Elections in GA in 2020, huge development seems to me

snailspace

Loves Spam
Joined
Jul 27, 2022
Posts
2,332
Tom Fitton
@TomFitton
Subscribe

ALERT: A federal court in Northern District of Georgia (Atlanta Division) will allow plaintiffs to proceed to trial after they presented expert evidence which found 7 core vulnerabilities in the Dominion voting system:"

1. Attackers can alter the QR codes on printed ballots to modify voters’ selections;

2. Anyone with brief physical access to the BMD (ballot marking device) machines can install malware onto the machines;

3. Attackers can forge or manipulate the smart cards that a BMD uses to authenticate technicians, poll workers, and voters, which could then be used by anyone with physical access to the machines toinstall malware onto the BMDs;

4. Attackers can execute arbitrary code with supervisory privileges and then exploit it to spread malware to all BMDs across a countyor state;

5. Attackers can alter the BMD’s audit logs;6. Attackers with brief access to a single BMD or a single Poll Worker Card and PIN can obtain the county-wide cryptographic keys, which are used for authentication and to protect election results onscanner memory cards; and

7. A dishonest election worker with just brief access to the ICP scanner’s memory card could determine how individual voters voted."The main conclusions of the expert analysis of the Georgia computerized Dominion voting systems, as described by the Court:"•

The ICX BMDs [Dominion's ballot marking devices] are not sufficiently secured against technical compromise to withstand vote-altering attacks by bad actors who are likely to attack future elections in Georgia. . . • The ICX BMDs can be compromised to the same extent and as or more easily than the AccuVote TS and TS-X DREs they replaced. . . .• Despite the addition of a paper trail, ICX malware can still change individual votes and most election outcomes without detection . . . Although outcome-changing fraud conducted in this manner could be detected by a risk-limiting audit, Georgia requires a risk-limiting audit of only one contest every two years,27 so the vast majority of elections and contests have no such assurance. And even the most robust risk-limiting audit can only assess an election outcome; it cannot evaluate whether individual votes counted as intended. . . .• The ICX’s vulnerabilities also make it possible for anattacker to compromise the auditability of the ballots,by altering both the QR codes and the human readable text. Such cheating could not be detected by an [risk-limiting audit] or a hand count, since all records of the voter’s intent would be wrong. . . .• Using vulnerable ICX BMDs for all in-person voters, as Georgia does, greatly magnifies the security riskscompared to jurisdictions that use hand-marked paper ballots but provide BMDs to voter upon request. . . .• The critical vulnerabilities in the ICX — and the wide variety of lesser but still serious security issues — indicate that it was developed without sufficient attention to security during design, software engineering, and testing. . . . t would be extremely difficult to retrofit security into a system that was not initially produced with such a process."What can the court do if the plaintiffs succeed in trial?"Plaintiffs carry a heavy burden to establish a constitutional violation connected to Georgia’s BMD electronic voting system, whether in the manner inwhich the State Defendants have implemented the voting system — i.e., that it imposes serious security voting risks and burdens impacting Plaintiffs’ votingrights — or otherwise. If Plaintiffs prevail at trial on one or more of their claims, there are pragmatic, sound remedial policy measures that could be ordered or agreed upon by the parties, such as (1) providing for the use of printed ballots for vote counting without the use of QR codes, (2) administering a broader scope and number of election audits to address vote count accuracy and other related issues, and (3) implementing other essential cybersecurity measures and policies
recommended by the nation’s leading cybersecurity experts and firms, including the Department of Homeland Security’s CISA."
 
Last edited:
And there is this

Georgia Secretary of State Brad Raffensperger Refuses to Testify Under Oath About Security of State's Dominion Voting Machines

I have no interest nor time nor inclination to read your petty BS responses and or comments that will pretend the above is not true, or meaningless or whatever, feel free to degrade yourselves, I wont read
 
Tom Fitton
@TomFitton
Subscribe

ALERT: A federal court in Northern District of Georgia (Atlanta Division) will allow plaintiffs to proceed to trial after they presented expert evidence which found 7 core vulnerabilities in the Dominion voting system:"

1. Attackers can alter the QR codes on printed ballots to modify voters’ selections;

2. Anyone with brief physical access to the BMD (ballot marking device) machines can install malware onto the machines;

3. Attackers can forge or manipulate the smart cards that a BMD uses to authenticate technicians, poll workers, and voters, which could then be used by anyone with physical access to the machines toinstall malware onto the BMDs;

4. Attackers can execute arbitrary code with supervisory privileges and then exploit it to spread malware to all BMDs across a countyor state;

5. Attackers can alter the BMD’s audit logs;6. Attackers with brief access to a single BMD or a single Poll Worker Card and PIN can obtain the county-wide cryptographic keys, which are used for authentication and to protect election results onscanner memory cards; and

7. A dishonest election worker with just brief access to the ICP scanner’s memory card could determine how individual voters voted."The main conclusions of the expert analysis of the Georgia computerized Dominion voting systems, as described by the Court:"•

The ICX BMDs [Dominion's ballot marking devices] are not sufficiently secured against technical compromise to withstand vote-altering attacks by bad actors who are likely to attack future elections in Georgia. . . • The ICX BMDs can be compromised to the same extent and as or more easily than the AccuVote TS and TS-X DREs they replaced. . . .• Despite the addition of a paper trail, ICX malware can still change individual votes and most election outcomes without detection . . . Although outcome-changing fraud conducted in this manner could be detected by a risk-limiting audit, Georgia requires a risk-limiting audit of only one contest every two years,27 so the vast majority of elections and contests have no such assurance. And even the most robust risk-limiting audit can only assess an election outcome; it cannot evaluate whether individual votes counted as intended. . . .• The ICX’s vulnerabilities also make it possible for anattacker to compromise the auditability of the ballots,by altering both the QR codes and the human readable text. Such cheating could not be detected by an [risk-limiting audit] or a hand count, since all records of the voter’s intent would be wrong. . . .• Using vulnerable ICX BMDs for all in-person voters, as Georgia does, greatly magnifies the security riskscompared to jurisdictions that use hand-marked paper ballots but provide BMDs to voter upon request. . . .• The critical vulnerabilities in the ICX — and the wide variety of lesser but still serious security issues — indicate that it was developed without sufficient attention to security during design, software engineering, and testing. . . . t would be extremely difficult to retrofit security into a system that was not initially produced with such a process."What can the court do if the plaintiffs succeed in trial?"Plaintiffs carry a heavy burden to establish a constitutional violation connected to Georgia’s BMD electronic voting system, whether in the manner inwhich the State Defendants have implemented the voting system — i.e., that it imposes serious security voting risks and burdens impacting Plaintiffs’ votingrights — or otherwise. If Plaintiffs prevail at trial on one or more of their claims, there are pragmatic, sound remedial policy measures that could be ordered or agreed upon by the parties, such as (1) providing for the use of printed ballots for vote counting without the use of QR codes, (2) administering a broader scope and number of election audits to address vote count accuracy and other related issues, and (3) implementing other essential cybersecurity measures and policies
recommended by the nation’s leading cybersecurity experts and firms, including the Department of Homeland Security’s CISA."
Oh look another TF twitter post that sets the rwcj off on another group jerk off session!!

Wrongway just posted about Georgia, best you get over there before everyone else cums!
 
The report says that voting systems are vulnerable.

Got it.

The state Congress should call for testimony that gets answers on what is being done to address it.
 
The whole point of computerized voting machines, mail in ballots, and early voting… is to create opportunities for fraud.
Incorrect

Those who aren’t concerned about fraud are people who are confident their side will benefit from it.
Define "concerned"

Given that humans will lie, cheat, and steal for even small gain, doesn’t it make sense that they would employ fraud to gain access to real wealth and real power?
Irrelevant. Saying there are vulnerabilities ans proclaiming that such vulnerabilities are equal to fraud is ignorance

And given that our political system attracts sociopaths like shit draws flies, can we be surprised they would, once in power, put systems in place to make cheating easier?
Putting systems in place to make voting easier is not the same thing.

Welcome to reality.
Wish you were here
 
The whole point of computerized voting machines, mail in ballots, and early voting… is to create opportunities for fraud.
No, it's to make it easier for those who have the right to vote to do so.
Those who aren’t concerned about fraud are people who are confident their side will benefit from it.
You're conveniently forgetting which side every single known case of voter fraud in the last presidential election was on.
Given that humans will lie, cheat, and steal for even small gain, doesn’t it make sense that they would employ fraud to gain access to real wealth and real power?
No matter how convincing that sounds to you, the fact is there's no evidence anyone has tried to do what you're suggesting, much less succeeded at it.
 
Two threads, same topic, both thread titles with verbiage BEGGING us to pay attention = two epic fails. 😁
 
Back
Top