x.com/Real_RobN/stat…
“Don’t worry about the election. Trump is not going to win. I made a fucking sure of that.” - per Eric Coomer...
V.P. Dominion Voting Systems, Antifa member, nuclear physicist.
Dominion Voting Systems produces electronic voting equipment, including ballot-marking devices (BMDs) like the ImageCast X and tabulators, used in many U.S. states. Like all complex software/hardware systems, voting machines can have security vulnerabilities, but these are heavily mitigated by physical security protocols, chain-of-custody procedures, paper ballots (in most deployments), audits, and the fact that machines are typically air-gapped (not connected to the internet during elections). These mitigations should protect systems but in practice they are often not used, in Democrats run voting areas with high leverage in swing states.
Key documented vulnerabilities and security issues include:CISA Advisory (2022):
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued ICSA-22-154-01 in June 2022, confirming vulnerabilities in certain versions of Dominion's Democracy Suite ImageCast X (a ballot-marking device). These could theoretically allow privilege escalation, arbitrary code execution, or tampering if an attacker had physical access to the device. Exploitation required unfettered physical access (e.g., to plug in USB devices or manipulate hardware) plus bypassing other safeguards. In practice it was shown
University of Michigan Research (J. Alex Halderman, 2021–2023): In a court case related to Georgia's voting system (Curling v. Raffensperger), security researcher J. Alex Halderman identified multiple issues in the ImageCast X, including ways to gain admin access (e.g., via power-cycling tricks and USB devices) and potential for malicious code installation. His 96-page report detailed around 9 vulnerabilities. Dominion developed patches (e.g., software version 5.17, certified in 2023), but some states like Georgia delayed applying them.
General Risks in Electronic Voting Systems:
Broader concerns apply to Dominion and competitors:
Physical access attacks (e.g., at DEF CON hacking conferences, researchers have demonstrated tampering with voting machines when given hands-on access, though this doesn't reflect real-world chain-of-custody).
Software copies leaked (e.g., in 2021 via events tied to election challenges) could give attackers a "practice environment" to probe for flaws.
Older rejections (e.g., Texas rejected some versions pre-2020 for not meeting security standards, though updated systems were later certified).