Cybersecurity Expert Declares Election Fraud Orchestrated by Enemies of U.S. - The New American (2023)

Cybersecurity Expert Declares Election Fraud Orchestrated by Enemies of U.S. - The New American (1)

When attorney Sidney Powell promised to “unleash the Kraken,” most assumed she was simply referring to a lawsuit.

But along with that lawsuit, there is a person: Dr. Navid Keshavarz-Nia, and his resume is beyond impressive. In his affidavit filed with Powell’s Georgia lawsuit on Wednesday, he noted a few of his remarkable accomplishments:

I have a Bachelor’s degree in Electrical and Computer Engineering and a Master’s degree in Electronics and Computer Engineering from George Mason University, a Ph.D. degree in Management of Engineering and Technology from CalSouthern University and a Doctoral (Ed.D) degree in Education from George Washington University.

I have advanced training from the Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), National Security Agency (NSA), DHS office of Intelligence & Analysis (I&A) and Massachusetts Institute of Technology (MIT).

He has even been mentioned favorably in, of all places, the New York Times. In the article “How One Man Conned the Beltway,” the Times noted in September the exceptional work done by Keshavarz-Nia in helping exposing Garrison Kenneth Courtney, who ran a scam called Alpha214 to rake in high salaries from industries by promising government contracts. Wrote the Times, “In doing cybersecurity and technical counterintelligence work for the C.I.A., N.S.A. and F.B.I., he had spent decades connecting top-secret dots. After several months of working [in the present investigation] he began connecting the dots.” The Times added that the people working with him considered him “the smartest person in the room.”

Courtney, 44, is now spending seven years in jail thanks in part to the sleuthing of Keshavarz-Nia.

And the good doctor is connecting the dots once again, this time exposing the massive fraud that allegedly gave Biden the victory over President Trump in the presidential election.

In his nine-page affidavit, Keshavarz-Nia concluded

with high confidence that the election 2020 data were altered in all battleground states, resulting in hundreds of thousands of votes that were cast for President Trump to be transferred to [former] Vice President [Joe] Biden.

(Video) Putin and the Presidents: John Bolton (interview) | FRONTLINE

These alterations were the result of systemic and widespread exploitable vulnerabilities in [the Dominion Voting System and related systems and software] that enabled operators to achieve the desired results.

In my view, the evidence is overwhelming and incontrovertible.

He is not bashful about his education or experience:

My experience spans 35 years performing technical assessment, mathematical modeling, cyber-attack pattern analysis, and security counterintelligence linked to FIS operators, including China, Iran, North Korea, and Russia.

I have worked as a consultant and subject-matter expert supporting the Department of Defense, FBI and US Intelligence Community (USIC) agencies such as the DIA, CIA, NSA, NGA, and the DHS I&A supporting counterintelligence, including supporting law enforcement investigations.

What he uncovered confirmed evidence found by others, thus strengthening his conclusion:

The USIC has developed the Hammer and Scorecard tools, which were released by Wiki Leaks and independently confirmed by Lt. Gen Thomas McInerney (USAF, retired), Kirk Wiebe, former NSA official and Dennis Montgomery (former CIA analyst).

The Hammer and Scorecard capabilities are tradecrafts used by US intelligence analysts to conduct MITM attacks on foreign voting systems, including the Dominion Voting System (DVS) Democracy Suite and Systems and Software (ES&S) voting machines without leaving an electronic fingerprint.

As such, these tools are used by nefarious operators to influence voting systems by covertly accessing DVS and altering the results in real-time and without leaving an electronic fingerprint.

He explained how those “nefarious operators” gained access to the DVS through a “back door”:

(Video) Impeachment Trial Day 1: Senate proceedings set to begin as rules come into focus

I have previously discovered major exploitable vulnerabilities in DVS and ES&S that permit a nefarious operator to perform sensitive functions via its built-in covert backdoor.

The backdoor enables an operator to … perform system updates and testing via the Internet without detection. However, it can also be used to conduct illicit activities such as shifting votes, deleting votes, or adding votes in real-time (Source: DVS Democracy Suite EMS Manual, version 5.11-CO::7, P.43). These events can take place through the Internet and without leaving a trace.

He learned that DVS has “a strategic relationship with Venezuela’s Bitza Corporation which is 28% owned by former President [Hugo] Chavez.… the DVS/Bitza software was co-developed in Venezuela to alter vote counts to ensure President Chavez (and later, President Maduro) were guaranteed to win an election.”

This confirms another affidavit filed by a former high-level security official from Venezuela who saw the system in operation.

Not only is DVS designed not to leave a fingerprint behind, it is also structured so that its owners cannot readily be determined. As Keshavarz-Nia discovered:

DVS is comprised of several companies which obfuscate its true organizational and ownership structures. The DVS companies include: 1) Dominion Voting Systems International Corporation, a Barbados corporation; 2) Dominion Voting Systems, Inc., a Delaware corporation; and 3) Dominion Voting Systems Corporation, a Canadian corporation.

Similarly, Smartmatic is comprised of: 1) Smartmatic International Corporation, a Barbados corporation; 2) Smartmatic USA Corporation, a Delaware corporation; 3) Smartmatic International Holding B.V, a Netherlands corporation; and 4) Smartmatic TIM Corporation, a Philippines corporation.

Based on my counterintelligence experience in USIC, I conclude that corporate structures were partially designed to obfuscate their complex relationships, especially with Venezuela, China and Cuba; and impede discovery by investigators….

DVS has acknowledged that Chinese made parts are used in its voting machines. However, the company is unwilling to share details on its supply chains, foreign ownership, or its relationship with China, Venezuela and Cuba. In particular, I have seen USIC intelligence reports showing China’s espionage activities in the United States and efforts to infiltrate elections.

Since these countries are our enemies, I conclude that FIS [Foreign Intelligence Service employees] and other operators were involved to influence the outcome of the 2020 election.

(Video) Chris Krebs: Secure Election Comes From Years Of Planning | Morning Joe | MSNBC

Keshavarz-Nia discovered “significant anomalies” as a result of the fraud:

I have conducted detailed analysis of the NY Times data sets and have discovered significant anomalies are caused by fraudulent manipulation of the results.

In my expert judgment, the evidence is widespread and throughout all battleground states I have studied. I conclude the following:

a. The vote count distribution in PA, WI, MI, AZ, NV, and GA are not based on normal system operation. Instead, they are caused by fraudulent electronic manipulation of the targeted voting machines;

b. On approximately 2:30 AM EST, TV broadcasts reported that PA, WI, AZ, NV and GA have decided to cease vote counting operations and will continue the following day. The unanimous decision to intentionally stop counting by all 5 battleground states is highly unusual, possibly unprecedented and demonstrates prior coordination by election officials in battleground states.

There would be no legitimate reason battleground states need to pre-coordinate election activities and stop on-going adjudication processes.

However, it is equally puzzling that the vote counting did not stop, as reported. In fact, it continued behind closed doors in early hours of November 4, 2020.

This activity is highly unusual and demonstrates collusion to achieve the desired results without being monitored by watchers.

Such deliberate and intentional fraud had its inevitable consequences, declared Keshavarz-Nia:

The data variance favoring Vice President Biden continues to accelerate after 4:30 AM EST on November 4, 2020 and continues its momentum through November 9, 2020.

(Video) House Oversight Committee holds hearing with former Twitter executives

This abnormality in variance is evident by the unusually steep slope for Vice President Biden in all battleground states on November 4, 2020. A sudden rise in slope is not normal and demonstrates data manipulation by artificial means.

For example in PA, President Trump’s lead of more than 700,000 count advantage was reduced to less than 300,000 in a few short hours, which does not occur in the real world without an external influence.

I conclude that manually feeding more than 400,000 mostly absentee ballots cannot be accomplished in a short time frame (i.e., 2-3 hours) without illegal vote count alteration.

He added this:

In my expert opinion, the DVS Democracy Suite, Scytl/SOE Software/eClarity and Smartmatic have not produced auditable results in the 2020 election.

It is evident that ballots were not properly validated, system records were not kept, and the system experienced considerable instability even several days prior to November 4, 2020 that required DVS to implement software changes at the last minute.

In addition, the disparity in data distribution after 4:30 AM on November 4, 2020 indicates significant systemic anomalies that were widespread among all battleground states.

The evidence is both extensive and persuasive and indicates large-scale fraud by remote operators.

Keshavarz-Nia’s affidavit is just one limb of the mythical Kraken sea-monster unleashed by Sidney Powell. But for the Democrats and their media echo chamber (ABC, NBC, MSNBC, CBS, CNN, New York Times, Washington Post, etc.), his testimony presents an insurmountable problem. He has already been vetted by one of their own — the Times — and so they have no opening to attack him or his testimony as not being credible.


What is the biggest cybersecurity threat 2022? ›

According to the report, some of the leading cyber risks and cybersecurity trends in 2022 include:
  • Malware on the rise. ...
  • Rise of ransomware attacks. ...
  • Zero-day attacks. ...
  • Remote code execution. ...
  • Attack surface expansion. ...
  • Digital supply-chain risks. ...
  • Cybersecurity mesh. ...
  • Zero trust.
Dec 8, 2022

What is the national cyber strategy of the United States of America? ›

This strategy explains how the US will: Defend the homeland by protecting networks, systems, functions, and data; Promote American prosperity by nurturing a secure, thriving digital economy and fostering strong domestic innovation; Preserve peace and security by strengthening the ability of the United States — in ...

What is Biden doing about cyber security? ›

The State and Local Cybersecurity Grant Program will provide $1 billion in funding to SLT partners over four years, with $185 million available for fiscal year 2022, to support SLT efforts to address cyber risk to their information systems and critical infrastructure.

What is the CISA statement on election? ›

CISA is committed to working collaboratively with those on the front lines of elections—state and local governments, election officials, federal partners, and vendors—to manage risks to the Nation's election infrastructure.

What is the biggest cyber threat to the US? ›

1) Phishing Attacks

The biggest, most damaging and most widespread threat facing small businesses is phishing attacks. Phishing accounts for 90% of all breaches that organizations face, they've grown 65% over the last year, and they account for over $12 billion in business losses.

What is the #1 cybersecurity threat today? ›

Phishing is a type of social engineering attack that has become one of today's most common and malevolent cybersecurity attacks. Phishing occurs when a hacker uses a false identity to trick someone into providing sensitive information, downloading malware, or visiting a site containing malware.

What are the cyber threat trends for 2022? ›

Ultimately, Gartner nailed it when they predicted in 2022 that attack surface expansion (caused by the dispersal of enterprises), supply chain risk, and identity threat detection and response would be three of the biggest cybersecurity trends in 2022. In many ways, I think the same goes for 2023.

What are the top 5 major threats to cybersecurity? ›

The main types of information security threats are: Malware attack. Social engineering attacks. Software supply chain attacks.


1. Ian Bremmer and Kevin Rudd on Global Geopolitical Risks Ahead of U.S. Midterm Elections
(Asia Society)
2. WATCH: Former Twitter Execs Testify at Congress - LIVE
(CNET Highlights)
3. Former Twitter executives testify in House hearing on Hunter Biden laptop story | full video
(CBS News)
4. Ex-Twitter execs grilled by Republicans on Hunter Biden story censorship
(Fox News)
5. Watch NBC News NOW - October 29
(NBC News)
6. Free and Fair Elections: A Center for Security in Politics Symposium
(UC Berkeley Events)
Top Articles
Latest Posts
Article information

Author: Wyatt Volkman LLD

Last Updated: 01/06/2023

Views: 6102

Rating: 4.6 / 5 (66 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Wyatt Volkman LLD

Birthday: 1992-02-16

Address: Suite 851 78549 Lubowitz Well, Wardside, TX 98080-8615

Phone: +67618977178100

Job: Manufacturing Director

Hobby: Running, Mountaineering, Inline skating, Writing, Baton twirling, Computer programming, Stone skipping

Introduction: My name is Wyatt Volkman LLD, I am a handsome, rich, comfortable, lively, zealous, graceful, gifted person who loves writing and wants to share my knowledge and understanding with you.