My name is Phil Waldron, I’m a retired Army going 30 years I spent the first half my career just like Colonel mastriano here as a cavalry officer, conducting armed reconnaissance counter reconnaissance last half of my career, spent in information warfare. As a psychological operations officer and information Operations Officer, conducted computer network operations, electronic warfare especially electronic warfare deception counter deception and offset and a couple other specialties.
So I spent most of my all of my time as an operations officer, my perspective, looking at this, this problem set is how to break in how to break it how to destroy it how to manipulate it, and my team has been researching this specific issue since August, but we’re working with another team that’s been intently working on this problem set the voting machine manipulation for two years since the Ted Cruz and Beta race in Texas in 2018, and the Kentucky governor’s race where there were significant anomalies observed. And I like to add that there are many, many more teams like ours, small, small teams that are joined in this fight and therefore throwing the flag, left and right so there’s there’s a lot of folks who recognize the anomalies, the voting systems in the US and in Pennsylvania were built to be manipulated. They’ve been used in elections around the world, and stolen elections, around the world and Venezuela, Italy, Argentina Singapore, Bolivia is closest to two weeks ago.
Philadelphia uses ES&S Pittsburgh uses Dominion. Other counties in PA use Dominion and other systems.
What’s, what’s the real deal. So all these election systems have a common DNA SGO Smartmatic sold Sequoia voting systems to Dominion in 2010. And then the Diebold company spun off premier election systems to dominion, as a result of an antitrust suit. So the bottom line is that these systems have similar code and similar functions.
And just so you know I know there have been statements. To the contrary, but I personally debrief the son of a Cuban intelligence officer who had first hand knowledge of Hugo Chavez his family members who told him not to worry about the populist threat against Maduro his election in Venezuela, quote unquote, that it was guaranteed their father invested the money to build the sto voting machine system. So I had no reason to doubt his sworn affidavit to this effect.
But that’s that’s the root of the, the sto voting machines. So these systems are not once you’ve been told they are connected to the internet and servers outside of the US they’re connected from top to the bottom in the middle. There is no transparency is our previous witnesses met mentioned as to how the voter information is processed. How and where it’s stored the voting record is able to be modified and or deleted by operators administrators and outside threats operators can assign votes for writing ballots blank ballots, or air balance in large numbers so that they can be directed toward one candidate or another at the operators or supervisors discretion. And many experts have published, how easily these machines can be hacked to mid to manipulate votes. As a matter of fact, one of our white hat hackers previously discovered a malware, that’s present on the servers that captures every login and every password of every operator down to the precinct level that logs into one of these systems. That’s just like giving your, the password to your bank account out, putting it on the dark web, it’s not going to be there very long.
It is so you probably are all aware on 30 September, an election storage facility was robbed in your state, 30 USB devices were stolen and a laptop, those. Those USB devices, more than likely had encryption devices, and you just heard another previous witness. Talk about the the the nine standard use of the USB storage devices. So these systems. In a nutshell, allow authorized and unauthorized users to cancel votes shift votes preload votes vote blank ballots, all in real time. And in large numbers, they’re connected from a top to the bottom. So one bad actor or a team of bad actors can have equally negative inputs. It’s been described by another person or another state that we’re working with. Just like the lotto.
Whoever whoever organizes a lot of this always going to win. It’s controlling the numbers and it’s controlling the margins are experts and other academics believe that up to 1.2 million Pennsylvania votes could have been altered or fraudulent. This is what we discovered in the last 22 days, really only a detailed forensic analysis of the actual machines and software will truly show how many Pennsylvania citizens have had their civil rights violated.
So use these types of machines, with little or no audit trails. Little or no transparency of how the votes are processed, where they go where they’re stored. We’ll never leave the public satisfied that we truly have a representative democracy.
I’d like to correct something the mayor said I am not a statistician.
I’m a combat officer and I didn’t do well in math, but I can understand the numbers that he put out earlier I want to want to share with you one chart I believe it’s in your, in your package. So what rd has has done is focused on the spike anomalies, and these are events, a numerical amount of votes are processed in a time period that’s not feasible or mechanically possible under normal circumstances.
I believe that Greg Stenstrom mentioned earlier, the processing of these ballots through machines. There’s a manufacturer’s specified rate of speed that a number of ballots can image. The image, and processed. Those.
These spike anomalies in this chart, really show where we’re at, for us to look forensically to actually determine what happened with these votes.
Our team is looked at, at these systems. And there are a dozen ways to interdict the voting process in the issue, whether whether it’s male invalid manipulations. They can scan, and allocate boats blank votes, where there was a 70,000 votes left in the back room, there’s there’s just lots of ways to interdict these, these systems.
Have a tip we should know? Your anonymity is NEVER compromised. Email firstname.lastname@example.org
The Truth Must be Told
Your contribution supports independent journalism
Please take a moment to consider this. Now, more than ever, people are reading Geller Report for news they won't get anywhere else. But advertising revenues have all but disappeared. Google Adsense is the online advertising monopoly and they have banned us. Social media giants like Facebook and Twitter have blocked and shadow-banned our accounts. But we won't put up a paywall. Because never has the free world needed independent journalism more.
Everyone who reads our reporting knows the Geller Report covers the news the media won't. We cannot do our ground-breaking report without your support. We must continue to report on the global jihad and the left's war on freedom. Our readers’ contributions make that possible.
Geller Report's independent, investigative journalism takes a lot of time, money and hard work to produce. But we do it because we believe our work is critical in the fight for freedom and because it is your fight, too.
Please contribute here.
Make a monthly commitment to support The Geller Report – choose the option that suits you best.