Anonymous ID: 1b3111 Nov. 6, 2020, 2:03 p.m. No.11506968   🗄️.is 🔗kun   >>6992 >>7013 >>7238 >>7305 >>7412

Michigan county flips back to Trump, following repair of voting software glitch

 

Reliably GOP county had originally swung to Biden

 

The an election-software glitch in Michigan's Antrim County that had incorrectly directed votes Democratic presidential candidate to Joe Biden was fixed Friday, putting thousands of vote correctly into President Trump's totals. The software had reportedly caused a significant number of votes to be allotted to Biden in a county that has for years been reliably red. In the presumed final count, Biden had originally led in the county by roughly 3,000 votes. Revised totals show that Trump won the county by around 2,500. Addressing the alleged software glitch, Michigan GOP Chairwoman Laura Cox said Friday during a press conference that "47 counties [in Michigan] use this same software in the same capacity." "These counties that use this software need to closely examine their results for similar discrepancies," she said.

https://justthenews.com/politics-policy/elections/following-repair-technical-glitch-michigan-county-flips-back-trump

Anonymous ID: 1b3111 Nov. 6, 2020, 2:17 p.m. No.11507262   🗄️.is 🔗kun   >>7294 >>7460

Data Expert Describes How Democrats Can Fabricate Votes

 

Also Describes Critical Security Flaws That Have Not Been Addressed

 

Russell Ramsland, a partner in Allied Security Operations says his company’s investigations of our electronic election systems show that votes can be changed on a large scale. Votes can also be changed at the voting location, at the tabulation software level and in the actual database. Someone could even change the voting software itself. Ramsland states that his firm initially started looking at election data logs from the Dallas elections in 2018 when there was an unexpected “blue wave.” The more Ramsland’s cyber team looked at the logs, the more discrepancies they found in security practices, flaws, and vulnerabilities.

 

Ramsland, importantly, provides his assessment of anomalies he and his team see with the 2020 election results. Ramsland notes the points at which the data injection in the Michigan and Pennsylvania election counts appear anomalous. The video below is queued to the end of the interview where Ramsland presents his insights into whether we are looking at voter or election fraud but clearly believes there are major problems with the integrity of the 2020 election. Ramsland says he has attempted to go to the FBI to detail his firm’s findings regarding major security flaws and vulnerabilities of the election system. He has made some inroads into DHS field level officials, but their findings were not able to be moved up the chain of command. Ramsland also attempted to get a meeting with the Cyber Intelligence Security Agency within DHS, but his team was only granted a phone call. Ramsland says he doesn’t know whether the FBI doesn’t want to take what might be a political “hot potato” or whether they simply do not have the technical expertise to deal with these issues. The entire video is worth listening to and Ramsland does a very good job of attempting to explain to a non-expert, but there is a lot of detail provided in the interview. Here are some of the highlights from his interview with CDMedia’s L.Todd Wood.

 

1- The election data for 28 U.S. states is stored on databases not on U.S. soil, but in servers in Europe.

2- Their cyber team found 1,027 times a “warning” that votes exceeded ballots in the Dallas race. Each time is not one singular vote, but rather a “tranche” of data.

3- Hard database resets that can eliminate any tools on the system which e.g. could send data elsewhere, could allow data to be uploaded, etc.

4- They found instances in Dallas where data appeared to be being uploading from outside the “election system.”

5- They learned there was already evidence collected by reputable data security firms outlining all of these vulnerabilities – this was already out there. Those vulnerabilities he says, are still out there on these election systems; they have not been closed or fixed.

6- They found that “audit logs” showed a number of discrepancies which could indicate that data from outside the election system.

7- They state that an election official can alter votes on the system.

8- A high-level view of the election system shows there are no security standards – admin passwords can be found on the open in their systems.

9- Ramsland outlines how he and his cyber team believe the 2018 Kentucky gubernatorial race voting results were possibly altered and describe that in more detail.

10- Their cyber team could get into election systems on-location with just a cellphone. More aggressive reviews or intrusions of these systems show that these systems are connected to the internet (there is no “air gap”), multiple locations (in different states) share the same SSL certificate which Ramsland describes as akin to an entire neighborhood sharing the same front door key.

Who exactly has the keys to the U.S. election systems? Ramsland states clearly that they found there is a security flaw that allows someone to obtain all the passwords for all of these election systems and go back in and easily change voter data. Since many of these findings have been described since at least 2018 – why have they not been addressed.

https://andmagazine.com/talk/2020/11/06/data-security-specialist-outlines-key-election-system-flaws-and-vulnerabilities/

Anonymous ID: 1b3111 Nov. 6, 2020, 2:28 p.m. No.11507460   🗄️.is 🔗kun   >>7506 >>7525

>>11507262

 

Data Expert Describes How Democrats Can Fabricate Votes

Continued

 

Question.. If this can be this easily exploited..even if exploit lines were removed after the fact, could this still be found in a memory hole on the hard drives?