It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Another Software Source for Fraud --Scytl. Clarity. Electronic Software and Systems

page: 1
73
<<   2  3 >>

log in

join
share:
+32 more 
posted on Nov, 9 2020 @ 11:19 AM
link   
Just what we need, huh?
On the heels of the mess in Antrim County, Michigan, we have this surfacing...

www.americanthinker.com...

Scytl is a Barcelona-based company that provides electronic voting systems worldwide, many of which have proven vulnerable to electronic manipulation. Scytl has (or had) Soros and Democrat party connections. Microsoft co-founder Paul Allen's Vulcan Capital has invested $40 million in Scytl.



What Roscoe B. Davis brings to the table is a claim from two cyber–forensic investigators. They told him that all the stuff we're talking about — the secretive poll-counting, the cemetery voters, the ballot dumps — is a distraction. The real issue is that the important changes are happening at the level of computer tabulation. The forensics investigators believe that these changes occur offshore, mostly at Scytl's headquarters in Barcelona, and maybe in Frankfurt, Germany.

As far as I can tell, what's important is that, across America, machines maintained by giant multinational corporations handle our elections and have already provably manipulated elections in Texas and Kentucky. These are the kind of systems that can be manipulated with Hammer and its Scoreguard program or gamed (as they seem to have been in Texas) by employees overriding the people's will.


We need to fix this....NOW!!!
We need to correct the votes for this election, so it does not become a [s]election.
And then takes steps to insure our elections are free and secure, and that only LEGAL votes count.
Our Republic and our freedom depend on it.
edit on Mon Nov 9 2020 by DontTreadOnMe because: (no reason given)

edit on Mon Nov 9 2020 by DontTreadOnMe because: (no reason given)



posted on Nov, 9 2020 @ 11:29 AM
link   
a reply to: DontTreadOnMe
Why this election?

Since I have been on ATS I have read about voting machine fraud. Oddly enough, not much noise about them during the 2016 election. Seems it is only an issue during certain "types" of elections. (big ol' wink)

Also, why do people say "we"? If the standing admin can't keep the evil machines from being used, what is joe six pack gonna do?

edit on 9-11-2020 by daskakik because: (no reason given)



posted on Nov, 9 2020 @ 11:30 AM
link   
a reply to: DontTreadOnMe

Stop relying in machine and tech. People in general can't be trusted.


Hand count. Need volunteers? Use the jury duty selection system.



posted on Nov, 9 2020 @ 11:32 AM
link   
a reply to: DontTreadOnMe

As I understand it there is no process for a redo...so if there are votes proven to be fraudulent in any way they just get tossed and the count is tabulated without them.

These challenges must follow the proper state procedure and go though the courts. There is then a period during certification in joint session of Congress where challenges can be made federally as long as its in writing and signed by at least 1 house rep and 1 senator.

This certification session happens in December usually...in 2016 it was Dec. 13th I think.



posted on Nov, 9 2020 @ 11:34 AM
link   
a reply to: JinMI

This.

Paper and pen and physical ballots. Spilled out on a table in each township or city ward and counted publicly like still happens at some rural New England town halls.



posted on Nov, 9 2020 @ 11:55 AM
link   


All of this is pure theorizing.


Ok.



posted on Nov, 9 2020 @ 12:07 PM
link   
EP 2185-9AM BREAKING [CYBER-COUP!]: Trump Attorneys Tracking Data Off-Shored To CIA/Soros Co's Co's


It starts around 30 min. It is to be a part of the legal challenges that are building and will provide a stronger legal case of fraud than some of the other problems getting disputed. It is one to stay on top of and watch to get to the bottom of a lot of this systemic fraud. The C_A is involved.



posted on Nov, 9 2020 @ 12:18 PM
link   
I think we will have to resign ourselves to the fact that tech/software will eventually play a much bigger role in our election counting processes. If incorporated correctly, and soundly tested/audited/certified, there is no reason that software-driven solutions can't be even more reliable than paper ballots. The vectors and mechanisms for alleged fraud, Xeroxing ballots, soliciting unregistered/out of state voters to participate, subjective vote tallying, these things could be massively reduced with consensus-based distributed ledger system, a.k.a. blockchain.

The big bugaboo is that in reality this should, this MUST be something undertaken as a Big Government project with close scrutiny and careful observation THAT IS NOT simply farmed out to contractors to save a buck or to take the easy path.

Want an efficient, reliable, secure voting system? It CAN be achieved technologically, but it will cost $$$, it will need very careful nurturing to remain APOLITICAL, open and fair, and IMO the gub'mt must MUST take point on this carefully vet and supervise WHO is involved and HOW they implement it.



posted on Nov, 9 2020 @ 12:33 PM
link   
What I would love to see: a US-government backed "moonshot" program to build the most reliable, secure and Democratic vote tabulation system in the world.

* built by top-flight engineers IN HOUSE, with close scrutiny and auditing. Want to be be a core project member, sorry, we don't hire folks that financially contribute are are registered members of either the Republican or Democrat party.

* OPEN SOURCE. US government is building it but this is a TRANSPARENT OPEN platform. All are welcome to inspect, review , comment & contribute, Core team has final say on merger of code.

* As above, NOT FOR SALE. Any and all parties welcome to use it for free.

* Inexpensive to operate, test and deploy

* Secure, fail safe, resistant to tampering/hacking

* In event of catastrophic system failure (which would be designed to be below several decimal places under .1%), there is a break glass/contingency to fall back to traditional vote counting methodologies

This can be done and done effectively, but would require significant resources and social and political will TO WANT it to SUCCEED and to WANT secure, trusted elections, NOT just for one side or another.
edit on 9-11-2020 by SleeperHasAwakened because: (no reason given)



posted on Nov, 9 2020 @ 12:36 PM
link   
a reply to: DontTreadOnMe
It would help if you put the name of the software/company in the title DTOM. Will make it easier to find the thread going forward, and to keep it separate from the Dominion software cheats that are being discovered.


edit on 11/9/2020 by carewemust because: (no reason given)



posted on Nov, 9 2020 @ 12:59 PM
link   
a reply to: carewemust

Good idea!
Thanks



posted on Nov, 9 2020 @ 01:48 PM
link   

originally posted by: JinMI
a reply to: DontTreadOnMe

Stop relying in machine and tech. People in general can't be trusted.


Hand count. Need volunteers? Use the jury duty selection system.




Why would even need volunteers? Just pay them for the couple days of work.



posted on Nov, 9 2020 @ 01:49 PM
link   
a reply to: justsaying111

That's why I mentioned the jury duty system.



posted on Nov, 9 2020 @ 02:06 PM
link   

originally posted by: SleeperHasAwakened
What I would love to see: a US-government backed "moonshot" program to build the most reliable, secure and Democratic vote tabulation system in the world.

* built by top-flight engineers IN HOUSE, with close scrutiny and auditing. Want to be be a core project member, sorry, we don't hire folks that financially contribute are are registered members of either the Republican or Democrat party.

* OPEN SOURCE. US government is building it but this is a TRANSPARENT OPEN platform. All are welcome to inspect, review , comment & contribute, Core team has final say on merger of code.

* As above, NOT FOR SALE. Any and all parties welcome to use it for free.

* Inexpensive to operate, test and deploy

* Secure, fail safe, resistant to tampering/hacking

* In event of catastrophic system failure (which would be designed to be below several decimal places under .1%), there is a break glass/contingency to fall back to traditional vote counting methodologies

This can be done and done effectively, but would require significant resources and social and political will TO WANT it to SUCCEED and to WANT secure, trusted elections, NOT just for one side or another.


Open source software for voting is a terrible idea. The entire world now knows exactly how your software operates. The entire world can now find exploits. You're not going to be able to patch them fast enough. This is why almost 100% of major opensource packages are forked and heavily modified before being put to use in an enterprise software.

There will be vulnerabilities, just like 100% of all software ever written. This would be an extremely valuable target.



posted on Nov, 9 2020 @ 02:11 PM
link   
From the op

"Scytl has (or had)Soros and Democrat party connections"
"What Roscoe B. Davis brings to the table is a claim from two cyber–forensic"
"The forensics investigators believe"

Lol. So just like 99% of crap pushed on ATS.. No real proof



posted on Nov, 9 2020 @ 03:47 PM
link   
a reply to: RickyD

but what is being claimed is the numbers that are already tabulated may be incorrect. The only way to verify them is to recount. The paper ballots still exist, and if this can be proven by a sampling of data, then a recount will be the only way forward. But if each state does it by the book, then the results would have to be accepted by all.



posted on Nov, 9 2020 @ 03:59 PM
link   
Being up by 800,000 votes and then "Poof" .. The software used in the 2020 election has been found to be flipping at a margin of 2 for one. Vote Repub and in reality you cast 2 votes for the Dems. What a sick banana republic tactic ! youtu.be...



posted on Nov, 9 2020 @ 04:05 PM
link   
a reply to: XCrycek

It's proof enough for an argument and investigation.


No matter how you spin it.





posted on Nov, 9 2020 @ 05:24 PM
link   
a reply to: AScrubWhoDied

You just showed you have NO IDEA what you're talking about pursuant to software.

The most secure remote shell access system on the planet Earth OpenSSH is .........

Open Source

The most widely used encryption library on the planet OpenSSL is

Open Source

Why are these packages NOT "forked" in house and re-used by intelligent, smart firms?

Because you've just gone from audit/visibility on the source code of tens of millions of eyes to tens/hundreds of eyes.

The entire idea of open source software is for EVERYONE to see, trust and verify how the code works

What you just described, "internal forking", was completely thrown out and banned at our company. I've told you the primary reason (less scrutiny on source code), but there is another important reason too. Let's see if you can redeem yourself and explain another justification for not "internally forking" OSS code (this likely won't be readily available by Googling, but will require hard experience in the industry to understand the pitfall).

LOFL "the entire world can find exploits" THAT"S THE WHOLE POINT OF OPEN SOURCING SOMETHING!

Google "security by obscurity" to understand why what you propose, corporatising OSS, is an abjectly terrible idea.



posted on Nov, 9 2020 @ 05:41 PM
link   
Not trying to derail the original thread but I 100% agree with the following..


originally posted by: SleeperHasAwakened
Google "security by obscurity" to understand why what you propose, corporatising OSS, is an abjectly terrible idea.


QFE over and over.

If anyone doesn't understand all the details of everything else that was really well written in your post then focus on those three words in quotes. "Security By Obscurity" should never be viewed as a valid approach to Infosec , private data, intellectual property and so on.

Kevin Mitnick, along with multiple other qualified sources, has spokenwritten a few times around the dangers of believing this type of concept , "My business is so small, no one uses my app, our product isnt important, our data isn't valuable outside our business, we have customized it so much no one will give the effort and because of that no one will ever try to exploit us."

This is exactly the type of target that bad actors (state or independent) have successfully , currently do and will continue to focus on as viable attack vectors.



new topics

top topics



 
73
<<   2  3 >>

log in

join