Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Tech Security Company Exposes Critical Vulnerabilities Election Software - TURNED AWAY BY DHS AND FBI MULTIPLE TIMES
TheDonald.win ^ | 11/9/2020 | based_female_in_tech

Posted on 11/09/2020 11:58:54 PM PST by Mount Athos

Dominion is only one piece of the puzzle. Everyone is talking about investigating paper ballots and evidence of dead voters, but there are other layers to our election IT infrastructure with glaring vulnerabilities! The vulnerabilities outlined below could allow quick and impossibly large vote count changes.

Russel Ramsland of Allied Security Operations Group walks through vulnerabilities of software used in 2018 and 2020 elections in (video linked in comments)

As a result of the 2002 HAVA Act, most counties don't run elections anymore. Private Companies with Private Shareholders under contract to counties run our elections. And these companies do it with virtually NO Transparency or Supervision.

The entire election system infrastructure is a complex patchwork of various private companies doing various parts of it. ALL of it is exposed to the internet, the idea of it being air-gapped is a myth. The voting companies own manuals show this. Some of these companies conduct elections all over the world, effectively being in a position to control some of the outcomes Some of the companies are foreign owned with servers outside this country, and they are the last ones to actually control the so-called "unofficial" votes. BUT, it is the "Unofficial" votes that eventually control "Official" votes. There are no security standards for election software. Hence any certifications are largely just agreed on an ad hoc basis between the certifying company and the election company and therefore don't mean much. Most State SOS offices fail to grasp the extent and vulnerabilities within their systems, and so they grant waiver to their State law and voting code to counties and election companies which exacerbate the problem. investigation revealed at least a dozen or more entry points where votes can and are being switched and the audit trails changed or erased so that a forensic investigation finds no trace. It has to be caught in real time. Even the operator of the election system can change votes undetected.

Error log comparisons across counties illustrate suspicious activity Found Voting Companies' public facing sites to be vulnerable, such that: Admin names and passwords for critical information files are in the open, in a file, right before each file containing critical information Voter Registration lists by precinct (Worldwide) including all DL (Download?) info and Personally Identifiable Information (PII) All previous vote uploads All Source Code (Many companies are using the same basic source code structure) Found software so vulnerable that operators and even some outside players can change votes utterly undetected, either NO audit trail (Hart) or erasable or changeable audit trail (ES&S, Dominion, etc.), so no evidence of vote changing can be found Access to the companies' entire AWS (Amazon Cloud) databases All ballots All counting and tallying functions Discovered they could make any candidate win or lose by directly altering votes at the server/database level for any election most companies conduct, worldwide. Many state's votes are stored, controlled, and reported by a company in Frankfurt, Germany. Issue with tabulation software can 'flip' under votes to opposite candidate Vulnerabilities explain how 138,339 ballots could be counted within 3 hours and go 100% to Biden Explains ridiculous turnout numbers in many states

Detectable malware called QSnatch has the following capabilities: Log and scrape credentials for counties, as well as ability to login to password protected areas of their sites Execute arbitrary code on a device Steal config and log files The only way to get rid of QSnatch is a full factory reset before patching a device. (QSnatch is able to dodge security patches that target itself)

Found instances of the following: "Ghosts" — These are people using another person's residence as their legal permanent address for voting purposes and no one living there has ever heard of them. "Phantoms" — These are people who check in under their own name, but their vote is somehow attributed to someone else. Or, people who check in to vote and find someone has already voted in their name. "Purged" or "Tampered" — These are voting records the County posts as having been voted, but then later are purged or otherwise tampered with, and sometimes re-instated with different data later at a later date. Dallas has approximately 57,000 instances of this thus far. Harris (county) has around 250,000 instances. On some days, the number of votes tampered with are so huge it can only be done by computer programming. However, some days the number of votes tampered with are small enough that local operators could be doing it.

Escalation: DHS eventually had some employees in the field sit down with ASOG to look at gathered data. They agreed that the data was accurate and that the vulnerabilities are horrible. They have been unable to accelerate the issue to their supervisors effectively FBI has no interest in the findings and turned ASOG away many times I have sent this video through Trumps voter fraud form with some context - advising that they speak with Ramsland if they haven't already.


TOPICS: Conspiracy; Politics
KEYWORDS: electionfraud; ramsland
Navigation: use the links below to view more comments.
first 1-2021-26 next last
Link to video mentioned in this article:

https://www.youtube.com/watch?v=ficae6x1Q5A&feature=youtu.be&t=145

1 posted on 11/09/2020 11:58:54 PM PST by Mount Athos
[ Post Reply | Private Reply | View Replies]

To: Mount Athos

https://www.youtube.com/watch?v=ficae6x1Q5A&feature=youtu.be&t=145


2 posted on 11/09/2020 11:59:08 PM PST by Mount Athos
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos
"FBI has no interest..."

Chris Wray

3 posted on 11/10/2020 12:05:22 AM PST by Steve Van Doorn (*in my best Eric Cartman voice* 'I love you, guys')
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

I feel like when I go on FR now, it’s just to see what the latest fraud cases are :)

I have to believe massive pressure is being put on many state legislatures to do an audit, like PA is


4 posted on 11/10/2020 12:07:48 AM PST by dp0622 (Tried a coup, a fake tax story, tramp slander, Russia nonsense, impeachment and a virus. They lost.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

If someone has a running record of vote totals across the country, that info could identify “glitches,” indicating places where the electronic vote count probably does not match the paper ballots count.


5 posted on 11/10/2020 12:23:10 AM PST by UnwashedPeasant (Trump is solving the world's problems only to distract us from Russia.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

Reformatted . . .


Dominion is only one piece of the puzzle.

Everyone is talking about investigating paper ballots and evidence of dead voters, but there are other layers to our election IT infrastructure with glaring vulnerabilities! The vulnerabilities outlined below could allow quick and impossibly large vote count changes.

Russel Ramsland of Allied Security Operations Group, walks through vulnerabilities of software used in 2018 and 2020 elections:

Russel Ramsland of Allied Security Operations Group - YouTube video:
https://www.youtube.com/watch?v=ficae6x1Q5A

Russel Ramsland of Allied Security Operations Group:
https://asog.us/


TL;DW:

As a result of the 2002 HAVA Act, most counties don’t run elections anymore. Private Companies with Private Shareholders under contract to counties run our elections. And these companies do it with virtually NO Transparency or Supervision.

• The entire election system infrastructure is a complex patchwork of various private companies doing various parts of it. ALL of it is exposed to the internet, the idea of it being air-gapped is a myth. The voting companies own manuals show this. Some of these companies conduct elections all over the world, effectively being in a position to control some of the outcomes

• Some of the companies are foreign owned with servers outside this country, and they are the last ones to actually control the so-called “unofficial” votes. BUT, it is the “Unofficial” votes that eventually control “Official” votes.

• There are no security standards for election software. Hence any certifications are largely just agreed on an ad hoc basis between the certifying company and the election company and therefore don’t mean much.

• Most State SOS offices fail to grasp the extent and vulnerabilities within their systems, and so they grant waiver to their State law and voting code to counties and election companies which exacerbate the problem.

• Investigation revealed at least a dozen or more entry points where votes can and are being switched and the audit trails changed or erased so that a forensic investigation finds no trace. It has to be caught in real time. Even the operator of the election system can change votes undetected.


Error log comparisons across counties illustrate suspicious activity

• Found Voting Companies’ public facing sites to be vulnerable, such that:

— Admin names and passwords for critical information files are in the open, in a file, right before each file containing critical information

— Voter Registration lists by precinct (Worldwide) including all DL (Download?) info and Personally Identifiable Information (PII)

— All previous vote uploads

— All Source Code (Many companies are using the same basic source code structure)

• Found software so vulnerable that operators and even some outside players can change votes utterly undetected, either NO audit trail (Hart) or erasable or changeable audit trail (ES&S, Dominion, etc.), so no evidence of vote changing can be found

— Access to the companies’ entire AWS (Amazon Cloud) databases

— All ballots

— All counting and tallying functions

• Discovered they could make any candidate win or lose by directly altering votes at the server/database level for any election most companies conduct, worldwide.

• Many state’s votes are stored, controlled, and reported by a company in Frankfurt, Germany.

• Issue with tabulation software can ‘flip’ under votes to opposite candidate

• Vulnerabilities explain how 138,339 ballots could be counted within 3 hours and go 100% to Biden

• Explains ridiculous turnout numbers in many states


Detectable malware called QSnatch has the following capabilities:

• Log and scrape credentials for counties, as well as ability to login to password protected areas of their sites

• Execute arbitrary code on a device

• Steal config and log files

• The only way to get rid of QSnatch is a full factory reset before patching a device. (QSnatch is able to dodge security patches that target itself)


Found instances of the following:

• “Ghosts” -— These are people using another person’s residence as their legal permanent address for voting purposes and no one living there has ever heard of them.

• “Phantoms” -— These are people who check in under their own name, but their vote is somehow attributed to someone else. Or, people who check in to vote and find someone has already voted in their name.

• “Purged” or “Tampered” -— These are voting records the County posts as having been voted, but then later are purged or otherwise tampered with, and sometimes re-instated with different data later at a later date. Dallas has approximately 57,000 instances of this thus far. Harris (county) has around 250,000 instances. On some days, the number of votes tampered with are so huge it can only be done by computer programming. However, some days the number of votes tampered with are small enough that local operators could be doing it.


Escalation:

• DHS eventually had some employees in the field sit down with ASOG to look at gathered data. They agreed that the data was accurate and that the vulnerabilities are horrible. They have been unable to accelerate the issue to their supervisors effectively

• FBI has no interest in the findings and turned ASOG away many times

• I have sent this video through Trumps voter fraud form with some context - advising that they speak with Ramsland if they haven’t already.



6 posted on 11/10/2020 12:49:46 AM PST by linMcHlp
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

Bookmark


7 posted on 11/10/2020 12:59:31 AM PST by Chgogal (#DisruptBidenÂ’sBananaRepublic..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: HarleyLady27; poconopundit; RoosterRedux

Ping!

NOTE:
Notice the site originating the article.


8 posted on 11/10/2020 12:59:47 AM PST by V K Lee ( "VICTORY FOR THE RIGHTEOUS IS JUDGMENT FOR THE WICKED")
[ Post Reply | Private Reply | To 2 | View Replies]

To: linMcHlp

thank you. Wow I did a poor job on this post


9 posted on 11/10/2020 1:01:25 AM PST by Mount Athos
[ Post Reply | Private Reply | To 6 | View Replies]

To: Mount Athos

You are OK.


10 posted on 11/10/2020 1:10:02 AM PST by linMcHlp
[ Post Reply | Private Reply | To 9 | View Replies]

To: Mount Athos

Bttt


11 posted on 11/10/2020 1:18:13 AM PST by Eagles6
[ Post Reply | Private Reply | To 1 | View Replies]

To: linMcHlp

Mark


12 posted on 11/10/2020 1:58:40 AM PST by griswold3 (Democratic Socialism is Slavery by Mob Rule)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Mount Athos

The FBI has had it in for The Donald since before his election and never stopped trying to take him down.
All the while ignoring the Clinton and Biden crime syndicates.
FBI is garbage.


13 posted on 11/10/2020 2:24:18 AM PST by Joe Boucher ( Molon Labe' Baby, Molon Labe)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

You need to hold this election a second time, and only allow in-person on-the-day voting. Make it possible for citizen observers to attend all polling stations. Count the ballots the old-fashioned way, X in a circle is the only legit vote, odd looking substitutes go into the G-can.

This is the way we vote in Canada and the U.K. (with advance polls), recently the mail-in ballot thing began, and I don’t trust that either. We don’t have voting machines (Dominion software emanates from Toronto apparently, but as we can elect liberals here without fraud, nobody’s bothered about using their stuff).

The only way to resolve this apparent massive fraud is to declare the results null and void, at least in the ten or so states where it seems to have made a difference, and hold it over again.


14 posted on 11/10/2020 3:44:42 AM PST by Peter ODonnell (Pray for health, economic recovery, and justice.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Joe Boucher

There were hints of vote buying in my area and I made a complaint to state hotline but then the FBI started calling me and I had second thoughts answering.

It is that bad. I have zero trust in these perps who could turn it against me.


15 posted on 11/10/2020 4:01:27 AM PST by JudgemAll (Democrats Fed. job-security in hates:hypocrites must be gay like us or be tested/crucified)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Mount Athos

You tube is making it hard to view that video. Knew that would be coming.

This works: https://altcensored.com/watch?v=ficae6x1Q5A


Interview with Source on Electronic Vote Fraud (Russel Ramsland, Allied Security Operations)
https://www.youtube.com/watch?v=ficae6x1Q5A&feature=emb_logo
Host L Todd Wood reveals the mechanics behind the electronic vote steal operation in an interview with powerful source.
Streamed live on Nov 5, 2020

FR Comments: https://www.freerepublic.com/focus/f-news/3902979/posts
Video=> https://www.youtube.com/watch?v=ficae6x1Q5A

Data Expert Describes How Democrats Can Fabricate Votes
Also Describes Critical Security Flaws That Have Not Been Addressed
https://andmagazine.com/talk/2020/11/06/data-security-specialist-outlines-key-election-system-flaws-and-vulnerabilities/


16 posted on 11/10/2020 4:18:43 AM PST by Texas Fossil ((Texas is not where you were born, but a Free State of Heart, Mind & Attitude!))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

General Tom McInerney interview on (Bannon’s)The War Room
Ep 470 (Nov 2) starting about 19:06 as General McInerny starts speaking on this.
https://podcasts.apple.com/us/podcast/bannons-war-room/id1485351658?i=1000496960019

Ep 472 (Nov 3) at 19:32 McInerny relays to Bannon unfortunately systems are still up and running.
https://podcasts.apple.com/us/podcast/bannons-war-room/id1485351658?i=1000497093696

Who owns and controls Hammer and Scorecard?
https://www.freerepublic.com/focus/f-news/3902914/posts

THE HAMMER (aka HAMR) IS THE KEY TO THE COUP
https://www.theburningplatform.com/2020/11/07/the-hammer-is-the-key-to-the-coup/


17 posted on 11/10/2020 4:22:30 AM PST by Texas Fossil ((Texas is not where you were born, but a Free State of Heart, Mind & Attitude!))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

bttt


18 posted on 11/10/2020 4:24:27 AM PST by Pajamajan ( PRAY FOR OUR NATION. I will never be a peaceful slave to a Socialist new America.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

They keep overlooking SMARTMATIC voting machines


19 posted on 11/10/2020 5:21:05 AM PST by vigilante2 (Make liberals cry again)
[ Post Reply | Private Reply | To 1 | View Replies]

To: UnwashedPeasant

Can the Benford analysis be applied to EVERY COUNTY in the country? That would show pretty quick questionable results.


20 posted on 11/10/2020 5:38:29 AM PST by RebelTXRose (Our Lady of Fatima, Pray for us! PRAY THE ROSARY!)
[ Post Reply | Private Reply | To 5 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-26 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson