Affidavit: DVS, Scytl/SOE Software/eClarity and Smartmatic are vulnerable to data manipulation by unauthorized means

In a sworn affidavit Dr. Navid Keshavarz-Nia stated:

I conclude that a combination of lost cryptographic key contained on stolen USB memory cards, serious exploitable system and software vulnerabilities and operating system backdoor in DVS, Scytl, SOE Software/eClarity and Smartmatic created the perfect environment to commit widespread fraud in all states where these systems are installed. My analysis of the 2020 Election from NY Times data shows statistical anomalies across the battleground state votes. These failures are widespread and systemic – and sufficient to invalidate the vote counts.

Dr. Keshavarz-Nia concluded:

I conclude with high confidence that the election 2020 data were altered in all battleground states resulting in a hundreds of thousands of votes that were cast for President Trump to be transferred to Vice President Biden. These alterations were the result of systemic and widespread exploitable vulnerabilities in DVS, Scytl/SOE Software and Smartmatic systems that enabled operators to achieve the desired results. In my view, the evidence is overwhelming and incontrovertible.

Pursuant to 28 U.S.S. 1746, I declare under penalty of perjury under the laws of the United States of America that the foregoing is true and correct to the best of my knowledge.

READ THE FULL AFFIDAVIT HERE

RELATED ARTICLES:

NYT Endorsed Leading Cyber-Crimes Expert Concludes Election 2020 Data Were Altered in Battleground States

Pennsylvania Bombshell: Biden 99.4% vs. Trump 0.6%

RELATED VIDEOS:

Filipino Lawmaker Says Smartmatic Machine was Pre-Loaded with Ballot Counts Before Election Started.

29th November Election Update 2020

About Navid Keshavarz-Nia, CISO, Black Key Solutions, LLC

Dr. Keshavarz-Nia is a vice president and senior director in INFOSEC with 30 years of experience in national security spanning leadership and program execution supporting the civilian, Defense, US Intelligence Agency (USIA), and commercial banking organizations. His background extends in cyber security engineering, technical counterintelligence and incident response management. He is an innovator and has implemented next generation security solutions across the IC, defense, and civilian clients. He has engineered technical solutions and managed large development teams involving security risk assessment, insider threat, incident response, and threat hunting exercises to identify advanced persistent threats. He is an experienced ethical hacker, big data architect and cloud security expert in cloud computing, Blockchain technology, and big data analytic solutions. He has led or supported the CIA, NSA, DHS US-CERT, USCYBERCOM and the FBI.

©All rights reserved.

2 replies
  1. Bob
    Bob says:

    The manipulation and subversion was not only from Dominion systems. Keep in mind private corporations and other third party groups are involved such as In-Q-tel and big tech. The Chinese have already penetrated these third party NGOs or non profit groups. They are part of the counter-state activity to destroy America within. Same with the weaponized Scorecard Hammer technocratic bureaucrats.

    Montgomery is not a fraud, it’s gas-lighting to coverup for the cronies that allowed the UAE royals inside Port Canaveral. If Montgomery were a fraud, why did he maintain clearance and keep his endorsements? Why was a counter-state agent trying to entrap Montgomery with the whistle-blower tapes and using the States Secret Privilege over his head to systematically destroy his life? Because the counter-state rogue elements from past administrations want to keep their jobs, whether that’s selling out America to our enemies or not.

    Reply
    • Bob
      Bob says:

      Plus Vault 7 from Wikileaks mentions Hammer/Scorecard. Whoever’s saying Hammer/Scorecard’s a “hoax” needs a reality check. Nia wouldn’t sign an affidavit or Powell talking about it if it wasn’t true. It ties back to Brennan, Hayden, Clapper, and Obama.

      Reply

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *