“Frankly, although the media kind of sat on [Trump] pretty hard for saying he wouldn’t necessarily accept the results, it is ridiculous to say that a candidate or the public has to accept votes it can never verify,” she says. “We absolutely have the right to verify the count and to verify the results we are told are true.”
(More...)
The primary architect for current vote-by-mail computer software was Jeffrey Dean, an embezzler who specialized in computer crime...
...While in prison, embezzler Jeffrey Dean became friends with a narcotics trafficker named John Elder. While still in prison, on a work-release program, Jeffrey Dean was tasked with creating a computerized vote by mail program for King County, Washington. He began this assignment while working for his brother, Neil Dean, whose business had a contract with King County to provide temporary workers for its huge absentee voting operation...
(More...)
The Elections: A Brain Heirarchical Tree showing all the connections. Here you can see all the systems, software, people, groups, laws and legislation that effects our current voting system. By using this tool, you can easily put your finger on many items that create an insecure, fallable, untraceable vote using todays methods of Electronic and Mail in Voting.
(More...)
After audits, symposiums, data parsing, and so much more, it looks like the ONLY affidavit that outlined all the findings in the past two years that the press had a field day with is the ONLY one that had all the information needed to rectify the situation on legal grounds and has been factually accurate until this day. Who is running the elections, and why are machines not certified according to the Congressionally passed legislation HAVA ACT of 2002?
(More...)