top of page
All light blue text are clickable links                                                                                                                   Content last updated JUNE 18, 2023 - Check back for updates.
 VOTING MACHINE ISSUES 
ES&S DS200 Tabulator Vulnerabilities
It is reported the tabulators have a difficult-to-detect modem buried in its motherboard, allowing the device mostly undetected access to the internet. Malware can be embedded in hardware as well as software, leaving the tabulators vulnerable to insider or sophisticated hacking. Digital images of cast ballots, which are required for chain of custody, can be destroyed by election officials on election day. The software code is not open source, which is the first problem. 
 
ES&S vulnerabilities.JPG
Heading 6
There were 37 Ohio counties that used ES&S DS200 tabulators in 2020 and the following 25 Ohio counties used ES&S DS200 tabulators in 2022: 
ES&S DS200 tabulators.JPG
"We will never have an election
that is either transparent
or that we can trust
on a computerized or
electronic voting system".

        ~ Colonel Shawn Smith
video Election Machines are not secure-Col. Shawn Smith 2023.01.12.JPG
*** FRAUD ALERT ***  They Lied! Voting Machines are Connected to the Internet Montage of Dominion CEO saying their machines do not connect to the internet and later a Dominion tech explaining how their machines DO CONNECT to the internet, one elected official after another say voting machines DO NOT CONNECT to the internet. These words are not going to age well. 
T
ags: ELECTION MACHINES, SECURITY
    
 VOTING MACHINE VULNERABILITIES
Politicians on camera describing how easy it is to hack election machines: 
a All electronic voting equipment can easily be hacked because all such equipment must receive programming before each election from memory cards prepared on election management systems which are computers often connected to the internet running out-of-date versions of Windows. If a county election management system is infected with malware, the malware can spread from that system to the USB drives, which then would transfer it to all the voting machines, scanners, and ballot-marking devices in the county. Most U.S. election systems are programmed by local county election officials or third-party vendors, who plug previously-used USB drives into computers connected to the internet before plugging those same USB drives into the optical scanners, tabulators, and voting machines that collect, count, and determine election results.
How to hack an election machine: 
In 2019, the Associated Press reported that the vast majority of 10,000 election jurisdictions nationwide, including numerous swing states, were still using Windows 7 or older operating systems to produce ballots, program voting machines, count votes, and report results. Windows 7 officially reached its “end of life” on Jan. 14, 2020, meaning Microsoft stopped providing technical assistance or producing “patches” to address software vulnerabilities.
New election systems use vulnerable software: 
Furthermore, not only are U.S. elections being programmed on computers running out-of-date software, but voting machine manufacturers have also installed remote-access software and wireless modems connecting voting machines directly to the internet. NBC News reported ten months before the 2020 election that ES&S, the largest U.S. election machine vendor, had installed at least 14,000 modems to connect their voting machines to the internet, even though many election security experts had previously warned that voting machines with modems were vulnerable to hackers.
Yes, voting machines connect to the internet: 
Dominion Voting Systems, the second-largest U.S. election machine vendor, which has given public presentations acknowledging their use of modems in their voting machines, was also discovered to be running remote-access software during the 2020 election: In Georgia, 20-year election worker, Susan Voyles, testified that Dominion Voting Systems employees “operated remotely” on her ballot-marking devices and poll pads after the team experienced some technical problems with their machines. In Wisconsin, the Office of Special Counsel (OSC), headed by former state Supreme Court Justice Michael Gableman, also found that Dominion and ES&S voting machines were online and connected to the internet. In Michigan, attorney and Secretary of State candidate Matt Deperno, discovered a Telit LE910-SV1 modem chip embedded in the motherboard of an ES&S DS200 voting machine. Through these modems, hackers could theoretically intercept results as they’re transmitted on election night — or, worse, use the modem connections to reach back into voting machines or the election management systems to install malware, change software, or alter official results. Therefore, not only are hackers able to penetrate elections through vulnerable USB cards and election management systems but also through the very voting machines themselves.
Why do Dominion voting machines have modems if there is no internet connection? 
This isn’t a problem exclusive to elections — all computers are hackable — and that is why election security experts have always recommended the use of hand-marked paper ballots and rigorous post-election audits. This also isn’t a partisan issue; both Democrats and Republicans are well aware of the secrecy, privatization, and hackable hardware and software that runs America’s elections. After the 2016 election, Clinton supporters and the corporate media would spend the next four years talking about how compromised America’s computerized voting system was. Sen. Ron Wyden, Sen. Amy Klobuchar, and Sen. Kamala Harris held numerous congressional hearings where they explained how easy it was to hack voting machines, how simple it was to locate unattended voting machines, and how numerous voting machines were connected to the internet. After the 2020 election, Trump supporters were censored and de-platformed (I was banned from Twitter) for pointing out the very same anomalies and vulnerabilities that Democrats and the corporate media had spent the last four years discussing. Regardless of politics, these problems are very real, they still exist today, and they are best explained by the computer scientists who have spent the last two decades researching them.
All computers are hackable: 
Professor Matt Blaze of Georgetown University's Computer Science Department provided testimony on the vulnerabilities of the United States' election system during a congressional hearing titled "2020 Election Security" on January 9, 2020: “I come here today as a computer scientist who spent the better part of the last quarter century studying election system security… To be blunt, it’s a widely recognized really indisputable fact that every piece of computerized voting equipment in use at polling places today can be easily compromised in ways that have the potential to disrupt election operations, compromise firmware and software, and potentially alter vote tallies in the absence of other safeguards. This is partly a consequence of historically poor design and implementation by equipment vendors, but it’s ultimately a reflection of the nature of complex software. It’s simply beyond the state of the art to build software systems that can reliably withstand targeted attacks by a determined adversary in this kind of environment… Just as we don't expect the local sheriff to singlehandedly defend against military ground invasions, we shouldn't expect county election IT managers to defend against cyber attacks by foreign intelligence services.”
Counties are not equipped to properly secure voting machines: 
Additional Information: 
Computer Programmer Testifies Under Oath
He Designed the Program to Rig and Election in 2000
CLICK HERE to listen to testimony from a Computer Programmer in 2006 when he told the world in open testimony before the US House Judiciary in Ohio that voting machines are not only hackable to determine an election, but that he designed the program to rig an election in 2000. Let this sink in: the testimony was 14 years before the 2020 election.
Q: WHY ARE MACHINES WITH SOFTWARE THAT CAN RIG ELECTIONS STILL USED IN OHIO AND THE UNITED STATES AFTER ALL THESE YEARS?   
A: It is obvious US Election Systems are DESIGNED to allow the elections to be rigged.    
computer programmer rigged election software in 2000.JPG
Dominion changed vote tallies that altered the results in a race in Georgia Primaries May 2022
Dominion election equipment is in virtually every state, and are widely used in OHIO. Do you still have confidence our elections are secure and accurate? 

It is time We The People of Ohio stand up and demand our government remove electronic voting systems from our elections! 
Michigan election business has software and URLs in China
NEWS FBI Conceals Chinese infiltration US Election Software.JPG
Sept 10 2022 True The Vote uncovers East Lansing, Michigan business that builds software to 'manage' elections in the US, Canada and Australia has a software application that resides in China and other URLs associated to the company that resolve to one IP address - in China. The report can be found HERE. Refer to Trump Executive Order 13848 Imposing Sanctions in Event of Foreign Interference in a US Election issued Sept 14 2019 and Continued by Bidan on Sept 7 2021 for one year, AND Bidan just renewed again. 
Over 700,000 Invalid Votes Identified in New York Election Investigation
Criminal and complex layers of deception in the voter registration rolls were created in New York. To create fake votes, fake voters are needed. Research volunteers in New York discovered around 40% of all state and federal politicians CANNOT PROVE THEY WON due to the number of votes in their election districts assigned to invalid/illegal registrations in the voter rolls OUTSTRIPS their margins of victory.   
NY audit.JPG
Details                      Technical Video

Quote from an Ohio citizen with knowledge of electronic voting machines:

 

"They use a SQL server and forward the packets of data over networks to the server. Before it gets there it is easy to write a HTML script and wrap it in a JAVA script to literally change your votes. The server would never know. Dominion uses FROGs which is a type of encryption that has a key. The key isn't written into the software like a normal encryption and they are keeping the key secret. That key is a program... it is as simple as writing the key to give 1 of every 3 votes to the other guy. The public would never know and it isn't auditable. See why we should never use computers for our elections!!! Blockchain has the same issue. The program to cheat could be written into the encryption and it would be totally hidden in the code. No way to really count the votes as the systems are so porous that it is easy for computer experts to program whatever results they want. And they always make it very close so you think you almost won... it's all fake. Look at Brazil and their 2 elections where both clearly have the exact same algorithm being run on the votes. Now compare it to 2016 when the algorithms failed...

Here are some facts the media never told you about our computerized voting systems nationwide: 

There are only 2 accredited companies to certify these machines and neither one has current certification. Pro V&V and SLI gaming need NIST certification to be accredited under the EAC according to HAVA 2002 law they must have this... But the machines have built in cellular chipsets and routers so they can't get NIST certified...

So every machine has been unlawful since 2017..." ~ Glenn Mehltretter

CIA acknowledges electronic voting machines have been in question
since Hugo Chavez was elected. 
bottom of page