Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Here’s How They Did it: Real-time Election Fraud by Database Latency
gateway pundit ^ | 12/15/2022 | JIM HOFT

Posted on 12/15/2022 8:11:17 PM PST by bitt

Database latency — a geeky term, but that’s how they did it!

A policeman pulls over a speeder. The police computer reports that three hours ago a similar vehicle and person held up a liquor store — so the police are on alert.

No database latency.

County election managers change the zip code of 31,000 voters on September 3. Ballots go out that week. Those 31,000 are undeliverable. Someone collects those valid ballots. On September 15th, those addresses are quietly changed back.

National Change of Address Database (NCOA) will not pick up those address changes. They didn’t happen because there is no history.

The 31,000 citizens were getting their mail just fine — except for ballots. Ballot addresses were driven by the county mail-in ballot database — the one that was changed, then changed back.

Many states send ballots to everyone; the recipient is none the wiser that they never received a mail-in ballot. They may vote in person. Oops! “You already voted!” Ever heard that?

Welcome to database latency.

(Excerpt) Read more at thegatewaypundit.com ...


TOPICS: Crime/Corruption; Culture/Society; Extended News; Politics/Elections
KEYWORDS: 2022votefraud; databaselatency; electionfraud; fakewaypundit; hoftalert

1 posted on 12/15/2022 8:11:17 PM PST by bitt
[ Post Reply | Private Reply | View Replies]

To: null and void; aragorn; EnigmaticAnomaly; kalee; Kale; AZ .44 MAG; Baynative; bgill; bitt; ...

p


2 posted on 12/15/2022 8:11:29 PM PST by bitt (<img src=' 'width=50%>)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

It’s “My Cousin Vinny”


3 posted on 12/15/2022 9:38:55 PM PST by Michigan Bowhunter
[ Post Reply | Private Reply | To 2 | View Replies]

To: bitt

The question now is whether Republicans want to start leading with technology or continue to spend millions on “big data” “data driven” batch buzzwords.

We are about to find out.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I suspect it has to do with consultants and payouts to companies...GOP is behind the times. Dems had a whole smorgasbord of plans...

Thanks for posting—very interesting article.


4 posted on 12/15/2022 9:39:18 PM PST by Freedom56v2
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

I’ve been IT my entire work life and I’ve never heard the term database latency, admittedly my area of was not database administration

If changes were made to voter addresses, those changes would be reflected in the audit trail of the database unless the county destroyed the audit trail

I believe there is rampant cheating in the voting system in Arizona but this story seems implausible and unlikely to be true and I’m not sure even if it were true I don’t know how this writer would have any idea


5 posted on 12/15/2022 10:25:28 PM PST by srmanuel
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

Mail-In-Ballot Scam 101

How it works;

1. Be able to print ballots.
2. Have rolls of who has and has not voted.
3. Fill ballots out in names of people who have not voted from those rolls.
4. Send them in to be counted.

- The people who didn’t intend to vote would never find out they were used for their vote.
- This only works where mail-in cheating is still legal.
- They target and tailor specific races utilizing specific precincts to achieve a specific outcome.

- Q) Showed up to vote and they tell you that you already voted?
- A) This is how it happened. Someone stole your ballot and voted for you. They slip up sometimes.

- Q) Where and how did they get this information?
- A) Motor Voter Registration. Hence the need to register illegal aliens to get driver licenses.


6 posted on 12/15/2022 11:44:01 PM PST by afchief
[ Post Reply | Private Reply | To 1 | View Replies]

To: srmanuel

Look back over Jay Valentine’s archive at American Thinker. They list their contributors alphabetically by first name.


7 posted on 12/16/2022 12:24:14 AM PST by sopo
[ Post Reply | Private Reply | To 5 | View Replies]

To: srmanuel

Welp, the republic will never know since courts and Republican legislatures won’t allow potential evidence, such as audit logs, to ever see the light of day.

Each election gets worse. And the chances of recovering the system go lower, and are now approaching zero.


8 posted on 12/16/2022 2:44:24 AM PST by ReaganGeneration2
[ Post Reply | Private Reply | To 5 | View Replies]

To: srmanuel

To start with ... see post #6.

If in fact you have been in the IT environment for a while you would know that any good system has regular backups performed. You would also know that it is an easy task to make an ‘extra’ copy of the backup and save it to some easily distributed media. The ‘extra’ copy is what is modified and later restored if need be. There would be no audit trail of any abnormal modification of the primary data so no need to destroy it.

The real point here is that the main vehicle for the left’s overwhelming vote count is rooted in fraudulent mail-in balloting. There are no verifiable chains of custody, several points of contact are subject to malfeasance, and there is almost no way to prove that each and every ballot received by mail was prepared by a living, breathing USA citizen exercising their right to submit one and only one ballot.

Mail-in balloting for the out-of-country USA citizen and the provably incapacitated USA citizen should be allowed but no other form should be allowed. Period.


9 posted on 12/16/2022 2:53:34 AM PST by ByteMercenary (Slo-Joe and KamalHo are not my leaders.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: ByteMercenary

Even as you describe it the audit trail of the original database would still be available unless it was destroyed, I stand by the idea this story likely false

I do agree with you the way cheating happens is from fraudulent voter rolls and ballot harvesting not thru some type of database fraud

I would say the same thing considering the tabulation machines and printers not working which is believable versus database hacking


10 posted on 12/16/2022 3:20:41 AM PST by srmanuel
[ Post Reply | Private Reply | To 9 | View Replies]

To: srmanuel; ByteMercenary
There are a variety of methods to cover tracks, but one thing is an absolute certainty-the people performing election fraud have people who understand fully that performing the fraud has to go hand in hand with covering up the electronic tracks of that fraud.

The Antrim County (Michigan) forensic analysis is the best example, but I have seen others. In the Antrim County report, it stated:

"...Significantly, the computer system shows vote adjudication logs for prior years; but all adjudication log entries for the 2020 election cycle are missing. The adjudication process is the simplest way to manually manipulate votes. The lack of records prevents any form of audit accountability, and their conspicuous absence is extremely suspicious since the files exist for previous years using the same software..."

There was another instance I read where the person performing the fraud on a voting system server apparently knew full well that to any IT professional (and I am one) the absence or simple deletion of a log file where you fully expect to see one is a giant, bright red flag that there has been malfeasance. So, to get around this, the person wrote a query against the SQL database, and ran it I believe every second or so over a period of time after the election.

If I recall correctly, the query didn't actually get into the database and run, but failed, but what it did whenever the query ran, it would create an entry, a line in the log file.

They had enough knowledge to know that the log file was set up to cycle, that is, when it reached a given file size, instead of shutting down the system as sometimes happens, it would simply delete the earliest entry in the log file in order to successfully write the most recent one. And it was run under a root account (known to many people who used that root account with full privileges to do even the most common and mundane tasks, and the password was event taped to the monitor) so that instead of each log file line telling you who ran the query so it could be traced to an individual like this:

04/2020 00:43:217.22 USER SRMANUEL QUERY XYSQGUEYTY12 FAILED.

You got an entire huge log file, still in place, telling you NOTHING but this:

04/2020 00:43:217.22 USER ROOT QUERY XYSQGUEYTY12 FAILED.
04/2020 00:44:217.22 USER ROOT QUERY XYSQGUEYTY12 FAILED.
04/2020 00:45:217.22 USER ROOT QUERY XYSQGUEYTY12 FAILED.
04/2020 00:46:217.22 USER ROOT QUERY XYSQGUEYTY12 FAILED.
04/2020 00:47:217.22 USER ROOT QUERY XYSQGUEYTY12 FAILED.
04/2020 00:48:217.22 USER ROOT QUERY XYSQGUEYTY12 FAILED.
04/2020 00:49:217.22 USER ROOT QUERY XYSQGUEYTY12 FAILED.

To a discerning eye, this is simply as bad as a missing log file, but everyone would shrug their shoulders and someone "in charge" will loudly say "Well, perhaps the system was trying to run a query, and it kept failing and didn't get shut off. Hey, does anyone know what the query "XYSQGUEYTY12" is? Nobody? Oh, you looked and couldn't find that query anywhere? Ah. Well, I guess we will never know..."

And so, discerning eyes would see that the failed query, started in the wee hours in the morning after the election, ran for a specific period of time, enough to overwrite all the logs from election day, and cover the tracks.

11 posted on 12/16/2022 6:01:04 AM PST by rlmorel (Nolnah's Razor: Never attribute to incompetence that which is adequately explained by malice.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: srmanuel; kiryandil

The claim that it was going on in Florida, but there, DeSantis won by a 19-point margin, and the weak Marco Rubio won by at least 10 points. The only cheating that I know of might have occurred in the Republican primary between Daniel Webster and Laura Loomer.

Although, as kiryandil put it, the Dumb-O-Crats might simply have not bothered trying to cheat in Florida. Our election integrity is strong, and trying to cheat would have been a waste of their money, when they could take advantage of lousy election systems elsewhere.


12 posted on 12/16/2022 6:13:19 AM PST by Tolerance Sucks Rocks (FBI out of Florida!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Tolerance Sucks Rocks

Does cheating happen in Florida, I would say to some degree it probably does, but not in a statically meaningful way, because of the way the system works.

If you were going to cheat in Florida, you would have to do it in multiple counties by manipulating the machines

Doing something like take 100 ballots 60 for Trump, 40 for Biden, then run them thru the machines and the totals show up 55 for Trump and 45 for Biden


13 posted on 12/16/2022 6:30:03 AM PST by srmanuel
[ Post Reply | Private Reply | To 12 | View Replies]

To: rlmorel

Just look at the effort required to pull off what you described, what would be easier, pulling off your scenario or stuffing a bunch of fake ballots into the mix which get counted like real ballots and never touching the database at all.

When you have universal mail in voting, it’s guaranteed you will have 10s of thousands of fake ballots floating around, gather them up, drop them in a ballot box and no one touches the database.

Under your scenario, it would require someone with a reasonable knowledge of database, have admin level access to the database and someone familiar with the backup and restoration process of the database and being able to complete all the tasks without being detected.


14 posted on 12/16/2022 6:40:11 AM PST by srmanuel
[ Post Reply | Private Reply | To 11 | View Replies]

To: srmanuel
Professionals building a secure system would have backups, restoration processes, fully patched systems, up-to-date antivirus protection, databases protected by passwords, and systems configured with user accounts that would grant users ONLY the minimum permissions they needed to do exactly the jobs they needed to do with no more.

Or. Another way to put it:

Professionals bent on building a system for the purpose of misusing that system would have no backups, no restoration processes, no databases protected by passwords, and systems would not be configured with user accounts that would grant users ONLY the minimum permissions they needed to do exactly the jobs they needed to do with no more, but would instead publish (by taping the root username and password on monitors) the maximum credentials users would need to do everything up to and including wiping an entire system, never mind turning logging on and off, or deleting logs or other data.

Think of that last paragraph, and then see my Freep Tagline.

I am not making this up. This is all in the Antrim County Forensic report. So, in the light of this, consider again my tagline:

Nolnah's Razor: Never attribute to incompetence that which is adequately explained by malice.

None of this is rocket science. There are millions of people who have the knowledge to be capable of doing this. Don't write this off by assuming that since this knowledge is needed, it won't be done.

When it comes to Election Fraud, Leftists believe in attacking on every front. They don't just concentrate on stuffing ballot boxes. They get legislation changed. They illegally ballot harvest. As was done in Atlanta, they kicked everyone out, and began feeding fake ballots directly into the system. They buy votes. They explore every option legal or illegal.

15 posted on 12/16/2022 8:18:12 AM PST by rlmorel (Nolnah's Razor: Never attribute to incompetence that which is adequately explained by malice.)
[ Post Reply | Private Reply | To 14 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson