Potential Hackers were Allowed Unsupervised Access to Ballot Counting Areas in Key State
When it comes to the Dominion software system that was on the ballot-counting machines, it seems that there was another issue with the security of the machines.
These are basically just big computers that count and tabulate the ballots that are fed into it and like computers, are subject to bugs, glitches, viruses, and hackers.
According to one of the complaints in the lawsuit against Pennsylvania, there were people with USB drives that were allowed into a secured area with unsupervised access to the machines.
“Also in Delaware County, an observer in the county office where mail-in ballots were counted witnessed a delivery on November 5, 2020, of v-cards or USB drives in a plastic bag with no seal and no accompanying paper ballots. The v-cards or USB drives were taken to the back counting room, where observer access was limited. There was no opportunity to observe what happened to the v-cards or USB drives in the back counting room.”
An IT expert ended up finding an audit of the Dominion software and it sheds some more light on an already bad situation for Democrats who have fought to rig this election.
During the ICX source code vulnerability review, one potential vulnerability was discovered and the level of access required to take advantage of this potential vulnerability would be open to a variety of actors including a voter, a poll worker, an election official insider, and a vendor insider. This potential vulnerability has a more widespread potential. Polling place procedural controls are one method of mitigating this issue, with poll workers actively verifying that the USB ports are covered and the covers sealed to prevent access.
So what that means is that unless you intentionally block access to these ports they will remain open and that the poll workers should be verifying that the USB ports are covered and that those covers are sealed.
Ther are many ways of blocking off USB ports, but it seems like this was not done. The audit continues to say,
Vote-stealing software could easily be constructed that looks for undervotes on the ballot, and marks those unvoted spaces for the candidate of the hacker’s choice. This is very straightforward to do on optical-scan bubble ballots (as on the Dominion ICE) where undervotes are indicated by no mark at all. The autocast configuration setting that allows the voter to indicate, “don’t eject the ballot for my review, just print it and cast it without me looking at it.” If fraudulent software were installed, it could change all the votes of any voter who selected this option, because the voting machine software would know in advance of printing that the voter had waived the opportunity to inspect the printed ballot.