I conclude with high confidence that the election 2020 data were altered in all battleground states resulting in a hundreds of thousands of votes that were cast for President Trump to be transferred to Vice President Biden. These alterations were the result of systemic and widespread exploitable vulnerabilities in DVS, Scytl/SOE Software and Smartmatic systems that enabled operators to achieve the desired results. In my view, the evidence is overwhelming and incontrovertible.
Navid Keshavarz-Nia, Ph.D., Ed.D.
November 25, 2020
DECLERATION OF DR. NAVID KESHAVARZ-NIA
[I wish the lawyer writing this up knew how to use a spell checker.
Via daughter Jaime.
See also HUGE! Sidney Powell Witness Whom NY Times Described as “Always the Smartest Person in the Room” Concludes Hundreds of Thousands of Votes Transferred from Trump to Biden IN ALL BATTLEGROUND STATES.
Some of Keshavarz-Nia credentials:
I have a Bachelor’s degree in Electrical and Computer Engineering and a Master’s degree in Electronics and Computer Engineering from George Mason University, a Ph.D. degree in Management of Engineering and Technology from CalSouthern University and a Doctoral (Ed.D) degree in Education from George Washington University. I have advanced training from the Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), National Security Agency (NSA), DHS office of Intelligence & Analysis (I&A) and Massachusetts Institute of Technology (MIT).
I am employed by a large defense contractor as a chief cyber security engineer and a subject-matter expert in cyber security. During my career, I have conducted security assessment, data analysis and security counterintelligence, and forensics investigations on hundreds of systems. My experience spans 35 years performing technical assessment, mathematical modeling, cyber-attack pattern analysis, and security counterintelligence linked to FIS operators, including China, Iran, North Korea, and Russia. I have worked as a consultant and subject-matter expert supporting the Department of Defense, FBI and US Intelligence Community (USIC) agencies such as the DIA, CIA, NSA, NGA, and the DHS I&A supporting counterintelligence, including supporting law enforcement investigations.
11. Despite DVS’s constant denial about the flaws of its systems, the company’s ImageCast Precinct optical scanner system was totally hacked in August 2019. This occurred during the largest and most notable hacker convention, called DEFCON Voting Machine Hacking Village in Nevada. The DVS ImageCast Precinct is an integrated hybrid voting equipment by combining an optical paper ballot and ballot marking device to allow accessibility for the visually impaired. The system runs the Busybox Linux 1.7.4 operating system, which has known medium to high level exploitable vulnerabilities to allow remote attackers to compromise the VDS. (J. Moss, H. Hurtsi, M. Blaze et al., Voting Village Report, DEFCON Village Report in association with and Georgetown University Law Studies; Online Source: https://media.defcon.org/DEF%20CON%2027/voting-village-report-defcon27.pdf). The report indicated that “many of the specific vulnerabilities reported over a decade earlier (in the California and Ohio studies, for example) are still present in these systems today (A. Padilla, Consolidated report by California Secretary of State, Top-to-Bottom Review summary and detailed report, Page 4 (Online Source: https://www.sos.ca.gov/elections/ovsta/frequently-requested-information/top-bottom-review)
The operating system software is Busybox Linux 1.7.4. This was released in 2008. Yes, the O/S of the voting software in states of the most interest to the entire nation has not been updated in over 12 years. In the computer security world this is regarded as something close to highly radioactive and the hardware using this software should be immediately removed from network connections then decommissioned or updated.
In my job I report, on a weekly basis, computers which I have found that have reached end of life and are no longer supported when they are just one day past the date of last support. Something 12 years past support with a connection to the Internet would have my VP talking to someone else’s VP in a very stern tone of voice.
I know of some cases where the offending computer has been immediately disconnected from the network with no effort to contact the owners. The attitude being something along the lines of, “If they are this ignorant, stupid, and/or careless, they don’t deserve to be notified. Let them figure it out on there own—if they can.”
In this case the company has known for “over a decade” the system was insecure. My inclination is that this was no accident or carelessness. There is a high probability this was deliberate. People should go to prison for this.
It looks as if the Kraken has been released.—Joe]