
Reminder that Karen Bass is an actual communist who was trained in a Marxist Brigade by the Castro regime
R.C. Oberlender
5.6K posts

@OberlenderC
Ret. Infantry combat vet. Former Foreign Military Curricula Developer, Anti-Terrorism Analyst. Military Training Consultant. Former Medina County TX GOP Chair.

Reminder that Karen Bass is an actual communist who was trained in a Marxist Brigade by the Castro regime


🙏🫡 🇺🇸🇺🇸🇺🇸 NEVER FORGET! 🇺🇸🇺🇸🇺🇸 🫡🙏

This is what an invasion looks like







Texas voter IDs are integers. Whole numbers. No decimals, ever. The Bexar County primary poll book contained 4,110 IDs like this: 1,253,115,467.79993 That alone proves something fishy. But the math goes further — and it’s airtight. When those 4,110 records are sorted in order, the spacing between every consecutive pair is 22,084.82189 — the same non-integer value, repeating 4,109 times. That uniformity is already impossible by accident. Then: 90,746,533.16339 ÷ 22,084.82189 = 4,109.0000 The total span of the sequence, divided by the gap, returns a perfect integer with zero remainder. A randomly generated or accidentally corrupted sequence cannot do that. Only deliberate computation produces that result. Every one of these fractional IDs was created after polls closed — and we can prove it from the IDs themselves. The gap value of 22,084.82189 was derived from the alphabetical positions of specific voters within the completed check-in list. Those positions cannot be known until every voter has checked in and the full list is in hand. The fractional IDs could not have existed before the genuine list existed. They are timestamped by their own construction. The records were not random fabrications. Each was anchored to a real registered voter. 735 real people each had 5 or 6 synthetic duplicates generated in their name — up to 4,110 fraudulent ballot opportunities in a single county primary, executed by someone with back-end write access to the poll book system. The attack vector was an internet-accessible poll book platform reachable from anywhere in the world with a valid username and password. No VPN. No hardware credential. No cryptographic verification on the export that produces the official check-in record. The post-election export workflow contains no hash check and no independent audit mechanism. Anyone with valid credentials could alter the official record for any participating jurisdiction remotely, at any time. That access was used. The fractional ID components functioned as a precise machine-executable deletion key — invisible to poll workers under normal display settings, but recoverable by a single database query after the fact. The injection itself broke the chain of custody. The file was then replaced before formal examination could occur, compounding an evidentiary void that was already irreversible. Officials attributed the anomalies to an export error or electronic glitch. Neither explanation survives contact with the data. A glitch does not solve a two-equation integer system, sort 735 voters alphabetically, derive sequence endpoints from algebraic positions within that sort, and optimize its output for numerical elegance. Glitches do not have specifications. This one did. The fraud in this election is proven. The scale of its impact cannot be determined from any currently available record. An election whose outcome cannot be separated from an unknown quantity of fraudulent ballots cannot be legally certified The same platform operates across 29 states. The Bexar County file was caught only because it was captured during the active window before deletion. A more careful cleanup leaves nothing. The absence of detected anomalies in other jurisdictions is not evidence of integrity — it is evidence that no one was looking at the right moment. This is not a software reliability problem. Unreliable software fails randomly. This algorithm solved a two-equation integer system, sorted 735 names alphabetically, derived its sequence endpoints from algebraic positions within that sort, and deliberately discarded six real voter records in order to produce output whose internal quantities share a common factor of 15. That is a specification. Glitches do not optimize for numerical elegance. The conclusion is the same whether you approach it from this specific case or from my multi-state database analysis published in the Journal of Information Warfare earlier this week: electronic poll book and voter registration systems built on internet-accessible architectures with no cryptographic audit trail cannot be trusted. Not this platform. Not any platform built on the same design. Partial fixes and software patches do not solve the problem when the attack surface is the architecture itself. The only remedy that eliminates rather than mitigates the risk is full replacement — paper poll books, hand counts conducted publicly at the precinct, results posted before anything leaves the building. A paper system cannot be altered from a laptop at 11pm by someone with a stolen password. Peer-reviewed multi-state analysis: Journal of Information Warfare, 2026, 25.2 If you are in one of the 29 states, this concerns you.







We have lost our almost non existent will to fight.

The recent revelations about the Southern Poverty Law Center add to the decade of Big Lies we have all been fed, and which we later uncovered the truth about because Donald Trump is President. The challenge is to stay outraged amidst a deluge of Big Lies while not becoming victims of paranoia. Clear-headedness wins. My article below explains.