

Major revelations have emerged about the 2020 election. JustTheNews reported that U.S. intelligence agencies have had raw reports, finished intelligence products, and at least one presidential daily briefing.
They all contain knowledge about actual breaches and interference conducted by foreign actors to swing the 2020 election. But we were told the election was the most secure ever.
The intelligence community hid this from the 2020 Trump Administration, various officials, and the American people for years. This Ombudsman letter from Barry Zulauf explains that China was seemingly protected.
Info from China analysts was withheld or dismissed. The words “influence” and “interference” had different meanings regarding China than they did for other countries like Iran and Russia.
Those old reports show they knew Chinese intelligence had obtained voter registration data from multiple states. This is the data with personal ID information, including social security numbers and driver’s licenses. It’s the exact type of voter roll data the DOJ has been asking for.
TGP reported on the “ALBERT Sensor” intrusion detection system a few years ago. It was rapidly deployed in 2017 by DHS into county elections across the country. Did it not work for the 2020 election, or have States hidden voter roll intrusions from their citizens?

Although some reports are still classified, here’s the unclassified redacted April 2020 Cyber Operations Assessment from the National Intelligence Council. Also available is this unclassified “Foreign Threats to the 2020 US Elections” report created in March of 2021.
The Intelligence Community also hid that the Chinese government was manufacturing and importing fake Driver’s Licenses into the United States for election use.
These ID’s were made for Chinese people living among us, in various States. The DL’s were to help them vote for Biden using fake mail-in ballots.
Four months before the election, in July 2020, US Customs and Border Protection seized 19,888 Driver Licenses at O’Hare International Airport.
The barcodes on the Michigan licenses actually worked. Hmm? CBP never disclosed that these ID’s were for an election plot.
An August 2020 intelligence report regarding this matter was recalled by intel agencies. This was around the same time that former FBI Director Chris Wray testified that there were “No known election plots.”
Without a doubt, we now know China can make fake ballots, fake Driver’s Licenses, can access critical voter records, and has thousands of people living here who are willing to help Democrats cheat in our elections.
As reported by TGP, blue States won’t release their voter rolls to the Department of Justice – they scream privacy. But when China took voter data in 2020, Democrats said and did nothing. Did they let this happen?
Around 2011, DHS created its own intrusion detection system called the ALBERT Sensor. It’s part of the larger Einstein System that protects federal agencies from cyber risks.
Albert is a “black box”, an unknown server installed on a County’s election network. It collects traffic on their election network and transmits data to EI-ISAC, a nonprofit in NY. It is supposed to alert jurisdictions to malicious traffic on their networks.

Just 2 weeks before Trump was sworn into 2017 office, DHS Director Jeh Johnson rushed to designate our elections as “critical infrastructure”. It gave DHS some oversight of elections.
They needed a command center, so a collaboration was formed between the nonprofit Center for Internet Security (CIS), the DHS cybersecurity unit CISA, and the Election Infrastructure Government Council (EIS-GCC). All three live off DHS funding. These are also the organizations that censored citizens who were concerned about elections.
To expedite ALBERT Sensor installations, DHS pressured counties amid Russia-related fears. ALBERT’s been called a “black box” because Counties know little about it.
At that time, they were given no dashboard to see activity, no reports, and not even what ALBERT observed. The system is free to the County, but they must sign an agreement that gives CISA access to their network hardware configurations, security settings, and a lot more.
By September 2018, DHS had quadrupled ALBERT deployments. Jeanette Manfra, DHS Assistant Secretary for Cybersecurity, admitted that ALBERT had detected no intrusions in any State for the entire year (2018).
ALBERT doesn’t actually stop an intrusion. It watches it happen and hopes someone takes action before too much damage occurs. Doesn’t this seem odd for cybersecurity?

Several weeks after installing ALBERT, Lincoln County in Washington was hit by a famous ransomware attacker . Neither the system nor the Center for Internet Security (CIS) alerted Lincoln County about the intrusions. Okanogan County, WA, was also hacked and not notified by CIS.
County Commissioners of neighboring Ferry County, with just 7,000 citizens, voted to stop using ALBERT. They canceled their contract and removed the devices.
NPR sprang into action, running attack stories against Ferry County staff. NPR wanted to intimidate anyone else from cancelling ALBERT. Why? What was so important about these mystery servers from DHS that NPR had to pick the staff of a tiny town?
The EI-ISAC monitoring center is run by the Center for Internet Security (CIS). It’s located in a wooded rural area of East Greenbush, NY.
Consequently, it was the New York Times that claimed yesterday Trump was gutting election security. They defended the Cybersecurity and Infrastructure Security Agency and whined that a third of the employees have been pushed out. They didn’t mention CISA was responsible for censoring citizens and possibly allowed election intrusions by China.
You can read our 2022 full report about Albert Sensors here.

The post Did the DHS “ALBERT” Intrusion Detection Systems Fail? China Obtained 2020 Voter Rolls and Made Fake Driver Licenses appeared first on The Gateway Pundit.
