BREAKING: Outsiders with USBs and VCards Were Allowed in Pennsylvania Counting Areas with No Observers Present

An IT specialist reached out to the Gateway Pundit and provided more evidence regarding the weak and non-existent system controls in place in the Dominion voting machines and applications.  These machines never should have been used in a Presidential election.

One IT system expert told us that he never would have approved the Dominion system for use.  It is that bad.  Another IT expert provided a review of Dominion based on a vendor user guide he obtained.

HUGE: One of Many IT Heroes Uncovers Damning Evidence Regarding Potential for Fraud Within Dominion Voting Machines

In the post above we shared a tweet where Ron@CodeMonkeyZ stated that the local IT guy has the power to decide elections:

This evening another IT expert noted that one of the complaints of the Trump lawsuit in Pennsylvania is the following:

The entire election could have been decided in these back rooms with nobody present.

Our IT expert then located an audit of the Dominion system in California which is out on the Internet.  In the related audit report the state of California showed a high level diagram of the Dominion system which should be similar to the setup in Pennsylvania:

This diagram shows that there are laptops or workstations onsite that some of the workers can access after the ballot images are scanned in. Our expert states that he kept thinking about the USB drives in the lawsuit and immediately noticed this is where election data (i.e. forged/faked images) could be inserted.

In the audit report the auditor states:

The Secretary of State ran the Functional Test as if it were a jurisdiction that just purchased the voting system. Testing of the system began by setting up all equipment in a configuration that mirrored a production voting system. The DS5.10 architecture allows elections officials to use one or more, permanent server(s) and set of centraloffice voting devices, known to be running unaltered, certified software and firmware to create memory cards before each election and to use another, physically separate “sacrificial” server and set of voting devices after the election to tabulate results and generate reports. To transfer election specific data, the ICP2 machines utilize SD cards, the ICC and ICE machines utilize CF cards, and the ICX utilizes USB sticks. The election specific data (files) transferred on these cards are encrypted. An iButton is required to unencrypt the SD and CF cards for the ICP2, ICC, and ICE, and a smartcard is needed to unencrypt the USB sticks used to transfer data to the ICX machines. The key used for these devices can be unified or not. A unified key is one that is election specific. A key specific to that iButton (polling place specific) can be used also. This would prevent a malicious actor from accessing the entire system with just one key.

In the audit it is reported:

During the ICX source code vulnerability review, one potential vulnerability was discovered and the level of access required to take advantage of this potential vulnerability would be open to a variety of actors including a voter, a poll worker, an election official insider, and a vendor insider. This potential vulnerability has a more widespread potential. Polling place procedural controls are one method of mitigating this issue, with poll workers actively verifying that the USB ports are covered and the covers sealed to prevent access.

This means unless you block the USB ports they are at risk of being compromised.  But then the report mentions the key control weakness in these machines:

Vote-stealing software could easily be constructed that looks for undervotes on the ballot, and marks those unvoted spaces for the candidate of the hacker’s choice.  This is very straightforward to do on optical-scan bubble ballots (as on the Dominion ICE) where undervotes are indicated by no mark at all. The autocast configuration setting that allows the voter to indicate, “don’t eject the ballot for my review, just print it and cast it without me looking at it.” If fraudulent software were installed, it could change all the votes of any voter who selected this option, because the voting machine software would know in advance of printing that the voter had waived the opportunity to inspect the printed ballot.

Finally, in situations like in Arizona, where voters were given sharpies instead of pens, the Dominion system could identify ink types and kick these votes out of the system.

The Dominion system was ripe for fraud and never should have been allowed near the Democrat Party.

Dear Reader - The enemies of freedom are choking off the Gateway Pundit from the resources we need to bring you the truth. Since many asked for it, we now have a way for you to support The Gateway Pundit directly - and get ad-reduced access. Plus, there are goodies like a special Gateway Pundit coffee mug for supporters at a higher level. You can see all the options by clicking here - thank you for your support!
Photo of author
Joe Hoft is a Radio Host at, Author, Former International Corporate Executive in Hong Kong for a Decade, and a Contributor at TGP since 2016. Joe is the author of five books, including his new bestseller, "The Steal: Volume II - The Impossible Occurs" which addresses the stolen 2020 Election and provides an inventory of issues that prove that the 2020 Election was uncertifiable and never should have been certified for Joe Biden.

You can email Joe Hoft here, and read more of Joe Hoft's articles here.


Thanks for sharing!