{"id":34320,"date":"2024-11-04T13:03:00","date_gmt":"2024-11-04T19:03:00","guid":{"rendered":"https:\/\/ustower.net\/?p=34320"},"modified":"2024-11-04T20:07:59","modified_gmt":"2024-11-05T02:07:59","slug":"us-elections-purportedly-controlled-by-intelligence-agencies-author","status":"publish","type":"post","link":"https:\/\/ustower.net\/?p=34320","title":{"rendered":"US Elections Purportedly Controlled by Intelligence Agencies \u2013 Author"},"content":{"rendered":"\n<p class=\"has-medium-font-size\"><strong>Washington&#8217;s intelligence agencies are \u201crunning\u201d the elections in United States, claims American political scientist and best-selling conservative author Dr. Jerome Corsi, who points at what he describes as the discovery of certain \u201calgorithms\u201d within the state board of election and voter registration databases.<\/strong><strong><\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\">Washington&#8217;s intelligence agencies are \u201crunning\u201d the elections in United States, claims American political scientist and best-selling conservative author Dr. Jerome Corsi, who points at what he describes as the discovery of certain \u201calgorithms\u201d within the state board of election and voter registration databases.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">According to him, Andrew Paquette, a computer graphics artist and a \u201creal genius in terms of computer work,\u201d found \u201cpatterns in the New York voter registration files maintained by the state, the State Board of Elections.\u201d<\/p>\n\n\n\n<p class=\"has-medium-font-size\">\u201cThese are the actual records from which voting occurs. And he found that they had been arranged mathematically so as to hide data. And as he began to get into the system and figure out the patterns, he actually came up with the equations, the algorithms that are involved in assigning voter IDs to the voters in New York,\u201d Dr. Corsi elaborates.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">This scheme, which he suggests is designed to allow its perpetrators to \u201cinsert voters who do not exist,\u201d is so \u201ccomplicated mathematically\u201d that it \u201chas to be an intelligence operation,\u201d he suggests.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">\u201cIt&#8217;s designed to be hidden. It would be costly to put it in place. It would require a clandestine group to get access to the state Board of Education computers so that they can embed these codes and make the database work the way they want it to work &#8211; hiding data. And I think we&#8217;re finding these algorithms in virtually every state we&#8217;re looking at, and they&#8217;ve been there since 2007,\u201d Dr. Corsi warns.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">&#8211; Dr. Corsi claims that the perpetrators of this scheme aimed to \u201crearrange\u201d voter data so that a voter&#8217;s number isn\u2019t tied to their registration date.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">&#8211; A mass of non-existent voters, numbering in the hundreds of thousands \u2013 non-existing but officially registered nonetheless \u2013 allegedly exists in state registration databases.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">&#8211; \u201cWhat happens is that voter appears to be a real person&#8230; You&#8217;ve got a certifiable vote even though the person doesn&#8217;t exist,\u201d says Dr. Corsi.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">&#8211; To influence elections, perpetrators allegedly use algorithms to identify and cast mail-in ballots for these \u201cghost voters.\u201d<\/p>\n\n\n\n<p class=\"has-medium-font-size\">&#8211; Dr. Corsi claims the mainstream media avoids reporting this because it is \u201ccontrolled by the CIA.\u201d<\/p>\n\n\n\n<p class=\"has-medium-font-size\">He also claims that the US mainstream media does not want to report this \u201cbecause the mainstream media itself is controlled by the CIA.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Any US Election Can Purportedly Be Stolen Via &#8216;Ghost Voters&#8217;<\/strong><strong><\/strong><\/h3>\n\n\n\n<p class=\"has-medium-font-size\">The US Democratic Party seems to be \u201cdone with elections\u201d and the CIA \u201cdoesn&#8217;t want any elections anymore,\u201d laments Dr. Corsi.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">With a veritable army of \u201cghost\u201d voters being hidden in voter registration databases, he claims, the people who organized this scheme could perpetrate \u201cmassive stealing of any election\u201d they desire.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">\u201cThe scheme here, the nefarious part of the scheme I&#8217;m describing is that these criminals controlling the state board of election voter rolls clandestinely can put these nonexistent voters into the data set and get away with it because these people have real legitimate numbers,\u201d he explains. \u201cThese non-existing people have real legitimate numbers issued by the state Board of Elections to vote. And so therefore, when they vote these mail-in ballots, the scheme is largely a mail-in ballot scheme, they vote that number, which is certifiable.\u201d<\/p>\n\n\n\n<p class=\"has-medium-font-size\">And challenging a certifiable vote, Dr. Corsi points out, is very difficult in the US because it essentially amounts to claiming that \u201cthe certification was wrong,\u201d which is difficult to prove.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">&#8220;The courts don&#8217;t want to hear these cases because it&#8217;s political. Our courts consider our elections political. They don\u2019t want to resolve a political question,\u201d he adds.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">\u201cI&#8217;m asking questions about the future,\u201d Dr. Corsi says. \u201cI&#8217;m saying how many illegal votes are we going to get this coming up election? Why are these algorithms there? Who put them there? They&#8217;ve been there since 2007. We can tell that from the computer records. Have they been used in past elections? I don&#8217;t know. But I&#8217;m questioning.\u201d<\/p>\n\n\n\n<p class=\"has-medium-font-size\">&#8216;CIA-Quality Encryption&#8217; Involved in Alleged &#8216;Ghost Voters&#8217; Scheme in US<\/p>\n\n\n\n<p class=\"has-medium-font-size\">The algorithms allegedly employed in a scheme to conceal thousands of fake voters in US state voter registration databases are way too complex to be pulled by \u201csome kid with a computer in his father&#8217;s garage,\u201d argues Dr. Corsi.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">\u201cThis is CIA-quality encryption,\u201d he alleges. \u201cIt&#8217;s this is the kind of encryption you would do if you were running a military and you&#8217;re putting an army in the field, and you want your army to communicate on a code you would do algorithms and cryptography so the enemy couldn&#8217;t read the code.\u201d<\/p>\n\n\n\n<p class=\"has-medium-font-size\">According to him, the people who snuck these reported fake voters into registration databases and know how to locate these voters can thus procure mail-in ballots \u201cthat can be certified because the numbers match even though the voter doesn&#8217;t exist.\u201d<\/p>\n\n\n\n<p class=\"has-medium-font-size\">\u201cAnd our states do not go out in the field to see if these mail-in ballots exist of these people are real. If they are at the addresses they say they are, if they have a legitimate legal right to vote &#8211; the states don&#8217;t check this,\u201d Dr. Corsi reveals. \u201cThis one loophole is what permits the criminals to devise this entire cryptographic scheme. And I think it&#8217;s one of the greatest election frauds in the history of the world. I think it&#8217;s a genius level criminal activity. And I think it&#8217;s largely unknown.\u201d<\/p>\n\n\n\n<p class=\"has-medium-font-size\">About one-third of the voters in the US cast their ballots early during this election, with most of them doing so by mail.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Corsi also points at the circumstances of a sudden surge of popularity Kamala Harris experienced not long after she replaced Joe Biden as the Democratic Party candidate in the 2024 US presidential election.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">\u201cSuddenly you get stories about Kamala is \u2018surging.\u2019 So the signs of these are first of all, Kamala then has better numbers. So at the end, when they say Kamala \u2018surged\u2019, that justifies the voting scheme where at the end, all these non-existing people are voted in order to change the real outcome of the election. It&#8217;s really a very brilliant scheme. And in fact, it exists. And in fact, we&#8217;ve lost control of our elections in the United States and in Europe, because the intelligence agencies, they are computer-capable. They have the money. They can create a psychological operation. This is a psychological operation that&#8217;s being run against the American people, I believe, by the CIA,\u201d Dr. Corsi claims.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How Kamala Harris Could Be Made President Through Voter Fraud<\/strong><strong><\/strong><\/h3>\n\n\n\n<p class=\"has-medium-font-size\">Dr. Corsi has outlined a pattern of a potential voting fraud that he thinks may take place during the 2024 US presidential election.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">\u201cThe pattern should be obvious to everybody, which is Donald Trump is doing extremely well and he&#8217;s going to win. But then suddenly, late in the day, it starts shifting and then they stop the count of the votes. And overnight, suddenly all these mail-in votes, and they&#8217;re all for Kamala Harris,\u201d Dr. Corsi elaborates. \u201cEverybody&#8217;s voting for her in mail. Well, it&#8217;s all a lie. Those are the patterns that this fraud permits. And once you see the pattern, that&#8217;s the magic trick.\u201d<\/p>\n\n\n\n<p class=\"has-medium-font-size\">He points out how Harris has been \u201cgetting all the favorable press\u201d lately despite not being able to \u201cutter a coherent sentence\u201d and the fact that \u201cno one seems to like her.\u201d<\/p>\n\n\n\n<p class=\"has-medium-font-size\">\u201cI think the CIA would be happy to have a dead person be the president and then run the president with AI,\u201d Dr. Corsi adds. \u201cObama&#8217;s on the record as saying he&#8217;d love to be having a third term if he only be in the background, with the president who was a figurehead. Well, I think he had that with Biden and now with Kamala, who is by Obama&#8217;s pick, maybe he&#8217;s going to get his next term.\u201d<\/p>\n\n\n\n<p class=\"has-medium-font-size\">\u201cSo I&#8217;m sounding the alarm. I want to know why these algorithms are there. Who put them there? If they&#8217;re going to be used, I want to know if we&#8217;re being set up for an election steal. Not challenging things about the past,\u201d he adds.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><a href=\"https:\/\/sputnikglobe.com\/20241104\/us-elections-purportedly-controlled-by-intelligence-agencies-author-1120771218.html\">sputnikglobe<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Washington&#8217;s intelligence agencies are \u201crunning\u201d the elections in United States, claims American political scientist and best-selling conservative author Dr. Jerome Corsi, who points at what he describes as the discovery of certain \u201calgorithms\u201d within the state board of election and voter registration databases. Washington&#8217;s intelligence agencies are \u201crunning\u201d the elections in United States, claims American [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":34321,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[1870,7302,1613,8169,10442],"class_list":["post-34320","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-politics","tag-cia","tag-control","tag-election","tag-intelligence-agencies","tag-us"],"_links":{"self":[{"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/posts\/34320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ustower.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=34320"}],"version-history":[{"count":1,"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/posts\/34320\/revisions"}],"predecessor-version":[{"id":34322,"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/posts\/34320\/revisions\/34322"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ustower.net\/index.php?rest_route=\/wp\/v2\/media\/34321"}],"wp:attachment":[{"href":"https:\/\/ustower.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=34320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ustower.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=34320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ustower.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=34320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}