Election 2020 Was Rigged: The Evidence November 24, 2020

By Patrick Byrne, DEEP CAPTURE

Author is ex founder and CEO of Overstock.com and is a libertarian.

Massive (but not widespread) election fraud occurred on November 3:

  1. Smartmatic election software was developed in Venezuela with porous security and built-in functionality allowing system administrators to override the security features it pretended to incorporate. Among the extraordinary privileges it granted to administrators were abilities to:
    • shave votes continuously from one candidate to another;
    • batch ballots for later “adjudication” but which instead became a pool of votes that the administrator could simply assign to the candidate of choice;
    • generate blank ballots.

  2. Through a string of corporate mergers and acquisitions, that software ended up in systems made by Dominion for use in the USA and other countries, where that same overly-generous functionality and porous security allows manipulation not just by administrators, but by those outside the precinct and even abroad.[1]
    1. These functionalities were strategically & aggressively used to rig the US election on November 3.
      • It was strategic in that it was not “widespread” but targeted at six cities[2] which, if flipped, also would flip the swing states in which they are found (and thus, the electoral college);
      • It was aggressive for the simple reason that Trump broke their algorithm, because he was on his way to a win that exceeded their ability to overcome through minor cheats alone. It is for that reason that in those 5 locations the bad guys went full-on-goon (e.g., thugs intimidating observers, papers taped over windows, “water main breaks” shutting down vote counting “for the rest of the night” then immediately reopened once Republican observers had departed, etc.)
    2. Proof of this is found in three forms that dovetail perfectly;
      • Documentation of the extraordinary administrator privileges embedded within Dominion’s systems;
      • Affidavits from voters and volunteers describe experiences that match exactly what they would experience in locations being gooned by the measures to which I refer;[3]
      • Charts (such as those below) depicting outrageous statistical oddities (e.g., thousands and tens of thousands of sequential Biden votes that occur with quadrillion-to-1 improbability, ballot processing velocities physically impossible given available site equipment) that themselves coincide with windows of intense and aggressive intimidation and interference with those observing the voting and counting.
    3. In each of several swing states Biden achieved a come-from-behind victory with a margin in the tens-of-thousands thanks to getting hundreds of thousands of votes through these measures.

    Conclusion: Our 2020 election was so wildly compromised it is an egg that can’t be unscrambled.


    [1] Dominion’s servers are widely infected with QSnatch malware. As poll-workers (e.g., administrators) log-in, QSnatch steals their credentials. Thus not only can administrators override (with no audit trail) election security in a precinct, so can anyone who steals those credentials (which, given the ubiquity of QSnatch on Dominion servers, happens everywhere). Dominion sends out software patches that continuously (deliberately?) allow QSnatch to beat their patches.

    [2] Atlanta, Philadelphia, Detroit, Milwaukee, Maricopa County Arizona (Greater Phoenix), Clark County Nevada (Greater Las Vegas).

    [3] By way of example: Sharpie/Bic switcheroos experienced in Maricopa precincts reflect a wish to generate a large pool of “adjudicated ballots” for administrators, who could drag-and-drop them later to Candidate Biden.

    *Pardon bad formatting. Have been tweaking it but I have delayed long enough getting this live. I will be adding graphs below in the hours ahead.

November 24, 2020 | Comments »

Leave a Reply