Ex-CIA Whistleblower: “The NSA Audited The 2024 Election, Kamala Harris Won”

Ex-CIA Whistleblower: “The NSA Audited The 2024 Election, Kamala Harris Won”

Math doesn’t lie-people do. A buried NSA‑authorized audit paved the way for this unelected illegitimate regime.

The above article has been getting attention and is being shared on Social Media, so we posted some details about it on this site. Please note that the accuracy and validity of this article has not been verified by this site. This is being posted FYI.

Article link; thiswillhold.substack.com/p/ex-cia-whistleblower-the-nsa-audited

 

Ex-CIA Whistleblower: “The NSA Audited The 2024 Election, Kamala Harris Won”

Math doesn’t lie—people do. A buried NSA‑authorized audit paved the way for this unelected illegitimate regime.

In December 2024, I was personally involved in an NSA‑authorized forensic audit of the 2024 election. Kamala Harris and Tim Walz won—by a wide margin. Trump lost dramatically. There are multiple layers of complexity to this cover‑up, including transnational organized crime syndicates that extend far beyond the United States and our elections. To that point, I work in the human trafficking sector, which intersects with the stolen election(s) and has ties to Trump and Epstein—not to President Biden, Vice President Harris, or Governor Walz, but to the Democrats and other allied interests responsible for burying the audit.”Adam Zarnowski, ex-CIA agent and author of Jörmungandr

In an exclusive interview, former CIA operative Adam Zarnowski laid out pieces of an intricate network of bad actors and covert operations behind transnational organized crime and the stolen 2024 election. Some of his disclosures confirmed long‑held suspicions; others were shocking, exposing connections between organized crime, political operatives, and global power brokers.

Adam’s testimony paints one of the clearest—and most disturbing—pictures yet of how the cover‑up was orchestrated and why it has remained buried. His free book Jörmungandr expounds on this testimony, making these intricate networks impossible to ignore.

He explained that none of his revelations are classified; he has full authorization to speak and is prepared to testify under oath. Having personally assisted the NSA in collecting the data, he stressed that a full forensic hand‑count of the 2024 election—beginning with Representative Victoria Spartz—must be this country’s top priority. The completed NSA audit results have been submitted, yet so far have been met with silence.

That silence isn’t just political inertia—it’s cover for how the 2024 election was subverted. At the center is the machinery itself: illegally copied software, decades of ES&S vulnerabilities, and the installation of a back door through a last‑minute change order right before the election.

ECO 1188: The Unlocked Backdoor

In September 2024, ES&S quietly pushed a change into its certified election software: ECO 1188. Pro V&V rubber‑stamped it. The EAC signed off. This change alone isn’t the whole issue—rather it’s just one piece of a much larger, compromised puzzle that’s been taking shape in plain sight for decades.

On paper, it was filed as a “de minimis” update — a minor tweak that wouldn’t require deep review.
In reality, it moved a critical file (config.ini) from the static hash list to the dynamic hash list inside ES&S’s Electionware software.

For anyone who doesn’t speak vendor-euphemism, here’s what that means:

  • Certified voting software normally has cryptographic hashes — a kind of digital fingerprint — for every file.
  • If even a single character in a protected file changes, the hash doesn’t match, and the system throws an error.
  • ECO 1188 told the software: Don’t check this file anymore.

 

The config.ini file isn’t trivial. It controls how Electionware generates and formats vote totals for reports—the very outputs that are read on election night. By moving it to the “dynamic” list in September 2024, ES&S, Pro V&V and the EAC created a window where reporting behavior could be altered without triggering any security warning within EVS 6.5.0.0, approved for use in July 2024—coming soon to an election booth near you.

If that sounds reckless, it’s because it is. And it’s not as if we weren’t warned. Princeton’s Andrew Appel and Susan Greenhalgh have been sounding the alarm for years that vendor‑controlled hash systems are little more than security theater—especially when vendors can exclude or reclassify files at will. This isn’t their first, second, or even third rodeo—we highly recommend reading their findings in this CITP Blog.

To understand how we reached a point where a president who lost an election can illegally breach voting equipment, maliciously copy the software, and leave that same equipment in service; where tech oligarchs with a vested interest in the election’s outcome can partner with a company that has access to 70% of U.S. voting machines; and where a private vendor with a long, checkered history can slip in last‑minute backdoor access right before a presidential election—we have to rewind, all the way back to the year 2000.

Read the full article at – thiswillhold.substack.com/p/ex-cia-whistleblower-the-nsa-audited