Categories
Uncategorized

Election Fraud Research by Patrick Byrne

Chapter VII.) Research by activist Patrick Byrne, as described in his book The Deep Rig. (This chapter added in 10/18/22 update.) https://www.amazon.com/Deep-Rig-Election-Fraud-Donald/dp/B093DWY992

Part A.)From Ch. 7 of the book. This chapter has 23 pages, that are not numbered. I’ve taken the liberty of numbering them myself. The chapter outlines the activities of Patrick Byrne and his scientists during the month of December 2021 and first week of January 2022. Important items are listed below.

Pg.2)How Byrne’s associate General Flynn became an ‘enemy of the state’.

Pg.4)How Byrne almost got the opportunity, in mid-December, to show Trump the results of his group’s research.

Pg.10)At an end-of-December meeting of Byrne and several of his scientists, it is disclosed that: 1)At a vote-counting location in Savannah, GA, an internet connection has been discovered between a wireless card inserted in a vote-counting machine, and a smart thermostat mounted on the wall. Someone from China Telecom had come through the internet onto the smart thermostat, in order to connect to the machine. 2)the software installed in all Georgia Dominion machines is ten to fifteen years old, and is highly susceptible to penetration.

Pp. 6 & 11-14)Byrne associate infiltrates Fulton County ballot warehouse, gets photographic evidence, which is relayed to Georgia State Senate. Senate then demands to inspect the warehouse. Shredder truck arrives shortly thereafter, loads several tons of ballots and begins illegally shredding. The shredding operation is stopped by local authorities. FBI arrives shortly thereafter, takes control, then orders shredding to continue.

Pp. 16-17)An end-of-December meeting is held. Byrne’s scientists present results of their research to a group of congressmen. Included in the group is delegate sent by V.P. Pence. The vice-president, upon hearing the evidence, says he will halt the U.S. Senate vote scheduled for January 6, while the evidence is investigated. Byrne and his scientists are given speaker’s badges, and are to be allowed to present the evidence to the American public on the January 6th event stage.

Pp. 19 & 21-23)At the last minute, V.P. Pence is convinced by advisor Marc Short, and possibly others, to discard his plan to postpone the U.S. Senate vote while fraud is investigated. Byrne and his scientists were prevented, on Jan 6, from speaking on-stage and presenting their fraud evidence to the American public. The group had been given speaker’s badges, and had been seated near the stage, but were not allowed on-stage.

Coming in next update: “Suggested things to research from Ch.VII”

Categories
Uncategorized

Election Fraud Cases, partial list, ’82-present

Chapter VI, below, was added in an 10/08/22 update. The chapter will be expanded regularly for the next several months.

Chapter VI.) A collection of absentee ballot fraud cases from previous decades. This chapter is being included in order to give a historical perspective to the 2020 election… something that has been sorely lacking in all discussions of the election.

The media would like to let an uninformed public believe that major election fraud has been a rare thing in the nation’s past. Why? Because ignorance of election history makes it easier for the public to believe the media’s claim that the 2016-2020 period of political hand-to-hand combat, riots, arson, and murder, was followed by a clean, fraud-free national election… an election that was supposedly conducted by honest organizations, rather than nefarious organizations staffed by experienced perpetrators of election fraud.

As will be demonstrated during future updates of this chapter, election fraud techniques are, in fact, handed down from generation to generation, among the local politicians in many areas of the nation.

Part A.)Research from book Deliver the Vote: A History of Election Fraud, An American Political Tradition 1742-2004 by Tracy Campbell

P. 281 – In a 2001 report written by the Kentucky secretary of state, the magnitude of the problem was candidly expressed: “Absentee vote fraud in Kentucky is as serious a threat to legitimate elections as outdated punch cards are in Florida.”

P. 281 – One candidate for sheriff stated he could prove that votes were being bought, “if I wanted to get killed.”

Pp. 282-283 – In Dodge County, in south-central Georgia, a primary was held in July 1996 for an assortment of local offices…. both candidates, McCranie and Mullis, were convicted of… conspiracy to buy votes….

P. 285 – No state had gone as far as Oregon, where, beginning in 1996, all elections were conducted by mail… A study of the 2000 Oregon election showed that five percent of voters in one county acknowledged that others had marked their ballots and 2.4 percent admitted someone else had actually signed them.

Pp. 286-287 – On Election Day (Miami), November 4, 1997… “Once an absentee ballot (is) sent in the mail”, (David) Leahy admitted, “we lose control of it. That’s where the vote broker comes in. They can buy it, take it, or talk a vote out of someone who doesn’t know what to do with it.”

P. 288 – …a 1984 Florida Supreme Court ruling that stated courts could invalidate an election’s results if fraud could be proven to have permeated the balloting.

P. 289 – In February 1998, a (Florida) grand jury found that absentee-ballot brokers were essentially “thieves who steal democracy,” and concluded that fraud had tainted the election results.

P. 290 – On March 4, Judge (Thomas S.) Wilson (Jr.)… ordered a new election in two months. (Florida)

P. 291 – A study conducted by Caltech and MIT concluded: “The convenience that on-demand absentees (ballots) produce is bought at a significant cost to the real and perceived integrity of the voting process.”

P. 330 – By 2004, one of the largest manufacturers of touch-screen voting machines was Diebold, Inc., whose CEO, Walden O’Dell… boasted, “I am committed to helping Ohio deliver its electoral vote to the president.”

P. 330 – A Diebold vice president, Thomas Swidarski, dismissed charges that programmers could steal votes, and in a phrase eerily reminiscent of Boss Tweed, stated: “Programmers do not set up the elections, election officials do.”

Part B.)Research from article “A Brief History of Mail-In Vote Fraud”, by Dan O’Donnell, 05/28/20 https://newstalk1130.iheart.com/featured/common-sense-central/content/2020-05-28-a-brief-history-of-mail-in-vote-fraud/

1)1982 Illinois gubernatorial election, extensive fraud ring set up by Chicago Democratic party officials. Main fraud tool was absentee ballots. After extensive federal investigation, 63 convicted on vote fraud charges.

2)1994 in Greene County Alabama, 12 community leaders convicted of mass producing counterfeit absentee ballots.

3)1994 Hialeah, Florida, mayor’s race voided and rerun after mass production of counterfeit absentee ballots was discovered.

4)2003, East Chicago, Illinois, mayoral race voided and rerun due to extensive election fraud.

5)2008 activist group ACORN investigated for election fraud in 10 states, five members convicted.

6)2012 widespread intimidation of elderly and disabled voters in Martin, Kentucky. Absentee ballots involved. 90 months jail time for mayoral candidate Thomasine Robinson.

7)2017 Dallas City Council election, widespread mail-in ballot harvesting operation discovered.

8)2018 North Carolina, large-scale absentee ballot fraud operation by GOP congressional candidate Mark Harris.

9)2005 Commission on Federal Election Reform concludes that “Absentee ballots remain the largest source of potential voter fraud.”

—————————————————————————

Categories
Uncategorized

Paired-Box Ballot Counting

A fraud-resistant method for the inspection and counting of mail-in ballots, and for permanent storage of envelopes and ballots for public viewing. To be used at the precinct level.

This method will provide election transparency, and increased public confidence in election results.

Proposed Fraud-Prevention Methodology for counting of mail-in ballots:

1)The inspection and counting will be open to poll watchers and to the public.

2)Separation of ballots from their envelopes. The ballots, still in their envelopes, will be separated into groups of 50; next, their envelopes will be removed; then, the ballots and envelopes from each group of 50 will be put into two separate, uniquely-numbered boxes… one box for ballots, the other for envelopes. From this point on, each pair of boxes… one containing 50 ballots, the other containing 50 envelopes… will remain paired for perpetuity, including when the boxes go to storage.

So… just as in the old system… no ballot can be matched with any particular envelope… thereby protecting our legacy of the legally-mandated secret ballot. However, under the Paired-Box system, any fraud that is detected will be known to have originated from among a particular group of 50. Although the offender is unknown, it will be exponentially easier to correct the problem, than it would be if the fraudster were totally anonymous among the entire voting population.

3)Inspection. The inspection process of the first batch of 50 ballots and its corresponding batch of 50 envelopes, will begin. It will be done by multiple poll workers, and viewed by the public.

Note: the above-mentioned inspection occurs before the vote-counting process. They are two separate processes.

Any pair of 2 boxes in which suspect ballot(s) or envelope(s) is(are) discovered, will have the suspect document(s) attached to the outside of the box. After the remainder of the contents of the 2 boxes have been inspected, all current action on this pair of boxes will stop, until the offending document(s) can be inspected by election professionals.

4)Repairing of discovered fraud. If one or more of the suspect document(s) is(are) found to be, in fact, fraudulent, then all of the 50 voters associated with the 2 boxes must re-vote.* In this manner, the fraudulent vote has been isolated even without having a method to identify the perpetrator(s) of the fraud… thereby maintaining our legacy of the secret ballot.

In this manner, election integrity and the secret ballot are both protected. Under the old system, discovery of a fraudulent envelope(s) would be useless, because we can’t make everyone in the county re-vote. Under the new system, we only have to require a relatively small number of people to revote, in order to eliminate fraudulent votes.

*NOTE: Although a fraudulent envelope WOULD require a re-vote, a fraudulent ballot would not, since the offending ballot could just be removed and not added to the final vote count. Because the integrity of the election has been restored by the removal of the offending ballot, a re-vote would be optional; the only purpose would be to attempt to discover the street address used by the perpetrator.

5)Storage. After inspection and counting, all boxes will be security-taped and placed in a secure storage facility for perpetuity. Public viewing will be available. Whenever security tape is removed from a box for viewing, afterward a new security tape will be put on the box, and both old and new security tape numbers will be written on the box and recorded in a master file.

6)Identifying and viewing your ballot. Any voter who wishes may contact election authorities with the serial number of his/her ballot, in order to ensure it was counted and not misplaced; the voter may view an electronic image of his/her ballot, or travel to the storage facility to physically view the ballot.

7)Future expansions to Paired-Box Ballot Counting. The above Methodology is the bare-bones version; possibilities for expansion of the program are virtually endless.

Below are examples:

—a)Electronic viewing of the inspection and counting processes, by the audience. The inspection and counting processes could be displayed, in close-up, on overhead monitors for the benefit of the audience. The monitors would be large enough so that the tiniest details of ballots and envelopes could be easily discerned. Audience members would be allowed to videorecord the monitors during the entire process; or, audience members could request (for a fee) copies of in-house recordings.

Thusly, the public in attendance at the ballot-counting would have the same close-up view of the ballots and envelopes as the poll workers and poll watchers… and also, would have the option of possessing of the same videorecorded permanent record as the county office of elections.

—b)Alternatives to separation by hand. The separation of ballots/envelopes could be done by machine, in the event there are complaints about the process being done by poll workers. (Who might see how someone voted.) Or, other creative methods could be devised whereby workers never see the front of the envelope that contains the address, during the separation process.

—c)Computerized lists of non-valid addresses. Poll workers and poll watchers… and any member of the public who wishes… could be in possession of computerized lists of vacant lots and other non-valid addresses that potentially could be used for the production of fraudulent votes.

Conclusion: Two methods for implementation of the Paired-Box Ballot Counting Initiative, should it be approved.

Should this ballot initiative be passed into law by the voters of ____________ county, here is how it will be entered into the books:

1)As a law, if there is no ruling in existence by a state, federal, or other authority, that prevents its implementation.

2)If such a ruling exists or is made, then the law will enter the books as a resolution, until such time as the ruling is repealed; at that time the resolution will revert to a law, and will be implemented.

Categories
Uncategorized

Ballot Initiative #2: mail-in ballot Fraud Prevention

This document is a Citizen’s Ballot Initiative Template for the processing, handling, and storage of mail-in ballots, at the precinct level, in ___________ county, for the purposes of: 1)preventing fraud, and 2)permanent storage of the validated documentation of the election results, for the public to inspect.

Note: This ballot initiative template is in a format designed to be shown as a promotion to the public, during canvassing of the voters of __________________ county. The final version of this template will be done in a traditional format, for entry as a ballot measure for a county election.

Preface:

The citizens of _____________ county demand that our elections be conducted in a transparent manner that is satisfactory to all. We are not satisfied with the claim by election professionals that “once the ballot and its envelope are separated, there is no way to check on the validity of the election results, because the sanctity of the secret ballot must be protected.”

Our demand is being made not because the citizens of our county suspect past fraud, but rather because in light of nationwide events of the past years, we wish to feel totally secure in our election process.

Furthermore, we feel that should this experiment be successful, it would provide an example for citizens elsewhere who also feel a need for election security.

In the event that this proposed initiative wins at the ballot box and becomes a statute, but there exists a ruling by federal, state, or other authority that prevents its implementation, then it will remain on the books as a ‘resolution’, until such time as the ruling preventing its implementation is repealed.

Proposed Fraud-Prevention Methodology for counting of mail-in ballots:

1)The inspection and counting will be open to poll watchers and to the public.

2)Separation. The ballots, still in their envelopes, will be separated into groups of 50; next, their envelopes will be removed; then, the ballots and envelopes from each group of 50 will be put into two separate, uniquely-numbered boxes… one box for ballots, the other for envelopes. From this point on, each pair of boxes… one containing ballots, the other containing envelopes… will remain paired for perpetuity, including when the boxes go to storage.

So… just as in the old system… no ballot can be matched with any particular envelope… thereby protecting our legacy of the legally-mandated secret ballot. However, it will be known that any fraud that is detected has originated from among a particular group of 50. Although the offender is unknown, it will be exponentially easier to correct the problem, than it would be if the fraudster were totally anonymous among the entire voting population.

3)Inspection. The inspection process of the first batch of 50 ballots and its corresponding batch of 50 envelopes, will begin. It will be done by multiple poll workers, and viewed by the public.

Note: the above-mentioned inspection occurs before the vote-counting process. They are two separate processes.

Any pair of 2 boxes in which suspect ballot(s) or envelope(s) is(are) discovered, will have the suspect document(s) attached to the outside of the box. After the remainder of the contents of the 2 boxes have been inspected, all current action on this pair of boxes will stop, until the offending document(s) can be inspected by election professionals.

4)Repairing of discovered fraud. If one or more of the suspect document(s) is(are) found to be, in fact, fraudulent, then all of the 50 voters associated with the 2 boxes must re-vote. In this manner, the fraudulent vote has been isolated even without having a method to identify the perpetrator(s) of the fraud… thus maintaining our legacy of the secret ballot.

In this manner, election integrity and the secret ballot are both protected. Under the old system, discovery of a fraudulent envelope(s) was useless, because we can’t make everyone in the county re-vote. Now, we only have to require a relatively small number of people to revote, in order to clean up the mess.

Discovery of a fraudulent ballot would be useful also, but not as critical since the ballot could just be removed and not added to the vote count. Since the integrity of the election has been restored by the removal of the offending ballot, a re-vote would be optional; the only purpose would be to attempt to discover the street address used by the perpetrator.

5)Storage. After inspection and counting, all boxes will be security-taped and placed in a secure storage facility for perpetuity. Public viewing will be available. Whenever security tape is removed from a box for viewing, afterward a new security tape will be put on the box, and both old and new security tape numbers will be written on the box and recorded in a master file.

6)Any voter who wishes may contact election authorities with the serial number of his/her ballot, to ensure it was counted and not misplaced.

7)For the sake of simplicity, some details have been omitted from this Methodology section; for example, before a re-vote, voters could be contacted and asked if they had voted, in an attempt to discover the street address(es) that were the source of the problem. Another example: the separation of ballots/envelopes could be done by machine, in the event there are complaints about the process being done by poll workers; or, creative separation methods could be devised whereby workers never see the front of the envelope that contains the address, during the separation process.

Conclusion: Two methods for implementation of the initiative.

Should this ballot initiative be passed into law by the voters of ____________ county, here is how it will be entered into the books:

1)As a law, if there is no ruling in existence by a state, federal, or other authority, that prevents its implementation.

2)If such a ruling exists or is made, then the law will enter the books as a resolution, until such time as the ruling is repealed; at that time the resolution will revert to a law, and will be implemented.