A hand recount would "most likely show" Vice President Kamala Harris won the 2024 presidential election, according to a "duty to warn" letter to Harris from voting-integrity expert Stephen Spoonamore. Further, Spoonamore states: "In my view, a capable and skilled series of exploits, electronic tools, and hacks were used to change the Presidential vote in all seven swing states. These activities have reversed the outcomes in at least Arizona, Michigan, North Carolina, and Wisconsin."
News of Spoonamore's missive comes on the heels of our post yesterday about a similar letter from Duncan Buell, Ph.D., chair emeritus and NCR chair of computer science and engineering at the University of South Carolina.
Our focus today in Part Two is on Spoonamore's letter to Harris, in which he states: "I will lay out the basics of the attack, starting with unusual elements within the results. I will then outline two processes which could have been followed to insert these false results into the system. Finally I will outline how I would recommend investigating unusual elements within the results."
The Spoonamore letter begins below, with certain sections highlighted in yellow, with sections of particularly high interest highlighted in blue. In my view, this is one of the most important documents in modern American history, with the American democracy hanging in the balance against an authoritarian form of government, likely an attempted dictatorship, favored by President-Elect Donald Trump. Spoonamore asks this central question: Given the obvious signs of hacking, did Trump actually win the election and did Harris actually lose it? In other words, who is America's real president-elect at this moment in 2024. Spoonamore suggests no one can know without a thorough investigation of the election's vote-tabulation processes, and he urges Harris to move in that direction. Here is the "duty to warn" letter, and we urge Americans of all political stripes to read it carefully. It appears to be the closest thing we have, for now, to an analysis of how the 2024 election went off the rails -- to the benefit of Donald Trump and his allies in the Republican Party:
Duty to Warn Letter - to VP Harris - Re: Election 2024
(Revised 430PM)Stephen Spoonamore
Nov 15, 2024
November 15, 2024Honorable VP Kamala Harris
The White House
Office of the Vice President
1600 Pennsylvania Ave
Washington DC 20500
Dear Madam Vice President.
This is my second Duty to Warn Letter regarding hacking of the 2024 Presidential Election. The first letter on November 7 was directed to Commonwealth of Pennsylvania Officials. Both warnings are made per DNI Clapper’s 2015 directive to all agencies and contractors associated with intelligence and financial agency technologies to warn of suspicions of hacking. (Spoonamore's first letter was to Pennsylvania Gov. Josh Shapiro, and that state now is conducting a hand recount in the U.S. Senate race between Democrat Bob Casey and Republican Dave McCormick.)
Professionally I have worked as the CEO or CTO at seven high-technology firms, including two which specialized in hacking and counter-hacking operations. My clients have included numerous governments DoD, DHS, Dept. of State, F100 Financials and F500 Industrials.
I am a lifelong Republican who has long placed service and participatory democracy over party. In government, I have twice been invited to SoCom to give lectures on electronic warfare and techniques to find terrorist money laundering and gave a keynote speech of the National Counterintel Summit on this same topic. I served as an after-action reviewer of communications and data failures on 9/11 under the direction of Jim Woolsey and FDNY Commissioner Scopetta, and later co-wrote multiple hacking risk analysis of Smart Grid technologies for the Obama administration.
You should reverse your concession, call for both a full investigation of criminal activity and demand hand recounts in all seven swing states.
In my professional view there are multiple and extremely clear indications the Presidential vote was willfully compromised.
I wholly agree with the public letter of Duncan Buell, et. al. of Nov. 13th stating they believe there is a possibility of hacking and calling for hand-recounts.
https://freespeechforpeople.
This letter’s clear call to action is commendable, but its cautious tone may belie the severity of what I believe has happened. In my view it is a near certainty the results have been changed at a scale which reversed the US Presidential Election. They imply there is a chance a hand-recount will show you won more votes. I am stating a hand recount will most likely show you did win. Both letters call on you to act.
In my view, a capable and skilled series of exploits, electronic tools and hacks were used to change the Presidential vote in all seven swing states. These activities have reversed the outcomes in at least Arizona, Michigan, North Carolina, and Wisconsin. I will lay out the basics of the attack, starting with unusual elements within the results. I will then outline two processes which could have been followed to insert these false results into the system. Finally I will outline how I would recommend investigating unusual elements within the results.
The results of the attack are improbable in the extreme and well tailored to the sole benefit of your opponent.
Approximately 600,000 votes are for Donald Trump but with no down ballot choices. These are either inserted “bullet ballots” for the Presidential race or manipulated data fields. They are surgically added to totals in limited jurisdictions and within only the seven swing States. This historically unprecedented set of numbers found in the 2024 swing states is absent in every other state. In AZ, MI, NC and WI the effect of these drop-off votes reverses the voters' will and even more improbably always pushes the winning margin beyond the mandatory recount numbers. It is a result too perfect for belief. It is a bespoke and programmed outcome. In other states including PA and NV, removing these strange and bespoke added votes, it appears Donald Trump may have won the cast votes but within a margin which would force recounts. The inserted votes raise his totals, to avoid any scrutiny during mandatory recount results which would have slowed his claim on the Presidency. In GA and FL the same pattern exists with unclear impact on the results.
This attack is not technically difficult. It is modest in scale. It would require:
Modest and common computer programming skills.
Access to 10-100 tabulators or to the handful of facilities programming them in advance.
A credible database of voter IDs of non-voters around which to create false ballots.
Perhaps as few as 1, but more likely 3-5 human program managers.
Access to eBollBook Data during the election to determine who had not voted.
(Possibly) Human access to some tabulators during counting.
If I was asked to lead this hack, I would expect to have a core team of 6-10 people, and operating costs under $10M with a timeline of 3-12 months.
The tell: A historically absurd number of Trump-only bullet ballots or undervote ballots.
There are always a handful of voters who cast a vote in one race which they care about, and do not make other selections on the ballot. These are called bullet ballots. In Presidential Races since 1980, these bullet ballots rarely account for more than 1% of the total votes including in Mr. Trump’s winning 2016 election and losing 2020 election, and when they do it warrants further investigation. In 2024 in the 43 non-swing states, bullet ballots make up a nominal >1%. In the seven swing states the numbers are so high to be unbelievable, unprecedented and demanding of further investigation. Here is analysis from totals as of late Nov. 12th.
Here are the unprecedented results of drop-offs in the two western swing states:
AZ - 123K+ 7.2%+ of Trump’s total vote. Enough to reverse the outcome.
NV - 43K+ 5.5%+ of Trump’s total vote. Enough to exceed recount threshold.
It is my belief these two states have illegally added votes.
For comparison, examine Trump’s 2024 results in three states which border AZ and NV. They have equally passionate Trump supporters, but have the normal levels of drop off or bullet ballots.
ID <2K 0.03% of Trump’s total.
OR <4K 0.05% of Trump’s total
UT <1K 0.01% of Trump’s total.
In the case of Idaho and Utah, Mr. Trump was a runaway winner and had no need to add votes. In the case of Oregon, Ms. Harris was a runaway winner and adding votes to Trump’s total would add risk without adding value.
The same pattern of large numbers of drop-off votes or bullet ballots exists in the totals of MI, NC, PA, WI.
North Carolina is the most extreme. The public results indicate over 350K voters cast a ballot for Trump and no other race making up more than 11% of Trump’s voters in NC drop off votes or bullet ballots.
Hack Part 1: Creating the pool of bullet ballot voters.
There are two possible methods to execute this attack. The simple version would only manipulate electronic totals and hand-counting the target precincts would discover this. The second involved ePollbook hacking and introducing bullet ballots.This would add the need to compare the ePollBook timestamps to find possible bad actors or other sources for these anomalous votes.
When Mr. Musk announced his $1M lottery for people to go online and sign a pledge to vote for Trump, I became personally suspicious of why such a promotion would be done. I signed up to see what information he wanted and what the pledge actually stated. He did not want to know people’s socials or to send them texts. To sign up, you had to provide your street address. That was all they cared about. Once they had the people’s names, and street addresses, this would allow for building a pool of ghost voters who could logically be marked for fake ballots, structured in a manner that matched ePollBook and precinct data. You, as a member of law enforcement, understand criminals need certain pre-conditions to act. A database of pledged supporters with street addresses is required for this hack. Law enforcement should immediately find the team of programmers who pulled the lottery data capture. They will find those programmers immediately parsed the data into a system based on voting precincts and created macros to constantly update the pledged lists of who had cast a vote, and who had not. The programmers likely did not know they were working on a system to be used to steal the election. When confronted with that fact, law enforcement would likely gain cooperating witnesses.
Musk’s team used this system to build a list of voters pledged to vote for Trump. This list could also be used to make a ghost-ballot voter list. ePollBook data is nearly always linked to the internet, and in many jurisdictions this link was being made in real time via Mr. Musk’s Starlink or any available wireless network. Throughout the day, Musk’s team could compare existing turnout models to likely outcomes, based on well established voter profile databases vs. the actual voter turnout coming in from the ePollBooks. They would have been able to have a very good estimation in the closing hours of polls how many votes short Trump would likely be at the tabulation level. They would also have exact lists of the pledged voters for Trump and would know who had not shown up. The pledged voters who did not vote, became the bullet ballots. With any network connection to the ePollBooks, or via other compromised connectivity, they could be marked as voted.
Hack Part 2: Matching the tabulation to the ePollBooks.
The exact number of added voters to the ePollBooks as having voted would have to match the tabulation process. This attack could have been done in at least two different ways.
The easiest method to execute phase two, is also the easiest to discover by hand recount. In a few jurisdictions where the tabulators either had network connectivity, approved or otherwise, or where a person on the team had physical access to the tabulation machine, the Trump votes that were added to the ePollBooks, would need to be added to the tabulators. At which point the ePollBooks and the tabulation totals would match, having been digitally stuffed with demographically credible voters for Trump. But there will be no paper ballot for these votes. A hand recount will quickly discover the fraud.
As I write this letter, several hundred people are self organizing on Reddit and other forums. They include: data scientists, statisticians, and legal experts. They are examining the precinct level data of every swing state, and by Monday these teams will have lists of many precincts where these historically unprecedented Trump bullet ballots occur. The highest likelihood is that those ballots don’t actually exist. Those votes were electronically created but have no paper. This would be easily proven with a hand recount.
A second possibility involves the same compromise as described above, but is then combined with human ballot stuffing, or ballot substitution, at tabulation to match the ePollBook numbers. This possibility is raised as it appears these historically unprecedented bullet ballots fall heavily in a few counties. Maricopa County AZ, seems to be the source of the vast majority, perhaps nearly all, of the AZ bullet-ballot voters for Trump. If these ballots were introduced it would require co-conspirators working inside the tabulation center.
I appreciate that many people, even sophisticated people outside this field, think this hack is an impossible task. It is not. Just eight weeks ago, the world watched a vastly larger and more complicated one. Unknown hackers intercepted more than 3,000 communication devices over 24 months destined for use by Hamas across the entire Mideast. The devices all had additional software, hardware and explosives inserted. The devices were then delivered to users and functioned normally for months until the hackers triggered the inserted series of exploits and explosions. This hack, the entire world witnessed, was orders of magnitude more complicated than introducing Trump bullet ballots into - at most - 100 tabulation locations. I have personally managed full year-long operations in which hundreds of credit card point of sale devices were rebuilt with added hardware and software and inserted in order to discover fraudsters and money laundering. No one knew we were there. The users never were aware. The devices did their normal job processing credit cards for merchants. While they also did a hacked job and helped my team and I root out criminals. The access, technical difficulty, and scale of the election hack I am describing is less than either of these. But the effect is vastly greater, and the FBI has excellent people who could address this very quickly.
Lastly, this hack methodology may or may not have some correlation with the series of Bomb Threats called in by Russian affiliated assets. The use of distraction or diversion of this kind is common. My first thought was, and my thinking remains, these bomb threats were called into tabulation centers and precincts where the hackers had already planned to conduct ghost bullet-ballot introductions. I believe they wanted a disruption in the chain of custody, so lawyers could claim after the hacking events that the chain of custody on the ballots was flawed. The creation of the false argument of a broken custody chain would be used as a pretext to prevent hand recounting, as hand recounting would not match the Trump favorable result. However, by a reverse of that logic, any jurisdiction which was subject to a bomb threat was forced to break standard operating procedure. This alone should be grounds for you to ask for a hand recount.
Lastly, I have been advised by an attorney that Arizona and Georgia have mechanisms in place for members of the public to demand a recount, but only you have the ability to demand a recount across all the jurisdictions of concern.
A final formal note. This is principally a Duty to Warn letter. It is also a fulfillment of my constitutional oath of office as possibly the lowest level sworn office of public trust in America. I was appointed by my township to serve as a local Parks Commissioner. I am the public appointee to the Mt. Nittany Conservancy, a nature reserve. I have spent the last four years variously overseeing how public funds are spent on sports fields, kids playgrounds, hiking trails, and bike paths. To do this, I must make annual conflict and financial disclosures and I must swear nearly the same oath you did. I am under the sworn obligation to defend our nation against all enemies, foreign and domestic. Which, I am honored to do.
I will continue to investigate with a growing group of volunteers. We are also planning to offer rewards for information. But our efforts to preserve the integrity of this election cannot take this to completion. You, and only you, can call for a full hand-recount and engage the vast public resources at your disposal. I can’t. This is all I can do.
Let me know how I can help.
Sincerely,
ESignature - Stephen R. Spoonamore
Stephen Spoonamore
College Township PA
Former CEO or CTO of multiple Technology Firms
https://www.linkedin.com/in/
CC: Secretary. of States and Governors of AZ, FL, GA, MI, NC, NV, PA and WI. Additional PA representative Chris Dush (PA State Sen.), Paul Takac (PA State Rep.), Dustin Best (PA College Township Supervisor), and Robert Ziegler (PA Milhiem Township Supervisor.)
Subscribe to Stephen Spoonamore
Launched 2 days ago
Tech CxO since IPv2. Playwright and Book Author. Baseball Coach, Umpire and Fan. Bikeway and Wildlands advocate. Eat Your Yard / Earth-ship Guy. Pretty good Dad (According to Kiddo) Champion Husband (According to Bride)
Type your email...
Subscribe
701 Likes
·
341 Restacks
701
313
Get the full experience
Get app
No comments:
Post a Comment