One of the methods of finding new ballots when needing to “fill the counting gaps” was found by connecting the dots of whistleblower and ballot seller/donor that works for the USPS. Observers can’t catch fraud schemes because there is no observer for each USPS worker and for each ballot counting poll worker and the observer can’t know what ballot belongs to what sleeve if the ballot is already counted or cured.
One of the Schemes may work like this:
- Printing houses and the USPS send a huge quantity of mail-in ballots with text errors or address errors (including dead people or people that changed address). Returned faulty ballots are handled by postal workers.
- The “handful returned” ballots are given to ballot contractors or polling workers insiders.
- Ballot contractors and “party volunteers” collect those and pass them on to “processing” places or fill the ballots by themselves.
- After that they appear on the canvassing places and sometimes with backdated stamping.
- Data transfer between precincts, counties and main servers or hubs
USPS workers belong to a union that endorses on presidential candidate and one party. Many USPS and poll workers in certain states act or show their allegiance to certain party, otherwise they think that they wouldn’t get the job or be promoted. It may be the case, and the HR people know that it is almost impossible to prove it and they can convince colleagues to whistleblow on the whisleblower with out of context entrapment. If a whistleblower comes forward, a doxing campaign may be done by managers and “colleagues”. This might be one of the reasons state governors and politicians don’t want an automated system the involves less human intervention. The voting system could and should have the ability of red flagging “curing” irregularities like dead people vote.
Tampering with stamping of date or certification also was reported both in the USPS and in canvassing rooms. At the end of the day catching the fraud in all places is impossible because it is a “Whack a Mole” situation. Poll workers were also found to be filling ballots. This scheme may have been used in previous elections and it may undercut the proposition of some judges and media outlets that voter fraud can’t be done on quantities that are more then of thousands.
Other scheme can relate to the numbers tabulated after being transferred via USB drives from precincts to counties and to the board of elections. Software glitches as opposed to algorithmic or human intervention would occur across the board and not in specific places, which may indicate tabulation and transmission of counting data was compromised by human intervention.
Voters the got a confirmation of the their voting can’t really know if the poll worker or the counting machine tabulated the vote for the intended candidate. Some voters have received ballots of others in their addresses (2,3 and even more). There is no way to check if million of voters filled ballots of others (alive or dead) , so many people may vote more the once thinking that the aim justifies the end, specially in an environment were the media is trying to vilify one candidate mentioning that he is a Russian agent for years and thus create a passionate vote.
Passionate voters are more prone to commit voter fraud. If there is also a financial incentive to cast a vote for others that increases the numbers. Since the states that had universal mail-in voting didn’t cure their rolls before sending unsolicited mail-in ballots, logically all of those should be canceled by the courts and the state legislation.
e Lt. Gen. Thomas McInerney during his most recent interview with Two Mikes described “Hammer” and “Scorecard,” a pair of programs initially designed for the CIA before being privatized by Deep State players from the Obama administration. We explained how they work in an article last week, but the gist is this: “Hammer” or “THE HAMMER” is a counter-intelligence surveillance program used to spy on activities on protected networks (like voting machines) without detection while “Scorecard” is a vote-manipulation application that changes votes during transfer. It’s the least detectable form of election manipulation because it works during data transfer between voting stations and data storage hubs. Unless both sides are looking for irregularities, it’s impossible to catch. If nefarious forces had people on one side or the other (or both) during data transfer, it cannot be exposed.https://noqreport.com/
Ballot Contractor Call use databases of wemen that have previous maiden names or that moves to other states asking if they are planning to vote in their or previous state in order to create new ballots or registration requests.