10

Auditors Caught Backdating Voting Machines!

Posted by $ Olduglycarl 2 years, 11 months ago to News
39 comments | Share | Flag

Observers at the Windham, NH audit have seen some things that seem to be very curious. It may be ignorance or it could be criminal. But, either way, it could spark an investigation or better yet, a state-wide audit of the voting. One thing the observers noticed was that auditors had backdated machines under review.

They also say they saw other curious behavior by the auditors.

The Gateway Pundit reported earlier in the week that two of the three auditors had close ties to Nancy Pelosi and Chuckie Schumer.

So, it appears that the fix was in and we don’t know what they did to the machines but I suspect whatever it was, it covered up something they don’t want someone to find out later.

Harry Hursti, Ph.D., has obscured professional relationships with the other two auditors. Hursti exposed the fact in 2005 that the machines that these Diebold memory cards could be easily hacked and manipulated to secretly change vote counts. He also proved that the changed votes would totally undetectable.

Why does he not mention that fact now?

Populist Press reported this evening:

The forensic audit in Windham, New Hampshire is over, but the momentum to keep it alive is just getting started. Late Thursday, Marilyn Todd of NH Voter Integrity Group made some bombshell discoveries.

Last Friday, when the machine reports were being printed at the audit, Todd, who has kept a close watch on Hursti, took pictures of them. Late Thursday, she had the report pictures up on her computer when something earth-shattering caught her eye. She spoke about it Thursday evening in a live video with Nick Moseder, CannCon, Susan Dee Settenbrino, and Professor David Clements.

Marilyn Todd of NH Voter Integrity Group:

Todd, a financial auditor and founder of NH Voter Integrity Group discovered curious listings oin auditor reports including:

Line 30 – Session Start, date 5/12/21

Line 31 – Machine put in “Supervise Mode”

Line 33 – Memory Card Reset

Line 34 – Session Start, date 5/12/21

Line 35 – Prep for Election

Line 36 – Clear Counters

Line 37 – Session Start, date 11/3/20

Line 43 – Session Start, date 11/5/20

But WAIT!, there is more,WATCH THIS, it's a demonstration you should see for yourself: Harry Hursti, Ph.D., has obscured professional relationships with the other two auditors. Hursti exposed the fact in 2005 that the machines that these Diebold memory cards could be easily hacked and manipulated to secretly change vote counts. He also proved that the changed votes would totally undetectable. Hacking Democracy - The Hack: https://www.youtube.com/watch?v=t75xv...


All Comments

  • Posted by $ 25n56il4 2 years, 11 months ago
    Hey ya'll... Does it occur to you these people weren't very smart? and NealS, I think the death penalty for Treason only applies in times of war. Too bad really.
    Reply | Permalink  
  • Posted by RMB 2 years, 11 months ago in reply to this comment.
    We need to write our Congressional Representatives that We The People need to see the data from the voting machines. We need access to the data. It's our turn to play "tax returns".
    Reply | Permalink  
  • Posted by $ 2 years, 11 months ago in reply to this comment.
    From what I understand...they have it all documented...there is going to be hell to pay.

    We the People have to insist that they All Hang for Treason.
    Reply | Permalink  
  • Posted by RMB 2 years, 11 months ago
    The scope of coordinated criminal activities would be unprecedented should this information be validated.
    Reply | Permalink  
  • Posted by starguy 2 years, 11 months ago
    So, the elites are being caught in their web of deceit, and they don't like it.
    Who'da thunk it?
    Reply | Permalink  
  • Posted by $ AJAshinoff 2 years, 11 months ago in reply to this comment.
    the general nature of what these people are 'supposed" to be doing, just like our 'elected officials'. warrant a charges of treason or at least multiple changes for violating the Natural Rights of millions of people. If these transgressions are not taken with grave sincerity and do not have dire consequences nothing will ever get better. With no risk to themselves or those who pay them, why not?
    Reply | Permalink  
  • Posted by $ blarman 2 years, 11 months ago in reply to this comment.
    If they didn't bother to encrypt them, anything is possible. It's much harder to defeat hardware than software in most cases.
    Reply | Permalink  
  • Posted by bobsprinkle 2 years, 11 months ago in reply to this comment.
    So, all of the memory cards must have been pre loaded with the "malware" to manipulate the actual count. Right?
    Reply | Permalink  
  • Posted by NealS 2 years, 11 months ago in reply to this comment.
    I'm waiting for the Big Fries to go to jail. That probably will never happen unless they are on the right.
    Reply | Permalink  
  • Posted by $ 2 years, 11 months ago in reply to this comment.
    I think they screwed up the USB memory sticks too!...Maybe a direct hard wire one to another would be at least, inconvenient.
    Reply | Permalink  
  • Posted by $ jdg 2 years, 11 months ago
    I predict that the Deep State, or Dominion, will get all these facts about its machines declared either classified or protected as trade secrets, so that the courts can brush aside the results of the audits and simply refuse to consider the cases, in complete media silence.

    At which point we are confronted with a choice: accept that we live in a fake democracy and always will, or armed revolt.

    I am afraid that the public will make the wrong choice. And so far we have.
    Reply | Permalink  
  • Posted by $ blarman 2 years, 11 months ago in reply to this comment.
    Especially wifi. You do need some way of getting the information off any particular voting machine and onto the one which is compiling the vote tallies. Ethernet is convenient, but by no means the most secure or only way. One could use encrypted USB memory sticks as well where the encryption key is tied to a specific device (meaning that only that device could go into that slot).
    Reply | Permalink  
  • Posted by $ 2 years, 11 months ago in reply to this comment.
    Thanks...I would have thought that not putting a wifi or ethernet capability in the computer would help as well.
    Reply | Permalink  
  • Posted by NealS 2 years, 11 months ago
    When will someone be prosecuted and put to death for treason? Apparently that is the only type of thing that might stop some of this fraud. I question how a State like Washington can reelect a governor like we have over and over and over. I'd like to see a forensic audit of all of Washington State's elections over the last 20 years or so just to see how accurate they really were.

    And what's with these voting machines? The banks can do all our financial transaction on line with machines and get them right to the penny, billions of dollars a day, yet we can't come up with a machine that can count a few hundred million or so votes correctly. Pure and simple treason, and not addressing it by law will not put a stop to it.
    Reply | Permalink  
  • Posted by $ blarman 2 years, 11 months ago in reply to this comment.
    The only computer which isn't subject to being hacked is the one which is never used.

    Realistically, however, you can build several safeguards into the programming to prevent most attempts. Checksums can be invaluable at verifying data inputs and official source code files. Audit trails on everything can expose even back-channel networking communications. Above all, the machines themselves should be locked down and not connected to the Internet at all. Their programming should be audited at least three months before the election and then once the audit comes back satisfactorily, then you timestamp and checksum the build and make sure nothing gets changed until after the election is over.

    Nothing can be 100% foolproof when you're dealing with computers. But there were certainly a lot of steps and safeguards which were pointedly ignored by these suspect machines - almost as if they wanted to leave open these back doors....
    Reply | Permalink  

  • Comment hidden. Undo