Details: Cozy Bear, Solarwinds, FireEye and the Hack of the US Govt

Cozy Bear (also called APT29, a known unit of Russia’s SVR foreign intelligence service) appears to have been behind the attack, the Wall Street Journal reports. Moscow denies any involvement in the incident. Reuters adds that the Kremlin thinks the Americans should have been more mutual, more cooperative.

FireEye calls the backdoor “Sunburst.” Microsoft’s Security Response Center has a detailed account of how the malware functions. Both FireEye and Microsoft have upgraded their security products to include measures for detecting and protecting against the attack. SolarWinds urges its customers to “upgrade to Orion Platform version 2020.2.1 HF 1 as soon as possible.”

Global cybersecurity firm FireEye hacked by foreign ... source

When FireEye Inc. discovered that it was hacked this month, the cybersecurity firm’s investigators immediately set about trying to figure out how attackers got past its defenses.

It wasn’t just FireEye that got attacked, they quickly found out. Investigators discovered a vunerability in a product made by one of its software providers, Texas-based SolarWinds Corp.

“We looked through 50,000 lines of source code, which we were able to determine there was a backdoor within SolarWinds,” said Charles Carmakal, senior vice president and chief technical officer at Mandiant, FireEye’s incident response arm.

After discovering the backdoor, FireEye contacted SolarWinds and law enforcement, Carmakal said.

In part: Washington — U.S. government agencies were ordered to scour their networks for malware and disconnect potentially compromised servers after authorities learned that the Treasury and Commerce departments had been hacked in a months-long global cyberespionage campaign. The campaign was discovered when a prominent cybersecurity firm learned it had been breached.

In a rare emergency directive issued late Sunday, the Department of Homeland Security’s cybersecurity arm warned of an “unacceptable risk” to the executive branch from a feared large-scale penetration of U.S. government agencies that could date back to mid-year or earlier.

“This can turn into one of the most impactful espionage campaigns on record,” said cybersecurity expert Dmitri Alperovitch.

The apparent conduit for the Treasury and Commerce Department hacks – and the FireEye compromise – is a hugely popular piece of server software called SolarWinds. It’s used by hundreds of thousands of organizations globally, including most Fortune 500 companies and multiple U.S. federal agencies that will now be scrambling to patch up their networks, said Alperovitch, the former chief technical officer of the cybersecurity firm CrowdStrike.

On its website, SolarWinds says it has 300,000 customers worldwide, including all five branches of the U.S. military, the Pentagon, the State Department, NASA, the National Security Agency, the Department of Justice and the White House. It says the 10 leading U.S. telecommunications companies and top five U.S. accounting firms are also among customers.

The DHS directive – only the fifth since such directives were created in 2015 – said U.S. agencies should immediately disconnect or power down any machines running the impacted SolarWinds software.

“We believe that this vulnerability is the result of a highly-sophisticated, targeted and manual supply chain attack by a nation state,” said SolarWinds CEO Kevin Thompson said in a statement. He said it was working with the FBI, FireEye and intelligence community. More here.

***  SolarWinds of Austin posts sharp rise in revenue - Austin ... source

Many more details on consequence –>

It turns out that the attackers also compromised the Department of Homeland Security. SolarWinds revealed to the Securities and Exchange Commission that the breach may affect 18,000 customers.

It appears that, in March 2020, someone managed to modify the SolarWinds Orion software during the build process—that is, the process that translates the human-readable code and merges it into a form that a computer can execute. This timing is based on both the Microsoft and FireEye analyses, as well as the reported versions affected by SolarWinds.

This modification included a sophisticated and stealthy Trojan program, designed to remotely control any computer that installed SolarWinds Orion. When customers installed the latest update, the Trojan program would start running on the victims’ computers. This is considered a software “supply chain attack”: The intended victims received a polluted copy of the Orion software directly or indirectly from SolarWinds.

What Now?

Christmas is now officially cancelled for three groups. The first is for the IT staff working for the perhaps 18,000 SolarWinds customers affected by the breach, who are going to have to spend the next weeks rebuilding their networks and going over everything with a fine-toothed comb looking for various backdoors. This is going to be a lot of work to sort out. The only good thing is that most of the customers don’t have secondary backdoors to worry about, because the biggest problem faced by the attacker was simply the target-rich environment. Each effort at exploitation increases the risk of discovery, and in the end, there are only so many people who can conduct these attacks.

The second group is the U.S. intelligence community. This attack started in March with the first exploitation starting in April. Either they didn’t know about it—a failure in the “defend forward” philosophy—or they did know about it, in which case they also failed to defend forward. There are going to be tough questions that the intelligence community will need to answer internally.

The final group is the Russian government. This was an amazingly valuable intelligence feed, capturing U.S. government communication leading up to the transition as well as critical insights into U.S. financial controls. Now the feed has gone dark and Russia has lost a hugely powerful asset. But then again, these are a bunch of Russian spies, so in the immortal words of every sysadmin: “fsck those guys”.

More here.

Real Financial Data on Dominion Voting Systems

by: Adam Andrzejewski

Forbes

Key points:

 

  • Dominion Voting Systems is the second largest vendor in the non-transparent and entrenched election system industry where three vendors control 88-percent of the market.
  • Recent Dominion contracts with major counties and cities across America set service agreements for years or even decades—helping lock-in the company’s dominant market position and prevent competition.

 

Dominion Voting Systems was paid $118.3 million to provide election services during the past three years, according to public records. Their revenues came from 19 states and 133 local governments including counties, cities, and even a couple of school districts.

IMAGECAST® PRECINCT - Dominion Voting Systems photo

Since presidential election of 2020, Dominion has come under wide public scrutiny, particularly in Georgia, Arizona, Michigan, Pennsylvania, and Wisconsin—critical toss-up states with close winning margins.

In their Dunn & Bradstreet filings, Dominion claimed annual sales of $36.5 million with contracts in 22 states and 600 local jurisdictions. However, the Penn Wharton Public Policy Initiative estimated that Dominion was in 1,645 jurisdictions with $100 million in annual revenues (2018).

So, our auditors at OpenTheBooks.com tracked Dominion’s revenues using state and local government spending disclosures, i.e. their checkbooks. (Dominion is a private company and, therefore, is not required to disclose financials. However, public bodies must be transparent, because they spend taxpayer money.)

Compiling the records required open record requests in 49 of the 50 states and in 11,400 local governments. Only California, which we are suing, rejected our sunshine request.

Here is a state-by-state description of our findings. (Download our raw payment data spanning 2017 through 2019.)

Georgia: In 2019, a $107 million ten-year contract with Dominion procured by the Secretary of State covers 30,000 touch screen voting machines and the installation of a “verified paper ballot” voting system. $89 million in payments were front-loaded into the first two-years of the contract.

New Mexico: Dominion received $52 million from the state government. Services included the full suite of hardware and software information-technology agreements.

Michigan: $31.5 million flowed from the state government ($30.8 million) and 22 localities over the last three years. Top spending local governments included Detroit ($457,880); Livonia ($65,310); Saginaw ($53,314); Dearborn ($22,975) and Antrim County ($20,056).

Services included machines, equipment repair, election services, ballot marking printers, vote tabulators and ballot boxes, modem cell services contracts, election coding, and voting machine coding.

Nevada: Clark County, the largest in Nevada, contracted for $28.7 million to have the company run its elections through 2032. The Secretary of State’s Office paid Dominion for $510,130.

California:  In 2019, the County of Santa Clara contracted with Dominion for up to $16.2 million to run their election services for the next eight-years. San Francisco’s 2019 contract covers five-years for an amount not to exceed $12.7 million.

$11.1 million in payments to Dominion came from just 15 counties and cities. The largest payer was Alameda ($5.2 million). Other counties included San Francisco ($4.2 million, Butte ($376), Glenn ($42,350), Monterey ($233,291), San Benito ($173,049), Santa Cruz ($583), Shasta ($3,975), Sierra ($9,571), Siskiyou ($127,314), Kern ($127,267), San Luis Obispo ($500,536), and San Mateo ($457,703).

Illinois: Cook County, the second most populous county in the country, signed a $31 million ten-year contract with Dominion in 2018. Competitor Election Systems & Software (ES&S) sued alleging equipment scanning problems and lack of state certification; later, ES&S dropped the case. Chicago has a ten-year $22 million deal.

From 2017-2019, payments of $6.2 million from six counties and cities flowed to Dominion. Cook County ($5.5 million) and the City of Chicago ($533,018) were the largest payers. Other counties included DuPage ($70,520), Kankakee ($9,900), Macoupin County ($15,153), and Winnebago ($18,900).

Arizona: We found the 2019-2022 contract in Maricopa County at total taxpayer cost of $6.1 million over three-years. The City of Phoenix also paid Dominion $48,300.

New York: The state spent $95.8 million with Dominion from 2008 through 2014 then renewed the contract through 2021.

From 2017-2019, $4.4 million from 44 government entities paid Dominion. Here are the top five counties: Suffolk ($1.1 million), Niagara ($539,334), Orange ($336,480), Monroe ($301,435), and Madison ($300,884). Interestingly, there were six school districts paying Dominion for election services.

Purchase descriptions ranged from batteries, compact flash memory cards, receipt paper for voting machines, warranty and support for “imagecast voting,” EMS 3-day training, absentee central count ballots and election day ballots, “pre marked test ballots,” firmware and hardware warranty, voting systems, and much more.

Pennsylvania: $1.1 million from five counties contracted with Dominion: Armstrong ($701,560), Crawford ($201,880), Washington ($121,880), Somerset County ($39,286), and Warren ($10,532). The disclosures did not list the services purchased.

Wisconsin: Dominion voting machines are used in the counties of Racine, Washington, and Ozaukee. In the large counties of Dane and Milwaukee, ES&S machines are used.

We were not able to capture government checkbook data on Dominion expenditures in Wisconsin.

 

 

Cuba and China: ‘Havana Syndrome’ was Caused by Directed Microwave Radiation

3 -4 years?

Source: A NEW REPORT BY the United States National Academies of Sciences, Engineering, and Medicine, has found that the so-called ‘Havana Syndrome’, which afflicted American and Canadian diplomats in Cuba and China in 2016 and 2017, was likely caused by directed microwave radiation. The study, which was commissioned by the US Department of State, is the latest in a long list of scientific assessments of the mysterious syndrome. The case remains a source of debate in the scientific, diplomatic and intelligence communities.

In 2017 Washington recalled the majority of its personnel from the US embassy in Havana, and at least two more diplomats from the US consulate in the Chinese city of Guangzhou. The evacuees reported experiencing “unusual acute auditory or sensory phenomena” and hearing “unusual sounds or piercing noises”. Subsequent tests showed that they suffered from sudden and unexplained loss of hearing, and possibly from various forms of brain injuries. In April of 2019 the Canadian embassy evacuated all family members of its personnel stationed in the Cuban capital over similar health concerns.

Unsolved 'sonic attacks' mystery sours U.S.-Cuba relations | America  Magazine

The latest study by the National Academies of Sciences resulted from the coordination of leading toxicologists, epidemiologists, electrical engineers and neurologists. The resulting 66-page report describes in detail the symptoms experienced by nearly 40 US government employees, who were examined for the purposes of the study. Its authors said they examined numerous potential causes, including psychological factors, infectious diseases, directed radio frequency energy, and even exposure to insecticides. Ultimately, the authors concluded that “many of the distinctive and acute signs, symptoms and observations reported by [US government] employees are consistent with the effects of directed, pulsed radio frequency (RF) energy”, according to their report.

However, the study does not attempt to answer the burning question of whether the symptoms experienced by the sufferers resulted from deliberate attacks, and if so, who may have been behind them. Some have accused the governments of Cuba and/or Russia of being responsible for the syndrome. However, the Cuban and Russian governments have strongly denied the accusations. The National Academies of Sciences report does state that the systematic study of pulsed radio frequency energy has a history of over half a century in Russia and the Soviet Union.

***

Description

In late 2016, U.S. Embassy personnel in Havana, Cuba, began to report the development of an unusual set of symptoms and clinical signs. For some of these patients, their case began with the sudden onset of a loud noise, perceived to have directional features, and accompanied by pain in one or both ears or across a broad region of the head, and in some cases, a sensation of head pressure or vibration, dizziness, followed in some cases by tinnitus, visual problems, vertigo, and cognitive difficulties. Other personnel attached to the U.S. Consulate in Guangzhou, China, reported similar symptoms and signs to varying degrees, beginning in the following year. As of June 2020, many of these personnel continue to suffer from these and/or other health problems. Multiple hypotheses and mechanisms have been proposed to explain these clinical cases, but evidence has been lacking, no hypothesis has been proven, and the circumstances remain unclear.

The Department of State asked the National Academies to review the cases, their clinical features and management, epidemiologic investigations, and scientific evidence in support of possible causes, and advise on approaches for the investigation of potential future cases. In An Assessment of Illness in U.S. Government Employees and Their Families at Overseas Embassies, the committee identifies distinctive clinical features, considers possible causes, evaluates plausible mechanisms and rehabilitation efforts, and offers recommendations for future planning and responses.

Obama’s normalizing relations did not work out so well. The big question now is whether there is a human rights violation and diplomatic consequence.

Facebook About to Buy Kustomer (chatbot)

Nothing is real anymore and that is true for customer service…chatbot systems handle your needs, or rather don’t so, it stands to reason that Facebook is about to buy Kustomer for just a mere $1 Billion. Once the transaction is completed, Mark Zuckerberg will have yet another excuse to offer when questioned in congressional hearings.

Manage High Support Volume Effortlessly | Kustomer Support Platform

Customers have high expectations when it comes to the level of service they demand from brands. While the American Express Customer Service Barometer found that Americans are willing to spend up to 17% more on businesses with excellent customer service, the top reason most customers switch products or services is because they feel unappreciated by the brand. In fact, 33% of Americans are inclined to switch to a different company after a bad experience.

Unfortunately for companies, the cost of human support is high. Introducing artificial intelligence (AI) into operations is one way companies can control costs while improving their service abilities and maintaining the human touch that makes customers feel appreciated and valued.

What Is AI Customer Service?

While AI and machine learning may at first appear to threaten the customer service industry, they actually have the power to make customer service agents’ jobs less time-consuming and more fulfilling.

Integrated AI can instantaneously retrieve the data an agent needs, while the agent or support team deals directly with the human side of customer service. This eliminates the need for human agents to run multiple systems simultaneously to address customer inquiries. Rather than employ agents to work 24/7 in a call center, AI can be used to field and classify calls and messages so human agents are then able to work more reasonable shifts with increased efficiency and reduced physical and mental stress.

Through intuitive machine learning that constantly works to improve itself, AI allows companies to be present to the very best of their abilities along every step of the customer journey.

Kustomer CRM Available in Shopify Plus Certified App Program | Kustomer

How Are AI and Machine Learning Being Used in Customer Service?

There are plenty of reasons why AI and automation should be loved, especially when it comes to customer service capabilities. Here are a few ways the technology is already being used:

Chatbots

Everyone has had the experience of needing a simple question answered by a brand, only to dread having to jump through customer service hoops just to get someone on the phone who may or may not have the answer. Conversational chatbots can make these conversations more seamless. Not only do conversational platforms help cut costs, they also can help your customer service scale and enable your agents to have more meaningful and productive conversations. By using chatbots to aid your live chat operations, your business will be able to engage customers in real time without the need for an around-the-clock staff.

Amazon, for instance, uses chatbots that leverage the data the company collects on all of its customers and their past orders. By allowing chatbots to access information about the customer’s past preferences, you can have the chatbot interact with customers up to the point where an agent is needed. Once the conversation is transferred to an agent, they can pick up where the chatbot left off. More here.

(Reuters) – Facebook Inc said on Monday it would buy customer service startup Kustomer, as the world’s largest social network adds tools to attract more sellers to its platforms.

Kustomer allows businesses to aggregate customer conversations from multiple channels into a single-screen, and also to automate some of the responses to prospective buyers. The New York-based firm already has its services integrated on Facebook Messenger and Instagram.

The deal will also enable Facebook to scale up its WhatsApp Business service, as more companies flock to the instant messaging app to answer customer queries during the COVID-19 pandemic.

Financial details of the deal were not disclosed.

The Wall Street Journal, which first reported about a likely acquisition, said the transaction valued Kustomer at $1 billion.

Facebook has doubled down on its e-commerce push, betting that it would help generate fresh ad revenue as user growth slows.

Earlier this year, it launched Shops, a service that allows businesses to display and sell products across Facebook’s platforms.

 

Dominion/SmartMatic, it is a Mess, here are Some Top Details

Trying to sort out the voting systems, hardware and software is crazy. Here is some help for you such that you can work your own answers to questions you may have. There is much much more for sure, but this summary is merely a tip sheet for the reader.

Primer: The Texas Secretary of State letter describing the refusal of the Dominion voting system.

The nation’s three largest voting machine manufacturing vendors — Election Systems & Software (ES&S), Dominion Voting Systems, and Hart InterCivic — have all publicly acknowledged that they place modems in some of their vote tabulators and scanners.

While the vendors claim that their “firewalls” protect computers from outside interference, many of the nation’s leading technical experts say this claim is bogus.

“Once a hacker starts talking to a voting machine through the modem,” says Princeton University Computer Science professor Andrew Appel, “they can hack the software and make it cheat in future elections.” It’s as straightforward as that.

So, what can we do?

“We should be unplugging all of these machines from the internet,” says Kevin Skoglund, the computer scientist who led the 10-expert investigatory team. This means keeping elections technologies disconnected all the time, including on election night.

“We cannot make our computers perfectly secure,” says Andrew Appel. “What we should do is remove all of the unnecessary, hackable pathways, such as modems. We should not connect our voting machines directly to the computer networks. That is just inviting trouble.” More here.

We begin with more details by Sidney Powell (General Flynn’s lawyer and part of the Trump legal team).

The we have this summary from American Oversight, which is a very left leaning group of lawyers but they too have concerns regarding Georgia’s overhaul of the state voting systems.

Last updated: November 16, 2020

In July 2019, Georgia Secretary of State Brad Raffensperger announced that the state had awarded a $107 million contract to manufacturer Dominion Voting Systems to replace existing voting machines with a new “verified paper ballot system.” As reported by the Atlanta Journal-Constitution, both Dominion and the state’s former elections company, Election Systems & Software, had connections with Gov. Brian Kemp’s administration. Dominion lobbyist Jared Thomas had been a longtime political and campaign aide to Kemp, who previously served as secretary of state, and another lobbyist, Barry Herron, had worked for Diebold Election Systems, which had originally sold Georgia its electronic voting machines.

Georgia voters had complained about malfunctioning voting machines after the November 2018 midterm elections, even filing a lawsuit aimed at overhauling the state’s election system, including the electronic machines. But critics worry that the new electronic ballot-printing devices from Dominion won’t be much better, contending that hand-marked paper ballots remain the most secure voting method. In fact, the new devices were given a test run in six Georgia counties during the November 2019 election, and ran into a number of issues. And records we’ve already obtained showed that voter check-in devices used “1234” as their default password — an “exceptionally weak security measure.” (State officials have said the passwords have been changed.)

Elsewhere in the state, voters reported long lines and ballot issues, and concerns remain about the hidden costs of the new voting system, the state’s planned purge of 300,000 names from its voter rolls, and security weaknesses in voting equipment. With the 2020 elections looming and the security of U.S. voting systems less than certain, American Oversight is investigating state officials’ communications with Dominion Voting Systems and its subcontractor KnowInk, and is requesting records that could shed light on how the state is working to ensure secure and accurate elections.

***  Glitch-Prone Dominion Voting Software Used in Georgia ... source

Dominion Voting Systems used statement, which obscured company’s council membership, to dispute concerns over voting systems

After allegations emerged that called into questioned the integrity of voting machines produced by Dominion Voting Systems, the Cybersecurity and Infrastructure Security Agency (CISA)—part of the Department of Homeland Security—issued a statement on Nov. 12 disputing the allegations, saying “the November 3rd election was the most secure in American history.”

What the agency failed to disclose, however, is that Dominion Voting Systems is a member of CISA’s Election Infrastructure Sector Coordinating Council, one of two entities that authored the statement put out by CISA.

A screenshot taken on Nov. 16, 2020, of the Cybersecurity & Infrastructure Security Agency website shows the members of the Sector Coordinating Council. (Screenshot/The Epoch Times)

In addition, Smartmatic, a separate voting machine company that has been the subject of additional concerns, is also a member.

The agency did not immediately respond to a request for comment on whether Dominion and Smartmatic had input or were otherwise involved in CISA’s Nov. 12 statement.

The joint statement on the integrity of the Nov. 3 election was issued by the Executive Committee of the Election Infrastructure Government Coordinating Council (GCC), an Executive Committee representing a coalition of certain state & local government officials and government agencies, and the Election Infrastructure Sector Coordinating Council (SCC), a coalition primarily composed of voting system manufacturers that also includes Democracy Works, an organization which promotes the use of technology to increase voter participation.

The statement claims, “There is no evidence that any voting system deleted or lost votes, changed votes, or was in any way compromised.”

“While we know there are many unfounded claims and opportunities for misinformation about the process of our elections, we can assure you we have the utmost confidence in the security and integrity of our elections, and you should too,” says the statement.

Some of the allegations surrounding the integrity of the presidential election, including by President Donald Trump’s legal team, have been focused on the voting systems provided by Dominion, and to a lesser extent, Smartmatic. Both Dominion and Smartmatic have dismissed concerns over their systems.

Both companies are listed as members of CISA’s Sector Coordinating Council and appear to be actively involved as they are named as “Organizing Members” of the SCC. Among the key objectives of the SCC is to “serve as the primary liaison between the election subsector and federal, state, and local agencies, including the Department of Homeland Security (DHS), concerning private election subsector security and emergency preparedness issues.”

The Charter states the primary mission of the Council is to “advance the physical security, cyber security, and emergency preparedness of the nation’s election infrastructure, in accordance with existing U.S. law. This mission will be accomplished through voluntary actions of the infrastructure owners and operators represented in the Council.”

CISA’s Reliance on Commercial Vendors

CISA says that it “works to ensure the physical security and cybersecurity of the systems and assets that supports the Nation’s elections,” including voter registration databases, IT infrastructure and systems to manage elections (including counting, auditing, and validating election results), voting systems, storage facilities for voting system infrastructure, and polling places including early voting locations.

In effect, CISA appears to act as something of an interface between commercial vendors and state & local governments.

“CISA is committed to working collaboratively with those on the front lines of elections—state and local governments, election officials, federal partners, and vendors—to manage risks to the Nation’s election infrastructure,” the agency states on its website.

As CISA notes, they do not have direct oversight or responsibility for the administration of our nation’s elections as that responsibility lies with state and local governments.

“Ultimate responsibility for administering the Nation’s elections rests with state and local governments, CISA offers a variety of free services to help states ensure both the physical security and cybersecurity of their elections infrastructure,” the agency writes on its website.

Dominion Using CISA to Deny Allegations

On Nov. 12, this publication published an article detailing a number of concerns raised about the integrity of Dominion Voting Systems in a sworn Aug. 24 declaration from Harri Hursti, a poll watcher and acknowledged expert on electronic voting security.

Hursti’s observations were made during the June 9 statewide primary election in Georgia and the runoff elections on Aug. 11, 2020, and centered primarily, although not exclusively, around the Dominion systems and equipment.

Hursti summarized his findings as follows:

  1. “The scanner and tabulation software settings being employed to determine which votes to count on hand marked paper ballots are likely causing clearly intentioned votes not to be counted”
  2. “The voting system is being operated in Fulton County in a manner that escalates the security risk to an extreme level.”
  3. “Voters are not reviewing their BMD [Ballot Marking Devices] printed ballots, which causes BMD generated results to be un-auditable due to the untrustworthy audit trail.”

As part of the article, we reached out to Dominion Voting Systems for comment on Nov. 11 about the allegations contained in Hursti’s sworn statement, to which the company did not respond. Our article was published on the morning of Nov. 12. That afternoon CISA published its statement denying any problems with the voting systems.

The next day, Nov. 13, Dominion sent us an email titled “SETTING THE RECORD STRAIGHT: FACTS & RUMORS,” which cited the joint statement published by the GCC and SCC, of which Dominion is an organizing member.

Epoch Times Photo
A screenshot taken on Nov. 16, 2020, of the “Election Infrastructure Subsector Coordinating Council Charter,” dated Feb. 15, 2018, shows both Dominion Voting Systems and Smartmatic as organizing members. The Cybersecurity & Infrastructure Security Agency uses “EISCC” and “SCC” interchangeably to refer to the Sector Coordinating Council. (Screenshot/The Epoch Times)

Nowhere in its email did Dominion disclose that it had any affiliation with CISA, or was an active member of the SCC, one of the issuing councils. The email itself referenced the statement in third-party fashion:

“According to a Joint Statement by the federal government agency that oversees U.S. election security, the Department of Homeland Security’s Cybersecurity, & Infrastructure Security Agency (CISA): ‘There is no evidence that any voting system deleted or lost votes, changed votes, or was in any way compromised.’ The government & private sector councils that support this mission called the 2020 election ‘the most secure in American history.’”

CISA did not respond to a request for comment by The Epoch Times about whether it has investigated the claims made in the Georgia lawsuit about Dominion.

Concerns Raised in Georgia Lawsuit

While it remains unclear whether CISA and the GCC/SCC have evaluated concerns raised in the Georgia lawsuit, their public statements categorically deny any problems with the systems.

However, in an Oct. 11 order just weeks prior to the presidential elections, U.S. District Judge Amy Totenberg agreed with the concerns associated with the new Dominion voting system, writing that the case presented “serious system security vulnerability and operational issues that may place Plaintiffs and other voters at risk of deprivation of their fundamental right to cast an effective vote that is accurately counted.”

Despite the court’s misgivings, Totenberg ruled against replacing the Dominion system right before the presidential election, noting that “Implementation of such a sudden systemic change under these circumstances cannot but cause voter confusion and some real measure of electoral disruption.”

Given the recent timing of Judge Totenberg’s order, it does not appear that any of these issues were addressed by Dominion, CISC, or any of its affiliated organizations or Councils, despite their later statements claiming there were no such issues.