A Gavel Project Testimonial
"The time is always right to do what is right." - Martin Luther King, Jr.
Below is a testimonial from one of the many folks The Gavel Project is fighting for and, in so doing, is fighting for the freedoms of all. Litigation is costly, and we need your support. Please consider making a tax-deductible donation today by visiting our website: thegavelproject.com.
Thank you to all that financially support The Gavel Project—making our fight for justice possible.
On January 31, 2022, my sixteen year old daughter decided that she was not going to wear a mask to school anymore. The day before, Governor Gavin Newsom sat in a football stadium surrounded by 70,000 unmasked people enjoying a playoff game. Seeing photos and videos of that scene online, my daughter realized immediately that she was no longer going to participate in the charade being played out in California schools.
I spent the next week speaking to attorneys on the phone and parents in social media groups trying to navigate the situation unfolding at my daughter’s school regarding her refusal to wear the mask on campus. She had been removed from all instruction, bullied by administrators/teachers and left outside in the cold while on campus for 8 hours each day (she had an extended school day due to a performing arts program she was enrolled in). She was the only child protesting in the district, and they were determined to stop her.
During the hours of online research I conducted looking for help, I came across The Gavel Project’s website. I was unfamiliar with the organization but was thrilled to see their request for people to submit stories about their situation to be considered for representation. I had just three hours before the submittal deadline would occur. I filled out the form and anxiously awaited a response.
Within a few days, I received a call from Ryan Heath, founder of The Gavel Project. He said he had read my submission and was interested in helping us navigate this situation. Within a few days, Ryan connected me with Tracy Henderson, a California attorney. I had already spoken with Tracy during the initial days of my daughter’s protest and I was thrilled to be connected with her again. Between Ryan and Tracy, I was provided guidance on information to provide to the Board of Trustees, administration, teachers, and parents. Ryan flew out to San Diego several times and spoke on our behalf at a school board meeting and met with other parents interested in standing up. He stood alongside me outside the school at morning drop-off to encourage other students to take off their masks and inform them of their rights.
For the 5 weeks of the protest that occurred after my initial interaction with Ryan, he was readily available by text and phone to help me immediately with the situation at hand. He spoke to the police officer that gave my daughter a trespassing violation for showing up to school after she was given an unwarranted suspension by the principal as the situation was unfolding. He helped my daughter and I feel confident in what we were doing and that the law was on our side.
A lot has unfolded in the year since the protest started. Last August, we filed a lawsuit against the district for violating my daughter’s right to protest, her right to an education and for the verbal and emotional abuse she endured during the 6 week ordeal.
This was never going to be easy, and they were never going to admit they were wrong, but I am beyond blessed to have crossed paths with Ryan Heath. I cannot express my gratitude for all the support he has given my family and will continue to give as this case proceeds.
Nicole Ward
Picture of Ryan and G.W. protesting outside of Coronado High School—early March, 2022.
Learn more about our cases and support our fight: thegavelproject.com.
The Gavel Project is a 501(c)(3) public charity, donations are tax-deductible.
PART 4
92. In fact, the KEY FILES were the Commitment keys to allow Scytl to tally the votes rather than the election machines. The group had disclosed emails and other documents proving that their election was rigged and that they tried to avoid a fixed election.
93. The elections were held on May 25, 2014 but in the early AM hours the election results were BLOCKED and the final tally was DELAYED flipping the election in favor of -----.
94. The claim was that there was a DDoS attack by Russians when in actual fact it was a mitigation of the algorithm to inject block votes as we observed was done for Joe Biden because the KEYS were unable to be deployed. In the case of -----, the trap-door key was “altered”/deleted/ rendered ineffective. In the case of the US elections, representatives of Dominion/ ES&S/ Smartmatic/ Hart Intercivic would have to manually deploy them since if the entry points into the systems seemed to have failed.
95. The vote tallying of all states NATIONWIDE stalled and hung for days – as in the case of Alaska that has about 300K registered voters but was stuck at 56% reporting for almost a week.
96. This “hanging” indicates a failed deployment of the scripts to block allocate remotely from one location as observed in ------ on May 26, 2014.
97. This would justify the presence of the election machine software representatives making physical appearances in the states where the election results are currently being contested.
98. A Dominion Executive appeared at the polling center in Detroit after midnight.
99. Considering that the hardware of the machines has NOT been examined in Michigan since 2017 by
Pro V& V according to Michigan’s own reporting. COTS are an avenue that hackers and bad actors seek to penetrate in order to control operations. Their software updates are the reason vulnerabilities to foreign interference in all operations exist.
100. The importance of VSTLs in underrated to protect up from foreign interference by way of open access via COTS software. Pro V& V who’s EAC certification EXPIRED on 24 FEB 2017 was contracted with the state of WISCONSIN.
101. In the United States each state is tasked to conduct and IV& V (Independent Verification and Validation) to provide assurance of the integrity of the votes.
102. If the “accredited” non-federal entities have NOT received EAC accreditation this is a failure of the states to uphold their own states standards that are federally regulated.
103. In addition, if the entities had NIST certificates they are NOT sufficing according the HAVA ACT 2002 as the role of NIST is clear.
104. Curiously, both companies PRO V&V and SLI GAMING received NIST certifications OUTSIDE the 24 month scope.
105. PRO V& V received a NIST certification on 26MAR2020 for ONE YEAR. Normally the NIST certification is good for two years to align with that of EAC certification that is good for two years.
106.
107. The last PRO V& V EAC accreditation certificate (Item 8) of this declaration expired in February 2017 which means that the IV & V conducted by Michigan claiming that they were accredited is false.
108. The significance of VSTLs being accredited and examining the HARDWARE is key. COTS software updates are the avenues of entry.
109. As per DOMINION’S own petition, the modems they use are COTS therefore failure to have an accredited VSTL examine the hardware for points of entry by their software is key.
110.
111. For example and update of Verizon USB Modem Pantech undergoes multiple software updates a
year for it’s hardware. That is most likely the point of entry into the systems.
112. During the 2014 elections in ---- it was the modems that gave access to the systems where the
commitment keys were deleted.
113. SLI Gaming is the other VSTL “accredited” by the EAC BUT there is no record of their
accreditation. In fact, SLI was NIST ISO Certified 27 days before the election which means that PA IV&V was conducted without NIST cert for SLI being valid.
114.
115. In fact SLI was NIST ISO Certified for less than 90 days.
116. I can personally attest that high-level officials of the Obama/Biden administration and large
private contracting firms met with a software company called GEMS which is ultimately the software ALL election machines run now running under the flag of DOMINION.
117. GEMS was manifested from SOE software purchased by SCYTL developers and US Federally Funded persons to develop it.
118. The only way GEMS can be deployed across ALL machines is IF all counties across the nation are housed under the same server networks.
119. GEMS was tasked in 2009 to a contractor in Tampa, Fl.
120. GEMS was also fine-tuned in Latvia, Belarus, Serbia and Spain to be localized for EU
deployment as observed during the Swissport election debacle.
121. John McCain’s campaign assisted in FUNDING the development of GEMS web monitoring via
WEB Services with 3EDC and Dynology.
122. 123.
124. AKAMAI Technologies services SCYTL.
125. AKAMAI Technologies Houses ALL foreign government sites. (Please see White Paper by Akamai.)
126. AKAMAI Technologies houses ALL .gov state sites. (ref Item 123 Wisconsin.gov Example)
127.
128. Wisconsin has EDGE GATEWAY port which is AKAMAI TECHNOLOGIES based out of
GERMANY .
129. Using AKAMAI Technologies is allowing .gov sites to obfuscate and mask their systems by way
of HURRICANE ELECTRIC (he.net) Kicking it to anonymous (AKAMAI Technologies) offshore servers.
130.
131. AKAMAI Technologies has locations around the world.
132. AKAMAI Technologies has locations in China (ref item 22)
133. AKAMAI Technologies has locations in Iran as of 2019.
134. AKAMAI Technologies merged with UNICOM (CHINESE TELECOMM) in 2018.
135. AKAMAI Technologies house all state .gov information in GERMANY via TELIA AB.
136. In my professional opinion, this affidavit presents unambiguous evidence:
137. That there was Foreign interference, complicit behavior by the previous administrations from
1999 up until today to hinder the voice of the people and US persons knowingly and willingly colluding with foreign powers to steer our 2020 elections that can be named in a classified setting.
138.
139.
140.
election machines providing access to our electronic voting machines.
141. Foreign investments and interests in the creation of the GEMS software.
142. US persons holding an office and private individuals knowingly and willingly oversaw fail safes
to secure our elections.
143. The EAC failed to abide by standards set in HAVA ACT 2002.
144. The IG of the EAC failed to address complaints since their appointment regarding vote integrity
145. Christy McCormick of the EAC failed to ensure that EAC conducted their duties as set forth by
HAVA ACT 2002
146. Both Patricia Layfield (IG of EAC) and Christy McCormick (Chairwoman of EAC) were appointed by Barack Hussein Obama and have maintained their positions since then.
147. The EAC failed to have a quorum for over a calendar year leading to the inability to meet the standards of the EAC.
148. AKAMAI Technologies and Hurricane Electric raise serious concerns for NATSEC due to their ties with foreign hostile nations.
149. For all the reasons above a complete failure of duty to provide safe and just elections are observed.
150. For the people of the United States to have confidence in their elections our cybersecurity standards should not be in the hands of foreign nations.
151. Those responsible within the Intelligence Community directly and indirectly by way of procurement of services should be held accountable for assisting in the development, implementation and promotion of GEMS.
152. GEMS ------- General Hayden.
153. In my opinion and from the data and events I have observed --------------------- with the
assistance of SHADOWNET under the guise of L3-Communications which is MPRI. This is also confirmed by us.army.mil making the statement that shadownet has been deployed to 30 states which all
Foreign interference is present in the 2020 election in various means namely,
Foreign nationals assisted in the creation of GEMS (Dominion Software Foundation)
Akamai Technologies merged with a Chinese company that makes the COTS components of the
happen to be using Dominion Machines.
154. Based on my research of voter data – it appears that there are approximately 23,000 residents of a Department of Corrections Prison with requests for absentee ballot in Wisconsin. We are currently reviewing and verifying the data and will supplement.
155.
I declare under penalty of perjury that the forgoing is true and correct to the best of my knowledge. Executed this November 29th, 2020.
Terpsehore P Maras
Tore Maras, resides in Cleveland, has a broadcast that boasts over 500,000 listeners and is in the top ten world wide. TORESAYS.COM. TORESAID.COM
TELEGRAM @TORESAYS
PART 3
55. Trapdoor is a cryptotech term that describes a state of a program that knows the commitment parameters and therefore is able change the value of the commitments however it likes. In other words, Scytl or anyone that knows the commitment parameters can take all the votes and give them to any one they want. If they have a total of 1000 votes an algorithm can distribute them among all races as it deems necessary to achieve the goals it wants. (Case Study: Estonia)
56.
57. Within the trapdoor this is how the algorithm behaves to move the goal posts in elections without
being detected by this proof . During the mixing phase this is the algorithm you would use to
“reallocate” votes via an algorithm to achieve the goal set.
58. STEP 4|Decryption would be the decryption phase and temporary parking of vote tallies before reporting. In this final phase before public release the tallies are released from encrypted format into plain text. As previously explained, those that know the trapdoor can easily change any votes that the randomness is applied and used to generate the tally vote ciphertext. Thus in this case, Scytl who is the mixer can collude with their vote company clients or an agency (-------) to change votes and get away with it. This is because the receiver doesn’t have the decryption key so they rely solely on Scytl to be honest or free from any foreign actors within their backdoor or the Election Company (like Dominion) that can have access to the key.
59. In fact, a study from the University of Bristol made claim that interference can be seen when there is a GREAT DELAY in reporting and finalizing numbers University of Bristol : How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
60. “Zero-knowledge proofs of knowledge allow a prover to convince a verifier that she holds information satisfying some desirable properties without revealing anything else.” David Bernhard, Olivier Pereira,and Bogdan Warinschi.
61. Hence, you can’t prove anyone manipulated anything. The TRAP DOOR KEY HOLDERS can offer you enough to verify to you what you need to see without revealing anything and once again indicating the inability to detect manipulation. ZERO PROOF of INTEGRITY OF THE VOTE.
62. Therefore, if decryption is challenged, the administrator or software company that knows the trap door key can provide you proof that would be able to pass verification (blind). This was proven to be factually true in the case study by The University of Melbourne in March. White Hat Hackers purposely altered votes by knowing the parameters set in the commitments and there was no way to prove they did it – or any way to prove they didn’t.
63. IT’S THE PERFECT THREE CARD MONTY. That’s just how perfect it is. They fake a proof of ciphertexts with KNOWN “RANDOMNESS” .This rolls back to the integrity of the VOTE. The vote is not safe using these machines not only because of the method used for ballot “cleansing” to maintain anonymity but the EXPOSURE to foreign interference and possible domestic bad actors.
64. In many circumstances, manipulation of the algorithm is NOT possible in an undetectable fashion. This is because it is one point heavy. Observing the elections in 2020 confirm the deployment of an algorithm due to the BEHAVIOR which is indicative of an algorithm in play that had no pivoting parameters applied.
65. The behavior of the algorithm is that one point (B) is the greatest point within the allocated set. It is the greatest number within the A B points given. Point A would be the smallest. Any points outside the A B points are not necessarily factored in yet can still be applied.
66. The points outside the parameters can be utilized to a certain to degree such as in block allocation.
67. The algorithm geographically changed the parameters of the algorithm to force blue votes and
ostracize red.
68. Post block allocation of votes the two points of the algorithm were narrowed ensuring a BIDEN win
hence the observation of NO Trump Votes and some BIDEN votes for a period of time.
69.
70. Gaussian Elimination without pivoting explains how the algorithm would behave and the election results and data from Michigan confirm FAILURE of algorithm.
71. The “Digital Fix” observed with an increased spike in VOTES for Joe Biden can be determined as evidence of a pivot. Normally it would be assumed that the algorithm had a Complete Pivot. Wilkinson’s demonstrated the guarantee as :
72.
73. Such a conjecture allows the growth factor the ability to be upper bound by values closer to n.
Therefore, complete pivoting can’t be observed because there would be too many floating points. Nor can partial as the partial pivoting would overwhelm after the “injection” of votes. Therefore, external factors were used which is evident from the “DIGITAL FIX”
74. Observing the elections, after a review of Michigan’s data a spike of 54,199 votes to Biden. Because it is pushing and pulling and keeping a short distance between the 2 candidates; but then a spike, which is how an algorithm presents; - and this spike means there was a pause and an insert was made, where they insert an algorithm. Block spikes in votes for JOE BIDEN were NOT paper
ballots being fed or THUMB DRIVES. The algorithm block adjusted itself and the PEOPLE were
creating the evidence to BACK UP the block allocation.
75. I have witnessed the same behavior of the election software in countries outside of the United States
and within the United States. In -------, the elections conducted behaved in the same manner by
allocating BLOCK votes to the candidate “chosen” to win.
76. Observing the data of the contested states (and others) the algorithm deployed is identical to that
which was deployed in 2012 providing Barack Hussein Obama a block allocation to win the 2012
Presidential Elections.
77. The algorithm looks to have been set to give Joe Biden a 52% win even with an initial 50K+ vote
block allocation was provided initially as tallying began (as in case of Arizona too). In the am of November 4, 2020 the algorithm stopped working, therefore another “block allocation” to remedy the failure of the algorithm. This was done manually as ALL the SYSTEMS shut down NATIONWIDE to avoid detection.
78.
79. In Georgia during the 2016 Presidential Elections a failed attempt to deploy the scripts to block
allocate votes from a centralized location where the “trap-door” key lay an attempt by someone using
the DHS servers was detected by the state of GA. The GA leadership assumed that it was “Russians”
but later they found out that the IP address was that of DHS.
80. In the state of Wisconsin, we observed a considerable BLOCK vote allocation by the algorithm at the
SAME TIME it happened across the nation. All systems shut down at around the same time.
81.
82. In Wisconsin there are also irregularities in respect to BALLOT requests. (names AND address Hidden for privacy)
83.
84.
85. I can personally attest that in 2013 discussions by the Obama / Biden administration were being had
with various agencies in the deployment of such election software to be deployed in ----- in 2013.
86. On or about April 2013 a one year plan was set to fund and usher elections in -----.
87. Joe Biden was designated by Barack Hussein Obama to ensure the ----- accepted assistance.
88. John Owen Brennan and James (Jim) Clapper were responsible for the ushering of the intelligence
surrounding the elections in -----.
89. Under the guise of Crisis support the US Federal Tax Payers funded the deployment of the election
software and machines in ------ signing on with Scytl.
90.
91. Right before the ----- elections it was alleged that CyberBerkut a pro-Russia group infiltrated --- central election computers and deleted key files. These actions supposedly rendered the vote- tallying system inoperable.