GLITCH
PB
>>11885098 Officials in Georgia Issue Statements on Viral Video of Dominion Worker with USB Drive
GLITCH
PB
>>11885098 Officials in Georgia Issue Statements on Viral Video of Dominion Worker with USB Drive
Foreign links
China ties Financial
And
Hardware
not to mention Canada and Serbia
There's a component breakdown in this document from California SOS document
PB
>>11885118 Reports: Dominion voting-machine company has Chinese links
[KNOWINGLY]
Dominion test report for California
Vulnerabilities
For any vulnerabilities discovered, SLI was tasked with identifying the particular standards applicable to each vulnerability. To the extent possible, reported vulnerabilities include an indication of whether the exploitation of the vulnerability would require access by:
• Voter: Usually has low knowledge of the voting machine design and configuration. Some may have more advanced knowledge. May carry out attacks designed by others. They have access to the machine(s) for less than an hour.
• Poll worker: Usually has low knowledge of the voting machine design and configuration. Some may have more advanced knowledge. May carry out attacks designed by others. They have access to the machine(s) for up to one week, but all physical security has been put into place before the machines are received.
• Elections official insider: Wide range of knowledge of the voting machine design and configuration. May have unrestricted access to the machine for long periods of time. Their designated activities include: • Setup and pre-election procedures;
• Election operation;
• Post-election processing of results; and
• Archiving and storage operations.
•Vendor insider: Possesses great knowledge of the voting machine design and configuration. They have__ unlimited access__ to the machine before it is delivered to the purchaser and, thereafter, may have unrestricted access when performing warranty and maintenance service, and when providing election administration services.
https://votingsystems.cdn.sos.ca.gov/vendors/dominion/ds52-sc.pdf
Final Report
Sixty-nine discrepancies were identified within theDominion Democracy Suite 5.2 code base.
Several potential vulnerabilities were identified
within the Dominion Democracy Suite 5.2 code base, within either the ICE code base or the ICX code base. Within the Dominion Democracy Suite 5.2 ICE code base, all findings were low risk vulnerabilities that would require an in-depth knowledge of the ICE code base and how it operates to be able to successfully subvert the system. To exploit them successfully would require modifying the code before any build.
cough cough Eric Coomer
Within the Dominion Democracy Suite 5.2 ICX code base,
one potential vulnerability was discovered and the level of access required to take advantage of this potential vulnerability would be
open to a variety of actors including a voter, a poll worker, an election official insider, and a vendor insider.
This possible vulnerability has a__ more widespread potential__. Polling place procedures are one method of mitigating this issue, with poll workers actively verifying that the USB ports are sealed and no one has access. As per the direction given by the California Secretary of State, this software testing report does not include any recommendation as to whether or not the system should be approved.
This looks like a report by Padilla staff
https://votingsystems.cdn.sos.ca.gov/vendors/dominion/ds510a/ds510a-staff.pdf