UPDATE–> With Copy of 104 Page Complaint!–> KRAKEN RELEASED! Attorney Sidney Powell Files 104 Page BOMBSHELL COMPLAINT of Massive Fraud in Georgia Election https://t.co/IxwaMR4cZf via @gatewaypundit
— Jim Hoft (@gatewaypundit) November 26, 2020
In a much anticipated court filing, attorney Sidney Powell, lays out allegations of massive and vast election fraud that took place throughout the United States using easily manipulated voter software.
In a series titled “The Kraken Released,” (Named after Powell’s assertion that through this lawsuit she would be “releasing the Kraken,” a mythical creature of immense size and consequence) ITN is analyzing the court filing page by page and detailing the allegations and the relief sought by Powell.
Powell’s lawsuit asserts voting software like that of Dominion Systems does not allow for vote manipulation to be traced. “Audit logs,” or logs of changes made within the software by users, are not protected and can be modified at any time.
Additionally, the lawsuit asserts that voting machines in Georgia were illegally connected to the Internet, which allowed for remote manipulation of vote tabulation.
From pgs. 6-7 of the filing:
The design and features of the Dominion software do not permit a simple audit to reveal its misallocation, redistribution, or deletion of votes. First, the system’s central accumulator does not include a protected real-time audit log that maintains the date and time stamps of all significant election events. Key components of the system utilize unprotected logs. Essentially this allows an unauthorized user the opportunity to arbitrarily add, modify, or remove log entries, causing the machine to log election events that do not reflect actual voting tabulations—or more specifically, do not reflect the actual votes of or the will of the people. (See Hursti August 2019 Declaration,attached hereto as Exh. 4, at pars. 45-48; and attached hereto, as Exh. 4B, October 2019 Declaration in Document 959-4, at p. 18, par. 28).
Indeed, under the professional standards within the industry in auditing and forensic analysis, when a log is unprotected, and can be altered, it can no longer serve the purpose of an audit log. There is incontrovertible physical evidence that the standards of physical security of the voting machines and the software were breached, and machines were connected to the internet in violation of professional standards and state and federal laws. (See Id.)