reSee.it - Related Post Feed

Saved - August 29, 2023 at 11:08 AM
reSee.it AI Summary
Title: Ensuring Secure and Auditable Elections in the United States Introduction: The vulnerability of the US voting systems to hacking and manipulation has become a growing concern. Outdated software, lack of security measures, and paperless machines have exposed significant flaws in the system. This post aims to shed light on the various vulnerabilities and emphasize the urgent need for secure and auditable elections. Outdated Software and Lack of Security Measures: Experts have raised concerns about the outdated software and lack of security measures in US election systems. Outdated systems, such as the 15-year-old Windows version, are prone to crashes and lack essential security features. This leaves them vulnerable to cyberattacks and manipulation. Paperless Machines and Lack of Auditing: One of the major vulnerabilities lies in the use of paperless voting machines. These machines lack a physical backup, making it difficult to verify the accuracy of the results. Additionally, the absence of post-election audits further exacerbates the problem, as it becomes challenging to detect any potential manipulation. Remote Access and Misconfigured Servers: Reports have revealed that some election systems, including those of Dominion Voting Systems and ESS, had modems and remote-access software during the 2020 election. This makes them susceptible to hackers and compromises the integrity of the voting process. Furthermore, misconfigured servers, like the one in Georgia's Center for Election Systems, have exposed sensitive data, highlighting the need for improved security practices. Flaws in Voting Machines: Security researchers have demonstrated the flaws in voting machines, including their vulnerability to hacking and manipulation. Hackers have been able to access administrator mode, potentially altering voting data. Unencrypted voting data and improper configuration have further contributed to the crisis of election security. The Importance of Handmarked Paper Ballots and Auditing: To ensure the integrity of elections, experts recommend the use of handmarked paper ballots and robust post-election audits. Handmarked paper ballots provide a physical backup that can be verified, reducing the risk of manipulation. Auditing plays a crucial role in detecting any potential irregularities and maintaining transparency in the electoral process. Addressing the Vulnerabilities: It is imperative for the US to address these vulnerabilities and safeguard its democratic process. Enhancing network defenses, updating software, conducting risk-limiting audits, and protecting infrastructure are essential steps in ensuring secure elections. Additionally, transparency and improved security practices from election equipment vendors are crucial for building trust in the system. Conclusion: The vulnerability of US voting systems to hacking and manipulation poses a significant risk to the integrity of elections. Outdated software, paperless machines, and lack of auditing contribute to these vulnerabilities. By adopting handmarked paper ballots, conducting robust post-election audits, and implementing improved cybersecurity measures, the US can enhance the security and transparency of its electoral process. Safeguarding the integrity of elections is of utmost importance to protect the democratic values of the nation.

@KanekoaTheGreat - KanekoaTheGreat

🚨BREAKING: Explosive video surfaces of FOX News stars Tucker Carlson, Laura Ingraham, and Sean Hannity slamming Trump's "insane" voting machine fraud allegations as "absurd," "ridiculous," and "complete BS"!

Video Transcript AI Summary
Virginia has stopped using touchscreen computer voting due to vulnerabilities, and there is concern about the security of all voting machines. Researchers have shown that voting systems can be tampered with, and hackers with limited resources can breach machines in minutes. Instances of electronic voting machines deleting or switching votes have been reported. The biggest seller of voting machines has violated cybersecurity principles by installing remote access software, making the machines susceptible to hacking. Three companies control the majority of voting machines in the US. Many states have outdated and vulnerable machines, and unsupported software increases the risk of cyber attacks. The use of modems in voting machines also poses a security threat. The lack of paper trails and audit trails further compromises the integrity of elections.
Full Transcript
Speaker 0: Virginia just stopped using touchscreen computer voting because it's so vulnerable. We need to look at all the voting machines. Every secretary of state needs to be, you know, assisted in making sure that they are not being, hacked and and attacked. Speaker 1: I continue to think that our voting machines are too vulnerable. Speaker 2: Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering. Speaker 3: Even hackers with limited prior knowledge, Tools and resources are able to breach voting machines in a matter of minutes. Speaker 4: In 2018, electronic voting machines in Georgia and Texas deleted votes for certain candidates or switch votes from 1 candidate to another. Speaker 2: The biggest seller of voting machines is doing something that violates Cybersecurity 101 directing that you install remote access software which would make a machine like that, you know, a magnet for fraudsters and hackers. These voting machines Can be hacked quite easily. Speaker 5: You could easily hack into them. It makes it seem like all these states are doing Different things, but in fact, 3 companies are controlling this. Speaker 0: It is the individual voting machines that some pose that pose some of the greatest risk. Speaker 6: There are a lot of states that are dealing with antiquated machines, right, which are vulnerable to being hacked. Speaker 7: Workers were able to easily We hacked into an electronic voting machine. Speaker 2: It was possible to switch votes. 43% of American voters use voting machines That researchers have found have serious security flaws, including backdoors. Speaker 8: We know how vulnerable now our systems were. We know, I know the Hackathon that took place last year, where virtually every machine was broken into fairly quickly. Speaker 5: I actually held a demonstration for my colleagues here at the Capitol, where we brought in, folks who before our eyes hacked election machines. Those that are not those that are being used in many states. Speaker 3: Aging systems also frequently rely on unsupported software Like Windows XP in 2000, which may not receive regular security patches and are thus more vulnerable to the latest methods of cyber attack. Speaker 7: In a close presidential election, they just need to hack 1 swing state or maybe 1 or 2 or maybe just a few counties in one I'm Speaker 9: very concerned that you could have a hack that finally went through. You have 21 states that were hacked into. They didn't find out about it for a year. Right now, we have over a dozen dozen states that either don't have any backup paper ballots or only have them partially. You think that our adversaries don't know what those states are? Of course, they know what those states are. And if we have a close election In the general election, in a presidential race, and one state's out withstanding and their ballot boxes gets hacked into, their elections get hacked into, We will have absolutely no backup. Speaker 8: I know America's voting machines are vulnerable because my colleagues and I have hacked them repeatedly. We've created attacks that can spread from machine to machine like a computer virus and silently change election outcomes. And in every single case, we've found ways for attackers to sabotage machines and to steal votes. Across the country, there are about 50 Two different models of machines. They fall into essentially 2 styles, ones that scan a piece of paper or ones where the vote, the voter just interacts with the touch screen and many of them have been analyzed now by researchers Looking for security vulnerabilities. In every single case where a US voting Machine has been analyzed by by competent security researchers. They have found vulnerabilities that would let someone inject malicious software And change election data every single case. Speaker 10: The better or the more efficient way of hacking machines would be to subvert them all through the machine that's used to actually Program those machines. So prior to each election, the county election office or the voting machine vendor will actually program memory cards For that election, it tells the machine who are the candidates, what are the, you know, the contests being decided, and that gets inserted Into the voting machine. If you can alter, if you can subvert that machine that is used to program those memory cards, then you can pass, rogue software to the voting machines. Speaker 8: Voting Chains are not connected to the internet. This is something that you hear all the time in the US from election officials. Unfortunately, it's not actually true. In many new voting machines Come with, 4 gs wireless modems so that they can be connected to the internet from the polling place in order to upload the results faster. Now to me that sounds crazy. Why would you want to put your voting machines on the internet right in the middle of the election potentially at the most vulnerable time? Speaker 11: Studies conducted in 2007 by the state of California, state of Ohio, state of Florida found security vulnerabilities that could take advantage of these To engineer viruses where 1 compromised voting machine could then infect eventually the entire fleet of machines for an entire county. Typically at the end of the election day you move a memory card through each of the machines in the precinct and that's to collect the vote totals. That process can spread a virus. And there are other processes. The details vary from machine to machine. Speaker 2: When you say hacked, what were they able to do once they gained access to the machines? Speaker 1: All sorts of things. They could manipulate the outcome Of the vote, they could manipulate the tally, they could delete the tally, and and they could compromise the vote in any number of ways. Speaker 12: The machines used in Georgia Have been demonstrated to be hackable through a virus that's carried on ballot definition cartridges. Very much like this Duxnet virus was, Inserted into, nuclear centrifuges in Iran. Speaker 1: There are a number of states that outsource their reporting of elections to third parties, some of which are corporations based in other countries Trees like Spain. So you've got to trust that the aggregation of the votes and the reporting of the votes is is, is accurate as well. Speaker 8: I'm Pretty sure my undergrad computer security class at Michigan could have changed the outcome of the 2016 Michigan election if we wanted to. It is that bad. And we have a combination of very powerful adversaries and unfortunately quite vulnerable and obsolete systems. That's that's why I say it's only a matter of time. Speaker 13: Unfortunately, in a lot of these systems, the audit trails are just as vulnerable as the other aspects of the system. So there may not be Good forensic evidence of a successful, intrusion. With the current design, we cannot be universally confident that it hasn't happened. And it's probably only a matter of time before it will. Speaker 3: In at least 40 states, elections are carried out using machines They're at least a decade old. And like any technology, they're susceptible to increasing failure with age. Some state officials Have had to turn to eBay to find critical components like dot matrix printers, decades old storage devices and analog modems. Aging systems also frequently rely on unsupported software like Windows XP in 2000, which may not receive regular security patches And are thus more vulnerable to the latest methods of cyber attack. Speaker 4: In 2016, state election websites in Illinois and Arizona were hacked by intruders who installed malware and downloaded sensitive voter information. Speaker 6: It is worth fighting for integrity in our election system, which means that they are free From interference by a hostile or an unfriendly nation. Let's put the resources into upgrading the state's election systems. Because what we know is this. There are a lot of states that are dealing with antiquated machines, right, which are vulnerable to being hacked. Speaker 5: I sit on the Senate Intelligence Committee and Senate Homeland Security Committee and we receive all kinds of information about the vulnerabilities to our national We are vulnerable in terms of foreign interference with our elections. It's my understanding that some of the election system vendors have Acquired states to sign agreements, that prevent or inhibit independent security testing. There's a saying that I'm sure many of you have heard, which is the Do you know the difference between being hacked and not being hacked? Is knowing you've been hacked. Speaker 0: And they are still looking for ways to steal information about voter registration, for example. There are some tech experts in Silicon Valley Valley with whom I have met who say that, you know, maybe what they'll do this Next time is to really disrupt the actual election. Shut down the servers that you send results to. Interfere with the operation of voting machines because still too many of them are linked to the Internet. So there we are still very vulnerable. Speaker 14: I mean, I can tell you in Virginia, when I was governor, I had to replace all the machines. Because I remember when I first voted, when I went to Richmond, moved down as governor, I remember I kept voting in the senate race, kept voting for the democrat, republican name kept coming up. Three times that happened. Speaker 15: What do you mean kept coming up? Speaker 14: So I you know, we had the touch screens. I was voting for Mark Warner, our senator, and Ed Goswami's name would light up. Happened to me 3 times. Finally, the 4th time, Mark Damon, I quickly hit vote and I got out of there. You know, all the cameras are looking at me like this guy doesn't know how to vote. I mean, what's going on? So then I had an investigation done and listen to this. I brought in some technology experts. They were able to hack into our machines from off-site in about 5 or 6 minutes. And within 4 minutes, they were able to change a vote. IDD certified all the machines. Now in Virginia, we have paper ballots. Speaker 2: 43% Of American voters use voting machines that researchers have found have serious security flaws, Including backdoors. These companies are accountable to no one. They won't answer basic Questions about their cybersecurity practices and the biggest companies won't answer any questions at all. 5 states have no paper trail, and that means there is no way to prove the numbers The voting machines put out are legitimate. So much for cybersecurity One zero one. The vast majority of 10,000 election jurisdictions nationwide Use election management systems that run on old software that is soon gonna be out of date And write for exploitation by hackers according to an exhaustive analysis By Speaker 0: the Associated Speaker 2: Press, Pennsylvania, Wisconsin, Michigan, Florida, Iowa, Indiana, Arizona, and North Carolina, among others, are all at risk. Even the state of Georgia, which just passed legislation to buy new voting machines, is on track To buy equipment that suffers from this significant cybersecurity weakness. Let's say the election Is decided by a small percentage. And people in America Don't think that the election was fair. The effect that would have on our 200 year Experiment in self governance. Our democratic system would take a real hit. Our elections weren't secure last week, and they sure as heck aren't secure this week. And anybody who says otherwise is either selling the voting machines or simply has a malicious Intent towards our elections. At one point in the Intelligence Committee, Both sides seem to agree that no votes were changed in the 2016 election. And I said, the experts I talk to say that until you have a Forensic analysis of a vote until you go in there and scrub the whole system. You can't really say that. Speaker 16: These machines don't have a capability of providing you forensic evidence To see if they cannot prove they were honest, they cannot prove that they were have been hacked. They simply don't have the Fundamental basic capabilities of providing you that forensic evidence, that data. Only way you can see That, that machine was hacked. If the attacker wanted to be, they found that it was hacked. That's a sad truth. So anyone who says, I have information one way or another. That's an opinion. That's not tactics. Practice, it can be done without leaving trace. When you know how the systems work, Looking for the evidence, you know that you won't find it because the systems are not recording, generating, Preserving or protecting meaningful forensic evidence. And this is from the very beginning to the end of the process everywhere. These systems really don't have a capability of recording and protecting any meaningful audit information or forensically important information. So a lot of times I would also argue that even if you try to take a look into the evidence, the problem is that there is no Speaker 17: We've heard a lot from voting machine vendors and election officials that voting machines Can't be hacked because they're not connected to the internet. All of those vulnerabilities that Andrew talked about, are not a problem because no one can access the machines And it turns out that that message that they've been giving us for years and particularly after the 2016 election Just isn't true. Voting machine vendors have sold election officials on these in use of modems. In some case, the modems are embedded inside the voting machines. In other case, they're external modems that get attached to the voting machine at the end of the election. So at the end of the election, the machine goes Into shutdown mode and then this option pops up about modoming results. And so the system will automatically then dial in and send these votes over a cellular modem to a server on the Internet that collects the results. So everyone will tell you and they've told me every time I've spoken with them that cellular modems are not really internet connectivity. They will say, That doesn't mean that the machine is connected to the internet. It's using a cellular modem. Well, that's not true and Election Systems and Software, which is The top voting machine maker in the country, this is one of their statements over and over again with the public but this is one of their own diagrams that they They gave to Rhode Island in 2015. And if you see that circular part in the center there showing that that modem transmission using the wireless modem, They sit there, right there. It's on their own diagram that is going over the internet. Speaker 8: Before every election, election officials have to program the voting machines With who's on the ballot and what are the rules for counting? Well, they make that election programming on a PC workstation somewhere either at the, at the jurisdiction or at an outside vendor that does it for them. If an attacker can break into that work Station which is called an election management system. They can spread malicious code to all of the memory cards used to program all of the voting machines in the jurisdiction And those election management system workstations sometimes are connected to the internet or the data that's programmed into them passes Through an internet connected system. So we're just 1 or 2 hops away from an online attacker. So if I wanted to break into this company, let's say I was the attacker, I'd Probably start by forging an email from, let's say, Larry, the president here, to Sue, his administrative assistant, Asking her to urgently open an attachment. Now, of course, when she does, that attachment has my malware in it. I have a, foothold into their network And I can try to spread from there to the election management system and to the voting machines in most of the state. Pampering with the national election result in my country It's easier than well easier than even I thought in 2016. I keep learning things that convince me that the situation is scarier than, than even Fertz had thought, You identify the states that are most weakly protected and going to be close. Target the computers that are going to program voting machines there, spread malware to machines to change a fraction of the votes And then rely on the fact that most states even if they have a paper record are not going to rigorously use it to check that the computers are right. But the fact is that in close national contests in the US, the result really only hinges on the result in a small number of States. You've heard about the swing states in any given election. The ones that are, really competitive. In such a situation an attacker can, before the election, identify which states are likely to be close. Try probing all of them In the way that the Russians did the voter registration systems in 2016 and just find the weakest swing states and attack there. So in this way, the American system converts, diversity of implementation Into basically this patchwork of strength and weakness that gives attackers a menu of possible places to strike. It makes us weaker in close elections. Speaker 18: Modems in voting machines are a bad idea. Those modems are network connections. And that leaves them vulnerable to hacking by anybody who can connect To that network. Speaker 19: ES and S insists while there are 14,000 of its modems in use, there are firewalls separating those modems from the public Internet. Speaker 18: Once the hackers starts talking to the voting machine through the modem, they can hack the software in the voting machine And make it cheat in future elections. Speaker 20: What is the vehicle for the transmission from the ICP? Is it cellular modem versus VPN? Speaker 15: Well, it is a cellular modem that Speaker 8: the can be configured in a VPN. Right? And we currently in Chicago and Cook County, we work with Verizon to, Secure that network. What wireless chipset slash modem does the hardware have? We support a variety. So, it's really up to the jurisdictions what technology they wanna use, what's compatible with their with their networks. Speaker 15: Currently, in some jurisdictions, we're using, basically, a modem that is a three d modem, GSM, but we can support multiple Variety support and protection. Speaker 8: Including including latest four gs standards. Speaker 20: So the answers to the next question is the three gs or four gs. Verizon 8 tier Do you're Sprint consuming all? Speaker 16: Oh, yeah. All all networks. Right. Speaker 8: Discuss quite a bit. Yeah. I mean, we actually transmit from the ICP in Mongolia as well. So, we're not committed in networks. Speaker 15: And in Puerto Rico, there's 3 vendors because the island is not covered by any by any of the vendors With this, we use 3 different cellular vendors for some ICPs. With this vendor, Claro, ATMC, and T Mobile, I might say, in the different parts Speaker 16: More modern voting machines, they actually have a mobile phone modem. In to speak, they have a they have mobile phone our mobile phone connectivity to county headquarters, they are sending the results. Speaker 1: Some jurisdictions are relying on uploading election To results using cellular modems or, the Internet that of course introduces another point of vulnerability, not just to the data that's flowing, But also it's the software, the devices that, that are being connected. Speaker 10: Many of these voting machines have modems embedded into them. And the modems are to transmit the vote totals on election night to the county, elections office. So these modems contact, they're cellular modems and they Contact the cellular network, to contact the cell tower. So the cell tower traffic these days in our modern times actually goes through Internet. It goes through the same Kinds of routers and switches not the regular internet traffic comes to but also, in between that cell tower and that voting machine, an intruder Can, intercept data going to the cell tower and intercept that that communication, that phone call. If you can trick a voting machine into, contacting In your device your fake cellular tower instead of a legitimate tower you can actually use that connection to get back into the voting machine and get back into the tabulator, and then alter votes and software. Speaker 8: So just to review, you look at the polls before the election and figure out which states were likely to be close. Probe all of them. Find the ones with the weakest protection. Then hack into the, election management systems there or at the outside vendors the states use. Once you hack into the election management system, can spread malicious code to individual voting machines and have your code say swap 10% of the votes in the places you infected.

@KanekoaTheGreat - KanekoaTheGreat

#2 All electronic voting equipment can easily be hacked because all such equipment must receive programming before each election from memory cards prepared on election management systems which are computers often connected to the internet running out-of-date versions of Windows. If a county election management system is infected with malware, the malware can spread from that system to the USB drives, which then would transfer it to all the voting machines, scanners, and ballot-marking devices in the county. Most U.S. election systems are programmed by local county election officials or third-party vendors, who plug previously-used USB drives into computers connected to the internet before plugging those same USB drives into the optical scanners, tabulators, and voting machines that collect, count, and determine election results.

Video Transcript AI Summary
Before every election, voting machines need to be programmed with the ballot design and candidate names. This is done by inserting a memory card into the machine. If an attacker infects the memory card with malicious code, it can change the programming on the voting machine and manipulate the election results. The programming is done on a desktop PC or workstation, often connected to the internet. In Michigan, during the 2016 election, 75% of counties outsourced their pre-election programming to three small companies. These companies had weak security measures, making it relatively easy to hack into their systems. By targeting vulnerable states and hacking into their election management systems, attackers can spread malicious code to individual voting machines and manipulate the votes. Even if there are paper records, they are often not thoroughly checked.
Full Transcript
Speaker 0: The way these attacks work is that before every election, every voting machine needs to be programmed with the design of the ballot, the names of the races and candidates. And voting officials do that by inserting a memory card into the machine. If an attacker can infect that memory card with malicious code, Well, when the memory card is inserted into the machine, it can change the programming running on the voting machine and cause the voting machine to, at the end of the election, output whatever results the attacker wants. That ballot programming is created on basically a desktop PC, a workstation somewhere operated by the county or by an outside vendor. If an attacker can infect that election programming workstation called an election management system, and in many cases these are connected to the Internet. Well, then that attack can spread to all of the memory cards that are used to program a voting machines in that jurisdiction. And, Sorry. How easy would it be to hack into one of these? Well, I'll give you an example. In Michigan, during the 2016 election, 75% of counties outsource their pre election programming to just 3 small companies. This is the website for one of them. It's a small business that's operated essentially in a strip mall. And they have photographs on their website of all of their facilities, even all of their employees. If I wanted to try to hack into these guys, well maybe I go to their Who We Are page, Find Larry, the president's assistant, Sue, and spoof an email to her that appears to be coming from Larry, telling her to urgently open this attachment. Of course, the attachment contains a virus on route. And once she opens it, I'm in their systems. So, in fact, it's not nearly as hard as it might seem to target voting machines over a wide scale and to potentially hack into them even from the Internet. So just to review, you look at the polls before the election and figure out which states were likely to be close, probe all of them, find the ones with the weakest protection. Then hack into the election management systems there or at the outside vendors the states use. Once you hack into the election management system, you can spread malicious code the individual voting machines and have your code say swap 10% of the votes in the places you infected. Then even if the votes are also recorded on a piece of paper, you don't have to worry. Because in most of those states, they're going to just pluss the paper out without looking at

@KanekoaTheGreat - KanekoaTheGreat

#3 In 2019, the Associated Press reported that the vast majority of 10,000 election jurisdictions nationwide, including numerous swing states, were still using Windows 7 or older operating systems to produce ballots, program voting machines, count votes, and report results. Windows 7 officially reached its “end of life” on Jan. 14, 2020, meaning Microsoft stopped providing technical assistance or producing “patches” to address software vulnerabilities. https://apnews.com/article/operating-systems-ap-top-news-voting-voting-machines-pennsylvania-e5e070c31f3c497fa9e6875f426ccde1

AP Exclusive: New election systems use vulnerable software WASHINGTON (AP) — Pennsylvania's message was clear: The state was taking a big step to keep its elections from being hacked in 2020. apnews.com

@KanekoaTheGreat - KanekoaTheGreat

#4 Furthermore, not only are U.S. elections being programmed on computers running out-of-date software, but voting machine manufacturers have also installed remote-access software and wireless modems connecting voting machines directly to the internet. NBC News reported ten months before the 2020 election that ES&S, the largest U.S. election machine vendor, had installed at least 14,000 modems to connect their voting machines to the internet, even though many election security experts had previously warned that voting machines with modems were vulnerable to hackers. https://nbcnews.com/politics/elections/online-vulnerable-experts-find-nearly-three-dozen-u-s-voting-n1112436

Video Transcript AI Summary
Modems in voting machines are vulnerable to hacking as they are network connections. ES and S claims that their modems are separated from the public internet by firewalls. However, once a hacker gains access through the modem, they can manipulate the voting machine software to cheat in future elections. Some jurisdictions use cellular modems or the internet to upload election results, introducing additional vulnerabilities. Voting machines with embedded modems transmit vote totals to the county elections office via cellular networks, which pass through routers and switches used for regular internet traffic. An intruder can intercept data between the cell tower and the voting machine, altering votes and software. Despite claims that voting machines are not connected to the internet, many have 4G wireless modems for faster result uploads, raising concerns about their security during elections.
Full Transcript
Speaker 0: Modems in voting machines are a bad idea. Those modems are network connections, and that leaves them vulnerable to hacking by anybody who can connect to that network. Speaker 1: ES and S insists insists while there are 14,000 of its modems in use, there are firewalls separating those modems from the public Internet. Speaker 0: Once a hacker Starts talking to the voting machine through the modem. They can hack the software in the voting machine and make it cheat in future elections. Speaker 2: What is the vehicle for the Transmission from the ICP is a cellular modem versus VPN? Well, it is a cellular modem that the can be configured in a VPN. Right. And we currently in Chicago and Cook County, we work with Verizon to, secure that network. Speaker 3: More modern voting machines, they we have a mobile phone modem in to speak. They have a they have a mobile phone or mobile phone connectivity to county headquarters. They are sending the results. Speaker 2: Some jurisdictions are relying on uploading election results using cellular modems or, the Internet. That, of course, introduces another Point of vulnerability not just to the data that's flowing, but also to the software, the devices that, that are being connected. Speaker 4: Many of these voting machines have modems embedded into them. And the modems are used at the end of the election to transmit the vote totals on election night to the county, elections office. So these modems contact the cellular modems and they contact the cellular network, they contact the cell tower. So the cell tower traffic these days in our modern times actually goes through Internet. It goes through the kinds of routers and switches that the regular internet traffic goes to. But also, in between that scroll tower and that loading machine, an intruder can, intercept data they're going to the cell tower and intercepts that that communication, that phone call. If you can trick a voting machine into, contacting your device, your fake cellular tower. Instead of a legitimate tower, you can actually use that connection to get back into the voting machine and get back into the tabulator, and then alter votes and software. Speaker 2: Voting machines are not connected to the Internet. Is something that you hear all the time in the US from election officials. Unfortunately, it's not actually true. Many new voting machines come with, 4 gs wireless modems so that they can be connect it to the internet from the polling place in order to upload the results faster. Now to me that sounds crazy. Why would you want to put your voting machines on the internet right in the middle of the election potentially at the most vulnerable time?
Experts find more than 30 U.S. voting systems connected to internet Election officials have claimed that voting machines do not connect to the internet, but a team of experts found several U.S. voting systems currently online. nbcnews.com

@KanekoaTheGreat - KanekoaTheGreat

#5 Dominion Voting Systems, the second-largest U.S. election machine vendor, which has given public presentations acknowledging their use of modems in their voting machines, was also discovered to be running remote-access software during the 2020 election: In Georgia, 20-year election worker, Susan Voyles, testified that Dominion Voting Systems employees “operated remotely” on her ballot-marking devices and poll pads after the team experienced some technical problems with their machines. In Wisconsin, the Office of Special Counsel (OSC), headed by former state Supreme Court Justice Michael Gableman, also found that Dominion and ES&S voting machines were online and connected to the internet. In Michigan, attorney and Secretary of State candidate Matt Deperno, discovered a Telit LE910-SV1 modem chip embedded in the motherboard of an ES&S DS200 voting machine. Through these modems, hackers could theoretically intercept results as they’re transmitted on election night — or, worse, use the modem connections to reach back into voting machines or the election management systems to install malware, change software, or alter official results. Therefore, not only are hackers able to penetrate elections through vulnerable USB cards and election management systems but also through the very voting machines themselves.

Video Transcript AI Summary
The speaker discusses the vehicle for transmission from the ICP, mentioning that it is a cellular modem that can be configured in a VPN. They state that in Chicago and Cook County, they work with Verizon to secure the network. The hardware supports various wireless chipsets/modems based on the jurisdictions' preferences and network compatibility. They mention using a 3G modem in some jurisdictions but can also support multiple modem varieties, including the latest 4G standards. The speaker confirms that they transmit from the ICP in Mongolia as well, not being limited to specific networks. In Puerto Rico, they use three different cellular vendors (Claro, AT&T, and T-Mobile) to cover different parts of the island.
Full Transcript
Speaker 0: What is the vehicle for the transmission from the ICP? Is it cellular modem versus VPN? Speaker 1: Well, it is a cellular modem that can be configured in a VPN, right. And we currently in Chicago and Cook County, we work with Verizon to secure that network. What wireless chipsetmodem Speaker 0: Does the hardware Speaker 1: have? We support a variety. So it's really up to the jurisdictions, what technology they want to use, what's compatible with their networks. Speaker 0: Currently, in some jurisdictions, we're using Basically a modem that is a three d modem GSM, but we can support multiple varieties of modem that can be. Including latest 4 gs standards as well. So that answers the next question, is it 3 gs or 4 gs? Verizon 8 tier Routes to your Sprint, I'm assuming Speaker 1: all? Yes, all networks. Just going to point it back. Yes, I mean we actually transmit from the ICP in Mongolia as well. So we're not limited in networks. Speaker 0: And in Puerto Rico, there is 3 vendors because the island is not Covered by any, by any of the vendors completely. So we use 3 different cellular vendors for some Oh, my g c. It's meant for Claro AT and T, m t mobile, I might think, in the different parts of the app.

@KanekoaTheGreat - KanekoaTheGreat

#6 This isn’t a problem exclusive to elections — all computers are hackable — and that is why election security experts have always recommended the use of hand-marked paper ballots and rigorous post-election audits. This also isn’t a partisan issue; both Democrats and Republicans are well aware of the secrecy, privatization, and hackable hardware and software that runs America’s elections. After the 2016 election, Clinton supporters and the corporate media would spend the next four years talking about how compromised America’s computerized voting system was. Sen. Ron Wyden, Sen. Amy Klobuchar, and Sen. Kamala Harris held numerous congressional hearings where they explained how easy it was to hack voting machines, how simple it was to locate unattended voting machines, and how numerous voting machines were connected to the internet. After the 2020 election, Trump supporters were censored and de-platformed (I was banned from Twitter) for pointing out the very same anomalies and vulnerabilities that Democrats and the corporate media had spent the last four years discussing. Regardless of politics, these problems are very real, they still exist today, and they are best explained by the computer scientists who have spent the last two decades researching them.

Video Transcript AI Summary
Voting machines have been proven to be vulnerable to tampering and hacking. Even with limited knowledge and resources, hackers can breach these machines within minutes. In 2018, electronic voting machines in Georgia and Texas deleted or switched votes. The biggest seller of voting machines violates basic cybersecurity principles by installing remote access software, making them attractive to fraudsters and hackers. Three companies control the majority of voting machines, posing significant risks. Many states still use outdated and hackable machines. Researchers have found serious security flaws in 43% of American voting machines. Aging systems rely on unsupported software, making them more vulnerable to cyber attacks. A hack in just one swing state or a few counties could impact a close presidential election. Concerns about the possibility of a successful hack are high.
Full Transcript
Speaker 0: I continue to think that our voting machines are too vulnerable. For researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering. Speaker 1: Even hackers with limited prior knowledge, tools and resources are able to breach voting machines in a matter for a minute. Speaker 2: In 2018, electronic voting machines in Georgia and Texas deleted votes for certain candidates or switched votes from 1 candidate to another. Speaker 0: The biggest seller of voting machines is doing something that violates cyber security 101, directing that you install remote access software which would make a machine like that, you know, a magnet for fraudsters and hackers. Speaker 3: These voting machines can be hacked quite easily. Speaker 0: You Speaker 4: could easily Hack into them. It makes it seem like all these states are doing different things, but in fact, 3 companies are controlling this. It is the individual voting machines That some pose that pose some of the greatest risks. There are Speaker 5: a lot of states that are dealing with antiquated machines. Right. Speaker 6: Which are vulnerable to being hacked. Speaker 3: Workers were able to easily hack into an electronic voting machine. It was possible to switch votes. Speaker 0: 43% of American voters use voting machines that researchers have found have serious security flaws including backdoors. We know how vulnerable now our systems were. We know I know the hackathon that took place last year were virtually every machine was broken into fairly quickly. Speaker 4: I actually held a demonstration for my colleagues here at the Capitol, where we brought in, folks Who, before our eyes, hacked election machines, those that are not those that are being used in many states. Speaker 7: Aging systems also frequently rely on unsupported software like Windows XP in 2000, which may not receive regular security patches And are thus more vulnerable to the latest methods of cyber attack. Speaker 3: In a close presidential election, they just need to hack 1 swing state or maybe 1 or Or maybe just a few counties in one swing step. Speaker 4: I'm very concerned that you could have a hack that finally went through.

@KanekoaTheGreat - KanekoaTheGreat

#7 Professor Matt Blaze of Georgetown University's Computer Science Department provided testimony on the vulnerabilities of the United States' election system during a congressional hearing titled "2020 Election Security" on January 9, 2020: “I come here today as a computer scientist who spent the better part of the last quarter century studying election system security… To be blunt, it’s a widely recognized really indisputable fact that every piece of computerized voting equipment in use at polling places today can be easily compromised in ways that have the potential to disrupt election operations, compromise firmware and software, and potentially alter vote tallies in the absence of other safeguards. This is partly a consequence of historically poor design and implementation by equipment vendors, but it’s ultimately a reflection of the nature of complex software. It’s simply beyond the state of the art to build software systems that can reliably withstand targeted attacks by a determined adversary in this kind of environment… Just as we don't expect the local sheriff to singlehandedly defend against military ground invasions, we shouldn't expect county election IT managers to defend against cyber attacks by foreign intelligence services.”

Video Transcript AI Summary
As a computer scientist specializing in election system security, I want to highlight the vulnerabilities in computerized voting equipment used in polling places. These systems can be easily compromised, allowing corrupt candidates or foreign adversaries to disrupt elections and potentially alter vote tallies without detection. The poor design and implementation by equipment vendors contribute to these vulnerabilities. Additionally, voter registration databases and systems reporting final results are attractive targets for disruption, with even fewer standards for securing them. It is unrealistic to expect county election IT managers to defend against cyber attacks by foreign intelligence services. We need to address these issues to ensure the integrity of our elections.
Full Transcript
Speaker 0: I come here today as a computer scientist who spent the better part of the last quarter century studying election system security. As you're well aware, the integrity of elections across the U. S. Depends heavily on the integrity of computers and software systems. Or corrected after the fact. These vulnerabilities can create practical avenues for corrupt candidates or foreign adversaries to do everything from cause large scale disruption on Election Day to potentially, undetectably alter election outcomes. To be blunt, it's a widely recognized, really indisputable fact that every piece of computerized voting equipment in use at polling places today can be easily compromised in ways that have the potential to disrupt election operations, compromise firmware and software, potentially alter vote tallies in the absence of other safeguards. This is partly a consequence of historically poor design and implementation by equipment vendors, but it's Ultimately, a reflection of the nature of complex software. It's simply beyond the state of the art to build software systems that can reliably withstand targeted and targeted attack by a determined adversary in this kind of an environment. Each of the more than 5,000 jurisdictions responsible for Running elections across the nation must maintain a number of critical information systems that are attractive targets for disruption by adversaries. Most important of these are voter registration databases, the systems that report final results and so forth. Unfortunately, there are even fewer standards for how to secure these systems. The administration of these systems varies widely and the threats against these systems are often even more acute than the threats against individual voting systems. You know, just as we don't expect the local sheriff to single handedly defend against military ground invasions, we shouldn't expect county election IT managers to defend against cyber attacks by foreign intelligence services, but that's precisely what we've been asking them to do.

@KanekoaTheGreat - KanekoaTheGreat

#8 Professor J. Alex Halderman of the University of Michigan's Computer Science Department provided testimony on the vulnerabilities of the United States' election system during a congressional hearing titled "Russian Interference in U.S. Elections" on June 21, 2017: “I’m a professor of computer science and have spent the last ten years studying the electronic voting systems that our nation relies on. My conclusion from that work is that our highly computerized election infrastructure is vulnerable to sabotage and even to cyber attacks that could change votes... I know America’s voting machines are vulnerable because my colleagues and I have hacked them repeatedly as part of a decade of research studying the technology that operates elections and learning how to make it stronger. We’ve created attacks that can spread from machine to machine like a computer virus and silently change election outcomes. We’ve studied touch screen and optical scan systems, and in every single case, we’ve found ways for attackers to sabotage machines and steal votes… In close elections, an attacker can probe the most important swing states or swing counties, find areas with the weakest protection, and strike there. In a close election year, changing a few votes in key localities could be enough to tip national results.”

Video Transcript AI Summary
The speaker, a computer science professor, warns that the electronic voting systems used in the US are vulnerable to sabotage and cyber attacks that can change votes. Through their research, they have repeatedly hacked voting machines and found ways for attackers to manipulate them. They emphasize that these vulnerabilities are within reach for America's enemies. While some states have secure voting technology, others are alarmingly vulnerable, putting the entire nation at risk. The speaker debunks the belief that voting machines are secure because they are not connected to the internet, explaining that many machines have wireless modems for faster result uploading. They conclude that it is only a matter of time before these vulnerabilities are exploited.
Full Transcript
Speaker 0: I'm a professor of computer science and have spent the last 10 years studying the electronic voting systems that our nation relies on. My conclusion from that work is that our highly computerized election infrastructure is vulnerable to sabotage and even to cyber attacks that could change votes. These realities risk making our election results more difficult for the American people to trust. I know America's voting machines are vulnerable because my colleagues and I have hacked them repeatedly as part of a decade of research studying the technology that operates elections and learning how to make it stronger. We've created attacks that can spread from machine to machine like a computer virus and silently change election outcomes. We've studied touch screen and optical scan systems, and in every single case, we've found ways for attackers to sabotage machines and to steel votes. These capabilities are certainly within reach for America's enemies. As you know, states choose their own voting technology And while some states are doing well with security, others are alarmingly vulnerable. This puts the entire nation at risk. In close elections, an attacker can probe the most important swing states or swing counties, find areas with the weakest protection and strike there. In a close election year, changing a few votes in key, localities could be enough to tip national results. The key lesson from 2016 is that these threats are real. Some say the fact that voting machines aren't connected to the internet makes them secure. But unfortunately, this is not true. Voting machines are not as distant from the internet as they may seem. Across the country there are about 52 different models of machines. They fall into essentially 2 styles, ones that Scan a piece of paper or ones where the vote, the voter just interacts with the touch screen. And many of them have been analyzed now by researchers, looking for security vulnerabilities. In every single case Where a US voting machine has been analyzed by competent security researchers, they have found vulnerabilities that would let someone Inject malicious software and change election data. Every single case. Missing machines are not connected to the internet. This is something that you hear all the time in the US from election officials. Unfortunately it's not actually true. In many new voting machines come with, 4 gs wireless modems so that they can be connected to the internet from the polling place in order to upload the results faster. Now to me that sounds crazy. Why would you want to put your voting machines on the internet right in the middle of the election, potentially at the most vulnerable time? I'm Pretty sure my undergrad computer security class at Michigan could have changed the outcome of the 2016 Michigan election if we wanted to. It is that bad. And we have a combination of very powerful adversaries and unfortunately quite vulnerable and obsolete systems. That's that's why I say it's only a matter of time.

@KanekoaTheGreat - KanekoaTheGreat

#9 Professor Andrew Appel of Princeton University's Computer Science Department provided testimony on the vulnerabilities of the United States' election system during a congressional hearing titled "Election Cybersecurity" on September 28, 2016: “Installing new software is how you hack a voting machine to cheat. In 2009, in a courtroom of the superior court of New Jersey, I demonstrated how to hack a voting machine. I wrote a vote-stealing computer program that shifted votes from one candidate to another. Installing that vote-stealing program in a voting machine takes seven minutes per machine with a screwdriver. But really, the software I built was not rocket science. Any computer programmer could write the same code. Once it’s installed, it could steal elections without detection for years to come… Other computer scientists have demonstrated similar hacks on many models of machines. This is not just one glitch from one manufacturer of machines; it’s the very nature of computers. So how can we trust our elections when it is so easy to make the computers cheat?”

Video Transcript AI Summary
The Sequoia AVC Advantage, now called the Dominion AVC Advantage, is a voting machine that can be easily hacked by removing the memory chip and installing a cheating program. This program can change votes and alter the electronic log of votes cast. Other voting machines can be hacked by installing a software upgrade memory card. These vulnerabilities have been demonstrated by various universities, including Princeton, Johns Hopkins, and Michigan. Voting machines are often accessible to potential attackers before and after elections. The ease of hacking raises concerns about the trustworthiness of election results.
Full Transcript
Speaker 0: The machine that I hacked is called the Sequoia AVC Advantage, now called the Dominion AVC Advantage. It's in use in almost all of New Jersey and in all of Louisiana and a few counties of Pennsylvania and other states. The computer program that counts the votes on this machine is in a read only memory that's mounted in a socket on the motherboard. To hack this machine, you have to remove that memory chip from its socket and install a memory chip on which you've prepared a cheating program. The cheating program that I prepared is has an extra 100 lines of code basically that, when the polls are about to close, it goes in there and changes some votes stored in the machine. And there is an electronic log of all votes cast, so it changes the log too. So to install that, the attacker doesn't need to be a computer scientist. The attacker just needs to have a bunch of copies of this memory chip with the program on it. And for each voting machine, unscrew 10 screws to remove the panel that covers the motherboard, pry out the ROM chip containing the legitimate program and install the ROM chip containing the fraudulink program. Other kinds of voting machines, store their computer program that counts to votes in flash memory and this can be updated under the control of whatever computer program happens to be running in the voting machine. These voting machines, typically the generation developed in the 1990s and after, can be hacked without actually physically changing any hardware in the machine, just by installing a software upgrade memory card, in the same slot that one would normally install the ballot definition. And this particular attack was demonstrated by my colleague at Princeton, Professor Felton, in about 2007 working with 2 of his graduate students. But it's not just us at Princeton. There are many kinds of voting machines and the same kinds of hacks are applicable to all voting machines and have been demonstrated at several other universities, including the University of Connecticut, Johns Hopkins, Michigan and others. There are cybersecurity issues in all parts of our election system. Before the election, voter registration databases. During the election, voting machines. After the election, vote tabulation, canvassing, precinct aggregation computers. Installing new software in a voting machine is not really much different from installing new software in any other kind of computer. Installing new software is how you hack a voting machine to cheat. In 2009, in the courtroom of the Superior Court of New Jersey, I demonstrated how to hack a voting machine. I wrote a vote stealing computer program that shifts votes from one candidate to another. Installing that vote stealing program in a voting machine takes 7 minutes per machine with a screwdriver, But really the software I built was not rocket science. Any computer programmer could write the same code. Once it's installed, it could steal elections without detection for years to come. Voting machines are often delivered to polling places several days before the election to elementary schools, churches, firehouses. In these locations, anyone could gain access to a voting machine for 10 minutes. Between elections, the machines are routinely opened up for maintenance by county employees or private contractors. Let's assume they have the utmost integrity, but still in the US we try to run our elections so that we can trust the election results without relying on any one individual. Other computer scientists have demonstrated similar hacks on many models of machine. This is not just 1 glitch in 1 manufacturer's machine. It's the very nature of computers. So how can we trust our elections when it's so easy to make the computers cheat?

@KanekoaTheGreat - KanekoaTheGreat

#10 Senator Ron Wyden provided testimony on the vulnerabilities of the United States' election system during a congressional hearing titled "Election Security" on July 15, 2019: "The vast majority of ten thousand election jurisdictions nationwide use election management systems that run on old software that is soon going to be out-of-date and ripe for exploitation by hackers, according to an exhaustive analysis by the Associated Press. Pennsylvania, Wisconsin, Michigan, Florida, Iowa, Indiana, Arizona, and North Carolina, among others, are all at risk. Even the State of Georgia, which passed legislation to buy new voting machines, is on track to buy equipment that suffers from significant cyber security weakness. Our elections weren't secure last week, and they sure as heck aren't secure this week, and anybody who says otherwise is either selling you voting machines or simply has malicious intent towards our elections. 43% of American voters use voting machines that researchers have found have serious security flaws, including back doors. These companies are accountable to no one. They won’t answer basic questions about their cyber security practices. And, the biggest companies won’t answer any questions at all. Five states have no paper trail, and that means there is no way to prove the numbers the voting machines put out are legitimate. So much for cyber security 101."

Video Transcript AI Summary
The majority of election jurisdictions in the US use outdated software that is vulnerable to hacking. States like Pennsylvania, Wisconsin, Michigan, Florida, Iowa, Indiana, Arizona, North Carolina, and even Georgia (despite recent legislation) are at risk. If a small percentage determines the election outcome and people perceive it as unfair, it could seriously damage our democratic system. Experts argue that without a thorough forensic analysis, it is impossible to confirm that no votes were altered in the 2016 election. Additionally, 43% of American voters use machines with security flaws, and some companies refuse to disclose their cybersecurity practices. Five states lack a paper trail, making it impossible to verify the accuracy of voting machine results.
Full Transcript
Speaker 0: The vast majority of 10,000 election jurisdictions nationwide use election management systems that run on old software that is soon gonna be out of date and ripe for exploitation by hackers according to an exhaustive analysis by the Associated Press. Pennsylvania, Wisconsin, Michigan, Florida, Iowa, Indiana, Arizona and North Carolina, among others, are all at risk. Even the state of Georgia, which just passed legislation to buy new voting machines, is on track to buy equipment that suffers from this significant cybersecurity weakness. Let's say the election is decided by a small percentage and people in America don't think that the election was fair. The effect that would have on our 200 year experiment in self governance, our democratic system would take a real hit. Our elections weren't secure last week, and they sure as heck aren't secure this week. And anybody who says otherwise is either selling of voting machines or simply has a malicious intent towards our elections. At one point in the Intelligence Committee, both sides seemed to agree that no votes were changed in the 2016 election. And I said, the experts I talk to say that until you have a forensic analysis of a vote, until you go in there and scrub the whole system, You can't really say that. 43% of American voters use voting machines That researchers have found have serious security flaws, including backdoors. These companies are accountable to no one. They won't answer basic questions about their cybersecurity practices. And the biggest companies won't answer any questions at all. 5 states have no paper trail, And that means there is no way to prove the numbers the voting machines put out are legitimate. So much for cybersecurity 101.

@KanekoaTheGreat - KanekoaTheGreat

#11 Senator Elizabeth Warren published an article on her website on the vulnerabilities of the United States' election system titled "Strengthening Our Democracy" on June 25, 2019: "The harsh truth is that our elections are extremely vulnerable to attack: Forty-two states use voter registration databases that are more than a decade old. Laughably, in 2019, some still use Windows 2000 and Windows XP. Twelve states still use paperless machines, meaning there’s no paper trail to verify vote counts. Some states don’t require post-election audits. And ten states don’t train election officials to deal with cybersecurity threats." https://web.archive.org/web/20190917015401/https://elizabethwarren.com/plans/strengthening-democracy

Strengthening Our Democracy | Elizabeth Warren Our right to vote is under attack—and we need to put more federal muscle in the fight to protect it. web.archive.org

@KanekoaTheGreat - KanekoaTheGreat

#12 In Dec. 2019, Senators Elizabeth Warren, Amy Klobuchar, Ron Wyden, and Mark Pocan sent letters to the three private equity firms that own the largest voting machine companies in the US expressing their concern about the industry's "vulnerabilities" and "lack of transparency." https://web.archive.org/web/20200119083321/https://www.warren.senate.gov/imo/media/doc/H.I.G.%20McCarthy,%20&%20Staple%20Street%20letters.pdf

@KanekoaTheGreat - KanekoaTheGreat

#13 Following Hillary Clinton's defeat in the 2016 election, the corporate media dedicated the next four years to writing hundreds of articles about the extent to which the United States' election system is online, compromised, and vulnerable to hackers. https://kanekoa.substack.com/p/110-articles-affirm-americas-computerized

Hacking America's Computerized Voting System 110 Articles Affirm America's Computerized Voting System Is Online, Compromised, and Vulnerable To Hackers: Documented, Linked, and Quoted kanekoa.news

@KanekoaTheGreat - KanekoaTheGreat

#14 The Guardian: Voting machine password hacks as easy as 'abcde' (April 15, 2015) “Touchscreen WinVote voting machines used in numerous elections between 2002 and 2014 used “abcde” and “admin” as passwords and could easily have been hacked from the parking lot outside the polling place, according to a state report… Anyone within a half mile could have modified every vote, undetected…the version of Windows operating on each of them had not been updated since at least 2004, that it was possible to “create and execute malicious code” on the WINVote and the level of sophistication to execute such an attack is low.” https://www.theguardian.com/us-news/2015/apr/15/virginia-hacking-voting-machines-security

Voting machine password hacks as easy as 'abcde', details Virginia state report AVS WinVote machines used in three presidential elections in state ‘would get an F-minus’ in security, said computer scientist who pushed for decertification theguardian.com

@KanekoaTheGreat - KanekoaTheGreat

#15 New York Times: Millions of Voter Records Posted, and Some Fear Hacker Field Day (Dec. 30, 2015) “First and last names. Recent addresses and phone numbers. Party affiliation. Voting history and demographics. A database of this information from 191 million voter records was posted online over the last week, the latest example of voter data becoming freely available, alarming privacy experts who say the information can be used for phishing attacks, identity theft and extortion. It is not known who built the database, where all the data came from, and whether its disclosure resulted from an inadvertent release or from hacks…states are not taking the security of voter data seriously enough.” https://web.archive.org/web/20210212172828/https://www.nytimes.com/2015/12/31/us/politics/voting-records-released-privacy-concerns.html?_r=0

Millions of Voter Records Posted, and Some Fear Hacker Field Day (Published 2015) Names, phone numbers and demographic information was included in 191 million voter records mysteriously published over the last week. web.archive.org

@KanekoaTheGreat - KanekoaTheGreat

#16 Wired: America’s Electronic Voting Machines Are Scarily Easy Targets (Aug. 2, 2016) “They are old, buggy, and insecure. If someone wanted to mess with the US election, these machines would be an easy way in. Most of these machines are running Windows XP, for which Microsoft hasn’t released a security patch since April 2014…researchers have demonstrated that many of them are susceptible to malware or, equally if not more alarming, a well-timed denial of service attack.”

@KanekoaTheGreat - KanekoaTheGreat

#17 Politico: How to Hack an Election in 7 Minutes (Aug. 5, 2016) “Princeton professor Andrew Appel decided to hack into a voting machine… He summoned a graduate student named Alex Halderman, who could pick the machine’s lock in seven seconds. Clutching a screwdriver, he deftly wedged out the four ROM chips—they weren’t soldered into the circuit board, as sense might dictate—making it simple to replace them with one of his own: A version of modified firmware that could throw off the machine’s results, subtly altering the tally of votes, never to betray a hint to the voter. The attack was concluded in minutes… the machines that Americans use at the polls are less secure than the iPhones they use to navigate their way there. We found the machine did not have any security mechanisms beyond what you’d find on a typical home PC, it was very easy to hack…foreign hackers could attack the state and county computers that aggregate the precinct totals on election night…They could attack digitized voter registration databases…They could infect software at the point of development, writing malicious ballot definition files that companies distribute, or do the same on a software patch… They could FedEx false software to a county clerk’s office and, with the right letterhead and convincing cover letter, get it installed. Even with optical scan voting, it’s not just the voting machines themselves—it’s the desktop and laptop computers that election officials use to prepare the ballots, prepare the electronic files from the OpScan machines, panel voter registration, electronic poll books. And the computers that aggregate the results together from all of the optical scans.” https://www.politico.com/magazine/story/2016/08/2016-elections-russia-hack-how-to-hack-an-election-in-seven-minutes-214144/

How to Hack an Election in 7 Minutes With Russia already meddling in 2016, a ragtag group of obsessive tech experts is warning that stealing the ultimate prize—victory on Nov. 8—would be child’s play. politico.com

@KanekoaTheGreat - KanekoaTheGreat

#18 CBS: Hacker demonstrates how voting machines can be compromised (Aug. 10, 2016) “Concerns are growing over the possibility of a rigged presidential election. Roughly 70 percent of states in the U.S. use some form of electronic voting. Hackers told CBS News that problems with electronic voting machines have been around for years. The machines and the software are old and antiquated. The voter doesn't even need to leave the booth to hack the machine. For $15 and in-depth knowledge of the card, you could hack the vote… There are so many places in the voting process once it goes electronic that's vulnerable. We found that more than 40 states are using voting machines there that are at least 10 years old.” https://www.cbsnews.com/news/rigged-presidential-elections-hackers-demonstrate-voting-threat-old-machines/

Hacker demonstrates how voting machines can be compromised With millions heading to the polls in three months, concerns are growing over the possibility of a rigged presidential election cbsnews.com

@KanekoaTheGreat - KanekoaTheGreat

#19 ABC News: Yes, It's Possible to Hack the Election (Aug. 19, 2016) “Slight meddling in some swing precincts in swing states could tip the scales. If it’s a computer, it can be hacked… if sophisticated hackers want to get into any computer or electronic device, even one that is not connected to the internet, they can do so… In most states the data that are used to determine who won an election are processed by networked, computerized devices… There are almost no locations that exclusively use paper ballots… The process of recording which person got your vote can — almost always — be hacked. Malware can be implanted on voting machines. Almost none of these machines have any kind of malware detection software like those used at major corporations and government agencies. Even if they did, many of those cybersecurity tools are regularly defeated by today’s sophisticated hackers… In America’s often close elections, a little manipulation could go a long way… Smart malware can be programmed to switch only a small percentage of votes from what the voters intended. That may be all that is needed, and that malware can also be programmed to erase itself after it does its job, so there might be no trace it ever happened." https://abcnews.go.com/Politics/hack-election/story?id=41489017

Yes, It's Possible to Hack the Election abcnews.go.com

@KanekoaTheGreat - KanekoaTheGreat

#20 The Atlantic: How Electronic Voting Could Undermine the Election (Aug. 29, 2016) “…computer-security experts think electronic voting is a very, very bad idea. For years, security researchers and academics have urged election officials to hold off on adopting electronic voting systems, worrying that they’re not nearly secure enough to reliably carry out their vital role in American democracy. Their claims have been backed up by repeated demonstrations of the systems’ fragility. When the District of Columbia tested an electronic voting system in 2010, a professor from the University of Michigan and his graduate students took it over from more than 500 miles away to show its weaknesses; with actual physical access to a voting machine, the same professor—Alex Halderman—swapped out its internals, turning it into a Pac Man console. Halderman showed that a hacker who has access to a machine before election day could modify its programming—and he did so without even leaving a mark on the machine’s tamper-evident seals…pure electronic voting is simply too dangerous: We must use paper, either directly filled out by the voter or as a voter verifiable paper audit trail…” https://www.theatlantic.com/technology/archive/2016/08/how-electronic-voting-could-undermine-the-election/497885/

How Electronic Voting Could Undermine the Election As foreign hackers target election data, voters may lose faith in digital ballots. theatlantic.com

@KanekoaTheGreat - KanekoaTheGreat

#21 FOX: Princeton Professor demonstrates how to hack a voting machine (Sept. 18, 2016) “I have demonstrated how to hack the AVC Advantage voting machines that we use in New Jersey... The touch screen voting machine, the type used in about ten states, can be tampered with... By simply swapping the machine's computer chip for his own... I figured out how to make a slightly different computer program that, just before the close of the polls, shifts some votes around from one candidate to another. I wrote that computer program onto a memory chip like this, and now to hack a voting machine, you have to get seven minutes alone with it, with a screwdriver.” https://www.foxnews.com/video/5131074167001#sp=show-clips

Professor demonstrates how to hack a voting machine | Fox News Video Eric Shawn reports foxnews.com

@KanekoaTheGreat - KanekoaTheGreat

#22 Fortune: Watch This Security Researcher Hack a Voting Machine (Nov. 4, 2016) “Researchers at cybersecurity startup Cylance said they were able to hack into the Sequoia AVC Edge Mk1, used to count votes in states including California, Florida, and New Jersey, and change the final tally it produced. In Cylance's hacking demonstration, researchers were able to alter the memory of the machine as well as the paper trail it created to change vote counts and precinct records. To pull off the hack, the researchers slipped in a custom PC memory card that overwrote software embedded in the device. Cylance said it had notified Dominion Voting Systems (née Sequoia), the voting machine's maker, and government authorities about the threat.” https://fortune.com/2016/11/04/voting-machine-hack-watch-video-cylance/

Watch This Guy Hack a Voting Machine Researchers at cybersecurity startup Cylance demonstrate how to hack a voting machine used in the U.S. in a video ahead of election 2016. fortune.com

@KanekoaTheGreat - KanekoaTheGreat

#23 Vox: Here’s how hackers can wreak havoc on Election Day (Nov. 7, 2016) “Voting machines are old and vulnerable, and voter databases are connected to the internet. Many voting machines are running software that’s over a decade old, like Windows XP, which Microsoft hasn’t issued a security patch for since 2014. Others store ballots on memory cards, which could be used to insert viruses that can cause the machines to malfunction or alter votes. Take the Sequoia AVC Edge, for example, which is used in 12 states. It was hacked by a group of academics who installed malware that made the machine unable to do anything but play Pac-Man... Across the country, state voter registration data is synced with the internet; the integration has allowed people to register online or at the DMV. But it also means those databases are vulnerable to hackers… In Indiana last month, a security researcher demonstrated how he was able to quickly break into the state’s database and edit people’s voter information. Last year, another researcher found 191 million hacked voter registration records sitting on an open database that apparently anyone could find.” https://www.vox.com/2016/11/7/13512748/hackers-election-day-voting-machines-databases-2016

Here’s how hackers can wreak havoc on Election Day Voting machines are old and vulnerable, and voter databases are connected to the internet. vox.com

@KanekoaTheGreat - KanekoaTheGreat

#24 PBS: Here’s how hackers might mess with electronic voting on Election Day (Nov. 8, 2016) “…vulnerabilities in electronic ballots, make hacking a major possibility on Election Day… Five states — New Jersey, Delaware, Georgia, Louisiana, and South Carolina — will cast votes on digital systems without leaving a paper trail. The same applies to several jurisdictions in battleground states like Pennsylvania and Ohio. Cyber vulnerabilities exist in all of these locations. Most revolve around the age of machines and their software. The Brennan Center report estimated 43 states will use voting machines in 2016 that are more than 10 years old. Many of these devices contain outdated software — think Microsoft Windows XP or older — without security updates. Meanwhile, the mainframes of other machines are guarded by easy-to-pick padlocks or by no barrier at all. With the kind of stealth and sophistication that’s already out there, why wouldn’t a nation-state, cyber-criminal gang, or activist group go into election systems that are completely vulnerable? …much of this voting technology is proprietary, so forensic auditors couldn’t independently scrub for and detect malicious software, especially given such code might delete itself after Election Day… Some counties use devices that collect and calculate results at once, such as the AccuVote TS and TSX voting machines. But the software for these popular machines lacks basic cybersecurity, like encryption or strong passwords. Marketplaces for voter registration data have sprouted on the Dark Web over the last year, according to an election hacking report from the ICIT. Prices vary, but one listing offered 0.5 Bitcoins ($300) for a single state’s database.” https://www.pbs.org/newshour/science/heres-how-hackers-could-mess-with-electronic-voting

Here's how hackers might mess with electronic voting on Election Day Here's what to watch for on Election Day in case hackers decide to sway the vote. pbs.org

@KanekoaTheGreat - KanekoaTheGreat

#25 Slate: Now Is the Time to Replace Our Decrepit Voting Machines (Nov. 17, 2016) “With antiquated voting devices at the end of their projected lifespans still in widespread use across the country, the U.S. is facing an impending crisis in which our most basic election infrastructure is unacceptably vulnerable to breakdown, malfunction, and hacking... No one expects a laptop to run reliably for more than a decade. Yet on Election Day 2016, 42 states used voting machines that were at least 10 years old, and 13 of those states used ones more than 15 years old. Perhaps even more troubling, these aging machines are particularly vulnerable to hacking... These older devices often rely on unsupported software (we found machines still operating on Windows 2000) that doesn’t receive the regular security patches that help protect against modern methods of cyberattacks and hasn’t been through the relatively rigorous federal certification program that exists today. What’s more, many of these systems don’t have physical paper trails or ballots to back up the results, meaning there’s no way to independently verify how voters intended to cast their ballots in the case of a suspected hack. Voters complained of touchscreen calibration errors that “flipped” votes in North Carolina, Texas, Nevada, and Georgia and interfered with selecting straight party tickets in Pennsylvania. Optical scan machines malfunctioned in parts of Michigan and Massachusetts, and a few in Illinois had to be replaced because a memory card blew.” https://slate.com/technology/2016/11/now-is-the-time-to-fix-our-old-voting-machines.html

We Can’t Wait Until the Next Election to Replace Decrepit, Unreliable Voting Machines Although more than half the country may be unhappy with the results, America dodged a bullet on Election Day. That is, our voting machines generally... slate.com

@KanekoaTheGreat - KanekoaTheGreat

#26 PBS: Recounts or no, U.S. elections are still vulnerable to hacking (Dec. 26, 2016) “Pennsylvania is one of 11 states where the majority of voters use antiquated machines that store votes electronically, without printed ballots or other paper-based backups that could be used to double-check the balloting. There’s almost no way to know if they’ve accurately recorded individual votes — or if anyone tampered with the count. More than 80 percent of Pennsylvanians who voted on Nov. 8 cast their ballots on such machines, according to VotePA, a nonprofit seeking their replacement. A recount would, in the words of VotePA’s Marybeth Kuznik, a veteran election judge, essentially amount to this: “You go to the computer, and you say, ‘OK, computer, you counted this a week-and-a-half ago. Were you right the first time?'” These paperless digital voting machines, used by roughly 1 in 5 U.S. voters last month, present one of the most glaring dangers to the security of the rickety, underfunded U.S. election system. Like many electronic voting machines, they are vulnerable to hacking. But other machines typically leave a paper trail that could be manually checked. The paperless digital machines open the door to potential election rigging that might not ever be detected. Researchers would like to see the U.S. move entirely to computer-scannable paper ballots since paper can’t be hacked. Many advanced democracies require paper ballots, including Germany, Britain, Japan, and Singapore. Wallach and his colleagues believe a crafty team of pros could strike surgically, focusing on select counties in a few battleground states where “a small nudge might be decisive,” he said…Vote-tallying systems, typically at the county level, are also tempting targets. They tend to be little more than PCs running a database. Tabulation databases at the county level, which collect results from individual precincts, are supposed to be “air-gapped” or disconnected from the internet at all times — though experts say they sometimes get connected anyway. They’re considered insecure for other reasons; many have USB ports where malware could be introduced. Forty-three states use machines more than a decade old. Most run on vintage operating systems such as Windows 2000 that pre-date the iPhone and are no longer updated with security patches.” https://www.pbs.org/newshour/nation/recounts-no-u-s-elections-still-vulnerable-hacking

Recounts or no, U.S. elections are still vulnerable to hacking ALLENTOWN, Pa. — Jill Stein's bid to recount votes in Pennsylvania was in trouble even before a federal judge shot it down Dec. 12. That's because the Green Party candidate's effort stood almost no chance of detecting potential fraud or error in the vote — there was basically nothing to recount. pbs.org

@KanekoaTheGreat - KanekoaTheGreat

#27 Politico: U.S. elections are more vulnerable than ever to hacking (Dec. 29, 2016) “America's political system will remain vulnerable to cyberattacks and infiltration from foreign and domestic enemies unless the government plugs major holes and commits millions of dollars in the coming years… Hackers even invaded two state voter registration databases, spurring an FBI alert that sparked questions about whether a broader attack was coming. As for Election Day itself, 15 states — including swing state Pennsylvania — still rely at least partly on electronic voting machines that leave no paper trail. That’s despite years of warnings from digital security specialists, who say the touch-screen machines are prone to being hijacked and would provide no effective way to disprove claims of digital vote tampering… Democrats like Lieu say Republicans are playing with fire, warning the GOP could be in Russia’s crosshairs come 2018. And have no doubt, he added, foreign hackers “could absolutely swing an election” if the U.S. fails to lock its doors.” https://www.politico.com/story/2016/12/election-hacking-vulnerabilities-233024

U.S. elections are more vulnerable than ever to hacking Major political, financial and logistical obstacles stand in the way. politico.com

@KanekoaTheGreat - KanekoaTheGreat

#28 ScientificAmerican: Our Voting System Is Hackable by Foreign Powers (March 1, 2017) “It is entirely possible for an adversary to hack American computerized voting systems directly and select the next commander in chief. A dedicated group of technically sophisticated individuals could steal an election by hacking voting machines in key counties in just a few states. Indeed, University of Michigan computer science professor J. Alex Halderman says that he and his students could have changed the result of the November election… It needn’t be a superpower like Russia or China. Even a medium-sized country would have the resources to accomplish this, with techniques that could include hacking directly into voting systems over the Internet, bribing employees of election offices and voting-machine vendors, or just buying the companies that make the voting machines outright. It is likely that such an attack would not be detected, given our current election security practices... We need to audit computers by manually examining randomly selected paper ballots and comparing the results with machine results. Audits require a voter-verified paper ballot, which the voter inspects to confirm that his or her selections have been correctly and indelibly recorded. Since 2003 an active community of academics, lawyers, election officials, and activists has urged states to adopt paper ballots and robust audit procedures…It is important that audits be performed on every contest in every election so that citizens do not have to request manual recounts to feel confident about election results." https://www.scientificamerican.com/article/our-voting-system-is-hackable-by-foreign-powers/#

Our Voting System Is Hackable by Foreign Powers Scientific American is the essential guide to the most awe-inspiring advances in science and technology, explaining how they change our understanding of the world and shape our lives. scientificamerican.com

@KanekoaTheGreat - KanekoaTheGreat

#29 Politico: Will the Georgia Special Election Get Hacked? (June 14, 2017) “A 29-year-old former cybersecurity researcher with the federal government’s Oak Ridge National Laboratory in Tennessee, Lamb, who now works for a private internet security firm in Georgia, wanted to assess the security of the state’s voting systems. When he learned that Kennesaw State University’s Center for Election Systems tests and programs voting machines for the entire state of Georgia, he searched the center’s website… Lamb found on the center’s website a database containing registration records for the state’s 6.7 million voters; multiple PDFs with instructions and passwords for election workers to sign in to a central server on Election Day; and software files for the state’s ExpressPoll poll books — electronic devices used by poll workers to verify that a voter is registered before allowing them to cast a ballot. There also appeared to be databases for the so-called GEMS servers. These Global Election Management Systems are used to prepare paper and electronic ballots, tabulate votes and produce summaries of vote totals. The files were supposed to be behind a password-protected firewall, but the center had misconfigured its server so they were accessible to anyone, according to Lamb. “You could just go to the root of where they were hosting all the files and just download everything without logging in,” Lamb says. The site was also using a years-old version of Drupal — content management software — that had a critical software vulnerability long known to security researchers. “Drupageddon,” as researchers dubbed the vulnerability, got a lot of attention when it was first revealed in 2014. It would let attackers easily seize control of any site that used the software. A patch to fix the hole had been available for two years, but the center hadn’t bothered to update the software, even though it was widely known in the security community that hackers had created automated scripts to attack the vulnerability back in 2014… In addition to failing to install the 2-year-old patch on its server software, Georgia, in testimony in the injunction hearing last week revealed, is still using a version of software on its touch-screen machines that was last certified in 2005. That voting software is running on the machines on top of a Windows operating system that is even older than this.” https://www.politico.com/magazine/story/2017/06/14/will-the-georgia-special-election-get-hacked-215255/

Will the Georgia Special Election Get Hacked? The state’s voting systems are uniquely vulnerable, security researchers say—and the state has ignored efforts to fix the problem. politico.com

@KanekoaTheGreat - KanekoaTheGreat

#30 NPR: If Voting Machines Were Hacked, Would Anyone Know? (June 14, 2017) “U.S. officials are increasingly worried about how vulnerable American elections really are… But even if most voting machines aren't connected to the Internet, says cybersecurity expert Jeremy Epstein, "they are connected to something that's connected to something that's connected to the Internet." … A recently leaked National Security Agency report on Russian hacking attempts has heightened concerns. According to the report, Russian intelligence services broke into an election software vendor's computer system and used the information it gained to send 122 election officials fake emails infected with malicious software. Bloomberg News reported Tuesday that Russia might have attempted to hack into election systems in up to 39 states. University of Michigan computer scientist Alex Halderman says it's just the kind of phishing campaign someone would launch if they wanted to manipulate votes. "That's because, before every election, the voting machines have to be programmed with the design of the ballots — what are the races, who are the candidates," says Halderman. He notes that the programming is usually done on a computer in a central election office or by an outside vendor. The ballot program is then installed on individual voting machines with a removable memory card. "So, as a remote attacker, I can target an election management system, one of these ballot programming computers. If I can infect it with malicious software, I can have that malicious software spread to the individual machines on the memory cards, and then change votes on Election Day," says Halderman.” https://www.npr.org/2017/06/14/532824432/if-voting-machines-were-hacked-would-anyone-know

If Voting Machines Were Hacked, Would Anyone Know? Even if most voting machines aren't connected to the Internet, "they are connected to something that's connected to something that's connected to the Internet," says one cybersecurity expert. npr.org

@KanekoaTheGreat - KanekoaTheGreat

#31 HuffPost: Good News For Russia: 15 States Use Easily Hackable Voting Machines (July 17, 2017) "Touch-screen machines can be programmed to change votes and are nearly impossible to audit, computer experts say… Manufacturers like Diebold touted the touch screens, known as direct-recording electronic (DRE) machines, as secure and more convenient than their paper-based predecessors. Computer experts were skeptical since any computer can be vulnerable to viruses and malware, but it was hard to get ahold of a touch-screen voting machine to test it. The manufacturers were so secretive about how the technology worked that they often required election officials to sign non-disclosure agreements preventing them from bringing in outside experts who could assess the machines. In September 2006, they published a research paper and an accompanying video detailing how they could spread malicious code to the AccuVote TS to change the record of the votes to produce whatever outcome the code writers desired. And the code could spread from one machine to another like a virus. That was more than a decade ago, but Georgia still uses the AccuVote TS. The state is one of five ― the others are Delaware, Louisiana, New Jersey, and South Carolina ― that rely entirely on DREs for voting. Ten other states use a combination of paper ballots and DRE machines that leave no paper trail. Many use a newer version of the AccuVote known as the TSX ― even though computer scientists have demonstrated that machine, too, is vulnerable to hacking. Others use the Sequoia AVC Advantage, which Princeton professor Andrew Appel demonstrated could be similarly manipulated in a 2007 legal filing. Appel bought a Sequoia machine online for $82 and demonstrated that he could remove 10 screws and easily replace the Sequoia’s memory card with a modified version that would alter the outcome of an election… Computer scientists like Halderman, Appel, and Felten have been warning states about the risks of DRE machines for over a decade, urging them to replace touch-screen machines with paper ballots that can be read with an optical scanner and easily audited after an election. Paper ballots create a physical copy of the voter’s choice that can be checked against the results; with DRE machines, it’s impossible to verify whether the choice the person intended to select is, in fact, what the machine recorded.” https://www.huffpost.com/entry/electronic-voting-machines-hack-russia_n_5967e1c2e4b03389bb162c96

Good News For Russia: 15 States Use Voting Machines That Have Been Easily Hackable For More Than A Decade Touch-screen machines can be programmed to change votes and are nearly impossible to audit, computer experts say. huffpost.com

@KanekoaTheGreat - KanekoaTheGreat

#32 CNET: Defcon hackers find it’s very easy to break voting machines (July 30, 2017) “When the password for a voting machine is "abcde" and can't be changed, the integrity of our democracy might be in trouble. The Advanced Voting Solutions WinVote machine, dubbed "America's worst voting machine," came equipped with this simple password even as it was used in some of the country's most important elections. AVS went out of business in 2007, but Virginia used its insecure machines until 2015 before dropping them for scrap metal. That means this vulnerable hunk of technology was used in three presidential elections, starting with George W. Bush's re-election in 2004 to Barack Obama's in 2012… "It's really just a matter of plugging your USB drive in for five seconds, and the thing's completely compromised at that point," Synack co-founder Jay Kaplan said. "To the point where you can get remote access. It's very simple." … Once you're out of the voting program on the machine, it's just like any old Windows XP computer," Synack found. https://www.cnet.com/news/privacy/defcon-hackers-find-its-very-easy-to-break-voting-machines/

While you watched "The Emoji Movie," a voting machine got hacked Voting is at the foundation of every democracy. Hackers find it's on shaky ground thanks to shoddy technology. cnet.com

@KanekoaTheGreat - KanekoaTheGreat

#33 CNN: We watched hackers break into voting machines (Aug. 11, 2017) “These are supposed to be the latest machines, they're still used in elections, and they're running ancient software. I think that if somebody wanted to, it would be pretty easy to fake an election…So if you are a voter in America, we're likely hacking the machine that you vote on. There are a few dozen of these machines and also electronic poll books… We can go ahead and impact this log within 10 seconds, and you can gain access to the operating system. We could actually remove this and clone this particular USB. We could go back and start looking at and reverse engineering what's on this image and determining the various ways that we can impact this particular operating system.” https://www.youtube.com/watch?v=HA2DWMHgLnc

@KanekoaTheGreat - KanekoaTheGreat

#34 The Intercept: The U.S. Election System Remains Deeply Vulnerable (Oct. 3, 2017) "The Harvard report, titled “Voter Identity Theft: Submitting Changes to Voter Registrations Online to Disrupt Elections,” concludes that online attackers can alter voter registration information in as many as 35 states and the District of Columbia by buying personal information through either legitimate or illegitimate sources. Voter registration information is public, and many states allow citizens to make changes online, even if they registered in person or by mail. A determined hacker could buy voter lists from the 36 jurisdictions that allow online registration, and separately buy the personal information used to confirm a voter’s identification – such as Social Security or driver’s license numbers – to get in and make changes. Voting software is another potential target for hackers. The Intercept has previously reported on a top-secret National Security Agency report detailing a cyberattack by a Russian intelligence agency on at least one U.S. voting software supplier. The attackers sent spear-phishing emails to more than 100 local election officials just days before the November election, according to the highly classified report that was provided anonymously to The Intercept." https://theintercept.com/2017/10/03/us-election-2016-state-voting-systems/

The U.S. Election System Remains Deeply Vulnerable, But States Would Rather Celebrate Fake Success Regardless of what did or did not happen in the 2016 election, voter registration systems remain susceptible to hacking. That's what states should focus on. theintercept.com

@KanekoaTheGreat - KanekoaTheGreat

#35 New York Times: The Myth of the Hacker-Proof Voting Machine (Feb. 2, 2018) “Examining the election-management computer at the county’s office — the machine used to tally official election results and, in many counties, to program voting machines — they found that remote-access software had been installed on it. Remote-access software is a type of program that system administrators use to access and control computers remotely over the internet or over an organization’s internal network. Election systems are supposed to be air-gapped — disconnected from the internet and from other machines that might be connected to the internet. The presence of the software suggested this wasn’t the case with the Venango machine, which made the system vulnerable to hackers. Anyone who gained remote access to the system could use the software to take control of the machine. Logs showed the software was installed two years earlier and used multiple times, most notably for 80 minutes on November 1, 2010, the night before a federal election… In the 15 years since electronic voting machines were first adopted by many states, numerous reports by computer scientists have shown nearly every make and model to be vulnerable to hacking. The systems were not initially designed with robust security in mind, and even where security features were included, experts have found them to be poorly implemented with glaring holes… ES&S has in the past sometimes sold its election-management system with remote-access software preinstalled, according to one official; and where it wasn’t preloaded, the company advised officials to install it so ES&S technicians could remotely access the systems via modem, as Venango County’s contractor did, to troubleshoot and provide maintenance… An ES&S contract with Michigan from 2006 describes how the company’s tech support workers used remote-access software called pcAnywhere to access customer election systems. And a report from Allegheny County, Pennsylvania, that same year describes pcAnywhere on that county’s election-management system on June 2 when ES&S representatives spent hours trying to reconcile vote discrepancies in a local district race that took place during a May 16th primary. An Allegheny County election official told me that remote-access software came pre-installed on their ES&S election-management system… On election nights, many polling places around the country transmit voting results to their county election offices via modems embedded in or connected to their voting machines. Election officials and vendors insist that the modem transmissions are safe because the connections go over phone lines and not the internet. But as security experts point out, many of the modems are cellular, which use radio signals to send calls and data to cell towers and routers belonging to mobile carriers — Verizon, Sprint, AT&T. These routers are technically part of the internet. Even when analog (landline) modems are used instead of cellular ones, the calls still likely pass through routers, because phone companies have replaced much of their analog switching equipment in recent years with digital systems. Because of this, attackers could theoretically intercept unofficial results as they’re transmitted on election night — or, worse, use the modem connections to reach back into election machines at either end and install malware or alter election software and official results... To subvert machines via their modem connection, an attacker could set up a device known as an IMSI-catcher (or stingray, as they’re also called) near precincts or county election offices to intercept and alter vote tallies as they’re transmitted. IMSI-catchers — which law enforcement, militaries and spies use — impersonate legitimate cell towers and trick phones and other devices in their vicinity into connecting to them instead of legitimate towers. ‘‘The incorrect assertion that voting machines or voting systems can’t be hacked by remote attackers because they are ‘not connected to the internet’ is not just wrong, it’s damaging,’’ says Susan Greenhalgh, a spokeswoman for the National Election Defense Coalition, an elections integrity group. ‘‘This oft-repeated myth instills a false sense of security that is inhibiting officials and lawmakers from urgently requiring that all voting systems use paper ballots and that all elections be robustly audited.’’ …The top voting machine maker in the country, ES&S, distributes modems or modeming capability with many of its DRE and optical-scan machines. About 35,000 of ES&S’s newest precinct-based optical scanner, the DS200, are used in 31 states and the District of Columbia and can be outfitted with either analog or cellular modems to transmit results. Maryland, Maine, Rhode Island and the District of Columbia use only DS200 machines statewide (though they also use two other systems specifically for disabled voters and absentee ballots); Florida and Wisconsin use the DS200s in dozens of counties, and other states use them to lesser degrees. ES&S’s earlier model M100 optical scanners, which also can be equipped with modems, have long been used in Michigan — a critical swing state in the 2016 presidential election — though the state is upgrading to DS200 machines this year, as well as machines made by Dominion Voting Systems. Dominion’s machines use external serial-port modems that are connected to machines after an election ends.” https://www.nytimes.com/2018/02/21/magazine/the-myth-of-the-hacker-proof-voting-machine.html

The Myth of the Hacker-Proof Voting Machine (Published 2018) Election officials have insisted that machines can’t be remotely compromised because they’re not “connected to the internet.” But security experts point out crucial ways in which they are. nytimes.com

@KanekoaTheGreat - KanekoaTheGreat

#36 Slate: America's Voting Systems Are Highly Vulnerable to Hackers (Feb. 22, 2018) “Did Russia shift the election’s outcome by hacking registration rolls or voting machines? The fact is that it’s impossible to say. In September, the Department of Homeland Security informed officials in 21 states that Russians had hacked into their registration systems in the run-up to the election. Whether the hackers manipulated the rolls—removed names, or switched their precincts—no one has investigated; perhaps no one could investigate, as so many months had passed before the hack was revealed… J. Alex Halderman a professor of computer science at the University of Michigan, testified that only a handful of vendors and contractors provide the equipment used in election machines. “Attackers could target one or a few of these companies and spread malicious code to election equipment that serves millions of voters,” he said. “Furthermore, in close elections, decentralization can actually work against us. An attacker can probe different areas of the most important ‘swing states’ for vulnerabilities, find the areas that have the weakest protection, and strike there.” For the past decade, Halderman has run the “red teams”—the simulated attacker—in games to test the vulnerability of election machines. In those games, he testified, his team “could reprogram the machine to invisibly cause any candidate to win. We also created malicious software—vote-stealing code—that could spread from machine to machine like a computer virus, and silently change the election outcome…This month, the Center for American Progress released a study measuring the degree to which each of the 50 states meets these basic standards. The results were alarming. Paperless voting systems—touch screens with no paper backups—are still used in 14 states. Only 26 states require post-election audits. Forty-one states use database software that was created more than a decade ago—so long ago that the vendors no longer track vulnerabilities or send patches to the users. More distressing still, some of the worst laggards, by these measures, are battleground states. Florida gets an F, judged as “incomplete” or “unsatisfactory” on six of seven security metrics. Pennsylvania and Arizona get D’s. Iowa, Michigan, Nevada, Virginia, and Wisconsin get C’s. No state gets an A. Just 10 get B’s.” https://slate.com/news-and-politics/2018/02/americas-voting-systems-are-still-dangerously-vulnerable-to-hacking.html

America’s Voting Systems Are Still Dangerously Vulnerable to Hackers Russian interference in the next election could be even more damaging. slate.com

@KanekoaTheGreat - KanekoaTheGreat

#37 New York Times: I Hacked an Election. So Can the Russians. (April 5, 2018) “After the chaos of the 2000 election, we were promised a modern and dependable way to vote, Halderman says in the video. “I’m here to tell you that the electronic voting machines Americans got to solve the problem of voting integrity - they turned out to be an awful idea. That’s because people like me can hack them all too easily. Our highly computerized election infrastructure is vulnerable to sabotage and even to cyberattacks that could change votes. Halderman has testified before Congress on the issue. He says that while it’s promising that the Senate Intelligence Committee has recently shown some understanding of the problem, states must act too. Step 1: Buy a voting machine on eBay, or if you are the North Koreans, hack the manufacturer and steal their software code. Step 2: Write a virus. Step 3: Email your virus to every election official responsible for programming the voting machines with new ballots. Many of these officials are easy to find online. Step 4: Sip coffee and wait. Step 5: Hijack the ballot programming and let the election officials copy your invisible malicious code onto the voting machines. Step 6: Watch your code silently steal votes... What chance do the people running your local elections really have against Russia or North Korea?” https://www.nytimes.com/video/opinion/100000005790489/i-hacked-an-election-so-can-the-russians.html

Video Transcript AI Summary
Cybersecurity experts agree that electronic voting machines are dangerous and obsolete. These machines can be easily hacked, as demonstrated by a computer scientist who has hacked multiple machines and even turned one into a video game console. The vulnerability of these machines puts our election infrastructure at risk of sabotage and cyberattacks. In the 2016 election, millions of Americans voted on paperless electronic machines. The speaker reveals a step-by-step process for hacking these machines and stealing votes. The solution proposed is to use paper ballots, which can be quickly scanned and verified by humans. It is emphasized that all elections should be run with paper ballots and audits. The importance of having a paper backup system is highlighted. The concise transcript emphasizes the need to replace electronic voting machines with paper ballots for secure and reliable elections.
Full Transcript
Speaker 0: All cybersecurity experts who have given electronic voting machines any thought agree. These machines have got to go. To show you why, I'm running a mock election using the same dangerous and Obsolete machines still in use today. Our election will find out whether Michigan students prefer their own university or our archrival, Ohio State. Speaker 1: Here we are. Speaker 0: After the chaos of the 2000 election, we were promised a modern and dependable way to vote. I'm here to tell you that the electronic voting machines Americans got to solve of the problem of voting integrity? They turned out to be an awful idea. Speaker 1: One vote for McCain. Speaker 0: That's because people like me can hack them all too easily. I'm a computer scientist who has hacked a lot of electronic voting machines. I even turned 1 machine into a video game console. Imagine what the Russians and North Koreans can do. I've even gone to congress to raise the alarm. Our highly computerized election infrastructure is vulnerable to sabotage and even to cyberattacks that could change votes. This is the same electronic voting machine used in Georgia, In parts of Indiana, Kansas, Kentucky, Mississippi, Tennessee, Texas and even in swing states like Virginia, Florida In Pennsylvania, millions of Americans voted on paperless electronic voting machines in the 2016 election. 100% Michigan. 100% Michigan. Obviously, Michigan. Michigan. Michigan. But here's a little secret between you and me. I've already hacked these Forkless machines. Step 1, buy a voting machine on Ebay. Or if you're the North Koreans, hack Hack the manufacturer and steal their software code. Step 2, write a virus. Step 3, Email your virus to every election official responsible for programming the voting machines with new ballots. Many of these officials are easy to find online. Step 4, sip coffee and wait. Step 5, hijack the ballot programming and let the election officials copy your invisible malicious code onto the voting machines. Step 6, watch your code Silently steal votes. Speaker 1: Alright. Here are the results from the electronic voting machines. Ohio State wins 131 to 108. Speaker 0: There's a good reason we computer scientists are paranoid. It's a golden age for hackers. The computer virus that destroyed Iranian nuclear equipment. Is One of the largest data breaches in history More than 1,000,000,000 of its accounts were hacked. What chance do the people running your local elections really have against Russia or North Korea. Speaker 1: Okay, everyone. I hacked the voting machines. I do have the real results because we also counted on paper. Michigan wins. Speaker 0: Michigan won in a landslide. And I can say this confidently because I have the real results from the safest and simplest solution, paper ballots. Yes. Speaker 1: We need to take a hard look at the equipment that actually records and reports votes. Speaker 0: Even though the Senate Intelligence Committee is finally showing some understanding of Standing of the problem, it's not enough. All states in this country, the people ultimately responsible for how we vote, Must act 2. In a real election, an official could quickly scan these paper ballots and shortly after have a human Verify the results. Paper plus audits. All elections should be run this way. But if you don't wanna believe me or every single expert in cybersecurity who's thought this through, then take it from this guy. Speaker 1: It's old fashioned, But it's always good to have a paper backup system of voting. It's called paper.
Video: Opinion | I Hacked an Election. So Can the Russians. It’s time America’s leaders got serious about voting security. nytimes.com

@KanekoaTheGreat - KanekoaTheGreat

#38 The New Yorker: America Continues To Ignore Risks of Election Hacking (April 18, 2018) “America’s voting systems are hackable in all kinds of ways. As a case in point, in 2016, the Election Assistance Commission, the bipartisan federal agency that certifies the integrity of voting machines, and that will now be tasked with administering Congress’s three hundred and eighty million dollars, was itself hacked. The stolen data—log-in credentials of E.A.C. staff members—were discovered, by chance, by employees of the cybersecurity firm Recorded Future, whose computers one night happened upon an informal auction of the stolen passwords. Another case to consider: the Department of Homeland Security recently discovered a number of rogue cell phone simulators—technical tools that are commonly called “Stingrays”—in Washington, D.C., and has been unable to identify who was operating them…As a pair of Princeton computer scientists, Andrew Appel and Kyle Jamieson, have pointed out, cell phone simulators, which mimic legitimate cell towers, happen also to be handy and inexpensive vote-hacking devices. On the Freedom to Tinker blog, Appel and Jamieson have posted easy-to-follow diagrams showing how the transmission of voting information from polling places could be intercepted by a Stingray and surreptitiously altered before being sent on to its intended destination, a central tabulating computer. The voting machine that Appel and Jamieson picked to illustrate this hypothetical “man-in-the-middle” attack was the DS200, a popular optical-scan voting machine that reads marked paper ballots, made by a company called Election Systems & Software… As of 2015, forty-three states and the District of Columbia were using machines that are no longer in production. Some of these machines are so old that their operating systems can’t be patched when security flaws are found, and replacement parts must be scrounged up on eBay…Software vulnerabilities, unreliable tabulators, and unprotected memory cards have left voting systems open to exploitation ever since electronic machines were introduced.” https://www.newyorker.com/news/news-desk/america-continues-to-ignore-the-risks-of-election-hacking

America Continues to Ignore the Risks of Election Hacking Sue Halpern writes about the risks that hacking and faulty equipment pose to U.S. elections in advance of the 2018 midterm elections. newyorker.com

@KanekoaTheGreat - KanekoaTheGreat

#39 Reuters: Old voting machines stir concerns among U.S. officials (May 31, 2018) “In 14 of the 40 most competitive races, Americans will cast ballots on voting machines that do not provide a paper trail to audit voters’ intentions if a close election is questioned… These include races in Pennsylvania, New Jersey, Texas, Florida, Kansas, and Kentucky. Nationwide, of 435 congressional seats up for grabs, 144 are in districts where some or all voters will not have access to machines using paper records, the analysis shows… Most of the dozen-plus state and local election officials interviewed by Reuters said they worry about bad actors hacking the older electronic voting machines to alter ballots, and then being unable to verify the results because there will be no paper trail. But the officials worry most about voters losing trust in elections because officials would not be able to visibly demonstrate that the tally was indeed accurate.” https://www.reuters.com/article/us-usa-election-votingmachines-idUSKCN1IW16Z

Ahead of November election, old voting machines stir concerns among U.S. officials U.S. election officials responsible for managing more than a dozen close races this November share a fear: Outdated voting machines in their districts could undermine confidence in election results that will determine which party controls the U.S. Congress. reuters.com

@KanekoaTheGreat - KanekoaTheGreat

#40 Axios: There's more than one way to hack an election (July 2, 2018) “Here are the systems at risk in the election process: voter registration systems, voter registration databases (which the voter registration process produces), voter records at polling places (known as poll books, which exist in both printed and electronic versions), voting machines (which capture the votes), vote tabulation (when the votes are tallied)… Many parts of election systems are at risk of being exposed to the internet — and thereby potentially being inappropriately accessed or meddled with — because of human error or bad security protocols. Here are some of the main points of risk: registration interfaces, voter registration databases, electronic poll books, printed poll books, voting machines, electronic vote tabulation, optical scan vote tabulation, and election management systems.” https://www.axios.com/2018/07/02/be-smart-there-is-more-than-one-way-to-hack-an-election-1529424861

There's more than one way to hack an election The vulnerabilities of our election system resemble "Swiss cheese," one expert says. axios.com

@KanekoaTheGreat - KanekoaTheGreat

#41 Newsweek: Election Hacking: Voting-Machine Supplier Admits It Used Hackable Software Despite Past Denials (July 17, 2018) “One of the country's largest voting machine makers has admitted in a letter to a U.S. senator that some of its past election-management systems had remote-access software preinstalled, despite past denials that any of its systems were equipped with such software. Election Systems and Software (ES&S) told Democratic Senator Ron Wyden of Oregon in an April letter that has now been released, first reported by Vice News and later obtained by Newsweek, that the company provided election equipment with remote connection software to an unspecified number of states from 2000 to 2006. "Prior to the inception of the [Election Assistance Commission] testing and certification program and the subsequent requirement for hardening and at customer's request, ES&S provided pcAnywhere remote connection software on the [Election-Management System] workstation to a small number of customers between 2000 and 2006," wrote Tom Burt, ES&S president.” Wyden told Vice the decision to sell any voting system with remote-access software, leaving equipment possibly vulnerable to hacking, was "the worst decision for security short of leaving ballot boxes on a Moscow street corner." https://www.newsweek.com/election-hacking-voting-machines-software-1028948

Past Voting Systems Had Remote-Access Software Senator Ron Wyden said the decision to sell voting systems with remote-access software, leaving equipment possibly vulnerable to hacking, was "the worst decision for security short of leaving ballot newsweek.com

@KanekoaTheGreat - KanekoaTheGreat

#42 Salon: Remote-access allowed: Voting machine company admits installing vulnerable software (July 20, 2018) “A letter sent to Congress reveals that, between 2000 and 2006, one of America's top voting machine companies installed remote-access software in their products that made it possible for them to be manipulated by third parties. In the letter, Election Systems and Software admitted that it had "provided pcAnywhere remote connection software … to a small number of customers between 2000 and 2006." As The Verge notes, "pcAnywhere’s security vulnerabilities have been well-documented in the past": In 2006, hackers stole the source code for pcAnywhere and then stayed quiet until 2012, when a hacker published part of the code online. Symantec, which distributed pcAnywhere, knew vaguely of the theft back in 2006 but only spoke up about it after the code leaked, along with the warning that users should disable or uninstall the software. At the same time, security researchers studied pcAnywhere’s code and found a vulnerability that could let a hacker take control of a whole system and bypass the need to enter a password.” https://www.salon.com/2018/07/20/remote-access-allowed-voting-machine-company-admits-installing-vulnerable-software/

Remote-access allowed: Voting machine company admits installing vulnerable software Election hacking: Despite previous denials, top vendor admits it sold systems with remote access to states salon.com

@KanekoaTheGreat - KanekoaTheGreat

#43 BBC: Hacking the US mid-terms? It's child's play (Aug. 11, 2018) “Bianca Lewis, 11, has many hobbies. She likes Barbie, video games, fencing, singing… and hacking the infrastructure behind the world’s most powerful democracy…She’s taking part in a competition organized by R00tz Asylum, a non-profit organization that promotes “hacking for good” …Its aim is to send out a dire warning: the voting systems that will be used across America for the mid-term vote in November are, in many cases, so insecure a young child can learn to hack them with just a few minute’s coaching.” https://www.bbc.com/news/technology-45154903

Hacking the US mid-terms? It's child's play Security experts say the US voting system is vulnerable to cyber-attack. How vulnerable? Let these 11 year olds show you. bbc.com

@KanekoaTheGreat - KanekoaTheGreat

#44 PBS: An 11-year-old changed election results on a replica Florida state website in under 10 minutes (Aug. 12, 2018) “An 11-year-old boy on Friday was able to hack into a replica of the Florida state election website and change voting results found there in under 10 minutes during the world’s largest yearly hacking convention, DEFCON 26, organizers of the event said. “These are very accurate replicas of all of the sites,” Sell told the PBS NewsHour on Sunday. “These things should not be easy enough for an 8-year-old kid to hack within 30 minutes; it’s negligent for us as a society.” https://www.pbs.org/newshour/nation/an-11-year-old-changed-election-results-on-a-replica-florida-state-website-in-under-10-minutes

An 11-year-old changed election results on a replica Florida state website in under 10 minutes An 11-year-old on Friday was able to hack into a replica of the Florida state election website and change voting results found there in under 10 minutes. pbs.org

@KanekoaTheGreat - KanekoaTheGreat

#45 The Guardian: Why US elections remain 'dangerously vulnerable' to cyber-attacks (Aug. 13, 2018) “By mid-evening, Jon Ossoff, the leading Democrat, had 50.3% of the vote, enough to win outright without the need for a run-off against his closest Republican challenger. Then Marks noticed that the number of precincts reporting in Fulton County, encompassing the heart of Atlanta, was going down instead of up. Soon after, the computers crashed. Election officials later blamed a “rare error” with a memory card that didn’t properly upload its vote tallies. When the count resumed more than an hour later, Ossoff was suddenly down to 48.6% and ended up at 48.1%… Georgia’s 15-year-old all-electronic voting system was almost impossible to audit because it produced no independently verifiable paper trail to check against the computer-generated tallies. Cybersecurity experts have warned for years that malfeasance, technical breakdown, or administrative incompetence could easily wreak havoc with electronic systems and could go largely or wholly undetected. “Virtually every American voter has come to understand that the nation’s election infrastructure is susceptible to malicious manipulation from local and foreign threats,” the suit reads. “Yet, Georgia’s election officials continue to defend the state’s electronic voting system that is demonstrably unreliable and insecure, and have repeatedly refused to take administrative, regulatory or legislative action to address the election security failures.” https://www.theguardian.com/us-news/2018/aug/13/us-election-cybersecurity-hacking-voting

Why US elections remain 'dangerously vulnerable' to cyber-attacks Officials have dragged their feet on updating machines and securing data – and a climate of fear could undermine voter confidence theguardian.com

@KanekoaTheGreat - KanekoaTheGreat

#46 The Guardian: Kids at hacking conference show how easily US elections could be sabotaged (Aug. 22, 2018) “The risk of a hacker casting the validity of an election into question through one of any number of other entry points is huge, and the actual difficulty of such an attack is child’s play. Literally. “The most vulnerable part of election infrastructure is the websites,” explained the security expert Jake Braun… Unlike a voting machine, Braun explains, websites represent a compelling target because they are, by their nature, connected to the internet 24/7. And, whether they are used for voter registration, online campaigning, or announcing the results at the end of the election, they can be used to sow havoc…Armed with facsimiles of the websites of 13 battleground states and a child-friendly guide to basic hacking techniques, the kids were set loose on critical infrastructure – and proceeded to tear it apart… “The No 1 thing we found last year wasn’t a hack at all; it was the fact that we opened up the back of the machine, and of course, no surprise, all the parts are made across the world, especially China. This isn’t conjecture; this isn’t my dystopian fantasy world; this is something we know they do …The fragmentation argument is absolute horseshit because once you’re in the chips, you can hack whole classes of machines, nationwide, from the fucking Kremlin.”… The bad actor just needs to steal enough votes in a few counties in America’s battleground states – just enough to swing a close election…“I’ve only one conclusion,” said Schürmann: “Use paper and do your audits.” https://www.theguardian.com/technology/2018/aug/22/us-elections-hacking-voting-machines-def-con

Kids at hacking conference show how easily US elections could be sabotaged Changing recorded votes would be difficult for bad actors. But at Def Con in Las Vegas, children had no trouble finding another point of entry theguardian.com

@KanekoaTheGreat - KanekoaTheGreat

#47 CBS: Why voting machines in the U.S. are easy targets for hackers (Sept. 19, 2018) “Tens of thousands of voting machines in the United States are vulnerable to hacking. They have been successfully dismantled and attacked by security researchers for years to demonstrate their flaws. In 2017, at the annual Defcon hackers conference, one tech professor from the University of Copenhagen was able to penetrate an Advanced Voting Solutions machine in about 90 minutes. The attackers were able to access the administrator mode, allowing them to potentially alter voting data. At this year's conference, a group of hackers was able to crack one in 15 minutes. One hacker told CNET: "Should you be trusting your vote with these? I don't think so." "They're running Windows. They have USB ports. They're actual computers and are very susceptible to attacks," says Cris Thomas, the global strategy lead for IBM's X-Force cybersecurity team.” Optical scan ballot machines are vulnerable to hacking — all electronic devices are — but most cybersecurity experts are more concerned with electronic machines. Voting results are stored on the machine's internal storage. If the voting data is not encrypted or improperly configured, with little effort, a bad actor could access the memory and alter the voting results… The results go from [the voting machine] into a piece of electronics that takes it to the central counting place. That data is not encrypted, and that's vulnerable for manipulation.” https://www.cbsnews.com/news/why-voting-machines-in-the-u-s-are-easy-targets-for-hackers/

Why voting machines in the U.S. are easy targets for hackers Cybersecurity experts say the goal is to undermine confidence in the U.S. electoral system. cbsnews.com

@KanekoaTheGreat - KanekoaTheGreat

#48 New York Times: The Crisis of Election Security (Sept. 26, 2018) The Illinois intruders had quietly breached the network in June and spent weeks conducting reconnaissance. After alighting on the state’s voter registration database, they downloaded information on hundreds of thousands of voters… In early August, Jenkins learned of another breach, this one on an Arizona state website, and it appeared to come from one of the same I.P. addresses that had been used to attack Illinois. This time, the intruders installed malware as if setting the stage for further assault. Then reports from other states began to pour in, saying that the same I.P. addresses appeared to be probing their voter-registration networks… The entire system — a Rube Goldberg mix of poorly designed machinery, from websites and databases that registered and tracked voters, to electronic poll books that verified their eligibility, to the various black-box systems that recorded, tallied, and reported results — was vulnerable…They don’t address core vulnerabilities in voting machines or the systems used to program them. And they ignore the fact that many voting machines that elections officials insist are disconnected from the internet — and therefore beyond the reach of hackers — are in fact accessible by way of the modems they use to transmit vote totals on election night. Add to this the fact that states don’t conduct robust postelection audits — a manual comparison of paper ballots to digital tallies is the best method we have to detect when something has gone wrong in an election — and there’s a good chance we simply won’t know if someone has altered the digital votes in the next election… How did our election system get so vulnerable, and why haven’t officials tried harder to fix it? The answer, ultimately, comes down to politics and money: The voting machines are made by well-connected private companies that wield immense control over their proprietary software, often fighting vigorously in court to prevent anyone from examining it when things go awry. In Ohio in 2004, for example, where John Kerry lost the presidential race following numerous election irregularities, Kerry’s team was denied access to the voting-machine software. “We were told by the court that you were not able to get that algorithm to check it, because it was proprietary information,” Kerry recalled in a recent interview on WNYC’s “Brian Lehrer Show.” He was understandably rueful, arguing how wrong it was that elections are held under “the purview of privately owned machines, where the public doesn’t have the right to know whether the algorithm has been checked or whether they’re hackable or not. And we now know they are hackable.” …There are roughly 350,000 voting machines in use in the country today, all of which fall into one of two categories: optical-scan machines or direct-recording electronic machines. Each of them suffers from significant security problems. With optical-scan machines, voters fill out paper ballots and feed them into a scanner, which stores a digital image of the ballot and records the votes on a removable memory card. The paper ballot, in theory, provides an audit trail that can be used to verify digital tallies. But not all states perform audits, and many that do simply run the paper ballots through a scanner a second time. Fewer than half the states do manual audits, and they typically examine ballots from randomly chosen precincts in a county, instead of a percentage of ballots from all precincts. If the randomly chosen precincts aren’t ones where hacking occurred or where machines failed to accurately record votes, an audit won’t reveal anything — nor will it always catch problems with early-voting, overseas, or absentee ballots, all of which are often scanned in county election offices, not in precincts. Voters use touch screens or other input devices to make selections on digital-only ballots, and votes are stored electronically. Many D.R.E.s have printers that produce what’s known as a voter-verifiable paper audit trail — a scroll of paper, behind a window, that voters can review before casting their ballots. But the paper trail doesn’t provide the same integrity as full-size ballots and optical-scan machines, because a hacker could conceivably rig the machine to print a voter’s selections correctly on the paper while recording something else on the memory card. About 80 percent of voters today cast ballots either on D.R.E.s that produce a paper trail or on scanned paper ballots. But five states still use paperless D.R.E.s exclusively, and an additional 10 states use paperless D.R.E.s in some jurisdictions…More than a dozen companies currently sell voting equipment, but a majority of machines used today come from just four — Diebold Election Systems, Election Systems & Software (ES&S), Hart InterCivic and Sequoia Voting Systems. Diebold (later renamed Premier) and Sequoia are now out of business. Diebold’s machines and customer contracts were sold to ES&S and a Canadian company called Dominion, and Dominion also acquired Sequoia. This means that more than 80% of the machines in use today are under the purview of three companies — Dominion, ES&S, and Hart InterCivic. Many of the products they make have documented vulnerabilities and can be subverted in multiple ways. Hackers can access voting machines via the cellular modems used to transmit unofficial results at the end of an election, or subvert back-end election-management systems — used to program the voting machines and tally votes — and spread malicious code to voting machines through them. Attackers could design their code to bypass pre-election testing and kick in only at the end of an election or under specific conditions — say, when a certain candidate appears to be losing — and erase itself afterward to avoid detection. And they could make it produce election results with wide margins to avoid triggering automatic manual recounts in states that require them when results are close. Hackers could also target voting-machine vendors and use this trusted channel to distribute their code. Last year a security researcher stumbled across an unsecured ES&S server that left passwords exposed for its employee accounts. Although the passwords were encrypted, a nation-state with sufficient resources would most likely be able to crack them, the researcher noted. Since ES&S creates ballot-definition files before each election for some customers — the critical programming files that tell machines how to apportion votes based on a voter’s screen touch or marks on a paper ballot — a malicious actor able to get into ES&S’s network could conceivably corrupt these files so machines misinterpret a vote for Donald Trump, say, as one for his opponent, or vice versa. The Department of Homeland Security, the intelligence community, and election officials have all insisted that there is no evidence that Russian hackers altered votes in 2016. But the truth is that no one has really looked for evidence. Intelligence assessments are based on signals intelligence — spying on Russian communications and computers for chatter or activity indicating that they altered votes — not on a forensic examination of voting machines and election networks. “We should always be careful to point out that there hasn’t been any evidence that votes were changed in any election in this way, and that’s a true fact,” said Matt Blaze, a computer-science professor at the University of Pennsylvania and a voting-machine-security expert. “It’s just less comforting than it might sound at first glance because we haven’t looked very hard.” Even if experts were to look, it’s not clear what they would find, he added. “It’s possible to do a pretty good job of erasing all the forensic evidence.” …At 10 p.m., Al Gore was ahead in Volusia, with 83,000 votes to George W. Bush’s 62,000. Things were going well for Gore across the state, and exit polls projected a six-point lead for him. But then something changed. “I had stepped out, and one of the assistants came, and he’s just like, ‘I need you to come here and verify the numbers,’ ” Tannenbaum recalled. When she looked at the county’s website, Gore’s total had dropped 16,000 votes. Tannenbaum called the county election office, alarmed. “I don’t know what’s going on down there, but you can’t take away votes!” she said. The mysterious drop would later be traced to Precinct 216, a community center in DeLand, where Gore’s total was showing negative 16,022 votes. It wasn’t the only mathematical absurdity in the tally. A Socialist Workers Party candidate named James Harris had 9,888 votes. But the DeLand precinct had only 585 registered voters, and only 219 of them cast ballots at the center that day. Volusia officials blamed the mishap on a faulty memory card. The county used optical-scan machines made by Global Election Systems (a Canadian company later acquired by Diebold and renamed Diebold Election Systems), which the county had used since 1996. When the election ended, poll workers were supposed to transmit results to the county election office via modem; but the transmission failed, so a worker drove the memory card in, where officials inserted it directly into the election-management system to tally results. Logs for that computer, however, showed two memory cards for Precinct 216 inserted, an hour apart. The vote totals went haywire after the second card was loaded. Beyond the mystery of the two cards, there was another problem with this explanation. A faulty memory card should produce an onscreen error message or cause a computer to lock up, not alter votes in one race while leaving others untouched. And what kind of faulty card deleted votes only for Gore, while adding votes to other candidates?" https://web.archive.org/web/20181010024836/https://www.nytimes.com/2018/09/26/magazine/election-security-crisis-midterms.html

The Crisis of Election Security As the midterms approach, America’s electronic voting systems are more vulnerable than ever. Why isn’t anyone trying to fix them? web.archive.org

@KanekoaTheGreat - KanekoaTheGreat

#49 Politico: Attack on commonly used voting machine could tip an election (Sept. 27, 2018) “A malicious hacker could alter the outcome of a U.S. presidential election by taking advantage of numerous flaws in one model of vote-tabulating machine used in 26 states, cybersecurity experts warned in a report presented Thursday at the Capitol… The biggest flaw in the process we found is even when we identify flaws, they don't get fixed… The report says an attacker could remotely gain access to the Model 650 tabulating machine manufactured by Election Systems and Software, one of the country's largest sellers of voting equipment, by exploiting numerous vulnerabilities in the unit. Researchers also said this model has an unpatched vulnerability that the manufacturer was notified about a decade ago… The event organizers said the Model 650 vote-tabulation vulnerabilities are especially problematic because states use the machines to process ballots for entire counties. "Hacking just one of these machines could enable an attacker to flip the Electoral College and determine the outcome of a presidential election," the report says.” https://www.politico.com/story/2018/09/27/hacking-voting-machines-814504

Attack on commonly used voting machine could tip an election, researchers find Voting machine vendors and state election officials have often dismissed such warnings as alarmist, saying they don’t reflect real-world situations. politico.com

@KanekoaTheGreat - KanekoaTheGreat

#50 WSJ: Voting Machine Used in Half of U.S. Is Vulnerable to Attack (Sept. 27, 2018) “Election machines used in more than half of U.S. states carry a flaw disclosed more than a decade ago that makes them vulnerable to a cyberattack, according to a report to be delivered Thursday on Capitol Hill. The issue was found in the widely used Model 650 high-speed ballot-counting machine made by Election Systems & Software LLC, the nation’s leading manufacturer of election equipment. It is one of about seven security problems in several models of voting equipment described in the report, which is based on research conducted last month at the Def Con hacker conference. The flaw in the ES&S; machine stood out because it was detailed in a security report commissioned by Ohio’s secretary of state in 2007, said Harri Hursti, an election-security researcher who co-wrote both the Ohio and Def Con reports. “There has been more than plenty of time to fix it,” he said…Earlier this month, the National Academies of Sciences, Engineering, and Medicine recommended U.S. states move away from voting machines that don’t include paper ballots…Election security researchers and politicians aren’t convinced ES&S; is doing enough. The company hasn’t adopted common internet security standards that secure against phishing attacks and make it harder to intercept messages, according to staffers for Sen. Ron Wyden (D., Ore.).” https://www.wsj.com/articles/widely-used-election-systems-are-vulnerable-to-attack-report-finds-1538020802

Voting Machine Used in Half of U.S. Is Vulnerable to Attack, Report Finds The flaw in Election Systems & Software’s Model 650 high-speed ballot-counting machine was detailed in 2007 wsj.com

@KanekoaTheGreat - KanekoaTheGreat

#51 CNN: Hackers Bring Stark Warning About Election Security (Sept. 27, 2018) “The vulnerabilities in America’s voting systems are “staggering,” a group representing hackers warned lawmakers on Capitol Hill on Thursday – just over a month before the midterm elections. The hacking group claims they were able to break into some voting machines in two minutes and that they had the ability to wirelessly reprogram an electronic card used by millions of Americans to activate a voting terminal to cast their ballot. “This vulnerability could be exploited to take over the voting machine on which they vote and cast as many votes as the voter wanted,” the group claims in the report…A voting tabulation machine the group says is used in more than two dozen states is vulnerable to being remotely hacked, they said, claiming, “hacking just one of these machines could enable an attacker to flip the Electoral College and determine the outcome of a presidential election.” https://www.cnn.com/2018/09/27/politics/hackers-warning-midterm-elections/index.html

Video Transcript AI Summary
Former White House liaison to homeland security under President Obama, Jake, reveals how easy it was for children to hack into mock election board websites. An 11-year-old girl managed to take over a mock Florida website in under 10 minutes, altering election results. As the weekend progressed, the kids became more creative, changing names to things like "Bob the Builder" and causing further disruptions. Jake explains that the challenge was not given to adult hackers because it was deemed too easy for them. Around 50 kids participated, with almost all of them successfully changing election results or manipulating the webpage in some way.
Full Transcript
Speaker 0: The former White House liaison to homeland security under president Obama. So, Jake, I understand you had children hacking into mock election board websites. Just how easy was it? What were they able to do? Speaker 1: Well, first of all, thanks for having me, Anna. The The 1st kid got in. It was an 11 year old girl. She got in and took over the Kind of mock, Florida website in under 10 minutes and was able to change election results, And and, you know, change the winners and losers and all that stuff. By the end of the weekend, the kids were, you know, changing people's names to, like, Bob the Builder and And, and all that kind of stuff coming up with some pretty, creative things to do to to mess with the election results. Speaker 0: You're saying children were able to do this? Speaker 1: Yeah. So the the unfortunately, it's so easy to do That we didn't put, this particular challenge in the main room where the adult hackers are hacking into voting machines because it's so easy, to hack into these websites, that they wouldn't find it interesting or fun or challenging. So we decided to give it to kids to do. And so we had about 50 kids doing it and almost all of them were able to get in and and change election results or or something else on the page.
Hackers bring stark warning about election security to Capitol Hill ahead of midterms | CNN Politics The vulnerabilities in America’s voting systems are “staggering,” a group representing hackers warned lawmakers on Capitol Hill on Thursday – just over a month before the midterm elections. cnn.com

@KanekoaTheGreat - KanekoaTheGreat

#52 Wired: Voting Machines Are Still Absurdly Vulnerable to Attacks (Sept. 28, 2018) “The report details vulnerabilities in seven models of voting machines and vote counters, found during the DefCon security conference's Voting Village event. All of the models are in active use around the US, and the vulnerabilities—from weak password protections to elaborate avenues for remote access— number in the dozens… "We didn't discover a lot of new vulnerabilities," says Matt Blaze, a computer science professor at the University of Pennsylvania and one of the organizers of the Voting Village, who has been analyzing voting machine security for more than 10 years. "What we discovered was vulnerabilities that we know about are easy to find, easy to re-engineer, and have not been fixed over the course of more than a decade of knowing about them. And to me, that is both the unsurprising and terribly disturbing lesson that came out of the Voting Village."… One device, the "ExpressPoll-5000," has the root password of "password." The administrator password is "pasta."… Many of the machines participants analyzed during the Voting Village run software written in the early 2000s or even the 1990s. Some vulnerabilities detailed in the report were disclosed years ago and still haven't been resolved. In particular, one ballot counter made by Election Systems & Software, the Model 650, has a flaw in its update architecture first documented in 2007 that persists. Voting Village participants also found a network vulnerability in the same device—which 26 states and the District of Columbia all currently use.” https://www.wired.com/story/voting-machine-vulnerabilities-defcon-voting-village/

Voting Machines Are Still Absurdly Vulnerable to Attacks A new report details dozens of vulnerabilities across seven models of voting machines—all of which are currently in use. wired.com

@KanekoaTheGreat - KanekoaTheGreat

#53 Slate: Can Paper Ballots Save Our Democracy? (Oct. 10, 2018) “The machine was an AccuVote TSX used in 18 states, some with the same software version. Attackers don't need physical access--we showed how malicious code can spread from the election office when officials program the ballot design… The Center for American Progress recently released a study that highlighted that 42 states use electronic voting machines with software a decade old or more, that leaves them especially vulnerable to hacking and malware. What’s more, five states rely solely on machines that leave no paper trail, and another 10 will use them in at least some districts. These paperless voting machines are especially problematic because even if such a machine were known or suspected to have been hacked, there’s no physical backup ballot to check it against—and therefore no way to determine for certain whether the vote an individual cast matched with the vote that the machine recorded. Worse still, some of the states with the poorest voting system security are also electoral heavyweights, including Georgia, Texas, Pennsylvania, and Florida…A growing number of voting-rights advocates and cybersecurity experts—among them organizations like the National Academies of Sciences, Engineering, and Medicine and Verified Voting—feel that the way forward is in a return to the past: paper ballots.” https://slate.com/technology/2018/10/paper-ballots-voting-machines-midterm-election-security-russian-hacking.html

Should You Request a Paper Ballot to Keep Your Vote Secure From Hackers? Amid fears of voting-machine hacks, some election-security experts are advocating for a return to the past. slate.com

@KanekoaTheGreat - KanekoaTheGreat

#54 New York Times: America's Elections Could Be Hacked. Go Vote Anyway. (Oct. 19, 2018) "In April, the nation’s top voting machine manufacturer told Senator Ron Wyden of Oregon that it had installed remote-access software on election-management systems that it sold from 2000 to 2006. Senator Wyden called it “the worst decision for security short of leaving ballot boxes on a Moscow street corner.” At a hacking convention last summer, an 11-year-old boy who had been coached on finding the vulnerabilities in a mock-up of Florida’s state election website broke into the fake site and altered the vote totals recorded there. It took him less than 10 minutes…America’s voting systems, like all large and complex computerized systems, are highly vulnerable to cyberattack — whether by altering or deleting voter registration data, or even by changing vote counts. “The vast majority of technical infrastructure for our voting is absolutely, without doubt, woefully insecure,” said Matt Blaze, a University of Pennsylvania computer-science professor who studies voting machine security. Both of the primary methods by which Americans cast their ballots — optical-scan machines and touch-screen monitors — can be tampered with fairly easily… One, provide a paper trail for every vote. Hackers work most effectively in the dark, so they love voting machines that produce no paper verification. Currently, five states — Delaware, Georgia, Louisiana, New Jersey, and South Carolina — run their elections entirely on paperless touch-screen machines. But all five states are considering a switch back to paper ballots in time for 2020. In this year’s midterms, 19 states and Washington, D.C., will use only paper ballots. Two, audit the vote." https://web.archive.org/web/20181118161745/https://www.nytimes.com/2018/10/19/opinion/midterm-elections-hacking.html

Opinion | America’s Elections Could Be Hacked. Go Vote Anyway. The system’s vulnerabilities are real, but please do not stay home. web.archive.org

@KanekoaTheGreat - KanekoaTheGreat

#55 Vox: The hacking threat to the midterms is huge. (Oct. 25, 2018) "On a scale of 1 to 10, with 10 being the Pentagon’s [security measures], elections have probably moved from a 2 to a 3… They laid out a number of scenarios that could exploit vulnerable election infrastructure: names deleted from voter registration databases; e-poll books that send voters to the wrong precinct; malware that corrupts ballot-definition files for machines or software that governs vote tabulation, before it’s installed in various counties and precincts; or corrupted public-facing websites to announce a false winner on election night… These private companies “represent an enticing target [f]or malicious cyber actors,” according to the Senate Intelligence Report. Yet the report admits that state and federal authorities continue to “have very little insight into the cybersecurity practices of many of these vendors…Today, the American elections industry today is dominated by three companies: Dominion, Hart InterCivic, and, the largest, Election Systems and Software (ES&S). If you voted in the past 10 years, the chances are good that you used these machines (92 percent of voters do), or the myriad supportive technology required to stage an election… Much of the criticism has been directed at digital voting machines, called DREs. But election offices have become increasingly digital in other, less obvious ways: Adopting e-poll books; hauling voter registration information into state-run or third-party databases; proffering all-in-one election management suites, which program the machines and tabulate the outcomes; and building internet-based services for voters, like the precinct tally program in Knox County…  But other experts say this insistence overlooks the sophistication of nation-state attackers, who can find other creative methods for intrusion — infected USB drives, modem access, remote-access software — or, of course, infiltrating the company networks themselves, engineering direct upload malware through regular software updates…Public security audits of election technology are rare; the last major ones, commissioned by California and Ohio in 2007, were scathing. And the companies have often seemed committed to avoiding them, with one even threatening Princeton University researchers with lawsuits… In a public statement, Sen. Kamala Harris’s (D-CA) office called it “unacceptable that ES&S continues to dismiss the very real security concerns that Def Con raised.”…Two of the three largest vendors, ES&S and Hart, are owned by private equity companies whose agendas are unclear; Dominion’s headquarters isn’t even American, but Canadian… Many of the vulnerabilities election vendors have patched were previously unknown to them, instead pointed out by others. Earlier this year, security consultants flagged a “Client Web Portal” page for Dominion Voting that lacked SSL encryption. And last year, ES&S unwittingly exposed data for roughly 1.8 million Illinois voters on an Amazon server it controlled, a breach that included ES&S employee’s passwords — encrypted, but potentially crackable by an advanced adversary.” https://www.vox.com/2018/10/25/18001684/2018-midterms-hacked-russia-election-security-voting

The hacking threat to the midterms is huge. And technology won’t protect us. An investigation into the US election system reveals frightening vulnerabilities at almost every level. vox.com

@KanekoaTheGreat - KanekoaTheGreat

#56 Scientific American: The Vulnerabilities of Our Voting Machines (Nov. 1, 2018) “This just isn’t a good idea to have elections be conducted by, essentially, black box technology.”…The voting machines themselves have received much, much, much less scrutiny post-2016 from intelligence and defensive sides—as far as we know in the public sphere anyway. To my knowledge, no state has done any kind of rigorous forensics on their voting machines to see whether they had been compromised… One possibility is that attackers could infiltrate what are called election-management systems. These are small networks of computers operated by the state or the county government or sometimes an outside vendor where the ballot design is prepared…There’s a programming process by which the design of the ballot—the races and candidates, and the rules for counting the votes—gets produced, and then gets copied to every individual voting machine. Election officials usually copy it on memory cards or USB sticks for the election machines. That provides a route by which malicious code could spread from the centralized programming system to many voting machines in the field. Then the attack code runs on the individual voting machines, and it’s just another piece of software. It has access to all of the same data that the voting machine does, including all of the electronic records of people’s votes. So, how do you infiltrate the company or state agency that programs the ballot design? You can infiltrate their computers, which are connected to the internet. Then you can spread malicious code to voting machines over a very large area. It creates a tremendously concentrated target for attack.” https://www.scientificamerican.com/article/the-vulnerabilities-of-our-voting-machines/

The Vulnerabilities of Our Voting Machines Scientific American is the essential guide to the most awe-inspiring advances in science and technology, explaining how they change our understanding of the world and shape our lives. scientificamerican.com

@KanekoaTheGreat - KanekoaTheGreat

#57 Salon: Philly ignores cybersecurity and disability access in voting system selection (Feb. 16, 2019) "According to computer science professor Richard DeMillo of Georgia Tech, the barcodes also can be manipulated to instruct the scanners to flip votes. Adding insult to injury, these barcode systems cost about three times as much as using hand-marked paper ballots and scanners. In addition, despite initial denials, ES&S admitted last year that it has installed remote access software in central tabulators — the county computers that aggregate electronic precinct totals —  in 300 jurisdictions. Although ES&S won’t identify the 300 jurisdictions, a forensic analysis conducted in 2011 of voting equipment in Venango County, PA, revealed that someone had “used a computer that was not a part of the county’s election network to remotely access the [ES&S] central election tabulator computer, illegally, ‘on multiple occasions.’” https://www.salon.com/2019/02/16/philly-ignores-cybersecurity-and-disability-access-in-voting-system-selection_partner/

Philly ignores cybersecurity and disability access in voting system selection The Philadelphia commission has not earned much confidence when it comes to election oversight salon.com

@KanekoaTheGreat - KanekoaTheGreat

#58 Politico: State election officials opt for 2020 voting machines vulnerable to hacking (March 1, 2019) “Security experts warn, however, that hackers could still manipulate the barcodes without voters noticing. The National Academies of Sciences, Engineering, and Medicine has also warned against trusting the barcode-based devices without more research, saying they “raise security and verifiability concerns.”…The replacements, known as ballot-marking devices, are “a relatively new and untested technology,” said J. Alex Halderman, a voting security expert who teaches at the University of Michigan. “And it’s concerning that jurisdictions are rushing to purchase them before even basic questions have been answered.” Many states have adopted what experts call a much more secure option — paper ballots that voters mark with a pen or pencil and that are then scanned and tallied. But election officials in Georgia, Delaware, and Philadelphia have rejected that option in favor of the barcode devices, saying they are secure enough and better suited for many voters with disabilities. Philadelphia city commissioners on Feb. 20 selected a barcode system called the ExpressVote XL from the major vendor Election Systems & Software, despite warnings about the risks. So did Delaware, which in September chose the ExpressVote XL as part of a $13 million overhaul of election equipment. Earlier this week, Georgia lawmakers advanced a bill to approve the barcode devices in a 101-72 vote that split along party lines. Democrats tended to agree with experts who have said the machines are still too vulnerable… The dispute over the ballot-marking devices centers on the fact that they use barcodes, which can be read by scanners but not by humans. Though the paper records also display a voter’s choices in plain text, which the voter can double-check, the barcode is the part that gets tallied. The danger: Hackers who infiltrate a ballot-marking device could modify the barcode so its vote data differs from what’s in the printed text. If this happened, a voter would have no way of spotting it.” https://www.politico.com/story/2019/03/01/election-vulnerable-voting-machines-1198780

State election officials opt for 2020 voting machines vulnerable to hacking The new machines still pose unacceptable risks in an election that U.S. intelligence officials expect to be a prime target for disruption by countries such as Russia and China. politico.com

@KanekoaTheGreat - KanekoaTheGreat

#59 TechCrunch: Senators demand to know why election vendors still sell voting machines with ‘known vulnerabilities’ (March 27, 2019) “The letter, sent Wednesday, calls on election equipment makers ES&S, Dominion Voting, and Hart InterCivic to explain why they continue to sell decades-old machines, which the senators say contain security flaws that could undermine the results of elections if exploited. “The integrity of our elections is directly tied to the machines we vote on,” said the letter sent by Sens. Amy Klobuchar (D-MN), Mark Warner (D-VA), Jack Reed (D-RI), and Gary Peters (D-MI), the most senior Democrats on the Rules, Intelligence, Armed Services, and Homeland Security committees, respectively. “Despite shouldering such a massive responsibility, there has been a lack of meaningful innovation in the election vendor industry, and our democracy is paying the price,” the letter adds. Their primary concern is that the three companies have more than 90 percent of the U.S. election equipment market share, but their voting machines lack paper ballots or audibility, making it impossible to know if a vote was accurately counted in the event of a bug. Yet, these are the same devices tens of millions of voters will use in the upcoming 2020 presidential election." https://techcrunch.com/2019/03/27/senators-security-voting-machines/

Senators demand to know why election vendors still sell voting machines with 'known vulnerabilities' | TechCrunch Four senior senators have called on the largest U.S. voting machine makers to explain why they continue to sell devices with "known vulnerabilities," techcrunch.com

@KanekoaTheGreat - KanekoaTheGreat

#60 Salon: New "hybrid" voting system can change paper ballot after it's been cast (March 28, 2019) “Unfortunately, there is no universal definition of “paper ballot,” which has enabled vendors and their surrogates to characterize machine-marked paper printouts from hackable ballot marking devices (BMDs) as “paper ballots.” Unlike hand-marked paper ballots, voters must print and inspect these machine-marked “paper ballots” to try to detect any fraudulent or erroneous votes that might have been marked by the BMD. The machine-marked ballot is then counted on a separate scanner. Most independent cybersecurity election experts caution against putting these insecure BMDs between voters and their ballots and instead recommend hand-marked paper ballots as a primary voting system (reserving BMDs only for those who are unable to hand-mark their ballots)… Unlike hand-marked paper ballots counted on scanners and regular non-hybrid BMDs,  these new hybrid systems can add fake votes to the machine-marked “paper ballot” after it’s been cast, experts warn. Any manual audit based on such fraudulent “paper ballots” would falsely approve an illegitimate electronic outcome. According to experts, the hybrid voting systems with this alarming capability include the ExpressVote hybrid by Election Systems & Software, LLC (ES&S), the ExpressVote XL hybrid by ES&S, and the Image Cast Evolution hybrid by Dominion Voting. The potential for hybrid systems to add fraudulent votes without detection was identified by Professor of Statistics Philip B. Stark of UC Berkeley, an expert in postelection manual audits, in September of last year. At the time, he told TYT Investigates that the ExpressVote hybrid, which Johnson County, Kansas, had purchased a few months before the 2018 gubernatorial primary, could be maliciously programmed or hacked to create an entirely fraudulent machine-marked “paper ballot” because the machine includes an option that allows the voter to “AutoCast” the ballot without first printing and inspecting it. Moreover, as explained by Stark, the machine does not mark the ballot at all until the voter decides whether to exercise that option, which means that the machine receives advance notice of which ballots are “AutoCast” and thus safe to fraudulently mark. Another election expert, Computer Science Professor Andrew Appel of Princeton University, subsequently confirmed the existence of this stunning defect and dubbed it “Permission to Cheat.” Appel further reported that the ExpressVote XL and Dominion ImageCast Evolution include the same defect.” https://www.salon.com/2019/03/28/new-hybrid-voting-system-can-change-paper-ballot-after-its-been-cast_partner/

New "hybrid" voting system can change paper ballot after it's been cast Paper ballots are safe only if marked by hand, not by machine salon.com

@KanekoaTheGreat - KanekoaTheGreat

#61 Vice: Critical U.S. Election Systems Have Been Left Exposed Online Despite Official Denials (Aug. 8, 2019) “The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been connected to the internet for months and possibly years, including in some swing states. These include systems in nine Wisconsin counties, four Michigan counties, and in seven Florida counties—all states that are perennial battlegrounds in presidential elections. Some of the systems have been online for a year and possibly longer… The systems the researchers found are made by Election Systems & Software, the top voting machine company in the country. They are used to receive encrypted vote totals transmitted via modem from ES&S voting machines on election night, in order to get rapid results that media use to call races, even though the results aren’t final. The system that receives these votes, called an SFTP server, is connected to the internet behind a Cisco firewall… Anyone who finds the firewall online also finds the election-management system connected to it. “It is not air-gapped. The EMS is connected to the internet but is behind a firewall,” Skoglund said. “The firewall configuration [that determines what can go in and out of the firewall]… is the only thing that segments the EMS from the internet.” And misconfigured firewalls are one of the most common ways hackers penetrate supposedly protected systems. Senator Ron Wyden (D-Oregon) said the findings are “yet another damning indictment of the profiteering election vendors, who care more about the bottom line than protecting our democracy.” It’s also an indictment, he said, “of the notion that important cybersecurity decisions should be left entirely to county election offices, many of whom do not employ a single cybersecurity specialist.” “Not only should ballot tallying systems not be connected to the internet, they shouldn’t be anywhere near the internet,” he added…Last year, the Cisco firewalls in Wisconsin failed to receive a patch for a critical vulnerability until six months after the vulnerability had been made public and the patch was released… A New York Times story I wrote last year, however, showed that the modem transmissions do pass through the internet, and even an ES&S document that the company supplied to Rhode Island in 2015 calls the modem transmission of votes an “internet” transmission. A document for modem transmissions from voting machines made by Dominion Voting Systems—another top voting machine company in the country—similarly discusses TCP-IP and SSL, both protocols used for internet traffic. “The configurations show TCP-IP configuration and ‘SSL Optional,’ making it clear that at least the vendors know their systems are connecting through the internet, even if their election official customers do not realize it or continue to insist to the public that the systems are not connected to the internet,” Skoglund said. ES&S has been selling systems with modems to transmit results for more than a decade. Wisconsin approved the use of its current ES&S DS200 optical scan voting machines, with modem transmission capability, in September 2015, but its previous generation of ES&S optical scan machines also used modems for transmitting results. https://www.vice.com/en/article/3kxzk9/exclusive-critical-us-election-systems-have-been-left-exposed-online-despite-official-denials

Exclusive: Critical U.S. Election Systems Have Been Left Exposed Online Despite Official Denials The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been connected to the internet for months and possibly years, including in some swing states. vice.com

@KanekoaTheGreat - KanekoaTheGreat

#62 NBC News: How Hackers Can Target Voting Machines (Aug. 12, 2019) "They had assembled some of the most common voting machines in the country, both systems on the front-end that you and I use to register our vote and the back-end tabulators and so forth that you feed a paper ballet into or that oversees a system... It turns out there is an extremely hostile relationship there where ES&S and Dominion and other companies have basically said we don't want to participate and have been really quite aggressive in saying we don't want to be a part of this. So the organizers were reduced to finding these machines on eBay. Which was really quite terrifying because it turns out anybody can buy some of the most commonly used machines on eBay. It's important to know that Georgia is about to spend $100 million on a contract with Dominion to provide ImageCast hardware to the state in time for the 2020 election. Yet, here these kids were who had opened it up and said, look, you can pop the front off of it, here's a port you can get in that's easy, all stuff you can do certainly do within six minutes behind a curtain much less if you had extra time because as we discovered days before so many are connected to the web... The admin password was just sitting there because it turns out the same password applies to multiple machines across the room, and those machines were created in the 2000s, which means they were, in fact, created, so you can't change that admin password. They are just locked for all time in that way... The combination of seeing the incredible vulnerabilities that we saw on display in real-time at this event and the lack of institutional action around the security of the vote all of that made for an extremely alarming weekend." https://www.youtube.com/watch?v=QtWP0KDx2hA

Video Transcript AI Summary
The speaker attended the voting village event, where common voting machines were tested. Surprisingly, major manufacturers like ES and S and Dominion did not provide the machines for testing, so organizers had to buy them on eBay. Hackers, who had never seen these machines before, easily accessed their inner workings. One machine, Dominion's image cast system, had its internals exposed. This is concerning because Georgia recently signed a $100 million contract with Dominion for the same hardware. The machines were found to have vulnerabilities, such as easily accessible admin passwords. Despite these issues, there seems to be little political will to address the security of voting machines. The speaker found the event and the lack of action on voting security alarming.
Full Transcript
Speaker 0: We were there specifically to attend something called the voting village which is something that's gone on for 3 years. And in this, its 3rd year, they had assembled some of the most common voting machines in the country, both systems that are on the front end that you and I use to actually register our vote and the back end, tabulators and so forth, that you would feed a paper ballot into or that oversee a system. What was so interesting was I assumed coming into it that the big manufacturers, companies like ES and S and Dominion, had provided these machines to the hackers to, you know, field test them. But no, it turns out there's an extremely hostile relationship there and that ES and S and Dominion and other companies have basically said, we don't wanna participate and and really have been quite aggressive in in saying we don't want to be part of this. So the organizers were reduced to finding these machines it on eBay, which right there is pretty terrifying because it turns out that anybody can buy some of the most common machines in use on eBay. What was really alarming was when you see these hackers and these are people who've never seen these machines before, have had no practice on them for the most part come in and and engaged them. They immediately get into the guts of them. Beyond that, we were seeing Dominion's image cast system. It's a line of tabulators that paper ballots are fed into. That had its guts all over the room. It was not clear to us whether was the most recent version of the ImageCAST hardware. But it's important to note that Georgia just spent over 100 or is about to spend over $100,000,000 on a contract with Dominion to provide image cast hardware to the state in time for the 20, for the for the next primaries and for the 2020 election. And yet here these kids were who had opened it up. They said, look, you can pop the front off of it and here's a port you can get into right here that's easy. You know, all kinds of stuff that that you could certainly do within 6 minutes behind a curtain, much less, if you had extra time because any of these were, connected to the web as we discovered couple of days before, so many of them are. So at the end of the event, voting village issues a report, and so we'll be expecting one from them. And they're very transparent about it. I mean, the the spirit of this event, was was transparency, trying to get these vulnerabilities out into the world so that I I guess the idea is the companies will be forced to correct them in some way. The front of each machine was a little Post It that showed off what had been found out by the various hires. So at one point, you know, the the admin password was just sitting there on the on there because it turns out that the same admin password applies multiple machines across the room. And those machines were were created in the 2000s, which means that they were, in fact, created so you can't change that admin password. They're just locked for all time in that way. There does not seem to be any political momentum on some of the bills that are under consideration right now around trying to keep these machines off the Internet or trying to send some sort of certifiable ballot paper ballot system or any of the other things that have been proposed. And so the combination of seeing the incredible vulnerabilities that we saw on display in real time at this event and the lack of institutional action around the security of the vote. All of that made for an extremely alarming weekend.

@KanekoaTheGreat - KanekoaTheGreat

#63 MIT Technology Review: 16 million Americans will vote on hackable paperless machines (Aug. 13, 2019) “Despite the obvious risk and years of warnings, at least eight American states and 16 million American voters will use completely paperless machines in the 2020 US elections, a new report by New York University’s Brennan Center for Justice found. Paperless voting machines persist despite a strong consensus among US cybersecurity and national security experts that paper ballots and vote audits are necessary to ensure the security of the next election… “Selling a paperless voting machine is like selling a car without brakes—something is going to go terribly wrong,” Wyden says. “It is obvious that vendors won’t do the right thing on security by themselves. Congress needs to set mandatory federal election security standards that outlaw paperless voting machines and guarantee every American the right to vote with a hand-marked paper ballot. Experts agree that hand-marked paper ballots and post-election audits are the best defense against foreign hacking. Vendors should recognize that fact or get out of the way.”… Backups, however, are not a silver bullet for election security. Security experts say paper ballots are so important precisely because subsequent audits are necessary, and 17 of the 42 states requiring paper do not require audits.” https://www.technologyreview.com/2019/08/13/238715/16-million-americans-will-vote-on-hackable-paperless-voting-machines/

16 million Americans will vote on hackable paperless machines Despite the obvious risk and years of warnings, at least eight American states and 16 million American voters will use completely paperless machines in the 2020 US elections, a new report by New York University’s Brennan Center for Justice found. Paperless voting machines persist despite a strong consensus among US cybersecurity and national security experts… technologyreview.com

@KanekoaTheGreat - KanekoaTheGreat

#64 Salon: Hackers can easily break into voting machines used across the U.S. (Aug. 14, 2019) “Voting machines used in states across the United States were easily penetrated by hackers at the Def Con conference in Las Vegas on Friday…A video published by CNN shows a hacker break into a Diebold machine, which is used in 18 different states, in a matter of minutes, using no special tools, to gain administrator-level access… Hackers also quickly discovered that many of the voting machines had internet connections, which could allow hackers to break into machines remotely, the Washington Post reported. Motherboard recently reported that election security experts found that election systems used in 10 different states have connected to the internet over the last year, despite assurances from voting machine vendors that they are never connected to the internet and, therefore, cannot be hacked. The websites where states' post-election results are even more susceptible. The event had 40 child hackers between the ages of 6 and 17 attempt to break into a mock version of the sites. Most were able to alter vote tallies and even change the candidates' names to things like “Bob Da Builder,” CNN reported…. Sen. Ron Wyden, D-Ore., called for paper ballots that can’t be hacked. “Election officials across the country as we speak are buying election systems that will be out of date the moment they open the box,” Wyden said in a speech at the conference. “It’s the election security equivalent of putting our military out there to go up against superpowers with a peashooter.” A report by the Brennan Center for Justice at the NYU School of Law, released days after the conference, warned that 12 percent of ballots could be cast on paperless machines in 2020.  The report shows that a third of all local election systems used voting machines that were more than a decade old. “We should replace antiquated equipment, and paperless equipment in particular, as soon as possible,” the report said… Rep. Ted Lieu, D-Calif., told Politico that the federal government “has a responsibility to make sure we have strong election security all over America. "It’s stupid to have the view that states have the right to have poor election security,” Lieu said. “No state has a right to have voting machines that can be easily hacked.” https://www.salon.com/2019/08/14/hackers-can-easily-break-into-voting-machines-used-across-the-u-s-play-doom-nirvana/

Hackers can easily break into voting machines used across the U.S.; play Doom, Nirvana Hackers at the Las Vegas conference penetrated voting machines within minutes, turning them into gaming consoles salon.com

@KanekoaTheGreat - KanekoaTheGreat

#65 FOX News: Election machine keys are on the Internet, hackers say (Aug. 22, 2019) “I may have the keys to open voting machines used in states across the country, and that is not a good thing. I am not an election official. I am not a voting machine expert, operator, or otherwise affiliated with any federal, state, or local government agency. I am simply an investigative journalist who, upon learning that the types of keys used for these machines are apparently widely available for purchase on the Internet, was prudent enough to ask to take a few keys home as souvenirs from my recent trip to the DEF CON 27 Hacking Conference in Las Vegas. Now, I have access to machines that have been used or are currently in use in 35 different states. Swing-states, coastal icons, and the heartland, experts say…I learned about plenty of other digital backdoors and other disturbing vulnerabilities concerning U.S. election equipment at DEF CON. Like the “hidden feature” that Hursti says was only recently discovered in a machine that’s been in use and under the microscope for more than a decade. “A hidden feature that enables you to reopen the polls silently, and insert more ballots and print the new evidence of the election,” Hursti says. And despite believing that the manufacturers had learned from previously exposed vulnerabilities on that machine over the years, “these [newly discovered] features had been missed” the entire time, Hursti says. I watched Hursti explain this new discovery to Rep. Eric Swalwell, D-Calif., one of the numerous lawmakers who attended this year’s DEF CON, and whose face seemed to drop upon learning of the new revelation. That’s likely because this particular machine has been in use in his home state of California for years…One voting machine was discovered to have a password of “1111.” Better than the voter ID machine with NO password.” https://www.foxnews.com/tech/i-have-the-keys-to-your-voting-machine-probably

Election machine keys are on the Internet, hackers say I may have the keys to open voting machines used in states across the country, and that is not a good thing. foxnews.com

@KanekoaTheGreat - KanekoaTheGreat

#66 The Hill: Voting machines pose a greater threat to our elections than foreign agents (Oct. 2, 2019) "In 2017, the largest U.S. voting machine vendor, ES&S, exposed encrypted employee passwords online. Using those passwords, hackers could have planted malware on the company’s servers, and that malware could then be delivered to voting systems across the country with official updates. “This is the type of stuff that leads to a complete compromise,” said cyber-risk analyst Chris Vickery. Both ES&S and its main competitor, Dominion Voting Systems, have released voting machines that security experts say can add votes to paper ballots after they are cast by voters… Security experts are alarmed at internet connectivity in voting systems because it can allow hackers to inject malware that disrupts or changes the outcome of an election. Kevin Skoglund, the lead researcher of one study, confirmed that vendors "know their systems are connecting through the internet.” In August, North Carolina became the latest casualty. Voters and representatives from good-government groups pleaded with the state board of elections to adopt the type of voting system almost unanimously supported by election security experts, one that uses hand-marked paper ballots. They asked the board to reject ballot-marking devices that use barcodes and argued that hand-marked paper ballots are more secure, less expensive, and less likely to create long lines at the polls… Similar decisions have been made in Delaware, Georgia, Kansas, New York, Pennsylvania, and Wisconsin. Communities in those states have experienced frustration, and outrage and even launched investigations following certification or adoption of election systems opposed by experts, good-government groups, competing vendors, and the general public.” https://thehill.com/opinion/technology/464065-voting-machines-pose-a-greater-threat-to-our-elections-than-foreign-agents/

@KanekoaTheGreat - KanekoaTheGreat

#67 NPR: Cyber Experts Warn Of Vulnerabilities Facing 2020 Election Machines (Sept. 4, 2019) "The machine he's investigating is a ballot-marking device used to help people with physical impairments or language barriers vote, and it's running a version of Windows that is more than 15 years old. "These systems crash at your Wal-Mart scanning your groceries. And we're using those systems here to protect our democracy, which is a little bit unsettling," he said. "I wouldn't even use this to control a camera at my house. Or my toaster." One glaring vulnerability — which cybersecurity experts have been talking about for 20 years, and yelling about for the past decade — are paperless voting machines. Experts agree that these machines are insecure because they record votes electronically and could either be manipulated or malfunction without detection. They can't truly be audited, and they leave room for some doubt in the result. In 2016, approximately 20 percent of voters used electronic voting equipment that didn't provide a paper trail. In 2020, that number will be around 12 percent, according to a recent report from the Brennan Center for Justice." https://www.npr.org/2019/09/04/755066523/cyber-experts-warn-of-vulnerabilities-facing-2020-election-machines

Cyber Experts Warn Of Vulnerabilities Facing 2020 Election Machines America's elections infrastructure is more secure than it was four years ago, but many lingering weaknesses won't be resolved in time for Election Day next year. npr.org

@KanekoaTheGreat - KanekoaTheGreat

#68 Wired: Some Voting Machines Still Have Decade-Old Vulnerabilities (Sept. 26, 2019) “Today's report highlights detailed vulnerability findings related to six models of voting machines, most of which are currently in use. That includes the ES&S AutoMARK, used in 28 states in 2018, and Premier/Diebold AccuVote-OS, used in 26 states that same year… "As disturbing as this outcome is, we note that it is at this point an unsurprising result," the organizers write. "It is well known that current voting systems, like any hardware and software running on conventional general-purpose platforms, can be compromised in practice. However, it is notable—and especially disappointing—that many of the specific vulnerabilities reported over a decade earlier ... are still present in these systems today." The types of vulnerabilities participants found included poor physical security protections that could allow undetected tampering, easily guessable hardcoded system credentials, the potential for operating system manipulations, and remote attacks that could compromise memory or integrity checks or cause a denial of service. The report points out that many of these vulnerabilities were discovered years ago—sometimes more than a decade—in academic research or state and local audits. Additionally, voting machine security is only one item on a much larger punch list for better defending US elections. More districts need to implement network and cloud defenses to protect infrastructure like voter rolls and email, and more states need to conduct risk-limiting audits to verify election results.” https://www.wired.com/story/voting-village-results-hacking-decade-old-bugs/

Some Voting Machines Still Have Decade-Old Vulnerabilities The results of the 2019 Defcon Voting Village are in—and they paint an ugly picture for voting machine security. wired.com

@KanekoaTheGreat - KanekoaTheGreat

#69 John Oliver Breaks Down Faulty Voting Machine Security on Last Week Tonight (Nov. 3, 2019) John Oliver offered various examples of how easy it is to physically hack a voting machine (it can take only a few minutes), how easy it is to find unattended voting machines, and how flimsy the claims are that most machines are never connected to the Internet. “So, some machines that officials insist don’t connect to the Internet, actually do connect to the Internet,” Oliver said. “And even some machines that don’t connect directly to the Internet are programmed with cards that have themselves been programmed on computers that connect to the Internet." https://www.youtube.com/watch?v=svEuG_ekNT0

Video Transcript AI Summary
A senate report revealed that voting machines are aging and vulnerable to exploitation. A hacker demonstrated how easy it is to gain full admin access to a model used in 18 states. Professor Ed Felton documented how unattended voting machines can be manipulated by anyone. Additionally, some machines that claim not to be connected to the internet actually are, while others use cards programmed on internet-connected computers. In summary, all voting machines can be tampered with in some way. As an axe murderer once said, "pretty much everything is hackable."
Full Transcript
Speaker 0: A senate report found that some of our voting equipment is aging and vulnerable to exploitation by a committed adversary. So tonight, let's talk about our voting machines. Voting machines are technically computers and computers, of course, are hackable. And it can be far easier to control a machine than you might expect, as this hacker demonstrates on a model currently used in at least 18 states. Speaker 1: All they have to do this bad actor would be to open up This machine by pressing this button right here, when it's off, removing the card reader, removing this, you don't need any tools to do this. Unplugging this. Again, you don't need any tools to do this. Turning it on, all you have to do is pick this slot here with a ballpoint pen, open this up, press the red button, And we're gonna let it boot up here. Just click cancel and okay. And now I have full admin access. Under 2 minutes. Speaker 0: Holy shit. That should have been a lot more difficult. Speaker 2: Professor Ed Felton of Princeton performs an exercise every election day. He drives around Princeton to various polling locations and he follows the prominent signs that say voting here days before the election and then he takes photographs of unattended voting machines just sitting there. And that's for him to document that anybody can walk up to his voting machines and anybody can manipulate them and nobody will know. Speaker 0: So to recap, I've now shown you how to hack voting machines in less than 2 minutes and how to find unattended voting machines. Speaker 3: Are the Harris County voting machines connected to the Internet? Never. So is it ever connected to a modem? Nope. Well, the no. I say that it is a secure modem where we dial, to an old fashioned landline to the one of our 4 drop off sites. Speaker 0: But that's the Internet, Stan. You literally just described the Internet. So some machines and officials insist don't connect to the internet actually do connect to the internet. And even some machines that don't connect directly to the internet are programmed with cards that have themselves been programmed on computers that connect to the internet. The truth is, every voting machine can be tampered with in some way or other. If I may quote an extremely upbeat axe murderer, pretty much everything is hackable.
Saved - June 16, 2023 at 3:02 AM

@ProjectVirginia - The Virginia Project

voting machines would be a lot less of an issue if the code was open source and observers of each party could do checksum verification on executables as part of Logic & Accuracy certification

@ProjectVirginia - The Virginia Project

it's the black box nature of the current setup that leads to chaos "trust me" is never good enough when it comes to outcomes of elections in elections you can trust what you can verify and no more

Saved - November 2, 2023 at 2:13 PM

@canammissing - David Paulides

Without solid evidence this election would’ve never been overturned. We need observers at every counting location filming what is happening. This has probably been happening for years, but now being exposed. We need YOU to get involved and save our system!!

Saved - November 8, 2023 at 11:13 PM
reSee.it AI Summary
Irrefutable evidence of thousands of fake votes in Georgia 2020, manipulated hand counts, and a cover-up by the GASOS Office. To address this, contact state representatives and the governor to request legislation making it a felony to manipulate hand counts. Make it illegal to match any of the vote tallies. Involve and train County Sheriff Departments to recognize fraud. The overall election system is a sham, designed to make it difficult to identify responsibility for fraud. The Risk Limiting Audit is a scam. Private contractors should not speak on behalf of the GASOS Office. Resignation of the entire GASOS leadership is necessary.

@jeffmfulgham - Jeff Fulgham

- Irrefutable evidence of thousands of fake votes in Georgia 2020. - Irrefutable evidence of manipulated hand counts. - Irrefutable evidence that the GASOS Office is covering this up. - I've filed a complaint with the GA Office of the Inspector General Here's how we stop it👇

@jeffmfulgham - Jeff Fulgham

1. I don't have all of the answers, but I've learned a lot from filing 2020 fraud complaints and reporting evidence to CISA (DHS), FBI, GA AG, and county officials. We need to transition to a new system. But in the meantime here's what we can do to make it harder to cheat.

@jeffmfulgham - Jeff Fulgham

2. Contact your state representatives and the governor and request legislation that makes it a felony to manipulate the hand count to match the machine count. All they're doing is covering up fraudulent votes when they force the hand count to match the machine count.

@jeffmfulgham - Jeff Fulgham

3. In Georgia 2020 there were 3 vote tallies: A machine count, a hand count, and a machine recount. Make it a felony to manipulate a second machine count to match the first machine count. Make it a felony to match any of the vote tallies.

@jeffmfulgham - Jeff Fulgham

4. We have evidence (and a admission by GASOS Raffensperger) that Fulton counted thousands of ballots twice creating thousands of fake votes. They then manipulated the official hand count spreadsheet to cover this up by forcing a match.

@jeffmfulgham - Jeff Fulgham

5. Involve and train our County Sheriff Departments to recognize fraud in this corrupt election system. Georgia has official channels to report election fraud to the GASOS & GA AG but they're designed to investigate an individual fool who voted twice, not systematic corruption.

@jeffmfulgham - Jeff Fulgham

6. Make it a felony to double count ballots and knowingly cover it up. Even with only 1 vote tally there is no excuse to scan batches of ballots twice. But we need to continue to file fraud complaints with the GASOS & GA AG to create a paper trail to hold them accountable.

@jeffmfulgham - Jeff Fulgham

7. After three years of research I believe this overall election system is a sham. It has a systematic design which makes it difficult to identify who is legally responsible for fraud. I believe this is by design at a very high level. They also use lawfare to intimidate.

@jeffmfulgham - Jeff Fulgham

8. I'm willing to speak to small groups of concerned citizens and law enforcement throughout the state of GA who want to learn more about how they manipulated the vote and the hand count in 2020. I'm retired military and I'm doing this as a public service.

@jeffmfulgham - Jeff Fulgham

9. The Risk Limiting Audit they're using is a scam. If they were able to cover up fake votes in a 100% hand count in 2020, imagine how easy it would be to cover up fake votes in a true RLA that only counts a small percentage of sample ballots? (Image- 2020 100% hand count RLA)

@jeffmfulgham - Jeff Fulgham

10. Make it illegal for a private contractor to speak to the citizens on behalf of the GASOS Office concerning an election. In 2020 @GabrielSterling was being paid $16k per month as a contractor to implement the new Dominion system. Who was he serving? https://www.ajc.com/politics/georgia-elections-manager-left-state-job-got-200k-per-year-contract/WA74UJ5BQNGDDMQXITVIBZZXFI/

Page Not Found ajc.com

@jeffmfulgham - Jeff Fulgham

11. GA paid Dominion over 100 million dollars for a voting machine that allowed ballots to be counted multiple times. We paid Voting Works to manage the hand count tablulation which didn't catch multiple fake batch entries. I believe the entire GASOS leadership should resign.

Saved - November 10, 2023 at 8:07 PM
reSee.it AI Summary
Mike Lindell shared breaking news about election incidents, including machine failures and paper ballot anomalies. Networks Manager expressed a desire to collaborate with Lindell to address concerns about electronic voting machines. The conversation ended with a reference to Lindell's proposed plan.

@realMikeLindell - Mike Lindell

BREAKING: **44 incidents of machines failing on election day *20 real time reports of paper ballot anomalies *Over 200 election incidents reported across 18 states. SO FAR.... http://Lindelloffensefund.org

Home | Lindell Offense Fund Help Save Our Country - God has blessed me with a platform to be a voice for freedom. lindelloffensefund.org

@NetworksManager - Bruce Porter Jr. 

@realMikeLindell Let’s work together to save ourselves! Ronna McDaniel's days appear numbered and there is only one man who has proposed a plan to take us off the magic electronic voting machines. MIKE LINDELL ( @realMikeLindell ) https://t.co/Kq9siQTOaB

@NetworksManager - Bruce Porter Jr. 

Ronna McDaniel's days appear numbered and there is only one man who has proposed a plan to take us off the magic electronic voting machines. MIKE LINDELL (@realMikeLindell) Agree? Yes or No https://t.co/lbxdR76GBm

Saved - November 15, 2023 at 7:31 PM
reSee.it AI Summary
Title: Voluntary Transparency: A Solution to Election Fraud and Corrupt Judges Summary: This article presents a solution to address election fraud and corrupt judges. The proposal involves implementing a transparent, voluntary, parallel-election system with indisputable results. Voters would disclose their identity, voting details, and candidate choice on a notarized paper. This grassroots initiative aims to gather evidence on election day, ensuring accurate and publicly disclosed results. By achieving critical mass participation, this solution can expose election rigging and provide a basis for legal action. The article emphasizes the importance of voluntary transparency in safeguarding the integrity of elections and preserving the Constitutional Republic.

@DeclareUrBallot - Declare Your Ballot

Part 1 of 5   I have been requested to summarize my election fraud solution into a word post, rather than the video format I created. Fair enough. In my Video 3 on my website I lay out how to beat rigged elections. Watch it if you can, it is rather short, less than 10 minutes. I originally made a video because I wanted people to see I was a real human being, not a bot or FBI plant. Who I am is irrelevant, as I wanted my solution to be judged on its merits and not on my credentials. I am just a normal American who is sick and tired of watching elections gets stolen and corrupt judges making excuses. Thus, I joined Twitter (X), made the videos and put them online for everyone to see.    First, we know the elections are being rigged in a multitude of ways, not just one. They are sending out more ballots than needed. This allows harvesters to illegally gather, vote and send them in. See “2000 Mules” documentary. Signature verification is a joke, so all these illegal ballots come in. See Kari Lake’s trial where she proved 70,000 signatures were verified in under 2 seconds. If that is not enough, they can electronically manipulate the results. See the documentary “SelectionCode”, see the Antrim County forensic results, or see the Maricopa Forensic results (i.e., not the hand count) that found 407,000 illegally machine entered votes that were predetermined - 374,000 for Biden and 33,000 for Trump. Yes, even Trump had fake votes because the cheaters need leeway on both sides to make the race look close when it isn’t. See CNN on election night 2020 when almost 20,000 votes in Pennsylvania magically disappear for Trump and get added to Biden. Furthermore, states ignored election laws and ran illegal elections. The Wisconsin Supreme Court agreed that the expanded use of “indefinitely confined” was illegal and the drop boxes were illegal. The Justice Gableman report found massive abuse of elderly in Wisconsin stealing votes. The Halderman report from Georgia showed the voting machines are hackable. I could go on and on. These examples are just the tip of the iceberg on election fraud as I would be here forever detailing all the evidence. We know the elections are a complete sham. Trump gets 50,000 to a rally and Biden struggles to get 1,000…yet Biden got 81M votes. As Kari Lake said, “my ass” he did!   Despite a massive amount of evidence, we have another HUGE problem – corrupt judges. The evidence that Trump in 2020 and Kari Lake in 2022 have accumulated is more than enough to overturn the election results. However, all across the country corrupt judges have done their best to hide the truth with nonsensical rulings. Sadly, this started with the Supreme Court when they held Texas and other states, along with the candidate for President, didn’t have standing to sue. This is pure nonsense. Standing is a judicially created doctrine that the courts have abused for far too long. The truth is, if the court wants to hear the case they magically find standing, if the court wants to ignore the case they magically don’t have standing. The Supreme Court thought they could shaft Trump and disenfranchise an entire nation and we would go along with it. They were sadly mistaken. Now the Supreme Court is going to be forced to make tougher decisions when all these bogus civil and criminal Trump cases land on their desk and they are FORCED to make a decision.

@DeclareUrBallot - Declare Your Ballot

Part 2 of 5   The corrupt judiciary was really apparent a couple years ago when they started with Alex Jones, where two different corrupt judges issued a directed verdict because they didn’t want to let Alex present a defense. His case is still on appeal. You have recently seen how corrupt the judiciary is in the John Eastman disbarment case. You have recently seen how corrupt the judiciary is in New York, where the crazy judge on summary judgment valued Mar-a-lago at $18M when it is easily worth $500M or more. Again, the corrupt judge, just like with Alex Jones, didn’t want the jury to decide so they bypassed the entire trial and jumped straight to damages. These civil and criminal cases against Trump are as baseless as the Russia Hoax, where Hillary Clinton and the DNC made up lies about hookers peeing on beds in Russia to frame Trump for fabricated crimes. Yet, despite all these corrupt judges hiding election fraud, just last week a judge threw out a Democrat primary mayoral election in Bridgeport Connecticut when video evidence of ballot stuffing came to light – sounds like 2000 Mules all over again! Judges have no problem following the laws when the fraud is between two Democrats but can’t seem to understand plain English when it comes to MAGA candidates.  Again, we have a massive judge problem that we need to overcome.   We also need to recognize that stolen elections and corrupt judges are not limited to the Democrats. Most Republican election officials and judges are just as corrupt.  See Georgia where Brian Kemp and Brad Ratsberger are stealing elections for themselves, and are still trying to hide the ballots and signatures to this day. The battle between Ds and Rs is like watching professional wrestling – it is all a show to trick us. Both sides work for the Establishment class. The real battle today is Es versus Ps, the Establishment versus the People. The Establishment is the Deep State, the corrupt Government, the status quo. This is why so few Republicans talk about election fraud because they are in on it!    We obviously need one day elections and not election month, signature verification, hand counts in smaller precincts banning the use of rigged machines. But how do we get there when the entire system is rigged? How do we beat rigged elections and force corrupt judges to do the right thing? We need an interim solution to get us to true election integrity.

@DeclareUrBallot - Declare Your Ballot

Part 3 of 5   Now we get to the good part, the solution. It is very simple. Shockingly simple…and free. It requires ZERO help from the corrupt legislatures. It gets around ALL the ways they cheat.  It takes away ALL the excuses corrupt judges use to rule against election integrity.    The secrecy of the ballot has been weaponized against the American people. For the first 100 years of our country, we didn’t have secret ballots. Our ballots were public. Unfortunately, unions and thugs were forcing people to vote a certain way. We then moved to secret ballots to prevent this, but now our elections are rigged! Frankly, the elections have probably been rigged a lot longer than we want to believe.    As Regan said, “Trust but verify.”  Well, the trust is gone and now it is time for the verification part.  We need a TRANSPARENT, VOLUNTARY, PARALLEL-ELECTION WITH INDISPUTABLE RESULTS. Sounds complicated but is VERY simple. You go in on election day. You vote as you normally would. You then walk out and come to our booth. We will be in the parking lot, at a close location, somewhere easily accessible that follows all the election laws.  We will have a simple piece of paper ready to go.  You can print the paper ahead of time and bring it with you.    On the paper you will disclose who you are and when and where you voted.  We will have a notary public (all volunteers) ready to verify your identity, watch you sign and take your oath.  You will declare who you just voted for!  This is literally first amendment protected speech.  Yes, you need a small bit of courage to admit who you voted for, but that is a small price to pay for free and fair elections. Heck, most people will gladly declare who they voted for!  I voted for Trump in 2016, 2020 and will do so again in 2024. See, it is that easy.      You are creating a Jurat Affidavit, admissible in a court of law. The paper will have just the top-level candidates of the state, so this one simple piece of paper can be used statewide. The strategy is to keep it simple. If you were disenfranchised (e.g., 60% tabulator failure) and couldn’t vote, we will have a spot for that too.  We are gathering ALL the evidence we need on election day and not fighting for years in the courts to get it. Our results are MORE accurate than the election results because we can prove each voter is real. We don’t hide our results, in fact, we publicly disclose EVERYTHING. There is nothing left to argue over when anyone and everyone can see each Jurat Affidavit.  This also allows each campaign to use the true results for their lawsuits.

@DeclareUrBallot - Declare Your Ballot

Part 4 of 5   You are likely thinking, “you aren’t going to get everyone to participate in it.”  Correct, this solution is 100% voluntary, but we don’t need everyone participating for it to work because they rig the elections to be close so people fall for it. We just need what I call “critical mass” and just critical mass from Trump voters.  Take Maricopa County, Arizona as an example.  Let’s say in 2024 to keep the numbers simple, there are 2 million total votes, 1.5M from mail-in ballots and 500,000 from election day. Biden won Arizona in 2020 by 10,457. That is a razor thin margin which makes my solution work even better.    Let’s say Maricopa reports that of the 500,000 votes on election day, Trump got 260,000 and Biden got 240,000.  But we know we are winning election day 70/30, not 52/48. 70% of 500,000 is 350,000. Let’s assume we only collect 80% of those Trump votes, so we are left with 280,000 provable Trump votes on election day.  But wait, Trump “lost” the entire state by 10,457 votes and we have collected 20,000 more than Maricopa reported on election day. We just proved Trump won the ENTIRE STATE despite never even looking at the mail-in ballots. You can also take this analyzation further when you break it down per precinct / vote center.   This solution works better when you vote on election day and do not use the mail-in ballots. This solution is also dependent upon a Donald Trump or Kari Lake being a champion of it to spread the awareness and implement it. This solution inspires people to vote, because now they know they are going to see the real results and not be cheated yet again. You know the cheaters are going cheat, but with this solution we don’t care how they are cheating, because we are getting our results directly from the voters. This solution removes all the bogus excuses corrupt judges use to throw out good cases.  First, we are ready to sue the day AFTER the election. Two, we have all the evidence we need in hand.  Three, our results are indisputable, as a real person is behind each Jurat Affidavit that was collected.  Four, this gathers massive public support by showing the people who the real winner was.

@DeclareUrBallot - Declare Your Ballot

Part 5 of 5   Keep in mind, my solution is 100% volunteer based and I am asking for ZERO money. You spend your own money how you best see fit. People can print out their own piece of paper or volunteers can have papers ready for voters. All notary publics will be working as volunteers.  If we need more notary publics, go get registered to be one.  Everything I am proposing is 100% grass roots and the exact opposite of a grift.  Heck, I don’t even want to form an organization.  Instead, these are people coming together voluntarily to save this nation. Everything we do will be transparent, all publicly disclosed.  There is not a single aspect of this entire solution that is being hidden.  Rather, everything is transparent.    Frankly, the Trump campaign should take this solution and run with it. I do not need to be involved. I am just laying out the solution for anyone or any campaign to implement. Even Democrats could implement my solution in elections that are being stolen from them.  I am more than willing to discuss this solution directly with Donald Trump or Kari Lake. So far they have either not seen me or ignored me – I don’t know which.  Public pressure may help bring awareness to them.  I ask that you do all you can to push this solution to them.      My solution is the last step preventing an armed civil war. We can save this nation peacefully without having to resort to violence. Our entire Constitutional Republic is at stake and 2024 is our chance to fix this mess for good. We can’t keep doing the same thing over and over again expecting different results. It is time to voluntarily remove the secrecy of the ballot that has been weaponized against the American public. Voluntary Transparency is the solution.

Saved - November 30, 2023 at 7:08 PM
reSee.it AI Summary
In a recount, attorneys must inspect paper ballots to match names with primary winners. Counterfeits won't be caught, but physical inspection will. Vital for ensuring accuracy and integrity.

@wendyp4545 - Wendy Patterson

THIS IS SO IMPORTANT Please memorize this so if you end up in a recount, you need your attorney's to fight to inspect the paper ballots to match the names to the primary winners. A recount will NOT catch counterfeits. The physical inspection of the paper ballots will. 👇 👇 👇 👇 👇 👇 👇 👇

@wendyp4545 - Wendy Patterson

This is a very important strategy. One reason why we have to get rid of the incumbents is because it makes all of the preprinted counterfeits more noticeable. They will assume the incumbent will win in certain races and preprint them on the General ballot. When we challenge the election and inspect the paper ballot, the primary winners will not match on the counterfeit ballots making it easy to catch them cheating and a strong case of fraud in court.

Saved - December 3, 2023 at 12:35 PM
reSee.it AI Summary
To secure the general election, our last resort is mass participation in the primary vote. Removing incumbents is crucial, not only to hold them accountable but also to expose counterfeit ballots in the general election. Recounts won't suffice; physical inspection of paper ballots is necessary. Poll workers must memorize primary winners to identify any suspicious names on election day, documenting them with the onsite attorney. Let's act now to safeguard our democratic process.

@wendyp4545 - Wendy Patterson

We only have one last option. Don't fool yourself. If we don't show up in mass to vote in the primary, you can kiss the general election good bye. We need to remove the incumbents for more that just one reason. They deserve to be fired. But even more important than that is we can catch the counterfeits in the General Election easier because the preprinted ballots they sneak in will have many of the incumbents that we fire names on them. We have to match the names of the actual primary winners to the actual names on the ballot. A recount will not catch counterfeits. We have to physically inspect the paper ballot. Poll workers should memorize the primary winners so on election day if they see a name that shouldn't be on the ballot, they can document it through the attorney onsite.

@rex46309 - Rex Boykin

@realWLYanman @wendyp4545 There is a path out but we don't want that path just yet.

Saved - January 19, 2024 at 1:00 AM

@DecentFiJC - Jonathan

REMINDER: SERGEY BRIN is/was married to ANNE WOJCICKI (23andMe), who SOLD ACCESS to PATIENT DATA and DNA to Genentech and Seagen. Btw, Anne’s SISTER runs/ran YOUTUBE (censorship of Goynservatives) too, nbd. (SEAGEN was recently acquired by PFIZER.) #TheNoticingContinues

@TPV_John - The Patriot Voice

Klaus Schwab sat down with Google Co-Founder Sergey Brin at this years WEF Davos meeting and discussed how “Predictive” and “prescriptive” AI will be deciding future elections worldwide. 🚨🚨🚨 “You can predict enough to where we will not even need elections, because we know what the result will be.” CHILLING. MAKE NO MISTAKE…This is what we will be up against in the 2024 US Presidential election. They are working on implementing these AI algorithms under our nose, and well ahead of time. That will make voter fraud tactics used against @realDonaldTrump in 2020 look like a Fischer Price toy in comparison. The ONLY way to get around this, and make SURE that the WEF doesn’t decide our elections… GET RID OF ALL OF THE CHEAT MACHINES. ALL PAPER BALLOTS IN EVERY STATE. SAME DAY VOTING. VOTER ID. We NEED to prepare for this, QUICKLY.

Video Transcript AI Summary
Technologies have evolved from analytical to predictive power. The speaker mentions that their company is actively involved in this transition. They suggest that the next step could be a cryptive mode, where elections may become unnecessary because predictions can determine outcomes. This raises the question of whether elections are still needed if results can be accurately foreseen.
Full Transcript
Speaker 0: Technologies mainly have an analytical power. Now we go into a predictive power, and we have seen the first examples and your company very much involved into it. But since the next step could be to go into cryptive mode, which means, you you do not even have to have elections anymore because you can already predict what, predict. And afterwards, you can say, why do we need elections? Because we know what the result will
Saved - March 25, 2024 at 2:41 AM
reSee.it AI Summary
Electronic voting machines used in multiple states, including swing states, can be easily hacked within minutes without tools, granting full admin access. This poses a significant risk to the integrity of elections. While machines are necessary due to the complexity of US elections, they are susceptible to manipulation. Verifying results through risk limiting audits is crucial, but ultimately, machines cannot be trusted like traditional paper ballots.

@WallStreetApes - Wall Street Apes

CNN Shows Inside A Hacker Conference Where American Voting Machines Are Examined Electronic Voting Machines “used in 18 different states, 8 of which are swing states” are able to be broken into within minutes without tools “Now you have full admin access on this machine” “It's having trouble rebooting because there's no card reader. And now you have full admin access on this machine. So you can disrupt the election, you can disrupt people's confidence when you think about admin access, you can think about, like, keys to the castle. When you have admin access, you own the machine. You can get it to do what you want it to do. So you can imagine that being very nefarious. US elections are so complex that we humans cannot do a manual count. We are dishonest and we are error prone. So we have to use machines while we know that the machines are hackable. So now the question is we used the machine and now we verify the results by doing a risk limiting audit, and this is where you know that the machine didn't cheat. But you cannot trust machine (the same) as a white paper ballot.”

Video Transcript AI Summary
DEFCON Voting Village assesses voting machines to improve election security. Attendees explore vulnerabilities in machines like the AccuVote TSX, gaining admin access to disrupt elections. While machines are necessary due to the complexity of US elections, they are hackable. Verification through risk limiting audits is crucial as machines cannot be fully trusted like paper ballots.
Full Transcript
Speaker 0: DEFCON Voting Village is the only third party independent assessment team of voting machines as far as we know in the entire world. So people come here to really kick the wheels, figure out exactly how these machines work, what the vulnerabilities are so we can make more secure elections. Yeah. There's a 1,000,000 different ways to interact with those things. Speaker 1: Just kinda exploring, like, what's going on with Sprint. Speaker 2: This is the AccuVote TSX. It's used in 18 different states, 8 of which are swing states. It's gonna start rebooting and you're gonna see that it's having trouble rebooting because there's no card reader. And now you have full admin access on this machine. So you can disrupt the election, you can disrupt people's confidence in the election. When you think about admin access, you can think about like keys to the castle. When you have admin access, you own the machine. You can get it to do what you want it to do. So you can imagine that being very nefarious. Speaker 1: US elections are so complex that we humans cannot do a manual count. We are dishonest and we are error prone. So we have to use machines while we know that the machines are hackable. So now the question is we use the machine, and now we verify the results by doing a risk limiting audit. And this is where you know that the machine didn't achieve. But you cannot trust machine as a white paper ballot.
Saved - August 13, 2024 at 12:29 PM
reSee.it AI Summary
I just read a Politico article revealing that hackers discovered serious vulnerabilities in voting machines and e-poll books, which is alarming, especially before an election. This seems to validate concerns raised by those who questioned the integrity of the 2020 election. Experts noted that fixing these issues is complicated and unlikely to happen in time for the 2024 election. I propose we abandon these machines altogether and return to hand-counting votes, as the UK does, to ensure quicker and more reliable results.

@BehizyTweets - George

BREAKING: Politico just unleashed an article titled "The nation’s best hackers found vulnerabilities in voting machines — but no time to fix them." Hackers said the vulnerabilities they found were "particularly troubling during an election year like this.” "They found vulnerabilities in EVERYTHING from voting machines to e-poll books" So, after years of gaslighting us, Democrats are now openly admitting what We The Conspiracy Theorists have been right about voting machines since we started raising the alarm after the stolen 2020 election “As far as time goes, it is hard to make any real, major, systemic changes, but especially 90 days out from the election,” said Catherine Terranova, one of the organizers of the DEF CON “Voting Village” hacking event “It’s not a 90-day fix, It’s not a Microsoft every Tuesday, issue your patch and everything works fine,” Scott Algeier said. “It’s a pretty complicated process.” The gist of this is that they found outrageous vulnerabilities (in my opinion, features) that allowed hackers to flip votes without detection, and say we can't fix it in time for the 2024 election How about this? We just STOP using the machines and go back to caveman voting. The UK gave us hand-counted results within hours. There's no reason states with smaller populations take days and even weeks to count a couple thousand votes

Saved - October 30, 2024 at 1:33 AM
reSee.it AI Summary
I shared that Colorado voting machine passwords were leaked online by the Secretary of State, affecting 63 counties. This breach raises serious concerns about election security, as BIOS passwords are highly confidential. An affidavit confirmed the leak, and the Secretary's office acknowledged it, stating they are addressing the issue. I believe the solution is to cancel contracts with voting machine vendors and switch to hand-counting ballots. It's crucial for everyone to vote, as the outcome will impact our lives significantly.

@BehizyTweets - George

BREAKING: Colorado voting machine passwords were LEAKED online by the Democrat Secretary of State. Specifically, over 600 passwords for machines in 63 of the state’s 64 counties were posted for anyone to see "BIOS passwords are highly confidential, allowing broad access for knowledgeable users to fundamentally manipulate systems and data and to remove any trace of doing so. Due to the sensitivity surrounding BIOS passwords, Colorado election regulation (8 CCR 1505-1), Rule 20.5.2(c)(11), requires limited access to a select few at the Colorado Department of State; neither county clerks nor commissioners have access to these files." - @cologop Someone signed an affidavit swearing under the penalty of perjury that they downloaded the file from Jenna Griswold's website and discovered the hidden tab by simply clicking "unhide." Hey, Secretary of Fraud @JenaGriswold, how about you start upholding election laws instead of spending all your time gaslighting the rest of us about how safe and secure our elections are? We The Voters of this state would really appreciate it. Exactly one week from now, we will finally vote to restore Trump back to the White House to bring these crooks to justice.

@BehizyTweets - George

Here's a full copy of the affidavit. Jena Griswold's office confirmed that it did happen and that “the Department is working to remedy this situation where necessary.” “The Department took immediate action as soon as it was aware of this and informed the Cybersecurity and Infrastructure Security Agency (CISA), which closely monitors and protects the county’s essential security infrastructure,” The real remedy for this is to cancel the contracts with the voting machine vendors and hand-count our ballots.

@BehizyTweets - George

My fellow people of Colorado, and quite frankly, anyone else who lives in a corrupt state like this, This is one of those times in history when national politics will impact our lives locally. The only way we're ever going to see justice in a state like ours is to get Trump back into the White House. And after he wins, we can start the cleanup on aisle 50 (all 50 states). This election isn't a game. Go vote like the fate of your town, city, state, etc, is on the line. Sincerely, Me, aka Chocolate Superman, Blacker Carlson, Brown Bond, the Dark Knight...

Saved - November 10, 2024 at 3:50 AM

@JohnLuciew - John Luciew

From Johnstown, PA. All the flash drives on the ballot counting machines need to be replaced in Cambria county. They’re not counting the votes. Source Dave Luciew: https://t.co/bdxOkqpaaw

Video Transcript AI Summary
Flash drives are not synced with the machines, leading to the need for new flash drives to be distributed to all machines. This issue is currently identified in Cambria County.
Full Transcript
Speaker 0: Flash drives. That's why I get the machine. So say it again. Flash drives are not Flash drives, they go to machines are not synced up. And so they're having to get new flash drives out to all the machines. Yeah. That's what we is that just Cambria County? Cambria County. That we know of. Yeah.
Saved - November 9, 2024 at 4:14 PM
reSee.it AI Summary
Election officials in Milwaukee have discovered broken security stickers on all 13 tabulators at the Central Count location, prompting a restart of the vote count. This means an additional 30,000 to 40,000 absentee ballots will need to be recounted. The situation raises questions about how this could happen and whether it indicates incompetence or something more concerning. Given past election issues, there's a call for independent audits and greater transparency to ensure the integrity of our voting system. We must remain vigilant to protect our democracy.

@ThomasPaineBand - Thomas Paine Band

🚨 Election officials in Milwaukee have found broken security stickers on all 13 tabulators at the Central Count location!!! ELECTION INTEGRITY IN QUESTION AGAIN! In a stunning repeat of 2020's election drama, Milwaukee's Central Count has hit a major snag. All 13 tabulators had their security stickers broken! THE TRUTH EMERGES? Here we go again, folks! After election officials discovered this breach, they've had no choice but to RESTART THE VOTE COUNT. Yes, you heard it right. Thousands of ballots already counted must now be recounted due to this glaring security failure. What Does This Mean? Recount: We're looking at an additional 30,000 to 40,000 absentee ballots to be recounted. Late Night: Expect election results from Milwaukee to trickle in until the wee hours of the morning. The Big Question: How and Why? How do security stickers break on every machine? Is it incompetence, or something more sinister? Remember, in 2020, Biden's victory in Wisconsin came from a mysterious overnight surge of votes. Could history be repeating itself? The Pattern Continues This isn't just a coincidence. It follows a pattern seen in other states with late-night "vote dumps" and now, compromised machines. Were these stickers tampered with to allow manipulation of the vote? Were they broken to cover up previous tampering? The Evidence Mounts Isn't it curious that these issues keep happening in key battleground states? Is it not time to demand full audits and forensic analysis of these machines? If security is so easily breached, what else might be tampered with? The Call to Action This isn't just about one election; it's about the integrity of our entire voting system. We cannot let these incidents slide without questioning the process. Audit the Machines: We need independent audits, not just recounts. Transparency Now: The public deserves to know how our votes are counted. Don't Let Them Steal It Again! This could be evidence of fraud staring us right in the face. We must keep our eyes open and demand better. Our democracy depends on it. Share this post if you believe in securing our elections! Let's make sure every vote counts, truly and transparently.

Saved - November 6, 2024 at 2:37 AM

@RealAlexJones - Alex Jones

Voters Across The Country Are Discovering That Our Election Systems Are Totally Broken. Paper Ballots - One Day Voting. Watch And Share The Live Feed Of The Election Coverage Here: https://t.co/SvmawgY5x0 https://t.co/bdSrfusigN

Video Transcript AI Summary
Mismatch signatures in Maricopa County have led to approximately 27,000 ballots being sent for curing, with 15,000 cured so far. Concerns about the vulnerability of electronic voting machines have been raised by numerous Democrats before the 2020 election, highlighting issues like easy hacking and outdated systems. Reports from voters indicate problems, such as being told they had already voted when they hadn’t. There are fears of election fraud, with claims that the integrity of the election process is at risk. Amid these concerns, there is a push for better election security and awareness of potential manipulation. Support for Trump is anticipated, but vigilance against fraud is emphasized. Additionally, there are promotions for health products aimed at boosting immunity and overall well-being.
Full Transcript
Speaker 0: Mismatch signatures in Maricopa County. So you already have the issues in Phoenix, clip 5. Speaker 1: Of those approximately 1,400,000 ballot packets, we have sent approximately 27,000 to curing so far. Now what curing is is that's the process by which we attempt to contact the voter if we cannot match the signature. We have cured about 15,000 so far out of that 27,000. We have until 5 calendar days after election day in order to cure as many of those as we can. Speaker 0: So they're just gonna have this tranche of ballots, this 27,000, Whatever needs to happen, they just have a nice traunch of 27,000 ballots sitting in Phoenix in case they need them. You know? Totally normal. Totally normal stuff. I mean, we got all kinds of other reports here from citizens that are having trouble voting. Maybe we'll play some of those in the short segment, but let's just do this as we go to break. Let's just remind you. These are all Democrats prior to the 2020 election. You'd think we could all agree that the electronic voting machines are a problem. The democrats certainly think so. Here's a compilation of democrats ahead of 2020, before 2020, complaining about voting machines in clip 11. I continue to think that our voting machines are too vulnerable. The researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering. Speaker 2: Even hackers with limited prior knowledge, tools, and resources are able to breach voting machines in a matter of minutes. Speaker 3: In 2018, electronic voting machines in Georgia and Texas deleted votes for certain candidates or switched votes from one candidate to another. Speaker 4: The biggest seller of voting machines is doing something that violates cybersecurity 101, directing that you install remote access software, which would make a machine like that, you know, a magnet for fraudsters and hackers. Speaker 5: These voting machines can be hacked quite easily. Speaker 6: You could easily hack into them. It makes it seem like all these states are doing different things, but in fact, 3 companies are controlling that. It is the individual voting machines that some pose that pose some of the greatest risk. Speaker 7: There are a Speaker 8: lot of states that are dealing with antiquated machines. Speaker 0: Oh, Kamala Harris. Speaker 8: Right? Which are vulnerable to being hacked. Speaker 5: Workers were able to easily hack into an electronic voting machine. It was possible to switch votes. 43% Speaker 4: of American voters use voting machines that researchers have found have serious security flaws, including backdoors. Speaker 0: We know how vulnerable now our systems were. We know I know the hackathon that took place last year, where virtually every machine was broken into fairly quickly. I actually Speaker 8: held a demonstration for my colleagues here at the capitol, where we brought in, folks who, before our eyes, hacked election machines, those that are not those that are being used in many states. Speaker 9: Aging systems also frequently rely on unsupported software like Windows XP in 2000, which may not receive regular security patches and are thus more vulnerable to the latest methods of cyber attack. Speaker 5: In a close present or election, they just need to hack one swing state or maybe 1 or 2 or maybe just a few counties in one swing state. Speaker 6: I'm very concerned that you could have a hack that finally went through. Speaker 0: Yeah. I agree with the democrats, dozens of them. The voting machines are not good. It's a major problem we have. I agree with the democrats. We need to do something about these voting machines that are easily hackable. By the way, that that hacking convention he mentioned, we'll we'll we'll talk about that coming up too with a situation that's happening in Ohio right now. I mean, folks, look. I I I I still predict Trump will win. I think he gets 270 electoral votes, maybe even on the dime. I think it will be a victory tonight for the Republicans, but election integrity has to be a major issue moving forward, and the Trump administration needs to start dealing with it day 1 because this is just an abomination. Speaker 10: Okay. Tell me if this is right. I just went by one of the places that you vote at where I live at, and you don't go in to vote. You pull up in your car. They bring the machine out to your car. They push the buttons for you. There was no Republicans there. They were all Democrats. What is going on America? What the hell is happening in our country right now with our elections. There's no way I'm gonna trust the election after what I've seen today. There is no way the other people that are working there are pushing all the buttons and doing the voting for you while you sit there in your car with your door open. Never in my life have I seen this. I did. I started to film it as I was riding by, but there was too much traffic. Something's happened in America, and it's big. Pick up before it's too late. Speaker 0: Yeah. People are gonna see this one close. Speaker 10: Say Kamala Harris won South Carolina, I understand why. Speaker 0: People are gonna see right through this deal, folks. It's too big this year. Speaker 11: This one, and I took my oath to be a poll with her tomorrow for the United States election. I was told you can't wear red or blue. That makes sense. But she also said you can't wear American flags. And I said, why? And she said, well, because one side tends to not like it that much. They think you're trying to push their your beliefs on them. I'm sorry. We literally live in the United States America, and we're voting on the next leader of our country. And you're offended that we wanna wear American flags? Like, please don't vote for the wrong side of history, people. Please. Like, this is so insane. We are literally United States citizens voting for the United States president, and we can't wear American flags to polls or it pisses one side off. Be so fucking serious. Speaker 7: My name is Emily, and I wanna tell you about what happened to me this morning. I woke up and decided that I was gonna go vote. Can't really speak on the election if I didn't vote. So that's how I felt. And when I went to the Episcopal Church in Cape Coral, Florida, I stood in line for about 30 minutes. When I got up to the representative, I handed her my ID. She scans it and says, oh, you've already voted. I said, no. I have not. She said, here. Let me show you what I'm seeing. She takes the tablet, turns it my way, and it says, voted by mail. I said, I did not vote nor would I vote by mail. As I only even believe in voting by mail because I feel like it's easily manipulated and rigged, She turned white. And she said, hold on. Let me call somebody. She takes this flip phone that I guess is something they've been using for when this happens because apparently, I can't be the first one. She called somebody. I sat there for about 15 minutes, and they were able to delete it. After that, they scanned my ID again and said, okay. Delete it. You can go vote now. Speaker 12: What? Speaker 7: Meanwhile, I'm standing there. My heart is racing. I feel sick. Speaker 0: That's what you you get it? I just registered Deal with corruption first hand. Half ago. Speaker 7: So I just don't see how this is even possible. But, obviously, we know how it's possible. Things can be intercepted or rigged, for a lack of better words. So if you are going out to vote, you should be. I asked the lady. I said, well, does it say who I even voted for? She said no. She's not allowed to see it. They don't give that access to anybody that works there for the polls. So I'll never know Speaker 0: There's no doubt it, folks. There's no doubt about it. Democrats are at it again. They're going for the 2020 steal all over again. This time, though, we're prepared. We're watching them. The RNC is activated. It's as I said, this is gonna be a victory that's gonna be determined in the courts, not the polling locations. And it's already going Speaker 12: on. Ladies and gentlemen, election day 2024 is here. Trump is gonna win big with her trying to steal it. We have got all the top experts, people on the ground, everything, giving us the key intel. If you're watching on X particularly, be sure to go to real Alex Jones and watch the live feed. Tens of millions are already on it and share with everyone you know. History is happening now. Go to real Alex Jones on our backup stream at infowars on x@infowars.comforward/show and share with us on your email, your text message on x. Share it everywhere it's saying, this is the real intel. This is the real election coverage. This is where you find out what's really happening. God bless you all. This is historic. Now go to the main feed, watch it, and share it because you are the Paul Revere. You are the resistance. I am cutting this important announcement right in the middle of the November 5th, 2024 election. We'll be running this for a week or so. And it looks like a big Trump win, but they are in full steam ahead with election fraud levels over foreseen. Regardless of whether we're able to defeat this fraud or not, the awakening and the massive amount of support for Trump and traditional liberals and others waking up and joining us and realizing the democratic party ally with the neocons is cancer has been incredible. And it's part of the larger global realignment happening all over the planet. But we can't control everything individually. We can just work towards a better outcome. And it's a process and we're starting to get traction. And I've got faith. But regardless, with all the garbage and all the viruses out there and and all the drug resistant and antibiotic resistant bacteria and crap that's out there, especially in the winter when our immune systems are down, it is so important to boost our body's defenses naturally that God gave us. Now if you go to our great sponsor, doctorchosennaturals.com, there's a lot of great products. And they're key to keeping us on the air if info wars is shut down next week or if we're not shut down, continuing on here. We try to bring you through our sponsors' amazing products. Now we've got 2 new products at doctorjonesnaturals.com that are staples, that are known and amazing. And these are high quality versions of it, the best organic sources and at very, very low prices. 2 new products, introductory price, limited time, 40% off. And everybody needs quercetin, and everybody needs high quality coq10. And both of these are high quality, large doses at a very low price. Most competing brands say of coq10 of this quality and this dose, on average about $60 a bottle. This is way, way lower than that, and it funds the Infowar. And then, of course, quercetin max, really strong, high powered quercetin. Let me tell you in case you don't know what these do. Coq10, massive energy production, cellular power, cleaning out the cells, antioxidant properties, heart health. This is all on record. This is admitted. Improved exercise performance, cognitive health, diabetes management, skin health, immune support. I mean, you just ask GPT this and it'll tell you. Let's look at quercetin, antioxidant properties, immune system support, anti inflammatory effects, allergy relief, heart health, antiviral and antibacterial properties. That's the big one. Supports respiratory health, health, blood sugar regulation, improves exercise performance, brain health, cognitive, all of it. So these are amazing known staples that are so good for your body, your immune system, but not just so you have a better chance of not getting ill. It's the overall general quality of life you're gonna have. So I take both of these now at dotjonesdactrals.com. They're available for 40% off limited time. And if infowars shuts down next week, we're gonna have Infowars store anymore. We're gonna have our sponsors like drjonesnaturals.com and the allenshieldstore.com for the equipment, the satellite uplinks, the crew, the servers, the reporters, the writers, just all of it, and the legal as we keep battling the globalists as they try to shut us down. So we're gonna continue our amazing work. We cannot do without your support. This is a no brainer. You need to get this wherever you get it. If you got this stuff at Whole Foods, you know, they've got other great versions there. Everybody knows about course and then coq10. These are established. These are known. These are the game changers. Get it from us. Get high quality. Get a low price. Keep us on air. That's the win win. So please visit drjonesnaturals.com today and get these 2 great quality products. And there's so many other great ones there as well. Thanks for your support. Now go to drjonesnaturals.com, and I thank you for your support.
Saved - November 16, 2024 at 3:42 PM
reSee.it AI Summary
I watched as voters in Searcy, Arkansas, chose to hand count their 2024 election ballots instead of using machines. Surprisingly, hand-counting turned out to be much cheaper than the millions spent on machines. The process was fascinating, with each table featuring a team of one announcer/counter and two vote markers, ideally from different parties, all while a giant camera recorded everything. If every vote in the country were counted this way, it would make cheating nearly impossible.

@BehizyTweets - George

WATCH: Voters in Searcy, Arkansas, opted to hand count their 2024 election ballots instead of relying on corrupt machines. Officials found that hand-counting was actually much cheaper than spending millions on the machines. The process they used is the coolest thing ever. Each table had a team consisting of one announcer/counter and two people who marked the votes (ideally a Democrat and a Republican)—a giant camera also recorded the process. Imagine if every vote cast in the country was counted like this. Cheating would be nearly IMPOSSIBLE.

Video Transcript AI Summary
Each counting table has a screen where individuals read paper ballots line by line. Two people, ideally from different parties, record the results provided by the ballot readers. This process began at 9 AM and aims to ensure the machine counts match the paper counts. So far, no discrepancies have been found. This method, requested by voters, is supported by both parties to ensure votes are accurately counted and trusted. Additionally, it saves the county money and speeds up the voting process by allowing multiple paper ballots to be processed simultaneously, eliminating the need for expensive machines that require frequent replacement.
Full Transcript
Speaker 0: Each one of the tables counting has the screen. You can see the people go in with their ruler line by line. As they read these paper ballots, there are people as you can show them, Sam. There are 2 people, ideally a Democrat and a Republican, writing down the answers that the person on the other table gives. And so it's happening at all these different stations. Some of them not manned right now as we're getting close to that lunch hour and everything. But they've started around 9 AM today, and they're going through just to make sure that everything that the machine counted is the same as the paper count. They said they haven't found any differences yet, but it's really what the voters asked for, and so that's what they're doing. And they said in a time where the country is split 51, 49, or 50, 50, this is something that the Democrats and the Republicans agreed on. 1, because they wanna make sure that their vote counts. They wanna make sure that it's read correctly and can be trusted. Secondly, it saves the county a lot of money, and it makes the voting process quicker. They can get as many paper ballots out at a time instead of having to wait on machines and that they can make sure that it's cheaper because they don't have to buy an $8,000 machine that has to re replace every couple of election cycles.
Saved - December 11, 2024 at 3:48 PM
reSee.it AI Summary
I'm going public to address @Jim_Jordan about a document handed to him on May 13, 2024. We just lost more votes, and this could have been prevented. I urge everyone to read this to understand our current struggles and the urgent need for reform. We must return elections to the people; otherwise, our perceived freedom is just an illusion. If citizens regain control and oversight of their elections, we can save our country. We have one chance to get this right, starting in 2025.

@PatriotMarkCook - Mark Cook

‼️OK, I'm going public ‼️ @Jim_Jordan, this was handed to you on 2024-05-13. Can you please let us know if you took the time to read it? We just hemorrhaged votes YET AGAIN and it all could have been avoided. If anyone else is curious, I suggest you read through this so you can understand what we have been and are living through right now, and why it is so critical that all this is fixed immediately. We MUST return our Elections to The People, or the freedom we think we have will forever be just the illusion. If the citizens of this country REGAIN control, oversight, and verifiability of THEIR elections, we can save this Country. If we don't, we will not get another opportunity. God gave us this gift. We have ONE SHOT at getting it right, and our one opportunity is right now starting in 2025. https://handcountroadshow.org/wp-content/uploads/2024/05/2024-05-13-Engineered-Theft-of-a-Superpower.pdf

Page not found – Hand Count Road Show handcountroadshow.org
Saved - December 25, 2024 at 1:48 PM
reSee.it AI Summary
I believe every House and Senate seat flipped from Republican to Democrat after November 5, 2025, should be investigated and forensically audited immediately. It's clear that Mail-In Ballots were sent out after polls closed. We need to ban mass mail-in ballots right now.

@Real_RobN - 🇺🇸RealRobert🇺🇸

Every single House and Senate seat that was flipped from Republican to Democrat after Election Day, November 5, 2025 should be investigated, and forensically audited at once. There is no question, that they sent out Mail IN BALLOTS after polls closed on election night. BAN MASS MAIL IN BALLOTS AT ONCE.

Video Transcript AI Summary
There are 74,243 mail-in ballots in Arizona with no clear record of being sent. In Arizona, EB32 forms track when mail-in ballots are sent, while EB33 forms track when they are received. Ideally, there should be more EB32s than EB33s, indicating that more ballots are sent out than returned. The issue arises with these 74,000 ballots, as we cannot confirm they were ever sent to the individuals listed.
Full Transcript
Speaker 0: Example, we have 7,000 74,243 mail in ballots, where there is no clear record of them being sent. And just to be clear, here in the state of Arizona, there's EB32s and EB33s. EB32s is supposed to give a record of when a mail in ballot is sent, and an EB33 is supposed to give a record of when the mail in ballot is received. And so there should be an equal there should be more EV32s more sent out than there are that are received. Specifically with these, we also we can tie them to a specific individual that was mailed to. And so we have 74,000 where we have and came back from individuals where we don't have a clear indication that they were ever sent out to them.
Saved - December 26, 2024 at 2:45 PM
reSee.it AI Summary
Katie Hobbs and Adrian Fontes rigged two elections against Kari Lake. I demand an end to election month, mail-in ballots, and machines. We need to investigate and forensically audit every House and Senate seat flipped from Republican to Democrat in November 2025. On Election Day 2022, 59% of machines shut down in GOP areas.

@Real_RobN - 🇺🇸RealRobert🇺🇸

There is no question, Katie Hobbs and Adrian Fontes rigged 2 consecutive elections against Kari Lake! END ELECTION MONTH, END MAIL-IN-BALLOTS, END MACHINES, END KATIE HOBBS AND ADRIAN FONTES, Every single House and Senate seats that were flipped from Republican to Democrat on election month November 2025, investigate, forensically audit and INCARCERATE. Election Day 2022, 59% of machines shut down on election day in GOP areas,

Video Transcript AI Summary
I was advised early in my political career to avoid discussing the forensic audit, the 2020 election, distancing myself from Trump, and questioning COVID vaccines or mandates. I disregarded that advice, visited the forensic audit site, and began addressing election corruption. Now, more evidence is emerging daily, and people are starting to catch up with these issues.
Full Transcript
Speaker 0: Ben. I remember somebody who was in politics telling me when I first started, do not talk about the forensic audit. Don't talk about the 2020 election. Distance yourself from president Trump. And whatever you do, don't bring up COVID or question the vaccines or the mandates. And I looked at this guy, and I basically kicked him out. And I took all of his suggestions and advice, and I threw it in the trash can. And I immediately went down, and I toured the forensic audit site. And I started talking about our corrupt elections. And, you know, people have finally caught up. We're seeing some more evidence every single day come out.
Saved - January 10, 2025 at 9:52 AM
reSee.it AI Summary
I raised concerns about why U.S. election monitoring by CISAGOV involves Israeli IPs and Akamai servers. I referenced the influence of AIPAC on Congress and questioned why a foreign lobby can buy political power. I highlighted Israel's controversial history, including its nuclear program and the actions of groups that formed the IDF. I expressed my opposition to U.S. financial support for Israel while facing domestic issues. Additionally, I discussed the need for Trump to ensure election integrity in the upcoming midterms, emphasizing the importance of clean and transparent elections.

@Theonlyme333 - Theonlymethereis

Why does @CISAGOV ping through Israeli IPs run on Israel based Akamai servers during monitoring of U.S. elections? https://t.co/43jgxAR71M https://t.co/eYc2IcfBYb

@IanCarrollShow - Ian Carroll

That AIPAC purchased the seats of about 90% or more of our current congress. JFK famously wanted them registered as a foreign agent right before he was shot and thus they changed their name and never registered. Why are we letting a foreign lobby buy off our congress? That Israel was obviously the state sponsor of Jefrey Epstein, whose handler was Ehud Barak, ex head of Israeli military intelligence, his funding was Les Wexner one of the worlds richest Zionist 'philanthropists' and he was accused by ex Mossad assets of being Mossad. Not to mention the Maxwell connection. (They had blackmail on Clinton, and many, many more.) He who holds the blackmail holds the leash- just ask J. Edgar Hoover. That Israel is the only nation who has a defacto sanctioned, yet actually secret and unsanctioned nuclear program. A program that they stole from the United States- look into the Apollo affair, NUMEC, the Dimona nuclear facility. That jews, muslims, and christians lived side by side in peace in Palestine before the Rothschilds purchased the country from Britain during WW1 (see the Balfour declaration) and began their colonial program. That the groups that founded Israel, Lehi, Irgun, and Hagannah, were declared terrorist organizations by Israel itself because their tactics were so deplorable (bombing British and Palestinian civilians) yet these three 'paramilitary' groups rebranded to form the IDF and their leadership became the leadership of Israel for the following thirty plus years. That Israel is a foreign nation halfway across the world that has no business receiving my tax dollars. Why are we sending them billions of dollars of our tax money while our country burns, is overrun by illegal immigration, etc? We are told Israel is our 'greatest ally' so why would they have had a massive spy network targeting US government agencies leading up to sep 11, 2001 - see the Israeli art students DEA report for copious evidence of Israeli surveillance all across the continental US. This is an official government report that cites hundreds of incidents of observed Israeli surveillance teams documented by US government agents all across the continental US. And we still have received 0 answers why there were numerous fake Israeli moving companies positioned all across the eastern seaboard leading into September 11, 2001 and we have multiple eye witness reports, as well as hard photographic evidence that they knew the attacks were coming at least a day before they did and that they were positioned at a vantage point to photograph the attack up to a half hour before the first plane hit. Never got any answers- but you can read the official FBI reports about the incident. I've broken them down live on X before. That's just a small list of some of the best documented reasons why I, as an American, dont want Israel receiving any of my tax dollars. And I didn't even mention my obvious objections to the collective punishment, mass surveillance, forced starvation, bombing of refugee camps, brutal murdering of women and children that's been going on in Gaza and the West Bank for years, decades- which you can watch in graphic detail right here on X. And that's not to mention that somehow we let congress pass laws outlawing 'antisemitic' speech, despite our own first amendment. And we have anti-boycott legislation in multiple states, despite the fact that it's perfectly legal to boycott American companies... just not Israeli ones. Every content creator knows the fastest way to get demonetized, banned, and slandered is to be critical of Israel. I figured you would have realized this too after what they did to you and tried to do to X last year.

@Theonlyme333 - Theonlymethereis

If @realDonaldTrump is to make meaningful changes in regards to election integrity, his administration has to have their act together and hit the ground running day 1 and wield a big stick in doing so. Otherwise the 2026 midterms will be rife with the same compromised systems and process subversion and manipulation as we've seen consistently. Risking the likelihood his last half of his 2nd term be neutered and kneecapped severely. @Kash_Patel and @PamBondi will need to put their backs and shoulders into it as well. Pressure will need to be applied in all diections to move the unwilling malignant mass that is local, state, and federal bureaucracies to do what WE the people have been denied. 👉Clean 👉Transparent 👉Sovereign ELECTIONS not *Selections* https://t.co/wgpkPDSU6w

@joeoltmannX - Joe Oltmann

Thread: @realDonaldTrump @elonmusk I wrote this BLUF. I also commissioned a white paper that outlines the how to. The reality is simple regardless of the defamers and liars... I understand the reality that Rome was not built in a day, but you can knock it down in a day.…

Saved - November 2, 2025 at 12:21 PM

@SidneyPowell1 - Sidney Powell 🇺🇸 Attorney, Author, Gladiator

ELECTIONS: Objections to elections & electoral counts since 2000 when machines began their “black box” funny business. ⁦@realDonaldTrump⁩ ⁦@DataRepublican⁩ The Rule of Law depends on transparent trustworthy elections. We must get them now‼️ Hand count paper ballots. https://t.co/i6OjIuUYBe

Video Transcript AI Summary
The chair hands the certificate of the electors for president and vice president of the state of Florida to the tellers. An objection to Florida’s votes is presented in writing, signed by a number of members of the House of Representatives, but not by a member of the Senate. A member of the Congressional Black Caucus states that he is objecting to the counting of the 25 electoral votes from Florida, thanking the president for the inquiry, and says the objection is signed on behalf of his diverse constituents and the millions of Americans disenfranchised by Florida’s inaccurate vote count. The clerk reports the objection, noting that it is signed by a member of the House and a United States senator. The objection to Ohio’s electoral votes is read, raised on the ground that the votes were not “under all of the known circumstances regularly given.” It is signed by Stephanie Tubbs Jones of Ohio and Barbara Boxer of California. Another speaker says the objection today is raised because there are irregularities across the country with regard to voting, and that Congress has an obligation to step up to the plate and correct them. A further speaker dedicates the Ohio objection to Michael Moore, the producer of the documentary Fahrenheit 9/11. A speaker notes that, first of all, no election official in Ohio has provided any explanation for the massive and widespread irregularity in the state, including machines in Mahoning County that recorded “carry” votes for Bush. There is a sense of concern about irregularities across the nation. In closing, another speaker remarks that people are dying all over the world, many from his state, in the name of bringing democracy to distant parts of the world, and asks, “Let’s fix it here, and let’s do it first thing out.”
Full Transcript
Speaker 0: The chair now hands to the tellers the certificate of the electors for president and vice president of the state of Florida. Speaker 1: Mister president, the objection is in writing, signed by a number of members of the house of representatives, but not by a member of the Senate. Speaker 2: Mr. President, I stand for the purpose of objecting to the counting of the vote from the state of Florida as read. Mr. President, I rise on behalf of the Congressional Black Caucus to object to the 25 electoral votes from Florida. Mister president, thank you for your inquiry. It is in writing. It is signed by myself on behalf of my diverse constituents and the millions of Americans who have been disenfranchised by Florida's inaccurate vote count. Speaker 0: The is the objection signed by a senator? Speaker 1: Well, mister chair mister president, I am objecting to, to the idea that votes in Florida were not counted. Speaker 3: The clerk will report the objection. We, a member of the house of representatives, and a United States senator, object to the counting of the electoral votes of the state of Ohio on the ground that they were not under all of the known circumstances regularly given. Signed, Stephanie Tubbs Jones, state of Ohio. Barbara Boxer, state of California. Speaker 4: The objection today is raised because there are irregularities across this country with regard to voting, and we as a congress have an obligation to step up to the plate and correct them. Speaker 5: Mister speaker and members, I dedicate my objection to Ohio's electoral votes to mister Michael Moore, the producer of the documentary nine eleven. Speaker 1: First of all, we are here because not a single election official in Ohio has given us any explanation for the massive and widespread irregularity in the in the state. No explanation for the machines in Mahoning County that recorded carry votes for Bush. Speaker 6: Our people are dying all over the world. A lot from my state. For what reason? To bring democracy to the far corners of the world. Let's fix it here, and let's do it first thing out. Thank you very
Saved - July 15, 2025 at 7:17 PM

@SidneyPowell1 - Sidney Powell 🇺🇸 Attorney, Author, Gladiator

Yes elections do matter. We need completely transparent elections NOW. No more black boxes that count images they generate. We must have paper ballots hand counted. NO COMPUTERS. NO MACHINES ‼️

@BreitbartNews - Breitbart News

Elections matter. https://t.co/VyB6vfdNyn

Saved - August 5, 2025 at 2:53 AM
reSee.it AI Summary
After twenty years, Georgia's Dominion Rigging Systems was declared to have named the wrong winner in the May 22, 2024 DeKalb County District 2 Commission Primary. This issue surfaced when a candidate received no votes in her precinct, prompting a report to the DeKalb Election Board. A machine recount confirmed the initial results, leading to a hand count that revealed the system had miscounted her votes, shorting her by 3,049 votes. I believe all voting machines in America should be banned and dismantled.

@Real_RobN - 🇺🇸RealRobert🇺🇸

And here it is: Twenty years in the making, Georgia’s Dominion Rigging Systems DECLARED WRONG WINNER for the May 22, 2024 DeKalb County, Georgia District 2 Commission Primary. A decision by the election board was made to do a HAND RECOUNT to ensure accurate results of the election. It only became known because a candidate received no votes in the precinct where she and her husband lived and voted. When she reported the problem to the DeKalb Election Board, they ordered a machine recount that produced the SAME RESULTS AGAIN. They then conducted a hand count of the race that proved the voting system shorted the candidate 3049 of her actual 4078 votes, over 74% of her total votes. The system gave 1456 of her votes to one of her opponents and failed to count another 1805 of her votes. Ban, dismantle, eliminate, and excommunicate every single voting machine across America.

Video Transcript AI Summary
On election night, the results from tabulating machines appeared inaccurate. The board decided to conduct a hand recount to ensure accurate election results. The speaker notes that they have been advocating for hand recounts for twenty years.
Full Transcript
Speaker 0: On election night in the days following, it appeared that the results that were coming off the tabulating machines were not accurate. A decision by the board was made to do a hand recount to ensure accurate results of the election. Wasn't that the DeKalb County election board attorney? Play it again Sam. A decision by the board was made to do a hand recount to ensure accurate results of the election. What? Isn't that what I've been saying for twenty years? Do a hand recount.
Saved - July 31, 2025 at 3:35 PM
reSee.it AI Summary
I believe we have no future unless we correct our past mistakes. It's crucial to recognize that we don't have real elections; instead, we have an illusion. Election results are controlled by officials in places like Maricopa County, not by our votes. I urge everyone to watch the over 50 videos by Michele Swinick, who investigated the election processes there. The evidence is available in public records, and I encourage you to request and check these records in your own county. Michele and Leo Donofrio have done the work; we need to trust them and reach out for help.

@RL9631 - Renata

🔴 My dear America First Friends, We have no future, if we don’t get the past corrected right now. I completely see what you’re all saying and some questioning, but you need to understand this one simple fact, we DO NOT have an elections. We have an ILLUSION of elections. We have a crime scenes and NO one is being held accountable for all the crimes committed. Counties Officials like in Maricopa County AZ control elections results and they decide who gets to win. NOT our votes. They want you to think that your vote counts but it’s NOT. PLEASE you can WATCH the 50+ videos Michele Swinick has posted over 2.5 years and please visit her website. She was the AZ Election Judge and she investigated Maricopa County with Leo Donofrio, Esq. All evidence is in the County public records, videos, and election receipts, tapes. You can send a request for all records in your county and check for yourself. I can bet you that NOBODY ever has checked these records. Michele Swinick and Leo Donofrio, Esq. they both did. @EverythingHomeT @LCDLAW1🇺🇸 President Trump and First Lady Melania are the only ones WE trust to do the right thing. President Trump, please contact Michele and Leo they want to help. @realDonaldTrump @MELANIATRUMP @DanScavino

@RL9631 - Renata

🔴 Director of Elections at Maricopa County Arizona, Scott Jarrett admitted at the MC Board of Supervisors meeting that they backed out the results of Election Day and re-ran the ballots. That's an illegal recount. ⚠️ ARS 16-662. ⚠️ Maricopa County BROKE THE LAW. 2024 Primary was ILLEGAL. @realDonaldTrump @DanScavino 🔴 WATCH THE VIDEO - Only 47 minutes of your time but it is worth watching. More information is on Michele Swinick’s website: http://www.SaveMyFreedom.us https://launchlinks.com/ElectionSystemOperationEXPOSED 👇

The Save My Freedom Movement | Substack 🔥 Stop Struggling. Make More Money. Get Healthy. Take Back Control. Built for freedom-seekers, entrepreneurs, side hustlers & podcasters ready to act, earn & lead. Get paid while helping others—with simple tools, real coaching & ongoing support. JOIN US! Click to read The Save My Freedom Movement, a Substack publication with thousands of subscribers. savemyfreedom.substack.com
Election Fraud, Nutrition, maha, make america great again, weight loss, lose weight, detox, election crimes, maricopa county, arizona launchlinks.com

@EverythingHomeT - Michele Swinick 💲 Make More Money & Get Healthy!

WATCH Maricopa County Commit Election Fraud & Maladministration During The JULY Primary. They ERASED Results From Election Day At 9 to 20 Vote Centers & ILLEGALLY RECOUNTED The Ballots! THEY BROKE THE LAW! Where Are The Candidates? https://t.co/YfkLni2ozN

Saved - April 8, 2026 at 11:35 AM
reSee.it AI Summary
I acknowledge an urgent notice declaring BMDs and DREs untrustworthy due to irremediable data exfiltration risks from compromised vendors or third parties. I will prohibit use of these systems, switch to hand-marked paper ballots, and safeguard ballots with tamper-evident containment. I will rely on hand counts and independent audits, publish only paper-based precinct results, and report implementation within 48 hours.

@PatriotMarkCook - Mark Cook

Emergency Notice: Critical Exploit Vector in Early Voting and Pre-Poll-Close Tabulation Processes – Broad Compromise Scenarios Date: April 7, 2026 To: All State and Local Election Officials, Election Directors, and County Clerks Subject: Immediate Action Required – Prohibition of BMD and DRE Systems Due to Irremediable Data Exfiltration Risk from Vendor or Third-Party Infiltration This notice details a sophisticated manipulation vector involving real-time voter turnout tracking combined with actual early vote data. When voting systems can be infiltrated—whether by a compromised vendor or third-party bad actors—the systems cannot be trusted or used, as they enable undetectable exfiltration of precise vote data that can be leveraged for targeted ballot stuffing prior to poll closure. Threat Description Sophisticated actors, including compromised vendors or third-party bad actors who have infiltrated systems through hacking, supply-chain attacks, insider access, remote exploits, or any other available means, can harvest real-time voter check-in data alongside actual tabulated vote results from Ballot Marking Devices (BMDs) and Direct Recording Electronic (DRE) machines during early voting. This enables dynamic modeling to determine the exact number, type, and distribution of fraudulent ballots needed to offset legitimate votes. Infiltrated BMDs and DREs can exfiltrate vote data through hidden channels regardless of physical seals, network disconnection attempts, or claimed security features. Because these systems generate and store vote data in real time while voters are still casting ballots, the harvested information allows precision adjustments via mail-in or drop-box stuffing before polls close. Post-poll-closure use is impossible, as voting ends when polls close. Therefore, BMD and DRE systems present an irremediable risk and cannot be deployed in any capacity if system trustworthiness cannot be independently verified against all infiltration vectors. How the Exploit Can Be Executed ▫️BMDs and DREs capture and potentially transmit exact vote totals during active voting periods. ▫️Combined with poll-book data, this creates a real-time predictive model for surgical ballot stuffing. ▫️Infiltration (vendor or third-party) allows covert data extraction even from ostensibly secured or air-gapped systems. ▫️Fraudulent ballots are then injected to precisely offset real votes, defeating audits based on compromised machine baselines. Required Mitigation Steps Election officials shall implement the following controls immediately. These measures assume BMD and DRE systems are fully untrustworthy due to infiltration risks and prohibit their use entirely. Prohibition of BMD and DRE Systems Immediately cease all use of Ballot Marking Devices (BMDs) and Direct Recording Electronic (DRE) machines for any voting. ▫️Do not deploy these systems at any point in the election cycle, including early voting or Election Day, as no post-poll-closure voting window exists. ▫️Transition exclusively to hand-marked paper ballots as the sole method of recording voter intent. Secure Handling of Existing Paper Ballots ▫️Treat all previously cast ballots on BMD-printed records as paper-only where possible, subject to full hand count. ▫️Store all ballots in tamper-evident, sequentially numbered containers under continuous bipartisan or multi-party observation. ▫️Prohibit any machine tabulation or data output from compromised systems. Chain-of-Custody and Processing Protocols ▫️Keep all mail-in and drop-box ballots sealed and unprocessed until after poll closure. ▫️Perform all tabulation via hand count or independently verified, non-vendor-dependent methods after polls close. ▫️Reconcile totals solely against voter check-in records using paper-based procedures. Mandatory Paper-Based Verification ▫️Conduct full hand counts or rigorous risk-limiting audits based exclusively on original hand-marked paper ballots. ▫️Ignore all data or totals originating from BMDs or DREs. ▫️Publish precinct-level results only after independent paper-based verification and certification. Immediate Notification and Escalation ▫️Distribute this notice to all poll workers and observers. ▫️Report any continued use or suspected data exfiltration from BMD/DRE systems to state and federal election security officials immediately. ▫️Engage independent forensic auditors for equipment assessment where prior use occurred. Critical Guidance BMD and DRE systems cannot be used safely when infiltration by vendors or third-party actors is possible, because they enable real-time data exfiltration during active voting, with no viable window for secure post-closure operation. The only reliable mitigation is complete prohibition and exclusive reliance on hand-marked paper ballots under strict human oversight. Election officials bear ultimate responsibility and cannot delegate integrity to potentially compromised electronic systems. Failure to prohibit BMD and DRE use exposes the election to undetectable manipulation. Officials are directed to confirm receipt and implementation status, including confirmation of transition to hand-marked paper ballots, to their state election authority within 48 hours. - End of Notice -

Saved - July 8, 2023 at 5:14 PM

@KanekoaTheGreat - KanekoaTheGreat

BREAKING: Explosive video surfaces of FOX News stars Tucker Carlson, Laura Ingraham, and Sean Hannity slamming Trump's "insane" voting machine fraud allegations as "absurd," "ridiculous," and "complete BS"!

View Full Interactive Feed