It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Doctor Smith
No courts so far have looked at the evidence for whatever reason.
originally posted by: andy06shake
a reply to: infolurker
Apparently Zachary Stieber who contributed this alleged ""Forensics Report"" works for "The Epoch Times" which is a far-right newspaper and media company affiliated with the Falun Gong new religious movement.
That says it all really.
Oct. 29, 2006
The federal government is investigating the takeover last year of a leading American manufacturer of electronic voting systems by a small software company that has been linked to the leftist Venezuelan government of President Hugo Chávez.
The inquiry is focusing on the Venezuelan owners of the software company, the Smartmatic Corporation, and is trying to determine whether the government in Caracas has any control or influence over the firm’s operations, government officials and others familiar with the investigation said.
The inquiry on the eve of the midterm elections is being conducted by the Committee on Foreign Investment in the United States, or Cfius, the same panel of 12 government agencies that reviewed the abortive attempt by a company in Dubai to take over operations at six American ports earlier this year.
The committee’s formal inquiry into Smartmatic and its subsidiary, Sequoia Voting Systems of Oakland, Calif., was first reported Saturday in The Miami Herald.
Now we have a mystery involving touch-screen voting machines used in Franklin County, Ohio, that has launched a criminal investigation to determine why a message that some voters saw on their touch-screen machines didn't appear on other machines.
The issue has raised a number of questions about when the electronic ballot on the machines was programmed and by whom. A preliminary investigation has also uncovered a couple of additional surprises about the machines -- it turns out that not only did the county fail to conduct mandatory tests on the machines before the November election, but a county programmer had also intentionally disabled an internal auditing function for logging any changes made to the machine software, possibly thwarting investigators' ability to determine what occurred with the ballots and who was responsible. The programmer says the voting machine company advised him to disable the log to speed up the programming process.
The machines in question are made by Election Systems and Software, the largest voting machine company in the country, which is based in Omaha, Nebraska.
In a paper published on the Web today, a group of Princeton computer scientists said they created demonstration vote-stealing software that can be installed within a minute on a common electronic voting machine. The software can fraudulently change vote counts without being detected.
“We have created and analyzed the code in the spirit of helping to guide public officials so that they can make wise decisions about how to secure elections,” said Edward Felten, the director of the Center for Information Technology Policy, a new center at Princeton University that addresses crucial issues at the intersection of society and computer technology.
The paper appears on the Web site for the Center for Information Technology Policy.
The researchers obtained the machine, a Diebold AccuVote-TS, from a private party in May. They spent the summer analyzing the machine and developing the vote-stealing demonstration.
“We found that the machine is vulnerable to a number of extremely serious attacks that undermine the accuracy and credibility of the vote counts it produces,” wrote Felten and his co-authors, graduate students Ariel Feldman and Alex Halderman.
In a 10-minute video on their Web site,the researchers demonstrate how the vote-stealing software works. The video shows the software sabotaging a mock presidential election between George Washington and Benedict Arnold. Arnold is reported as the winner even though Washington gets more votes. (The video is edited from a longer continuously shot video; the long single-shot version will be available for downloading from the center’s site as well.)
They showed that anyone who gets access to the machine and its memory card for literally a minute or two could easily install the group's invisible vote-stealing software on the machine. (Poll workers and others have unsupervised access for much longer periods.) Changing all logs, counters, and associated records to reflect the bogus vote count that it generates, the software installed by the infected memory card (similar to a floppy disk) would be undetectable. In fact, the software would delete itself at the end of Election Day.
Even more ominously the memory cards that are used to install this or similar vote-stealing software can act like a virus and infect many other machines if the bad cards are used to amend these machines. This is normal practice with pre- and post-election updates, and no attachment to a network is necessary. Moreover, since memory cards are removed from all voting machines in a given region and inserted into a single machine that accumulates the votes for the region, something worse is possible. "By planting a virus far enough in advance, [a hacker] can ensure that a significant number of machines can steal votes on Election Day" even if he has access to only one or a few machines.
One of the most interesting aspects of this study is a videotape of an actual Diebold AccuVote-TS machine being hacked. The tape clearly shows the quick installation of the bad memory card (either with a copied key or by picking the machine's lock), the pre-election check indicating that nothing is amiss, the mock mini-contest between George Washington and Benedict Arnold which Washington wins 4-1, and then the print-out showing that Arnold, in an election upset, beats Washington 3-2. There are a number of other types of electronic voting machines in use today, but little certainty that they aren't vulnerable to similar tampering.
originally posted by: andy06shake
a reply to: infolurker
Its not proof of wide spread voter fraud in the 2020 election.
Quite simple really.
originally posted by: andy06shake
a reply to: infolurker
Your own Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.
And the National Association of State Election Directors described the 2020 election as.
"the most secure in American history."
They wont get rid of the voting machines infolurker, what else needs to be said indeed.
Biden won by a landslide and Trump lost, its done and dusted, that's all she wrote. x