Since the election, there have been a lot of electrons expended on the internet debating
whether interference with electronic voting machines is possible.
We do know that, according to a highly classified intelligence report obtained by The Intercept, in 2016 Russian military intelligence executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before the presidential election.
Roll Call reported, the Mueller Report concluded victims of the Russian hacking operation “included U.S. state and local entities, such as state boards of elections (SBOEs), secretaries of state, and county governments, as well as individuals who worked for those entities,” the report said. “The GRU also targeted private technology firms responsible for manufacturing and administering election-related software and hardware, such as voter registration software and electronic polling stations.”
The Russian intelligence officers at GRU exploited known vulnerabilities on websites of state and local election offices by injecting malicious SQL code on such websites that then ran commands on underlying databases to extract information.
Using those techniques in June 2016, “the GRU compromised the computer network of the Illinois State Board of Elections by exploiting a vulnerability in the SBOE’s website,” the report said. “The GRU then gained access to a database containing information on millions of registered Illinois voters, and extracted data related to thousands of U.S. voters before the malicious activity was identified.”
Based on what is now known from open sources, none of those 2016 Russian attacks appear to have changed any votes, but what has never been explored in the open sources is if there was or is any inside vulnerability.
The question of an inside vulnerability and attack on the 2020 election has been labeled a conspiracy theory and dismissed by the establishment media, but evidence is mounting that there were many anomalous results from electronic voting machines this year, some of which have been confirmed as result-changing incorrect counts.
The most obvious and well-documented example is Antrim County, Michigan, which uses voting machines supplied by Dominion Voting Systems. When the county transferred numbers to the state the machines showed Biden beating Trump by about 3,000 votes. When the supposed “glitch” was discovered and the vote tallied by hand there was a swing of about 6,000 votes and Trump beat Biden by about 2,500 votes, with Trump receiving 56% of the slightly more than 17,000 votes cast for president and Biden receiving 42%.
The alleged “glitch” was attributed to a software update loaded a few days before the election. Dominion services as many as 64 other counties in Michigan. In addition to these counties, the software company also holds the voter software contracts in almost all of the contested 2020 Presidential election jurisdictions.
In another incident, voting machines used in Michigan’s Wayne County appeared to have been connected to the internet, according to a sworn affidavit signed by a poll watcher.
Ivan Pentchoukov, senior political reporter for The Epoch Times reported that at approximately 11 p.m. on Nov. 3, Patrick Colbeck observed an icon identifying an active internet connection on the screens of the computers used to tabulate and adjudicate ballots.
“All it takes to confirm the connectivity status of a Windows computer is to roll the cursor over the LAN connection icon in the bottom right comer of the display,” Colbeck’s sworn affidavit states. “When there is no internet connection, a unique icon showing a cross-hatched globe appears. I proceeded to review the terminal screens for the Tabulator and Adjudicator computers and I observed the icon that indicates internet connection on each terminal. Other poll challengers can attest to this observation as required.”
Colbeck, a poll challenger and former Michigan state senator, said that the area had wireless routers set up with networks called “CPSStaff” and “CPSStaff” broadcast in the area. He added that a security incident that occurred at 10 a.m. on Election Day may have been caused by the voting equipment being connected to the internet.
Obviously, a voting machine connected to the internet would be vulnerable to compromise by anyone from the Russian GRU to your garden variety teen hacker, and be particularly vulnerable to insider election fraud.
Similar Dominion machines can also be found throughout the state of Georgia, where corrupted data cards and uploading an update to the voting machines the night before the election caused problems, some still unresolved, in Georgia’s tallying of the vote.
POLITICO reported the voting machine companies “uploaded something last night, which is not normal, and it caused a glitch,” said Marcia Ridley, elections supervisor at Spalding County, Georgia, Board of Election. That glitch prevented pollworkers from using the pollbooks to program smart cards that the voters insert into the voting machines.
“That is something that they don’t ever do. I’ve never seen them update anything the day before the election,” Ridley said. Ridley said she did not know what the upload contained.
The “glitches” were attributed to a software conflict between the Dominion voting machines and the electronic pollbooks supplied by another vendor – one of the workarounds used to get the machines working was for election workers to use their own credentials to allow the voter to cast an electronic ballot, a procedure ripe for election fraud.
There are many questions about the vulnerability of electronic voting machines to inside attacks – especially those supplied by Dominion Voting Systems which were updated the night before the election and connected to the internet. This is not a “conspiracy theory” but a sensible question that deserves to be investigated and answered.
CHQ Editor George Rasley served as a precinct election official and election security observer in numerous elections and is a veteran of over 300 political campaigns, including every Republican presidential campaign from 1976 to 2008. A member of American MENSA, he served on the staff of Vice President Dan Quayle, as Director of Policy and Communication for former Congressman Adam Putnam (FL-12) then Vice Chairman of the Oversight and Government Reform Committee's Subcommittee on National Security and Foreign Affairs, and as spokesman for retiring Rep. Mac Thornberry, former-Chairman of the House Armed Services Committee.
Hunter Biden emails
Dominion Voting Systems