Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
And welcome, ladies and gentlemen to this edition of the
Hagman Report. It is Tuesday, the day after Labor Day.
We labored. You didn't see it, but we did. It's
September third, twenty twenty four. I'm Doug having your host.
Thank you so much for your belief and trusting us.
I just want to say I want to be known
now as the dog Father of truth. I don't know
(00:21):
if that. I don't know how you guys feel about that,
but that's kind of the way I feel, the dog
Father of truth. But anyway, I got a great show
line up for you today. I want to get right
into it. Doctor Jerome Corsi. You know him. His reputation
precedes him. This man has done more for this country,
I think, than many, many, many people put together. I
(00:42):
just absolutely love this guy, love him like a brother.
I've had time to spend time or just spend time
with him once in Washington, d C. I'll never forget
sitting down at the National Press Club with him, sharing
breakfast and just you know, the man is really a star.
He has a website now. Now I want to get
(01:03):
this proper and I want everyone to make sure you
copy this down or you tell everyone about this website,
God's five stones dot com. Now, I deliberately really said
that slow God's five stones dot com. There it is
(01:26):
on your screen. Make sure you write that down, book market,
whatever you have to do. Share this with other people.
This will explain what we're going to be talking about today.
But his writings, his books, his works also even his
latest about the fight against the globalist folks. You've got
to really grab ahold of his books as well. I
am a just a I mean a big time reader
(01:49):
of anything that he writes, and he's written so many
great books. But check out God godsfivestones dot com. Before
we get into the program very quickly, I just want
to thank you respond, just thank you. We were off
last week because we had a viral sickness go through
the production and engineering and Eric the tech was down.
(02:10):
He was sick as a dog, and I mean a
sick dog. And of course we had some other investigative
tasks that we were involved with, had shadow ops up
here as well as Randy Taylor. We were in south
of here in Pittsburgh doing attempting to emulate doctor Cors's
doctor Courses investigative journalism investigations and such. But anyway, more
(02:34):
on that some other time. Again, before we go get
into this, I'm going to just struct you to another website,
Three Harmful Foods dot com slash Hagman. Real quick here, folks, listen,
we're living in the right now. We're living in the
most advanced era in human history. There's never been more
medical breakthroughs than there are right now. So why are
millions of Americans more unhealthy and overweight than they've ever
(02:56):
been now? According to the US Sports Certified Physician and
expert nutrition this doctor Amy Lee, one of the main
reasons is three harmful, harmful foods that are being passed
off as health foods all over the country. And wait
until you hear this because of these because these foods
can cause weight gain, and I've seen this happen with
family members. They clug your digestive tract, they deplete your energy,
(03:18):
they wreck your scan. They're banned in other countries. Yeah, shockingly,
they're still legal here in the US. And it's time
someone shine to light on what they are. Doctor Amy
Lee does just that while explaining how these side effects
of these foods are wreaking having on the health of
millions of Americas. I'm telling you, you've got to see
this for yourself. The great news is, however, it's easy
(03:38):
to stop and reverse this damage by simply learning which
foods to avoid, how to spot them. And by doing so, folks,
you can experience easier weight loss, smooth digestion, and vibrant energy.
And I'm telling you everybody seems to have this weight
loss and health stuff, but this really I found this works,
especially with the digestive system. And to find out these
(04:01):
fake health foods, go to three that's the number three
harmful foods dot com slash Hagman. That's the number three
harmful foods dot com slash Hagman two wins on Hagemen
or click on the link in the description box below,
And after years of extensive study, doctor Lee put together
a revealing video. You've got to really watch it totally
free to the public as you so you never get
(04:22):
duped by these foods again. Find out all you need
know again to regaine control over your body at three
harmful foods dot com. That's the number three harmful foods
dot com slash Hagman. Make sure you throw that in
their two wins on Hagman, or just click on the
link below in the description box. All right again with me,
Doctor Jerome Corsi got five stones dot com and he
(04:43):
is really the David to the Goliath of the globalist
He and doctor car Carlo Dean Graves. I love that woman. Again.
I love doctor Horsey as a brother. With no further ado,
Doctor Horsey, Jerome Corsi. I know he's on a very
tight schedule today, he's traveling. He can explain that if
he so wishes, but he's in the fight as we
head toward election twenty twenty four sixty two days some
(05:09):
odd hours and minutes, Doctor Corsi, thanks for joining me today.
Speaker 2 (05:13):
Oh it, Doug is great to be back with you.
Thank you, looking forward very much the discussion.
Speaker 1 (05:18):
Thank you, well well, thank you, and again I know
you're slammed as ever, but you're making a difference with
respect to your investigation. Found something and when it was
explained to me, no, I'm pretty thick headed. So I
mean when it comes to electronic stuff and computer I
don't know, but I'll tell you something. When I heard
(05:38):
the explanation that you're about to provide, hope, I believe
to the listeners and viewers, it made sense to me,
and that's all I really care about. So we're in
the battle of our lifetimes with this election. It's communism
versus not communism. So I'm going to give you the floor,
(06:00):
doctor Corsi, and again, man I respect a lot. Please
folks make sure you follow him and the link for
his website will be prominent below. But doctor Coursey just
take it away well.
Speaker 2 (06:14):
And we'll make this a discussion and so interrupted. You've
got questions because some of it's not easy. What we've
discovered and Andrew Piquett, who's a computer genius, about two
years ago, was looking at the New York State Department
of Election voter registration roles. These are the official roles
(06:37):
that New York uses for people to vote, and what
he found was that surprisingly, internal to the code, there's
an algorithm. There's coded language here that's like a cryptographic
code that is written into the New York Board of
(06:57):
Elections voter role, which allows for the creation of false
records and the voting in those false records in mail
in ballots in a manner that can be certified.
Speaker 3 (07:13):
Because what this scheme does.
Speaker 2 (07:15):
And this scheme is worthy of intelligence agencies, I mean,
is making, and we're finding it in a lot of states,
by the way, but I'll get to that. I think
this is a CIA or national security agency. This is
an intelligence operation that I think it's indication I'm beginning
to believe the intelligence agencies are running our elections, not
(07:37):
only in the United States but worldwide. We're no longer
voting free. We think we're voting but it's all Truman show. Now,
let me explain the New York State voter roles are
supposed to be sacrosanct. You're not supposed to go into
the inner workings of the database and put codes in
(07:59):
there to alter the data. Now, yes, you can make
the run faster, you can do codes to protect the
identity of the people who are voters. But what Andrew
Pick had found was that this was a fundamental renumbering
scheme that it comes right out of classic cryptography. It's
(08:21):
in the family of cryptographic schemes where you mark cards
and a casino. So the goal here, whoever whatever criminals
created this. And by the way, it's prima facia crime
to alter the database of an election voter role that's
going to be used in an election. I mean that
(08:42):
should be obvious. But the point is they alter the
numbers and the numbering scheme so that, in fact, you
can create false records that can then be voted. It's
very similar to the false records then become like marked
cards that you've created, and you want to stick them
into a deck of cards, and you want them to
(09:04):
be unseen by the mark the person you're playing against,
because you don't want them to know they're in a
casino that's rigged, even the casino is rigged, and so
our voters boute voting roles. It looks like across the
country at any rate, what New York State did was
they there's three steps involved into this kind of a
(09:25):
scheme from an intelligence point of view. Number one is
you've got to renumber the deck. Okay, you can't use
the original number now. For instance, in a deck of cards,
when you get a decade cards from the manufacturer of
a box of cards playing cards, they come in cell phane,
and you rip the cellophane off and you open the
box and the cards are numbered from the highest suit
(09:50):
to the lowest card. So if you just stuck in
marked cards, they'd be obvious because the mark cards would
be the ones out of order, so you've got to
reorder the database. And that's what that's the first step.
And Andrew Piquet's paper which is on the Gods five Stones,
God's without an Apostery got g O d S five
(10:14):
guests spelled fi ve e and Stones's plurals S T
O n E S dot com upper right hand corner
where it talks about the.
Speaker 3 (10:22):
New the New York results.
Speaker 2 (10:25):
If you click there you can see the paper that
Andrew Piquette published. I'll tell you about Andrew Piquette been
in a few minutes in terms of his background, but
he's really a very brilliant guy and he's the one
that did the work that was brought to my attention,
and what I'm doing now is to make sure the
world knows about it. So on God Sweindstones. If you
(10:48):
can look at that New York voter rolls and bring
up the Andrew Piquette paper, you're going to see that
this paper was published, and it was published in a
legit intimate journal that looks at cryptographic schemes. That was
the Journal of Information Warfare, was published in twenty twenty three.
(11:11):
And I'm going to explain to again simple terms, how
how the scheme works. Let's talk about renumbering. The goal,
by the way, is to remove your voter ID number
from the date you registered. The date you registered would
be the logical order to order them. So if you
(11:32):
came in and registered in the county number one, you'd
be voted number one in that county, and then you
aggregate up to the state, given the ranking among everybody
registering in the state.
Speaker 3 (11:42):
But it would be chronological order.
Speaker 2 (11:45):
And if you did a graph of it and the
why access, the horizontal access would be the data registration
to the ass time. Then the X access will be chronological.
So you come in number one, you get number one,
come in number one hundred to get one hundred. Well,
that's legitimate, that's straight. That's not how New York does it.
(12:09):
So the analogy I use is how Doug everybody knows
their children and what order they're born in. You know,
our firstborn child was well we all know that was
one born first. You say, well, my third child was
really good with music. Well, nobody's confused about who your
third child is, you know. But you come to the
state of New York and they say, well, I'm sorry,
(12:31):
but your your first child is number one but your
second child is number twelve, and your third child is
number twenty three. The next child is thirty four, the
next child is forty five, and the next child is
fifty six. So wait a minute, I don't have fifty
six kids. We'll say, well, it looks like there's fifty
(12:51):
six kids in your list, and they say, well, by
the way, there really are kids between your first and second.
So there are ten kids between one and twelve, and
they're not yours. We put them from somebody else. Just
put them there. And by the way, two of them
don't exist.
Speaker 3 (13:10):
They're fake. Made them up.
Speaker 2 (13:14):
Because you opened up room in the database by renumbering it.
Now I can enter in false records that look like
they're real because they'll have all the same information in it,
but I may have cloned it. So I've got somebody's
name in the address, but I changed the middle initial,
or I changed the address, or I create a ghost record,
(13:38):
just make one up. So there's lots of ways to
create false records. But when you look at that false record,
it looks legitimate, because how would you know that that
person's got twenty other registrations unless you go look in
the database, or how would you, a prison doesn't exist
unless you go out and look for them. And the
(14:00):
states don't go out to look for voters. They just
register people who come in. So therefore the looks and
the point is, since I've renumbered the fake ones included
with this whole renumbering scheme, I can give everybody a
legitimate state ID. So my false votes now have a
(14:21):
legitimate New York State I D in the renumbering scheme.
And the renumbering scheme is a direct professional coding scheme
is called a spiral cipher, and they use what they
call rep units, which is, you know, one one one
one one one to add to the sequential number of
(14:43):
the next in the file, which means that there's one
eleven entries between you and the next one to which
other records can be inserted. And Andrew Piqutt figured this out.
When he saw it, he was startled. Now what he
then found out was that they reinserted these false voters
(15:06):
into the database so you couldn't find them, except that
the person who created the criminal scheme has a algorithm
ID that locates the false records false voters. So if again,
some more ciphers. The paper described as Caesar cipher, which
(15:26):
is a reordering cipher again, and you know, essentially, if
you were to look at that database, all these records
look normal. But if you have the cipher, the criminal,
you can say, in New York State, you know, we've
got maybe three we've got maybe two million false records
(15:50):
that there are that many in New York State, and
maybe three hundred thousand of them are set up for
e mail in balloting. And of those, I've got fifty
to sixty thousand just primo, you're never going to figure
them out without a lot of work.
Speaker 3 (16:06):
So what I do is, so.
Speaker 2 (16:07):
Now I'm the criminal inside the New York State Board
of Election. I penetrated that maybe I work for the CIA.
I just got a job there. I'm doing a covert
operation that the Board of Election doesn't know about, and
if they saw it happening, it wouldn't cause any suspicion
because it looks normal. So what I do is I
(16:28):
sit there and as I need to, I see that,
you know, Kamala Harris is not doing very well, So
maybe I need to start going into my pool of
false voters and start requesting making sure they've all got
mail in ballots and then I run that ballot through
(16:48):
the machine. So now I've got a false voter with
a real New York State ID that requested a ballot.
My own ballot got one and it ran through the
machine with that number that's legitimate New York State I
D voter I D number, But the voter is false.
But it certifies, because all I'm trying to do is
(17:11):
check to see that a voter who is on my
database as a voter with a number that was a
voter I D voted and then I got the ballot
and I counted it, and now it certifies. And so
therefore I can do as many of those as I want.
I can do them all day long.
Speaker 1 (17:29):
Okay, in fact, just to be clear, I want to
make sure I'm clear on this. So this is happening,
for example, in this paper, and folks, you've got to
read the paper because it'll help you totally understand what's
going on. In the graphics. There are phenomenal the in
in New York State at the state level. They're created,
am I am I correct to say this. They're creating
(17:49):
individuals or votes or voter registrations out of whole cloth.
These people are correct people don't exist, correct, Okay?
Speaker 2 (17:59):
And then and they know they don't exist. It's an
intentional scheme to cheat, right, okay. And so if I'm
the criminal who does this and put this scheme in
there unbeknownst to anybody except my confederates, I can basically
come to you and say, well, how do you want,
Kamala Harrison. Do you want to win by one percent?
You wanted to win by three percent or five percent?
(18:22):
Wanted to make a comeback during the day, start at
thurge that evening. You want me to stop the votes,
We'll overnight produce the ones we need. You give me
the script. I'll run the election that way because I
can sit in my computer and I can draw on
these pool of fake registrations certified it with numbers and
(18:46):
by the certification system. They've got legitimate voter IDs, but
they're made up. They don't exist. These people, I can
pull them out of the pool at will get them,
make sure they requested mail in ballots, Take that number
of the mail and ballot, run it through the machine
and make it a certifiable vote. And I can do
as many as I want. So I've got it, and
(19:07):
no matter how many people vote, I've got I can
always win the election, and if I want to, I
can make it dramatic. I can make it the next day.
And so you know, in twenty twenty, I wondered, I
saw all these regularities. People were driving in with trucks
full of ballots, and there were ballots lying all over
the place being run through the machines. I thought, for sure, Doug,
(19:30):
this would never certify, right, because it would never check
out that these were real voters. And then somehow all
these states certified it. And until I saw Andrew Priquett's paper,
I said, that's how they did it. That's the real
crime here. These guys are brilliant, and they got inside.
(19:51):
They got inside the birdhouse, and they're eating the birds
alive because the birds don't know the cat sitting inside
the bird house, and so therefore the birds are you know,
voters think they're voting. Now. The part of this that
is so I think tremendously nefarious is that it doesn't
(20:13):
appear to be anything wrong and and the likelihood that
you would go out and search to see if these
voters were real. Okay, and Andrew Piquett can find them,
you know, with the analysis, will show that that two
million records are likely false in the whole New York database,
(20:33):
and at least three hundred thousand of them are set
up for this mail and voting scheme. We would identify
them once we run tests through the data. And by
the way, Andrew Piquette is a guy who does computer graphics.
He went early on in his life. He went on
too the Netherlands. He taught at the Netherlands. He got
a PhD from the London School, which is a very
(20:56):
prestigious school Great Britain on computer graph epics. A Springer,
which is one of the leading publications in Europe of
scientific works, published two of his treatises. Two of his
books on computer graphics. He did computer graphics on Spider
Man and other movies. He's not a professional cryptographer, but
(21:18):
the history of cryptography World War two when we cracked
the Enigma code on touring in this team. During World
War Two, they used to put crossword puzzles in the
British newspapers to see who could brilliantly solve these impossible
crossword puzzles because those people could see patterns. And what
(21:39):
Andrew can see is he can see patterns and so
as he looked at these numbers as they were sequenced
in New York. It didn't make sense. They were sequenced
out of order. Then he saw a deeper order. He
saw the number schemes that were being applied. Now we're
finding that this is across the country. I've just spent
(22:02):
two weeks in Ohio and the Ohio presented this evidence
of the Ohio Secretary of State's office, and we have
an official inquiry opened up in the state of Ohio
to see if there are algorithms in the Ohio Department
of Election state database of voters. And I can tell
(22:22):
you we've found them. We've done a very initial report
to the state showing them their scatagrams. In other words,
you can take the counties and you can see if
the voters are being assigned numbers a straight line pattern
according to when they registered, and in Ohio a Huron
(22:43):
Patternwan County over by Sandusky is quite normal, not overed
at all. People come in and register, they get the
number according to the date they registered.
Speaker 3 (22:54):
Well.
Speaker 2 (22:55):
Huron County is a small county out by Toledo in
the western part of Ohio, mostly Republican, largely rural, and
a big mail in vote for Democrats wouldn't make any
sense there. But you go over to Mahoning County. You
look at the scandogram and all the registrations are in
like one quadrant of the Scandergram. Like everybody in Mahoning
(23:18):
County came and registered in two days. Is not possible.
They alter that by a mathematical formula. And then of
course Mahoneing County, next to Youngstown, is near the city
and it is a lot of Democrats, and that would
be a place from which you'd want to mine mail
in votes. And there's about five or six counties in Ohio, Ohio.
Speaker 3 (23:42):
I grew up in Ohio.
Speaker 2 (23:43):
I went to City Nation's High School in Cleveland, and
I got graduated from Case Western Reserve before I got
my PhD in political science at Harvard. But I've been
doing voted data in nineteen sixties, I was as an
undergraduate with my political science professors at WJWTV Downtown and Cleveland,
Ohio and Euclid Avenue projecting results of elections. So I've
(24:06):
got a great familiarity with this type of data. Now,
when you see this, you realize the massive decision to
take over a system and corrupt it by intelligence agencies
that are not satisfied that the people vote. They want
to pick the winners and losers from their intelligence agency perspective.
(24:28):
And I think from what we've learned about the intelligence
agencies lying, I don't think that this is particularly conductive
to what the Democrats like to call democracy. The point
is that what Paquette found we are finding now in Ohio.
Speaker 3 (24:45):
Today.
Speaker 2 (24:46):
I'm headed down to Tulsa, Oklahoma, and Tulsa just over
the weekend had a mayoral election that was so questionable
that it could not be certified. And we've found again
the Oklahoma State Board of Election database as algorithms in it.
(25:08):
And again, once these scattered plots are the way they are,
we know that data has been modified. In Ohio, the
cities control the Democratic vote stays largely rural, so they
don't put the algorithm in every county, but in a
state like New York. And by the way, we've also
found the algorithms in New Jersey. While we found them
(25:28):
in Hawaii, we found them in several states. I'm beginning
to think, Doug, I'm gonna find We're gonna find algorithms
in every state we look at.
Speaker 1 (25:36):
It sounds like that.
Speaker 2 (25:37):
Yes, okay, I don't think this is an isolated scheme.
I think it's one that's being used worldwide. I mean
the elections in Europe and parliamentary elections follow the same pattern.
They have two elections in the EU for parliament. On
the first election, the Conservatives did very well. In the
second election, they said, well, the the left surge that
(26:02):
woke up well, I speak French and Italian. I called
over Italy and then to Pransident, Are there there's a
surge in people voting at the polls? Said not, of course,
there's nobody at the polls. The surge is occurring in
the machines. And so I'm saying that before we vote,
(26:22):
we need to have an examination of every one of
the state voter rolls maintained by the state Board of Election.
And look, I went to Ohio, I grew up in Ohio.
I believe the state officials in Ohio are honest. I
think they're trying to do a good job. But I
thought an honest state would be willing to listen to
(26:44):
me and hold an investigation, and they were.
Speaker 3 (26:46):
They did.
Speaker 2 (26:47):
On our website you can see the official communications we
have from Brian Katz, who's the Public Integrity Officer and
the office of the Secretary of State in Ohio, mister Lorose,
and he's saying, we've got an official investigation done going
(27:09):
we're waiting for doctor Costy to present results. Well, we
presented them some, But Andrew Briquett is busy writing the report,
just all over the weekend his report, and he's now
found the mathematical schemes in Ohio and he's just a
few days, I think, from being able to produce the
report that will shock Ohio. But because they're honest, I
(27:31):
felt like I had a chance to get a hearing
that would be honest. And when the Ohio officials saw
something they didn't know was there because they were priding themselves.
They said, we have a ninety six percent squeaky clean
voter role and they've done a lot of work in Ohio.
But you see they're cleaning up voter records from people
(27:53):
who are dead or who have moved, and those aren't
the votes the criminals are planning, these intelligence agents are
planning to use the intelligence agents. You can clean up
all those records, I wouldn't care. They've made up their
own false voters. Within the database in a way that
(28:13):
they control and you don't know about. And so that's again,
you know, it's I think it was a rare event
that this protect crack this. So the way I got
involved was an attorney, one of the attorneys in Ohio
(28:34):
to Thomas Connor. Thomas Connor's Thomas is with the Mendenhall
Law firm in Akron. He had been working on some
litigation in Ohio to challenge the election. And Tom called
me and he said, doct of course, I've got this
paper from Andrew Piquette, and it's too complicated. I don't
(28:55):
understand cryptography. I don't understand the math. It's way about
my head. I'm a lawyer, and would you look at
it and tell me if it's if it cets onto something.
I said, But this happened about now, about three months ago,
and I took a look at the paper and I
read it immediately and said, I was immediately impressed that
(29:18):
there was something there. It took me about a week
to really work through it and understand all the intricacies
of it. And I understand cryptography. I've done a lot
of work on it. I've written about it. I will
be doing more writing and cryptography because the whole field
interests me from World War Two in the band Pearl
Harbor quite frankly, and I've studied it extensively. So I
(29:41):
got this. I figured it out. The schemes. I called
Tom said, Thomas paper's one hundred percent legitimate. He's onto something.
He's proved it. So I don't know how he did it,
but he actually figured out the mathematical formulas, which sometimes
takes professional cryptographers years to figure out, and he got
(30:02):
it right Andrew Piquette. So if you're going to God's
Five Stones, you're going to see in Ohio. And like
what the interviews were doing today, I did a lot
of town hall meetings and I've done and we recorded
them and they're up on the archives of God's Five Stones,
so you can watch them. And if we can raise
(30:25):
enough money, I'm going to try to do as many
states as I can. I've got a list of about
thirteen states that include Texas, include Pennsylvania. I'm very suspicious
of Michigan and Wisconsin. I think we're going to find
Arizona along with Oklahoma and Texas. I think they're all
(30:49):
infected with these schemes and at First, it's hard for
people to believe. I mean they say, our intelligence agencies
are running our elections, Well, they're running about everything else.
And if you take a look at the way the
Democrats have staged their twenty twenty four campaign, well after
that debate, Biden's ratings were so low that nobody would
(31:14):
believe that he could challenge Trump successfully because the distance
was just too great. So they had to get rid
of Biden, which they did in a very ungraceful way.
Speaker 1 (31:28):
It was a coup actually within the Democrat or is
his Socialist Communist Party.
Speaker 2 (31:34):
Yeah, I agree, this Todly wasn't president anymore. And if
you didn't like it, they were going to expose his criminality,
you know, with accepting drives all over the world during
his entire political career, with riching his family, and maybe
other things which they had blackmailing him on which you
can only speculate. But so Biden steps down kind of
(31:58):
he's still present dove. So Kamala comes in. Well, nobody
likes Kamala. I mean, this is one of the most
unlikable people. She slept her way into the position. She's
got a very ugly history in California. Every other word
out of her mouth is a rabid with Neo Marxism.
Free the free the prisons, open the borders, you know,
(32:21):
destroy the cities, destroying America. We hate God, pform more abortions,
have more gender madness.
Speaker 3 (32:31):
I don't. I don't think there's been a worse.
Speaker 2 (32:33):
And then this guy wall wherever they found him into it,
stolen honor and even his brother says he's no good.
This guy is bizarre behavior, contortions.
Speaker 1 (32:46):
And yeah, I've never seen anything like that in that ticket,
their dream ticket, There is a nightmare ticket for us,
which brings me back to to this. In my view,
the only way that they could possibly win, and if
I understand you correctly, is the algorithms would are enough
(33:09):
to even convince someone in an someone in an oversight
position just say yeah, I mean everything looks appears right, correct.
But it's within that algorithm, it's within those hidden or
created from whole cloth, non existent votes or people hint
(33:31):
enhance votes that they can convince even the most well
meeting person unless they know what you've discovered is that right.
Speaker 2 (33:40):
That's right, and you've got it exactly, and that they
can certify them because they've given these false votes, real
state ID voter ID numbers legitimately within their redone counting schemes.
They've created spaces for these two false children to be
placed in your stack, right, and you don't know they're there.
(34:02):
You don't know that fifty six are there because they
don't tell you how they've renumbered things. And then the
point is, if it's certified, it's going to be hard
to overturn.
Speaker 3 (34:14):
You see.
Speaker 2 (34:15):
That's that's the trouble we've had with the twenty twenty
election is that all these lawsuits are saying the twenty
twenty election was fraudille by trying to explain to Sidney
poll don't go out and say you've got the Kraken
because you might not have it. So they've done set
ups here. I said, yes, the dominion voters have changed,
you could see them switching votes. But I've been on
(34:37):
the inside of vote tabulations on presidential elections and the
numbers come in raw. Some of the precincts are reporting
with two with five percent reported ten percent, and the
numbers shift some during the night. So maybe just because
the numbers change the dominion computers doesn't mean that that's
(34:59):
inherently in activity and they'll argue that it was for
legitimate purposes, and you will be out the cold if
you can't prove it wasn't and you won't have the
data you need to prove that. So then they're going
to be able to have defamation cases against you or
to say you're challenging a legitimate election, you're undermining confidence
and elections, which could be a crime. So I said,
(35:20):
I want to do a very different approach. I'm saying,
we found these algorithms. We by the way, we know
some of the have been around. These I think were
possible after Hobbi, after the Hobby Act, that helpful legislation
for voting clean up in two thousand and two where
the states were mandated to create their own statefolder ID numbers.
(35:42):
I think somebody had the scheme of mind as far
back as two thousand and two, and by two thousand
and seven many states were adopting them. And if we
can get into the computers, the servers the states are using,
and get into the machine language, which is, you know,
the ones and zeros, we can tell probably when these
(36:04):
algorithms were placed into the state voter database, and we
can determine the false records I mean, all this stuff
is likely still there. And in New York State, when
they remove when they use one of these false records,
they make it inactive, but they don't remove it from
the database. So we can go search those and realize
(36:24):
that they used a record from a non existing person.
We can begin to demonstrating this. We've been finding the
votes that they're using and pointing them out. We're developing
analytic tools which go in, say you've got this many
suspicious records, and there's astounding numbers of these, certainly enough
to certainly enough to flip an election. And that seems
(36:46):
to be the point of saying that, well, well, let's
guess like Kamala, you know, she's doing really well, she's
beating Trump in polls. That's nonsense, Doug. This is the
worst presidential ticket, this Kamala Harris and this sky Wall
since George Wallace picked Curtis la May in nineteen sixty
(37:07):
eight to be his running mate. Curtis May firebombed Germany
in World War Two. He was at his strategic bombing
firebomb Japan, dropped two tomic bombs on Japan.
Speaker 3 (37:19):
Then he wanted to go Joint chiefs.
Speaker 2 (37:22):
Kennedy wanted to go to nuclear warfare with Russia and
the Cuban missile crisis. Kennedy thought he was insane, and
George Wallace of course was a racist and that ticket
was a terrible ticket. This ticket's worse. The ticket's outright
Marxist lying. But it was constructed. The Democrats only apparent
strategy seems to be to steal the election, and that's
(37:48):
the only that's their only path to victory right now.
And this mail end scheme that we've found embedded, imagine
this in the in the office of the state Board
of Election is where this crime was committed. It's an
inside job. That doesn't mean that the role agents were
(38:12):
you know that the Board of Election was in on it,
but it does mean that they got penetrated and this
game got put in place at I guess at the
best without their knowledge and they and they can't find
it because they don't understand cryptography, they don't understand the
complications of this type of work.
Speaker 1 (38:32):
Once you okay, what would be the process, because I'm
trying to understand this from my investigative point of view,
how would this crime take place? Would it be and
I'm going to choose, well, would it be a hack
or an access from afar? Would it be somebody in
(38:55):
that office accessing the computers? Would be I mean, how
would that actually what would that look like? That crime?
Speaker 3 (39:05):
It could be done remotely.
Speaker 2 (39:08):
You could have Langley or one of the the NSA
capabilities penetrate the computer and do it remotely. It could
also put an agent on site to be there to
monitor it. On site to you need access to the
server on which the State Board of Election voter data
(39:28):
resides because you're going to go into the server and
you're going to change the renumbering scheme, and so it
means the traditional numbers which rank voters chronologically from one
to whatever by the date they registered. That link with
reality is broken. So there's the voter ID number you get.
(39:53):
There's no relationship to when you registered. It. It's not
a function of when you registered. You might have registered
later and get an earlier voter ID number because they
sorted you back into the into their renumbering scheme earlier.
And it's all determined by the algorithms. It's it's it's
(40:17):
just a mechanical numbering process and it's very methodically controlled
and you can see it in operation I mean, it's
it's a brilliant operation, but it's code. Cryptography has to
follow rules, Doug, because you know, when you write a code,
the people you want to read it have to be
able to decode it. So it has the code has
(40:39):
to be reversible. You have to go into the code
and then whoever's got the codebook has to be able
to read out of it.
Speaker 3 (40:44):
Okay, okay.
Speaker 2 (40:46):
So the analytics that are applied, the mathematical formulas, or
the transformation of letters, or what they call stenography, the
heighting of information like in micro dots. This all has
to be systematic, so whoever you mean to look at
it can retrieve it and can decode it. Now, what
(41:08):
Piquette did is he was not meant to read it,
but he found it and he figured out how to
decode it without being given the codebook. But that's the
brilliance of what he did. Okay, without being given the codebook.
He said, this is a numbering scheme. This is a
spiral cipher. It's how spiral cipher's work. I'm seeing these
(41:31):
intervals between numbers. They're using one one one one to
add to the next number. It took him probably two
or three months, to figure it out. But once he
had it, he had it, and then he could predict
the numbers as to where they would be. He could
show you how the data was renumbered, and then he
could show you where the illegal votes were hidden and
(41:54):
how they could be used and erased. So, for instance,
he found in New York. There's one peculiarity. It's a
cat found that that there is a one gentleman who
shows up in the file along. I'm gonna get his
name here for you exactly in just a second. I'm
gonna pull up on my computer. It's on our website
(42:17):
on the Guards five Stones. But I want to just
give you the exact name here of this guy, because
this is really interesting. They took the There was a
famous identity theft in New York and New Jersey, and
he was convicted of wire fraud, credit card fraud, passport fraud.
(42:37):
He was getting passports under other people's names, and they
put away in prison for a long time. Okay, and
so his name I'm gonna pull up. Spreadsheet's just coming
out of my computer right now. I'll tell you his
name in a second. But his his name is in
the they used. Okay, so his name here we go.
(42:59):
Is Arthur Morello m au r e Lllo. Arthur Morrell
was the identity theft convicted in New York, New Jersey,
and he has twenty three records created for him by
these criminals in the New York State.
Speaker 3 (43:23):
Board of Elections database.
Speaker 2 (43:24):
And then they also registered all the members of his family,
everybody with a Moreau last name in the state. And
so you can see Morrell's got all the different addresses
he's supposed to have lived at, and his records are
all purged, which means they used them and then they
purged them, but they left them in the database. And
(43:44):
then the most of the other records for the other
people who were related are active. But this is like
a inside Joe Haha. We're so clever. We can create
the records under the name of the most famous idea
unity theft that we know of, and nobody will catch
Nobody will get it, except if you're on the inside
(44:05):
of the joke. That's how these guys whoever did this
think that they're so smart. They never befought, never be found.
And by the way, the criminals who do this, the
intelligence agency operation, never expected to be caught. Right the
other that's the other fundamental here. They never expected to
be caught, so they could set up this elaborate show narrative. Well,
(44:32):
Biden's dropped out. Well why did Biden drop out? Well,
don't worry about it. He's just gone. Forget about him.
So it's Kamala. Now we're going to guess, like, Kamala,
isn't she wonderful?
Speaker 3 (44:42):
Look at all? Over great?
Speaker 2 (44:43):
You know, ideas, she can't get twenty five people to
come and attend one of her speaking events, probably even
if she paid them. She couldn't draw an audience like
Trump draw draws. Right, But you know that doesn't matter,
because we're going to say she's just really bringing in
and she's surging among them. Actual's surging. And so therefore,
when the election occurs and they use these mail in
(45:07):
votes through this algorithm to create enough votes to make
KR go over the top, even though stopping the election
and printing them the next day, bringing them through the
ones that they'll count, the ones they run through the
machines with that number of that voter, and then they're
going to say it's certified. So what are you going
(45:27):
to do about it? Because we said it was approved
and it was official, and so therefore we've certified our
own crime. And if you didn't know about the algorithms,
and you know, right now people are absorbing the idea
that how could our database of voters be this corrupted
(45:47):
by intelligence agencies? What in the various purposes do they have? Well,
this new world order wants to win at any costs.
They want to use the neo Marxist you know, gender
uncertain left to destroy America, destroy God, destroy the family.
But then the World Economic Forum will be happy to
take over with their Klaus Schwabs. They're millionaires of their billionaires,
(46:10):
while I've merge themselves with machines and become transhuman. They
don't need the rest of us. That's why I've written
this book, the Anti Globalist Manifesto, which is a war
room book. Steve Bannon wrote the introduction. And I've created
the Anti Globalist Alliance the United States and Europe because
we've got to take back our communities. We've got to
(46:31):
take back our government to get rid of these governments
that lie to us. You know, this is my second
big book this year. I also did the book on
the JF. Kennedy assassination. The assassination of John F.
Speaker 3 (46:44):
Kennedy.
Speaker 2 (46:44):
The final analysis I worked with doctor David Mantik, who
is a radiation oncologist, means he reads X rays for
cancer patients, that's been doing it for more than forty years,
also as a PhD in in physics. And what doctor
Mannick has discovered. He took a dens autometer, which is
(47:08):
a scientific instrument that measures light millimeter by millimeter coming
through the X rays. There are three Kennedy X rays
from the autopsy left in the archives. Doctor Mantick determined
all three are fake, all forged to hide a mask
evidence of frontal shots. Jack Kennedy, you can see in
(47:28):
the X rays clearly was hit three times and they
had first shot hit him from behind at a low angle,
probably the taltext building. We just head forward to frame
three thirteen, the big jut of blood and gore coming
out from his forehead into the sky to the upper right.
Then it less than two seconds later frame three thirty
(47:52):
three twenty as a prod of film, the right side
of Jack Kennedy's head by his ear explodes. A bullet
hits and from the grassy knoll it blows out the
back of his head.
Speaker 3 (48:03):
The occipital region.
Speaker 2 (48:05):
Clint Hill, who's Secret Service agent running on the car
trying to get to Jackie on the left of the car,
gets sprayed with Jack Kennedy's blood and gores. Jack Kennedy's
thrown violently back to the left. And do you see
that that's the second shot for the Grassy Knoll, one
shot from low angle, Daltec's one shot Grassy Knoll.
Speaker 3 (48:27):
A bullet comes through the windshield.
Speaker 2 (48:30):
It's Jack Kennedy in the throat, that comes from the
other side of the Grassy Knoll, south side up by
the railroad yard. And Jack Kennedy's hid it in the
forehead above the right eye. And you can see the
trace of the fragments of the bullet in Jack Kennedy's head.
That are little scattered particles to begin with, and they
(48:52):
end up the biggest particle on the back of the head.
Largest particle travels the furthest it has the most weight,
it's got the most inertih out on. A bullet breaks
up inside a skull and it does not exit well.
That book has unmistakable evidence, it's being accepted as such
that Kennedy was shot twice from the front. Doctor Mannick
(49:12):
has been publishing this for thirty years. But it's very scientific,
and so I've said, let's work together that the science
and the appendix. Five hundred and sixty page book has
got a lot of illustrations and it shows that our
government killed Jack Kennedy.
Speaker 1 (49:28):
You know, I see a lot of similarities between that
analysis and the set up to July thirteenth of this year.
Without getting into detail, but one thing I do want
to tell folks about your book about the jfk assassination
of the Final Analysis, which you co authored, Folks, it's
(49:51):
such a valuable piece of history, a documentation evidence. You
bring the receipts along with your co author. Folks, that
would really urge everyone to grab your copy because I
do believe that has the infrastructure that you can take
(50:13):
a look at that that read that book and kind
of apply to the latest attempt on President Trump. I
just I see a lot of a lot of potential
similarities if if things would have worked out different. But
having said that, your your latest book as well, the UH,
the Anti Globalist UH Benifesto, may thank you, thank you.
(50:36):
There is on screen this book, I mean, this is
ending the War on Humanity. I especially like this particular
book of all the books that have been written about
the globalists and what they intend to do. This gives
a tremendous amount of detailed data information, and folks, you know,
(50:58):
I'm I just love to read. I'd love to read
good books, and this is I think it's holding a
five star writing on Amazon. So I mean, this is
perhaps one of the best books on the anti globalist manifesto,
the movement of the globalists, and how we can fight them.
So thank you for your I don't know when you
get the time to do that, but thank you for
(51:21):
writing both of those. And then, of course, folks, you
can get drilled down into his previous books historically doctor Jerome.
Course he's my guest. The website that we're pointing you
to right now is godsfivestones dot com no apostrophes, the
(51:42):
number five spelled out Gods five stones dot com. And
there you can find what he's talking about. You've got
the New York Voteral Analysis. Well even on the front
page you can you can see the paper that's being referenced,
but also the paper on the dropdown menu along with
the slides. Folks, don't take this lightly. So with that
(52:04):
doctor Corsi, Who do you see, as you mentioned the
intelligence community, I see their fingerprints in just about every
nefarious act that we're experiencing. Are there specific people, divisions, departments?
(52:26):
I mean, how did they escape detection? Why can't we identify.
Speaker 2 (52:33):
These Let's start out, first of all, about how much
we've been lied to over the years, the narratives, the narratives,
the false narratives. Well, and Jack Kennedy, by the way,
was warning us about secret societies. He was onto this,
So okay, Why do buildings that were not hit by
the airplanes nine to eleven falled out, like Building number seven?
(52:58):
We never had an explanation for that. Why nineteen ninety
one we invade Iraq, hassanom Hussein's got we're told weapons
of mass destruction. We don't find any where were they?
We get to we have a vaccine, and the vaccine
is going to prevent you from getting COVID. Well it
doesn't you know what's Paluci's had COVID what nine times?
(53:22):
And its vaccine seems to be dangerous. So it's a
vaccine that doesn't cure you but kills you. I mean,
this is that goes on and on and on, and on,
and Jack Kennedy wanted to break up the CIA. I
think his only mistake was to say he was going
to destroy the break it up into a thousand pieces
instead of just do it. But we're the point where
(53:45):
we need to take this entire government bureaucracy which is
running the United States on its own bureaucratic authority, making
up all the laws and rules the way these Beltway
politicians want to do it. My solution is to move
the entire federal government and not ex we definitely include
(54:05):
the CIA, and to conclude the Department of Justice, which
is about politically worthless. Right now, move all to Death
Valley and give them all the solar and when they want.
Because these guys are anti American, I mean every research
that I write about, and even in the final analysis
(54:26):
that before World War Two, Allan Dawes and John Foster
Dallas who the game. John Foster Dalls with Secretary of
State under Eisenhower, and Allen Dawes ran the CIA. They
were together with Prescott Busch, the father.
Speaker 3 (54:40):
Of Towards H. W. Bush.
Speaker 2 (54:41):
They were funding Hitler from Wall Street. I thought this
was a great idea. Hitler self appointed elite and working
with the multinational corporations.
Speaker 3 (54:52):
A little bit of socialism.
Speaker 2 (54:53):
You know, Hitler was the first to a government provided
medical care and government provided vacationis before he decided would
kill all the people in World War Two. Auto bonds
and Volkswagen's cheap for the people. A little bit of socialism,
but it was. It was a system that was evil,
not only at its hard evil because it hated humanity,
(55:17):
but it's satanic in that it's love of evil. And
the Dunnes brothers were planning coupdetas through the CIA and
the State Department, going back to nineteen fifty seven in
Guatemala with the you know, the banana company that we
they staged a false coup on and we've had In
(55:41):
twenty eleven, I caught HSBC money laundering. John Cruise, who
was a relationship manager from Long Island, came to said,
of course, you've got records here from Hong Kong Changhai
Bank where I work. They're using people's social security numbers
and names. They're running millions of dollars through their accounts
and closing them. Well, you know, I spent fifteen or
(56:04):
twenty years working with banks. I had a whole career
in finance. I still have all my securities licenses and
insurance licenses. I created two broker dealers that I sold
to insurance companies or banks on The whole idea was
that I called up some gentlemen in New York City
and said, so, this is gonna be an unusual call,
(56:25):
but is your social Security number? And I read it
to He said, how'd you get that? I said, we'll
get that a minute. Did you run three million dollars
through your HSBC account last week? So I closed that account,
said well, you better give me a name of your
lawyer because that account's wide open, and I'm going to
show you some records that will shock you. Well, Homeland
(56:47):
Security got in touch with me and I got the
Center Permanent Investigating Committee. It turned out that HSBC was
laundering money for the Mexican drug cartels. I got fined
one point nine billion dollars. Nobody went to jail. Well,
the bottom line of that story is that wire transfers
the United States are worldwide, are monitored every day, every
(57:09):
single transfer by the National Security Agency of the Department
and also the Department of Treasury, and by a dozen
other agencies. The fact is that the CIA was running
the drug business. The CIA has been in the drug
business since the OSS was founded before.
Speaker 3 (57:27):
During World War Two.
Speaker 2 (57:29):
The intelligence agencies are running the drug business, and they're
running pedophilia, and they're keeping it open to the border
in order to foster their legal income. We have a
government completely out of control that wants to destroy the
traditional values, doesn't believe anymore in family, doesn't believe any
more in God, doesn't believe anymore in the United States, exceptionalism,
(57:53):
and they're using this neo Marxism, transgenderism to destroy all
that's good about America to reduce and American people are
seeing it now. Inflation which is destroying the middle class,
intentional inflation, spending money like crazy on deficits where you
know now we're only at trillion dollars and the interest
(58:15):
on the national debt.
Speaker 1 (58:18):
It's unsustainable. And just today I saw on the news,
doctor Corsi, where the Biden well, the Harris Biden Walls ticket,
well the regime wants to or it intends to give
the illegal invaders in our country is zero percent mortgages
(58:41):
that that will I mean that that's a direct attack
on the middle class as well as on our freedom
and economy. But it's just crazy, and they're giving them
preferential even though they're criminals. They're giving them preference over
American citizens, which is just beyond belief. Hold on just
one second here, let's take it just a quick break here.
(59:03):
I know doctor Jerome Corsi. His time is valuable. I
don't think he's gonna be able to take a drink
before he walks out the door after the interview and
board's a plane for the Midwest. So I really appreciate
his time. And I look up to that man. I'm
telling you, folks, I look up to the doctor Corsi,
(59:23):
and I know his history, and I urge you everyone
out there, please please do me a favor. Support the
work of doctor Corsi, Karla Dean Graves. But go to
the website. And we have the website of course on
the screen at times, God's Fivestones dot Com because we
(59:43):
can fight back, and if you want to know how
to fight back, this is the way we can do it.
Expose and then fight back by exposing the people and
the process he's behind this. That's God. God'sfivestones dot Com
all spelled out, no numbers in there. Very very briefly,
(01:00:05):
I want to talk about olive oil. I'm going to
tell you something. This has made a difference in our lives,
my wife and I. This platform has partnered with doctor
Gundry Gundry, MD to share the information with you. This
information with you. Would you believe that in your pantry
right now, you have got, right now one of the
(01:00:25):
healthiest foods on the planet. And it's not some weird,
trendy superfood. It's olive oil. You've probably used, yeah, I'm
sure you've used it for cooking.
Speaker 3 (01:00:34):
I know I have.
Speaker 1 (01:00:35):
But there are countless ways you can use olive oil
to help yourself look and feel younger. For example, it's
the only it's a natural way to help you achieve
a more youthful appearance. Just look at my wife. I'm
telling you it's you know, man, it really works. Besides
helping you look younger on the outside, it's a fantastic
tool for your insights as well. Now, according to doctor
(01:00:58):
Stephen Gundry, famous cardioth thoracic surgeon, nutrition expert, and health advocate,
you should get as much high quality olive oil into
your daily routine as possible, whether it's taking a shot
of a daily or helping or keeping a bottle in
your bathroom medicine cabinet. But what kind of olive oil
is best for you best for your health? Well, any
(01:01:19):
olive oil can give you some benefits, but if you're
looking to get the best, it matters a lot which
one you pick. So the olive oil industry is huge.
You can tell by the number of different brands you
see at the grocery store. Look it's best. You can
bet they're not all made with a consumer in mind.
I can tell you that right out. When doctor Gundry
came to this realization, he was appalled. But some of
(01:01:40):
the olive oils are so powerful it may take only
just a few tablespoons a week to see these incredible
health benefits. So right now, how can you tell between
an olive oil that can be a health booster and
which one isn't up to par. In an effort to
answer that question, doctor Gundry has decided to take a
stand release his person research and findings, and the video,
(01:02:02):
which is on the website there you're seeing it now,
has gone viral since its release, and it's important for
you to see it so you can start benefiting immediately.
You can watch the video right now by going to
get all of the number one dot com. Let's get
all of the number one dot com slash Hagman. Folks,
don't forget that slash Hagman. That's h A G M
(01:02:24):
A n N. Just click on the link below in
the description box. And you know people have taken his advice,
have've shared their results with them, and they said, look
this olive oil is I mean the olive oil bought
after learning his simple rules have helped change their lives.
Make sure you go to get all of one. Let's
(01:02:46):
get all of the number one dot com slash Hagman,
or just simply click on the description box below in
this in the below this video. Okay again, doctor Jerome Corsi,
and then I admire, I respect a man that has
a rich history in impacting our national history. And the
website of note right now is Godsfivestones dot com. Folks.
(01:03:13):
We talked about the letter, but by the researcher, you've
got to really look at that letter, read it. It
took me a couple of times to really go through it.
But it's easy once you once you fall into the
cadence of that, it's easy to see the algorithm, the
pattern that doctor Corsi's referencing, and of course we spoke
(01:03:33):
about the issues in the state of New York in
Ohio now on a local level, which doctor Corsi is
going to be boarding a plane to address out in
the in the Midwest. Folks. This is why we have
to we must support his work. And I Am going
to put my own money where my mouth is and
(01:03:54):
do that right after this show, So please do that.
Talk to a lot too about the jfk assassination, his
book on that, co authored on that, as well as
the book about the anti Globalist Manifesto. How we can
fight against these dastardly individuals, these as Jack Pisoba calls them,
(01:04:16):
the unhumans, and we need to do that. But we
need we need to go all in right now support
doctor Corsi because of all the different aspects of the
of the voting situation right now. This is perhaps he
I really think from this he identified a very vulnerable
(01:04:38):
aspect that can be readily explained I'm not going to
say easily, but certainly detected and then perhaps rectified forthwith.
And don't forget we have people like Joscelyn Benson, the
Secretary of State of Michigan saying, well, if you question
the certification, uh, you're going to pay the price, I'm paraphrasing.
(01:05:01):
So we're fighting against that too, and doctor of course
has put himself in those crossers. So with that, Doctor Corsi,
and then we've got about I don't know about twenty
minutes left, so let's go more on whatever wherever we
should be looking.
Speaker 2 (01:05:20):
Well, the one of the key things I think in
the strategy we're using here on exposing these algorithms which
are coding I think Intelligence Agency quality coding and the
state government of election voter registration files to it creates
(01:05:41):
false records that can be used for my own votes
that will certify because the scheme gives the false voter
a real state ID number to vote, so you get
a real ID number voting a false record. Great acceptive
and very ingenius. But the point is, you know, we're
(01:06:03):
not questioning. We don't have to say that run the
risk of saying whether there was election fraud in twenty twenty,
which is a perilous strategy because those elections were certified,
and that's got a lot of risks which you can see,
and the courts don't want to hear those cases because
the truth of our Okay, so we've got a different strategy.
(01:06:26):
I'll explain why the courts don't want to hear those
cases at a minute. But our strategy is to say, look,
we found these algorithms. We're finding them in many, many states,
and they're inherently evidence prima facial evidence of Maldo malfeasance.
They shouldn't be there. So that's the first thing we're
(01:06:49):
saying is we're saying, you know, let's have discovery. We
don't know who put them there, we don't know if
they if they've been used or not. We have suspicions
we want them investigated. So we're asking for discovery now.
When the Ohio State Office of Secretary of State decided
(01:07:11):
in the last two weeks to open up an investigation
into our argument, our claims assertions that the Ohio Board
of Election voter registration roles also have algorithms in it,
and we're finding we're right. We're making that report as
soon as Andrew Piquett gets through his analysis, and he's
working very hard to get that done as quickly as possible.
(01:07:33):
We have found the algorithms that we were looking for,
and we can prove it definitively with the report, I
think is going to be again another shock. But the
point is we're asking for discovery before the event. In
other words, we're not questioning and election that's already happened.
And then the courts, the courts don't want to hear
(01:07:56):
these cases because the courts don't like to deal with
political law, political questions. And the truth is, our election
process for presidential elections since the eighteen hundreds have been
chaotic and we don't follow the rules. So you know,
in the early part of our constitution, whoever got the
(01:08:17):
most votes was president, whoever got the second most votes
was vice president. And you had Thomas Jefferson fighting John
Adams in those years. And these presidential elections were highly
contested and raucous and really knock out, drag out fights.
And that's continued through our history, you know. So in
(01:08:40):
eighteen seventy six, the ruther Herd B. Hayes was against
a guy named Tilman. Tell me, was for the South.
He was one vote short of the electoral college to
be president, and they threw the election into the House
of Representatives, which fought about it for a long for months.
Speaker 3 (01:08:59):
The delegation. They send them to a hotel.
Speaker 2 (01:09:02):
They said, you guys, go to the hotel and eat
all the food, drink all the whiskey, and is there's
less food and less whisky, you'll come to a decision.
So their decision was that Tillman would resign from the race,
but Ruther for b. Hayes would be president. If the
Union Army decided to withdraw the troops from the South
and end reconstruction, which the North agreed to, well that's.
Speaker 3 (01:09:25):
A political agreement.
Speaker 2 (01:09:27):
So our courts are we have these cases and say, well,
the Hava Law demands all these requirements and the states
aren't doing them, so they're not following the Hava Law. Well,
the courts are not going to get into that to
say an election was fraudulent, because again the history is
that the rules were off and not followed, and the
(01:09:48):
courts want to solve politically and truthfully. We've got to
solve it politically.
Speaker 3 (01:09:53):
Truthfully.
Speaker 2 (01:09:53):
I like being able to be in Ohio and get
an official body of investigat in the Secretary of State's
office without going to a court, just simply presenting the evidence.
And the strategy is to go to the people strategy
is to work with Doug and with others here and
continue writing, probably continue traveling the different states to get
(01:10:18):
the word out, doing town hall meetings. God's five Stones
has got videos on it. Share those videos. You can
pass those videos around all over the Internet. A lot
of writing on it. Will do more with the Gateway
Pundit has been covering us, Joe Hoft has been writing stories,
and Jim Hoft covering this. We're working with us. Got
(01:10:39):
interviewed by Joe Hoff last week. That interviews up on
godsfivestones dot com. This is we've got to educate people
to the fact that you can't trust the government and
if the government's going to steal the election, they're going
to steal it for Barack Obama, give him his fourth term.
(01:11:00):
Having the last minute mail in surge where the voting
stops and suddenly the morning Biden's ahead of Trump and
stays there.
Speaker 3 (01:11:11):
I mean, all these suspicious activities. So if the people
are aware.
Speaker 2 (01:11:15):
Of it, and they can see that there's an algorithmic
scheme that our government's gone in or somehow or.
Speaker 3 (01:11:21):
Other the intelligence agencies, which I'm.
Speaker 2 (01:11:23):
Certain if our intelligence agencies are running our elections they're
running our government, they're running our presidents.
Speaker 3 (01:11:31):
We're no longer. This is no longer we the people,
We the CIA.
Speaker 1 (01:11:38):
And you're doing this pro proactively for the most part. Right. Yes,
So again from an investigative point of view, you're going
to the people who make the decisions to certify or
whatever and saying, look, we discovered the elements of a
(01:11:59):
crime or the conspiracy to commit a crime. Don't let
this happen. Is that what you're.
Speaker 2 (01:12:04):
Because, and saying even more fundamentally, take a look with us,
and if we can show it to you there, we
gonna show you the algorithms, we can show you the
number of schemes. We can show you the creation of
false votes and how they can be certified. Don't deny it,
tell the people about it, and let's fix this. I mean, look,
(01:12:27):
the credit card system works, the databases where the credit
card system works. Great, you miss a payment that you
get told right away you missed the payment.
Speaker 3 (01:12:37):
They don't.
Speaker 2 (01:12:38):
I'm saying, why don't we use the credit card databases
for voting, and let's use the voting for credit cards.
Speaker 3 (01:12:45):
I mean, no one would ever pay a credit.
Speaker 2 (01:12:47):
Card you have fifty no limit, and they couldn't find you.
Speaker 1 (01:12:55):
That's one way I like that.
Speaker 3 (01:13:00):
Solve these problems.
Speaker 2 (01:13:02):
But in my lifetime we've gone from a population of
one hundred and fifty million to now three to fifty
million on a way to five hundred million, and it's
inevitable we're going to be, you know, the expansion of
this country's populations in the works. And the I'll constantly
point out in mathematics, a difference in size is the
(01:13:23):
difference in phenomenon. In other words, you can't take a
bumblebee and make it ten times bigger. The critter won't fly.
I won't lift off the ground. Its dynamics don't work
on that scale. You know, the airplane I'm gonna be
flying on later today, it is not made with the
aerodynamics of the right brothers. You know, there's some similarities,
(01:13:43):
but this airplane with the right brothers wouldn't recognize this
airplane that flies today. And it's because the fundamentals change.
And so when we were a nation of villages and
one hundred people voted and you knew everybody, it worked
one way. Today with three fifty million people and you know,
(01:14:04):
a small group controlling these state boards of election and
you know, controlling the rules and being partisan. You don't
know anybody in the you don't trust the machines. There's
so many problems with our voting system. I say, the
old World War two terms. The thing is foo bar.
It's it's so messed up. It's beyond repair. Absolutely, there
(01:14:27):
is no repair to this system. It's got to be
thrown away and fundamentally, news system's got to be conceptualized.
People have to be able to have unique voter IDs
that can't be compromised, and we have to have we
have to have much more full proof ways where the
data is secured, not passed all over the internet. You know,
(01:14:48):
the optics are terrible, The machines don't work. The workers
people are handed ballots that my husband and wife get
a different ballot.
Speaker 1 (01:14:57):
Yep.
Speaker 3 (01:14:58):
You know, people say, well my vote didn't count. What
do you mean to think?
Speaker 2 (01:15:03):
What four un people who voted this pre sam you
only reported eighty one votes out of here?
Speaker 3 (01:15:08):
What the machine didn't work for a while. Well that's inexcusable.
Speaker 1 (01:15:12):
Exactly. Well, doctor Corsi, I'm a simple guy. Well why
can't we or are you in favor of, for example,
one day voting show ID paper ballots, people counting the ballots,
or people well counting the ballots, not machine, but people,
and then overseers of that counting process. Wouldn't that be
(01:15:38):
the answer?
Speaker 3 (01:15:39):
Yes, But there's no simple answer.
Speaker 2 (01:15:41):
I mean, it's gonna be it's gonna be a complex
We're gonna have to take some time and deal with this, okay,
because we're dealing with a very complex, highly technological society
here today, and you know, things do work.
Speaker 3 (01:15:55):
You want to see Major League Baseball and.
Speaker 2 (01:15:57):
Subscribe to the site, We're gonna have a credit card
you're gonna have to have, You're gonna have to know
how to use the passwords.
Speaker 3 (01:16:03):
You're gonna be able to get in there.
Speaker 2 (01:16:04):
Then you can see your games if they're not screened
out because it's a local game. I mean, there's rules,
and the rules are generally followed. It makes it harder
for the criminals to break the rules. And it's going
to have to involve technology. Now, whether it involves the
blockchain or some other methodology, I don't know, but it's
(01:16:26):
it is. It must be possible for us to give
each person a vote that's legitimately theirs, that can't be compromised.
We've got to get the criminals out of the voting.
You know, the criminals ran the casinos for a long time. Yes, okay, Well,
well MGM and the other took took it over and
(01:16:46):
they made it into what it is today because they
made it legitimate. And so therefore a lot of the
maybe not all the criminality, but a lot of the
criminality got taken out of it. And if you find
out that that sporting is rigged or the people are
betting on their own teams, that person is not going
to last in professional sports very long because they can't
tolerate it.
Speaker 3 (01:17:06):
It's got to be honest. So we've got to.
Speaker 2 (01:17:09):
Introduce these same standards of honesty into our voting. Our
voting system is messed up because that's the way politicians
want it, and they both wanted it because they both
think they can cheat and win by cheating. We've got
to eliminate winning by cheating, to eliminate lying.
Speaker 3 (01:17:24):
Now.
Speaker 2 (01:17:24):
I don't know how you get lying out of politics,
but one way is to stop the censorship. And you know,
the one way is to end this war on humanity,
to bring God back into our lives, bring God back
into our families, bring God back into our moral education
of children. I'll stop thinking that sex is about recreation
and you can be any any flavor of sex you
(01:17:46):
decide you want to be that day. You know, it's
a very these are very destructive ideas. But if we
want to make this country work, we can make it work.
We have to decide to do that. That decision has
to be a decision that we're going to say no
to Satan or to send Satan back to Hell with
all of is evil. We're not going to go for
(01:18:07):
all these weird ideas that we're going to convince our
children who don't know anything about haven't even reached puberty yet,
that they want to, you know, fundamentally have operations to
change their sex organs. How insane an idea is that,
you know, these insane ideas that we have to stop
using hydro carbon fuels, Well, you know the whole and
(01:18:29):
I've written books on this that you know, the whole
global warming theory is nonsense in terms of true climate science,
and the world is not warming up because of hydro
carbon fuels. I mean, there's less carbon dioxide in the
atmosphere to day that there was four hundred million years ago.
Speaker 3 (01:18:49):
We've had ice ages in between.
Speaker 2 (01:18:51):
It's all. We've got to quit lying to people. We've
got to get back to educating the children. You can't
just have, you know, an education award so everybody feels good.
Now get you fail. If you don't pass the test.
We don't pass the tests, you don't belong in the school.
I don't care about DEI is.
Speaker 3 (01:19:08):
We're not going to do. We're not going to judge
people based on the color.
Speaker 2 (01:19:10):
We're going to based on what they're capable of doing,
what they want to contribute, what value that they can
produce for themselves and for others. We don't get back
to these values, we've got chaos, and this side wants
chaos because they are destructive.
Speaker 3 (01:19:25):
The Left can only destroy.
Speaker 2 (01:19:27):
The Democratic Party is destroying America intentionally, and in this election.
This election, I think is the test of that because
if they succeed in stealing this election by mail and
voting fraud, shame on us, especially when we know there's algorithms,
that there's crypti code in the databases and we can
prove it. And I'm going to spend the rest of
(01:19:48):
the time between now on the election, but whatever we
have to do to bring the state to state to
state to state and show over and over and over
again that the election systems that are official boards of
elections are using are rigged and you can't have an
election on a stack deck cards.
Speaker 1 (01:20:07):
Right now? How can people best help you? I would
urge everyone to go to your website, godsfivestones dot com,
but to definitely view the evidence, support your work, share
share the videos. By the way, three and a half
(01:20:29):
minutes of you with Dave brad on the war Room
I thought was just a tremendous video interview. There again,
it's on doctor Coursu's website. But how can people best
help you right now? Anything additional or if you.
Speaker 2 (01:20:46):
Want well, I mean, contributions are five dollars, ten dollars.
Speaker 3 (01:20:50):
All of this helps.
Speaker 2 (01:20:52):
If you care about the elections, it's easy to go
to God's five stones dot com and contribute the electronically
through a credit card you can send in a check.
I mean, we need the resources to travel to do
the work, to pay Andrew pa Cat to get the
(01:21:12):
research done, and we have a short window to get
it done. In now we're starting to get we're starting
to get attention because once we begin to demonstrate results,
not just that in New York and New Jersey, we've
got the complete decoding of the algorithms, but we are
now able to prove that they exists in Ohio. Soon
we'll be presenting that evidence to Ohio Secretary of State's
(01:21:35):
office and their inquiry I applying down to Tulsa. It
is the same in Oklahoma today, as we want to
work with the whole idea that mayoral election has not
yet been certified. There's so many problems with it. The
problems just watching twenty twenty, the improprieties were legion. It's
(01:21:58):
like these demons didn't care. They were saying in front
of you, they can pull this crime off. They can
say they get elected brom saying, you get like a
dead guy.
Speaker 3 (01:22:06):
You know, weekend for Bernie and have AI talk to you.
Speaker 2 (01:22:10):
They get elect a dog, they think, so they don't
care that, you know, Kamala Harris and this guy Wall
are the most unattractive candidates I've seen in my lifetime
because they think they'll get elected anyway, because voting doesn't count,
and they think that they can run simulations of elections.
The next thing they'll do is run a simulation of
(01:22:31):
the election to turn out the way they want. They'll
throw away the real votes and tell you their view,
their lie, their meme, their narrative about how you voted,
surging for the left, and they'll take away your freedoms.
They'll take away your freedoms as quickly as they can censorship.
They won't make a talk, and they'll they'll they want
(01:22:52):
to destroy humanity, and this warrant humanity. Since Henry Kissinger
in the nineteen seventies wrote National Security Memorandum, Too, depopulation
has been the official government US policy globally. And if
we think there's too many people, we need to reduce it.
I think there's too much government. We need to eliminate it.
That's the only solution. Set it all to death, valley.
(01:23:14):
Let them have all the soular and when they want.
Speaker 1 (01:23:17):
You, yes. And it's amazing. You've done so much work.
You have the history, you're pointing out the history, and
you're showing right now exactly what is happening with the algorithm.
I think this is perhaps one of the most important issue. Well,
(01:23:40):
the election is the most important of our time, but
the fraud that exists, in particular, what you've discovered and
what you're taking to the various states and counties and
cities and townships or whatever I think is important work
that we have to get done in Folks, please again
(01:24:00):
support not just support doctor Corsi, but make sure you
get the information out to your your relatives, your friends, coworkers,
and everyone who will listen, and especially the people in
charge of the elections. Have them look at this data,
this information, because man, I think you nothing. Yeah, you
don't think you stumbled. I think you identified the the
(01:24:24):
key to how these steals, this steal, the major part
is happening. And I just I thank you for your work.
We've got about four and a half minutes left. Your
last words, my friend, because again, your your effort, your blood,
sweat and tears have been behind this. Your final thoughts
(01:24:48):
on this.
Speaker 2 (01:24:49):
Well, you know, for my entire political career, over the
last twenty years, I've been writing to try to expose
the lies government tells intentionally that we're living in a
Truman show, that the government is creating a false narrative reality,
and they the fundamental idea is is, you know, those
(01:25:10):
are the intelligence agencies of quit believing in God, They
quit believe in the United States. They don't think we're
an exceptional country. They want to destroy this. They want
to create their new new world order or transhumanism. They
want to go to a higher level human being that
you know, perfecting God's in perfect work.
Speaker 3 (01:25:30):
They don't believe in God. This is all this is.
Speaker 2 (01:25:33):
The path is sure a ruin, and the lines they
tell are always the same. They want to have perpetual war,
perpetual disease, perpetual famine, and conflict. We can solve these
problems as human species, or we can live in the
misery they create for us, because they think the more
(01:25:56):
miserable we are, the more we will surrender our freedoms
in order to let the have the power to.
Speaker 3 (01:26:01):
Take the problem away. They are the problem, you know.
Speaker 2 (01:26:05):
John Kennedy wanted to get rid of the nuclear weapons,
so they killed him in the streets of Dallas. Okay,
and John Kennedy knew they were going to kill Hi
in the streets of Dallas. He basically had been warned.
But John Kennedy would not live his life in fear,
and he was determined to if he had lived. The
book is the Final Analysis, because that was the speech
he gave just before he died at American University when
(01:26:28):
he said, reaching out to krush Job. He said, we
all live in the small planet. We all breathed the
same air. We all cherished the lives of our children
and our grandchildren. We all want to die in our
beds at peace. And we you know we are all mortal.
So quit thinking we can be eternal. When we have
transhuman the few of us going to be. Bill Gates
(01:26:50):
can become a computer program and exists in some cyber
space and in the meantime created vaccine that kills millions
of people, and stop this evil. If we do that,
that's at the core, and the core of the evil
is in the lying that satanicas Satan can only lie.
And it's seductive because it tells you you don't need God,
(01:27:13):
you could be better than God. We can't us. You're
gonna die, gon be mortal, gonna be judged. And so
therefore this is a world that has consequences. And if
we don't take responsibility now, as our founding fathers wanted
us to, as Abraham Lincoln warned us so many times,
we'll lose this country by committing suicide, not by foreign
(01:27:33):
tack And we're in the process of national suicide right now,
and I think we should send Satan and his minions
in the Democratic Party right back to Hell where they belong,
because I am not in favor of sexually changing our children,
killing more babies in the womb. Doing everything we can
to stop using hydrocarbon fuels upon which this number of
(01:27:56):
people exist upon in the world. We could have twice
as many people in grown up food in the desert
with hydroponics to feed twice as many people. The greatest,
most scarce human resource is human intelligence. It is not
limited natural resources. This planet is plentiful. We haven't run
(01:28:17):
out of anything yet. We're not going to run out
of things, but we can be convinced to walk down
the world to ruin and give up our freedoms by
people who will lie to us. We're being lied to
massively now about the twenty twenty four election, and I
want to use these algorithms to show you a definitive
proof that someone has meddled with our voter registration files
(01:28:43):
so that these unnamed sources secretly covertly and create false ballots,
false voters that get legitimate state ID numbers, that can
vote at the will of a computer clique by some
criminal A mail in ballot that will be counted because
it's run through the machine with that number. This is
(01:29:04):
criminal activity at the most base level, violating the right
to vote, and it's got to stop.
Speaker 1 (01:29:13):
Folks. The man the website again, Doctor Jerome Corsi again
hat tip to doctor Carla Deetan Graves the website godsfivestones
dot com. I would urge everyone to get behind doctor Corsi,
support the efforts, because if we don't, it's over. And
(01:29:42):
I love how doctor Corsi. The big picture is putting
God back into this country, good versus evil, and acknowledging
that Doctor COURSI thank you so very much. God bless you,
my friend. It's so great to see you, and we'll
have to catch up again very soon