Posted on 06/03/2022 2:45:12 PM PDT by MercyFlush
CISA has released an Industrial Controls Systems Advisory (ICSA) detailing vulnerabilities affecting versions of the Dominion Voting Systems Democracy Suite ImageCast X, which is an in-person voting system used to allow voters to mark their ballot.
Exploitation of these vulnerabilities would require physical access to individual ImageCast X devices, access to the Election Management System (EMS), or the ability to modify files before they are uploaded to ImageCast X devices. Jurisdictions can prevent and/or detect the exploitation of these vulnerabilities by diligently applying the mitigations recommended in ICSA-22-154A, including technical, physical, and operational controls that limit unauthorized access or manipulation of voting systems. Many of these mitigations are already typically standard practice in jurisdictions where these devices are in use and can be enhanced to further guard against exploitation of these vulnerabilities.
While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.
Ping.
“vulnerabilities”
OK, that’s a long and fancy way to spell fraud.
.
Good, it’s a start.
Why didn’t the US Election Assistance Commission catch these? They were certifying voting machines.
They covered their tracks.
So they decided to step up to the plate and use their clout because they’re sick of Biden too?
Gonna be seeing a lot of this change of heart stuff in the coming months.
The basic premise in cyber security is no system is secure. Security vulnerabilities can only be mitigated, not eliminated. It only takes a little logic and intellect to understand that our elections are highly vulnerable to fraud. Every complexity introduced to the election process provides another avenue to fraud, whether it is electronic voting machines, counting machines, mail-in voting, or drop boxes.
I am sick of lazy asses that want mail-in voting. There's plenty right here on FR. You are morons. You care not about your vote or country. I am fed up with Republicans that control state legislatures that refuse to do the right thing and do what is well known to secure elections. I am been long finished with FoxNews and other media outlets that have refused to report on election fraud. As for Democrats, they can eat schiff, die and burn in hell. Every single last one of them.
Who's to say vulnerabilities weren't a certification prerequisite for the USEAC?
Probably one of the best posts it’s been my privilege to read this year and I am honored that you addressed it to me.
Bring back punch cards, they were reliable and cheap.
Any of the officials who continued to push the narrative that the 2020 election was “free and fair” does not know what they are talking about and is committing perjury.
If any defense or financial company was notified that enterprise software they used had vulnerabilities like this they would immediately shutdown the software and conduct a forensic audit to determine if a breach has occured.
Every Dominion machine needs to be forensically audited in every state where they were used. Until Dominion can address the vulnerabilities and prove that they are secure they should not be used in any election.
And, as I recall, ALL THREE were consistently violated many times in November 2020.
don’t forget the fix was in for 2020 at CISA:
“Christopher Krebs, former director of CISA, refuted claims the presidential election was corrupt on his first interview since his dismissal on Nov. 18.”
trump fired Krebs by tweet shortly after Krebs categorically rejected trumps claims of election fraud in 2020
https://www.foxnews.com/politics/trump-fires-cisa-director-chris-krebs-election-security
FR really needs a like button.
You are correct, sir!
Casinos solved this problem a long time ago. This is the basic process:
Binaries in the machine and the src have to be sent to a gaming control board. Experts look through the src for “cheats” such as “while slot wheels are turning and lever is pulled 4 times quickly during, and the bet was $20, pay out the jackpot.”. They compile the src and the resulting binary it must match what’s installed. Operational testing is done. Then the firmware is certified for use and only machines with that firmare (checksum) can be placed on the gaming floor. Any updates have to go through the same process. The machines can not have any outside access.
It’s already been amply demonstrated that scads of Dominion machines were connected to the net before, during, and after the vote was in progress.
And then there were stories of a lot of cheating using “standard” features. Like turning on porportional voting. Each Biden equals one vote and each Trump vote equals .85.
It was that update the day before or on election day that I think played a big role. Reboot the system a day or 2 later and poof, no fingerprints. You can make sw do anything, especially when running at root or admin privileges, and leave no traces.
>OK, that’s a long and fancy way to spell fraud
Why are the Dominion vote tabulators,
connected to the Internet?
designed to keep fractional vote tallies?
allowing direct access to “protected” databases via SQL?
using USB ports?
producing extremely high error rates requiring manual adjudication?
allowing the capability to flip votes?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.