The Kraken Released: Voting Software Like Dominion Does Not Allow For Audit of Manipulated Votes, Machines in Georgia Hooked Up to the Internet

Headlines Politics U.S.

In a much anticipated court filing, attorney Sidney Powell, lays out allegations of massive and vast election fraud that took place throughout the United States using easily manipulated voter software.

In a series titled “The Kraken Released,” (Named after Powell’s assertion that through this lawsuit she would be “releasing the Kraken,” a mythical creature of immense size and consequence) ITN is analyzing the court filing page by page and detailing the allegations and the relief sought by Powell.

Powell’s lawsuit asserts voting software like that of Dominion Systems does not allow for vote manipulation to be traced. “Audit logs,” or logs of changes made within the software by users, are not protected and can be modified at any time.

Additionally, the lawsuit asserts that voting machines in Georgia were illegally connected to the Internet, which allowed for remote manipulation of vote tabulation.

From pgs. 6-7 of the filing:

The design and features of the Dominion software do not permit a simple audit to reveal its misallocation, redistribution, or deletion of votes. First, the system’s central accumulator does not include a protected real-time audit log that maintains the date and time stamps of all significant election events. Key components of the system utilize unprotected logs. Essentially this allows an unauthorized user the opportunity to arbitrarily add, modify, or remove log entries, causing the machine to log election events that do not reflect actual voting tabulations—or more specifically, do not reflect the actual votes of or the will of the people. (See Hursti August 2019 Declaration,attached hereto as Exh. 4, at pars. 45-48; and attached hereto, as Exh. 4B, October 2019 Declaration in Document 959-4, at p. 18, par. 28).

Indeed, under the professional standards within the industry in auditing and forensic analysis, when a log is unprotected, and can be altered, it can no longer serve the purpose of an audit log. There is incontrovertible physical evidence that the standards of physical security of the voting machines and the software were breached, and machines were connected to the internet in violation of professional standards and state and federal laws. (See Id.)

Join the discussion