Patrick Byrne – Response to Robert Reich: I Challenge

Patrick Byrne – Response to Robert Reich: I Challenge

Robert Reich is among the liberals’ favorite liberals–with an erudite intellectual smugness that few can match.  Reich attempted a mocking, you-can’t-be-serious attack on ‘election deniers’–and Patrick Byrne, who is nobody’s fool in the intellectual realm and is also politically independent–took up the challenge of explaining his view as to why a stolen election is now obvious to anyone paying attention

Read Byrne’s explanation yourself.  It’s not a close question.  The election was stolen, and the steal was massive and sophisticated and willfully enforced by many who should know better, including Reich.

_________________________

RESPONSE TO ROBERT REICH: I CHALLENGE

Dear Professor Reich,

First things first: we had a mutual friend in Professor William Slesnick. Though I knew him many years after you did, he often spoke to me of his admiration for your character, your mind, and your drive. He was fond of saying that if you had set your sights on playing center in the NBA, you would have succeeded. Bill did not grade on a curve, as you remember, and that was indeed high praise.

Second, I see that you have taken to living under a rock. Your recent essay, “Robert Reich: A Personal Question To Powerful People Who Continue To Deny Results Of 2020 Election” (Eurasia Review, October 9, 2022) has been brought to my attention. In it, you write:

“I have a serious question for people who have power in America and who continue to deny the outcome of the 2020 election and enable Trump’s Big Lie: What are you saying to yourself in private? How are you justifying yourself in your own mind? I don’t mean to be snide or snarky. I’m genuinely curious. “

I accept your invitation, Professor Reich, to bring you up to speed on what it is that we of the election integrity movement believe we are doing.

On June 3, 2022 DHS – CISA issued a 5 page report that I (facetiously) suggest could have been titled, “Patrick Byrne was right again. Again.” In five succinct pages, it explains that the most common election system in use in the USA turns out to be riddled with nine major security “vulnerabilities” so gaping that in my view it is more appropriate to call them security “failures” than “vulnerabilities”.  As apparently you missed this development, I will quote their descriptions of nine hacks of Dominion equipment that tabulate approximately 43% of ballots cast by Americans on November 3, 2020:

  1. “An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.”
  2. “An attacker could leverage this vulnerability to disguise malicious applications on a device.”
  3. “…which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code.”
  4. “An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.”
  5. “An attacker could leverage this vulnerability to spread malicious code to ImageCast X devices from the EMS.”
  6. “An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.”
  7. “An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions.”
  8. “An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment.”
  9. “An attacker could leverage this vulnerability to print an arbitrary number of ballots without authorization.”

So DHS-CISA now acknowledges that Dominion machines can be hacked nine ways from Sunday. In addition, if one clicks through to the CVE database where one would normally find patches for such software vulnerabilities as have been announced here, in this case one finds that there are no patches available and that all these gaping failures are simply, “Under Assessment”.

That is to say, the same federal organization that 20 months ago boldly praised itself for overseeing “the most secure election in history” now meekly reports:

“While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.”

That is a considerably weaker statement. They have gone from saying We know it did not happen to the much weaker claim: We have no evidence that it happened, we are not going to tell you if or how much we tried to find out, and the machine vulnerabilities must be “mitigated” but there are as yet no patches.

It is my burden in life that from time to time I interact with a life-form called, “journalists”. There have been some who, after reading this DHS-CISA litany of horrors, have had the gall (I-shit-thee-not) to reply along the lines, Well this shows that they can be hacked, but it is not proof that they were hacked!

That logic may pass in an undergraduate Lesbian Dance Theory seminar, but as a fellow who built a $2 billion eCommerce company that faced 1,000 daily cyber-attacks for 20 years and was never defeated, I assure you, it is an absurd response. One cannot release code into the wild when that code is porous and hope that no one hacked it. And given that this concerns US elections, there is no realistic chance these vulnerabilities were not exploited.

In case there is any question about that, however, perhaps we should examine the election databases stored on the hard-drives of election equipment in question, just to be sure.

Thanks to the work of an American hero named Tina Peters, the County Recorder for Mesa County, Colorado (roughly speaking: “Grand Junction”), the election database of that county for November 2020 was recovered and analyzed, and discovered (in Mesa County Forensic Report #3) to have a cloaked script that created an illegal database, shifted thousands of votes, and created thousands of others.  This is exactly what the DHS-CISA warning is about: precisely such “malicious code” and “malicious applications” could be installed on a machine without its operators’ awareness.

In Williamson County, Tennessee, the October, 2021 municipal election produced such extraordinary anomalies (e.g., 163 ballots fed into a machine generating only 79 votes counted) that the State of Tennessee investigated…. and found 7 out of 18 machines generating remarkably erroneous miscounts. Feed the machine 167 paper ballots, and only 19 get counted.  In one machine, 330 ballots were inserted, but it only counts 19. The state called the federal EAC, who called the Pro V&V and SLI, who called Dominion…. And their consensus is that there is indeed erroneous code in the machines, even though they are certified, but that they cannot find the bad code.

Which, incidentally, is not a Root Cause Analysis, though they try to pass it off as one. It is a failure of a Root Cause Analysis. They are saying, in effect, Yes the machine generates fake tabulator counts, and we cannot find the cause, but it is still certified.

Democrats are noticing this corruption as well as Republicans. In Cherokee County, Georgia, Michelle Long Spears, running for a seat in the US Congress, placed 3rd in the Democratic Primary earlier this summer. She noticed that though she had received 24% of the vote, there were many precincts where she had received 0 votes. That itself was statistically improbable, she knew. Then she noticed that in her own precinct she had received 0 votes, which she knew was impossible (Michelle had voted for herself, as had, presumably, her husband). Michelle demanded a hand-count, and it turned out she had won with a landslide 60% of the votes.

Fulton County, Pennsylvania has had their equipment tested by a Michigan forensics lab named, “Speckin”. The Speckin Report shows that the Dominion machines in Fulton, PA generate fake results like the machines in Williamson, Tennessee (as is admitted now by the EAC and Dominion itself). In addition, the Fulton machines’ logs show that during the November 2020 election they had not just outside connectivity, but international outside connectivity (in this case, to Canada), which is significantly illegal. Now Fulton County, Pennsylvania is suing Dominion wanting their money back (and eight other counties have similar lawsuits in the works, I hear).

In an August 2022 primary in Cherokee County, Kansas, Dominion equipment was discovered to have taken thousands of votes from District 1 County Commissioner Myra Frazier and given them to her opponent, Lance Nichols, who was initially declared the winer then stripped of it once the vote-flipping was exposed.

Tests have been performed in 67 Georgia counties, and erroneous code spitting out fake results has been found to exist in 65 of the 67 counties. Emergency relief has been sought this past week.

Ongoing examination of the much-maligned Maricopa Audit’s preliminary results (which in fact proved that the election database had been erased and there were hundreds of thousands of votes lacking chains of title) continues to surface clear proof of criminal activity in Maricopa’s election administrations:

I could, Professor Reich, go on and on. Outside of intellectual backwaters such as Berkeley, citizens are paying attention. Citizens know of such developments and dozens more like them across the nation. In over 3,000 counties across the country, citizens are digging into the US election systems like they never have in my lifetime. Everywhere they do they are finding causes for deep concern, while being met by government-fundamentalists challenging the right of citizens to demand transparency (though a fundamental principle globally is that if an election lacks transparency it has zero credibility).

Let us turn, Professor Reich, turn to those six locations which experienced blackouts/shutdowns while counting ballots on the night of November 3, 2020.  The six counties have been the center of our attention since the morning of November 4. All six of those counties fought letting their election databases be examined. In one of those counties (Maricopa), the Arizona Senate got a subpoena to examine the election database, Maricopa County fought the subpoena for five months, and then when a court declared it valid and enforceable, deleted their election database the night before turning over the equipment.

For the first time in my lifetime, such a constellation of facts is not supposed to raise suspicion. No one will explain why.

Thus, Professor Reich, what we of the Election Integrity movement believe we are doing is saving our nation from a soft-coup perpetrated through sophisticated long-term exploitation of our election systems and the corruption of institutions which we citizens created and funded to protect us from such an event. That is our reality. We are peacefully saving the America republic from a tragic fate.

Of course, in your paradigm, we are disrupting American democracy. (Incidentally, would it hurt you to use the more accurate term, “republic”? It shows that you understand it is about both consent of the governed as well as constitutionally limited government. You would not want it to be thought of Democrats such as yourself that you secretly support mob rule, would you?)

Fortunately for our nation, this does not have to continue as though we were debating the number of angels dancing on the head of a pin. This whole matter can be resolved in a matter of a week or so. Perhaps just a few days. All that needs to happen is that the authors of Mesa County #3 get a chance to inspect the election databases of those six counties. Now that we know what to look for, I believe they can even do it in a couple hours. When set against the tragic national fate about which you are so concerned, Professor Reich, surely letting sophisticated cybersecurity professionals access images of six hard drives for a few hours each… surely that does not strike you as unreasonable?

You are so concerned with what fate may befall our nation, surely this seems like a reasonable request to you, right? So may we count on your voice to join ours in saying, Let the citizens have their experts inspect those six hard drives for a day!

If experience is any guide, I can make two predictions comfortably:

  1. Professor Reich, you will quickly say, “No, that’s a horrible idea.”
  2. Then you will search for a reason to rationalize why it would be a horrible idea. I have heard them all. I have heard that we cannot resolve this issue for the nation by conducting an afternoon’s inspection of six hard drives because:
    • We don’t want to set the precedent.
    • If we give you an inch you will take a mile.
    • Why should we? Let citizens look at the pieces of paper but they cannot inspect machines (for this, there will be no good reason adduced to explain why, for the first time in history, citizens can have transparency to some arbitrary level but not beyond it).
    • And so on and so forth.

So I challenge: I predict you will not join me in this call to look at six hard drives and resolve this in a day. Whatever your reasoning, that will be its conclusion.

And that is how we know you do not really believe what you have written.