Dominion Voting Systems Officer of Strategy and Security, Eric Coomer addressed in 2016 the issue of vendors and election workers that can access or manipulate vote tally and canvassing, nevertheless state officials preferred contracting companies with shady ties to local political extremists and foreign actors.
Bypassing the election systems software means whoever has access can potentially manipulate the vote without many risks of detection. So the question needs to be asked, who has access to these data tables?
We asked Dr. Coomer that question. Dr. Coomer replied, ‘Vendors, election officials, and others who need to be granted access.’
This is explosive information. Dr. Coomer’s statement is an admission that various vendors, election officials, and others have access to the back end data tables that permit bypassing the operating system’s configuration. It is notable that when someone accesses these systems from a data table, their actions are not logged by the system; thereby making detection much more problematic. This contradicts Dr. Coomer’s assurances that the system is secure.
https://www.thepostemail.com/
One potential vulnerability was discovered and the level of access required to take advantage of this potential vulnerability would be open to a variety of actors including a voter, a poll worker, an election official insider, and a vendor insider.
https://votingsystems.cdn.sos.ca.gov/
“This is the reality of the security of your vote. Software systems that count and record the vote across Illinois and throughout the USA are not updated to address security problems, and even if they were, the software can be completely bypassed by going to the data tables that drive the systems.“
A 2019 Report on Dominion Voting Systems by Texas, California and New York Entities Determined Numerous Vulnerabilities
“From the down of using machines to count votes in the 19th century persistently the single source of fraud has been an insider fraud. Corrupt political machines who attempt to tinker the results of the elections in order to maintain power. “
https://youtu.be/zATZHWqU9V0?t=2148
Board of elections and party members made sure the the vendor was providing a backdoor that enables changing the “certified” numbers overriding the collected data.
It’s not a Bug it’s a Feature
– Software Vendors
Why are voting machines not standardized and thoroughly vetted by the very best minds in America?
It is a bug not a feature.
For example the new machines have barcodes. Barcodes are real vulnerability. You can do a lot to manipulate votes if you are going to count votes with barcodes. Also, a lot of the new machines the voting machine itself is printing the paper ballot instead of the voter marking the paper ballot. Those are the ballot marking devices The machine printing the ballot is another vulnerability for changing the ballot.We don’t have standardized thoroughly secure voting machines in the United States because there are people to whom it is advantageous for us not to have completely secure voting machines…
Those that are in power now in there under the corrupt system they’re the ones with the vested interest in not fixing it.