General Election Data May Be Transmitted to China Experts Explain Dominion Change Process in Detail

As the U.S. 2020 election is rigged and a tsunami of evidence of fraud continues to emerge, on December 1, Powell’s legal team released another 37 pages of sworn testimony from an anonymous cybersecurity expert.

The expert, who has spent years collecting and analyzing foreign intelligence in the U.S. and abroad, is a trained cryptographer with more than 20 years of experience in cyber-tracing.

The affidavit explains the security risks of Dominion’s voting hardware and software: they were not developed specifically and certified by VSTL (Voting Systems Testing Laboratory), but are based on commercially available third-party technologies, especially since most of their hardware and software production is outsourced to China.

In addition, the Dominion Voting System partnered with content delivery network (CDN) Akamai to transmit U.S. election data to Akamai servers in Germany and China.

The affidavit also simulates how easily a U.S. election ballot can be changed in the Dominion Voting System.

Dominion Voting Hardware and Software Outsourced to China

VSTLs (Voting System Test Lab Certifications) are the most important part of a voting system, the affidavit says, because they review the use of COTS (that is, commercially available general commercial off-the-shelf technology, both hardware and software, that is not specifically developed and usually has low or no security), and vulnerabilities in COTS devices allow for the deployment of algorithms and scripts to intercept, alter and adjust vote counts.

“Many voting machine vendors tend to choose COTS because COTS products have been openly tested in the marketplace and are the most affordable and readily available. But COTS is also a source of security vulnerabilities,” Section 22 of the affidavit reads.

Section 22 of the affidavit goes on to say that voting machine manufacturers’ COTS components, whose specifications and hardware change over time as systems are upgraded, can be used as “Black Boxes. The key issue is that most of the COTS hardware used by voting machine manufacturers such as Dominion, ES&S, Hart Intercivic, Smartmatic, etc., has been outsourced to China and if the (CCP) tampered with our voting machines, we would be vulnerable to a “black box” of COTS components,” the affidavit states. The impact of ‘black box’ attacks and backdoors, as changes in hardware may go undetected. That’s why VSTL certification is important.”

The affidavit states, “Proprietary voting system software, for cost reasons, also uses COTS products. Therefore, it also relies on third-party software vendors to provide it with available software that is compatible with voting machine hardware. This is a vulnerability in terms of security, using software such as Crystal Reports, or PDFs, which are allowed to be constantly updated when exporting system reports.”

Via CDN service provider Akamai Technologies Dominion Software links to China

A CDN (Content Delivery Network) is a way to deliver information faster and more reliably through the server closest to the user.

Akamai Technologies, the world’s largest CDN service provider, leases server resources (such as bandwidth and storage space) to its customers in order to deliver content and increase the speed of Web site access to the nearest server, with Akamai Technologies servers located around the world.

Section 125 of the Affidavit states, “AKAMAI Technologies provides servers for all foreign government sites. (See Akamai’s white paper).”

“AKAMAI Technologies serves all .gov state websites in the United States.” Section 126 of the affidavit reads.

Sections 128 and 129 of the affidavit read: “Wisconsin has an ‘edge gateway’ (EDGE GATEWAY) port that belongs to AKAMAI Technologies, a company headquartered in Germany.” “The use of AKAMAI Technologies allows .gov sites, obfuscating and obscuring their systems, to move anonymously (AKAMAI Technologies) offshore by way of the top West Coast US server room” (Hurricane Electric) (he.net).”

“AKAMAI Technologies stores .gov information for all states in Germany through TELIA AB,” Section 135 of the affidavit says.

AKAMAI Technologies has servers around the world, including Iran and China, the affidavit said. “In 2018, AKAMAI Technologies (China division) merged (cloud service, cloud service) with China Unicom (CHINESE UNICOM),” Article 134 of the affidavit reads.

The affidavit states, “Akamai Technologies merged with a Chinese company that manufactures COTS components for voting machines, which provide access to our electronic voting machines. (See ¶ 140.)

“AKAMAI, Inc. provides services for SCYTL. (See article 124)

“China is not the only country that provides COTS and networking for voting machines, Germany has also set up a Chinese linked cloud service company (networking) with SCYTL through Laos (LAOS), also called Akamai Technologies, which has offices in China and links to the Dominion Software’s server.” (See Article 26.)

How Dominion does ticketing with SCYTL

According to the affidavit, when Dominion voting machines receive ballots, they do not process them themselves, but instead encrypt the data and transmit it to Scytl, whose servers are not located in the United States, where Scytl processes the ballots and releases the general election results. See figure below.

(Screenshot of affidavit)

The affidavit states that “Scytl contracted with the Associated Press (AP) to receive election statistics released by Scytl on behalf of Dominion during the election, that the AP’s reporting website has a disclaimer, and that the AP is powered by Scytl.” (See Article 33.)

The affidavit says, “To understand what I have observed during 2020, I will walk you through the process of casting a ballot by a voter (see Article 43)

“The first step is CONFIGURATION OF DATA. All non-electronic voting data is sent to Scytl (offshore) for data configuration, all electronic votes are sent to CONFIGURATION OF DATA, and then back to the electronic voting machine before moving on to the next stage, called ‘sorting the ballots’ ( CLEANSING) (see Article 44).

“The second step is sorting the ballots, a process in which all the ballots, from the software Dominion runs, come in and are ‘sorted’ into two categories: invalid and valid votes (see Article 45).

“The third step is shuffling or mixing (Shuffling/Mixing) the votes, which is the most nefarious and the easiest to tamper with. Simply put, the software mixes up all the votes and then re-encrypts them. This means that if one has a COMMITMENT KEY or a TRAPDOOR KEY, one can see the parameters of the algorithm deployed as the votes enter this mixing phase and how the algorithm redistributes the votes (see Section 46).

“Trapdoor is a cryptographic technical term that describes the state of a program that knows the commit parameters and is therefore able to change the commit values as it wishes. In other words, Scytl, or whoever knows the submission parameters, can get all the votes and give them to whomever they want (the candidate). If their total number of votes is 1000, the algorithm can distribute them among all the contenders, when it is deemed necessary to achieve their desired goal (see article 55).

“Scytl and Dominion have an agreement that only they two know the parameters. This means that if the submitted parameters are known, they can be accessed through a backdoor in the hardware to change the scope of the algorithm deployment, and also to change the results when the algorithm fails (see Article 54).

“University College London has published a paper that describes how this vote shuffling works. Essentially, when this mixing/washing occurs, people have no way of knowing if the vote that comes out the other end is, in fact, the vote they cast; therefore, there is zero fairness in the mixing of votes (see Article 47).

“The fourth step is the declassification phase, which suspends the counting of votes until the results are reported. In the final stage before the results are publicly released, the tally is converted from encrypted to plain text format. As mentioned earlier, those who are aware of the trapdoor can easily change the vote count by applying randomness and generating a secret text for the tally. Thus, in this case, Scytl, as a vote mixer, could collude with their voting company clients or proxies to change the votes and escape liability. Since the recipient does not have a decryption key, they can only rely on whether Scytl is honest or does not have any foreign participants in their backdoor or election company (such as Dominion) who can be accessed by the key (see Section 58).

“Therefore, you can’t prove that anyone manipulated anything. The owner of the key can provide enough to verify to you what you need to see without revealing any information, again showing that you can’t detect that (the election was) rigged, and you can’t verify the integrity of the vote at all (see Article 61.)”