On April 22, 2022, Kari Lake and Mark Finchem filed a complaint with the US District Court in Arizona to stop the muse of voting machines unless the systems were made open to the public, which would probably mean they would have to go with paper ballots only. That would cut down on the previously open avenues for voter fraud. They argue that this change must be made before the 2022 midterm election.
In addition, the US Supreme Court will be hearing a case that would prevent officials and judges from setting election law, which the constitution has given explicitly to the state legislatures. That decision could come out this fall. If not, it could be in place well before the 2024 election.
Liberal Federal Judge Amy Totenberg has sealed the Halderman report that is being used in the lawsuit Curling v Raffensperger in Georgia. The Halderman Report details the vulnerabilities of the voting machines in Georgia. Democrats want very badly to keep this report from becoming public for obvious reasons. It is in this report about the “erroneous code” on the machines. The more we learn about the voting machines and the actions of those outside the state legislators, the more convinced we are that illegal acts were committed.
CISA recently addressed the report publicly by issuing a “Security Advisory“. Part of this report listed out mitigation steps that CISA recommends be followed:
On July 21, 2022, there was a hearing for Lake v Hobbs in Phoenix. A witness by the name of Clay Parikh was called for the plaintiff. Parikh is the lead information systems security officer for the ground missile defense system for Northrop Grumman. Prior to that, he worked for Lockheed Martin and Leidos through their merger as the deputy cyber manager for the Army Corps of Engineers.
But it’s his prior work that is of particular relevance to this case: from 2008 to 2017, he worked as a security tester and a security subject matter expert for Wyle Laboratories and Pro V&V. Parikh claims to have tested hundreds of voting systems, including the Dominion and ES&S voting machines throughout his career as part of the certification process for the EAC and Secretaries of State. He holds a CISSP certification (Certified Information System Security Professional), as well as certification as an ethical hacker and a certified hacking forensics investigator.
His testimony:
The next attorney to cross-examine Parikh was Mr. LaRue. This cross-examination was an absolute disaster:
First, we learned that the machines do in fact connect to the internet. And even when LaRue states “let’s focus on the ones that weren’t”, Parikh responded that the machines “that weren’t” still had “other available connections on the motherboards which were a concern.”
And in the final redirect, plaintiff’s attorney asked about the ES&S DS200 machines. He specifically inquired if he was able to hack them and how long it took. Parikh said that he was “stopped from going further.” He said he wanted to continue and “actually get in and control the software because you can actually manipulate [sic] the statistical data on the system.”
In a 20 minute testimony with two attorneys on the cross-examination and a redirect, Clay Parikh revealed that the testing labs:
Restrict testers from showing vulnerabilities
Stop testers from going further into the machines in a way that could allow for software manipulation of the statistical data.
The EAC has been sent reports of all of Parikh’s hackings, which took minutes, and were done in a professional testing environment.
The voting machines can connect to the internet and that even the ones that aren’t connected still have open ports and means by which to connect.
Dominion rewrote their Democracy Suite software in 2018.