Started By
Message

DHS and Intel Community Media Outlets Proactively Move to Defend Dominion Voting Systems

Posted on 5/31/22 at 5:21 am
Posted by GumboPot
Member since Mar 2009
118566 posts
Posted on 5/31/22 at 5:21 am
quote:

The timing is not coincidental. A 100-page report on electronic voting systems, by University of Michigan computer scientist J. Alex Halderman, remains under seal in a federal court in Atlanta as an outcome of election integrity lawsuits surrounding the Dominion voting system. That report is rumored to be released soon, perhaps as early as this week.

In what appears to be a proactive move to get out ahead of identified voting system irregularities specific to the electronic voting systems, the Dept of Homeland Security, Cybersecurity and Infrastructure Security Agency (DHS-CISA), updated the election page on their website [SEE HERE] under the “Rumor Control” section. DHS made the update on May 27, 2022, last week.

The very next day, May 28, 2022, The Washington Post produces an article [SEE HERE] describing an upcoming DHS-CISA 5-page memorandum that is in the process of being sent to the states ahead of a public release.

With the WaPo being the outlet of choice for the intelligence community & security state, it appears they received an advanced copy to help establish an early response effort.

Within The Post article, “there are nine flaws affecting versions of the machine called the Dominion Voting Systems Democracy Suite ImageCast X, according to a copy of an advisory prepared by CISA and obtained by The Washington Post.” The article then goes immediately to downplay the problems. “The flaws, many of which are highly technical and which mostly stem from machine design as opposed to coding errors, generally require an attacker to have physical access to the devices or other equipment used to manage the election, CISA said.”

[…] CISA’s five-page advisory is based in part on Halderman’s 100-page report, which remains under seal in a federal court in Atlanta. The advisory is expected to be released next week after officials in all 50 states are notified.

The WaPo article is filled with ‘nothing to see here, move along – move along,’ verbal engineering.



CNN then picks up the baton from the Washington Post, and they too tell their audience not to worry about any pesky evidence of election system vulnerabilities. The professionals in charge of things have assured us there’s no problems and everything is fine. After all, it would be far too difficult, and too many people would be involved, for there to be actual tampering and fraud in the use of the electronic systems.

(Via CNN) – Federal cybersecurity officials have verified there are software vulnerabilities in certain ballot-marking devices made by Dominion Voting Systems, discovered during a controversial Georgia court case, which could in theory allow a malicious actor to tamper with the devices, according to a draft analysis reviewed by CNN.

The vulnerabilities have never been exploited in an election and doing so would require physical access to voting equipment or other extraordinary criteria standard election security practices prevent, according to the analysis from the US Cybersecurity and Infrastructure Security Agency.

But because the subject is Dominion voting equipment, which has been the target of conspiracy theorists who falsely claim there was large-scale fraud in the 2020 election, federal and state and local officials are bracing for election deniers to try to weaponize news of the vulnerabilities ahead of midterm elections.

“While these vulnerabilities present risks that should be promptly mitigated, CISA has no evidence that these vulnerabilities have been exploited in any elections,” reads the draft CISA advisory, which the agency shared in a briefing with state and local officials on Friday. (read more)

For a group of government bureaucrats that are so confident there’s no ‘there, there‘, they sure are putting a lot of energy into delivering all the talking points ahead of the actual election reports and state advisories.

Meanwhile, Suspicious Cat remains, well, suspicious…






LINK
Posted by BigMob
Georgia
Member since Oct 2021
7625 posts
Posted on 5/31/22 at 5:23 am to
Somebody’s over target
Posted by lsuguy84
CO
Member since Feb 2009
19573 posts
Posted on 5/31/22 at 5:24 am to
Posted by Gifman
by the mountains
Member since Jan 2021
9177 posts
Posted on 5/31/22 at 5:38 am to
quote:

lsuguy84


Posted by cajunangelle
Member since Oct 2012
146427 posts
Posted on 5/31/22 at 5:55 am to
Unbelievable.

So an obvious partisan think tank: Under the guise of official govt investigations for the democrats/swamp- Newly formed branch of the Biden federal govt beast-- acts as the intel community and govt official simultaneously to commit obstruction for the DC swamp.



https://www.cisa.gov/rumorcontrol
Posted by CamdenTiger
Member since Aug 2009
62362 posts
Posted on 5/31/22 at 5:57 am to
Any State still using those systems are corrupted at this point…..
Posted by burger bearcat
Member since Oct 2020
8813 posts
Posted on 5/31/22 at 5:59 am to
Can someone give me the "For Dummies" explanation of how electronic machine fraud happens? The ballot mule stuff makes way more sense to me, especially since I can see it in plain site.

I have worked election polls in the past, and the precincts we used were ES&S machines. They made a big "to do" about showing the machines weren't connected to the internet, but I never really had anyway of knowing for sure. Once all the ballots were cast, we printed off the results and post them and then I follow up later to make sure the results match. The total vote count can't change, because we can watch in real time as people come into vote, the only stealing that could happen would be some sort of switching done via a remote wireless router or a pre-programmed algorithm that can switch the votes without internet access.

I'm just curious, because I really don't know the right questions to ask when I am working around these machines, and what the theory is on how these votes are stolen by the machines.
Posted by GumboPot
Member since Mar 2009
118566 posts
Posted on 5/31/22 at 6:14 am to
Votes for one candidate can count a fraction of the other candidate.

Machine counting algorithms can be updated via thumb drive.

There is a difference between “connected to the internet” and local area network.

Just pointing out some obvious vulnerabilities.

It will be interesting to see the court released report however.
Posted by burger bearcat
Member since Oct 2020
8813 posts
Posted on 5/31/22 at 6:17 am to
quote:

Machine counting algorithms can be updated via thumb drive.



So is the thumb drive at each machine? Who typically would be the person to insert and takeout the thumb drive? But what you are saying is the switching can happen inside the machine without internet access.

To me it would make sense at minimum, go have random hand counts at precincts (preferably all instead of random) to verify the results are matching.
Posted by MrLSU
Yellowstone, Val d'isere
Member since Jan 2004
25909 posts
Posted on 5/31/22 at 6:18 am to
The report will never be released to the public. Too much at stake for the One World Order crowd.
Posted by bayou2
New Orleans, LA
Member since Feb 2007
2955 posts
Posted on 5/31/22 at 6:51 am to


... and NOW we can reveal the History of the Dominion Voting Manipulation Software ...

Posted by trinidadtiger
Member since Jun 2017
13290 posts
Posted on 5/31/22 at 7:23 am to
Odd the feds would weigh in with an entire dept to verify security, versus HELPING to uncover the flaws?

Under the obama admin didnt they force out dominion's competitor, basically invalidating them as a supplier, thereby making them sell for a song to dominion, and in the process pick up control of several more states, a monopoly on the voting machines in the US?

And what was that whole mess of voter machine hacking in Georgia that the state uncovered and the feds quickly squashed before the elections? A test run so they could modify and improve?

Tooo many, way tooo many people in govt defending this company instead of helping to get to the bottom of it.
Posted by SpicyStacy
stout's fave
Member since Aug 2010
13343 posts
Posted on 5/31/22 at 7:58 am to
Thought they were completely and totally safe.... unhackable, and unable to connect to the internet. Most secure election EVER???

It blows my mind that people believe anything the government says after what we've been through the past 2 years.
Posted by NC_Tigah
Carolinas
Member since Sep 2003
123756 posts
Posted on 5/31/22 at 8:29 am to
quote:

DHS and Intel Community Media Outlets Proactively Move to Defend Dominion Voting Systems
Posted by GumboPot
Member since Mar 2009
118566 posts
Posted on 5/31/22 at 9:16 am to
Posted by dakarx
Member since Sep 2018
6812 posts
Posted on 5/31/22 at 9:17 am to
Nothing screams dig deeper into this than the fed's telling you there is nothing to see.
Posted by 850SaintsGator
Pensacola
Member since Sep 2021
2236 posts
Posted on 5/31/22 at 9:25 am to
quote:

So is the thumb drive at each machine? Who typically would be the person to insert and takeout the thumb drive? But what you are saying is the switching can happen inside the machine without internet access.



This is a good point - each machine has a very tight chain of custody and any variance would be uncovered quickly so any nefarious thumb drive attempt would be detected


Plus, if a vote was fractioned off- the post election audit would note that. Also - there is a finite number of ballots cast , this is good base number and any deviation is exposed.

Our election ballots are secure- now, to your point…having ballot harvesting can be problematic and easily frauded (pay for vote sequences) ….that conspiracy is easier to logically support
Posted by GumboPot
Member since Mar 2009
118566 posts
Posted on 5/31/22 at 9:35 am to
quote:

This is a good point - each machine has a very tight chain of custody and any variance would be uncovered quickly so any nefarious thumb drive attempt would be detected



The technician using the thumb drive wouldn't even know he was updating software to change algorithms. He simply can be given orders that precinct(s) such and such need their "firmware" updated. All the technician is charged with is downloading the firmware to at thumb drive, going to the precinct, showing credentials, updating each machine with the current version of firmware and signing out.

The precinct personnel and the IT technician have no clue what the firmware update entails. Just like when you get an software update on your phone, PC, GPS, Fish Finder, etc. you have no clue what the software updates entail. In fact that information can be kept secret to one person.
This post was edited on 5/31/22 at 9:37 am
Posted by Auburn1968
NYC
Member since Mar 2019
19311 posts
Posted on 5/31/22 at 9:39 am to
So the same political hucksters who jabbered on about the Trump/Russia hoax for three years are saying Dominion Voting Systems are reliable?

That inspires confidence.
Posted by Knartfocker
Member since Jun 2020
1274 posts
Posted on 5/31/22 at 9:43 am to
And here I thought the ministry of truth was defeated...
first pageprev pagePage 1 of 2Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram