During a recent appearance on The Epoch Times‘ “Crossroads” program, Gary Miliefsky, executive producer of Cyber Defense Magazine and founding member of the Department of Homeland Security (DHS), revealed that voting machines are strictly prohibited under the law from having internet connectivity.
Back in 2014, the Federal Election Commission (FEC) enacted regulations towards this end, requiring that any electronic voting machines be standalone and disconnected, including wirelessly. And yet we know that Dominion Voting Systems machines were connected to the internet during the 2020 election.
This is obviously a problem, and something that disqualifies the election results as they currently stand. It is a fact that the machines were rigged in favor of Joe Biden, in some cases producing more votes for the former vice president than registered voters in certain areas.
“There’s rampant fraud,” says Miliefsky. “There’s enough evidence that you can’t summarily dismiss.”
Every piece of electronic equipment that has the capacity to connect to the internet either by ethernet or wireless card “is a vulnerable piece of equipment that can be hacked remotely,” he further says.
Dominion machines that were tested at the DEF CON hacking convention in Las Vegas were found to be hackable within minutes, according to Miliefsky. In one case, a person was able to get into a Dominion machine “in two minutes.”
If everyday hackers were able to penetrate the systems this quickly, imagine what the CIA in Frankfurt was able to do.
Interestingly, the mainstream media used to widely cover DEF CON events until around 2018 when they “quieted down,” Miliefsky notes. Apparently they knew what was coming in 2020 and did not want to draw any attention to it, if possible.
The 2020 election was fraudulent; Biden didn’t win
This tactic clearly failed, though, as all eyes are now on Dominion and those associated with it who used the machines and their vulnerabilities to hack the election and fix it for Biden.
“You can pull out the hard drive and then get admin permission to change voting,” Miliefsky says about how easily Dominion machines can be compromised.
“You can change the way the equipment” allocates votes to candidates, he further adds, affirming what others have said in sworn affidavits being compiled by Team Trump.
Depending on how a Dominion system is programmed, it can produce one vote or 200 votes for every legitimate vote cast for a particular candidate. And detecting this manipulation is difficult unless someone has direct access to a hard drive in order to forensically analyze it.
Vote-weighing algorithms can also be set to assign less of a vote to a candidate, such as 0.8 Trump votes for every 1.2 Biden votes. The sky is the limit, and Dominion machines were designed to make it all happen with ease.
Known as the “salami method,” vote-weighing algorithms appear to have been used in some areas to reduce the overall Trump count while artificially padding the Biden count.
“I believe in this election, there was a patch update at least on the Dominion System in 30 states, where the patch needs to be reviewed and analyzed,” Miliefsky contends.
“The Department of Justice needs to get a hold of the Dominion gear that was used in all these states (and) analyze why were they connected to the internet, which violates the FEC’s ruling from 2014.”
Nothing about a voting machine should be complex, in other words. One vote should count for one vote, and there is no need to have modems or other questionable devices added into the mix, as these only facilitate potential fraud.
“Software is extremely vulnerable,” Miliefsky says, adding that it should only contain “simple code” and nothing more.
Sources for this article include: