EXCLUSIVE: In Addition to Recent Halderman “Pen Hack” in GA, Remember There Were Also Severe Voting Machine Vulnerabilities Identified in Colorado
2 min read(The Gateway Pundit)
Guest post by Joe Hoft at JoeHoft.com

See SelectionCode to learn more about the Tina Peters story.
Remember that there were issues identified with voting machines in Colorado too.
On Friday, Jan 19th, Professor and Election Expert J. Alex Halderman stunned Judge Amy Totenberg’s Courtroom by quickly hacking into a Dominion Voting Machine with only a pen. This demonstration was live proof of the vulnerabilities identified in his now famous report.
Professor Halderman’s report and demonstration are a powerful statement on how the National Security of our Country hangs by a thread and completely depends upon zero nefarious access to our voting equipment.
Professor Halderman showed how vulnerable our Election Equipment is to anyone with malintent. But there are other vulnerabilities that have been discovered in other audits and election cases since 2020.
Based on this work to date, it appears that vulnerabilities identified may be intentional election manipulation, such as the items identified in Mesa County, Colorado (discussed in reports 1-3 as detailed at https://tinapeters.us/reports/ – scroll to the bottom of the page to see the report links).
The career forensic experts who worked on the Mesa County reports claim that everything in these reports was a result of the Hard Drive Images made of the Mesa County, Colorado Election Management Server, before and after Dominion Voting Systems did a ‘software upgrade’ known as “The Trusted Build”. These reports have been ignored by Election Authorities.
Here are some of the takeaways from the Mesa County Reports:
1) The report concludes that the unauthorized existence of SQL Server Management Studio (SSMS) in the operational Election Equipment allows for easy intentional vote flipping. SSMS allows direct unauthorized modification of ballot programming and votes.
2) The system is reportedly specifically programmed to automatically direct all voting system devices to other networks, including to the internet with a click of a button or plugging in a cable.
3) There are many other egregious insecurities beyond just the few above. It would take countless hours to go over them all.
4) A secondary unauthorized database exists, as described in report #3, (and it was also featured in the documentary Selectioncode), it allowed for the creation of a ‘second set of books’ that was reportably used by nefarious actors.
5) The Mesa County Report #2 claims that 36 Wireless Devices were installed in the voting systems, allowing for a multitude of wireless connections to be made at will at any time. This is especially troubling after it had been repeatedly declared by the Voting System providers/administrators/politicians that “Voting Machines are not Connected to the Intern
This post was published at the Gateway Pundit. Read it in its entirety here. Read More
Note: Some of the content in this article may have been generated with the assistance of AI. While we strive for accuracy, AI-generated text can occasionally contain errors or outdated information. Please verify any important details independently.
