November 28, 2020

Sworn affidavit by computer expert details how Dominion vote-counting machines were rigged

How many times have you heard the Dems and their allies in the Lying Mainstream Media say 

"There is no evidence of ANY vote fraud in our recent election!  This election was the most honest and transparent in our history!  Believe us!"
Well...a guy you've never heard of has filed a sworn affidavit that gives all the details of how rigged vote-counting software from Dominion Systems stole the election for the Democrats.

Ah, I hear my liberal PhD friend say, "You moron Rethuglicans dredge up some blogger who claims my wonderful, pristine, honest Democrats stole the election using mind-control rays from the planet Zargon, and you're dumb enough to buy it!  Next you'll be claiming 'Hammer' and 'Scorecard' are real election-stealing cyber-tools used by the CIA!  Geez you Rethuglicans are STUPID!"

But in this case the affiant's CV was endorsed by none other than the vaunted NY Times just 11 weeks ago.  They described him as having done decades of cybersecurity and technical counterintelligence work for the C.I.A., N.S.A. and F.B.I.,  and as being "always the smartest person in the room." 

Eh, maybe the always-right NY Times was wrong just this one time.  Or something.  Surely your team will find a way to debunk any evidence, no matter how solid.  It's how you roll.  And with cover from the Lying Mainstream Media you're sure to get away with it.  After all, it's always worked before.

Gosh, maybe conservatives should just give up and accept that all those sworn statements by people claiming to have witnessed fraud were lies, eh?

Well...here are the relevant parts of the affidavit.  Tell us how meaningless it is, Democrats.

4. The USIC [intelligence community] has developed the Hammer and Scorecard tools, which were released by Wiki Leaks and independently confirmed by... Kirk Wiebe, former NSA official
and Dennis Montgomery, former CIA analyst.  The Hammer and Scorecard capabilities are
used by US intelligence analysts to conduct... attacks on foreign voting systems, including the Dominion Voting System (DVS) Democracy Suite and Systems and Software (ES&S) voting machines without leaving an electronic fingerprint. As such, these tools are used...to influence voting systems by covertly accessing DVS and altering the results in real-time and without leaving an electronic fingerprint.

6. I have performed forensic analysis of...the DVS Democracy Suite, ES&S (acquired by DVS), Scytl/SOE Software, and the Smartmatic systems used in hundreds of precincts in key battleground states. I have discovered major exploitable vulnerabilities...that permit a nefarious operator to perform sensitive functions via its built-in covert backdoor. The backdoor enables an operator to perform system updates and testing via the Internet without detection...[and] to conduct illicit activities such as shifting votes, deleting votes, or adding votes in real-time (Source: DVS Democracy Suite EMS Manual, version 5.11-CO::7, P.43). These events can take place through the Internet and without leaving a trace.

7.  I have studied network communication reports that show DVS data being transferred to Internet Protocol (IP) addresses registered to Scytl in Barcelona, Spain. The results showed that Scytl maintained its SOE Software servers in a Barcelona data center for disaster recovery and backup purposes. In 2020, the SOE Software data center was moved to Frankfurt Germany....

12. In 2019 a laptop computer and several USB memory cards containing the cryptographic key to access DVS systems were stolen in Philadelphia.

13. In 2018, NY Times conducted an investigation and concluded that DVS machines can be easily hacked.  Security experts conducted comprehensive security testing on DVS in August 2019 and discovered [numerous] exploitable vulnerabilities.....

15. I have not been granted access to examine any of the systems used in the 2020 Election. However, I have conducted detailed analysis of the NY Times data sets and have discovered significant anomalies [suggesting] fraudulent manipulation of the results. In my expert judgment, the evidence is widespread and throughout all battleground states I have studied. I conclude the following:

a. The vote count distributions in PA, WI, MI, AZ, NV, and GA [suggest they] are not based on normal system operation [but were] caused by fraudulent electronic manipulation of the targeted voting machines.

b. On approximately 2:30 AM EST, TV broadcasts reported that PA, WI, AZ, NV and GA  decided to cease vote counting operations. The [near-simultaneous] decision to stop counting in all 5 battleground states is highly unusual, and demonstrates prior coordination by election officials in battleground states.  [But] equally puzzling is that vote counting did not stop [but] continued behind closed doors in the early hours of November 4th. This activity is highly unusually and demonstrates collusion to achieve the desired results without being monitored by watchers.

c. When analyzing the NT Times data for the 2020 election, I conclude that the software algorithm [forged] between 1-2% of the precinct results to favor Vice President Biden. The software performed data alteration in real-time in order to maintain close parity between the candidates and without raising red flags.

d. The DVS Democracy Suiteā€™s ImageCast Central optical scanner failed to correctly verify and validate absentee ballots, as described in its own literature. There is reported evidence that the optical scanner accepted... ballots that did not have signatures or other key features required for ballot validation and verification. This indicates that the DVS system configuration was modified to accept invalid ballots when they should have been rejected.

e. After the DVS ImageCast scanner validates a ballot, by design it is required to tabulate and store the results in a cast-vote record, along with a human-readable image of the ballot that has been scanned. The image, called AuditMark, provides the user with scanned results that are verifiable.  However, media reports indicate that not only did the ImageCast fail to properly verify absentee ballots; it also failed to maintain records of the AutitMark that would be necessary to conduct an audit. The only way to alter this protocol is to alter the system configuration to prevent the ImageCast scanner from rejecting illegal ballots; and reprogram AuditMark to store ballot image that could be verified. This is evidence of fraud perpetrated to prevent investigators to discover the number of invalid votes that were cast. 

f. The cryptographic key stored on a DVS thumb drive (reported stolen in Philadelphia) was used alter vote counts prior to up chain reporting. Since DVS uses the same cryptographic key for all its voting systems in all states, the key allowed a remote operator to conduct massive attacks on all battleground state data set without being detected.

g. Beginning on approximately 4:30 AM EST on November 4, 2020, the vote count [began to favor] Vice President Biden by nearly 80% in many jurisdictions. 

h. The data variance favoring Vice President continued to accelerate after 4:30 AM EST on November 4, 2020 and continued through November 9.  This abnormality...is evident in the unusually steep slope [of reported votes per unit time] for Vice President Biden in all battleground states on November 4, 2020. A sudden rise in slope is not normal and demonstrates data manipulation by artificial means.  In Edison County, MI, Vice President Biden received more than 100% of the votes at 5:59 PM EST on November 4, and 99.61% of the votes at 2:23 PM EST on November 5, 2020. These [results]...indicate fraud.

16. I conclude that a combination of the lost cryptographic key on the stolen USB memory cards, serious exploitable system and software vulnerabilities and operating system backdoor in DVS, Scytl, SOE Software/eClarity and Smartmatic created the perfect environment to commit widespread fraud in all states where these systems are installed. My analysis of the 2020 Election from NY Times data shows statistical anomalies across the battleground state votes. These failures are widespread and systemic and sufficient to invalidate the vote counts. 

17. I conclude with high confidence that the election 2020 data were altered in all battleground states resulting in a hundreds of thousands of votes that were cast for President Trump to be transferred to Vice President Biden. These alterations were the result of systemic and widespread exploitable vulnerabilities in DVS, Scytl/SOE Software and Smartmatic systems that enabled operators to achieve the desired results. In my view, the evidence is overwhelming and incontrovertible. 

Eh, this guy is probably just some blogger making who's making up this whole story.   In fact this alleged "expert" probably doesn't even exist.  Yeah, dat's da ticket!   Eleven weeks ago some Trump supporters prolly used an actor to trick the New York Times into believing the guy was a computer expert who'd worked for a bunch of intel agencies!

Say, it would be SO easy to expose this fake so-called "expert"!  Let's just subpoena him to testify in open court!  Boy, it's gonna be GREAT to expose the Trump team as fakers, eh?  Woohoo!  We're gonna get 'em good, right?

Say, I'm not seeing a lot of support here.  Am i missing something?  Is there some reason we shouldn't wanna get this fake "expert" into open court?

The full affidavit.

https://www.courtlistener.com/recap/gov.uscourts.mied.350905/gov.uscourts.mied.350905.1.19.pdf

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home