Homeland Security Admits Dominion Voting Systems Have Inherent Vulnerabilities Easily Manipulated by Local Election Officials


Posted originally on the conservative tree house on June 4, 2022 | sundance 

Last week we highlighted how the U.S. intelligence community public relations firm, The Washington Post, was getting out ahead of an election security report. {GO DEEP} There was a blitz of media reporting with transparent timing in advance of the Dept of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), releasing their findings of Dominion voting systems.

Late Friday the DHS report and advisory was released [SEE HERE].  Within the advisory CISA admitted there are major vulnerabilities within the Dominion electronic voting system.  However, they also claim there is “no evidence that these vulnerabilities have been exploited in any elections,” and they base that on a very thin defense.

The DHS-CISA claim toward the security of the Dominion system is predicated on the assertion that in order to modify the voting results, the local election officials would have to be participating in the election manipulation, therefore the systems are safe.  Seriously, that’s the statement.

Think about what is already known about local election officials in Pennsylvania, Georgia, Arizona, Nevada, Michigan and Wisconsin.  All of the voting manipulation was done on a county and local level.  Maricopa County Arizona was a key focus point for these exact voting issues during their audit.  Now consider when DHS-CISA says:

Exploitation of these [Dominion Voting System] vulnerabilities would require:

• physical access to individual ImageCast X devices,

• access to the Election Management System (EMS), or

• the ability to modify files before they are uploaded to ImageCast X devices.

We can check each of these three points affirmatively against what is known about the voting manipulation.  Yes, local election officials had “physical access” to the devices. Yes, local election officials had “access to the EMS,” and yes, local election officials have “the ability to modify files.”

When you recognize the already alarming efforts of local election officials to manipulate the outcome, what the DHS-CISA advisory is factually stating is that the system has built in vulnerabilities that permit local election officials to modify the voting outcome on electronic machines.   This is exactly the claim that has been made by all of the election integrity groups who have been raising alarms.

The DHS Cybersecurity and Infrastructure Security Agency is not refuting the likelihood of Dominion voting systems being manipulated by local officials, the DHS Cybersecurity and Infrastructure Security Agency notification is affirming the local election officials can indeed manipulate the electronic voting machine outcomes.  This is the exact opposite of the claim under their “Rumor Control” section {SEE HERE}.

The bottom line is this….  If local election officials want to manipulate the election outcome, they can.

The Dominion electronic voting system gives local officials the ability to manipulate the voting outcome.

DHS-CISA saying the Dominion vulnerability is not a problem because the local officials would have to be participating in the electronic manipulation is not anywhere close to claiming there has been no voting manipulation.  Exactly the opposite is true.

Consider this truthful statement:

‘If local election officials wanted to manipulate the outcome of electronic voting, the Dominion voting system is the specific system that gives them the ability to do so.’

Read the CISA advisory carefully and you will see exactly what I mean [SOURCE]

SUMMARY – This advisory identifies vulnerabilities affecting versions of the Dominion Voting Systems Democracy Suite ImageCast X, which is an in-person voting system used to allow voters to mark their ballot. The ImageCast X can be configured to allow a voter to produce a paper record or to record votes electronicallyWhile these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections. 

Exploitation of these vulnerabilities would require physical access to individual ImageCast X devices [√]access to the Election Management System (EMS) [√], or the ability to modify files before they are uploaded to ImageCast X devices [√].

Jurisdictions can prevent and/or detect the exploitation of these vulnerabilities by diligently applying the mitigations recommended in this advisory, including technical, physical, and operational controls that limit unauthorized access or manipulation of voting systems. Many of these mitigations are already typically standard practice in jurisdictions where these devices are in use and can be enhanced to further guard against exploitation of these vulnerabilities. {LINK}

It’s almost comical that national media cannot see what is clearly evident in this CISA bulletin, is exactly what election integrity groups have been shouting for years.  CISA simply says ‘yes, it can be done’, but ‘we have no evidence it was done.’   Well, DUH…  CISA has never looked to see if it was done – that’s a state and local level audit.

McCormick Concedes to Oz in Pennsylvania Senate GOP primary


Posted originally On the Conservative tree house on June 3, 2022 | Sundance 

David McCormick has conceded the Pennsylvania Republican Primary to Mehmet Oz as the state recount is failing to provide enough votes to close the distance between the two candidates.

HARRISBURG, Pa. (AP) — Former hedge fund CEO David McCormick conceded the Republican primary in Pennsylvania for U.S. Senate to celebrity heart surgeon Dr. Mehmet Oz, ending his campaign Friday night as he acknowledged an ongoing statewide recount wouldn’t give him enough votes to make up the deficit.

After a bitter campaign that blanketed the airwaves with millions of dollars in attack ads, McCormick issued a gracious concession, vowing to help unite the party behind Oz.

“It’s now clear to me with the recount largely complete that we have a nominee,” McCormick said at a campaign party at a Pittsburgh hotel. “And today I called Mehmet Oz to congratulate him on his victory.”

McCormick’s concession cements a general election campaign between Oz, who was endorsed by former President Donald Trump, and Democrat John Fetterman in what is expected to be one of the nation’s premier Senate contests. (read more)

DHS and Intel Community Media Outlets Proactively Move to Defend Dominion Voting Systems Ahead of Report on Electronic Election Hardware Issues Coming This Week


Posted originally on the conservative tree house on May 30, 2022 | Sundance 

The timing is not coincidental.  A 100-page report on electronic voting systems, by University of Michigan computer scientist J. Alex Halderman, remains under seal in a federal court in Atlanta as an outcome of election integrity lawsuits surrounding the Dominion voting system.  That report is rumored to be released soon, perhaps as early as this week.

In what appears to be a proactive move to get out ahead of identified voting system irregularities specific to the electronic voting systems, the Dept of Homeland Security, Cybersecurity and Infrastructure Security Agency (DHS-CISA), updated the election page on their website [SEE HERE] under the “Rumor Control” section.  DHS made the update on May 27, 2022, last week.

The very next day, May 28, 2022, The Washington Post produces an article [SEE HERE] describing an upcoming DHS-CISA 5-page memorandum that is in the process of being sent to the states ahead of a public release.

With the WaPo being the outlet of choice for the intelligence community & security state, it appears they received an advanced copy to help establish an early response effort.

Within The Post article, “there are nine flaws affecting versions of the machine called the Dominion Voting Systems Democracy Suite ImageCast X, according to a copy of an advisory prepared by CISA and obtained by The Washington Post.”  The article then goes immediately to downplay the problems. “The flaws, many of which are highly technical and which mostly stem from machine design as opposed to coding errors, generally require an attacker to have physical access to the devices or other equipment used to manage the election, CISA said.

[…] CISA’s five-page advisory is based in part on Halderman’s 100-page report, which remains under seal in a federal court in Atlanta. The advisory is expected to be released next week after officials in all 50 states are notified.

The WaPo article is filled with ‘nothing to see here, move along – move along,’ verbal engineering.

CNN then picks up the baton from the Washington Post, and they too tell their audience not to worry about any pesky evidence of election system vulnerabilities.  The professionals in charge of things have assured us there’s no problems and everything is fine.   After all, it would be far too difficult, and too many people would be involved, for there to be actual tampering and fraud in the use of the electronic systems.

(Via CNN) – Federal cybersecurity officials have verified there are software vulnerabilities in certain ballot-marking devices made by Dominion Voting Systems, discovered during a controversial Georgia court case, which could in theory allow a malicious actor to tamper with the devices, according to a draft analysis reviewed by CNN.

The vulnerabilities have never been exploited in an election and doing so would require physical access to voting equipment or other extraordinary criteria standard election security practices prevent, according to the analysis from the US Cybersecurity and Infrastructure Security Agency.

But because the subject is Dominion voting equipment, which has been the target of conspiracy theorists who falsely claim there was large-scale fraud in the 2020 election, federal and state and local officials are bracing for election deniers to try to weaponize news of the vulnerabilities ahead of midterm elections.

“While these vulnerabilities present risks that should be promptly mitigated, CISA has no evidence that these vulnerabilities have been exploited in any elections,” reads the draft CISA advisory, which the agency shared in a briefing with state and local officials on Friday. (read more)

For a group of government bureaucrats that are so confident there’s no ‘there, there‘, they sure are putting a lot of energy into delivering all the talking points ahead of the actual election reports and state advisories.

Meanwhile, Suspicious Cat remains, well, suspicious…