In June 2022 The Gateway Pundit’s Joe Hoft reported that an Obama judge had sealed the much anticipated Halderman Report on election voting machines using in Georgia.
Corrupt Obama Judge Amy Totenberg sealed and covered up the results of an investigation of voting machines in Georgia. This report has still not been released. This week CISA released a report showing material discrepancies in these systems while attempting to downplay these material issues.
Corrupt Obama Judge Amy Totenberg s the sister of NPR’s far-left correspondent Nina Totenberg.
We first reported on Obama Judge Totenberg in 2018 when she got involved in that election and tried to steal the Georgia governor’s race for Democrat Stacey Abrams.
Judge Totenberg is the corrupt judge who also allowed Hillary’s attorney Marc Elias to use the 14th Amendment to try and prevent Rep. Marjorie Taylor Greene from running in the 2022 Election:
In 2021, Judge Totenberg committed her gravest offense as a judge. She sealed and covered up the results of the Halderman report in Georgia. Up until this week we did not know what is in this report. Halderman’s investigation into the voting machines in Georgia started before the 2020 Election and was completed in July 2021.
Steve Bannon interviewed Kurt Olsen, about cybersecurity analyst, J. Alex Halderman, who found flaws in Dominion voting machines and warned about the potential for future attacks. Judge Totenberg sealed the report. According to court documents, Halderman wrote his report after he was given 12 weeks of access to an unused Dominion ICX voting machine. Professor Halderman requested the report to be unsealed to be shared with the Cybersecurity and Infrastructure Security Agency (CISA), a standalone United States federal agency responsible for our infrastructure, including our voting systems.
Here is the interview:
The report eventually made it to the CISA and they released an abbreviated report last year. Many believe that this CISA report was released in an effort to mitigate the results from the Halderman Report when it is finally released.
The Halderman Report was finally released this week. The report confirms that votes can be altered in the Dominion voting machines. In fact, the report reveals that the Dominion software can be hacked.
On Thursday VoterGA founder Garland Favorito joined Steve Bannon on The War Room to discuss the findings from the explosive report.
Trump-hating Secretary of State Raffensperger hid this information from the public until now. Why is that?
Garland Favorito brought the receipts with him on The War Room.
Garland Favorito: Finally, just yesterday I believe this report was released and it has some amazing findings that basically say what we have been saying all along. What Mike (Lindell) has been saying, what you and I have been saying, and so many people, that the system is very insecure. It can be hacked.
So what Dr. Halderman did is he looked at only the ballot marking device part of the system. This (investigation and report) is limited to that. It doesn’t actually even include the scanners which have another incredibly vulnerable. Which we have already found have been compromised in the 2020 election in Fulton County. So that’s the background, Steve, of all of what’s been going on.
Steve Bannon: I just want to make sure. I want you go through the slides. Holleman’s totally independent, right? He’s some guy that’s an expert in the field. He’s a subject matter expert. He has no axe to grind on this, correct?
Garland Favorito: Absolutely. And if anything, he leans far more on the Democrat side than the Republican. But as you said, he’s an independent professor. Certainly has no axe to grind, particularly for Donald Trump or any Republicans…
…It was a titanic fight. People from all over different organizations have requested that this report be released for the security of their own voting systems. The Secretary of State of Louisiana requested that it be released. OAN requested that it would be released for part of their lawsuit. I think Fox News as well, because Dominion is suing them. It’s critical information, but it’s critical to the security of elections in the country because you could do Dr. Halderman could have done the same thing to a different vendor as well.
Slide two if Cameron has that already. But basically this is about what we call the Dominion ICX, which is the ballot marking device. And — Dr. Holleman says that… the ICX suffers from critical vulnerabilities that can be exploited to subvert all of its security mechanisms. He goes on to say that he demonstrates that these vulnerabilities provide multiple routes by which attackers can install malicious software on Georgia ballot marking devices. And he continues on, he says, “I explain how such malware can alter voters’ votes while subverting all of the procedural protections practiced by the state. That’s about as damning as you can get.
You go on to number slide three, and he says that attackers can alter the QR codes on the printed ballots to modify voter selections. The QR code, Steve, as you know, contains the votes. The votes are accumulated out of the QR code. The system does not accumulate what the voter actually can see on text. And he also found that the attackers can forge or manipulate the smart cards that the ballot marking device uses to authenticate technicians, poll works, and voters you can manipulate. He goes on to show how they are forged. He actually forged the cards and did all sorts of things as part of his analysis.
So flipping on to the next slide, he says that the software update that Georgia installed in October 2020 left Georgia’s ballot marking devices in a state where anyone can install malware with only brief physical access to the machines. And he goes on to say, I showed that this problem can potentially be exploited in the polling place even by nontechnical voters. Go on to the next slide. And he goes on to say, I demonstrate that attackers can execute arbitrary code with root supervisory privileges, which means that. You have control of everything on the machine.
And he says by altering the election definition file that county workers copy to every BMD before each election, this has been the key point of our concerns, is that this election definition file comes from the state, and the state propagates this to every county, which propagates it to every voting machine. And Professor Holland again says that attackers could exploit this to spread malware to all ballot marking devices across the county or the entire state. And we believe that has actually been done because in 2017, we found that the Secretary of State’s Election Management Server, the state server, was exposed to the Internet for virtually anyone in the world to place malware on it. So head on to the next slide. The ICX contains numerous unnecessary Android applications.
And he talks about a terminal emulator that has a supervisory command interface that overrides all of the access controls. So he goes on to say that an attacker can alter the ballot marking devices audit logs simply by opening them in the on screen text editor application. So you could literally audit you could audit the audit logs just like you would create or change a Word document. That’s how easy that would be.
Going on to the next slide. He says that I developed a series of proof of concept attacks, which he goes over in his 96-page report. And he says that – vulnerabilities in the ballot marking device could be used to change the personal votes of individual Georgia voters, it is very likely that there are other equally critical flaws that are yet to be discovered…
…He said that attackers only have to find one of the flaws. They don’t have to find them all. He found I don’t know how many, probably a dozen or more.
Next slide. He goes on to say that the ICX BMDs that’s the Dominion ICX ballot marking devices are not sufficiently secured against technical compromise to withstand vote-altering attacks by bad actors who are likely to attack future elections in Georgia… Despite the addition of a paper trail, the malware can still change individual votes and most election outcomes without detection. And then we’ve got just one or two more slides.
The next slide: Using vulnerable ICX BMDs for all in-person voters, as Georgia does, greatly magnifies the security risk compared to jurisdictions that just use handmark paper ballots but provide the ballot marking devices to the voters upon request. So in other words, if you have a voter with an impairment, they need ballot marking device. But when you give this ballot marking device to every single voter, it increases the security risk by an incredible order of magnitude. And Dr. Haldeman goes on to say that the critical vulnerabilities in the ICX indicate that it was developed without sufficient attention to security during design, software engineering and testing. Certainly, I think that is true because why would a vendor come out with a QR-coded voting system after we had 15 years of complaints against the unverifiable voting of the old paperless DREs these systems? And it’s not just Dominion, it’s ES as well. They have one. They are ill-conceived from the point that they were originally designed.
Via Midnight Rider.
Source material can be found at this site.