USA Election 2020 Was Rigged: The Evidence
Patrick Byrne
A concerned citizen who has been hunting the oligarchy and Deep State since 2004.
November 24, 2020
https://''www.deepcapture.com/2020/11/election-2020-was-rigged-the-evidence/''
Massive (but not widespread) election fraud occurred on November 3:
1.) Smartmatic election software was developed in Venezuela with porous security and
built-in functionality allowing system administrators to override the security
features it pretended to incorporate. Among the extraordinary privileges it
granted to administrators were abilities to:
a.) shave votes continuously from one candidate to another;
b.) batch ballots for later “adjudication” ''but which instead became a
pool of votes that the administrator could simply assign to the candidate of
choice;'' generate blank ballots.
2.) Through a string of corporate mergers and acquisitions and licensing agreements,
that software ended up in systems made by Dominion for use in the USA and other
countries, where that same overly-generous functionality and porous security
allows manipulation not just by administrators, but by those outside the precinct
and even abroad.[1]
3.) These functionalities were strategically & aggressively used to rig the US
election on November 3.
a.) It was strategic in that it was not “widespread” but targeted at six
cities[2]which, if flipped, also would flip the swing states in which they are
found (and thus, the electoral college);
b.) It was aggressive for the simple reason that Trump broke their algorithm,
because he was on his way to a win that exceeded their ability to overcome
through minor cheats alone. It is for that reason that in those 5 locations
the bad guys went full-on-goon (e.g., thugs intimidating observers, newspapers
taped over windows, “water main breaks” shutting down counting “for the rest
of the night” then immediately reopened once Republican observers had
departed, etc.)
4.) Proof of this is found in three forms that dovetail perfectly;
a.) Documentation of the extraordinary administrator privileges embedded
within Dominion’s systems;
b.) Affidavits from voters and volunteers describe experiences that match
exactly what they would experience in locations being gooned by the measures
to which I refer;[3]
c.) Charts (such as those below) expressing outrageous statistical oddities
(e.g., thousands and tens of thousands of sequential Biden votes that occur
with quadrillion-to-1 improbability, ballot processing velocities physically
impossible given available site equipment) that themselves coincide with
windows of intense and aggressive intimidation of and interference with those
observing the voting and counting.
5.) In each of several swing states, Biden achieved a come-from-behind victory with a
margin in the tens-of-thousands thanks to getting hundreds of thousands of votes
through these measures.
Conclusion: The US 2020 election was wildly compromised: it is an egg that can’t be unscrambled.
[1] Dominion’s servers are widely infected with QSnatch malware. As poll-workers (e.g., administrators) log-in, QSnatch steals their credentials. Thus not only can administrators override (with no audit trail) election security in a precinct, so can anyone who steals those credentials (which, given the ubiquity of QSnatch on Dominion servers, happens everywhere). Dominion sends out software patches that continuously (deliberately?) allow QSnatch to beat their patches.
[2] Atlanta, Philadelphia, Detroit, Milwaukee, Maricopa County Arizona (Greater Phoenix), Clark County Nevada (Greater Las Vegas).
[3] By way of example: Sharpie/Bic switcheroos experienced in Maricopa precincts reflect a wish to generate a large pool of “adjudicated ballots” for administrators, who could drag-and-drop them later to Candidate Biden.
*Pardon bad formatting. Have been tweaking it but I have delayed long enough getting this live. I will be adding graphs below in the hours ahead.