Hackers May Have Been Allowed Unsupervised Access to Ballot Counting Areas

THINK AMERICANA | By Troy Mullens | November 16, 2020

There are more problems with the Dominion software system that was used to tabulate the ballots from the election.

Initially, we learned about the “glitches”, but it looks like there are more serious issues than just that.

We know that the glitches aren’t really glitches at all, but they were backdoors in which an algorithm was programmed to calculate how many votes Joe Biden would need to overtake President Trump and then fix the results to reflect such.

Besides that, we’ve learned that the machines are subject to bugs, glitches, viruses, and hackers.

According to one of the complaints in the lawsuit against Pennsylvania, there were people with USB drives that were allowed into a secured area with unsupervised access to the machines.

“Also in Delaware County, an observer in the county office where mail-in ballots were counted witnessed a delivery on November 5, 2020, of v-cards or USB drives in a plastic bag with no seal and no accompanying paper ballots. The v-cards or USB drives were taken to the back counting room, where observer access was limited. There was no opportunity to observe what happened to the v-cards or USB drives in the back counting room.”

An IT expert ended up finding an audit of the Dominion software and it sheds some more light on an already bad situation for Democrats who have fought to rig this election.

During the ICX source code vulnerability review, one potential vulnerability was discovered and the level of access required to take advantage of this potential vulnerability would be open to a variety of actors including a voter, a poll worker, an election official insider, and a vendor insider. This potential vulnerability has a more widespread potential. Polling place procedural controls are one method of mitigating this issue, with poll workers actively verifying that the USB ports are covered and the covers sealed to prevent access.

So what that means is that unless you intentionally block access to these ports they will remain open and that the poll workers should be verifying that the USB ports are covered and that those covers are sealed.

Ther are many ways of blocking off USB ports, but it seems like this was not done. The audit continues to say,

Vote-stealing software could easily be constructed that looks for undervotes on the ballot, and marks those unvoted spaces for the candidate of the hacker’s choice. This is very straightforward to do on optical-scan bubble ballots (as on the Dominion ICE) where undervotes are indicated by no mark at all. The autocast configuration setting that allows the voter to indicate, “don’t eject the ballot for my review, just print it and cast it without me looking at it.” If fraudulent software were installed, it could change all the votes of any voter who selected this option, because the voting machine software would know in advance of printing that the voter had waived the opportunity to inspect the printed ballot.

America's Civil War Rising

America's Civil War Rising (ACWR) is a grassroots educational and public benefits organization. All views and opinions expressed by third-party contributors and authors that are posted and contained on our website herein are solely their own and do not necessarily represent the views and opinions of ACWR, its founding members, volunteers, and/or supporters. ACWR strives to ensure the accuracy and credibility of all news and information but makes no claim as to the veracity or accuracy of any of the views or opinions expressed by third-party authors herein.

Sign Up for Daily Email Notifications of Our Posts

Email Address *

ORDER OUR BOOKS

READ OUR BOOK REVIEWSAND ORDER YOUR COPIES NOW!