Simply put, voting machines are merely computers with scanners. In today’s world we live with computers everywhere – so no big deal. Right?
Computers are good, safe, and reliable, aren’t they?
It’s actually not the computer or voting machine that’s the problem. It’s the software that can be used for good or bad. As most know, software is the programming that either runs the computer itself and/or runs functions or programs (apps) on the computer.
So, what are Algorithms?
Algorithms are impartial software functions running on computers. They don’t know good from bad or right from wrong. They simply do what they’re programmed to do.
According to “The American Heritage® Dictionary of the English Language, 5th Edition”, an algorithm is
“A finite set of unambiguous instructions that, given some set of initial conditions, can be performed in a prescribed sequence to achieve a certain goal and that has a recognizable set of end conditions.”
My simplified definition:
“An algorithm is a way to CONTROL the DESIRED OUTPUTS based on CERTAIN INPUTS.”
Sounds simple enough if all you’re trying to do is to make sure that basic mathematics and scientific standards are upheld. Right?
So, why do companies hide their algorithms? Basic math and science are globally understood by all.
Could it be because they’re trying to hide the bad things, the wrong things, the fraudulent things, the misdirection, the misinformation, and gaslighting they’re spewing as the truth?
Thereby, aren’t they trying to CONTROL what we see as the truth?
Why does Google hide their algorithms?
Is what they do rocket science? They may want you to believe that, but the answer is a resounding NO.
They may claim it’s their “IP”, Intellectual Property, but that’s simply BS.
In computer terms, Searching is Simple. I didn’t say it doesn’t take good programming to accomplish this task, but a good Search Algorithm is well understood by most programmers.
In a Simple search, the output would merely be a list of results based the search terms used in the query (question). The results would land wherever they may.
Oh, but that means No One could CONTROL whose results would end up on “Page One”. Opps! We can’t have that now.
Google wants to CONTROL the outcome of any and all searches. They want to be sure that whomever pays them the most gets “Top Billing - Page One” Ad space. They also want to promote their backers, as well as, their own ideas and ideologies on who, what, when, where, and how information is to be seen.
Because of this, they must Hide their algorithms. They cannot let you see their CONTROL or you’re reject them forever.
Even worse, now-a-days, we have AI or Machine Learning Algorithms that are taking this to a New Level – for good or for bad.
Voting Machine Algorithms
So, why do the voting machine companies hide their programmed algorithms?
To protect their “IP”, Intellectual Property? No. That’s simply BS again.
Simple math does NOT need to be hidden.
Doesn’t 1 + 1 = 2?
And 2 + 2 = 4?
If their algorithms are tasked to do SIMPLE COUNTING of ballots, then that’s ALL it should be.
1 + 1 = 2; 2 + 1 = 3; 3 + 1 = 4 ... etc.
No Intellectual Property to be protected.
Nothing would need to be hidden.
Unless the algorithms are written to be Biased for one Candidate over another.
Opps! Back to Google type algorithms.
Remember my Simplified Definition:
Control the Desired Outputs based on Certain Inputs
Let’s look at Voting Machine Algorithms that must stay Hidden.
First, what are the Certain Inputs?
- We have Candidate #1 is a GOP and Candidate #2 is a Dem
- The algorithm was written for Dems to win
- The algorithm was written to ask questions and what-ifs of itself throughout the process to continuously "hide the cheat"
- Do you want them to win by a number of votes?
- Do you want them to win by a percentage?
- Do you want the algorithm to mix it up across multiple Candidates so they look different to deceive the masses?
Second, what are the Desired Outputs?
Here are 2 Simple Options:
- Change 1 vote at a time, back and forth, as needed. The problem is that may look too predictable.
- Or mix it up to create more realistic variables, as the results are tabulated. There can be a thousand ways to do this. And many much more complex than this extremely simplified example.
Let’s demonstrate this simple example with just 50 ballots:
- For the first 10 ballots that are scanned in
- 7 are in favor for the GOP Candidate
- 3 are in favor for the Dem Candidate
- So, the algorithm changes the votes and records them as the Dem 6 and the GOP 4
- For the next 10 ballots scanned in
- 6 are in favor for the GOP Candidate
- 4 are in favor for the Dem Candidate
- So, the algorithm changes the votes and records them as the Dem 5 and the GOP 5
- For the next 10 ballots scanned in
- 7 are in favor for the GOP Candidate
- 3 are in favor for the Dem Candidate
- So, the algorithm changes the votes and records them as the Dem 4 and the GOP 6
- For the next 10 ballots scanned in
- 4 are in favor for the GOP Candidate
- 6 are in favor for the Dem Candidate
- So, the algorithm lets them stand and records them as the Dem 6 and the GOP 4
- For the next 10 ballots scanned in
- 5 are in favor for the GOP Candidate
- 5 are in favor for the Dem Candidate
- So, the algorithm lets them stand and records them as the Dem 5 and the GOP 5

So, while the GOP Candidate should’ve won 58% to 42%, by a 16-point spread, the algorithm changed it so the Dem Candidate won 52% to 48%, a much closer, believable, controllable, and not able to be recounted 4-point spread.
Sleight of Hand Magic Tricks:
Keep them off track by ‘Throwing Them a Bone’
Now to mix things up. Let’s say the algorithm makes some adjustments along the way for each and every 50 ballots coming in.
- It can mix up the numbers
- Sometimes letting the GOP Candidate take the lead
- Maybe going back and forth
- Always keeping “in mind” the Desired Output
- It can throw in a slight percentage multiple once in a while to mix things up
- It can ask questions (of its many programmed options)
- About who and how the outcome should look like
- Then throw in some other conditions to skew the numbers and percentages their way
- But, in the end, always making the Dem count better than the GOP just by enough to secure the win without the possibility of a recount
Look how easy that was. Just a bit of programming.
All very doable. For decent programmers, this is relatively easy. There are probably thousands of programmers that have the ability to do it.
In any other world this would be called FRAUD and should be prosecuted as such.
Test Modes versus Election Day Tabulations
There’s a “slight glitch” you might have or might not have thought of to this point.
Election Officials must go around and validate that each voting machine is working 100% correctly the month, the week, and the day before elections.
You might be wondering how voting machines could be programmed to do all the crazy stuff, above, but be able to pass all the Tests.
SIMPLE
The algorithms are programmed to:
operate Normally, as expected, in Test Modes,
and also, by date and times.
Then operate with planned Fraud in Election Mode.
What are Backdoors?
Algorithms are built with as much logic as possible to make the vote look legitimate, while achieving their end goal:
CONTROL the outcome to favor the Dems without a recount.
But the limitations of algorithms are that they’re static. As much as they “know” (are programmed to become AI with Machine Learning) they cannot realize every possibility that might need some tweaking along the way or specifically in the end.
So, what if you need some dynamic adjustments?
Human intervention?
Do you need to hack into the voting machines?
NO.
Not if you created a backdoor.
In our homes, a backdoor is a second way into the house. Normal. Expected.
In software, a backdoor is a second way into the program. Normal. Just not supposed to be there post development.
Programs are supposed to ONLY have a front door. A way for legitimate users to login with specific identities and passwords that can be tracked.
But many programs have hidden backdoors that allow programmers to gain entrance, do whatever they want or need to do without detection or tracking.
Why?
Most of the time it’s for the good, so programmers can gain access to a machine that’s locked up or going “crazy” when the front door might not be working correctly. This is common practice. Especially during development time.
Post development, that backdoor should be closed and removed – in many programs they are.
But what if you were planning on committing FRAUD from the beginning, per the algorithms, above? Then you’d absolutely have your programmers create backdoors for you to access and CONTROL.
Then, you can go in and manually tweak anything you want and you’re “golden” – almost.No reason to worry about Hacking or Cybercrime when the Backdoor is Wide Open
If voting machines are on any kind of network, let alone the Internet,
then it’s GAME OVER.
A network allows access to the Backdoors from anywhere on that network.
That can be a local network or a network with VPN access from many places.
If on the Internet, then anyone from anywhere can access the Backdoors.
No need to Hack anything.
And, all the Cybercrime Software in the world is not going to stop Legitimate Access of the machines.
On any network, "access to the machine" is "access to the machine".
Therefore, Backdoors are seen as legitimate access.
To any kind of Security Software running on a network, Backdoor Access does NOT look like Hacking or Cybercrime. Unfortunately, Security Software does not know how to detect the Backdoor from the Front Door.
Watch a great 11-minute video at https://frankspeech.com/video/absolute-truth-interview-general-thomas-mcinerney-ret-usaf-lt-0
It's an important exposé on those behind the scenes and in the know about Cyber access of these Backdoors. It even reveals some of the Dynamic Cheating that was happening in Real-Time this past election night.
Really Smart Software Covers Its Tracks
Hidden Code
For the more sophisticated hidden algorithms, they will have Code that Resets or Self-Destructs.
- Resetting the code means erasing the current algorithms and backdoors with a “fresh” load that only looks like the original “Test Mode” code
- Self-Destruct code means that it screws up everything to look like the system “crashed” and lost everything
- Either of these operations can be initiated by the original code when:
- A preset day or time constraint happens, i.e., a month after all voting is over – remember computers track time
- Or the code “observes” that someone is “poking around” looking for the hidden algorithm and backdoor code
Open-Source Code
Open-source code means the programming language and all algorithms are open for all to see. Nothing hidden.
Daylight is the Best Disinfectant
Meaning that many decent programmers would be able to look at the code, before and after elections, and easily figure out if the algorithms are simple, devious or malicious. They can also figure out if any backdoors exist.
Open-source code should be sufficient to stop 99.9% of the problems. This almost could make the argument that open-source voting machines can be used without fear.
Unfortunately, Not True
On the surface, there are no ways around open-source code that would prevent this,
Unless?
There are hidden secrets that the majority of programmers don't even know about.
- Code that is hidden at machine level in the bits and bytes
- That can be executed on command
- Code that is hidden under mount points that can never be seen unless you know how and where to look
- That can be accessed and executed “in the dark of night”
- Then hidden again to “never” be found
So, unfortunately, NO voting machines, open-source or not, can be used without fear of Hidden, Devious or Malicious Intent.
The Fake, the Cheat and then the Ballot Dumps
Now that we know how they’re able to dynamically Fake and Cheat the numbers during the voting process, it’s time to bring in the Ballot Dumps.
How many Ballots do they need to get the DESIRED OUTPUT?
The Algorithms and Backdoors are keeping dynamic running Totals for them. A few for the GOP and the majority for the Dem.
There are various means of backing the Fake: by sending out mail-in ballots to everyone from the covid-excuse days, to drop boxes, to ballot harvesting, to non-clean voter roles, to “mysterious” groups of ballots that “magically” just show up days after the voting ends.
Then delaying the count by any means possible. Counting problems. Machine problems. Worker problems. Power outages. Camera outages. And any other problem they can dream up.
They’re response: “We’re doing our best, but it’s going to take more time.” And more time. And more time.
This gives the Fraudulent workers time to create the influx and distribute the premade ballots that mainly back the Dem Candidates and also give a smaller percentage to the GOP Candidates to make it "look fair".
Yes, I mean premade, because it was part of the FRAUDULENT plan from the beginning.
But what happens when they need a lot more "extra" ballots? Like what happened in the 2020 election, because so many more millions voted GOP, and probably some here in 2022? They create more “counting delays”, “machine delays” or whatever excuse they can use, so they can rush out and produce more Fake ballots and distribute them.
Now they’ve covered their tail.
We may NEVER know the truth.
What could be easier?
How To Fix It
NO MORE COMPUTERS INVOLVED IN VOTING SYSTEMS OR TALLIES, ANYWHERE, ANY HOW, FOR ANY REASON.
PAPER ONLY, WITH CLEAR RULES.
New Rules for Every County in Every State:
- As much as we love and live with computers in our daily life, NO MORE COMPUTERS anywhere in the Voting or Counting Process
- Voter ID’s Required
- It’s already been proven that it’s NOT a problem for any Legal US Citizen to get a Driver’s License or State ID
- Clean up Voter Roles
- No more dead people on the roles
- No illegals
- One (1) Day Voting, ONLY
- No early voting
- No additional days or delays for counting
- Mail-ins for Certain Categories with Limitations
- Only for Requested Mail-in ballots
- Only if Medically Certified as Disabled or Deployed Military Personnel
- Only if Requested within 30 to 60 days before each election
- Their Mail-in packet includes prepaid return envelope with instructions, such as:
- Mail-ins MUST have your printed Name, ID Number (like State ID or Driver’s License), and clear signature, to be counted
- Mail-ins MUST arrive by election day or they will NOT be counted
- Mail-ins must have their signed and verified signature envelops stapled to the ballot to give a transparent way to verify that NO Fraud or additional ballots were entered into the original count, any recount or audit
- People using Mail-in ballots MUST be told in the Instructions that they are making the following CHOICE by not coming in to vote in person:
- That by using the Mail-in process their ballot will lose “secret ballot” status because their envelope will be stapled to the ballot
- or depending at each State's discretion, if they don't want to keep the envelopes, they can put the printed Name, ID Number and clear signature on the Mail-in ballot itself
- Each State should create a way to secure all Mail-in ballots so that Voter information can be only be seen by the election workers for that day
- And keeps them secure for as long as the State keeps ballots
- That by using the Mail-in process their ballot will lose “secret ballot” status because their envelope will be stapled to the ballot
- If the Voter cannot agree with all these rules, then they must come in person to vote
- There needs to be Clear and Total Oversight
- There needs to be Total Transparency
- There needs to be Multiple Proofs of Chain of Custody of all ballots at all times
Paper Only Rules for Every County in Every State:
- Paper must have all Names or write-in areas with Checkboxes and Clear Instructions
- Use provided permanent ink pens
- Draw “X” through or fill-in the Checkbox next to the Candidate of your choice
- Make a clear decision before marking, because there cannot be any erasing or changing of their markings later
- Secret ballot for day of voting ballots, ONLY (based on rules), meaning:
- Election workers must do a Voter Check before giving paper ballot to Voter
- Voter must be listed on roles
- Valid Voter ID
- Worker Checks Signature against roles
- Upon completion of ballot, Voter Immediately Drops ballot into Single Dropbox at Voting Location
- That is watched and secured at all times
- Election workers must do a Voter Check before giving paper ballot to Voter
- New Rules for All Mail-In ballots (per above):
- Must have a good reason or no Mail-In allowed
- Must be Requested 30-60 days before the election
- Must have Name, Signature and ID info on ballot envelope
- Envelope Must be stapled to the ballot to be Legal
- If not stapled together, then it will not be counted
- or same info on the ballot itself
- Voter has been informed that it no longer will be able to be secret
- So, State can verify 1 legal vote per person
- If not stapled together, then it will not be counted
- Must be in by Day of Voting or NOT counted
Counting Rules for Every County in Every State:
- One (1) Day Sequestered Counting, ONLY
- Each County has Three (3) Groups of Counters
- The number in each Group depends upon what it would take to do the following, in one (1) 8-hour day
- Number of Counters TBD by each County or each State
- No cell phones or any other means of communications would be allowed amongst any Counters, Workers or Supervisors
- Planned work schedule:
- Food and non-alcoholic drinks to be provided by County
- Several scheduled 15-minute bathroom breaks
- 30-minute lunch and dinner breaks
- With instructions that there are no phone or other communication usage at any time for any reason
- And, no discussion of any kind about tally numbers, candidates, etc.
- One (1) Head Person for the County who’s over all Workers and Supervisors at the site
- That person has Phone Access for Emergencies, Only
- That person cannot see any tally sheets until they have been adjudicated as complete by the 3 Supervisors, at the end of process
- Count to tally sheets, ONLY – no computers involved anywhere
- Full supervision
- Full chain of custody
- Each group gets one third (1/3) of the ballots and counts to designated tally sheets, ONLY
- When completed, each group rotates to the next third and does the same
- Then they rotate to the final third
- Until each group has counted all 3 sets on separate tally sheets
- The Supervisor of each group gathers and controls all tally sheets
- When complete, the 3 Supervisors compare tally sheet totals for each third
- If off by more than .1% [or number TBD by each State]
- Then they are to do recounts again and again on the third in question
- Until they reach consensus on all 3 thirds
- Then they hand off to the Head Person for the County who calls, then delivers copies of those tallies to the Secretary of State and several other people for redundancy throughout the State
Addendum: The Exit Polls Told the Truth
75% of the people polled before the election said that inflation and crime were their most critical concerns for our country.
75% of the people exiting the Polls said the same thing.
Let’s look at Florida as the Best Example of Clean Voting while using Voting Machines in 2022.
- They Cleaned Up Their Voter Roles
- They Enforced Voter ID
- They did One (1) Day Voting
- They Counted All Votes That Day
- Over 7 Million Votes
- Counted in 8 Hours or Less
- Governor DeSantis, Marco Rubio & others Won by Nearly 20 Points
Compare that to Blue States who drug on and delayed the Process, per above.
The Pundits claim the GOP lost because of early voting and not enough GOP turnout.
But the Exit Polls tell us GOP Candidates in many States should’ve Won by 20 Points like in Florida.
So, by Algorithms and Backdoors, we got Cheated again.
NOW IS THE TIME FOR EVERY GOVERNOR AND EVERY STATE LEGISLATURE TO FIX THIS ISSUE, SO WE CAN HAVE FREE AND FAIR ELECTIONS GOING FORWARD.
Postmortem
If France can count 49 Million Paper Ballots in One Day, so can we
Demand Audits of 2022 Elections, Everywhere, Now
It might be too late because they've already covered their tracks
But still worth the try
And will put them on Notice for the Future
Demand change to Paper Only, in Every State, Now, and for the Future
Do not believe or trust that Every State could perfect things like Florida did with computers
Don't believe or trust that even if they did it, today, that the next administration, or the next, would not change it back to Fraudulent computer systems
This is the ranting of a 40-year Software Engineer – take it for what’s it worth
00002
0 comments