Anonymous
10/01/2021 (Fri) 02:55:36
Id: 5d9fa3
No.10501
del
>>10500Dr. Coomer's statement is an admission that various vendors, election officials, and others have access to the back end data tables that permit bypassing the operating system's configuration. It is notable that when someone accesses these systems from a data table, their actions are not logged by the system; thereby making detection much more problematic. This contradicts Dr. Coomer's assurances that the system is secure.
Our letter to the Illinois State Board of Elections on August 17th specifically requested the Board to answer the following questions:
At the ISBE level:
Who has access to software produced by vendors?
Has the ISBE had an expert examine the computer code?
How is access granted and documented?
What role does the ISBE play in monitoring the GEMS software used in each election jurisdiction?
As is typical for the Board members at the Illinois State Board of Elections, with its rich history in treating citizens concerned about election security with disregard and disrespect, the Board refused to say a single word regarding Defend the Vote's concerns expressed during 'public comments'. Only 4 of the 8 members of the Board bothered to stay to hear our comments. To date, the Board has failed to provide answers to the questions asked in our letter.
And that is not all! The Board asked Dr. Coomer if he had any comments. In direct response to the Illinois State Board, Dr. Coomer made the following statement:
Message too long. Click here to view full text.