently auditable, not just by formal auditors but by the general public.
THANK YOU MR BARIS! 🙂
Paper ballots, or quit bitchin’...
All ballots should be stored and available for anyone to view...voters can have an identical copy of their ballot...then anyone can compare their copy with the original online by checking a number...
We might have to all write in Trump’s name just to prevent this next steal.
A sort of the ballot image data store by the hash# would make a reasonable gross audit check.
If the headline includes "bombshell", "weird" or similar BS words I just don't look at it.
p
In PA I can believe it. The home of the Liberty Bell hasn't evidenced 'liberty' for a long time; for some reason many of the citizens don't want it. OTOH, the DOS is expert at carrying out a selection.
CODE CRACKED ON ELECTION THEFT (Hostage Vanity From Nick Moseder)
Nick Moseder on Rumble ^ | August 4, 2022 | Nick Mosedee via Hostage
Posted on 8/4/2022, 4:49:04 AM by Hostage
12 minute video:
https://rumble.com/v1eo1ec-huge-counterfeit-ballots-being-injected-nationwide.html
Nick’s video outlines the elements of the steal. Whoever masterminded this was clever and very smart, but not completely.
Long short:
1. A voter marks choices on a paper ballot, not knowing the ballot’s calibration marks are deliberately off.
2. (Some) The paper ballots are therefore defective, and when scanned are diverted to a folder of rejected image files.
3. Replacement ballots with proper calibration marks are printed to match the rejected ballots and are rescanned successfully.
4. The voter markings of rejected ballots are ‘partially’ copied over to the replacement ballots.
The above steps allow for a particular candidate’s votes to be altered while preserving down ballot totals.
Note in passing:
Nick mentions Heidar Garcia from Tarrant County, Texas. Garcia is elections administrator for Tarrant County. Garcia is a native Venezuelan who came from Panama where he worked 12 years for Smartmatic. Smartmatic is ultimately owned by Soros.
Thank you very much and God bless you.
-————_——————_—————————
This is posted for further development.
The content gets moderately technical for those that are trained, highly technical for the untrained. Can’t fix gap in understanding yet without schematics, cartoons, everyday analogies.
But expect Nick Moseder, in concert with former Law Professor David Clements and his wife Erin (Erin is an engineer and is off the scales sharp), will in days ahead, perfect the mass media presentation to inform all Americans who are living day to day in a concerned state about our compromised, subverted election systems.
I will leave here a personal knowledge nugget. Each pdf printed paper has ‘microcode’ printed with it that has information regarding printer, print time, location, and other details. It requires special equipment to read the microcode.
I assert a reason that access is blocked to paper and image ballots for audits is that the embedded microcode will not match with scanned information.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.