Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
In reply to the discussion: Mail Biden, Harris/campaign to ask for recounts in swing states re Spoonamore etc. [View all]Think. Again.
(18,778 posts)5. And here is the text of the CyberSecurity Experts letter to Harris...
I removed the citations and footnotes for clarity, but all verification of claims can be found in the original document here : https://freespeechforpeople.org/wp-content/uploads/2024/11/letter-to-vp-harris-111324.pdf
The Honorable Kamala Harris
The White House
Office of the Vice President
1600 Pennsylvania Avenue, N.W.
Washington, DC 20500
Dear Vice President Harris,
We write to alert you to serious election security breaches that have
threatened the security and integrity of the 2024 elections, and to identify ways to
ensure that the will of the voters is reflected and that voters should have confidence
in the result. The most effective manner of doing so is through targeted recounts
requested by the candidate. In the light of the breaches we ask that you formally
request hand recounts in at least the states of Michigan, Nevada, Wisconsin, and
Pennsylvania. We have no evidence that the outcomes of the elections in those
states were actually compromised as a result of the security breaches, and we are
not suggesting that they were. But binding risk-limiting audits (RLAs) or hand
recounts should be routine for all elections, especially when the stakes are high and
the results are close. We believe that, under the current circumstances when
massive software breaches are known and documented, recounts are necessary and
appropriate to remove all potential doubt and to set an example for security best
practices in all elections.
In 2022, records, video camera footage, and deposition testimony produced
in a civil case in Georgia disclosed that its voting system, used statewide, had
been breached over multiple days by operatives hired by attorneys for Donald
Trump. The evidence showed that the operatives made copies of the software
that runs all of the equipment in Georgia, and certain other states, and shared it
with other Trump allies and operatives.
Subsequent court filings and public records requests revealed that the
breaches in Georgia were part of a larger effort to take copies of voting system
software from systems in Michigan, Pennsylvania, Colorado and Arizona, and
to share the software in the operatives network. According to testimony and
declarations by some of the technicians who have obtained copies of the
software, they have had access for more than three years to the software for the
central servers, tabulators, and highly restricted election databases of both Election Systems & Software (ES&S), and Dominion Voting Systems, the two largest
voting system vendors, constituting the most severe election security breach
publicly known.
Combined, their equipment counts nearly 70% of all votes nationwide.
Ninety-six percent of Arizona voters use Dominion and ES&S equipment; 100% of
Georgia voters vote on Dominion machines; 98% of Nevada votes on Dominion
voting machines and the remainder uses ES&S; 69% of Michigan voters ballots
are counted on Dominion or ES&S equipment; 89% of Pennsylvania voters ballots are counted on Dominion or ES&S equipment; ES&S counts 92% of North
Carolina ballots; and either ES&S or Dominion counts 97% of Wisconsin votes.
Possessing copies of the voting system software enables bad actors to install
it on electronic devices and to create their own working replicas of the voting
systems, probe them, and develop exploits. Skilled adversaries can decompile the
software to get a version of the source code, study it for vulnerabilities, and could
even develop malware designed to be installed with minimal physical access to the voting equipment by unskilled accomplices to manipulate the vote counts. Attacks could also be launched by compromising the vendors responsible for programming systems before elections, enabling large scale distribution of malware.
In December 2022 and again in 2023, many of us, concerned by the
security risks posed by these breaches, wrote to the Attorney General, FBI
Director, and Cybersecurity and Infrastructure Security Agency (CISA) Director outlining the security concerns and urging an investigation. Though there have
been limited, localized investigations,14 there is no evidence of a federal
investigation to determine what was done with the misappropriated voting
software.
Other relevant parties have pointed to the serious risks posed by the
misappropriation of the voting software. Before it was known that partisan
operatives had taken the software, Dominion Voting Systems objected vehemently to providing its software to the same partisan actors who ultimately got copies through voting system breaches, stating that to give its software to biased actors would cause irreparable damage to the election security interests of the
country.
Before the breaches in Georgia had been confirmed, the Georgia Secretary
of States chief information officer testified that having copies of the software
would provide a road map to the ways the system could be accessed. The
Georgia Attorney General opposed providing copies of the software to lawyers for the Trump campaign in a late 2020 election challenge, arguing that images of the voting system software would provide the keys to the software kingdom.
Notably, U.S. elections are potentially resilient because there are paper
ballots recording the voters intent in most states, meaning that even if the voting
system is at risk, the will of the voters can be determined reliably by recounting the
paper ballots by hand (although we are aware that not all paper ballots are verified
by the voter, and not all states take adequate care to protect the ballot chain of
custody.)
Audits will be conducted in some of the most scrutinized states, but in key
states they will not be conducted in a timely way that could reveal any concerns
with the vote count. In addition, in most states the audits are insufficiently rigorous
to ensure any potential errors in tabulation will be caught and corrected, and they
cannot be considered a safeguard against the security breaches that have occurred.
Specifically, Georgias audits are non-binding, and Michigan, Nevada and
Wisconsin laws do not provide that the audit be conducted before certification.
Therefore, it would be impossible to know for these critical states if the audits
uncovered errors or miscalculations before the state deadlines to seek recounts.
Among swing states, only Arizonas audit laws ensure that, if enough
discrepancies are identified, the audit hand count will be expanded to correct a
potentially incorrect result. In other words, aside from Arizona, in contested states,
there is no legal mechanism for the audit to correct the outcome, no matter how
much error the audit uncovers. Given these facts, the only guarantee for rigorous,
effective audits of the vote in the swing states will be through candidate-requested
statewide hand recounts.
(emphasis mine)
The facts around the voting system breaches are not disputed; it is well-
documented that there were severe, multiple voting security breaches before the 2024 election. To ensure that voters can have confidence that the breaches in
security did not taint the results of the 2024 election, we recommend pursuing hand
recounts in, at minimum, Michigan, Nevada, Wisconsin and Pennsylvania as they
will provide insufficient safeguards against threats posed by the breaches of the
election software and will not provide important information in a timely way.
Thank you for your time and consideration of this important matter.
Sincerely,
Duncan Buell Ph.D.
Chair Emeritus NCR Chair in Computer Science and Engineering
Dept. of Computer Science and Engineering
University of South Carolina*
David Jefferson Ph.D.
Lawrence Livermore National Laboratory* (retired)
Election Integrity Foundation*
Susan Greenhalgh
Senior Advisor for Election Security
Free Speech For People
Chris Klaus
Founder
Internet Security System*
William John Malik
Malik Consulting, LLC*
Peter G. Neumann Ph.D.
Chief Scientist,
SRI International Computer Science Lab*
John E. Savage
An Wang Professor Emeritus of Computer Science
Brown University*
*Affiliations are listed for identification purposes only and do not imply
institutional endorsement.
The Honorable Kamala Harris
The White House
Office of the Vice President
1600 Pennsylvania Avenue, N.W.
Washington, DC 20500
Dear Vice President Harris,
We write to alert you to serious election security breaches that have
threatened the security and integrity of the 2024 elections, and to identify ways to
ensure that the will of the voters is reflected and that voters should have confidence
in the result. The most effective manner of doing so is through targeted recounts
requested by the candidate. In the light of the breaches we ask that you formally
request hand recounts in at least the states of Michigan, Nevada, Wisconsin, and
Pennsylvania. We have no evidence that the outcomes of the elections in those
states were actually compromised as a result of the security breaches, and we are
not suggesting that they were. But binding risk-limiting audits (RLAs) or hand
recounts should be routine for all elections, especially when the stakes are high and
the results are close. We believe that, under the current circumstances when
massive software breaches are known and documented, recounts are necessary and
appropriate to remove all potential doubt and to set an example for security best
practices in all elections.
In 2022, records, video camera footage, and deposition testimony produced
in a civil case in Georgia disclosed that its voting system, used statewide, had
been breached over multiple days by operatives hired by attorneys for Donald
Trump. The evidence showed that the operatives made copies of the software
that runs all of the equipment in Georgia, and certain other states, and shared it
with other Trump allies and operatives.
Subsequent court filings and public records requests revealed that the
breaches in Georgia were part of a larger effort to take copies of voting system
software from systems in Michigan, Pennsylvania, Colorado and Arizona, and
to share the software in the operatives network. According to testimony and
declarations by some of the technicians who have obtained copies of the
software, they have had access for more than three years to the software for the
central servers, tabulators, and highly restricted election databases of both Election Systems & Software (ES&S), and Dominion Voting Systems, the two largest
voting system vendors, constituting the most severe election security breach
publicly known.
Combined, their equipment counts nearly 70% of all votes nationwide.
Ninety-six percent of Arizona voters use Dominion and ES&S equipment; 100% of
Georgia voters vote on Dominion machines; 98% of Nevada votes on Dominion
voting machines and the remainder uses ES&S; 69% of Michigan voters ballots
are counted on Dominion or ES&S equipment; 89% of Pennsylvania voters ballots are counted on Dominion or ES&S equipment; ES&S counts 92% of North
Carolina ballots; and either ES&S or Dominion counts 97% of Wisconsin votes.
Possessing copies of the voting system software enables bad actors to install
it on electronic devices and to create their own working replicas of the voting
systems, probe them, and develop exploits. Skilled adversaries can decompile the
software to get a version of the source code, study it for vulnerabilities, and could
even develop malware designed to be installed with minimal physical access to the voting equipment by unskilled accomplices to manipulate the vote counts. Attacks could also be launched by compromising the vendors responsible for programming systems before elections, enabling large scale distribution of malware.
In December 2022 and again in 2023, many of us, concerned by the
security risks posed by these breaches, wrote to the Attorney General, FBI
Director, and Cybersecurity and Infrastructure Security Agency (CISA) Director outlining the security concerns and urging an investigation. Though there have
been limited, localized investigations,14 there is no evidence of a federal
investigation to determine what was done with the misappropriated voting
software.
Other relevant parties have pointed to the serious risks posed by the
misappropriation of the voting software. Before it was known that partisan
operatives had taken the software, Dominion Voting Systems objected vehemently to providing its software to the same partisan actors who ultimately got copies through voting system breaches, stating that to give its software to biased actors would cause irreparable damage to the election security interests of the
country.
Before the breaches in Georgia had been confirmed, the Georgia Secretary
of States chief information officer testified that having copies of the software
would provide a road map to the ways the system could be accessed. The
Georgia Attorney General opposed providing copies of the software to lawyers for the Trump campaign in a late 2020 election challenge, arguing that images of the voting system software would provide the keys to the software kingdom.
Notably, U.S. elections are potentially resilient because there are paper
ballots recording the voters intent in most states, meaning that even if the voting
system is at risk, the will of the voters can be determined reliably by recounting the
paper ballots by hand (although we are aware that not all paper ballots are verified
by the voter, and not all states take adequate care to protect the ballot chain of
custody.)
Audits will be conducted in some of the most scrutinized states, but in key
states they will not be conducted in a timely way that could reveal any concerns
with the vote count. In addition, in most states the audits are insufficiently rigorous
to ensure any potential errors in tabulation will be caught and corrected, and they
cannot be considered a safeguard against the security breaches that have occurred.
Specifically, Georgias audits are non-binding, and Michigan, Nevada and
Wisconsin laws do not provide that the audit be conducted before certification.
Therefore, it would be impossible to know for these critical states if the audits
uncovered errors or miscalculations before the state deadlines to seek recounts.
Among swing states, only Arizonas audit laws ensure that, if enough
discrepancies are identified, the audit hand count will be expanded to correct a
potentially incorrect result. In other words, aside from Arizona, in contested states,
there is no legal mechanism for the audit to correct the outcome, no matter how
much error the audit uncovers. Given these facts, the only guarantee for rigorous,
effective audits of the vote in the swing states will be through candidate-requested
statewide hand recounts.
(emphasis mine)
The facts around the voting system breaches are not disputed; it is well-
documented that there were severe, multiple voting security breaches before the 2024 election. To ensure that voters can have confidence that the breaches in
security did not taint the results of the 2024 election, we recommend pursuing hand
recounts in, at minimum, Michigan, Nevada, Wisconsin and Pennsylvania as they
will provide insufficient safeguards against threats posed by the breaches of the
election software and will not provide important information in a timely way.
Thank you for your time and consideration of this important matter.
Sincerely,
Duncan Buell Ph.D.
Chair Emeritus NCR Chair in Computer Science and Engineering
Dept. of Computer Science and Engineering
University of South Carolina*
David Jefferson Ph.D.
Lawrence Livermore National Laboratory* (retired)
Election Integrity Foundation*
Susan Greenhalgh
Senior Advisor for Election Security
Free Speech For People
Chris Klaus
Founder
Internet Security System*
William John Malik
Malik Consulting, LLC*
Peter G. Neumann Ph.D.
Chief Scientist,
SRI International Computer Science Lab*
John E. Savage
An Wang Professor Emeritus of Computer Science
Brown University*
*Affiliations are listed for identification purposes only and do not imply
institutional endorsement.
Edit history
Please sign in to view edit histories.
Recommendations
5 members have recommended this reply (displayed in chronological order):
102 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
RecommendedHighlight replies with 5 or more recommendations
Mail Biden, Harris/campaign to ask for recounts in swing states re Spoonamore etc. [View all]
David Boyle
Nov 16
OP
Nah, the priority is on assuring the counts are correct. And rightfully so.
Think. Again.
Nov 17
#74
And recounts done after the election was closed showed that Gore actually did win legitimately.
Think. Again.
Nov 16
#9
In any case, we should have learned the lesson that any election results must be vigorously verified.
Think. Again.
Nov 16
#12
Other than noting that the bullet ballot issue has been raised, there is nothing substantiating it
onenote
Nov 17
#76
Correct, audits and recounts must be done to compare the first-count numbers...
Think. Again.
Nov 17
#77
Exactly my thought, especially with public trust in the election system at such extreme risk right now.
Think. Again.
Nov 17
#85
I don't think 350,000 votes for trump only and not for any other repub doesn't look more legit than a ballot
onenote
Nov 16
#19
You do know computerized voting machines use code to read paper ballots, right?
Think. Again.
Nov 16
#31
Excellent! Let's hope our attorneys and watchers are keeping a close eye on this....
Think. Again.
Nov 16
#39
Unless there has been any discrepencies that would allow for a recount to be requested.
Think. Again.
Nov 16
#43
And this website explains that NC audits are not required to be made public...
Think. Again.
Nov 16
#42
I have only seen reference to a +/-600,000 number spread among all the swing states.
Think. Again.
Nov 16
#56
I also emailed the Spoonamore letter to ten Democrats I know. Already generating some outrage! Took five minutes. If
Doodley
Nov 16
#61
Ty, for the links. Sent letfers to both Vice President Harris & President Biden.
electric_blue68
Nov 16
#63
YW. But I think you asked me about a quote -Ulysses, which I did share. No problem, just ask the right poster👍
electric_blue68
Nov 16
#65
True that. And, yes, i do know the quote - but didn't know it was Ulysses
electric_blue68
Nov 17
#67
Fun Daily Kos article, "I want to know why a diary about possible bullet ballot fraud was taken down"
David Boyle
Nov 18
#96
And one more I see on my screen: "2024: Rigged Election or National Psychosis?"
David Boyle
Nov 18
#99
To add some brief levity, here's Candy Warpop's "Trump Is a Nazi" music video
David Boyle
Nov 18
#100