In multiple swing states flash drives (USBs) used in the 2020 Election process were reported either missing or suspiciously inserted into the voting systems used in the election.
In Arizona, on November 5th a home was raided and USBs were obtained along with hard drives and computers.
What was an individual doing with these items only a couple of days after the election?
In the State Farm Arena in Fulton County Georgia we identified numerous activities where USBs were transferred suspiciously between election personnel. One was a strange pass between a mother and her daughter, two elections workers made famous due to their suspicious activities during the election.
Another suspicious pass occurred with a guy we labeled the “USB Guy”.
In Gwinnett County an official admitted to taking data from the Election Management System, plugging it into a laptop, then filtering it with Excel. This circumvented the rules that external software isn’t allowed on election machines. However, rather than being upset with this activity, Georgia election COO (or whatever his title is) Gabe Sterling went off on the media for reporting this.
On October 1, 2020, it was reported that an election laptop and memory sticks (USB’s) were stolen in Pennsylvania.
On November 12th, only a few days after the election, a report was released from the Trump team stating that outsiders with USBs and VCards were allowed in Pennsylvania counting areas with no observers present.
In late November in Pennsylvania, a very credible witness described how he personally observed dozens of USB cards being uploaded to voting machines which resulted in 50,000 votes for Joe Biden in a short period of time. (This may be the same individual who was referenced in the report above.)
We reported on a missing flash drive in Milwaukee at the same time the city recorded 120,000 votes, all for Joe Biden, on the morning of November 4th.
One IT expert reached out to us a few days after the election and shared some information on the voting systems used in US elections. This IT expert located a previous audit report from an audit of the Dominion voting system in California. In the audit report the state of California showed a high-level diagram of the Dominion system which is likely similar to the set up in Pennsylvania and other locations:
This diagram showed that there are laptops or workstations onsite that some of the workers can access after the ballot images are scanned in. Our expert stated that he kept thinking about the USB drives and immediately noticed this is where election data (i.e. forged/faked images) could be inserted or changed.
When a number of USBs in a location go missing or are lost, the proper response would be for the location or district where the USBs went missing to replace all USBs in the locations or districts with similar credentials as the missing USBs. There is no indication that this happened in the 2020 Election.
In addition, per a discussion with one top security expert, the protocol related to the transfer of USBs in Arizona and other states appears to have changed for this election. Rather than individuals from each location transporting the USB to the tabulation centers and signing off on their activities which provides the proper chain of control, this year something different took place. Individuals from the state or from some election-related entity picked up the USBs at all locations and transported them to the location where the results were tabulated. The reason for this change was blamed on COVID or rather, COVID was used to make this change.
This whole scenario opened the door to manipulation of votes through the USBs before they were delivered to the location where they were to be counted.