top of page
Search
  • crowsden

SMURF DETECTION SYSTEM

{logged by William Newton March 23, 2024 3:57 pm}

AFTER READING THIS you might think I'm kidding.....but I'M REALLY NOT❗


Is the Smurf Detection System (SDS) the next gen replacement for the failed, corrupted ERIC system that could possibly root out "fake voters"❓

FIRST - What's the ERIC System you ask.....🤔


ERIC OVERVIEW {source: ERIC Inc}

"Member states securely submit voter registration and motor vehicle department data to ERIC. ERIC is also certified to use official death data from the Social Security Administration and subscribes to change of address data from the United States Postal Service.


Utilizing these four data sources, ERIC provides its members with reports that identify inaccurate or out-of-date voter registration records, deceased voters, individuals who appear to be eligible to vote but who are not yet registered, and possible cases of illegal voting."

✳️ By many accounts the system has failed to deliver.

While "Left leaning" organizations defend ERIC, Judicial Watch provides the following review -


NEXT Lets define the meaning of a "Smurf Attack".....

A Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.

Most devices on a network will, by default, respond to this by sending a reply to the source IP address.

If the number of machines on the network that receive and respond to these packets is very large, the victim's computer will be flooded with traffic. This can slow down the victim's computer to the point where it becomes impossible to work on.

✳️ Remember when pollbooks became "overloaded" and slowed down so much that voters could not be confirmed as registered in realtime and polling locations had to shut them down, disconnect from the "mothership", State Board of Elections.....letting virtually anybody cast a ballot❓

👉🏾 Let me drop a previous commentary of mine about pollbooks -


SOME HISTORY ABOUT "SMURF"

The original tool for creating a Smurf attack was written by Dan Moschuk (alias TFreak) in 1997. He died in 2010 due to complications with epilepsy but his work lives on......


"TFreak" wrote the code and sent out some greetings to his friends. He was also mad at the time that a co-system administrator where he worked stole his girlfriend. TFreak was 16 years old or so then and still attended high school.


TODAY THE TECHNOLOGY has continued to morph into many uses; not just with video "gamers" but in banking.


The term 'smurf' is used in gaming to describe a player in an online game that creates a new account to play against lower-ranked players, however, it can be used as an all-around term for describing a player who uses an alternate account or multiple accounts.


The most efficient way to cross-reference that dataset (compare addresses to registrations) is through fractal identification..... THAT said, I don't mean jumping on the "Fractal Team" train. Common words and terms like "SMURF, FRACTAL.... ELECTION INTEGRITY" each are more often than not, just terminology used to misdirect you or FUNDRAISE ON. 💰


REVIEW SOME OF MY PREVIOUS BLOG ENTRIES FOR MORE DEPTH - when THE hustle is ANOTHER hustle of THE hustle.

👉🏽 The "Fractal Team"

👉🏾"Database Latency" from 2022...

👉🏾"Ballot Harvesting" (a teaching moment)


Given the ability of "smurf" technology to create fictitious profiles, SDS programming becomes the obvious next step to disrupting the scam of creating multiple profiles but like every other reinvention of the wheel, it may be round but it's not foolproof. Like everything created, there are countermeasures that in turn provide opportunities to counter the safeguards and exploit systems; using it's capabilities against itself. And round and round we roll......

Our current archaic system being used to challenge the accuracy of voter rolls is chasing "voters" in a hit-and-miss game of wackamole.....using out of date voter rolls provided by the very same bureaucracy that the exercise seeks to expose and low tech unreliable door knocking canvassing......talking to strangers then logging their highly impeachable responses to questionnaires that prove nothing.


Enter electronic election equipment (using machines & software) that are designed to detect vulnerabilities such as identifying redundancy, duplicate registrations and the physical addresses set up to receive multiple MAIL-IN BALLOTS......but then that software becomes suspect, corrupted.....exploited to hide and conceal instead of revealing the deficiencies.

The issue then moves away from an ability to identify individual "ghost" voters (and duplicative/out of date REGISTRATIONS), the service that the ERIC System was supposed to root out.


Next up to solve all of our problems and deliver upon society those elusive free & fair election results {sarcasm}... the next gen replacement being proposed MUST target it's attention to repetitive physical addresses. Addresses don't move like people do......you know.

FEELS LIKE AN AWFUL LOT OF BACK & FORTH....with a whole bunch of cute names: ERIC, SMURF.... and I wonder what ever became of "TFreak's" girlfriend, Miss TFreakette❓🤔

All this reminds me of a boat in a rough sea that tilts from side to side and the people rush back and forth from one side to the other trying to counterbalance the rolling pitch of the deck..... In the end, for all the effort by the passengers and crew, the boat sinks.

WELL swabbies, that's enough for one days commentary....at ease ⚓


♦️ Sometimes a giant leap forward can be achieved with a small step backward.


......OR AS Maryland 20-20 Watch has advocated from our early days - 👇🏽


"IT'S JUST THAT SIMPLE!"©

87 views0 comments

Recent Posts

See All

Comments


bottom of page