Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Cracking Dominion’s Source Code - National Security Threat Since 2003
CD media ^ | December 29, 2020 | George Eliason

Posted on 12/29/2020 1:11:40 PM PST by TigerLikesRoosterNew

Cracking Dominion’s Source Code – A National Security Threat Since 2003

by George EliasonDecember 29, 2020110052

SHARE6

Did Donald Trump Catch Dominion And Smartmatic US Election Racketeering?

Dominion ImageCast precinct count optical ballot scanner
Image by 
Douglas W. Jones

With the Georgia runoff election in full swing, this article will show why the ballot results should be ash-canned even before the final tallies are in — both Georgia and Pennsylvania adhere to the federal standard for elections and because Dominion uses modems, the election provider itself is not certifiable. 



Pennsylvania state certification requires that voting systems be evaluated by a federally recognized independent testing authority, or voting system test laboratory (VSTL), and certified by the U.S. Election Assistance Commission (EAC) according to federal voting system standards.

Once you add that modem, you are de-certifying it,” Kevin Skoglund, senior technical advisor at the National Election Defense Coalition said. “It is no longer federally certified. And I don’t know that all these jurisdictions are aware of that because ES&S is advertising otherwise. The three largest voting manufacturing companies — Election Systems &Software, Dominion Voting Systems and Hart InterCivic — have acknowledged they all put modems in some of their tabulators and scanners.”-NBC

What you’re going to find is the current Dominion and ES&S voting systems were designed over 22 years ago to allow and promote every type of voter fraud imaginable and the same two conspirators have been safeguarding and selling these broken systems the entire time.

From 1997 to 2003 Bob Urosevich and Barry Herron developed the art of electronic vote manipulation to such a degree; you didn’t need to hack the system to change the election results. Below is the chain of custody for the software and source code that made this possible. 

The key takeaway is simple. Although what’s described below is from Diebold Election Systems, Dominion bought Diebold and this system for use. This the backbone of Dominion Voting Systems today and it gives a clear line of sight into the otherwise opaque world of election fraud in 2020.

In 2003, a research journalist named Bev Harris opened up the world of Diebold Election Systems. When Dominion Voting Systems got off the ground and became a player it was because of the purchase of Diebold properties including systems, source code, and software.

What she found was Diebold had a ‘no-login needed’ website that was a detailed manual of how to hack the election systems Diebold was servicing across the US. If you didn’t like the election tallies, it was a simple matter of replacing the file with one that reflected the results you wanted on this FTP site.

CDMedia is being de-platformed and obviously too effective! We need your support to put more reporters in the field! Help us here!    

According to Harris, the site was set up for election workers and technicians and included hardware and software specifications, election results files, the vote-counting program itself, and “replacement files” for Diebold’s GEMS vote-counting system and for the Windows software underlying the system.

The contents of these files amounted to a virtual handbook for vote-tampering: They contained diagrams of remote communications setups, passwords, encryption keys, source code, user manuals, testing protocols, and simulators, as well as files loaded with votes and voting machine software.

Diebold Elections Systems AccuVote systems use software called “GEMS,” and this system is used in 37 states. The voting system works like this:

Voters vote at the precinct, running their ballot through an optical scan, or entering their vote on a touch screen.

After the polls close, poll workers transmit the votes that have been accumulated to the county office. They do this by modem.

At the county office, there is a “host computer” with a program on it called GEMS. GEMS receives the incoming votes and stores them in a vote ledger. But in the files we examined, which were created by Diebold employees and/or county officials, we learned that the Diebold program used another set of books with a copy of what is in vote ledger 1. And at the same time, it made yet a third vote ledger with another copy.

Apparently, the Elections Supervisor never sees these three sets of books. All she sees is the reports she can run: Election summary (totals, county wide) or a detail report (totals for each precinct). She has no way of knowing that her GEMS program is using multiple sets of books, because the GEMS interface draws its data from an Access database, which is hidden. And here is what is quite odd: On the programs we tested, the Election summary (totals, county wide) come from the vote ledger 2 instead of vote ledger 1, and ledger 2 can be altered so it may or may not match ledger 1.

Now, think of it like this: You want the report to add up only the actual votes. But, unbeknownst to the election supervisor, votes can be added and subtracted from vote ledger 2. Official reports come from vote ledger 2, which has been disengaged from vote ledger 1. If one asks for a detailed report for some precincts, though, the report comes from vote ledger 1. Therefore, if you keep the correct votes in vote ledger 1, a spot check of detailed precincts (even if you compare voter-verified paper ballots) will always be correct.”

Auditing

Again from Bev Harris provided all this information on a share-as-widely-as-possible basis. The audit trail is what is supposed to guarantee election security. Harris went to the same Diebold/Dominion website and downloaded a GEMS (General Election Management System) audit report.

Note that a user by the name of “Evildoer” was added. Evildoer performed various functions, including running reports to check his vote-rigging work, but only some of his activities showed up on the audit log.

It was a simple matter to eliminate Evildoer. First, we opened the election database in Access, where we opened the audit table: Then, we deleted all the references to Evildoer and, because we noticed that the audit log never noticed when the admin closed the GEMS program before, we tidily added an entry for that.

Access encourages those who create audit logs to use auto-numbering so that every logged entry has an uneditable log number. Then, if one deletes audit entries, a gap in the numbering sequence will appear. However, we found that this feature was disabled, allowing us to write in our own log numbers. We were able to add and delete from the audit without leaving a trace. Going back into GEMS, we ran another audit log to see if Evildoer had been purged:

As you can see, the audit log appears pristine.

In fact, when using Access to adjust the vote tallies we found that tampering never made it to the audit log at all.” – Bev Harris

An election (after the fact) using the real files on the real system was changed for research purposes with no elaborate hacking necessary. 

The Dominion software and source code was originally developed by a company called Premier Election Solutions. The founder was Bob Urosevich.

•         In 1997 Global Election Systems acquired Premier. The company representatives were Bob Urosevich and Barry Herron

•          In 2001, Diebold purchased Global. The company representatives were Bob Urosevich and Barry Herron.

•          In 2009, Diebold Sells U.S. Elections Systems Business to ES&S. The company representatives were Bob Urosevich and Barry Herron

•         In September 2009, ES&S acquired Premier, without any objections from the DOJ. But in March 2010, the DOJ forced ES&S to “sell” Premier’s assets to Dominion. ES&S was also forced to license to Dominion some of its software for free.  

•         Dominion announced the acquisition of the Diebold (formerly Premier) products on May 19, 2010

•         Dominion Voting Systems purchased the primary assets of Premier, including all intellectual property, software, firmware, and hardware for Premier’s current and legacy optical scan, central scan, and touch screen voting systems, and all versions of the GEMS election management system from ES&S.

•         Barry Herron is the Southeast regional sales manager for Dominion Voting Systems as well as being their lobbyist.

•         Barry Herron is Director of sales for INTERNATIONAL LOTTERY AND TOTALIZATOR, INC.

•         Barry Herron is the sales manager for Unisyn Voting.  Unisyn, an HK registered company wholly owned by UNISYN VOTING SOLUTIONS (A DIVISION OF INTERNATIONAL LOTTERY AND TOTALIZATOR, INC) a division of Berjaya Lottery Management (h.k.) Ltd, a division of Yong Hong Group Co., Ltd., referred to Wing Hung Kai Group ( English: Wing Hung Kee Holdings Limited’s, HKEx except when licensing 0288.HK), founded in 1971, formerly known as Wing Hung Kai Properties Limited referred to as Wing-hong Kee Property ( English: Wing Hung Kee Investment Company, Limited ). Listed on the main board of the Hong Kong Stock Exchange in 1973. In 1994, the Malaysian consortium Berjaya Group ( Berjaya Group ) acquisition, changed its name to succeed Holdings (Hong Kong) Limited.

Unisyn is a wholly-owned private corporation headquartered in Malaysia but registered in Hong Kong, China.

INTERNATIONAL LOTTERY AND TOTALIZATOR, INC is the world’s largest manufacturer of voting machine equipment.

Does Unisyn manufacture Dominion Voting Solution machines? I don’t have the answer to that but Unisyn’s Barry Herron is Dominion’s lobbyist for GA.

Along with Bob Urosevich’s ES&S, Unisyn is also one of the voting systems companies certifying the 2020 US election was the safest in history.

How important is this information? If attorneys Rudy Guliani and Sydney Powell don’t have this information yet, it will be vital in court to show the voting machine source code and system was known to be threats to national security in its previous use.

Throughout the rest of this article, I’ll be referring to “background” The Case of the Diebold FTP Site Part of the Voting and Elections web pages by Douglas W. Jones Head of THE UNIVERSITY OF IOWA Department of Computer Science. The reference will be (DWJ). His study which refers to The Johns Hopkins Study On Voting Systems (Hopkins) as well as the SAIC (Science Applications International Corp). These three reports led to the decertification of the previous iteration of Dominion’s source code and software in various states and Dr. Jones has testified before Congress on these specific issues. 

I’ll also be referring to the NBC article (NBC), ‘Online and vulnerable’: Experts find nearly three dozen U.S. voting systems connected to internet which shows the problems the same voter software and source code used by Global Elections over 20 years ago is why Dominion Voting Systems/Diebold and ES&S/Diebold are still a national security threat today the same way they were labeled as such 17 years ago.

Lastly, How New Voting Machines Could Hack Our Democracy Jennifer Cohn for the New York Review of Books (NYRB) shows the updated methodology combined with Dominion’s source code makes election fraud easy. Comparing this to the Hopkins study or the paper by (DWG) it’s clear the level of threat election security is facing today.

At every waypoint in the election cycle from certification, planning, voting, absentee and mail-in votes, county reporting on the GEMS (General Election Management Systems), this system provides the means to monitor and change votes in real-time and even during the ballot reporting at the county level. 

Throughout its history, whenever Diebold/Dominion’s source code, software, and method were inspected, it was moved under a new corporate logo. 

How secure are the 2020 elections?

Cracking Dominion?™s Source Code - A National Security Threat Since 2003

Using Modems for federal elections decertifies voting machines.

The state of Michigan is currently grappling with this issue. Since the 2016 election, Michigan authorized $82 million dollars to upgrade its election systems. Some of that money was spent on tabulators with wireless modems. But now, some state officials worry that the machines may pose a security risk and are pushing to have the modems removed.(NBC)

Some of the companies, agencies, groups, and people certifying the 2020 election as the safest in history represent a who’s who of people to investigate for 2020 election fraud. If one voting system company is looked at under a microscope, more of them will fall soon thereafter.

For Georgia, this means the broken Diebold system Herron replaced with new Dominion machines is the same made to be hacked system Georgia already had with a few new add-ons.

LAN and hard lines

Because hacking into the systems is easy they way Diebold/Dominion set it up, according to (DWG)’s report even the use of LAN and hard lines pose a significant security problem.

Allegation #53 (p. 16):

Physical access to the voting results may not even be necessary to acquire the voting records if they are transmitted across the Internet.”

Diebold Response:

Results are not transmitted over the Internet.

My Added Comment:

But we know that result transmission uses telephone, PPP, and a username and password, from Page 14 of the Hopkins report, quoted in Allegation #40. Therefore, it is quite possible that election central will have a LAN connection using Internet protocol, perhaps used to connect a modem bank with a single PC. This LAN may not be as vulnerable as the public Internet, but it is vulnerable to packet snooping and several other attacks, and must therefore be carefully secured. Furthermore, if an adversary can dial into the PPP host and await connections, Trojan horse applications on the voting system could communicate with the adversary using PPP without talking to the GEMS system at all. (DWG)

In its previous iteration under the Diebold logo, access to GEMS was already provided. Using a latent Trojan or latent dynamic code that isn’t detectable during certification or is added later and goes live during the election isn’t just possible with this system. Every door for it happening has been left open for over 22 years of election cycles.

Diebold (now Dominion) made public assurances that GEMS servers were/are not connected to networks despite the fact that some were. If GEMS has a pool of modems it is connected to the telephone system and security depends on how the modems are managed and who is managing them. Telephone networks are considered part of the internet. A GEMS server could be dialed and corrupt data directly. The modem bank can be tunneled through to gain access to the polling places and corrupt election machines directly. (DWG)

That fact alone along with Dominion Voting Systems specifically being the owner of this system is enough to decertify not just the elections Dominion contracted for, but the equipment itself, already long considered a threat to election security.



Intrusion into the General Election Management System (GEMS)

From its inception this election system used 3rd party add-ons. This includes Microsoft Windows OS and Microsoft Office software which depending on the definition used for can be loaded with other COTS (commercial off the shelf 3rd party software).

The problem found with Microsoft components (DWG) is the use of dynamic coding which can be used to change ballot results. From the beginning (1997), Bob Urosevich and Barry Herron insisted this was not subject to a source code audit.

The same Microsoft ACCESS program is shown above to swiftly and undetectably change the audit trail and results is what Diebold/ES&S and Diebold/Dominion demand protection for.

When Diebold (using Dominion’s current source code) was audited by Metamor for the FEC/NASED, they found the security of GEMS and the integrity of the audit trails were compromised because Microsoft Access can easily change that audit trail.

Diebold (now Dominion) convinced Metamor this wasn’t a problem for them because it was up to the customer to secure the election. In other words, they provided the means, training, and support for the crime, but cannot be held liable themselves.

According to (DWG’s report) this was despite the fact that Diebold (now Dominion) was aware that this security was being routinely breached: “Jane (I think it was Jane) did some fancy footwork on the .mdb file in Gaston [county Florida?] recently, I know our dealers do it. King County is famous for it. That’s why we’ve never put a password on the file before.” [See BlackBoxVoting on Diebold’s Internal Memos or Alteration of Audit Log Access.]

While this is damning, it only gets worse. After Diebold’s source code was found on their website and examined, the code for the GEMS system used to manage elections and the Accutouch terminal was found. What became clear to (DWG) is the same code errors he pointed out half a decade earlier to Bob Urosevich and Barry Herron at Global Elections followed them to Diebold and was still in use.

This one point made Dr. Jones call for  HYPERLINK “http://avirubin.com/vote.pdf” the decertification of the Diebold (Dominion) system directly after reading the John Hopkins University report.

Mail-in votes

In the (DWJ) report Diebold’s (now Dominion’s) assertion that security loopholes in their voting system is of no importance because customer safeguards prevent exposure.

But, despite supervision in a San Louis Obispo County election, the GEMS system used to accumulate absentee and mail-in ballots were connected to the Diebold FTP site live and the tally of votes was noted midway through the election. For this to be posted on GEMS is normal for any election. How did Diebold comes into possession of this data and post it on their website?

Sneakernet

Before the internet existed, sneakernet was the way hacking was done by loading floppy discs or smartcards into the victim’s computer and adding malicious code or software.

We’ve all seen the videos of thumb drives handed off during the 2020 election. The fact they weren’t secured should have decertified the results. Smartcards and thumb drives were noted in (DWG)’s report as a major concern. In 2003, smartcards provided the interface for concern but these machines were not protected against inconspicuous devices like USB flash drives.

The locks on the machines themselves were noted to be so cheap it took no longer than 3 seconds to go past them. Gaining access took a team testing Diebold security 3 guesses to get the password and  because Diebold (Dominion) uses the same login system-wide only one password gained supervisor credentials for every machine. 

When Diebold/Dominion’s source code was read the researchers discovered a class of Security Key Cards that could be used to change default passwords. 

Voting Machines

If it were the case that Diebold’s machinery offered the possibility of a real audit of an election, in the same way that corporate accounting systems are supposed to be auditable, partisan bias on the part of the vendor would not be a problem, but this is not the case with direct-recording voting machines such as the Diebold AccuVote TS. Democrats want election machine firm thrown out, in the Port Clinton News Herald, August 27, 2003 and  Voting machine controversy, in the Cleveland Plain Dealer, August 28.](DWG)

Universal Ballot Marking (BMDs)

According to Jennifer Cohn’s article on December 17, 2019 (NYRB), Universal use Ballot Marking Devices or BMDs function as electronic pens, mark your selections on paper on your behalf. Although vendors, election officials, and others often refer to this paper as a “paper ballot,” it differs from a traditional hand-marked paper ballot in that it is marked by a machine, which can be hacked without detection in a manual recount or audit. These pricey and unnecessary systems are sold by opaquely financed vendors who use donations and other gifts to entice election officials to buy them.

These scholars warn that even a robust manual audit, known as a Risk Limiting Audit, cannot detect whether a BMD-marked paper ballot has been hacked. BMDs instead put the burden on voters themselves to detect whether such ballots include fraudulent or erroneous machine marks or omissions—even though studies already show that many voters won’t notice.

Andrew Appel, an election security expert at Princeton University, said Georgia currently “has the least-secure voting machines now of any state” and is right to replace them.

But he said the touchscreen ballot-marking devices and optical scanners of the new system are easily hackable. And the system relies on voters to check their own paper ballots when research shows they do a poor job of it.

Printed-out ballots will include the text of voters’ choices, but scanning machines will read computerized bar codes to count ballots.-AJC

This means the only real audit trail existing today is in the hands of voters when they leave the polling station. The BMD ballot they cast is unreadable barcode. Their ballot can be changed at every point along the way at the voting machine to the GEMS system. 

Patches and new software

The ability to install patches or new software that wasn’t certified has many risks, including the introduction of new bugs and more opportunities for tampering. It is even more risky if different patches can be installed at the last minute in particular jurisdictions,” says David Dill, professor of computer science at Stanford University.

This opens the possibility of customized tampering by people who know exactly which races they want to affect, or bugs that are even less likely to be caught because they only occur in a small number of locations,” says Dill. “Of course, even if the certified code is frozen, it is easy to think of ways that undetectable back-doors could be installed in the software so that someone at the election site could choose the winner of the election.” -Bev Harris

SAIC Conclusions on Dominion’s source code

The final paragraph of the executive summary of the SAIC report on the Diebold (now Dominion) system is pretty damning. The system is made to compromise. At the time six years had passed from the time the routes of compromise were discovered and Diebold’s system, now owned by Dominion is the same.

The system, as implemented in policy, procedure, and technology, is at high risk of compromise. Application of the listed mitigations will reduce the risk to the system. Any computerized voting system implemented using the present set of policies and procedures would require these same mitigations. [Page V, final paragraph.]

See Risk Assessment Report: Diebold Accuvote-TS Voting System and Processes, SAIC-6099-2003-261, Sept 2, 2003]

Furthermore, since SAIC examined the current certified version of the code, the version number of which was redacted in the body of the text but exposed in Appendix D as 4.3.1.5, this seriously damages Diebold’s claims that the flaws reported in the Hopkins study were in old code that is not used in real elections.- (DWG)

With an over 20 year history of providing every means of election fraud possible, training people how to do it, making sure elections are hackable, can Dominion or ES&S claim innocence in 2020?


These election vendors have a history that’s mocked in Congress about the bribes they payout to the National Association of Secretaries of State (NASS) and other concerned parties. 

Because the 2020 election season was Federal, every machine in every county that was hooked up to a modem was decertified for a federal election. In fact, the argument as shown above can be made for every system connected to any form of telephone systems as a backdoor to the internet and hackers.

Every state using the Dominion system ran decertified elections. The states elected to ignore federal election standards.

Can states that did not meet federal rules for elections after adding them into their own election certification requirements be considered legitimate participants in the 2020 election by choosing to ignore their own election standards? 

The answer is no.







TOPICS: News/Current Events; US: Georgia; US: Pennsylvania
KEYWORDS: dominion; dvs; electionfraud; microsoft; nationalsecurity; software; stopthesteal; votefraud
Navigation: use the links below to view more comments.
first 1-2021-32 next last

1 posted on 12/29/2020 1:11:40 PM PST by TigerLikesRoosterNew
[ Post Reply | Private Reply | View Replies]

To: TigerLikesRoosterNew

The Devil is in the DETAILS........................


2 posted on 12/29/2020 1:13:05 PM PST by Red Badger ( “The goal of socialism is communism.”... Vladimir Lenin)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRoosterNew; All

Thanks for picture in OP. I haven’t seen a Dominion combination ballot counter / copying machine that close before. And based on what I’ve heard about that machine, that’s not necessarily sarcasm.


3 posted on 12/29/2020 1:21:10 PM PST by Amendment10
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRoosterNew

They rigged the Voting Machine software so Donald Trump could never win.

Analysis of 2020 Presidential Election vote count reporting anomalies
https://sites.google.com/view/2020prezelectionvotecounts/home

Conclusion

As demonstrated above there is evidence beyond reasonable doubt of illegal
vote count manipulation by vote counting/reporting software used in
multiple states, indicative of systemic issues in this election. The data
shows that upwards of a million votes were thrown out or switched in
Pennsylvania and several thousand in the other states.

Also, as shown in the previous section there is smoking gun evidence of
stealing write-in votes and infusion of fake absentee vote counts by Scytl
and Dominion reporting software. A full audit and hand recount of all legal
ballots cast in the affected states should be done, to ensure that legal
voters are not disenfranchised.


4 posted on 12/29/2020 1:21:35 PM PST by Son House
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

Save!


5 posted on 12/29/2020 1:22:27 PM PST by Freeper (Democrats - Please STOP representing MY country!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: TigerLikesRoosterNew

The media is part of the cover-up.


6 posted on 12/29/2020 1:27:27 PM PST by FreedBird (T)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRoosterNew

So, my question is how many of the States using these will get rid of them before the next elections?


7 posted on 12/29/2020 1:27:48 PM PST by Old Retired Army Guy
[ Post Reply | Private Reply | To 1 | View Replies]

To: Old Retired Army Guy
So, my question is how many of the States using these will get rid of them before the next elections?

Answer: ZERO states will get rid of them.

Trump had a window of several weeks to have these machines seized and audited by the military or via a presidential special counsel. That window of time has now passed. All he does is tweet. AZ and MI are slow-walking their machine litigation.

These machines are here to stay, throwing elections to Dems and RINOs.

A conservative will never be elected president again.

I'm from TN and found out a couple of weeks ago that we use Dominion machines. TN is redder than red, and I have wondered for years how the voters could elect RINOs like Lamar Alexander. Now I know why.

8 posted on 12/29/2020 1:38:33 PM PST by HandBasketHell
[ Post Reply | Private Reply | To 7 | View Replies]

To: HandBasketHell

I hope you are wrong. We should get rid of all computer voting machines and return to manual hand count of all paper ballots.


9 posted on 12/29/2020 1:41:13 PM PST by Old Retired Army Guy
[ Post Reply | Private Reply | To 8 | View Replies]

To: Red Badger
The Devil is in the DETAILS........................

And a typical legislator can read this article and understand none of the details.

If he or she is asked about the article, the response will be "I don't understand any of that weird geeky stuff. The nice Dominion salesman said their voting machines were secure! He had such a sincere smile! That's good enough for me."

The ignorance is bipartisan. God love her, but Sidney Powell does a terrible job of explaining the technical details of how Dominion machines were hacked. Her ignorance of basic computer concepts and terminology puts her at a real disadvantage.

10 posted on 12/29/2020 1:47:10 PM PST by TChad (The MSM, having nuked its own credibility, is now bombing the rubble.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: HandBasketHell

All it takes is to bribe 2 people in a state:

(1) Secretary of State
(2) Governor

After that is done, it does not matter how red the state is.
Those 2 individuals can buy and install the voting machines they want.

This is a systemic problem. Not smart to give each county complete authority in running a nation wide election for president/VP. The voting administration should be based on scope of office. States should run state elections, counties should run county wide elections, etc.


11 posted on 12/29/2020 1:49:37 PM PST by entropy12 (Those who vote decide nothing, those who count votes decide everything--Joseph Stalin)
[ Post Reply | Private Reply | To 8 | View Replies]

To: TigerLikesRoosterNew

I am a computer software engineer for a living for the past 30 years.

No company I ever worked for would accept a secure system without demanding the source code.

How would they know we didn’t put a backdoor in for ourselves? Or an enemy agent?

All the above evidence is good but it shouldn’t be necessary.

There is nothing ‘proprietary’ about voting software if you want to be able to audit it.

That, plus the ability to rebuild the software from the source code, is absolutely necessary for auditing.


12 posted on 12/29/2020 1:50:58 PM PST by Mr. K (No consequence of repealing obamacare is worse than obamacare itself)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRoosterNew

At the bottom of the thread’s original post: “Mitch, You Do Realize That Many Deplorables Will Never Vote GOP Again If You Don’t Fix This?”

Many, many votes will still be cast for the various RINO’s and other traitors for years to come that will keep enough of the Republican party alive so there is a pretend two party system.

Now my statement is made if Dominion software is kept and still used in the future. If it is still here for 2022 and beyond, just about anyone can be elected whether or not the people actually want him elected.

This is why future voting is a waste of time unless this fraud is addressed right now and each voting district in the US goes to a verifiable system, such as paper ballots, manual counting, one single voting day, verified voters and totally transparent vote counting.


13 posted on 12/29/2020 1:55:30 PM PST by redfreedom (Member of Agent Orange Health Club Since 1969)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRoosterNew

L8r


14 posted on 12/29/2020 2:00:28 PM PST by NEPA (Repeal the 17th)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TChad

There is another problem. Sidney brought in experts to explain what the problem is. To me, their reaction is, “Blah, blah, blah. I don’t know what the hell is going on, but it does not matter. Their testimony fails to convince me. Therefore, I will dismiss your suit.”


15 posted on 12/29/2020 2:16:41 PM PST by TigerLikesRoosterNew
[ Post Reply | Private Reply | To 10 | View Replies]

To: TigerLikesRoosterNew
their reaction I meant the reaction of presiding judge
16 posted on 12/29/2020 2:24:35 PM PST by TigerLikesRoosterNew
[ Post Reply | Private Reply | To 15 | View Replies]

To: Mr. K

I’ve been in the tech industry for over 3 decades, research and development computing systems.

We generate, acquire, analyze and disseminate data in critical compute architecture design.

I say that to say this...when I see the evidence of data anomalies to the degree and scope as what has been uncovered, it raises red flags big time.

From the hundreds of various instances of vote tally anomalies, several stand out to the point of screaming fraud. Many are statistically improbable at the least, these few in swing states are absolutely statistically impossible.

If the courts, state legislatures, grand juries refuse to consider the evidence..our republic has failed.

We are in a constitutional crisis.


17 posted on 12/29/2020 2:37:18 PM PST by servantboy777
[ Post Reply | Private Reply | To 12 | View Replies]

To: TigerLikesRoosterNew; All

They Rigged the Voting Machine Software so Donald Trump Could Never Win.
https://freerepublic.com/focus/f-chat/3919806/posts


18 posted on 12/29/2020 2:39:41 PM PST by Son House
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRoosterNew

What a crock! 17 years of treason and corruption! And can’t fix it!!!! Thousands of ppl need to perish for incompetence, complicity, and all the other legal reasons for attempting to destroy this great country!


19 posted on 12/29/2020 2:44:54 PM PST by SgtHooper (If you remember the 60's, YOU WEREN'T THERE!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigerLikesRoosterNew

On the programs we tested, the Election summary (totals, county wide) come from the vote ledger 2 instead of vote ledger 1, and ledger 2 can be altered so it may or may not match ledger 1.

Now, think of it like this: You want the report to add up only the actual votes. But, unbeknownst to the election supervisor, votes can be added and subtracted from vote ledger 2. Official reports come from vote ledger 2, which has been disengaged from vote ledger 1. If one asks for a detailed report for some precincts, though, the report comes from vote ledger 1. Therefore, if you keep the correct votes in vote ledger 1, a spot check of detailed precincts (even if you compare voter-verified paper ballots) will always be correct.

While the machines themselves might not have diddled the votes directly, they were designed to make it trivial for someone to do so after the fact without getting caught. Using two ledgers is a classic method that embezzlers have used since forever to steal money.

The Access .mdb database files can be password protected at the database level, but it looks like that feature wasn't used, making it trivial to hack ledger 2 without any detection or any auditing.

20 posted on 12/29/2020 3:00:58 PM PST by Gideon7
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-32 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson