Software Engineer Confesses To Being Hired To Rig Elections


Curtis explains how he originally thought when asked to create such a program that Tom Feeney, lobbyist for Yang enterprises, wanted to know what source code would look like, and how to detect it in order to stop any politicians from tampering with electoral votes. Curtis happened to be wrong about that, and so he told U.S. House Judiciary Members that Mrs. Yang told him what she wanted was to hide the fraud in the source code, because they needed to control the vote in south Florida.

Not only does Curtis explain to the U.S. Judiciary House members that this is not the first time he has blown the whistle on Feeney, explaining how he has gotten Feeney arrested in the past. The Activist Post reports that this year is one of the worst years for voting fraud.

Last Month, Hillary Clinton declared herself the winner of the Democratic Party in the much-anticipated Iowa caucuses. Immediately after the ‘victory,’ Clinton went on CNN to bask in her counterfeit fame.

“I am so thrilled,” Clinton told Wolf Blitzer in an interview Tuesday afternoon. “My luck was not that good last time around, and it was wonderful to win the caucus, to have that experience.”

However, fraud was so rampant that a C-SPAN video caught it. Clinton’s ‘victory’ would have nothing to do with ‘luck,’ and her premature declaration of the “razor thin” tie, was no mistake.

When campaign minions aren’t fudging the physical vote count, computers, tasked with tallying the vote, are susceptible to hacking.

In 2006, the documentary Hacking Democracy, exposed Diebold and their role in rigging elections with their electronic voting machines.

Curtis explains that in order to conclude that any votes happened to be messed with it just takes looking at the exit polls that should not be significantly different from the vote, and if they are different then there you have it.

Here is the video below, listen to how Curtis tells the House members that the program can only be identified by looking at the source code.

Source:ActivistPost



Share

251 Comments

Leave a Reply

Pin It on Pinterest