reSee.it - Related Post Feed

Saved - April 15, 2023 at 2:52 AM
reSee.it AI Summary
Georgia's years-long court battle has revealed Dominion's security and audit flaws, including weak testing and rushed implementation. Experts raised fundamental concerns about the inability to accurately audit Dominion's systems and the system's failure to meet Georgia election law requirements. Cybersecurity experts provided evidence of Dominion's QR system's lack of security and the ability to generate fake QR codes. Additionally, Dominion's technical staff maintained control over server logs and made deletions in portions of the logs. The Dominion system also prevented the successful use of Risk-Limiting Audits.

@themarketswork - Jeff Carlson

1) Georgia Years-long Court Battle Reveals Dominion’s Security and Audit Flaws, Weak Testing Rushed implementation of voting system questioned as experts raised fundamental concerns https://www.theepochtimes.com/georgia-years-long-court-battle-reveals-dominions-security-and-audit-flaws-weak-testing_3611494.html

Years-Long Court Battle in Georgia Reveals Dominion’s Security Flaws, Weak Testing News Analysis Behind the current controversy surrounding the integrity of results from the Nov. 3 presidential election in ... theepochtimes.com

@themarketswork - Jeff Carlson

2) A review of court documents and sworn expert testimonies raise troubling questions regarding the Dominion voting system and its rushed implementation by the State of Georgia.

@themarketswork - Jeff Carlson

3) Among the many issues raised was the inability to accurately audit Dominion’s systems in order to verify that the intended votes were cast as intended.

@themarketswork - Jeff Carlson

4) Experts also demonstrated to the court how the Dominion system inherently prevented the successful use of Risk-Limiting Audits (RLAs) - the method employed by Georgia & VotingWorks during the recount.

@themarketswork - Jeff Carlson

5) Judge Totenberg agreed with the inability to successfully perform a RLA, noting in her ruling that “there is no audit remedy that can confirm the reliability and accuracy of the BMD system, as Dr. Stark has stressed.”

@themarketswork - Jeff Carlson

6) Cybersecurity experts provided evidence to the court that Dominion’s QR system wasn’t secure, was subject to duplication, and that the ability to generate fake QR codes existed.

@themarketswork - Jeff Carlson

7) A cybersecurity expert also found that during Georgia’s August 2020 elections, servers at two county election offices he visited “enabled unsafe remote access to the system through a variety of means,” including the use of flash drives.

@themarketswork - Jeff Carlson

8) This same expert found that in one of these counties, “server logs were not regularly recording or updated in full and that Dominion’s technical staff maintained control over the logs and made deletions in portions of the logs.”

@themarketswork - Jeff Carlson

9) Experts also found significant problems with the testing processes used by Pro V&V. In a case that involved last-minute updates to Dominion software, the court was told that the testing lab “performed only cursory testing of this new software.”

@themarketswork - Jeff Carlson

10) A Dominion system experienced a “memory lockup” after scanning only 4,500 ballots during testing in 2019. Dominion determined that a “power cycle” is required after scanning more than 4,000 ballots. It isn’t known if this issue was fixed prior to the 2020 elections.

@themarketswork - Jeff Carlson

11) The court also found that the manner in which the Dominion system functions failed to meet the requirements of Georgia election law. As U.S. District Judge Amy Judge Totenberg noted, Dominion’s system “does not produce a voter-verifiable paper ballot." /END

Saved - June 4, 2023 at 9:05 AM

@Curiousityfirst - DogAndBone @Curious Cat

@jhalderm the same guy that found the Dominion vulnerability, wherein instead of stating they breached their contract, he ensured that DOMINION's CVR's were "sanitised" to make it difficult to analyse. @JanuszP20 @noodles @CannConActual @TxSaving https://t.co/AL4uliCgdh

@KanekoaTheGreat - KanekoaTheGreat

🚨Hacking America's Election System 1 hour of computer scientists, election security experts, and Senate Democrats talking about how easy it is to hack voting machines. @KariLake @katiehobbs @GenFlynn @realMikeLindell @bgmasters @PatrickByrne @JackPosobiec @DavidSacks @elonmusk https://t.co/sH4Ft0iMsB

Video Transcript AI Summary
Voting machines in the US are vulnerable to hacking and manipulation, according to security researchers. These machines, which come in various models, have been found to have security vulnerabilities that allow attackers to inject malicious software and change election data. The most efficient way to hack the machines is through the machine used to program them, as it can pass rogue software to the voting machines. Contrary to popular belief, many voting machines are connected to the internet, either through wireless modems or other means, making them susceptible to cyber attacks. The lack of proper security measures and outdated systems make it only a matter of time before election results are compromised.
Full Transcript
Speaker 0: I know America's voting machines are vulnerable because my colleagues and I have hacked them repeatedly. We've created attacks that can spread from machine to machine like a computer virus, and silently change election outcomes, and in every single case We've found ways for attackers to sabotage machines and to steal votes. Across the country, there are about 52 different models of machines. They they fall into essentially 2 styles. Ones that scan a piece of paper or ones where the vote, the voter just interacts with the touch screen. And many of them have been analyzed now by researchers, looking for security vulnerabilities. In every single case where a US voting machine has been analyzed by competent security researchers, They have found vulnerabilities that would let someone inject malicious software and change election data. Every single case. Speaker 1: The better or the more efficient way of hacking machines would be to subvert them all through the machine that's used to actually program those machines. So prior to each election, the county election office or the voting machine vendor will actually program memory cards for that election. It tells the machine who are the candidates, what are the, you know, the the contests being decided, and that gets It's inserted into the voting machine. If you can alter, if you can subvert that machine that is used to program those memory cards, then you can pass rogue software to the voting machine. Speaker 0: Voting machines that are not connected to the internet. This is something that you hear all the time in the US from election officials. Unfortunately, it's not actually true. Many new voting machines that come with 4 gs wireless modems so that they can be connected to the internet from the polling place in order to upload the results faster. Now to me, that sounds crazy. Why would you want to put your voting machines on the Internet right in the middle of the election, potentially at the most vulnerable Speaker 2: time. Studies conducted in 2007 by the state of California, state of Ohio, state of Florida found security vulnerabilities that could take advantage of these To engineer viruses where 1 compromised voting machine could then infect eventually the entire fleet of machines for an entire county. Typically at the end of the election day, you move a memory card through each of the machines in the precinct, and that's to collect the vote totals. That process can spread a virus. And there are other processes. The details vary from machine to machine. Speaker 3: When you say hacked, what were they able to do once they gained access to the machines? Speaker 4: All sorts of Executally manipulate the outcome of the vote. They could manipulate the tally. They could delete the tally, and and they could compromise the vote in any number of ways. Speaker 5: The machines used in Georgia have been demonstrated to be hackable through a virus that's carried on ballot definition cartridges. Very much like this Duxnet virus was inserted into nuclear centrifuges in Iran. Speaker 3: There are a number of states that outsource their reporting of elections to third parties, some of which are corporations based in other countries like Spain. So you've got to trust that the aggregation of the votes and the reporting of the votes is accurate as well. Speaker 0: I'm pretty sure my undergrad computer security class at Michigan could have changed the outcome of the 2016 teen Michigan election if we wanted to. It is that bad. And we have a combination of very powerful adversaries, and unfortunately quite vulnerable and obsolete systems. That's that's why I say it's only a matter of time. Speaker 6: Unfortunately, in a lot of these systems, The audit trails are just as vulnerable as the other aspects of the system. So there may not be good forensic evidence of a successful intrusion. With the current design, we cannot be universally confident that it hasn't happened. And it's probably only a matter of time before it will. Speaker 7: I come here today as a computer scientist who spent the better part of the last quarter century studying Election system security. As you're well aware, the integrity of elections across the US depends heavily on the integrity of computers and Software systems. Unfortunately, much of this infrastructure has proven dangerously vulnerable to tampering and attack, and in some cases, In ways that cannot be easily detected or corrected, after the fact. These vulnerabilities can create practical avenues for, corrupt candidates or foreign adversaries to do everything from cause large scale disruption on Election Day to potentially, undetectably alter, election outcomes in some cases. So let me begin with the voting equipment itself. To be blunt, it's a widely recognized, really indisputable fact that every piece of computerized voting equipment in use at polling places today Can be easily compromised, in ways that have the potential to disrupt election, operations, compromise firmware and software, Potentially alter, vote tallies in the absence of, other safeguards. This is partly a consequence of historically poor design and implementation by equipment vendors, but it's ultimately a reflection of the nature of complex software. It's simply beyond the state of the art, to build software systems that can reliably withstand targeted attack By a determined adversary in this kind of an environment. The vulnerabilities are real. They're serious. And absent a surprising and very fundamental break through in my field, which I would welcome, but I don't see coming, soon, probably inevitable. We give most of the attention to vulnerabilities in voting machines, But that's not the whole story. Each of the more than 5,000 jurisdictions responsible for running elections across the nation Must maintain a number of critical information systems that are attractive targets for disruption by adversaries. Most important of these are voter registration databases, the systems that report, final results, and so forth. Unfortunately, There are even fewer standards for how to secure these systems. The administration of these systems varies widely. And the threats against these systems are often even more, acute than the threats against individual voting systems. You know, just as we don't expect the local sheriff to single handedly defend against military ground invasions, we shouldn't expect county election IT managers to defend against cyber attacks by foreign intelligence services, but that's precisely what we've been asking them, to do. Speaker 0: I'm a professor of computer science and have spent the last 10 years studying the electronic voting systems that our nation relies on. My conclusion from that work is that our highly computerized election infrastructure that is vulnerable to sabotage, and even to cyber attacks that could change votes. These realities risk making our election results more difficult for the American people to trust. I know America's voting machines are vulnerable because my colleagues and I have hacked them repeatedly, as part of a decade of research, studying the technology that operates elections and learning how to make it stronger. We've created attacks that can spread from machine to machine, like a computer virus, and silently change election outcomes. We've studied touch screen and optical scan systems, and in every single case we've found ways for attackers to sabotage machines and to steal votes. These capabilities are certainly within reach for America's enemies. As you know, states choose their own voting technology. And while some states are doing well with security, others are alarmingly vulnerable. This puts the entire nation at risk. In close elections, an attacker can probe the most important swing states or swing counties, find areas with the weakest protection, and strike there. In a close election year changing a few votes in key, localities could be enough to tip national results. The key lesson from 2016 is that these threats are real. Some say the fact that voting machines aren't directly connected to the Internet makes them secure, but unfortunately this is not true. Voting machines are not as distant from the Internet as they may seem. So the way these attacks work Is that before every election, every voting machine needs to be programmed with the design of the ballot, the names of the races and candidates. And voting officials do that by inserting a memory card into the machine. If an attacker can infect that memory card With malicious code, well, when the memory card is inserted into the machine, it can change the programming running on the voting machine And caused the voting machine to, at the end of the election, output whatever results the attacker wants. Speaker 5: The machine that I hacked is called the Sequoia AVC Advantage, now called the Dominion AVC Advantage. It's in The computer program that counts the votes on this machine is in a read only memory that's mounted in a socket on the motherboard. To hack this machine, you have to Remove that memory chip from its socket and install a memory chip, on which you've prepared a cheating program. The cheating program that I prepared, has an extra 100 lines of code basically that, when the polls are about to close, it goes in there and changes some votes stored in the machine. And there is an electronic log of all votes cast, so it changes the log too. So to install that, the attacker doesn't need to be a computer scientist, the attacker just needs to have A bunch of copies of this memory chip, with the fraudulent program on it. And for each voting machine, unscrew 10 screws to remove the panel that that covers the motherboard, pry out the ROM chip containing the legitimate program and install the ROM chip containing the fraudulent program. Other kinds of voting machines store their computer program that counts to votes in flash memory. And this can be updated Under the control of whatever computer program happens to be running in the voting machine. These voting machines, typically the generation developed in the 1990s and after, can be hacked without actually physically changing any hardware in the machine, just by installing a software upgrade Memory card in the same slot that one would normally install the ballot definition. And this particular attack was demonstrated by my colleague at Princeton, Professor Felton, In about 2007, working with 2 of his graduate students. But it's not just us at Princeton, there are many kinds of voting machines and The same kinds of hacks are applicable to all voting machines and have been demonstrated at several other universities, including University of Connecticut, Johns Hopkins, Michigan and others. There are cyber security issues in all parts of our election system. Before the election, voter registration databases. During the election, voting machines. After the election, vote tabulation, canvassing, precinct aggregation computers. Installing new software in a voting machine is not really much different from installing new software in any other kind of computer. Installing new software is how you hack a voting machine to cheat. In 2009, in the courtroom of the Superior Court of New Jersey, I demonstrated how to hack a voting machine. I wrote a vote stealing computer program that shifts votes from 1 candidate to another. Installing that vote stealing program in a voting machine takes 7 minutes per machine with a screwdriver. But really the software I built was not rocket science. Any computer programmer could write the same code. Once it's installed, it could steal elections without detection for years to come. Voting machines are often delivered to polling places several days before the election, to elementary schools, churches, firehouses. In these locations, anyone could gain access to a voting machine for 10 minutes. Between elections, the machines are routinely opened up for maintenance by county employees or private contractors. Let's assume they have the utmost integrity. But still in the US we try to run our elections so that we can trust the election results without relying on any one individual. Other computer scientists have demonstrated similar hacks on many models of machine. This is not just 1 glitch in 1 manufacturer's machine. It's the very nature of computers. So how can we trust our elections when it's so easy to make the computers cheat? Speaker 8: Mr. Appel, in that scenario, an attacker would actually have to have access to all 100 in the 1 county in order to manipulate the records. Speaker 5: In Georgia, that's not the case. The machines used in Georgia Have been demonstrated to be hackable through a virus that's carried on ballot definition cartridges, very much like this Stuxnet virus was, inserted into nuclear centrifuges in Iran. So, and in Speaker 8: that auditing system, in the auditing of these machines. We look at that. Is that correct? Speaker 5: I'm sorry. Can you repeat the question? Speaker 8: So, in those machines that have that vulnerability in the auditing process. Isn't that scanned? Don't we scan for that? Speaker 5: It's difficult to scan for that vulnerability in the sense of if you Ask a machine to report what software is loaded in it. If it's fraudulent software, it will lie. So, the AccuVote TS machines, used in Georgia and in a few counties in other states are particularly vulnerable to this kind of virus that can be carried to the machines even if the criminal attacker doesn't touch the machines or is not even in the same state with the machines. Cap. Speaker 9: With parts made all over the world, and software made all over the world, and as Sherry said, there's only 3 or 4 manufacturers, the the one core point That kind of election security experts and others have been making about why our votes are safe was that the decentralized nature of our, Voting systems, the thousands and thousands of of, voting offices around the country that administer the election is what kept safe because Russians would need to have tens of thousands of operatives go get physical access to machines to actually, infiltrate the election. We now know that's false. And that through a handful of simple attacks, into manufacturers not in the United States, The Russians could plant malware into, thousands of machines all at once and hack the entire U. S. Election without ever leaving the Kremlin. Speaker 10: Or is there a different way where you could just hack one machine and that would transmit a bug to other machines in the precinct, again, even though they're not connected to an internet. Speaker 2: Sure. So before we had an Internet, we had computers with floppy drives. And there were computer viruses that could spread from 1 computer to another over floppies. Electronic voting machines, some of them use memory cards, some of them have these big battery packs, some of them have local area networks. Studies conducted in 2007 by the state of California, state of Ohio, state of Florida found security vulnerabilities that could take advantage of these to engineer viruses where 1 compromised voting machine could then infect eventually the entire fleet of machines for an entire county. And Each of these studies found ways that regular poll workers and election officials going through their standard procedures and and standard operations Could unwittingly be used to transmit viruses from 1 machine to another through the motion. Typically at the end of the election day, you move a memory card through each of the machines in the precinct, and that's to collect the vote totals. That process can spread a virus. And there are other processes. The details vary from machine to machine. Speaker 10: Okay. So it's accurate to say that just because something is not connected to the internet, it does not have a vulnerability to cyber attack. Speaker 2: Being disconnected from the Internet helps, but it's not a panacea, okay? Speaker 11: When you and your colleagues hacked election systems, did you get caught? Speaker 0: We hacked, election systems as part of academic research where we had machines in our system. Did you get caught? Speaker 11: Did they did they see your intrusion into their systems? Speaker 0: The one instance when I was invited to hack a real voting system to while people were watching, was in Washington, D. C. In 2010, and in that instance it took less than 48 hours for us to change all the votes, and we were not caught. Speaker 11: Vice, Chairman. Speaker 0: I have sitting in my office right now actually, a deep old AccuVote TSX machine, a touchscreen machine that's still in use in 23 states, where, I've hacked it to give whatever outcome I want. It it really is that easy. And when you're talking about, when you're talking about these attacks, though, I don't think it's something that, You know, just in every case, a, a freshman in college could do it. Some states are a little bit better protected, but that's not who we're up against. We're up against nation state attackers that are among some of the most Powerful, adversaries in the world when it comes to cyber attacks, and which have routinely compromised highly protected sites like, like military installations, and large tech companies. I think that's the thing that I want voting officials and and voters to understand is quite what they're up against. And we have a combination of very powerful adversaries and series, and unfortunately quite vulnerable and obsolete systems. That's why I say it's only a matter of time. Speaker 3: The standard arguments that, our elections can't be hacked in the US are some combination of physical security. You can't get access to the devices, they're not connected to the internet, they're tested before Election Day, and the system is too decentralized. It's run by, you know, a bunch of individual election officials and individual counties and and jurisdictions. So it's it's a it's a hard target. Most of this has already been debunked by, the previous speakers, but, physical security is pretty lax. Equipment, has sleepovers in school gymnasiums, and churches, and this and that. There are lots of, examples on the Internet of photos of, election, equipment warehouses, where the the Election officials warehouses with the door propped open and nobody watching. Just, it's just not true. It isn't true that the machines aren't connected to the Internet, and even if they weren't to the Internet that would still be hackable through other means. One of the things that hasn't been mentioned so far yet is supply chain hacks. There are components in these voting systems that come from foreign countries. A colleague of ours, Karsten Sherman, at the IT University of Copenhagen, Found Chinese pop songs in memory of a voting machine that he bought, on the Internet. So that those songs somehow made it through the quality control of The election equipment vendor, and then through, how many elections that it was actually used in by the local election official, and, and, you know, we're still there. Moreover, there's an issue in reporting, which I'm not going to talk about that much, but there are a number of states that outsource their reporting of elections to third parties, some of which are corporations based in other countries like Spain. So you've got to trust that the aggregation of the votes and the reporting of the votes is is, is accurate as well. There's a lot of technology being rolled out in this election, that had either not been used or not been used as widely before. This includes, much more widespread reliance on things like electronic poll books, which become a point of vulnerability that can disenfranchise people if they malfunction, if they lose their Internet connection, or if they've been hacked, some jurisdictions are relying on uploading election results using cellular modems or, the internet That, of course, introduces another point of vulnerability, not just to the data that's flowing, but also to the software, the devices that, that are being connected. Voting equipment itself, there are states that have rolled out touchscreen voting for all in person voters. This is, An unnecessary introduction of brittle and vulnerable technology. Many pieces of electronic technology that are involved in elections are Either incorporate, devices that were built overseas, or assembled overseas, and many crucial functions are being outsourced to foreign companies. One, noteworthy example that I'm especially concerned about, there is a Spanish firm, called CITL, which runs, they they provide election reporting for something like 11 US states. They're based in Spain, and they're bankrupt. So that could, obviously, is a point of failure where, someone could shed a lot of mistrust over the election results By simply falsifying what gets posted, even if the correct results could ultimately be recovered from durable reliable records, that would certainly, cast a lot of fear uncertainty and doubt on what's going on. There have been ransomware attacks on, government systems now including some voting systems, We know that there are cyber warfare attacks by Russia, China, Iran and North Korea. There most states voter registration databases were, penetrated in 2016, there is a lot of evidence that data were changed, but that could certainly happen this time around. So all in all, there's a lot of confusion, there are a lot of points of vulnerability. There are a lot of known problems. There are some election vendors who have been hacked, before 2016. VR systems was hacked in Florida. Some of their clients were, there were phishing attacks against them this time, around, let's see, I forgot my name of it. Tyler Technologies, which provides some, vote by mail ballot, tracking and some vote aggregation reporting has also been hacked. So overall, there's an awful lot that can go wrong. Speaker 12: He saw no evidence of, Tampering with, no, voter voting machines or voter tallies. That's not true. It didn't happen. We just didn't see the evidence of it. Speaker 13: Well, there has been never a documented incident when votes have been changed during the real election. And my answer was please continue using these machines and that will remain to be true forever, Because these machines don't have a capability of providing you forensic evidence to see if they cannot prove they were honest, they cannot prove that they were have been hacked. They simply don't have the fundamental basic capabilities of providing you that forensic evidence, that data. Only way you can see that that machine was hacked if the attacker wanted to be found that it was hacked. That's a sad truth. So Anyone who says I have a information one way or another, that's an opinion. That's not fact based. Fact is, it can be done without leaving trace. Speaker 14: When you know how the system for looking for the evidence, you know that you won't find it because the systems are not recording, Generating, preserving or protecting meaningful forensic evidence. And this is from the very beginning to the end of the process everywhere. These systems really don't have a capability of recording and protecting any meaningful audit information or forensically important information. So a lot of times I would also argue that even if you try to take a look into the into the evidence, the problem is that there is no Evidence which is trustworthy and and worth on a lot. Even recently, a case where a voting machine was reporting, and I believe that was in the last year in North voting machine was in the race where they had 50,000 votes cast, was cast reporting to 1 candidate 164 or something like that votes. And when the paper was looped, that person actually get 26,000 vote and vote by 1 by 1,000 votes. Speaker 12: Wow. Speaker 14: So we we really need to have that paper ballot. There's nothing we don't have a technology to do electronic voltage. The problem the most most Driving thing is, first of all, from 2006 to now is nothing changed. The actual same version of software I hacked 2005 is still in use. It's those machines are still in 20 states. Mhmm. So they're still around. Even the so called new sold today is In the end of life version of of Windows, etcetera, like, just something which no other industry would be acceptable, would be remotely acceptable. So I think the most as overall, it is how outdated everything is And and how hard it is to make people to understand the the reality and and get the warning through that this needs to be fixed or things will get really, really worse, turn the worse. They're bad right now, but and I cannot even Cannot imagine what the worst would be looking like. Parties, they are not actually but a lot of these voting machines are not US origin. And I'm not only talking about the components being made in China or a voting machine being assembled in in Philippines, but also the very of the machine, the programming. In many many many voting machines, that programming, either whole or in the large part is Coming from a foreign from code sources. And it seems to be the case that actually the voting machine vendors, Generally speaking, either don't know or they refuse to tell the truth where the code actually comes. And it turned out that the system he is using exactly the same system which created this magnitude 16,022 votes in Volusia County for Al Gore. So I took a look into the system, figured out a couple of ways to manipulate the central tabulator. But I told I on this well, this is not elegant. You leave a audit trail. You leave a evidence, the bet bet, breadcrumbles. You can trace it. I was asked, well, if there what is the elegant way? So I have I don't know if there's 1. But if if there is, it's gotta be this memory card. Speaker 15: So it's so it's a memory card that fits into the voting machine that you found could be the more or less untraceable or hard to trace way to manipulate the results, whereas they were thinking it was something in the machine. You thought this was attack because you would see a ton of evidence and, like you said, breadcrumbs being left by the tampering party. Speaker 14: Well, it's it's no. It's if not even that. I was just Thinking about the architecture of the system. And with that architecture, it made sense that there's executable program in the memory card. And I was quickly told that that's impossible because it's against the certified rules. But, also, the vendor was dishonest about the origin of the card. So, well, if they are not Honest about one thing they're probably not honest about. The second thing, I found an executable program on a memory card. I found it's it's completely unprotected. This This memory card is so old. It's older than floppy drive. So it actually, I found it because I was I remember that I have seen it before floppy drives existed. So that's what I found who was the original manufacturer of it. And a, interesting The thing about this explanation afterwards was that demand 16,000 was malfunction Of the memory card, that's the, that's the reason why it happened. Not possible. That reason why it's not possible is that that memory card Doesn't know how to make negative numbers. So whatever caused that man respond 16,000 votes, which we don't know what caused it. At least the official explanation given at the time, not possible. Something else happened. Speaker 1: So everyone was focused in 2000 on the punch card machines and the problems that that brought. But in Fallucia County, there was an incident that occurred. It didn't A lot of attention. And the attention that it did get sort of disappeared and got lost in all of the focus on the punch card machines. What happened in Volusia County was around At 10 p. M. Midnight or sorry, 10 p. M. On election night. Prior to that, Al Gore in Volusia County was ahead of George Bush. But around 10 p. M, suddenly, Al Gore's number started reversing. And it reversed more than 16,000 votes. And in There aren't, it was all happening in 1 precinct, and of course, there weren't 16,000 voters in that 1 precinct. So Gore's numbers were actually showing a negative 16,000 in that precinct. And the explanation that election officials provided was that, a faulty memory card was inserted into the tabulating machine. Now, it wasn't, the, let's say, legitimate memory card. So there was 1 memory card for this precinct, and it was uploaded to a tabulator on election night. But the logs show that an hour after that memory card was uploaded, another 2nd memory card for that same precinct was uploaded. And after that 2nd card was uploaded, that's when the votes for Gore started disappearing. And no one has been able to explain what exactly happened with that, whether that was a rogue card that was intentionally designed to hack the votes and misfired and therefore, Erased too many votes for Gore or whether this was, you know, a software mishap. But no one has explained why 2 memory cards for the same precinct were uploaded. And that's that's sort of the main problem in terms of chains of custody, the fact that a second memory card was actually ever able to be uploaded. Speaker 6: And John Kerry has expressed misgivings about the 2004 vote in Ohio. Speaker 1: Yes. So they had concerns about the machines in Ohio. Ohio was still largely using punch card machines. They hadn't replaced theirs yet. But there were still counties there were counties that were already using optical scan machines and also paperless DRE machines. And he and his group, he revealed this only recently, actually went to court court to try and obtain the algorithms, the software, to look at the software to make sure that it would be counting votes accurately. And the courts denied access to it because the proprietary software on voting machines is considered a trade secret. And so the private voting machine companies go to court to fight against this, and the courts generally agree with them. Speaker 14: When I and others, when we 2005, 2006 got involved And up until 2008, we all thought now when the problem has been exposed, it will be fixed very quickly. It would it was completely Always incomprehensible for me and and other secretary researchers that now 2020, we are talking about this topic. And, also, we are 2020 using the same machines with the same software. It's just you wouldn't be using a a 30 year old PC with with no security patches, But that's exactly how the elections are conducted. Let's talk about everything in the world how this works. Speaker 16: Okay. Speaker 17: So Speaker 14: you have a voting message, a voting terminal. That's how you pass your ballot, either electronically or paper ballot, it's go scanning. And after that, these machines are reporting those results Very often, our our communication lies through the central tabulator. Now in both in the county level, or or state level, where the votes are accumulated in database, and along the path, there are number of data storage, systems databases. And if you manipulate those, you can create an illusion of a different results. And you can even do it in the about election reporting system. So instead of even hacking anything in the tabulator system, you are just creating wrong reporting. So there are a number of ways how you can, through this whole path, influence the results. And we have to actually step even further back, Steph, because if we look the election as whole, it's a myriad of system. We have voter registration system. Them. We have electronic poll book systems. We have the election management. We have the ballot casting. We have the tabulation, and we have the reporting. Any of these, if you have one of these, you can always have the result. You can disenfranchise voters so they can cast their ballot. You can change the the outcome. You can change the reporting. Each of these needs to be secured. None of these is less important than the others. And that's why we have been I think in the public mind, we have been focusing in a very narrow area, Which is you cast a ballot on how the ballot is counted, but not missing the whole big picture. How many other systems from a adversary, how from from ethical's point of view, where the other can go and achieve the same goal. How about the Internet? It really it's everything is connected to Internet either directly or indirectly. And the more modern voting machines, they actually have a mobile phone Modem, in to speak, they have a they have a mobile phone mobile phone connectivity to county headquarters. They are sending the results. So wireless is coming back to the voting message in the newer generations. Nice marketing material trying to tell it's not, but it is. A journalist in a year ago, she found 200 voting machines in the Internet. Voting machine vendors say, well, they are not in Internet because they are not pingable. My answer to that is, are you from the past? Because since since 15 years ago, nothing is really anymore pingable, And they are still connected to Internet. It's the the whole argument is 15 that argument was to have been meaning something 15 years ago. It doesn't mean anything today. And, again, I I was just came from Atlanta, and and they have new working machines because the judge ordered the old ones to be scrapped. And part of the things in the the judge's ruling was that, The finding was that the voting machine were programmed by basically 3 guys from their homes and who sent all the programming of the voting machine for next hours and over Internet to We distribute all the machines. Speaker 15: Oh, so these guys had programmed the machines from home, and then they they pushed the code update to the voting machines via the Internet. Speaker 14: We what they said but they pushed it to the state, and then the state pushed it to the counties. And, actually, this whole thing about, the critical election specific programming going over Internet is very common because lot of this programming is done by private companies, third party management companies. And it's, it has been shocking the last 2 years when I have been working for a number of secretaries of state And looking how the security has done in their state just to find that email, FTP with no security. These are the common methods to send the most mission critical programming from the private company, which might be out of state, to the local county who is putting it into the machines. It is whoever controls that data controls the election. Speaker 15: And these machines, they like you said, they have network cards. You show in Kill Chain, again, the documentary that we'll link in the show notes, that they have USB ports. They have memory card slots. They have modems and phone jacks sometimes. So these things were built for connectivity. They're not immune to connectivity. And we don't by the seem seemingly, we don't have to hack Hundreds of machines. These are networked. You can just make software that infects 1 and then dozens of others or just changes the data. Do you think we could, Is it possible so do you think it's possible that we could create a worm that it yet we get on 1 machine in the voting center and it just connects to the other machines covertly and infects them without the bad actors so much as laying a hand on the machine themselves. Speaker 14: The real, proof of concept virus was demonstrated over 10 years ago. So, that that already has been demonstrated publicly that voting machine virus which can, self propagate from 1 voting machine to another, that's a reality which We have sown it's possible. So beyond and that's one of the things why that was created was because, Again, when you say it's possible by showing the vulnerability, people said, well, I don't believe until you show it. So it's one of the rear Things where, a team of researchers developed in the actual virus just to show the logical outcome of the the the vulnerability. Yes. There can be a voting machine virus. Full stop. Here it is. Speaker 18: We've heard a lot from voting machine vendors and election officials that voting machines Can't be hacked because they're not connected to the Internet. All of those vulnerabilities that Andrew talked about, are not a problem because no one can access the machines. And it turns out that the message that they've been giving us for years, and particularly after the 2016 election, just isn't true. Voting machine vendors have sold election officials on these in use of modems. In some cases, the modems are embedded inside the voting machines. In other cases, there are external modems that get attached to the voting machine at the end of the election. So at the end of the election, the machine goes into shutdown mode And then this option pops up about modoming results. And so the system will automatically then dial in and send these votes, over a cellular modem to a server on the Internet that collects the results. So everyone will tell you, and they've told me every time I've spoken with them, that cellular modems are not really Internet connectivity. They will say that doesn't mean that the machine is connected to the Internet. It's using a cellular modem. Well, that's not true. And Election Systems and Software, which is tax. This is one of their statements over and over again with the public. But this is one of their own diagrams that they actually gave to Rhode Island in 2015. And if you see that circular part in the centre there showing that modem transmission using a wireless modem, They sit there, right there. It's on their own diagram that it's going over the internet. So what happens is that the transmission of the votes votes, that the voting machine will dial in using the cellular modem and it contacts the nearest cell tower. And then the data goes through that cell tower into the carrier's back end network. But then the data actually has to get to that county network, and it goes over the Internet to a system, a server that's on the Internet to receive those votes. So we've already now basically shown the misinformation of the transmission of those votes. So ES and S will then say, well, it doesn't matter because all of that process is secured. So the transmission of the votes are secured so that no one can intercept them and read the votes or alter them. The modem is configured in such a way so that no one can actually dial into the modem, it can only dial out, and it can only dial out when the machine shuts down at the end of the election. So apparently, there are all of these safeguards. And also, the back end system that receives the transmitted votes is supposed to communicate only with one of those authenticated machines with the modem. The problem is none of this has been tested or certified. The voting machines themselves go through sort of a federal testing lab process And through certification, the modem transmissions don't. So we don't know what's inside those modems. We don't know how they work. We don't know how they're configured. And ES and S doesn't have a good track record on implementing security. So we don't actually know that the way that they are saying that these are transmitted securely is actually case. So what can happen with a modem machine that's transmitting? So I don't know if you're familiar with something called a stingray. It's a device that law enforcement uses and the military uses. And what it does is it, masquerades as a legitimate cell tower. It transmits a much more powerful signal than the nearby cell tower so that your cell phone will connect to the stingray instead of the cell tower. And then it might pass it on to the cell tower as well. It's mostly used for tracking phones, but there are also Stingrays that are designed also to intercept the content of communication. So if you've got a cellular modem in a voting machine, a rogue person can put a rogue cell tower near some kind of voting precinct, whatever. And instead of that modem then connecting to that cell tower, they can connect to that rogue The rogue cell tower. You can intercept data. If it's not properly encrypted, you could intercept the data and change the results. Or you could basically swap out the a whole package of results if it's not authentically signed, and replace it with your own package of results. And so those go on to the server. If there's a vulnerability in that modem, A hacker can actually transmit malware back onto that voting machine through the rogue cell tower. And once you're in that voting machine, Either that way or maybe you've gotten into the voting machine prior when it's being programmed, you now actually control the configuration of that modem. So even if ES and S says that modem will only work at the end of the election and will only call out and not receive calls in. If you control the configuration of that modem, you change all of that. You can have that machine contact your system at any time you want, for however you want, so that you can do reconnaissance on that machine and study it and established your attack. There were a group of researchers that decided that they would try and see if they could find those backend servers that receive the votes that are transmitted by modem. So if you've got something that's transmitting the votes over the cellular network, there's something that has to be connected to the internet to receive them. So there is a server. And it turns out that they could actually, based on configuration information that's publicly available on the internet, that the voting machine vendors provide to election offices and the election offices post on the internet. They describe the type of that we have created a firewall that they use. It's made by Cisco. They describe the type of FTP software that receives the votes, that sits on that server. They describe the whole configuration, including the type of cellular modem that's embedded in their machines. So based on that information, they decided to see if they could look for that very specific footprint of ESNS machines that are receiving the votes. And they did a scan and they were able to find these systems on the Internet. So they found 9 Wisconsin counties that had systems connected to the Internet, 7 Florida counties, from 4 Michigan counties. They actually found systems in 10 different states, but these were the primary ones. And of course, these are all important critical swing states. So here's the thing. Election officials will tell you, well, the modem transmissions don't matter because we only turn on those modems for a very brief period, less than a minute at the end of the election to transmit. And that's not sufficient time for someone to hack. Any of the technical attack. But more importantly, it turns out these systems aren't just connected for a few minutes after an election. Those back end systems that receive the votes are quite often connected year round. You can see them when they're doing the scans. You can sometimes see them. They come up a couple of weeks. Some of the ones that are only up temporarily will sometimes come up a couple of weeks before the election because they want to test the transmission. And then they leave it on for those weeks before the election. And after the election, they might forget to take it down and it might stay up a couple of other weeks. But there are some that simply never take them down at all. And Wisconsin was one of them. They were on year round. These systems, so what are they? I describe this as a server, but that sounds kind of benign. What is happening is that the The votes are being transmitted, and on the receiving end there's a firewall that's connected to the internet. And behind the firewall, There is this FTP server that the votes are transmitted on. Now that FTP server is supposed to serve as kind of like a DMZ, a safe zone, right? So the votes are deposited and there's supposed to be then no direct connection to the system that actually tabulates the votes. But it turns out that's not the case at all. This is a diagram that ES and S created and handed out to election officials. And so you can see that the votes are coming over the Internet, and they're coming and there's the firewall, and then you see all those wires connected. And you see at the bottom there that EMS, that's the Election Management system. That is the system that tabulates the final results. So even though they say that, that transmission of votes over the Internet is just unofficial, Connected to that system that's receiving those unofficial votes is also the system that is tabulating the official results. What's more, that election management system is also used to program all the voting machines prior to an election. So when, I brought this To ES and S's attention, they didn't then say that nothing is connected to the Internet. What they said was none of those critical systems are pingable from the Internet because there's a firewall in front. So essentially what they're saying is that even though now first they've said that none of these systems are connected to the Internet. And now when they're faced with someone saying, well, they actually are connected, they say, well, they may be configured in some manner that you're showing, but there's a firewall in front of them and therefore, you can't see what's behind the firewall. But if you can find the firewall, then you find the systems that are behind the firewall. The only thing that's protecting anyone from getting into those critical systems behind the firewall are the rules of that firewall that say, only these certain systems can connect to us, only these certain systems can transmit data. That's simply software. It's configuration rules. And if you misconfigure that software, then anything can get into that firewall. And of course, many, many hacks happen because firewalls are misconfigured. Speaker 0: I was part of the team that did the first hands on study of any electronic voting machine used in the US and it was using exactly this machine. And what we found, well, we got one of these machines from a whistleblower, Brought it into a laboratory. Reverse engineered it. And well, here's the result of what we found. We we would run a mock election with George Washington and Benedict Arnold, just like this. And, wanted to know, well, if an attacker that could get malicious software into the machine somehow. Could they change the results? And what we found after reverse engineering the machine was, well, Yeah. There are actually a lot of problems with it. All the records of the vote are contained in, in computer memory. And, an attacker can manipulate the software that's supposed to be running in the machine in a pretty straightforward way. Before every election, officials program the machine with the names of the candidates on the ballot by, installing some that they can change the software running in the machine. There are, unauthenticated software update mechanisms, there are offer overflows and the code that reads the data files from this. There's even an interpreted programming language and the rules for how the votes will be counted are contained in an unauthenticated program contained on the memory card. So through any of those means, An attacker can change the software running on the voting machine and cause the machine to produce whatever election results they want. So that was in about 2007. We, we published the first paper about this. In and that's what we're going to do. And so we're going to have to do that. And so we're going to have to do that. And so we're flows and so forth. There have been hundreds and hundreds of pages of technical reports about US voting machines like this. But even after that, They haven't even updated the software since before the studies I talked about. That's how bad it is. And it's not even just a single model of machine that's the only problem. Country. There are about 52 different models of machines. They fall into essentially 2 styles, ones that scan a piece of paper or ones where the vote, the voter just interacts with the touch screen and many of them have been analyzed now by researchers, Looking for security vulnerabilities. In every single case where a US voting machine has been analyzed by by competent in security researchers. They have found vulnerabilities that would let someone inject malicious software and change election data, every single case. Before every election, election officials have to program the voting machines with who's on the ballot and what are the rules for counting. Well, they make that election programming on a PC workstation somewhere, either at the, at the jurisdiction or at an outside vendor that does it for them. If an attacker can break into that workstation which is called an election management system. They can spread malicious code to all of the memory cards used to program all of the voting machines in the jurisdiction. And those election management system workstations sometimes are connected to the internet, or they're, or the data that's programmed into them passes through an internet connected system. So we're just 1 or 2 hops away from an online attacker. Now how well secured are these systems? Well, here's, a vendor that did the election programming for, in a large fraction of my state in 2016. And we can just take a look at their website to see how secure this is likely to be. You can see, first of all, they don't have any HTTPS. Here are lots of nice, high resolution photographs of their warehouse, in case you want to break in. And perhaps most interestingly, here's their employee directory with everyone's name, job title, email address and photograph. So if I wanted to break into this company, let's say I was the attacker, I'd probably start by forging an email from, let's say, Larry, the president here, to Sue, his administrative assistant, asking her to urgently open an attachment. Now, of course, when she does, that attachment has my malware in it. I have a foothold into their network, and I can try to spread from there to the election management system and to the voting machines in most of the state. Tampering with the national election result in my country it's easier than well, easier than even I thought in 2016. I keep learning things that convince me that the situation is scarier than, than even experts had thought. You identify the states that are most weakly protected and going to be close. Target the computers that are going to program voting machines there, spread malware to machines to change a fraction of the votes, and then rely on the fact that most states, even if they have a paper record, are not going to rigorously use it to check that the computers are right. But the fact is that in close national contests in the US, the result really only hinges on the result in a small number of states. You've heard about the swing states in any given election. The ones that are, really competitive. In such a situation, an attacker can, before the election, identify which states are likely to be close. Try probing all of them in the way that the Russians did the voter registration systems in 2016 and just find the weakest swing states and attack there. So in this way, the American system converts, diversity of implementation into basically this patchwork of strength and weakness that gives attackers a menu of possible places to strike. It makes us weaker in close elections. So just to review, you look at the polls before the election and figure out which states were likely to be close. Probe all of them, find the ones with the weakest protection, then hack into the, election management systems there or at the outside vendors the states use. Once you hack into the election management system, you can spread malicious code to individual voting machines and have your code say, swap 10% of the votes in the places you infected. Then even if the votes are also recorded on a piece of paper, you don't have to worry. Because in most of those states, they're going to just toss the paper out without looking Speaker 5: Modems in voting machines are a bad idea. Those modems are network connections. And that leaves them vulnerable to hacking by anybody who can connect to that network. Speaker 19: ESNS insists While there are 14,000 of its modems in use, there are firewalls separating those modems from the public Internet. Speaker 5: Once a hacker Starts talking to the voting machine through the modem. They can hack the software in the voting machine and make it cheat in future elections. Speaker 17: What is the vehicle for the transmission from the ICP? Is it cellular modem versus VPN? It is a cellular modem that can be configured in a VPN. Right. And we currently in Chicago and Cook County, we work with Verizon to, secure that network. What wireless chipset Slash modem does the hardware have? We support a variety. So, it's really up to the jurisdictions, what technology they want to use, what's compatible with their networks. Speaker 16: Currently, in some jurisdictions, we're using, Basically a modem that is a three d modem, GSM, but we can support multiple varieties of modem that can be. Speaker 17: Including latest 4 gs standards Speaker 14: as well. Speaker 17: So the answers to the next question, is it Speaker 3: 3 gs or 4 gs? Verizon, 8 gs or 2 gs or Sprint, Speaker 5: I'm assuming Speaker 17: all? Yeah, all networks. Speaker 15: Just to Speaker 17: ask a quick question. Yes, I mean, we actually transmit from the ICP in Mongolia as well. So Speaker 7: We're not committed to networks. Speaker 16: And in Puerto Rico, there is 3 vendors because the island is not covered by any by any of the vendors completely. So we use 3 different cellular vendors for some ICPs with this vendor Claro, AT and T, MT Mobile, I think, in the different parts of the app. Speaker 14: More modern attack voting machines. They actually have a mobile phone modem, and to speak, they have a they have a mobile phone mobile phone connectivity to county headquarters. They are sending the results. Speaker 3: Some jurisdictions are relying on uploading election results using cellular modems or, the Internet. That of course introduces another point of vulnerability, not just to the data that's flowing, but also to the software, the devices that, that are being connected. Speaker 1: Many of these voting machines have modems embedded into them. And the modems are used at the end of the election to transmit the vote totals on election night to the county, The, elections office. So these modems contact their cellular modems, and they contact the cellular network, they contact the cell tower. So the cell tower traffic these In our modern times, it actually goes through Internet. It goes through the same kinds of routers and switches that the regular Internet traffic goes to. But also, in between that cell tower and that voting machine, An intruder can, intercept data going to the cell tower and intercept that that communication, that phone call. If you can trick a voting machine into, contacting your device, A fake cellular tower instead of a legitimate tower. You can actually use that connection to get back into the voting machine and get back into the tabulator, and then alter votes and software. Speaker 20: Virginia just stopped Using touch screen computer voting because it's so vulnerable. Speaker 18: We need to look at Speaker 20: all the voting machines. Every secretary of state needs to be, You know, assisted in making sure that they are not being, hacked and and attacked. Speaker 6: I continue to think that our voting machines are too vulnerable. Speaker 21: But researchers have repeatedly demonstrated That ballot recording machines and other voting systems are susceptible to tampering. Speaker 22: Even hackers with limited prior knowledge, tools, and resources are able to breach voting machines In a matter of minutes. Speaker 23: In 2018, electronic voting machines in Georgia and Texas deleted votes for certain candidates or switched votes from 1 candidate to another. Speaker 21: The biggest seller of voting machines is doing something that violates cyber security 101, directing that you install remote access software, which would make a machine like that, you know, a magnet for fraudsters and hackers. Speaker 24: These voting machines can be hacked quite easily. Speaker 25: You could easily Hack into them. It makes it seem like all these states are doing different things, but in fact 3 companies are controlling that. It is the individual voting machines That some pose that pose some of the greatest risks. Speaker 26: There are a lot of states that are dealing with antiquated machines, Right? Which are vulnerable to being hacked. Speaker 24: Workers were able to easily hack into an electronic voting machine. It was possible to switch votes. 43% Speaker 21: of American voters use voting machines that researchers have found have serious security flaws, Including backdoors. Speaker 3: We know how vulnerable now our systems were. We know I know the hackathon that took place last year, where virtually every machine was broken into fairly quickly. Speaker 26: I actually held a demonstration for my colleagues here at the capitol, where we brought in, folks Who, before our eyes, hacked election machines, those that are not those that are being used in many states. Speaker 22: Aging systems also frequently rely on unsupported software, like Windows XP in 2000, which may not receive regular security patches and are thus more vulnerable To the latest methods of cyber attack. Speaker 24: In a close presidential election, they just need to hack 1 swing state, or maybe 1 or 2, Or maybe just a few counties in one swing step. Speaker 27: I'm very concerned that you could have a hack that finally went through. You have 21 states that were hacked into. They didn't find out about it for a year. Right now, we have over a dozen dozen states That either don't have any backup paper ballots or only have them partially. Do you think that our adversaries don't know what those states are? Of course, they know what those states are. And if we have a close election in the general election, in a presidential race, and one state's out withstanding And their ballot boxes get hacked into, their elections get hacked into, we will have absolutely no backup.

@KanekoaTheGreat - KanekoaTheGreat

25/ In effect, the left was allowed to discuss the vulnerabilities of voting machines after the 2016 election, and the right was banned from social media platforms for discussing those very same vulnerabilities after the 2020 election.

Video Transcript AI Summary
Virginia has stopped using touchscreen computer voting due to vulnerability, highlighting the need to assess all voting machines for potential hacking. Researchers have shown that ballot recording machines and other systems are susceptible to tampering, even by hackers with limited resources. Instances of electronic voting machines in Georgia and Texas deleting or switching votes have been reported. The leading seller of voting machines has violated cybersecurity principles by installing remote access software, making them attractive to fraudsters and hackers. The control of voting machines by just three companies poses significant risks. Many states still use outdated and hackable machines, leaving the election system vulnerable to interference. The lack of backup paper ballots and reliance on unsupported software further exacerbate the security flaws.
Full Transcript
Speaker 0: Virginia just stopped using touchscreen computer voting because it's so vulnerable. Right. We need to look at all the voting machines. Every secretary of state needs to be, you know, assisted in making sure that they are not being hacked and and attacked. Speaker 1: I continue to think that our voting machines are too vulnerable. Speaker 2: Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering. Speaker 0: Even hackers with limited prior knowledge, tools and resources are able to breach voting machines in a matter of minutes. Speaker 3: In 2018, electronic voting machines in Georgia and Texas deleted votes for certain candidates or switch votes from 1 candidate to another. Speaker 4: The biggest seller of voting machines is doing something that violates cybersecurity 101, directing that you install Remote access software, which would make a machine like that, you know, a magnet for fraudsters and hackers. Speaker 5: These voting machines can be hacked quite easily. Speaker 2: You could easily Hack into them. It makes it seem like all these states are doing different things, but in fact 3 companies are controlling that. It is the individual voting machines That some pose, that pose some of the greatest risks. Speaker 6: There are a lot of states that are dealing with antiquated machines, right, which are vulnerable to being hacked. Speaker 5: The workers were able to easily hack into an electronic voting machine. Speaker 4: It was possible to switch votes. 43% of American voters use voting machines that researchers have found have serious security flaws, Including backdoors. Speaker 7: We know how vulnerable now our systems were. We know I know the hackathon that took place last year, Where virtually every machine was broken into fairly quickly. Speaker 6: I actually held a demonstration for my colleagues here at the capitol, where we brought in, folks Who, before our eyes, hacked election machines, those that are not those that are being used in many states. Speaker 8: Aging systems also frequently rely On unsupported software, like Windows XP in 2000, which may not receive regular security patches and are thus more vulnerable To the latest methods of cyber attack. Speaker 5: In a close presidential election, they just need to hack 1 swing state or maybe 1 or 2 Or maybe just a few counties in one swing state. Speaker 2: I'm very concerned that you could have a hack that finally went through. You have 21 states that were hacked into. They didn't find out about it for a year. Right now, we have over a dozen dozen states that either don't have any backup paper ballots Or only have them partially. You think that our adversaries don't know what those states are? Of course, they know what those states are. And if we have a close election in the general election, in a presidential race, and one state's out withstanding and their Ballot boxes get hacked into. Their elections get hacked into. We will have absolutely no backup. Stalin was unconcerned about the vote. After all, he explained, he said that who voted was completely unimportant. What was Extraordinarily important, in his words, was who would count the votes and how. It is time to put politics aside and come together to secure the future of our election. So whether you're a 4 star general, A 4th grade teacher or a computer engineer at Foursquare, this is an issue that unites us. Speaker 8: In at least 40 states, elections are carried out using machines that are at least a decade old. And like any technology, -They're susceptible to increasing failure with age. Some state officials have had to turn to eBay to find critical components like dot matrix printers, Decades old storage devices and analog modems, aging systems also frequently rely on unsupported software Like Windows XP in 2000, which may not receive regular security patches and are thus more vulnerable to the latest Methods of cyber attack. Speaker 3: In 2016, state election websites in Illinois and Arizona were hacked by intruders who installed malware and downloaded sensitive voter information. Speaker 6: It is worth fighting for integrity in our election system, which means that they are free from interference by a hostile Or an unfriendly nation. Let's put the resources into upgrading the state's election systems. Because what we know is this. There are a lot of states that are dealing with antiquated machines, right, which are vulnerable to being hacked. I sit on the senate intelligence committee and senate homeland security committee. And we receive all kinds of information about the vulnerabilities to our national Security. We are vulnerable in terms of foreign interference with our elections. It's my understanding that some of the election system Vendors have required states to sign agreements, that prevent or inhibit independent, security testing. There's a saying that I'm sure Many of you have heard, which is the you know the difference between being hacked and not being hacked? Is knowing you've been hacked. Speaker 0: And they are still looking for ways to steal information about Voter registration, for example. There are some text experts in Silicon Valley Valley with whom I have met who say that, You know, maybe what they'll do this next time is to really disrupt the actual election. Shut down the servers that you send results to. Interfere with the operation of voting machines because still too many of them are linked to the Internet. So there we are still very vulnerable. Speaker 9: I mean, I can tell you in Virginia, when I was governor, I had to replace all the machines. Because I remember when I first voted when I went to Richmond, moved down as governor, I remember I kept voting in the senate race, kept voting for the Democrat. Republican name kept coming up. Three times that happened. Speaker 1: What do Speaker 4: you mean kept Coming up. Speaker 9: So I you know, we had the touch screens. I was voting for Mark Warner, our senator, and Ed Gosphy's name was light up. Happened to me 3 times. Finally, the 4th time, Mark Damon, I quickly hit vote, and I got out of there. You know, all the cameras are looking at me like this guy doesn't know how to vote. I mean, what's going on? So then I had an investigation done, and listen to this. I brought in some technology experts. They were able to hack into our machines from off-site In about 5 or 6 minutes, and within 4 minutes, they were able to change a vote. IDD certified all the machines. Now in Virginia, we have paper ballots. Speaker 4: 43% of American voters use voting machines that researchers have found have Serious security flaws, including backdoors. These companies are accountable to no one. They won't answer basic questions about their cybersecurity practices, and the biggest companies Won't answer any questions at all. 5 states have no paper trail, And that means there is no way to prove the numbers the voting machines put out are legitimate. So much for cybersecurity 101. The vast majority of 10,000 election jurisdictions Nationwide, use election management systems that run on old software That is soon gonna be out of date and ripe for exploitation by hackers according To an exhaustive analysis by the Associated Press, Pennsylvania, Wisconsin, Michigan, Florida, Iowa, Indiana, Arizona, and North Carolina, among others, Are all at risk. Even the state of Georgia, which just passed legislation to buy new voting machines, is on track to buy equipment that suffers from this significant cybersecurity weakness. Let's say the election is decided by a small percentage And people in America don't think that the election was fair. The effect that would have On our 200 year experiment in self governance, our democratic system Would take a real hit. Our elections weren't secure last week And they sure as heck aren't secure this week. And anybody who says otherwise It's either selling the voting machines or simply has a malicious intent towards our elections. At one point in the intelligence committee, both sides seemed to agree that no votes were changed In the 2016 election, and I said, the experts I talk to say that Until you have a forensic analysis of a vote, until you go in there and scrub the whole system, You can't really say that. So they're giving these voting machines specifically the hack into how successful were they? Speaker 1: Well, the the ongoing record Was, they hacked within 90 minutes of, being, being in the same space as the voting machines. Now these are not hackers that are actually touching the machines. They're doing this from across the room, on, on Internet like connections. But what it demonstrated, Pedro, is that the machines that we count on to make the basic connection between the American voter And the election results are vulnerable if they're in any way connected to the Internet. Speaker 4: And so when you say hacked, what were they able to do once they gained Access to the machines. Speaker 1: All sorts of things. They could manipulate, the outcome of the vote, they could manipulate the tally, they could delete the tally, and and they could compromise the vote in any number of ways. Just it was limited only by the hackers' creativity. Just how vulnerable Speaker 10: the machines were. I mean, what we found is that These machines were purchased by, local voting authorities, state and local voting authorities maybe 10 years ago. In many cases, the software and the hardware have not been updated, so they're as vulnerable as an old laptop That we might have, in in your home that you no longer use because it's just so out of date. Then what we found is that the supply chain for these these machines is largely un plotted. I mean, We found parts from China. We found, digital electronic parts from all over the world. By way of hacking, there's the potential that the actual vote tally could be compromised. So votes could be changed from this to that. Or votes could be suppressed, votes could be deleted, votes could be added, so you could actually change the tally itself.
Saved - June 16, 2023 at 4:56 AM
reSee.it AI Summary
A report by Halderman reveals that vote casting and tabulation computer systems are vulnerable to cyber threats. Attackers can alter QR codes on printed ballots to modify voter selections. Georgia's BMDs are susceptible to malware installation with brief physical access. Counterfeit technician cards can unlock any ICX in Georgia. The machines are wide open to manipulation and cannot produce reliable results. ICX malware can change individual votes and most election outcomes without detection. The machines must be eliminated immediately. Using vulnerable ICX BMDs for all in-person voters magnifies security risks.

@imyourmoderator - Chris Paul

Halderman report. “There is no realistic mechanism to fully secure vote casting and tabulation computer systems from cyber threats.” "Many of the attacks I successfully implemented could be effectuated by malicious actors with very limited time and access to the machines, as little as mere minutes. This report documents my findings and conclusions." https://storage.courtlistener.com/recap/gov.uscourts.gand.240678/gov.uscourts.gand.240678.1681.0.pdf

@imyourmoderator - Chris Paul

"Attackers can alter the QR codes on printed ballots to modify voters’ selections."

@imyourmoderator - Chris Paul

"The software update that Georgia installed in October 2020 left Georgia’s BMDs in a state where anyone can install malware with only brief physical access to the machines. I show that this problem can potentially be exploited in the polling place even by non-technical voters."

@imyourmoderator - Chris Paul

"Without needing any secret information, I created a counterfeit technician card that can unlock any ICX in Georgia."

@imyourmoderator - Chris Paul

Everyone who has paid attention to the election fraud issue knows that these machines are wide-open to manipulation through obvious vulnerabilities and that they cannot produce reliable results. Dominion's own discovery documentation in the Fox/Dominion lawsuit said it as well.

@imyourmoderator - Chris Paul

Lulz. Halderman worries that the people trying to secure our elections in Georgia will now know how to exploit the machines simply by having access to similar machines. That would mean anyone with access to similar machines could exploit them. It also means it's GOOD that people are proving it, because the machines cannot and do not produce reliable election results.

@imyourmoderator - Chris Paul

This alone is absolutely damning, and we've been making this argument for 2.5 years. "Despite the addition of a paper trail, ICX malware can still change individual votes and most election outcomes without detection. Election results are determined from ballot QR codes, which malware can modify, yet voters cannot check that the QR codes match their intent, nor does the state compare them to the human-readable ballot text." That should be horrifying, but we're told the presence of "risk-limiting audits" (basically, fake audits) would detect exploitation.

@imyourmoderator - Chris Paul

Your elections are not secure. They haven't been in a very long time, if ever. (p6-7) "Although outcome-changing fraud conducted in this manner could be detected by a risk-limiting audit, Georgia requires a risk-limiting audit of only one contest every two years, so the vast majority of elections and contests have no such assurance. And even the most robust risk-limiting audit can only assess an election outcome; it cannot evaluate whether individual votes counted as intended."

@imyourmoderator - Chris Paul

Every sentence of this report should provoke only one reaction: The machines must be completely eliminated, immediately. Everyone in office knows this is how our elections are run. Every single one. "The ICX’s vulnerabilities also make it possible for an attacker to compromise the auditability of the ballots, by altering both the QR codes and the human readable text. Such cheating could not be detected by an RLA or a hand count, since all records of the voter’s intent would be wrong."

@imyourmoderator - Chris Paul

"This means that in a close contest, ICX malware could manipulate enough ballots to change the election outcome with low probability of detection. In contrast, risk-limiting audits of hand-marked paper ballots, when used with appropriate procedural precautions, provide high confidence that individual votes are counted as intended and election outcomes are correct even if the election technology is fully compromised.

@imyourmoderator - Chris Paul

"Using vulnerable ICX BMDs for all in-person voters, as Georgia does, greatly magnifies the security risks compared to jurisdictions that use hand-marked paper ballots"

@imyourmoderator - Chris Paul

Every word of this is absolutely damning. "Likewise, previous security testing efforts as part of federal and state certification processes appear not to have uncovered the critical problems I found. This suggests that either the ICX’s vulnerabilities run deep or that earlier testing was superficial." How could all of that Dominion testing and state-mandated testing by state-certified techs not uncover the problems? It's like they want the machines to be vulnerable! Oh, wait... 🤔

@imyourmoderator - Chris Paul

Can't we PLEASE just stop pretending? "My technical findings leave Georgia voters with greatly diminished grounds to be confident that the votes they cast on the ICX BMD are secured, that their votes will be counted correctly, or that any future elections conducted using…

@imyourmoderator - Chris Paul

@threadreaderapp unroll

Saved - June 17, 2023 at 1:20 AM
reSee.it AI Summary
A 2021 report on Georgia's voting machines reveals critical vulnerabilities that can be exploited to subvert security mechanisms. The report was sealed until recently. In Fulton County, thousands of ballots were counted twice, and duplicate and fake batches were reported during the hand count. The election system is a sham.

@jeffmfulgham - Jeff Fulgham

Breaking: 2020 Election Machines Report A Federal court finally unsealed a 2021 report that found Georgia voting machines had/have "critical vulnerabilities that can be exploited to subvert all its security mechanisms..." The report has been conveniently sealed since 2021!

@jeffmfulgham - Jeff Fulgham

Keep in mind that 14 months after the election GASOS Brad Raffensperger finally admitted that "several thousand" ballots had been counted twice in Fulton Co. https://www.washingtonpost.com/politics/2023/06/15/court-unseals-long-awaited-election-security-reports/

Analysis | Court unseals long-awaited election security reports The two sides of a long-running dispute over the security of Georgia’s election machines can’t agree on what conclusions to draw. washingtonpost.com

@jeffmfulgham - Jeff Fulgham

At 1 hr 9 min Raffensperger admits several thousand ballots were counted twice in Fulton Co. https://fyntv.com/2022/02/22/r-brad-raffensperger-ga-secretary-of-state-joins-bkp-politics/

(R) Brad Raffensperger-Ga Secretary of State Joins #BKP Politics! - FYNTV.com (R) Brad Raffensperger-Ga Secretary of State Joins #BKP Politics to talk Dominion Voting Machines, Election Fraud, Ballot Harvesting, Absentee Ballots, Signature Matching, Drop Boxes, Audit, and much more! fyntv.com

@jeffmfulgham - Jeff Fulgham

Then in March 2022 State Election Board investigators found that Fulton counted and officially reported duplicate batches (fake batches) during the hand count. This entire election system is a sham.

Saved - June 20, 2023 at 7:13 AM

@GAballots - David Cross

WOW!!! This system gives so many opportunities for cheating. @GaSecofState has known about these issues for 2 years and still ran an election in 2022. Now he says he can’t update the 2007 operating system because 9 months is not enough time. #recallraffy

Saved - August 8, 2023 at 5:09 AM
reSee.it AI Summary
In 2020, Trump claimed to have caught the swamp. Recent events have brought this claim back into focus. A document discovered by the J6 UnSelect Committee suggests a possible clue to how Trump could have achieved this. The committee found a draft Executive Order titled "Presidential Findings" instead of an EO. Presidential Findings allow the President to authorize covert actions for national security reasons. These actions can be authorized in writing or verbally, and even after an operation has begun. The Findings claim foreign interference in the election, including a cyberattack on national infrastructure. While the voting machines were not seized, the Findings may have justified certain actions, such as Space Forces' defense and data collection from the hackable machines.

@CatTheGreat_ - CatTheGreat

Trump’s famous claim “we caught the swamp, we caught them all!” after the 2020 election… Did that really happen? Is there any EVIDENCE we might really “have the goods”?!? It’s all coming back up NOW because of the DOJ’s case against Trump for January 6th… but interestingly enough, a document unearthed by the J6 “Un-Select Committee” may just be a CLUE into how Trump could’ve done it… 🧵

Video Transcript AI Summary
I sit on a task force at the Department of Defense. They have evidence that Trump believed would cause a civil war if revealed early on. He wanted people to understand the severity of the situation.
Full Transcript
Speaker 0: You know, you know, I sit on a task force at the Department of Defense. And the thing is they've got the goods. They've got the goods. And Trump knew that if he presented any of the goods early on, we'd have a civil war that he really felt that the people needed to see how bad it could get.

@CatTheGreat_ - CatTheGreat

Remember that “draft Executive Order” to seize voting machines that the J6 Committee thought was a huge “gotcha moment”? If you look closely, it was curiously NOT titled an EO, but “Presidential Findings” This matters! https://t.co/SxYbnevMYW

@CatTheGreat_ - CatTheGreat

“Presidential Findings” deal with the President being able to authorize covert action in the name of national security. According to 50 US Code 3093: “The President may not authorize the conduct of a covert action by departments, agencies, or entities of the United States Government unless the President determines such an action is necessary to support identifiable foreign policy objectives of the United States and is important to the national security of the United States…” Foreign (or domestic?) interference in the election = national security, obviously.

@CatTheGreat_ - CatTheGreat

Presidential Findings must be in writing “unless immediate action by the United States is required and time does not permit the preparation of a written finding, in which case a written record of the President’s decision shall be contemporaneously made and shall be reduced to a written finding as soon as possible but in no event more than 48 hours after the decision is made.” Presidential Findings authorize COVERT action, and can be created AFTER a time-sensitive operation has commenced. So technically, these Presidential Findings could’ve been created AFTER a clandestine operation involving the collection/seizure of “machines, equipment, ELECTRONICALLY STORED INFORMATION , and material records”

@CatTheGreat_ - CatTheGreat

The Findings claim witnesses and cyber experts found foreign interference in the election BEFORE, DURING & AFTER it happened. “Multiple expert witnesses and cyber experts identified acts of foreign interference in the election prior to November 3, 2020 and continued in the following weeks. In fact, there is probable cause to find a massive cyber-attack by foreign interests on our crucial national infrastructure surrounding the election” (Hello! Solarwinds!)

@CatTheGreat_ - CatTheGreat

Obviously the voting machines and physical records were not seized, but could the Findings have justified PART of the actions that actually took place? Space Force’s defense and collection of data from the “hackable” voting machines AFTER IT WAS ALREADY DONE? End 🧵

Saved - August 15, 2023 at 3:24 PM
reSee.it AI Summary
Voting machine expert reveals shocking vulnerabilities in Georgia's Dominion machines used in the 2020 election. Attackers can alter QR codes on ballots and manipulate smart cards, compromising security. Malicious software can be installed remotely or with physical access, altering votes undetected. A software update allowed easy installation of malware, even by non-technical individuals. Proof-of-concept attacks demonstrate how personal votes can be changed. The extent of flaws in the system remains unknown. Evidence suggests the 2020 election was rigged.

@BehizyTweets - George

BREAKING: Voting machine expert Professor Alex Halderman from the University of Michigan did a thorough analysis of Dominion voting machines used in Georgia for the 2020 election and what he found was SHOCKING "Attackers can alter the QR codes on printed ballots to modify voters' selections." (Section 7) "Attackers can forge or manipulate the smart cards that the ICX uses the authenticate technicians, poll workers, and voters." (Section 6) "I show that the ICX suffers from critical vulnerabilities that can be exploited to subvert all of its security mechanisms" ".... these vulnerabilities provide multiple routes by which attackers can install malicious software on Georgia's BMDs (Ballot marking devices), either with temporary physical access or remotely from election management systems (EMSs)." "... such malware can alter voters' votes while subverting all of the procedural protections practiced by the State, including acceptance testing, hash validation, logic & accuracy testing, external firmware validation, and risk-limiting audits"

@BehizyTweets - George

"The software update that Georgia installed in October 2020 left Georgia's BMDs in a state where anyone can install malware with only brief physical access to the machines." "I show that this problem the polling place even by NON-technical voters." (Section 8) "I demonstrate that attackers can execute arbitrary code with root (supervisory) privileges by altering the election definition file that county workers copy to every BMD before each election." "Attackers could exploit this to spread malware to all BMDs across a county or the entire state." (Section 9) "In addition to discovering and validating the vulnerabilities described above, I developed a series of proof-of-concept attacks that illustrate how vulnerabilities in the ICX could be used to change the personal votes of individual Georgia voters." "It is very like that there are other, equally critical flaws in the ICX that are yet to be discovered. Fully defending it will require discovering and mitigating them all, but attackers would only have to find ONE."

@BehizyTweets - George

There's so much evidence that the 2020 election was rigged that we could fill the whole grand canyon

Saved - August 16, 2023 at 2:12 PM
reSee.it AI Summary
Donald Trump and codefendants indicted for inspecting voting systems in Coffee County, Georgia. GOP observer's affidavit reveals scanner issues with 6000 ballots, all for Republican candidates. Dominion tech called, attempts to fix failed. Suspicion of remote alteration. Independent research team investigates.

@TheNickyMo - nick moseder

🧵THREAD: Donald Trump and several co-defendants have been indicted for inspecting the voting systems in Coffee County Georgia… Want to know what REALLY happened in Georgia?!

@TheNickyMo - nick moseder

Let’s read some snippets from Cathy A Latham’s SWORN affidavit. These allegations were submitted under penalty of perjury! 👇 Latham was present as a GOP observer during early voting along with Misty Hampton (who later allowed Trump's legal team to come inspect the scanner). https://t.co/H8CRUajIDx

@TheNickyMo - nick moseder

During early voting, Elections supervisor of Coffee County informed Latham that one of the scanners at the Douglas precinct was rejecting 6,000 ballots. They decided to process these absentee ballots at the central count on election day, along with the overseas ballots. https://t.co/9fdcQMMkME

@TheNickyMo - nick moseder

At the central count scanning room, 3 people were present. 1) Misty Hampton (Coffee Election Supervisor) 2) Ernestine Thomas-Clark (Democrat observer) 3) Latham (Republican observer). Upon scanning, the scanner gave a QR CODE failure message. https://t.co/y5JeAKAI8T

@TheNickyMo - nick moseder

Dominion tech Samuel Challandes from Colorado was sent in and suggested that they wipe down the scanner with a cloth and blow compressed air on the optical lens, which they did several times to no avail. https://t.co/sE8J55YGEa

@TheNickyMo - nick moseder

WOAH! At this point they noticed an interesting "coincidence". ALL (meaning every single one) of the 5,800 ballots that was giving a QR CODE FAILURE, were for the three Republican candidates: Kelly Loeffler, David Perdue, and Bubba McDonald! Gosh, that seems odd! https://t.co/oN2x1lYx0H

@TheNickyMo - nick moseder

Mr Chaney (board chairman) gets angry and demands for the Dominion tech to call his boss and fix this! Chaney starts threatening to bring in news agencies and expose the failure of dominion's ICP scanner. Challandes calls his boss Scott Tucker on speaker first, then steps out of the room alone...

@TheNickyMo - nick moseder

Challandes comes back and stands next to the scanner, smiling ear to ear, and tells them to wipe down the machine one more time, ensuring them that THIS TIME it's going to work. https://t.co/vR40TCUnD7

@TheNickyMo - nick moseder

They perform the same wipe down that they had tried countless times already, and what do you know? THIS TIME, it worked. Chaney, Hampton, Latham, and Thomas-Clark are all left dumbfounded, and suspicious that Challandes and/or his boss Tucker remotely altered the machine. https://t.co/YJ9dfKFsne

@TheNickyMo - nick moseder

So, to anyone who says that these election workers were working on behalf of Trump to alter the outcome of the Coffee County election, think again. They gave access to an independent research team to figure out what the hell happened that night. (Please share this thread)

Saved - August 28, 2023 at 6:08 AM

@DC_Draino - DC_Draino

Did Gov Kemp really just say “if you give anyone a voting machine, they can hack it”?! Yep! He openly admits GA elections are filled w/fraud Yet he’ll never say “we need to get rid of machines & move to hand-counting” B/c he benefits from the fraud

Video Transcript AI Summary
Brady County resident Phil Searcy expresses the importance of transparency in elections. He believes that there is currently a lack of transparency and suggests becoming a fraud worker to address this issue. Phil mentions a secret box but does not elaborate further.
Full Transcript
Speaker 0: Brady County boy here. Phil Searcy. Hey, Great. Good to see you. How you doing? Thanks for videoing. Yeah. We wanna keep it on the record. That's good. We need transparency in our elections. We don't have transparency now. Volunteer to be a fraud worker. I'm not We got a secret box. It's a secret box. No. It is worth it. I'm sure you
Saved - August 29, 2023 at 10:42 AM
reSee.it AI Summary
Prominent Democrats and experts warn that America's election system is vulnerable to hacking. Machines can be manipulated by dishonest employees or individuals with computer knowledge. Votes can be stolen, miscounted, or secret instructions can be inserted. Encryption algorithms and protections are deemed insufficient. The system runs on outdated operating systems, making it easily hackable. Urgent action is needed to secure the integrity of elections.

@KanekoaTheGreat - KanekoaTheGreat

Rep. Jerry Nadler (D-NY) in 2004: "If someone were deliberately hacking these machines, you could steal millions of votes, and no one would know it... We've documented a machine in this county that recorded 11,000 extra votes for Bush. In that county, there was counting Kerry votes for Bush... These machines are hackable. A dishonest employee of the vendor, or a dishonest employee of a local board of elections, or simply someone who knows electronics, and has a computer at home, could hack into these machines and put in secret instructions to disregard every 20th Democratic vote. Or add 10% to the Kerry or Bush vote or whatever, and you might not even know it... There was one county where on some local race or some referendum, they lost 4500 votes, the machine hiccuped, and 4500 people didn't have the votes counted... We have all these professors and these computer experts telling us that the encryption algorithms aren't sufficient. That the protections aren't sufficient. They are proprietary data, so they're kept secret, so we don't really know." Full thread below. 🧵👇

Video Transcript AI Summary
There are concerns about the security of electronic voting machines, as they can potentially be hacked without detection. While there is no evidence of this happening, it cannot be proven that it hasn't or won't happen in the future. Instances of machine errors have been reported, such as recording extra votes for a candidate or subtracting votes instead of adding them. It is unknown how many instances went unnoticed and what impact they had on elections. Legislation is being proposed to require a paper trail for every electronic machine, similar to ATM receipts, to ensure transparency and allow for verification. An investigation is also being requested to assess the effectiveness of voting machines and improve election systems.
Full Transcript
Speaker 0: If in fact, someone were deliberately hacking these machines, you could steal millions of votes, and no one would know it. And that's why the methodology is problematic. Now there's no evidence that happened, but you can't prove it didn't either and you can't prove it won't next time. And that's why we have to have a paper trail. I mean, we've documented, any number of people documented, A machine in this county that recorded 11,000 extra votes for Bush, in that county, there was, counting, Kerry votes for Bush, people who pushed, they touched Carrie's name would come up Bush, and they touched it again, and it would come up Bush, and they touched it a 3rd time, and finally got it right. And all kinds of things like this, 1 1 machine when we say 1 machine, these are large machines, like a half a county apparently. After it reached 3,000 votes total, every time you voted for Bush, it subtracted 1 instead of added 1. When you push, carry, it subtract 1 instead of adding 1. In all these instances were instances where they were caught. Otherwise, they wouldn't have been reported. They were caught presumably corrected. The question obviously is how many instances were not caught that we don't know about, And what, if any, impact did that have on the election, if not for president, then for county commissioner or congressman or whatever? And it's clear that we have some of these new technologies, the electronic voting, replacing the the the chads and all that, which had other problems, but there are no paper trails. And we have all sorts of testimony before the election from electronics experts that, number 1, we've seen a lot of, what I call honest glitches, where it just didn't work right, but also that these machines are hackable, that a dishonest employee of the vendor or a dishonest employee of Book of Board of Elections or simply someone who knows electronics and has a computer at home, could hack into these machines and then put in a secret instruction You need to disregard every 20th Democratic vote or add 10% to the carrier, to the Bush vote or whatever, and you might not ever know it. And the we had these warnings before the election and apparently, they're correct. And we have all these questions now and we're seeing instances of, so far as we know honest glitches that we caught. But the question arises, how many didn't we catch and how do you prevent that? Now there's legislation pending, which I'm cosponsoring, offered in the House by Rush Holt in the Senate by Hillary Clinton and others, that says that every electronic machine should have a paper trail, like an ATM machine gives you a receipt. You should when when you push the carry, let's say you vote for carry An a for Congress and b for the Senate, it should say carry a and b, you see that on the machine. It should also print a piece of paper, which you see you look at the piece of paper, You say, okay, you then press submit, it cuts off the piece of paper, drops it into a into a box. So if anybody raises questions after the election, You can, in fact, count the paper. There was 1 county where on some local race or some, referendum, they lost 45100 votes. Machine hiccup, they lost it. 45 100 people didn't have their votes counted. And we don't know if that made a difference in that referendum or local race or whatever, but the system is inherently subject to that kind of thing. So we asked for an investigation Congressman Conyers, who's the ranking Democrat on the judiciary committee and Bob Wechsler, congressman from California, and I asked the Government Accountability Office, which used to be known as the Government Accounting Office, which is the nonpartisan investigative arm of Congress, to invest it. And we we ask that they investigate the efficacy of voting machines and new technologies, how election officials responded to difficulties in counting and what we can do in the future to improve our election systems. These companies did a tremendous sales job after the, that 2000 election in Florida where where we had all those paved problems with the Chads, and everybody said get rid of these punch card machines. Find a better way to do it. Find a better way to do it. They had these products. These products weren't really quite ready, I don't think. I mean, all these we have all these professors and these computer experts telling us that the encryption algorithms are insufficient, that the protections are insufficient, their proprietary data, so they kept the secret, so we don't really know, but they wanted to sell their machines. And they did a tremendous sales job

@KanekoaTheGreat - KanekoaTheGreat

MUST WATCH🚨 20 minutes of prominent Democrats, computer scientists, and election security experts warning that America's election system is online, easily hackable, and often running on Windows 7 or older operating systems. https://t.co/upFIU1g8SN

@KanekoaTheGreat - KanekoaTheGreat

🚨BREAKING: Explosive video surfaces of FOX News stars Tucker Carlson, Laura Ingraham, and Sean Hannity slamming Trump's "insane" voting machine fraud allegations as "absurd," "ridiculous," and "complete BS"!

Video Transcript AI Summary
Virginia has stopped using touchscreen computer voting due to vulnerabilities, and there is concern about the security of voting machines across the country. Researchers have demonstrated that these machines can be easily tampered with and hacked. In 2018, electronic voting machines in Georgia and Texas deleted or switched votes. The biggest seller of voting machines has violated cybersecurity principles by installing remote access software, making the machines susceptible to fraud and hacking. There are concerns about the use of modems in voting machines, as they can be connected to the internet and pose a risk. Outdated software and lack of paper trails also contribute to the vulnerability of the voting systems. The potential for hacking and interference in elections is a significant concern, and the need for secure and updated voting systems is crucial.
Full Transcript
Speaker 0: Virginia just stopped using touchscreen computer voting because it's so vulnerable. We need to look at all the voting machines. Every secretary of state needs to be, you know, assisted in making sure that they are not being, hacked and and attacked. Speaker 1: I continue to think that our voting machines are too vulnerable. Speaker 2: Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering. Speaker 3: Even hackers with limited prior knowledge, Tools and resources are able to breach voting machines in a matter of minutes. Speaker 4: In 2018, electronic voting machines in Georgia and Texas deleted votes for certain candidates or switch votes from 1 candidate to another. Speaker 2: The biggest seller of voting machines is doing something that violates Cybersecurity 101 directing that you install remote access software which would make a machine like that, you know, a magnet for fraudsters and hackers. These voting machines Can be hacked quite easily. Speaker 5: You could easily hack into them. It makes it seem like all these states are doing Different things, but in fact, 3 companies are controlling this. Speaker 0: It is the individual voting machines that some pose that pose some of the greatest risk. Speaker 6: There are a lot of states that are dealing with antiquated machines, right, which are vulnerable to being hacked. Speaker 7: Workers were able to easily We hacked into an electronic voting machine. Speaker 2: It was possible to switch votes. 43% of American voters use voting machines That researchers have found have serious security flaws, including backdoors. Speaker 8: We know how vulnerable now our systems were. We know, I know the Hackathon that took place last year, where virtually every machine was broken into fairly quickly. Speaker 5: I actually held a demonstration for my colleagues here at the Capitol, where we brought in, folks who before our eyes hacked election machines. Those that are not those that are being used in many states. Speaker 3: Aging systems also frequently rely on unsupported software Like Windows XP in 2000, which may not receive regular security patches and are thus more vulnerable to the latest methods of cyber attack. Speaker 7: In a close presidential election, they just need to hack 1 swing state or maybe 1 or 2 or maybe just a few counties in one I'm Speaker 9: very concerned that you could have a hack that finally went through. You have 21 states that were hacked into. They didn't find out about it for a year. Right now, we have over a dozen dozen states that either don't have any backup paper ballots or only have them partially. You think that our adversaries don't know what those states are? Of course, they know what those states are. And if we have a close election In the general election, in a presidential race, and one state's out withstanding and their ballot boxes gets hacked into, their elections get hacked into, We will have absolutely no backup. Speaker 8: I know America's voting machines are vulnerable because my colleagues and I have hacked them repeatedly. We've created attacks that can spread from machine to machine like a computer virus and silently change election outcomes. And in every single case, we've found ways for attackers to sabotage machines and to steal votes. Across the country, there are about 50 Two different models of machines. They fall into essentially 2 styles, ones that scan a piece of paper or ones where the vote, the voter just interacts with the touch screen and many of them have been analyzed now by researchers Looking for security vulnerabilities. In every single case where a US voting Machine has been analyzed by by competent security researchers. They have found vulnerabilities that would let someone inject malicious software And change election data every single case. Speaker 10: The better or the more efficient way of hacking machines would be to subvert them all through the machine that's used to actually Program those machines. So prior to each election, the county election office or the voting machine vendor will actually program memory cards For that election, it tells the machine who are the candidates, what are the, you know, the contests being decided, and that gets inserted Into the voting machine. If you can alter, if you can subvert that machine that is used to program those memory cards, then you can pass, rogue software to the voting machines. Speaker 8: Voting Chains are not connected to the internet. This is something that you hear all the time in the US from election officials. Unfortunately, it's not actually true. In many new voting machines Come with, 4 gs wireless modems so that they can be connected to the internet from the polling place in order to upload the results faster. Now to me that sounds crazy. Why would you want to put your voting machines on the internet right in the middle of the election potentially at the most vulnerable time? Speaker 11: Studies conducted in 2007 by the state of California, state of Ohio, state of Florida found security vulnerabilities that could take advantage of these To engineer viruses where 1 compromised voting machine could then infect eventually the entire fleet of machines for an entire county. Typically at the end of the election day you move a memory card through each of the machines in the precinct and that's to collect the vote totals. That process can spread a virus. And there are other processes. The details vary from machine to machine. Speaker 2: When you say hacked, what were they able to do once they gained access to the machines? Speaker 1: All sorts of things. They could manipulate the outcome Of the vote, they could manipulate the tally, they could delete the tally, and and they could compromise the vote in any number of ways. Speaker 12: The machines used in Georgia Have been demonstrated to be hackable through a virus that's carried on ballot definition cartridges. Very much like this Duxnet virus was, Inserted into, nuclear centrifuges in Iran. Speaker 1: There are a number of states that outsource their reporting of elections to third parties, some of which are corporations based in other countries Trees like Spain. So you've got to trust that the aggregation of the votes and the reporting of the votes is is, is accurate as well. Speaker 8: I'm Pretty sure my undergrad computer security class at Michigan could have changed the outcome of the 2016 Michigan election if we wanted to. It is that bad. And we have a combination of very powerful adversaries and unfortunately quite vulnerable and obsolete systems. That's that's why I say it's only a matter of time. Speaker 13: Unfortunately, in a lot of these systems, the audit trails are just as vulnerable as the other aspects of the system. So there may not be Good forensic evidence of a successful, intrusion. With the current design, we cannot be universally confident that it hasn't happened. And it's probably only a matter of time before it will. Speaker 3: In at least 40 states, elections are carried out using machines They're at least a decade old. And like any technology, they're susceptible to increasing failure with age. Some state officials Have had to turn to eBay to find critical components like dot matrix printers, decades old storage devices and analog modems. Aging systems also frequently rely on unsupported software like Windows XP in 2000, which may not receive regular security patches And are thus more vulnerable to the latest methods of cyber attack. Speaker 4: In 2016, state election websites in Illinois and Arizona were hacked by intruders who installed malware and downloaded sensitive voter information. Speaker 6: It is worth fighting for integrity in our election system, which means that they are free From interference by a hostile or an unfriendly nation. Let's put the resources into upgrading the state's election systems. Because what we know is this. There are a lot of states that are dealing with antiquated machines, right, which are vulnerable to being hacked. Speaker 5: I sit on the Senate Intelligence Committee and Senate Homeland Security Committee and we receive all kinds of information about the vulnerabilities to our national We are vulnerable in terms of foreign interference with our elections. It's my understanding that some of the election system vendors have Acquired states to sign agreements, that prevent or inhibit independent security testing. There's a saying that I'm sure many of you have heard, which is the Do you know the difference between being hacked and not being hacked? Is knowing you've been hacked. Speaker 0: And they are still looking for ways to steal information about voter registration, for example. There are some tech experts in Silicon Valley Valley with whom I have met who say that, you know, maybe what they'll do this Next time is to really disrupt the actual election. Shut down the servers that you send results to. Interfere with the operation of voting machines because still too many of them are linked to the Internet. So there we are still very vulnerable. Speaker 14: I mean, I can tell you in Virginia, when I was governor, I had to replace all the machines. Because I remember when I first voted, when I went to Richmond, moved down as governor, I remember I kept voting in the senate race, kept voting for the democrat, republican name kept coming up. Three times that happened. Speaker 15: What do you mean kept coming up? Speaker 14: So I you know, we had the touch screens. I was voting for Mark Warner, our senator, and Ed Goswami's name would light up. Happened to me 3 times. Finally, the 4th time, Mark Damon, I quickly hit vote and I got out of there. You know, all the cameras are looking at me like this guy doesn't know how to vote. I mean, what's going on? So then I had an investigation done and listen to this. I brought in some technology experts. They were able to hack into our machines from off-site in about 5 or 6 minutes. And within 4 minutes, they were able to change a vote. IDD certified all the machines. Now in Virginia, we have paper ballots. Speaker 2: 43% Of American voters use voting machines that researchers have found have serious security flaws, Including backdoors. These companies are accountable to no one. They won't answer basic Questions about their cybersecurity practices and the biggest companies won't answer any questions at all. 5 states have no paper trail, and that means there is no way to prove the numbers The voting machines put out are legitimate. So much for cybersecurity One zero one. The vast majority of 10,000 election jurisdictions nationwide Use election management systems that run on old software that is soon gonna be out of date And write for exploitation by hackers according to an exhaustive analysis By Speaker 0: the Associated Speaker 2: Press, Pennsylvania, Wisconsin, Michigan, Florida, Iowa, Indiana, Arizona, and North Carolina, among others, are all at risk. Even the state of Georgia, which just passed legislation to buy new voting machines, is on track To buy equipment that suffers from this significant cybersecurity weakness. Let's say the election Is decided by a small percentage. And people in America Don't think that the election was fair. The effect that would have on our 200 year Experiment in self governance. Our democratic system would take a real hit. Our elections weren't secure last week, and they sure as heck aren't secure this week. And anybody who says otherwise is either selling the voting machines or simply has a malicious Intent towards our elections. At one point in the Intelligence Committee, Both sides seem to agree that no votes were changed in the 2016 election. And I said, the experts I talk to say that until you have a Forensic analysis of a vote until you go in there and scrub the whole system. You can't really say that. Speaker 16: These machines don't have a capability of providing you forensic evidence To see if they cannot prove they were honest, they cannot prove that they were have been hacked. They simply don't have the Fundamental basic capabilities of providing you that forensic evidence, that data. Only way you can see That, that machine was hacked. If the attacker wanted to be, they found that it was hacked. That's a sad truth. So anyone who says, I have information one way or another. That's an opinion. That's not tactics. Practice, it can be done without leaving trace. When you know how the systems work, Looking for the evidence, you know that you won't find it because the systems are not recording, generating, Preserving or protecting meaningful forensic evidence. And this is from the very beginning to the end of the process everywhere. These systems really don't have a capability of recording and protecting any meaningful audit information or forensically important information. So a lot of times I would also argue that even if you try to take a look into the evidence, the problem is that there is no Speaker 17: We've heard a lot from voting machine vendors and election officials that voting machines Can't be hacked because they're not connected to the internet. All of those vulnerabilities that Andrew talked about, are not a problem because no one can access the machines And it turns out that that message that they've been giving us for years and particularly after the 2016 election Just isn't true. Voting machine vendors have sold election officials on these in use of modems. In some case, the modems are embedded inside the voting machines. In other case, they're external modems that get attached to the voting machine at the end of the election. So at the end of the election, the machine goes Into shutdown mode and then this option pops up about modoming results. And so the system will automatically then dial in and send these votes over a cellular modem to a server on the Internet that collects the results. So everyone will tell you and they've told me every time I've spoken with them that cellular modems are not really internet connectivity. They will say, That doesn't mean that the machine is connected to the internet. It's using a cellular modem. Well, that's not true and Election Systems and Software, which is The top voting machine maker in the country, this is one of their statements over and over again with the public but this is one of their own diagrams that they They gave to Rhode Island in 2015. And if you see that circular part in the center there showing that that modem transmission using the wireless modem, They sit there, right there. It's on their own diagram that is going over the internet. Speaker 8: Before every election, election officials have to program the voting machines With who's on the ballot and what are the rules for counting? Well, they make that election programming on a PC workstation somewhere either at the, at the jurisdiction or at an outside vendor that does it for them. If an attacker can break into that work Station which is called an election management system. They can spread malicious code to all of the memory cards used to program all of the voting machines in the jurisdiction And those election management system workstations sometimes are connected to the internet or the data that's programmed into them passes Through an internet connected system. So we're just 1 or 2 hops away from an online attacker. So if I wanted to break into this company, let's say I was the attacker, I'd Probably start by forging an email from, let's say, Larry, the president here, to Sue, his administrative assistant, Asking her to urgently open an attachment. Now, of course, when she does, that attachment has my malware in it. I have a, foothold into their network And I can try to spread from there to the election management system and to the voting machines in most of the state. Pampering with the national election result in my country It's easier than well easier than even I thought in 2016. I keep learning things that convince me that the situation is scarier than, than even Fertz had thought, You identify the states that are most weakly protected and going to be close. Target the computers that are going to program voting machines there, spread malware to machines to change a fraction of the votes And then rely on the fact that most states even if they have a paper record are not going to rigorously use it to check that the computers are right. But the fact is that in close national contests in the US, the result really only hinges on the result in a small number of States. You've heard about the swing states in any given election. The ones that are, really competitive. In such a situation an attacker can, before the election, identify which states are likely to be close. Try probing all of them In the way that the Russians did the voter registration systems in 2016 and just find the weakest swing states and attack there. So in this way, the American system converts, diversity of implementation Into basically this patchwork of strength and weakness that gives attackers a menu of possible places to strike. It makes us weaker in close elections. Speaker 18: Modems in voting machines are a bad idea. Those modems are network connections. And that leaves them vulnerable to hacking by anybody who can connect To that network. Speaker 19: ES and S insists while there are 14,000 of its modems in use, there are firewalls separating those modems from the public Internet. Speaker 18: Once the hackers starts talking to the voting machine through the modem, they can hack the software in the voting machine And make it cheat in future elections. Speaker 20: What is the vehicle for the transmission from the ICP? Is it cellular modem versus VPN? Speaker 15: Well, it is a cellular modem that Speaker 8: the can be configured in a VPN. Right? And we currently in Chicago and Cook County, we work with Verizon to, Secure that network. What wireless chipset slash modem does the hardware have? We support a variety. So, it's really up to the jurisdictions what technology they wanna use, what's compatible with their with their networks. Speaker 15: Currently, in some jurisdictions, we're using, basically, a modem that is a three d modem, GSM, but we can support multiple Variety support and protection. Speaker 8: Including including latest four gs standards. Speaker 20: So the answers to the next question is the three gs or four gs. Verizon 8 tier Do you're Sprint consuming all? Speaker 16: Oh, yeah. All all networks. Right. Speaker 8: Discuss quite a bit. Yeah. I mean, we actually transmit from the ICP in Mongolia as well. So, we're not committed in networks. Speaker 15: And in Puerto Rico, there's 3 vendors because the island is not covered by any by any of the vendors With this, we use 3 different cellular vendors for some ICPs. With this vendor, Claro, ATMC, and T Mobile, I might say, in the different parts Speaker 16: More modern voting machines, they actually have a mobile phone modem. In to speak, they have a they have mobile phone our mobile phone connectivity to county headquarters, they are sending the results. Speaker 1: Some jurisdictions are relying on uploading election To results using cellular modems or, the Internet that of course introduces another point of vulnerability, not just to the data that's flowing, But also it's the software, the devices that, that are being connected. Speaker 10: Many of these voting machines have modems embedded into them. And the modems are to transmit the vote totals on election night to the county, elections office. So these modems contact, they're cellular modems and they Contact the cellular network, to contact the cell tower. So the cell tower traffic these days in our modern times actually goes through Internet. It goes through the same Kinds of routers and switches not the regular internet traffic comes to but also, in between that cell tower and that voting machine, an intruder Can, intercept data going to the cell tower and intercept that that communication, that phone call. If you can trick a voting machine into, contacting In your device your fake cellular tower instead of a legitimate tower you can actually use that connection to get back into the voting machine and get back into the tabulator, and then alter votes and software. Speaker 8: So just to review, you look at the polls before the election and figure out which states were likely to be close. Probe all of them. Find the ones with the weakest protection. Then hack into the, election management systems there or at the outside vendors the states use. Once you hack into the election management system, can spread malicious code to individual voting machines and have your code say swap 10% of the votes in the places you infected.
Saved - September 11, 2023 at 12:41 AM
reSee.it AI Summary
The negligence in protecting Georgia residents' registration information is alarming. The Oct 23, 2020 hacking incident highlights the need for better security measures. Sharing sensitive information via phone can minimize exposure and prevent discovery. Brad Raffensperger's accountability is crucial.

@pepesgrandma - Bad Kitty Unleashed 🦁💪🏻

How could anyone allow all of this to happen in their state without remedy. And to have such a lackadaisical attitude on protecting the registration information of every resident in Georgia? Did you see one of those emails from the Oct 23, 2020 hacking? “Typically our clients prefer to give us sensitive information like this via phone, this limits the exposure of the information and ensures it is NOT DISCOVERABLE.” Brad Raffensperger is the one who should be on trial. Thred

@pepesgrandma - Bad Kitty Unleashed 🦁💪🏻

Jan 2020 - Georgia election server hacked and compromised up to 2 years and exposed to the internet at least 6 months. Once a lawsuit was filed they wiped the server refusing to submit it for analysis. The FBI had a copy tho. 2016 election logs were wiped. https://apnews.com/article/39dad9d39a7533efe06e0774615a6d05

Expert: Georgia election server showed signs of tampering BOSTON (AP) — A computer security expert says he found that a forensic image of the election server central to a legal battle over the integrity of Georgia elections showed signs that the original server was hacked. apnews.com
Saved - September 19, 2023 at 6:09 AM
reSee.it AI Summary
An election integrity group claims millions of mailed ballots in California went unaccounted for. In Detroit, thousands of absentee ballots lacked signed applications. Wayne County's election results were never lawfully certified, potentially favoring Trump. Missing chain of custody documentation for Arizona ballots raises concerns. Fulton County in Georgia conducted no signature verification. Evidence suggests Maricopa County didn't compare voter signatures properly. Improper chain of custody forms and tampered ballots were found in Georgia. Printer failures in Maricopa County were caused by malware or remote access. A hand count audit in Ware County revealed a high misrecorded vote rate. Illegal ballots likely exceeded the margin of victory in Georgia. Ballot images were destroyed and surveillance videos deleted in violation of the law.

@matttttt187 - {Matt} $XRPatriot

𝐔𝐏𝐃𝐀𝐓𝐄𝐃 𝟗/𝟏𝟖 {1/3} 𝐋𝐄𝐓’𝐒 𝐋𝐎𝐎𝐊 𝐀𝐓 𝐀𝐋𝐋 𝐎𝐅 𝐓𝐇𝐄 𝐄𝐋𝐄𝐂𝐓𝐈𝐎𝐍 𝐅𝐑𝐀𝐔𝐃 𝐀𝐍𝐃 𝐈𝐍𝐓𝐄𝐑𝐅𝐄𝐑𝐄𝐍𝐂𝐄 𝐍𝐄𝐖𝐒 𝐓𝐇𝐀𝐓 𝐃𝐑𝐎𝐏𝐏𝐄𝐃 𝐈𝐍 𝐉𝐔𝐒𝐓 𝐓𝐇𝐄 𝐏𝐀𝐒𝐓 𝟏𝟏 𝐃𝐀𝐘𝐒 𝐎𝐑 𝐒𝐎 𝐒𝐇𝐀𝐋𝐋 𝐖𝐄? 𝐓𝐇𝐄 𝐃𝐀𝐌 𝐈𝐒 𝐀𝐁𝐎𝐔𝐓 𝐓𝐎 𝐁𝐑𝐄𝐀𝐊 9/18- An election integrity group claims 10.9 million out of a total of 22.1 million ballots that had been mailed out to registered voters in California during the 2022 midterm elections went ‘unaccounted for.’" 9/18- As many as 34,000 absentee ballots cast in several Detroit, MI, precincts illegally had no signed ballot application, according to a report by The Spekin Forensic Laboratories. 9/18- Wayne County, Michigan, never lawfully certified their 2020 presidential election results, potentially making Donald Trump the winner 9/18- An election integrity research group reported that the required chain of custody documentation is missing for 740,000 Maricopa County, Arizona, ballots from the 2020 election 9/18- A voting machine expert says Fulton County, Georgia, conducted no signature verification in the 2020 election, and election officials admitted 9/17- Kari Lake’s newly filed appeal says evidence demonstrates that Maricopa did not test but falsely certified that its 446 vote-center tabulators passed mandatory L&A certification testing prior to Election Day and strongly suggests Maricopa planned the Election Day debacle 9/16- Kari Lake’s newly filed appeal suggests that new evidence shows Maricopa County did not comprehensively compare 275,000 voter signatures according to the county's and state’s own rules. 9/15- Electronic voting machine expert Garland Favorito has testified that about 100,000 improper chain of custody forms were picked up after the election was conducted, or pickups were marked 3 minutes apart when the locations were 30 minutes apart in Georgia in 2020 9/15- Approximately 43,000 DeKalb County, Georgia, drop box ballots have no chain of custody forms to authenticate them. 9/15- An electronic voting machine expert testified that his team found as many as 148k ballots tampered with in the 2020 Fulton County, Georgia, election alone; his team didn't look at other counties. 9/14- Electronic voting machine expert Garland Favorito testified that nearly 35,000 people who voted in the Georgia 2020 election had moved out of their registered county prior to the election, which exceeds the 11,779-vote victory margin and is thus sufficient to place the results of the presidential election in Georgia in question. 9/14- Evidence shows the Maricopa County Election Day printer "failures" were caused by malware or by remote access; 200,000 ballots were ejected out of 248,000 votes cast. 9/14- Election machine expert Garland Favorito testified that he found 106,000 2020 Georgia ballots had massive problems with the chain of custody, like the times and places didn't make sense or were contradictory, and in some instances the documentation was just flat out missing. 9/14- Evidence shows the Maricopa County Election Day printer "failures" were caused by malware or by remote access; 200,000 ballots were ejected out of 248,000 votes cast 9/13- Electronic voting machine expert Garland Favorito says a hand count audit of Ware County, Georgia’s 2020 presidential election, found about a .25% misrecorded vote rate, almost exactly the victory margin rate that Joe Biden received over Donald Trump 9/13- A comprehensive report compiled by Look Ahead America provides specific, verifiable evidence that illegal ballots in Georgia likely exceeded the margin of victory in the 2020 presidential race. 9/13- Electronic voting machines expert Garland Favorito says he found counties in Georgia had destroyed 1.7 million ballot images in violation of the law, and the surveillance video of drop boxes for 181,000 ballots was deleted in violation of the law.

Saved - September 29, 2023 at 6:58 AM
reSee.it AI Summary
Numerous allegations of election fraud and interference have emerged from the 2020 elections. In Georgia, there were claims of threatening letters, mismatched signatures, illegal sorting, and preprinted ballots. Montana banned private funding in elections, while a voting machine company faced bribery charges. Texas officials halted ballot counting and alleged millions of illegal mail-in ballots. RICO indictments were filed in Arizona, and impeachment articles were filed in Wisconsin. Suspicious spikes in net votes were reported in multiple states. Signature verification issues, missing chain of custody forms, and improper ballot handling were found in various counties. Malware and printer failures affected vote counts. These allegations raise concerns about election integrity.

@matttttt187 - {Matt} $XRPatriot

🚨 𝐔𝐏𝐃𝐀𝐓𝐄𝐃 𝟗/𝟐𝟖 🚨 LET’S LOOK AT ALL OF THE ELECTION FRAUD AND INTERFERENCE NEWS THAT’S DROPPED IN SEPTEMBER SHALL WE?? DO YOU THINK ITS JUST COINCIDENCE THAT THIS IS ALL BEING DRIPPED OUT AND REPORTED…RIGHT NOW? 💥 9/28- Georgia Secretary of State Brad Raffensperger allegedly sent a threatening letter to counties, telling them not to allow forensic exams on the Dominion voting machines 💥 9/28- During the 2020 Arizona election, 204,430 mail-in ballots had mismatched signatures that were never sent to review, and 740,000 mail-in ballots had a broken chain of custody, all far more necessary than the 10,457 votes needed for a Trump win. 💥 9/27- A former police officer and a poll watcher says he witnessed a pile of ballots pulled out of a box that were 171 to 1 for Biden in Cobb County, Georgia, and then noticed someone had illegally sorted through the boxes. 💥 9/27- A certified Fulton County Georgia audit monitor claims to have observed many boxes of 2020 ballots that appeared to be perfectly filled out as though they were preprinted and did not look done by hand, of which 98% were filled out for Biden and 2% for Trump. She and other observers have a list of suspicious batches. 💥 9/26- Georgia Secretary of State Brad Raffensperger certified the 2020 election before investigating the 364,000 ineligible voter records based on residency alone, of which 67,000 voted. 💥 9/25- Montana is the 25th state to ban or restrict the use of private money (Meta CEO Mark Zuckerberg) in the conduct of elections, preventing millions of dollars from being poured into local election offices in battleground states and expanding unsupervised election protocols like mail-in voting and the use of ballot drop boxes. 💥 9/25- The voting machine company that sued Mike Lindell, Rudy Giuliani, Fox News, and Newsmax for defamation about the 2020 election has been implicated in a bribery scheme, according to a new indictment from the 💥 9/24- Texas AG Ken Paxton says they stopped counting ballots during the 2020 election because they needed to figure out how many real votes there were so they could figure out how many mail-in ballots to apply to the election. 💥 9/24- Texas AG Ken Paxton says he stopped 2.5 million illegal mail-in ballots that would have stolen the 2020 election from Trump in Texas. 💥 9/24- During the 2020 election in Green Bay, Wisconsin, a Mark Zuckerberg-paid election operator decided which ballots would be tallied and which ones would not. 💥 9/24- Arizona Senate has laid out RICO indictments against Katie Hobbs and others in violation of RICO ACT-13-2301, including bribery, racketeering, money laundering, drug trafficking, human trafficking, aiding and abetting the Sinaloa Cartel, and election fraud. 💥 9/24- Articles of impeachment have been filed against the Wisconsin Election Chief after many lawmakers say her policies and directives “rigged” the election in favor of Joe Biden in 2020. 💥9/24- Election integrity experts report 26 strange huge net vote dumps for Joe Biden, of 25,000 or more, appeared on election night in 2020 in 14 states suspected of election fraud, with some having more than one spike; Pennsylvania had four spikes (none in favor of Trump) 💥 9/23- 150 trained election workers' review of 25% of all 2020 mail-in ballots in Arizona shows they had no signature match, meaning 420,987 ballots out of 1.9 million were fraudulent, invalid, or illegitimate 💥9/23- 200,000 ‘non-conforming’ ballots were found in Maricopa County, Arizona’s 2020 election, after discovering ten additional ballot types being used when only one official ballot type was approved 💥 9/22- A former USPS employee blows the whistle on 100,000 missing Wisconsin ballots. 💥 9/22- Wisconsin Republicans introduced 15 articles of impeachment against Meagan Wolfe, the Administrator of the Wisconsin Elections Commission, citing allegations of maladministration in office and potential violations of election laws.

@matttttt187 - {Matt} $XRPatriot

💥 9/22- Absentee drop boxes have been banned by the Wisconsin Supreme Court. 💥9/21- A legal review conducted on the 92 court challenges filed over the 2020 election found that a clear majority of the cases decided on the merits were ruled favorably for the GOP and Trump. 💥9/21- Former Secretary of State Ruth Johnson says that over 800,000 ballot applications were sent to non-qualified voters in Michigan in 2020. 💥9/21- AG Ken Paxton says a Texas court’s ruling has blocked him from prosecuting voter fraud. 💥9/21- Texas AG Ken Paxton says Democrats stole the election from Trump in 2020 by stopping the count of votes on election night so they could figure out how many mail-in ballots to apply. 💥 9/20- Gwinnett County, Georgia, Election Board had 40,000 mail-in ballot challenges but would not hear them 💥 9/20- Investigations into voting machine failures and signature verification put over 500,000 ballots in question from the 2022 Arizona midterms. (Hobbs won by less than 20,000 votes.) 💥 9/20- National intelligence researcher Mary Fanning says communist China changed 3,477 votes from Trump to Biden in Emmet County, Michigan, alone 💥 9/19- The Amistad Project claims that they have sworn declarations that say over 300,000 ballots are at issue in Arizona, 548,000 in Michigan, 204,000 in Georgia, and over 121,000 in Pennsylvania 💥 9/19- Electronic voting machine expert claims the number of unsupportable 2020 ballots found for Fulton County, GA, alone is forty-five times larger than Biden’s margin of victory for the entire state. 💥 9/17- An election integrity group claims 10.9 million out of a total of 22.1 million ballots that had been mailed out to registered voters in California during the 2022 midterm elections went ‘unaccounted for.’" 💥 9/17- As many as 34,000 absentee ballots cast in several Detroit, MI, precincts illegally had no signed ballot application, according to a report by The Spekin Forensic Laboratories. 💥 9/17- Wayne County, Michigan, never lawfully certified their 2020 presidential election results, potentially making Donald Trump the winner 💥9/17- An election integrity research group reported that the required chain of custody documentation is missing for 740,000 Maricopa County, Arizona, ballots from the 2020 election 💥 9/17- A voting machine expert says Fulton County, Georgia, conducted no signature verification in the 2020 election, and election officials admitted 💥 9/17- Kari Lake’s newly filed appeal says evidence demonstrates that Maricopa did not test but falsely certified that its 446 vote-center tabulators passed mandatory L&A certification testing prior to Election Day and strongly suggests Maricopa planned the Election Day debacle 💥 9/16- Kari Lake’s newly filed appeal suggests that new evidence shows Maricopa County did not comprehensively compare 275,000 voter signatures according to the county's and state’s own rules. 💥 9/15- Electronic voting machine expert Garland Favorito has testified that about 100,000 improper chain of custody forms were picked up after the election was conducted, or pickups were marked 3 minutes apart when the locations were 30 minutes apart in Georgia in 2020 💥 9/15- Approximately 43,000 DeKalb County, Georgia, drop box ballots have no chain of custody forms to authenticate them. 💥 9/15- An electronic voting machine expert testified that his team found as many as 148k ballots tampered with in the 2020 Fulton County, Georgia, election alone; his team didn't look at other counties. 💥 9/14- Electronic voting machine expert Garland Favorito testified that nearly 35,000 people who voted in the Georgia 2020 election had moved out of their registered county prior to the election, which exceeds the 11,779-vote victory margin and is thus sufficient to place the results of the presidential election in Georgia in question.

@matttttt187 - {Matt} $XRPatriot

💥 9/14- Evidence shows the Maricopa County Election Day printer "failures" were caused by malware or by remote access; 200,000 ballots were ejected out of 248,000 votes cast. 💥 9/14- Election machine expert Garland Favorito testified that he found 106,000 2020 Georgia ballots had massive problems with the chain of custody, like the times and places didn't make sense or were contradictory, and in some instances the documentation was just flat out missing. 💥 9/14- Evidence shows the Maricopa County Election Day printer "failures" were caused by malware or by remote access; 200,000 ballots were ejected out of 248,000 votes cast 💥 9/13- Electronic voting machine expert Garland Favorito says a hand count audit of Ware County, Georgia’s 2020 presidential election, found about a .25% misrecorded vote rate, almost exactly the victory margin rate that Joe Biden received over Donald Trump 💥 9/13- A comprehensive report compiled by Look Ahead America provides specific, verifiable evidence that illegal ballots in Georgia likely exceeded the margin of victory in the 2020 presidential race. 💥 9/13- Electronic voting machines expert Garland Favorito says he found counties in Georgia had destroyed 1.7 million ballot images in violation of the law, and the surveillance video of drop boxes for 181,000 ballots was deleted in violation of the law. 💥 9/13- Election software (KNOWiNK Systems) that is used in 36 states plus Washington, D.C., has contracts that include a clause that allows the election staff to override the results of an election. 💥 9/13- All or large parts of 2,000,000 2020 original ballot images from 70+ Georgia counties are missing. 💥 9/12- There are six sworn affidavits of counterfeit mail-in ballots in Fulton County, Georgia, with election results scaling into the tens of thousands. 💥 9/12- Fulton and Cobb, two of Georgia’s most populous counties, admit they are missing some or all of their 2020 original ballot images, a violation of federal and state retention laws. (Estimated 393k+ in Cobb and 350k+ in Fulton) 💥 9/12- Issues were found with transfer forms for 43,907 out of 61,731 absentee ballots cast via drop box in DeKalb County, Georgia, in the 2020 election. 💥 9/11- A forensic expert claims Dominion was connected to the internet at the ‘same exact time’ the official results of Maricopa County 2020 general election were deleted. 💥 9/11- Former Wisconsin Supreme Court Justice claims his investigation into election fraud in Wisconsin's 2020 election found that election officials failed to record noncitizens in the voter database, so they were able to vote. 💥 9/11- Former Wisconsin Supreme Court Justice Michael Gableman testified that his investigation found that there were far more people registered to vote than were eligible; 4.5 million eligible voters, but over 7 million on the rolls. 💥 9/11- A Wisconsin judge has ruled that the "National Mail Voter Registration Form" used to register over 250,000 voters before the 2022 midterms is illegal due to the form not including an area to fill in whether a voter has been convicted of a felony or how long they’ve lived in their district (required by state law). 💥 9/11- BREAKING: Trump’s legal team’s accusations of election fraud in Georgia • 2,506 felons voted illegally • 66,248 underage • 2,423 were not listed as registered • 1,043 illegal voters casted a vote via post office box • 4,926 voted past the registration date • 10,315 were deceased before election • 395 cast ballots in another state • 15,700 changed address before election • 40279 moved across county lines at least 30 days prior to Election Day and failed to reregister 💥 9/10- Trump's attorney John Eastman says there is “evidence of coordination in Wisconsin between election officials and Democratic Party officials.”

@matttttt187 - {Matt} $XRPatriot

💥 9/10- A Runbeck Election Services whistleblower claims approximately 300,000 illegal ballots for Katie Hobbs were inserted into the Arizona 2022 election without going through the lawful chain of custody. 💥 9/10- Kari Lake’s attorney says they found evidence of malware put on printers used at 223 vote centers, resulting in over 7,000 ballot rejections every 30 minutes, all the way until after the polls closed. (That is over 200,000 ballot rejections on a day when there were only 248,000 votes cast.) 💥 9/8- The US Office of Special Counsel learned that all machines in Green Bay were ESS machines and were connected to a secret, hidden Wi-Fi access point at the Grand Hyatt hotel, which was the location used by the City of Green Bay on the day of the 2020 Presidential election 💥 9/8- Former Wisconsin Supreme Court Justice Michael Gableman says he found that nursing home workers were forging residents' signatures for absentee ballots and pressuring residents to cast ballots who had been adjudicated incompetent during the 2020 election. 💥 9/8- Wisconsin Supreme Court rules absentee ballot drop boxes are illegal 💥 9/8- Trump attorney John Eastman’s testimony - • Zuckbucks, with $8.8 million provided to Wisconsin's five large cities, violated the law: • Zuckerberg's "employees" work for the clerk’s offices and get access to voter information that costs the public $12,500 but has a 4-5 day delay, so there is no way to verify activation. • If clerks did not comply with Zuckerburg’s employees, there was a ‘penalty.’ • They had access and chased down ballots that were requested but not returned. • Zuckerberg's employees essentially "ran the elections" while making statements against Trump. • The WI Supreme Court confirmed ballot boxes were illegally placed, causing "illegally cast votes." • The guy Zuckerburg hired to run the operation wrote a book on how to win the election in this manner. 💥 9/7- Former Wisconsin Supreme Court Judge Michael Gableman testified election officials failed to have bipartisan observers present when collecting votes from nursing homes and just told clerks to break the law - Gableman claims there is video proof of officials admitting guilt. 💥 9/7- Preliminary AZ Senate forensic ballot audit findings show over 200,000 'non-conforming' 2020 ballots. 💥 9/7- Election expert claims 25% of all the 2020 Maricopa County, AZ mail-in-ballots have no signature match, meaning 420,987 ballots out of 1.9 million are fraudulent, invalid and illegal. 💥 9/7- Lawsuit filed against Fulton County, Ga claims there is a total of nearly 150,000 'non-conforming' 2020 ballots still locked up.

Saved - November 11, 2023 at 12:07 AM
reSee.it AI Summary
In 2016/17, the Obama Admin designated elections as federal Critical Infrastructure, giving the Deep State control. The DHS took charge of state election systems, gaining leverage over Secretaries of State. CISA (DHS) became the lead in cybersecurity for elections. Evidence suggests CISA used social media and non-profits to censor conservatives. The GA hand count was declared secure, but later admitted to counting some ballots twice. The challenge lies in the Deep State's control over the GASOS office.

@jeffmfulgham - Jeff Fulgham

My posts on evidence of election fraud in GA 2020 have 1 million+ views. Let me explain how we arrived at this point where the Deep State is running state elections. The Obama Admin seized control in 2016/17 by designating elections as a federal Critical Infrastructure. https://t.co/LNBBTujQvz

@jeffmfulgham - Jeff Fulgham

This designation enabled the federal government to assign security jurisdiction over all state election systems to the DHS. They began establishing leverage and control over Secretaries of State, especially in key swing states. https://t.co/ZsHfYnaqWe

@jeffmfulgham - Jeff Fulgham

This seizure of state election systems was literally one of the last actions by the outgoing Obama Admin. Then in 2018 CISA (DHS) was established and this agency took the lead cyber security role in state election systems. https://t.co/30hcbAqkde

@jeffmfulgham - Jeff Fulgham

Now evidence from the ongoing Missouri V Biden case shows that CISA was using social media and shady non profits to censor the speech of conservatives in 2020 and beyond. The Deep State controls the office of the GASOS. This is the challenge we face.

@jeffmfulgham - Jeff Fulgham

"The November 3rd election was the most secure in America history." -CISA This was announced on November 12, but the GA hand count wasn't completed until November 19. GASOS later admitted several thousand Fulton ballots counted twice. Evidence shows the hand count was faked. https://t.co/8aZJMpUjwq

Saved - November 13, 2023 at 6:40 PM
reSee.it AI Summary
In Georgia, concerns about election integrity have been raised. An anomaly was discovered during a municipal election, where tabulators didn't match the number of scanned ballots. The cause remains inconclusive, but erroneous code was found in EAC certified systems. Similar issues were found in 64 out of 66 Georgia counties. Hand recounts revealed more ballots than recorded votes in several counties. Despite evidence, these anomalies have not been addressed. The Georgia Secretary of State declined a security upgrade. These issues raise questions about the integrity of the election process.

@CannConActual - CannCon

🧵 1/ Georgia Election Thread: John Eastman said this on Jan 6. I'll explain why that could be so significant to what happened in Georgia, and maybe elsewhere. This is not just important for election integrity, but also for the indictment of @hw_floyd and @realDonaldTrump

Video Transcript AI Summary
There was fraud in the election, including dead people voting. The machines played a role in this fraud. Instead of having hidden ballots, they stored them in a secret folder. After the polls closed, the machines matched unvoted ballots with unvoted voters. This was evident when the vote percentage reached 99% but the votes kept coming in. The denominator, which represents the remaining ballots, started increasing, indicating that they were unloading the hidden ballots and matching them to unvoted voters. This allowed them to barely cross the finish line with enough votes.
Full Transcript
Speaker 0: We know there was fraud, traditional fraud that occurred. We know that dead people voted, but we now know because we caught it live last time in real time how the machines contributed to that fraud. And let me, as simply as I can, explain it. You know the old way was to have a bunch of ballots sitting in a box under the floor. And when you needed more, you pull them out in the dark of night. They put those ballots in a secret folder in the machines, sitting there waiting until they know how many they need. And then the machine, after the close of polls, we now know who's voted and we know who hasn't. And I can now, in that machine, match those unvoted ballots with an unvoted voter and put them together in the machine. And how do we know that happened last night in real time? You saw when it got to 99% of the vote total, and then it stopped. The percentage stopped, but the votes didn't stop. What happened and you don't see this on Fox or any of the other stations, but the data shows that the denominator how many ballots remain to be counted? How else do you figure out the percentage that you have? How many remain to be counted. That number started moving up. That means they were unloading the ballots from that secret folder, matching them matching them to the unvoted voter, and voila, we have enough votes to barely get over the finish line.

@CannConActual - CannCon

2/ On Oct 26, 2021, almost a year later, the TN Sec. State sent a report to the Elections Assistance Commission (EAC) about "an anomaly" during a municipal election on Dominion tabulators. 7 of 18 tabulators *did not match the number of ballots scanned.* https://www.eac.gov/sites/default/files/TestingCertification/EAC_Report_of_Investigation_Dominion_DSuite_5.5_B.pdf

Page not found | U.S. Election Assistance CommissionLock eac.gov

@CannConActual - CannCon

2 cont'd: This anomaly was discovered after an alert election worker found 163 ballots in a tabulator but only had 79 votes recorded by the machine. The other tabulator had 167 ballots inside of it but only recorded 19! Did these ballots end up in a "cache" secret folder??

@CannConActual - CannCon

3/ Williamson Co uses Dominion ICX BMDs to print/mark ballots and then tabulate them on Dominion ICP tabulators. The EAC's analysis that was performed by Pro V&V and SLI Compliance (voting systems test labs) *with* the EAC, Williams staff, TN SOS *AND* Dominion present.

@CannConActual - CannCon

4/ The report goes on to say that the "direct cause" is "inconclusive" --> Very important word. It also admits that "erroneous code" was found in the *EAC CERTIFIED* systems. *CERTIFIED* The explanation of a "misread of the QR code" is, according to many experts, "absurd".

@CannConActual - CannCon

5/ It's been explained to me that a QR code cannot be "misread". It's either read or its not read. For a scanner to "misinterpret" a bit and cause a ballot to incorrectly be designated "provisional" is extremely concerning. Especially when you see what happens next...

@CannConActual - CannCon

6/ The "misread" ballot (and all succeeding ballots) are also marked as "provisional". They don't reflect in the poll report totals. But they didn't just disappear. This is where Eastman's assertion over ONE YEAR *before* this report is so important.

@CannConActual - CannCon

7/ It's important to note that the problem was not "successfully fixed", as Dominion claims. Instead, some proverbial duct tape was thrown at it and the root cause was ignored. It'd be like resetting your Check Engine light and saying "my car is fixed!"

@CannConActual - CannCon

8/ Now here's how its relevant to what Eastman said about Georgia on January 6th! Georgia uses Dominion ICX BMDs and Dominion ICPs, much like Williamson. And much like Williamson, audit logs *and* evidence suggests the same thing may have happened in Georgia.

@CannConActual - CannCon

9/ The Elections Oversight Group (givesendgo.com/ElectionsOvers…) analyzed the system log files for 66 Georgia counties (acquired through Open Records Requests). In **64 out of 66 counties**, they found the same error messages as Williamson. https://gaballots.com/evidence/f/scanner-failures-in-georgia-match-the-williamson-error

The Williamson Tennessee ERROR is in 97% of Georgia Counties “That’s weird, it didn’t count all the votes.” gaballots.com

@CannConActual - CannCon

10/ Several GA counties had *more ballots* than recorded votes, as discovered during the hand-recount in Nov 2020. Those included Floyd Co (2600), Fayette (2700), Walton (284) and Douglas (293). Dekalb Co 2022 Dem Primary found 2810 extra votes in a hand count as well.

@CannConActual - CannCon

11/ It is worth noting that the hand-recount was off in Fulton by thousands and thousands of votes and had to double/triple scan ballots to make the numbers match. They entered a Consent Agreement admitting as much. Evidence suggests other counties were off as well.

@CannConActual - CannCon

12/ @TalkMullins was in Floyd County covering this discrepancy. It was reported by the GA SOS Office that this was because a USB wasn't properly uploaded. Officials in Floyd, in the presence of a Dominion rep, disagreed: https://x.com/TalkMullins/status/1328857648276574210?s=20

@TalkMullins - Heather Mullins

Floyd County, GA: After a FULL day of rescanning, counting, & software techs troubleshooting, election officials (while VERY transparent), still had NO answer as to what caused 2700 votes to go uncounted. Dominion techs said they could not comment. Listen to this! @RealAmVoice https://t.co/v6j9lMatXH

Video Transcript AI Summary
Speaker 0 mentions the possibility of printing out something. Speaker 1 asks if there is an explanation for why certain votes were not counted. Speaker 2 clarifies that there is no concrete explanation for why those votes were not counted by the machine. Speaker 1 confirms that they do not know why the votes were not scanned. Speaker 2 asks if the Dominion Tech guys have figured out the reason, but Speaker 0 says they are not allowed to comment. Speaker 2 asks if it could be a memory card issue, but Speaker 1 and Speaker 0 both say they don't think so. Speaker 0 suggests it could be human error, but they don't have evidence to confirm it. Speaker 2 questions if it could be a software issue, but Speaker 0 avoids speculation. They admit they don't have a definite answer yet. Speaker 2 acknowledges this and thanks them.
Full Transcript
Speaker 0: We could print it out. Speaker 1: Do we have a reason explanation why those votes Speaker 2: So there's no, like, concrete just to get on the record, There's no concrete explanation as to how those 26, 27 100 votes were not counted by the machine in the 1st place? Speaker 1: We don't know. I mean, we can't they're not in there anywhere. So we don't know why that It gets scanned in there. Speaker 2: So have the Dominion Tech guys that have been troubleshooting here all day been able to figure out why they weren't in there? Speaker 0: They're not allowed to comment. Speaker 2: They're not allowed to comment. And you're Speaker 0: not allowed to tell me you're out there. Rec Speaker 1: sorry. It just Speaker 2: But as of right now, you can also not confirmed that it was a memory card or anything of that nature as well. Right? Because that hasn't been confirmed to my knowledge by anyone here. Speaker 1: I don't think it was a memory card. I I can almost do you? Speaker 0: I don't think it was a memory card. Speaker 2: So it wasn't we we can rule out with Speaker 1: memory cards. Memory card that wasn't scanned. Speaker 0: Yeah. Okay. It seems like it's human error. Speaker 2: It seems like it, but what what's the evidence that would indicate it would be a human error issue? Speaker 0: The the the ballots didn't transfer over like they should have, and that could have been dealing with how whatever program or program them. But at this point, we rack. Don't know, so that's why you're Speaker 2: Could also potentially be a software issue. Speaker 0: We're not going to speculate at this point. Speaker 2: But you just said it could potentially be a human error. That was speculation. Incorrect. Speaker 0: So that's why rack? Speaker 2: So then I Speaker 0: could these types of different questions. Speaker 2: I'm really trying to Speaker 0: give you any I know what you're trying to do. We really don't have a pinpointed right now. Like side? We want to be able to give you the exact answer on on what happened. Absolutely. I'm not able to do that right now. Speaker 2: Okay. Alright. Fair enough. Thank you Speaker 0: for that.

@CannConActual - CannCon

13/ This issue persisted in 2022 as well. Nothing suggests that this anomaly has even been considered in Georgia despite this evidence. In fact, the @GaSecofState has declined to "patch" their system with a security upgrade recommended after the Halderman report.

@CannConActual - CannCon

14/ In '20, GA was able to update machines with a "de minimis" patch in just a few days, but the vulnerabilities pointed out by @jhalderm apparently can't be applied with over 16 months (since report was released) until the '24 election. "Most secure election American history"

@CannConActual - CannCon

End/ Oh and, for another thread, the ACLU had unfettered access to Georgia's E-net, some on their PERSONAL computers, during the 2020 Election. Here's a veteran poll manager on what that could access could be used for: https://t.co/rtD68FKcM1

Video Transcript AI Summary
A person with unauthorized access to the Fulton County Department of Elections could potentially misuse it. They could find out who has an absentee ballot but hasn't returned it, and submit one on their behalf using blank absentee ballots. This raises concerns about potential malicious activities.
Full Transcript
Speaker 0: So let's let's let's put on tinfoil hats just for a second here. And I'm not you're not making any allegations or anything, but this is just, potentially, what could a malicious person do with that type of access that's not affiliated with the, you know, Fulton County, Department of Elections? Speaker 1: Then they could look and see who has an absentee ballot out and hasn't turned it in, and they could turn 1 in for them. If they had access to a bunch of blank, no stub absentee ballots somewhere.
Saved - December 22, 2023 at 11:17 AM

@Real_RobN - 🇺🇸RealRobert🇺🇸

And here is how the incompetent, unequipped criminal Georgia Secretary of State Rat Raffensperger re-elected himself on Nov 8, 2022, Dominion Voting Services, https://t.co/JLKhBYs5ik

Video Transcript AI Summary
According to various polls, Secretary Raffensperger's approval ratings varied leading up to the election. Landmark Communications had him at 18% on April 15, while his opponent Jody Hice was at 36%. Other polls showed different numbers, with the University of Georgia at 28% on April 26 and WXI 11 live TV at 31% on April 28. On May 3rd, early voting and mail-in started. Capital Strategies had him at 26% on May 13th, and Landmark Communications had his best number at 39% the day before the election. However, on Election Day, the Dominion system gave him 52% of the vote, which cannot be explained. Mark Rountree of Landmark Communications confirmed that there was no explanation for the difference.
Full Transcript
Speaker 0: So let me start with the poll numbers. I want to start with Landmark Communications. And April 15, Secretary Ransperger was running at 18%, but yet his opponent Jody Hice was running at 36% according to Landmark, which is one of the most accurate polling companies in Georgia. The University of Georgia had, Secretary Raffensperger at 28% on April 26, WXI 11 live TV had him at 31% on April 28 and the Gwinnett Daily Post also had him at the same number on April 29. Then on May 3rd, early voting and mail in started. Capital Strategies had a poll showing him at 26% on May 13th. And then finally Landmark Communications, the day before the election, had his best, his best number, at 39% showing him in a dead heat with as Jody Hith, one of his opponents. But on Election day, the dominion system gave him 52% of the vote. That's at least 13% that cannot be explained. And that's if you're using the highest, number that Landmark Communications gave him. I asked Mark Rountree of Landmark Communications. And I said, can you explain the difference in the 13% difference that Brad Raffensperger got on by the next day? And he said, no, I have no explanation for that. I said, can I quote you on that? He said, yes, you can. So I'm quoting Mark on that. There's no explanation for what the Dominion Voting System is saying.
Saved - December 27, 2023 at 6:39 PM
reSee.it AI Summary
University of Michigan Professor and Auburn University Assistant Professor found vulnerabilities in Dominion Voting Systems. Georgia Judge Totenberg sealed the investigation results for two years. The report confirms vote alteration and hacking potential in Dominion software. Georgia Secretary of State Raffensperger concealed this information until June 2023.

@Rasmussen_Poll - Rasmussen Reports

"University of Michigan Professor of Computer Science and Engineering J. Halderman and Security Researcher and Assistant Professor at Auburn University Drew Sringall collaborated on the report where they discovered many exploitable vulnerabilities in the Dominion ... 1/3

@Rasmussen_Poll - Rasmussen Reports

... Voting Systems’ ImageCast X system. Far-left Georgia Judge Amy Totenberg sealed and covered up the results of the investigation on Dominion voting machines in Georgia and sat on the report for two years until its release last summer. The report confirms that votes ... 2/3

@Rasmussen_Poll - Rasmussen Reports

... can be altered in the Dominion voting machines. In fact, the report reveals that the Dominion software is vulnerable and can be hacked. Trump-hating Georgia Secretary of State Brad Raffensperger hid this information from the public until June 2023." https://www.thegatewaypundit.com/2023/12/this-is-big-georgia-secretary-state-brad-raffensperger/

THIS IS BIG: Georgia Secretary of State Brad Raffensperger Refuses to Testify Under Oath About Secretary of State's Dominion Voting Machines | The Gateway Pundit | by Jim Hoft As The Gateway Pundit reported earlier this year – the Federal District Court for the Northern District of Georgia unsealed the 96-page Halderman Report in June 2023- the Security Analysis of Georgia’s ImageCast X Ballot Marking Devices. thegatewaypundit.com
Saved - January 3, 2024 at 10:42 PM
reSee.it AI Summary
In the 2020 Presidential Election, there are allegations of election fraud in the swing states of Georgia, Wisconsin, Pennsylvania, Arizona, and Michigan. These allegations include altered and unlawfully cast votes, broken chain of custody, electronic manipulation, and missing or corrupted election files. Investigations have uncovered irregularities, unlawful activity, and fraud. The number of votes exceeds the number of voters in some cases. There were also issues with signature verification and the handling of absentee ballots. The report suggests that these irregularities and fraud may have affected the outcome of the election. It is important to review the evidence and draw your own conclusions.

@KanekoaTheGreat - KanekoaTheGreat

🚨JUST IN - President Trump Releases Summary of Election Fraud in the 2020 Presidential Election in the Swing States Introduction: It has often been repeated there is “no evidence” of fraud in the 2020 Election. In actuality, there is no evidence Joe Biden won. Ongoing investigations in the Swing States reveal hundreds of thousands of votes were altered and/or not lawfully cast in the Presidential Election. Joe Biden needed them. On Election Night Nov. 3, 2020, President Donald J. Trump was sailing to reelection with landslide leads in numerous battlegrounds. In Georgia, President Trump was up by 12 points, and over 335,000 votes, with 56 percent of the vote in at 10:17 p.m. In Wisconsin, President Trump was leading by 121,380 votes and 5 points at 12:12 a.m., which Fox News anchor Bret Baier noted was “not a small margin.” In Pennsylvania, President Trump was leading by 659,145 votes at 12:38 a.m., a full 15 points. In Michigan, President Trump was leading by 293,052 votes and 10 points. The election was over. However, precincts in Atlanta, Detroit, Philadelphia, Phoenix, and Milwaukee kept counting until the results reached the desired outcome, which was the opposite of the will of the voters. Georgia went from having a total of 4.7 million votes, already a record for the state, according to Brad Raffensperger’s count on Nov. 4, to certifying almost 5 million. This was 300,000 more votes than what the top elections official claimed were cast in the Election. Getting to this result in Georgia, and other states, created an irredeemably compromised Election, filled with violations of the Constitution, unlawful ballots, widespread broken chain of custody, electronic manipulation, and missing and corrupted election files that made it uncertifiable — and impossible to recreate the results. President Trump was right to voice his objections to what had unfolded before the country’s eyes. Republican poll watchers were denied access to the counting in multiple jurisdictions and ballots were counted in secret in the middle of the night without media or observers present. Countless irregularities emerged, including reports of ineligible voters, voting machine anomalies, “water main breaks,” improbable percentages of ballots for Biden, and more. Since, investigations across the country have uncovered an avalanche of irregularities, unlawful activity, manipulation of election records, destruction of evidence, and fraud. The findings, which are outcome determinative, are detailed in the summaries of the Swing States. GEORGIA🚨 • Georgia was called by 11,779 votes. • Fulton County, Georgia, the most populous county in the state, has no digital record of all in person votes cast in its original results. • Not a single ballot purportedly cast during early in-person voting was witnessed to and signed off by poll managers, as required by Georgia election rules. Seals were broken and memory cards removed from tabulators for the results of these 315,000 votes, which were printed out on different machines than the ones that tabulated them. This prevented the reconciliation of how many votes were cast on each machine. • The ballot images of these votes, along with the rest of in-person ballots cast on Election Day, were destroyed. • The vote in Georgia was counted three times: the original machine count, a statewide hand recount, and a second machine count. Each time the state, and Fulton County, reported three different results. • Fulton County did not count the same ballots during the original count and the machine recount. There are 19,541 distinct ballots that appear in one machine count but not the other. • Thousands of fraudulent “presidential only” ballots were injected into the second machine count, with huge margins favoring Joe Biden. Ballots that are blank except for the presidential contest were counted in batches together, with the pattern appearing in at least eight counties, including Fulton. This means Georgia did not have the votes to justify its original Election “results.” • The second machine count was over 17,000 votes “short.” Fulton County was instructed to “reconcile” the results by the Secretary of State, and recertified its results without divulging the extent of the vote deficiency to members of the Fulton County Board of Registrations and Elections. • “Thousands of bogus votes” were ultimately added into the Election results via the second machine count. This includes 20,977 unsubstantiated votes of unknown origin. The results were missing 17,852 ballot images, and included 3,125 duplicate ballot images that were counted twice. • At least 2,871 ballots were counted two or three times in the second machine count, totaling 6,118 questionable votes. • Eighty-eight percent of Fulton County’s precincts reported a different total number of votes between the first and second machine count. • The only electronic votes that survived from the first count were the mail-in ballots, since they were tabulated on the high speed scanner their ballot images were automatically uploaded to the election server. • Ninety percent of these approximately 148,000 absentee ballots cast in Fulton County cannot be authenticated. Ballot images for 132,284 mail-in votes have no .SHA file, which is created automatically when a ballot is scanned and used to authenticate the digital image of the vote, lacking evidence they were scanned and tabulated properly, or even cast by a real voter. • 104,994 ballot image files of these mail-in ballots from the original count contained identical modified time stamps, suggesting electronic manipulation. • Fulton County does not know “how many voters cast votes” and its “lack of basic accounting controls make it impossible to determine who really won” in 2020, according to Philip Stark, a University of California, Berkeley professor who invented risk-limiting audits. Stark noted, “The electronic records of the election are not intact.” • 376,863 ballot images are missing from the first machine count, which includes all in-person votes in Fulton County. • None of the 315,000 votes cast during early voting in Fulton County were witnessed to and signed by the poll manager and two poll workers, as required by state election rules. The closing tapes for these votes are all unsigned, showed more tabulated votes than the tabulators had recorded as scanning in their protective counters, and recorded improbably low percentages for President Trump. For example, President Trump received only 0.9 percent, 2.4 percent, 3.7 percent from some of the tabulators, as if he was a third party candidate, or in a third world country. The anomalies indicate ballots were not scanned on the tabulators that printed the closing tapes, making the closing tapes fraudulent. • Tabulators used in Fulton County during early voting had their seals broken, and memory cards were reprogrammed and inserted into different scanners to count absentee ballots, in violation of election rules. This made it impossible to reconcile the true number of votes tabulated on the machines from the start of the Election to the end of counting. • 235,000 absentee ballots were requested and accepted too early, prior to the lawful date 180 days before the 2020 Election, which was May 6, 2020. These votes should have never been counted in the 2020 Election. • 4,081 false votes for Joe Biden were included in the hand count audit results for Fulton County. The false votes were the result of 36 accounting errors, which were confirmed by Governor Brian Kemp’s office and investigators working for Secretary Brad Raffensperger, yet they have never been removed from the official hand count results. These errors alone would reduce the margin to 7,698 votes. • The hand count audit included 3,935 unaccounted for votes due to 11 missing batch sheets in Fulton County. Differences from the original count to the hand audit total at least 15,690 votes, which is more than the entire election margin alone. This includes the 4,081 false Biden votes, plus “missing” votes discovered in Gwinett (1,642), Fayette (2,755), Floyd (2,700), Douglas (293), and Walton (284) counties that were likely due to machine counting errors. • Thousands of “pristine,” unfolded absentee ballots were counted during the hand count audit in Fulton County, according to at least six witnesses, which is the subject of ongoing litigation. These absentee ballots had no folds, and went 98 percent to Joe Biden, had “been added in a fraudulent manner,” witnesses said. • Fulton County certified 59,143 in-person votes on Election Day, despite the fact that only 14,152 people had voted as of 5 p.m. on Nov. 3, 2020. Evidence suggests the in-person vote total on Election Day was inflated by approximately 37,000 votes, as records show no rush to the polls during the final two hours of voting, and a screenshot of the in-person Election Day results shared by a government contractor showed only 21,843 people voted at the polls in Fulton County on Nov. 3. • Fulton County ordered over 1 million absentee ballots days before the 2020 Election, without any envelopes and the time necessary to mail. There were only 808,680 active voters in Fulton County as of Nov. 1, 2020, meaning the county had more blank mail-in ballots than the number of registered voters, and ordered them after the vast majority of mail-in ballot requests had already been sent to voters by Runbeck Election Services. • An estimated 30,000 to 92,670 illicit votes were trafficked in Georgia, as part of a massive ballot trafficking operation discovered by True the Vote. The group identified 242 traffickers in Georgia who engaged in 5,662 ballot drops into drop boxes, making an average of runs per trafficker. Over 40 percent of the illicit drops that were captured on camera were recorded between the non-voting hours of midnight and 5 a.m. • There were over 364,000 ineligible voter registrations on the rolls during the 2020 Election and likely 67,284 votes were cast from voters with invalid residency. • Massive manipulation of the Georgia voter rolls surrounding the 2020 Election has been uncovered. This includes 1,500 Voter IDs that received credit for voting in 2020, but were not on any voter rolls from 2020, some appearing for the first time on the voter rolls on Nov. 4, 2021, a year after the Election. Other findings include manipulation of inactive voters to cast ballots, “gifting” Nov. 3 votes up to 2 years after the Election, and casting votes on ballots previously rejected, cancelled, or not even turned in. • In 2020, there were absentee ballots issued to “Bangkok Thailand, Ga.,” “Denver, Ga.,” “Detroit, Ga.,” “Los Angeles, Ga.,” and other fraudulent addresses that do not exist. Ballots were fraudulently cast in 2020 from addresses listed as “Bronx, Ga.,” “Hilton Head, Ga.,” “Louisville, Ga.,” “San Diego, Ga.,” “New Orleans, Ga.,” “French Creek, Ga.,” “Virginia Beach, Ga.,” “Vicksburg, Ga.,” “Baltimore, Ga.,” “New York, Ga.,” and “Sarasota, Ga.,” all with zip codes out of state. • 43,907 drop box ballots violated chain of custody requirements in DeKalb County. • 59,000 of the 79,460 drop box ballots in Fulton County were not immediately transported to the election registrar, in violation of State Election Board rules. • An estimated 355,000 ballot transfer forms for drop box ballots are missing statewide. • Over 100,000 tally sheets for Fulton County were missing from the hand count audit, and remained missing for months after the Election. • In early January 2021, Ruby Freeman asked for an attorney because she wanted to “go live on every platform” to divulge information about how “the USB ports” were used in the 2020 Election. The expert cyber report by Professor J. Alex Halderman explained how external USB ports with election-changing malware can be inserted into Dominion machines by anyone with access, including election workers. • The presence of a “QR code mismatch” error within the Dominion tabulators that systematically undercounts votes was found in 65 out of 67 Georgia counties where records were available. The error was present in system log files for tabulators used in elections in 2020, 2021, and 2022. • The election results in Georgia in 2020 are not only unreliable, but were electronically altered, and are unsupported by the state’s own election records. The appearance of tens of thousands of unconfirmed ballots in subsequent hand and machine counts suggest reconciliation happened after the Election, meaning after it was clear what margins were needed to win. • Fulton County election officials admitted in early 2021 they do not engage in any reconciliation until weeks after Election Day. This means the number of voters showing up at the polls during each day of voting is not checked with the number of ballots tabulated each day, a basic process to ensure the number of ballots and voters match, and cannot be manipulated later. • “We can’t start reconciling that until usually a couple days before certification,” said then-Fulton County Elections Director Richard Barron, during a January 2021 Board meeting. “Because we have to get that report from KnowInk. I think KnowInk sends those to the state or KnowInk sends those directly to us. But those aren’t compiled then, on Election night. So we don’t have any way to balance those then. That’s like the post-election process that we do.”

@KanekoaTheGreat - KanekoaTheGreat

JUST IN - President Trump Releases Summary of Election Fraud in the 2020 Presidential Election in the Swing States WISCONSIN🚨 • Wisconsin was called by 20,682 votes. • The Wisconsin Supreme Court ruled drop boxes are illegal under Wisconsin law, in a 4-3 decision issued in July 2022. • Wisconsin Election Commissioner Meagan Wolfe unilaterally declared ballot drop boxes could be used to vote in 2020 elections, even though “WEC’s commissioners never voted to adopt this memo.” • Ahead of the November 2020 Election, Wolfe encouraged clerks to use “creative solutions” to deploy drop boxes, that she said could be “unstaffed.” There were 528 drop boxes used in the General Election, and a total of 1,969,274 absentee votes cast, including 1,346,731 votes cast by mail, and 653,236 in-person. • In a concurring opinion to the ruling finding drop boxes to be unlawful, Justice Rebecca Bradley writes, “If the right to vote is to have any meaning at all, elections must be conducted according to law. Throughout history, tyrants have claimed electoral victory via elections conducted in violation of governing law… in Wisconsin elected officials “deriv[e] their just powers from the consent of the governed.” • “The right to vote presupposes the rule of law governs elections. If elections are conducted outside of the law, the people have not conferred their consent on the government. Such elections are unlawful and their results are illegitimate.” • Justice Bradley concluded “thousands of votes have been cast via this unlawful method,” using drop boxes, “thereby directly harming the Wisconsin voters.” • “The illegality of these drop boxes weakens the people’s faith that the election produced an outcome reflective of their will,” Justice Bradley writes. “The Wisconsin voters, and all lawful voters, are injured when the institution charged with administering Wisconsin elections does not follow the law, leaving the results in question…Electoral outcomes obtained by unlawful procedures corrupt the institution of voting, degrading the very foundation of free government. Unlawful votes do not dilute lawful votes so much as they pollute them, which in turn pollutes the integrity of the results.” • In the city of Milwaukee, nearly half of all its votes were cast by mail, totaling 217,424 ballots. The city deployed 15 drop boxes, with election officials claiming the drop boxes would be “under 24-hour surveillance.” However, after the election, not a single municipality in the county produced video surveillance of drop boxes in response to open records requests. Various responses included, “No records exist for your request,” “No video from requested time frame,” “No such records exist,” and “No security camera.” • The election integrity group True the Vote identified 107 ballot traffickers in Milwaukee County between Oct. 20 and Nov. 3, 2020, who each made 20 or more visits to drop boxes. Each trafficker made an average 26 visits, and as many as 15 in one day, and made multiple visits to non-governmental organizations. • The 107 traffickers made a total of 2,824 trips to drop boxes during the 2020 Election, with a majority of visits occurring after 8:00 p.m. • In 2020 there was a surge of “indefinitely confined” votes in Wisconsin, resulting in 220,404 votes cast from individuals who were exempted from showing voter ID. This surge of suspect votes was due to Democrat election clerks giving advice that was deemed illegal after the election, instructing voters to identify themselves as disabled during the COVID pandemic to avoid voter ID laws. • Indefinitely confined voters, who are supposed to be physically unable to go to the polls due to age, disability, or illness, increased by an astounding 393 percent in Dane County from 2016 to 2020; 492 percent in Racine County; 281 percent in Milwaukee County; and 287 percent in the state overall. • There were just 56,978 indefinitely confined votes in 2016, and roughly 70,000 43 in 2019. In 2020, however, there were 220,404 votes cast using indefinite confinement status. Over 77 percent of these individuals had never been listed as indefinitely confined before. The Wisconsin Legislative Audit Bureau identified 48,554 people who voted as indefinitely confined in November 2020 who had never provided photo identification or did not have photo identifications on file with clerks, which is more than twice the vote margin of 20,682. • Scott McDonell, the Democrat clerk of Dane County, which encompasses the area of Madison, told all residents they could identify themselves as indefinitely confined because of COVID, specifically citing it as a way to get around the Voter ID law. • McDonell previously blamed Wisconsin’s voter ID law for President Trump’s victory in 2016, claiming in a 2018 Twitter post that “thousands of voters [were] deterred from voting due to [the] ID law.” • In 2020, McDonell urged all voters to declare themselves indefinitely confined in order to obtain an absentee ballot and “skip the step of uploading an ID” in the April 2020 primary election. Once a voter is identified as indefinitely confined, they continue to receive absentee ballots automatically for subsequent elections. “I urge all voters who request a ballot and have trouble presenting a valid ID to indicate that they are indefinitely confined,” McDonell said in a Facebook post. • The Wisconsin Supreme Court ruled in December 2020 that the pandemic “did not render all Wisconsin electors ‘indefinitely confined,’ thereby obviating the requirement of a valid photo identification to obtain an absentee ballot,” and the clerks’ “interpretation of Wisconsin election laws was erroneous.” • The Wisconsin Election Commission ordered nursing homes to violate the law by not allowing Special Voting Deputies (SVDs) inside their facilities, which led to election fraud where incapacitated elderly residents had votes cast in their name with the assistance of nursing home staff. • An investigation by the Racine County Sheriff found the Wisconsin Elections Commission “shattered” state election laws. Nursing homes saw an “unusual surge in voting activity,” and at least 8 cases of felony voter fraud were found in one nursing home, accounting for nearly 1 in 5 families of residents. • The Wisconsin Election Commission admitted it was “essentially telling the clerks to break the law” by ordering the sending of absentee ballots to nursing homes and barring Special Voting Deputies inside the facilities. • An interim report released by Special Counsel Michael J. Gableman raised “serious and legitimate questions that the certification of Wisconsin’s election results may have been undertaken in an unlawful and unconstitutional manner.” • Gableman claimed “Democracy in the Park” events in Madison involved numerous possible violations of the law, “calling into question the validity of over 17,000 absentee ballots.” • These outdoor events to collect mail-in ballots were the subject of numerous complaints, and it is “not clear that all of the workers at those events were properly deputized and trained, swore and filed the mandatory oath of office, or documents related to absentee ballots were properly handled.” • The Office of the Special Counsel also claimed evidence of “undue influence by well-funded private groups, who leveraged large grants to certain Wisconsin cities in order to co-opt our election apparatus to their benefit.” • The report confirms at least 17.5 percent of election clerks “were not properly trained,” and that “exploitation of elders” occurred in nursing homes. • In one example, Maryl Barrett, who was 104 years old and did not recognize her own children, had a ballot cast in her name in the 2020 Presidential Election. • The Office of Special Counsel’s second interim report found nursing homes in Milwaukee, Dane, and Racine counties with 100 percent turnout due to the Wisconsin Election Commission’s order. • The special counsel said it possessed evidence of nursing home facility staff and directors who “assisted residents in completing ballots; assisted residents in obtaining absentee ballots; pressured residents to vote; collected completed ballots from residents; forged signatures of residents; illegally returned residents’ ballots to the municipal clerks by mail, by placing the ballots in drop boxes, and/ or delivering them directly to the clerks; pressured and/or assisted incompetent persons to complete and cast ballots in the November 2020 election, up to and including persons who have had their right to vote take away by court order due to mental incompetence.” • The second interim report also detailed an $8.8 million “election bribery scheme” involving Mark Zuckerberg’s Center for Tech and Civic Life and the cities of Milwaukee, Madison, Racine, Kenosha, and Green Bay. “In the agreement, the Cities took CTCL’s money to facilitate in-person and absentee voting within their respective city.” • The “Wisconsin Safe Voting Plan” developed for CTCL facilitated grants to major Wisconsin cities to deploy drop boxes for mail-in ballots, including $50,000 to Green Bay, $40,000 to Kenosha, $50,000 to Madison, $58,500 to Milwaukee, and $18,000 to Racine. • Whitney May, the director of government services for CTCL, posted numerous anti-Trump posts on social media, including telling people “don’t vote for Trump” in 2016. • Internal emails from election officials in Green Bay revealed Michael SpitzerRubenstein, a former Democratic Party operative, served as a “de facto elections administrator and had access to Green Bay’s absentee ballots days before the election.” • The Office of the Special Counsel referenced this case, and has evidence that this grantee, which was funded by CTCL, was “directly involved in all aspects of management of election officials, was entrusted with the only sets of physical keys to the city’s central count location, managed the transportation of ballots, and instructed the counting of unlawful ballots that had arrived at the central count location beyond the lawful time window.”

@KanekoaTheGreat - KanekoaTheGreat

JUST IN - President Trump Releases Summary of Election Fraud in the 2020 Presidential Election in the Swing States PENNSYLVANIA🚨 • Pennsylvania was called by 80,555 votes. • Months after the election, there were 121,240 more votes than voters, according to the Pennsylvania Department of State. By law, Pennsylvania cannot certify an election with this type of discrepancy. • Republican lawmakers, led by State Representative Frank Ryan, were tracking the vote discrepancy in real time in the Statewide Uniform Registry of Electors (SURE) system. Ryan, a certified public accountant, initially reported that there were 170,830 more votes than voters in the Presidential race, more than twice the margin in Pennsylvania. “These numbers just don’t add up, and the alleged certification of Pennsylvania’s presidential election results was absolutely premature, unconfirmed, and in error,” the lawmakers said. • The Pennsylvania Department of State’s office called this “obvious misinformation,” while admitting the “only way to determine the number of voters who voted in November from the SURE system is through the vote histories,” which they said Philadelphia, Allegheny, and other counties had still not completed — an admission the election was certified without ensuring the number of voters and votes matched in the SURE system. The election was certified on Nov. 24, 2020, and the Department of State’s statement came on Dec. 29, 2020. • The SURE system was checked and downloaded weekly with updated voter histories from the general Election until all the counties uploaded their vote histories, which was not completed until February 2021. At this time there were still over 121,000 votes that did not have a corresponding voter in the SURE system. • The statement by the Department of State “that the voting would reconcile, once the counties completed their SURE uploads, was incorrect,” according to Verity Vote. “When the final county finished uploading their voter histories and closed the election in SURE, it was February 1, 2021, which was the same day that [Secretary of State Kathy] Boockvar announced her resignation. At the time that Philadelphia closed the election in SURE, the voter histories showed that the county accepted at least 7,944 ballots that could not be associated with a registered voter.” • Pennsylvania credited 71,893 people for voting who returned mail-in ballots after Election Day, and these individuals were included in the voter history files. This includes 50,285 received between Nov. 4 and Nov. 6; 11,570 received between Nov. 7 and Nov. 11; and 10,038 that were received on or after Nov. 12. Boockvar claimed only 10,000 ballots were received between the close of the polls on Election Day and Nov. 6. • While 71,893 people received credit for voting by mail, these votes purportedly did not count. Even while including these voters in the total number of who participated in the Election, Pennsylvania still came up 121,240 voters short. • According to the Department of State data, there were 7,035,746 ballots cast in the 2020 Presidential Election, including all write-in votes, over-votes, and under-votes. “After all counties closed the election in SURE, only 6,914,556 voters were credited with participation in the 2020 General Election. This reveals a voter deficit of 121,240.” • In Philadelphia, hundreds of thousands of mail-in ballots were unlawfully counted in secret, in defiance of a court order, while Republican poll watchers were thrown out of buildings where voting took place. • U.S. Attorney Bill McSwain was told to stand down and not investigate election irregularities by Attorney General Bill Barr. McSwain said he was instructed to not discuss the allegations of voter fraud he received, and to pass any “serious” investigations along to then-State Attorney General Josh Shapiro, a Democrat who promised days before the election that President Trump “is going to lose.” • Mark Zuckerberg of Facebook poured over $25 million into the administration of the election in Pennsylvania in 2020. Over $10 million went to the Democrat-controlled jurisdiction of Philadelphia, which included $5.5 million on “ballot processing equipment” and $552,000 for drop boxes. • A lawsuit filed in Delaware County revealed video evidence of election officials discussing destroying election evidence from the November 2020 Election. “It’s a felony,” one official says after talking about the need to “get rid” of voting “pads and second scanners.” Sources involved in the litigation alleged the Delaware County officials violated numerous election laws and that the destruction of records was “done to ensure records eventually provided actually matched the election results that were reported in Nov. 2020.” • Delaware County received $2.2 million from Zuckerberg’s Center for Tech and Civic Life (CTCL), which it spent on “recruiting and training a sufficient number of poll workers; setting up drop box locations for voters to return ballots,” and other Get Out the Vote efforts. • The election integrity group True the Vote said Philadelphia was the worst offender it witnessed when investigating the widespread ballot trafficking scheme operating across multiple Swing States in 2020. They identified 1,155 ballot traffickers who each visited at least 10 drop boxes and five non-governmental organizations. Some ballot traffickers made hundreds of trips to drop boxes.

@KanekoaTheGreat - KanekoaTheGreat

JUST IN - President Trump Releases Summary of Election Fraud in the 2020 Presidential Election in the Swing States ARIZONA🚨 • Arizona was called by a margin of 10,457 votes. • Maricopa County accepted 20,500 mail-in ballots after Election Day 2020, including 18,000 – more than the entire election margin – on Nov. 4 picked up from the U.S. Postal Service. By law, ballots must be received no later than 7 p.m. on Election Day, which was Nov. 3. • “The 20,000 ballots recorded as incoming from the USPS on and after November 4 were of sufficient quantity to change the result of the 2020 General Election in Arizona,” according to Verity Vote. • The findings were based on Maricopa County’s official Elections Department records, which were withheld from a public records request for nearly seven months. The records showed 18,000 mail-in ballots received on Nov. 4; 1,000 received on Nov. 5; and 1,500 received on Nov. 6. • The 18,000 mail-in ballots received on Nov. 4 and subsequently counted represented a significant spike in ballots received, higher than every single day total since Oct. 29, 2020. The receipt of mail-in ballots had steadily declined from 14,500 ballots on Oct. 29 to 10,500 on Oct. 30; 6,000 on Oct. 31; 1,500 on Nov. 1; 1,000 on Nov. 2; and 2,500 on Nov. 3. • In the 2020 General Election, 420,987 ballots failed signature verification standards, “thus the election was openly vulnerable to fraud,” according to an ongoing analysis conducted by We the People Arizona Alliance and presented to the state legislature. • The initial analysis of 380,976 ballots, using official state records and official signature verification training techniques, identified 181,378 ballots that should not have been counted, or nearly half of all reviewed. • This includes: 1,870 blank envelopes, some of which were approved on Nov. 5 and Nov. 8; 542 with a signature other than the voter; 2,104 scribbles; 128 duplicate voters processed; 48,117 unreasonably different control signatures; 1,875 where the signature did not match until after the election; 36,034 control signatures that do not match the voter; 4,433 unusable control signatures; 47,366 that failed Secretary of State standards; and 38,909 egregious signature mismatches, where not one point of a signature matched any on file. • In the case of the 1,875 votes, the ballot envelopes did not have a signature match on Election Day, but “matching” signatures were later put on file for the voter on either Jan. 28, 2021, Feb. 3, 2021, or Feb. 8, 2021. There were 783 signatures digitally inserted on Feb. 3, 2021 alone. • Since the findings were presented to the Arizona State Legislature, the number of egregious mismatches found has increased to 76,354, over seven times the election margin. This is an error rate of 9.30 percent of ballot envelopes reviewed. • Throughout the signature verification analysis, which remains ongoing, analysts have consistently found 20 percent do not meet the Secretary of State’s standards, and 9 percent are egregious violations. Extrapolated to all 1.9 million mail-in ballots in 2020, 176,700 ballots “should have been rejected for improper signature verification due to egregious signature mismatches.” • Maricopa County has no documented chain of custody for 740,000 ballots from the 2020 Election. • Out of the 923,000 early vote ballots accepted at vote centers or drop boxes, only 183,406 ballots are accounted for on ballot transport forms. More than 80 percent of the ballot transport forms have no ballot counts. • Without proper documentation of how many votes were cast at the time they were cast, it is impossible to verify the origin and true total of ballots in a given election. “Without this count, there is no way to determine if the transport staff retrieved one ballot or one thousand ballots,” according to Verity Vote. “Keeping a proper chain of custody is more than a best practice - it is essential to encouraging trust in our democracy,” according to the Election Assistance Commission. • Of the 1,895 early vote ballot transport forms, 48 did not have the required two witness signatures attesting to the ballot transfer, including some with no witness signatures at all. “As a result, the public is not assured that both parties witnessed the transfer of ballots,” as required. • Millions of files of 2020 General Election data and security logs were deleted from the Elections Management Server and purged on critical days, including the day before the Arizona audit of the 2020 Election began on Feb. 2, 2021. • The Maricopa County Board of Supervisors admitted they purged the system and moved election data after they received a subpoena, in testimony before the U.S. House of Representatives. • Two precincts in Pima County had over 100 percent turnout for mail-in ballots, and 40 precincts had over 97 percent returned. • The national mail-in ballot return rate was 71 percent, but in Pima County the mail-in ballot return rate was 15 percent higher, and 19 percent higher than all the counties combined in the entire state of Arizona. One precinct with 99.5 percent mail-in turnout had 9,812 ballots counted. Another precinct with 100.6 percent turnout had 2,182 ballots returned, but only 2,170 mail-ins were ever sent. These two precincts total 11,994 ballots, which alone is more than the margin needed to alter the outcome of the Presidential Election. • In all, there were 264,000 votes from precincts in Pima County with over 92 percent turnout for mail-in ballots. • Significant anomalies were discovered for mail-in ballot returns in Pima County. In precincts with anomalous high turnout of over 92 percent in Pima County, mail-in ballots started flipping from 6 percent Republican for Biden to 40 percent of Republicans voting for Biden. • The election integrity group True the Vote identified more than 202 ballot traffickers in Maricopa County who made 4,282 individual drop box visits during the 2020 General Election. • Two individuals were charged and plead guilty for ballot harvesting in Yuma County, Arizona during the 2020 primary election. • A computer scientist testified that an algorithm similar to what is used in cruise control or self-driving cars was present affecting the early votes in Pima and Maricopa counties in the 2020 General Election, with the ability to “reach and maintain a predetermined setpoint (outcome) despite unplanned disturbances.” • Walter C. Daugherity, a senior lecturer emeritus in the Department of Computer Science and Engineering at Texas A&M University who developed courses in artificial intelligence, expert systems, programming and software design, analyzed the Cast Vote Records, finding, “ballots in Maricopa County and Pima County were artificially processed through the tabulators tracking a ProportionalIntegral-Derivative (PID) type control function in a closed-loop feedback system.” • Daugherity, who has received over $2.8 million in grant funding and was previously consulted as a computer expert by the New York Times, Washington Post, IBM Federal Systems Division, the Texas Department of Agriculture, U.S. Customs Service, as well as classified work, discovered “significant and systematic decline in the cumulative ratio as counting progresses,” in the early mail-in and in-person votes for the Presidential Election results in Maricopa County and Pima County. • For example, the “first block of ballots being 75 [percent] for a candidate, the next block of ballots being 74 [percent] for a candidate, the next block of ballots being 73 [percent] for a candidate, and so on, systematically declining all the way to Election Day.” • Daugherity’s expert opinion is that the downward sloping line in the sequence that votes were recorded indicated a strong control. The cumulative ratio of Biden to Trump votes for all cast vote records before Election Day in recorded order for Pima County declines from over 300 percent to 157 percent by Election Day. • “Such a uniform and predictable pattern is so statistically implausible that it would not occur without artificial manipulation,” according to Daugherity. The data’s lack of independence cannot be explained by the preference of Democrats voting earlier than Republicans.

@KanekoaTheGreat - KanekoaTheGreat

JUST IN - President Trump Releases Summary of Election Fraud in the 2020 Presidential Election in the Swing States MICHIGAN🚨 • Michigan was called by 154,188 votes. • A record 5,579,317 votes were cast and certified in Michigan in the 2020 General Election, the highest turnout in 60 years. To date, Michigan has never shown 5,579,317 voters listed for the 2020 Election in its Qualified Voter File, the state’s database for all voter registration records. • As of December 2023, Michigan has 271,566 more votes than the number of voters listed in its Qualified Voter File for Nov. 3, 2020, more than one and a half times the Election margin. • In data obtained from the Secretary of State’s office on nearly a monthly basis since the Election, the most voters ever recorded in the Qualified Voter File was 5,511,303 voters in April 2021. This means Michigan’s own election records showed 68,014 more votes than voters. However, the number of voters listed in the Qualified Voter File has been in flux ever since December 2020, and always short of the voters needed to reconcile the total votes cast. A complete list of voters from 2020 has never been provided. • The number of voter IDs listed as voting in 2020 has steadily declined since February 2022. As of December 2023, there was a total of 5,307,751 voters listed as voting on Nov. 3, 2020 in the Qualified Voter File. Voter history files continue to be removed from the record, resulting in 271,566 less vote history records than necessary to reconcile the results. • Each month voter histories from the 2020 Election are being manipulated. Thousands of unique votes are removed from the voter history files, and other unique votes added. Since December 2020, 270,559 voter histories for 2020 have been removed, while 103,128 have been added. • Individual voter histories are constantly changing, including the history of the state’s Democrat Governor Gretchen Whitmer, whose voting history is missing votes throughout 2020. • A complete list of voters was requested via a Freedom of Information Act request in December 2021 and took nine months for the state to fulfill. Two datasets were provided, and neither matched. The first dataset fell 22,146 voters short, while the second dataset was 120,883 absentee ballots short. • Democrats threatened Republicans on the Wayne County Board of Canvassers and doxxed children in order to certify the 2020 results. Monica Palmer, then the chair of the Wayne County Board of Supervisors, cited the fact that 70 percent of Detroit’s mail-in ballot counts were still “out of balance and unexplained” from the August primary as a reason why she initially voted against certifying the 2020 Election results. Palmer was “bullied and threatened” and “feared for her safety” due to threats she received for voting no. A Democrat Michigan State representative-elect attacked Palmer over her certification vote, and revealed where her children went to school, saying, “I want you to think about what that means for your kids.” • Officials in Detroit illegally blocked Republican poll challengers’ access, covered the windows, called the cops, and denied lawful challenges in order to count ballots in secret. • Affidavits and video evidence revealed thousands of ballots were delivered through a back door of the TCF center, the central counting facility in Detroit, at 3:30 a.m. on Election night. • A report seeking to “debunk” issues of fraud released by the Michigan State Senate Oversight Committee confirmed a “large volume” of ballots were delivered to the TCF center with no chain of custody in the middle of the night. • An estimated 289,866 absentee ballots were identified as sent to people who never requested them, “something that would be illegal,” according to the senate committee. • Mark Zuckerberg gave Michigan $16.8 million through his nonprofit Center for Tech and Civic Life. • Detroit received $7.4 million to “dramatically” expand the vote for Democrats. The grants financed drop boxes “to facilitate the return of absentee ballots,” like the ones that came in the TCF center after midnight. • The election integrity group True the Vote uncovered the same pattern of widespread ballot trafficking between NGOs and ballot drop boxes in Michigan. Numerous instances of ballot stuffing were caught on camera in Detroit, including video where a woman can be seen going to a drop box, and abruptly returning to her car after realizing the stack had no signatures. The woman then signs the ballots, and deposits the illicit ballots she had just signed into the drop box. • Secretary Jocelyn Benson made unlawful changes to signature verification rules for absentee ballots, ordering election workers to presume all were legitimate. A judge ruled Benson’s order was invalid, but not until months following the election, and just 0.1 percent of mail-in ballots were rejected in the November 2020 Election for all signature issues. The rejection rate for mismatching signatures was just 0.04 percent, as only 1,400 out of 3.4 million ballots were rejected. • Secretary Benson has lost in court six times for issues related to the 2020 Election. • A fraudulent voter registration scheme was discovered in October 2020 and documented in a police report in Muskegon County and hidden for nearly 3 years after the 2020 Election. • A city clerk in Muskegon witnessed a woman drop off between 8,000 and 10,000 voter registrations at the clerk office on Oct. 8, 2020, many appearing to be fraudulent. The incident was reported it to the Muskegon Police Department one week later. Eight thousand new voter registrations in Muskegon would amount to over 20 percent of the city’s population of only 38,000 residents. • An ensuing investigation confirmed thousands of voter registrations in the same handwriting and many invalid or non-existent addresses. The suspect told Michigan State Police that she was being paid $1,150 per week to “find unregistered voters and provide them with a form so they can get registered to vote or obtain their absentee ballot.” The police found “dozens of new phones” and “hundreds of pre-paid payment cards” during the investigation. • A Department of State analyst consulted in the investigation confirmed a quantity of voter applications were “clearly fraudulent” and others were “highly suspicious having either erroneous or are missing key pieces of information.” Others appeared to be legitimate. • The organization behind the scheme was GBI Strategies, a firm hired by numerous Democrat campaigns. GBI Strategies was funded by a super PAC called “Black PAC,” which paid the firm $11,254,919 to register voters for Joe Biden in 2020. Employees of GBI Strategies were paid $15 an hour or $120 a day, according to the police report. • GBI Strategies was believed to be operating not just in Muskegon, but throughout Michigan and in other Swing States. • Democrat Attorney General Dana Nessel’s office contacted the Muskegon Police Department and asked Michigan State Police to assist with a joint investigation. The Michigan police then turned their investigation over to the FBI. • Andrew Kloster, deputy general counsel at the United States Office of Personnel Management during the Trump Administration, said he was made aware of the investigation into GBI Strategies before the 2020 Election and attempted to raise the issue for further investigation. He was informed there were “standing orders not to deal with election matters” in the offices of the White House counsel office and Attorney General Bill Barr. • The investigation was not made public until 2023, after the police reports were obtained through a Michigan Freedom of Information Act request.

@KanekoaTheGreat - KanekoaTheGreat

President Trump Releases Summary of Election Fraud in the 2020 Presidential Election in the Swing States I look forward to fact-checkers debunking this, citing sources from the corporate media that spent four years claiming Donald Trump was a Russian agent and dismissing Hunter Biden's laptop as Russian disinformation. I encourage you to personally review the numerous citations in this report and reach your own conclusions. https://cdn.nucleusfiles.com/e0/e04e630c-63ff-4bdb-9652-e0be3598b5d4/summary20of20election20fraud20in20the20swing20states.pdf

Saved - January 6, 2024 at 2:08 PM
reSee.it AI Summary
An election cyber security firm alerted legislators and Raffensperger in 2019 that Dominion's paper ballot with a QR Code violated Georgia law. Despite this knowledge, they still purchased Dominion.

@Crimsontider - Debbie Dooley

🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨 An election cyber security firm in Palo Alto, CA warned both legislators and Raffensperger in 2019 that Dominion produces a paper ballot with a QR Code that violates GA law aka HB316 that requires voters be able to validate their ballot. They knew Dominion violated Georgia law, yet they purchased it anyway. 😡😡😡😡😡😡😡😡😡😡😡😡 https://drive.google.com/file/d/1gacOdB8BYdPGSwaRfXcUQVQCbNPq3KoV/view?usp=drivesdk

Saved - July 30, 2024 at 2:05 PM
reSee.it AI Summary
I recently watched an impactful 14-minute presentation by Garland Favorito, where he thoroughly examines the integrity issues surrounding electronic voting systems. He presents well-researched facts, highlighting how election officials often conceal negligence or wrongdoing due to the complexity of these systems. Favorito emphasizes the urgent need for transparency to restore trust in the lawfulness and accuracy of our elections.

@pjcolbeck - Patrick Colbeck✝️

IMPORTANT: In one exceptional 14 minute presentation, Garland Favorito of @VoterGa dissects the problems with the integrity of elections using electronic voting systems. No hyperbole. Just facts painstakingly assembled by himself and skilled patriots such as Clay Parikh, Kevin Moncla and Phil Davis. Election officials hide negligence and/or malfeasance behind the opaqueness and complexity of modern electronic voting systems. This needs to stop. Transparency is the key to convincing myself and others that our elections are lawful and accurate. https://rumble.com/v58l10r-garland-favorito-shreds-2020-fulton-election-lies.html

Garland Favorito shreds 3 years of Fulton Co. & GA SOS election lies in 15 minutes Fake news and lawfare demons want to expunge this presentation from the record by arguing the last State Election Board meeting was “illegal” Presented on July 9, 2024 rumble.com
Saved - August 13, 2024 at 12:29 PM
reSee.it AI Summary
I just read a Politico article revealing that hackers discovered serious vulnerabilities in voting machines and e-poll books, which is alarming, especially before an election. This seems to validate concerns raised by those who questioned the integrity of the 2020 election. Experts noted that fixing these issues is complicated and unlikely to happen in time for the 2024 election. I propose we abandon these machines altogether and return to hand-counting votes, as the UK does, to ensure quicker and more reliable results.

@BehizyTweets - George

BREAKING: Politico just unleashed an article titled "The nation’s best hackers found vulnerabilities in voting machines — but no time to fix them." Hackers said the vulnerabilities they found were "particularly troubling during an election year like this.” "They found vulnerabilities in EVERYTHING from voting machines to e-poll books" So, after years of gaslighting us, Democrats are now openly admitting what We The Conspiracy Theorists have been right about voting machines since we started raising the alarm after the stolen 2020 election “As far as time goes, it is hard to make any real, major, systemic changes, but especially 90 days out from the election,” said Catherine Terranova, one of the organizers of the DEF CON “Voting Village” hacking event “It’s not a 90-day fix, It’s not a Microsoft every Tuesday, issue your patch and everything works fine,” Scott Algeier said. “It’s a pretty complicated process.” The gist of this is that they found outrageous vulnerabilities (in my opinion, features) that allowed hackers to flip votes without detection, and say we can't fix it in time for the 2024 election How about this? We just STOP using the machines and go back to caveman voting. The UK gave us hand-counted results within hours. There's no reason states with smaller populations take days and even weeks to count a couple thousand votes

Saved - September 30, 2024 at 10:15 PM
reSee.it AI Summary
Today’s testimony confirmed that every Dominion system examined by qualified cyber experts across several states has 'open encryption keys.' This vulnerability enables individuals with basic skills to access and alter votes without detection, and some possess even more advanced capabilities.

@Rasmussen_Poll - Rasmussen Reports

Update: Testimony today affirmed that every Dominion system these government qualified cyber experts have examined in multiple states has these same 'open encryption keys.' This allows anyone with basic skills to gain access and change votes undetected. And some people ... have even higher skills ...

@Rasmussen_Poll - Rasmussen Reports

Hearing Update - "(Raffensperger) doesn't have the discretion to field a system that has open text encryption keys that any moderately sophisticated attacker could exploit to alter election results undetected. He doesn't have that discretion. Where's the statute that says that?"

Saved - October 2, 2024 at 1:12 PM

@realLizUSA - Liz Harrington

This is new??? Two experts testify in DeKalb GOP v Raffensperger that the election system in Gwinnett County, Georgia was remotely accessed from Belgrade, Serbia DURING the 2020 Election Similar activity also happened in Colorado, Michigan, and other states https://t.co/s00FxPLGsP

Video Transcript AI Summary
According to the testimony, Dominion equipment is generally not connected to the internet, but there is evidence of a connection in Gwinnett County, Georgia, during the 2020 election. Non-election personnel have remotely accessed a Dominion system. Dominion emails discuss remotely accessing Gwinnett County, Georgia. There is evidence of Dominion remotely accessing Georgia election equipment in one county, along with involvement in Colorado and Michigan. Dominion can remotely connect to election systems without detection, and this has occurred. The Denver, Colorado server granted access to Belgrade, with questions raised about why Belgrade, Montana, would need to connect to a Colorado file transfer server. Changes to the database server lack an engineering change order, which is important for change management and system integrity.
Full Transcript
Speaker 0: And it's your understanding the Georgia Dominion equipment is not connected to the Internet. Right? Speaker 1: That's it. Correct. Speaker 0: So you believe Dominion Voting System components in Georgia are connected? Speaker 1: Some unrelated Dominion documentation. I can specifically tell you that there was there is connection. Speaker 0: Which county in Georgia was there a connection for to the Internet of Dominion equipment? Speaker 1: It would be Gwinnet, if I'm remembering correctly. There were several states involved. Speaker 0: And which time period are you referring to? Speaker 1: This was 2020. Speaker 0: Before or after the election? Speaker 1: During the election. Speaker 2: In your examination of any of these Dominion systems, have you seen any indication of non election personnel remotely accessing a Dominion system? Speaker 1: Yes. Speaker 2: Can you tell us about that? Speaker 3: I too have reviewed a series of emails produced by Dominion in which they're discussing remoting into Gwinnett County, Georgia. Speaker 0: You also mentioned Dominion remotely connecting to election systems, but you don't have any evidence that occurred in Georgia. Correct? Speaker 1: There was one county. I've seen a lot of Dominion emails. I've had to translate Dominion emails from Serbian to English to verify the technical questions I was being asked about them, to verify that it was translated properly. So Speaker 0: So it's your testimony that there there is evidence of Dominion remotely accessing Georgia election equipment? Speaker 1: Yes. On the one county. It was included with stuff that I was researching and reading through considering Colorado. Michigan was also involved and there were other ones. Speaker 2: To your understanding, is Dominion able to remotely connect to these election systems? Speaker 1: Yes. Speaker 2: Are they able to do that without detection? Speaker 0: Yes. Speaker 2: Are you aware of any instances in which that has occurred? Speaker 1: Yes. Speaker 2: Can you identify those instances? Speaker 1: One would be the Denver, Colorado server was granted or requested to grant Belgrade, only Belgrade. I did search. There is a Belgrade Montana. Again, why would Montana need to connect into a Colorado file transfer server as per election system? And there are other components and things that were done in the background concerning the database and the configure of the database server that still do not have an engineering change order. Because if somebody works in an operational environments for a lot of different things, what I will tell you is sometimes things break or you have a problem and you have to fix it. And you you submit a change request or, in this case, an engineering change order that's retroactive. Right? You wanna go back and make sure that you record the process so that you have change management and integrity of the system. If you do not record changes, you lead yourself down a a very bad road.
Saved - October 19, 2024 at 9:20 AM
reSee.it AI Summary
I reported that a voter in my district witnessed a Dominion voting machine flipping their vote from Trump to Kamala. Georgia's election system is deeply flawed, relying on machines that print QR codes which can be manipulated, as shown by Professor Halderman. Many voters don’t verify their printed ballots, trusting the machines instead. Despite election workers' attempts to correct the issue, the machine failed repeatedly, and all votes from it should be set aside for inspection. I believe the DOJ must prioritize election integrity, as companies like Dominion misled about their machines' internet connectivity.

@BehizyTweets - George

BREAKING: Congresswoman MTG just reported that a voter in her district caught a Dominion voting machine flipping their vote to another candidate, likely from Trump to Kamala Georgia has the most corrupt election system in the country. Voters make selections on machines and then have to trust the machine to print out a piece of paper with their real selections. The tabulator doesn't even read the selections. It reads the QR code that SHOULD have the real selections, but as Professor J. Alex Halderman has demonstrated in court numerous times, the QR code can be manipulated to change votes without detection. Halderman also conducted a study showing that an overwhelming majority of voters don't even look at the "ballot" after it has been printed. Most trust the machine to do its job. This particular vulnerability is damning, and although patriots in Georgia have been screaming about it since 2020, corrupt Gov. Brian Kemp has continued to gaslight them.

@BehizyTweets - George

According to the person who wrote this, the election workers made "several attempts for correction" but got the same result from the machine & printer. All votes from that machine should be identified and set aside for inspection. The election officials must also preserve all data on the machines as required by federal & state law, unlike the mass deletion they pulled off after the 2020 election.

@BehizyTweets - George

The DOJ under Trump must make election integrity a super-priority. In my opinion, Dominion, E&S, Hart, etc, defrauded the federal government when they lied about internet connectivity on their machines. That's crime numero uno

Saved - October 19, 2024 at 9:39 AM
reSee.it AI Summary
I’m raising concerns about the integrity of the voting process in Georgia, particularly with Dominion voting machines. Reports indicate issues where votes are flipping from Trump to Kamala, and voters are urged to double-check their printed ballots before scanning them. However, the QR code, which the tabulator reads, remains unverified by voters. Despite the alarming situation, officials like GA SOS COO Gabriel Sterling dismiss these problems. I believe we need to declare a State of Emergency to switch to hand-marked, hand-counted paper ballots to ensure a secure election.

@KylieJaneKremer - Kylie Jane Kremer

🚨GEORGIA ELECTION FRAUD🚨 Dominion voting machines. We are already seeing MAJOR issues with the machines across the Peach State as early voting is underway Congresswoman MTG confirmed there is an issue in her district (14th) with the machines flipping votes from Trump to Kamala A voter chose Trump on the BMD (ballot marking device) & then when the printed ballot came out of the table top printer (before it was scanned to actually cast the ballot), the text showed they selected Kamala After several attempts to fix it, they finally had to void out the ballot, use another machine and start fresh. They were able to successfully select Trump and it correctly showed on the printed ballot text. The ballot was then cast by scanning the printed ballot in the Polling Place Scanner (tabulator) A picture of a Fulton County ballot from 2020 is shown below so you can see how a printed ballot looks after selections are made (picture from Google) Voters across Georgia are now being told to double check the printed ballot, before it is scanned into the tabulator, to make sure the correct selections are shown in the text on the printed ballot, which is below the QR code that is also printed on the ballot However, I want to know what difference does it make what the printed text on the ballot shows when the tabulator is only reading the QR code, not the text on the printed ballot????? To those who may not be familiar with how the process works, selections are privately made on a BMD (ballot marking device aka touch screen tablet) and then are printed out on a table top printer. Each printed ballot shows a QR code on top and below it are the selections in text. The printed ballot is then scanned into the Polling Place Scanner (aka tabulator) where the QR code is read and tallies and then the process is complete The Polling Place Scanner only scans the QR code, which is NOT readable by the human eye. The QR code also cannot be read by any other device other than the Polling Place Scanner. It’s NOT like what we’re accustomed to with QR codes being easily scanned by our phones in our everyday lives So it DOES NOT MATTER what the text on the printed ballot states because the machine is not reading that, it is ONLY reading the QR code How do we know that this voter who had issues with their vote being switched, that was identified in the text portion of the printed ballot, is also not having this same issue with the QR code? There is literally NO WAY for anyone to verify what the QR code will be read as This is beyond disturbing as Governor Kemp, SOS Raffensperger, AG Chris Carr and the Georgia State Legislature had four years to secure our elections after all of the issues that happened with Dominion in 2020 and they chose NOT to do a damn thing I have been sounding the alarm bells that although Trump is overwhelmingly winning in the State of Georgia, nothing of substance has been done on election integrity, so we are being set up for a repeat of 2020 for a stolen election How does anyone that already cast their ballot know that their vote wasn’t switched, if they didn’t double check their printed ballot text, before feeding it into the tabulator? How does anyone know that even if the printed ballot text is correct, that the QR code is correct? How does anyone know anything, except for Dominion employees? Isn’t it our right as citizens to be able to ensure we are voting the way we intend? We are in BIG TROUBLE in Georgia & DJT’s path back to the White House depends on the Peach State The ONLY option at this point to ensure voters in Georgia have a secure, free & fair election is by declaring a State of Emergency to get rid of the machines and go to hand-marked, hand-counted paper ballots We are only on day four of early voting, with 17 more days to go, before Election Day. Buckle up because the powers that be have shown they will do ANYTHING to stop Trump & it seems they are just getting started

@KylieJaneKremer - Kylie Jane Kremer

Oh look, GA SOS COO @GabrielSterling already gaslighting Georgians that there is NO PROBLEM Nothing to see here folks 👀 Just machines flipping votes & no one being able to verify who they are voting for because of the QR code, that is unable to be read by the human eye https://t.co/2oOp6MLsr8

View Full Interactive Feed