Dominion Voting Systems found using software flagged by CISA for its open security breaches: SolarWinds
12/20/2020 // Ramon Tomey // Views

Dominion Voting Systems was found using a software flagged by a federal cybersecurity agency for network breaches. The Cybersecurity and Infrastructure Security Agency (CISA) warned Dec. 13 that SolarWinds Orion products had been compromised and called to power these down immediately. The voting machine provider was among the firms connected to the SolarWinds Orion platform.

CISA's Emergency Directive 21-01 states that "SolarWinds Orion products … are currently being exploited by malicious actors. This tactic permits an attacker to gain access to network traffic management systems. Disconnecting affected devices … is the only known mitigation measure currently available."

The emergency directive issued by CISA Dec. 13 called on all federal agencies to review their networks for any indicators of compromise caused by "malicious actors" and disconnect or power down those using SolarWinds Orion as soon as possible. A CISA statement on the same day added: "All agencies operating SolarWinds products should provide a complete report to CISA by 12:00 p.m. Eastern Standard Time on Monday, Dec. 14."

CISA Acting Director Brandon Wales said: "The compromise of SolarWinds' Orion Network Management Products poses unacceptable risks to the security of federal networks. [The emergency directive] is intended to mitigate potential compromises within federal civilian networks, and we urge all our partners – in the public and private sectors – to assess their exposure to this compromise and to secure their networks against any exploitation."


Voting machines supplied by Dominion used the SolarWinds Orion platform, which hackers managed to breach by means of a malicious code weaved in a software update. The malware was designed in such a way that the victim would not be alerted of any intrusion: Hackers even went to significant lengths to blend into normal network activity. The malicious code aimed to spy on the U.S. Department of the Treasury and Department of Commerce.

The breach adds to the list of issues faced by the election systems provided by Dominion

The SolarWinds Orion platform being compromised adds to the list of issues Dominion voting machines are facing. Initially, Dominion was flagged after a "glitch" in its system caused 6,000 votes for Republicans to be counted as Democrat ones in Michigan.

In addition, a number of cybersecurity specialists have pointed out security concerns regarding Dominion voting machines. Cybersecurity expert and Trump legal team witness Col. Phil Waldron said during a Nov. 30 hearing in Arizona that the voting machines are vulnerable to offsite and onsite manipulation. He pointed out that the machines could be connected to the internet and "be hacked to manipulate votes," posing a severe security risk. (Related: CONFIRMED: Dominion voting machines in Georgia were remotely controlled during election… foreign interference now a FACT.)

Another cybersecurity consultant testified in Georgia about laxly implemented server security measures during the state's August 2020 primaries. Poll observer Harri Hursti observed two county offices enabling "unsafe remote access" to the servers such as frequent use of flash drives, frequent access of the internet and use of outside unauthorized applications. Hursti remarked that such practices "drive a hole" through supposedly secure servers, adding: "Without these basic protections, malware can far more easily penetrate the server and the operative voting system software."

Aside from this, Hursti also noted that Dominion technical staff did not regularly update server logs in full and even "made deletions" in some sections. Secure and complete server logs play a key role in system security as they "provide the detailed activity trail necessary for the identification of security threats and server activity," the expert said.

A third expert who served as a former military intelligence analyst claimed in an affidavit that other countries managed to connect to Dominion's servers. Their affidavit supporting attorney Sidney Powell's Nov. 23 lawsuit showed that foreign entities has connections with Dominion network nodes. A network based in China's Hunan province, an IP address from Iran and users from the Serbian capital of Belgrade where Dominion has operations were among the outside entities that connected to the nodes. (Related: Analysts claim Dominion's server connected to Iran and China.) gives you the latest on Dominion voting machines being compromised.

Sources include: [PDF]

Take Action:
Support Natural News by linking to this article from your website.
Permalink to this article:
Embed article link:
Reprinting this article:
Non-commercial use is permitted with credit to (including a clickable link).
Please contact us for more information.
Free Email Alerts
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.
App Store
Android App
eTrust Pro Certified

This site is part of the Natural News Network © 2022 All Rights Reserved. Privacy | Terms All content posted on this site is commentary or opinion and is protected under Free Speech. Truth Publishing International, LTD. is not responsible for content written by contributing authors. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. Truth Publishing assumes no responsibility for the use or misuse of this material. Your use of this website indicates your agreement to these terms and those published here. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners.

This site uses cookies
Natural News uses cookies to improve your experience on our site. By using this site, you agree to our privacy policy.
Learn More
Get 100% real, uncensored news delivered straight to your inbox
You can unsubscribe at any time. Your email privacy is completely protected.