Dr. Fauci Once Argued Supporting Gain-of-Function Research was Worth the Risk of Causing a Global Pandemic
Follow the Money
by Allen Williams
Thank you for the reply.
I'd like to take the opportunity to clarify several issues raised in
your recent email. The first is your statement that over
"250 audits of the 2020 election were performed in accordance with
state law." Your definition of 'audit' can't mean anymore than
resolving vote tallies between ballot images and actual ballots. This procedure has NOT worked very well in
the Windham, New Hampshire audit to date
None of Michigan's alleged audits looked into the machine's works to
verify whether or not the components contained therein were legal.
So, to clarify, the only valid Michigan audit performed to date
was in Amtrim county which required a lawsuit to initiate. It
has been demonstrated in the 13th circuit court Antrim county
lawsuit forensic audit that there was Dominion voting machine
intervention in the election. An examination inside
the voting machine revealed an unauthorized program, Microsoft SQL,a
feature that permits vote manipulation. In addition judge
Eisenheimer allowed the audit to cover 13 addition precincts in
Antrim county where some 1060+ votes were recorded over and above
Antrim county's voting population, memory traces were found inside
the machine showing previous contact with Taiwan and Germany demonstrating
both internet connectivity and foreign election interference. This
is not an isolated incident involving voting machine fraud as there
are additional incidents in Windham county, New Hampshire where
Dominion is shorting the vote tallies and a separate forensic
analysis is still underway in Maricopa County, AZ where key files in
the EMS vote tabulator were found deleted.
The second is from my letter to Judge Eisenheimer which
stated Judge
Murray previously ruled that Jocelyn Benson's decision to
assume the signatures on absentee ballots were inherently valid
(What?), this assumption violates Michigan law which makes her
complicit in the 1060+ ghost mail in ballots identified in the
forensic audit. Benson was added as a defendant in Attorney Matt
Deperno/s second amended complaint. Read it at http://depernolaw.com.
100
Percent Fed Up reports – In March, Attorney Matt DePerno
subpoenaed 8 clerks in key counties in Michigan: Barry,
Charlevoix, Grand Traverse, Kent, Livingston, Macomb, Oakland, and
Wayne. In his subpoenas, DePerno asked to have access to their
poll tapes, ballots, logs, tally servers, election management
servers, election media, spreadsheets, and canvasser notes from
the 2020 election. The judge denied their requests after all 8
counties filed motions to quash his request. In Grand Traverse
County, Haider Kazim and Michigan’s dishonest Democrat Secretary
of State filed a joint motion to quash DePerno’s request.
The forensic evidence and the court's determination that
Secretary Benson violated state law should have been more
than enough to alert the Michigan legislature to at least
investigate MaComb, Oakland, Wayne, and Kent counties for
similar irregularities. And if found, immediate steps should have
been taken to decertify the election, except that certain Republican
members share culpability in advocating for and purchasing Dominion
voting machines.
Everyone makes mistakes, You would have retained much more
credibility If you would have admitted mistakes and then acted
to correct them, instead of doing nothing but obstructing people who
were trying to get at the truth. It is your constitutional
responsibility to discipline judges who prevent cases from
proceeding pursuant to real evidence in order to reinforce the
illusion that American elections are secure. It is your
responsibility to address electoral fraud issues that have been
revealed by the Antrim county forensic audit.
THIS IS CORRUPTION at the highest levels of Michigan
government.
And last: This is all part of the general movement to silence
individuals who accuse state officials of corruption as has been
revealed in Dr. Shiva's Massachusetts lawsuit Case
1:20-cv-11889-MLW Document 118 Filed 05/21/21 Page 1 of 7 at:
https://vashiva.com/first-amendment-twitter-galvin-lawsuit/
where it was revealed that an official manual for silencing accusers
exists entitled 'Elections Influence Operations Playbook for
State and Local Officials.'
As I have stated before this issue is NOT going away.
You needn't bother creating further election legislation because
without addressing the 2020 election fraud, new legislation will
simply be ignored as Secretary Benson has aptly demonstrated.
Your inaction threatens the continuance of America's
Representative Republic.
[80QKOQ-PGYO]
Hi Allen,Thank you for reaching out to the Office of Speaker Jason Wentworth regarding your concerns about the integrity of Michigan elections. As you know, safe elections are a cornerstone of our democracy and it is essential that all Michiganders trust every election.
Our office has been listening to the voters of the 97th district and across Michigan that share your same concerns. Speaker Wentworth will continue working hard to ensure our elections are secure.
Over 250 audits were performed in accordance with state law and the Michigan Constitution. The results of the election were formally confirmed by these audits, which included hand counts from selected precincts throughout the state.
The House has also approved several reform measures this year to ensure our elections run fairly. These include plans to remove dead people from our voter rolls, require verification of a person’s birth date when their birth date is unknown before voting, and to provide more training for everyone involved in the elections process.
In the latest challenge originating in Antrim County, a circuit court judge ruled that a post-election audit hand count showed results largely consistent with the canvass totals entered by the state, and the plantiffs’ request for another audit was satisfied by the hand recount.
Michigan families deserve fair and safe elections – and Speaker Wentworth remains committed to supporting bold, common-sense reforms to do just that.
Thank you again for contacting the Office of Speaker Jason Wentworth to share your perspective. If my staff or I can be of further assistance, please call 517-373-8962 or email JasonWentworth@house.mi.gov.
Sincerely,Office of Speaker Jason Wentworth, District 97Learn about the work I'm doing for the 97th district!Contact Me
164 Capitol Building
P.O. Box 30014
Lansing, MI 48909-7514
Phone: (517) 373-8962
Judge Eisenheimer:
I was not really surprised by your decision to dismiss the Antrim
County election lawsuit indicating an unwillingness to address the
criminal fraud uncovered in the case. But I was truly appalled at
the lack of logic displayed in your reasoning. As Uncover
Dc reports:
We have shocking evidence related to the actors running the audit.
Stark was appointed by Speaker Pelosi in 2016 and Simons was appointed by former Senate Minority Leader Harry Reid (D) in 2008 and was re-affirmed by then-Senate Minority now Majority Leader Schumer.
Two of the three NH election auditors, therefore, Stark and Mark Lindeman, Ph.D., and co-director at Verified Voting, have direct ties and loyalty to the powerful American Democrat-progressive machine, at the very highest levels.
That deep state Democratic machine has a vested, hardcore political interest in maintaining the status quo of all 2020 state elections, including New Hampshire’s.
Finally, Harry Hursti, Ph.D., has obscured professional relationships with the other two auditors, to which he does have strong professional ties. Why?
This audit team, being driven by secretive, Democrat-socialist political interests, is anything but fair, impartial, and nonpartisan. Its agenda is not at all that of the NH patriots who fought for election honesty, transparency, and integrity.
Some history is critical. NH’s Diebold AccuVote OS voting machines are nationally infamous for being hackable and it was Harri Hursti, Ph.D., himself, as the invited computer scientist “hacker” who, back in December 2005, proved to the country that these Diebold memory cards could be easily hacked and manipulated to secretly change vote counts. He also demonstrated that his hacks were absolutely undetectable.
All Hursti did was take a Diebold, credit card-sized memory card, quickly pre-program it using an inexpensive, readily available agricultural scanning device, and stick it in the Diebold optical scanner. No keys or passwords were needed. His hack happened fast. This staged election in which the outcome was known by all, ended up with Hursti’s hacked memory card secretly deciding the “election,” and whose count reflected Hursti’s choice.
Hursti also affirmed that there were additional ways these Diebold memory cards and machines could be quickly hacked, he had simply demo’ed one of them.
Hursti figured out how to hack into the memory card … He learned how to hide votes, make losers out of winners and leave no trace, [Bev Harris] said.
This stunning moment in American history – after Diebold had repeatedly and aggressively maintained that its machines and memory cards were totally secure and trustworthy – was created and witnessed by, among others, election integrity advocate extraordinaire Bev Harris of the very ethical 501(c)(3) Black Box Voting (BBV), the ethical and patriotic Ion Sancho, Leon County, Florida Supervisor of Elections, and Susan Pynchon of the Florida Fair Elections Coalition.
This was such a stunning and groundbreaking moment in American election integrity history that it came to be referred to as the Hursti Hack. Harris memorialized it by co-producing a riveting 2006 documentary called Hacking Democracy.
You can watch a clip from that documentary, the actual Hursti Hack, right here.
Hursti’s own testimony about NH’s Diebold AccuVote OS machines and memory cards, given at NH House Election Law Committee hearings on September 19, 2007, confirmed his professional opinion that these machines and memory cards are untrustworthy:
If you are believing on poll tape that doesn’t mean a thing because I can control the whole thing over whatever logic and accuracy that you perform just before the election. Because I have control. I can compare the date, the time. And so in order to be producing fraudulent tape, I will be producing fraudulent tape only on Tuesday evening. And I don’t worry about what ballots go through.
Therefore, back in 2007, the Diebold machines and memory cards that Hursti boasted about being able to secretly control, are the same ones Lindeman, Hursti, and Stark were all supposed to audit.
The cold, hard facts are that an audit of these machines and especially their memory cards is an entirely useless activity, and Hursti showed why 16 years ago. Yet why are Lindeman (who is not even a computer scientist, he has a Ph.D. in political science) and especially Hursti, the two now sans Stark, claiming they will need “90 minutes to read” each card?
Hursti agreeing to “audit” these Diebold memory cards, given his national exposure of their egregious built-in flaws, is indefensible, suspicious and you now have to wonder, just what is his real agenda? Also, why, did Verified Voting appear to disappear evidence of Hursti’s seat upon its advisory board?
VV’s current webpage shows he is not a member. However, the Internet Archive tells a very different story. As of April 29, Hursti is shown as being a member. On May 3, the NH AG and SoS hired him to be a member of their audit team. Two days later, on May 5, any evidence of Hursti’s participation as an advisor with Verified Voting had been deleted.
Philip Stark, whom Hursti and Lindeman co-selected as the third auditor, either employed Philip Stark, contracted with him, or has had some sort of close professional relationship with him since mid-2018. Hursti co-founded Nordic Innovation Labs, which conducts Security Assessment & Vulnerability Consulting. On the business’s About Us page, Stark is one of three Nordic Network team members. Sometime after February 26, 2021, Stark’s name and bio were removed from that webpage.
The three of these auditors, rather than being a professional, independently-functioning group of auditors – an impression which everyone involved tried hard to create – are actually not that at all.
As far as these computer scientists go, it certainly does appear that yet another entity, another profession that works with, and has influence upon our American election infrastructure has been infiltrated and compromised.
By Staff
A government private company relationship to marginalize and de platform individuals over first amendment speech is Fascism. These are the playbooks developed by Twitter to suppress opposing views to the state narrative:
From Dr Shiva's court filing at: Case 1:20-cv-11889-MLW Document 118 Filed 05/21/21 Page 1 of 7
Plaintiff has independently discovered
the documentary evidence
proving that Tassinari,
Cohen, NASED and
Twitter Legal jointly
collaborated to design
and build the
core infrastructure, processes,
and protocols enabling the
Twitter Trusted Partnership
Program and the
Twitter Partner Support
Portal (PSP).
In2017,Cohen
and others began
formulating and designing
the framework for
silently violating the
free speech rights
of US persons
by first characterizing speakers
as “Influence Operators”
(IOs) thereby fabricating a sinister
connotation where
none exists, as
the ideological frame work
to justify canceling
speakers who exercise
their right to
express their opinion.
All of these finally culminated in 2020 in the final manual for state officials called the Elections Influence Operations Playbook for State and Local Officials, for which Cohen and Twitter Legal are architects.This manual is split into three parts. The first two parts are available to the public.The third part is available only to state and local officials. Part1 provides the theoretical foundation for identifying and targeting “Influence Operators,”i.e. persons who accuse state election officials of corruption or make allegations that state elections may have violated Federal law.
When ever government enlists and dictates user behaviors that are NOT desired or dictates policies to view point discriminate is known as fascism.
In 2018, Amy Cohen, as Executive Director for NASED, testified to Congress about this emerging framework that she helped to formulate and architect in 2017, in cooperation with state officials and that they created a new centralized Governing Coordinating Council (GCC) that brought together both state and federal officials to create an electronic infrastructure for surveying speech and monitoring“ Influence Operators.”
So there we have an admission by the director of NASED that the avowed purpose of this 'energing framework' is to control free speech by de-platforming those defined as 'influence' operators.
"Bruce Lund, a senior member of In-Q-Tel’s technical staff, noted in a 2012 paper
that “monitoring social media” is increasingly essential for government
agencies seeking to keep track of “erupting political movements,
crises, epidemics, and disasters, not to mention general global trends.” This statement necessarily infers that "erupting political movements" includes speech that opposes government narratives.
The article continues: “When you have private companies deciding which algorithms get you a so-called threat score, or make you a person of interest, there’s obviously room for targeting people based on viewpoints or even unlawfully targeting people based on race or religion,” said Lee Rowland, a senior staff attorney with the American Civil Liberties Union.
This is exactly what is happening with Twitter's de platforming of views that conflict with government political agenda narratives.