(Joe Hoft) An IT specialist reached out to the Gateway Pundit and provided more evidence regarding the weak and non-existent system controls in place in the Dominion voting machines and applications. These machines never should have been used in a Presidential election.
by Jim Hoft, November 13, 2020
One IT system expert told us that he never would have approved the Dominion system for use. It is that bad. Another IT expert provided a review of Dominion based on a vendor user guide he obtained.
In the post above we shared a tweet where Ron@CodeMonkeyZ stated that the local IT guy as the power to decide elections:
After reviewing the Dominion Voting System user manual, it seems the local IT guy who services the machines is theoretically the ultimate political gatekeeper.
He has absolute power to decide elections.
— Ron (@CodeMonkeyZ) November 11, 2020
This evening another IT expert noted that one of the complaints of the Trump lawsuit in Pennsylvania is the following:
The entire election could have been decided in these back rooms with nobody present.
Our IT expert then located an audit of the Dominion system in California which is out on the Internet. In the related audit report the state of California showed a high level diagram of the Dominion system which should be similar to the setup in Pennsylvania:
This diagram shows that there are laptops or workstations onsite that some of the workers can access after the ballot images are scanned in. Our expert states that he kept thinking about the USB drives in the lawsuit and immediately noticed this is where election data (i.e. forged/faked images) could be inserted.
In the audit report the auditor states:
The Secretary of State ran the Functional Test as if it were a jurisdiction that just purchased the voting system. Testing of the system began by setting up all equipment in a configuration that mirrored a production voting system. The DS5.10 architecture allows elections officials to use one or more, permanent server(s) and set of centraloffice voting devices, known to be running unaltered, certified software and firmware to create memory cards before each election and to use another, physically separate “sacrificial” server and set of voting devices after the election to tabulate results and generate reports. To transfer election specific data, the ICP2 machines utilize SD cards, the ICC and ICE machines utilize CF cards, and the ICX utilizes USB sticks. The election specific data (files) transferred on these cards are encrypted. An iButton is required to unencrypt the SD and CF cards for the ICP2, ICC, and ICE, and a smartcard is needed to unencrypt the USB sticks used to transfer data to the ICX machines. The key used for these devices can be unified or not. A unified key is one that is election specific. A key specific to that iButton (polling place specific) can be used also. This would prevent a malicious actor from accessing the entire system with just one key.
In the audit it is reported:
During the ICX source code vulnerability review, one potential vulnerability was discovered and the level of access required to take advantage of this potential vulnerability would be open to a variety of actors including a voter, a poll worker, an election official insider, and a vendor insider. This potential vulnerability has a more widespread potential. Polling place procedural controls are one method of mitigating this issue, with poll workers actively verifying that the USB ports are covered and the covers sealed to prevent access.
This means unless you block the USB ports they are at risk of being compromised. But then the report mentions the key control weakness in these machines:
Vote-stealing software could easily be constructed that looks for undervotes on the ballot, and marks those unvoted spaces for the candidate of the hacker’s choice. This is very straightforward to do on optical-scan bubble ballots (as on the Dominion ICE) where undervotes are indicated by no mark at all. The autocast configuration setting that allows the voter to indicate, “don’t eject the ballot for my review, just print it and cast it without me looking at it.” If fraudulent software were installed, it could change all the votes of any voter who selected this option, because the voting machine software would know in advance of printing that the voter had waived the opportunity to inspect the printed ballot.
Finally, in situations like in Arizona, where voters were given sharpies instead of pens, the Dominion system could identify ink types and kick these votes out of the system.
The Dominion system was ripe for fraud and never should have been allowed near the Democrat Party.
About The Author
Joe Hoft is the twin brother of TGP’s founder, Jim Hoft. His posts have been retweeted by President Trump and have made the headlines at the Drudge Report. Joe worked as a corporate executive in Hong Kong and traveled the world for his work, which gives him a unique perspective of US and global current events. He has ten degrees or designations and is the author of three books. His new book: ‘In God We Trust: Not in Lying Liberal Lunatics’ is out now – please take a look and buy a copy.
Stillness in the Storm Editor: Why did we post this?
The news is important to all people because it is where we come to know new things about the world, which leads to the development of more life goals that lead to life wisdom. The news also serves as a social connection tool, as we tend to relate to those who know about and believe the things we do. With the power of an open truth-seeking mind in hand, the individual can grow wise and the collective can prosper.
Not sure how to make sense of this? Want to learn how to discern like a pro? Read this essential guide to discernment, analysis of claims, and understanding the truth in a world of deception: 4 Key Steps of Discernment – Advanced Truth-Seeking Tools.
Stillness in the Storm Editor’s note: Did you find a spelling error or grammar mistake? Send an email to firstname.lastname@example.org, with the error and suggested correction, along with the headline and url. Do you think this article needs an update? Or do you just have some feedback? Send us an email at email@example.com. Thank you for reading.