Upon completing a forensic audit of Dominion voting machines, Russell Ramsland, co-founder of Allied Security Operations Group said in a preliminary report “We conclude that the Dominion Voting System is intentionally and purposefully designed with inherent errors to create systemic fraud and influence election results.”
Clarifying what he sees are reasons for his conclusion, Ramsland added:
“The system intentionally generates an enormously high number of ballot errors. The electronic ballots are then transferred for adjudication. The intentional errors lead to bulk adjudication of ballots with no oversight, no transparency, and no audit trail. This leads to voter or election fraud. Based on our study, we conclude that The Dominion Voting System should not be used in Michigan. We further conclude that the results of Antrim County should not have been certified,”
Concluding his findings, Ramsland said, “These errors resulted in overall tabulation errors or ballots being sent to adjudication. This high error rates proves the Dominion Voting System is flawed and does not meet state or federal election laws.”
If Ramsland’s qualifications are a concern, we have added the first two paragraphs from the report as reference.
My name is Russell James Ramsland, Jr., and I am a resident of Dallas County,
Texas. I hold an MBA from Harvard University, and a political science degree
from Duke University. I have worked with the National Aeronautics and Space
Administration (NASA) and the Massachusetts Institute of Technology (MIT),
among other organizations, and have run businesses all over the world, many of
which are highly technical in nature. I have served on technical government
panels
I am part of the management team of Allied Security Operations Group, LLC,
(ASOG). ASOG is a group of globally engaged professionals who come from
various disciplines to include Department of Defense, Secret Service,
Department of Homeland Security, and the Central Intelligence Agency. It
provides a range of security services, but has a particular emphasis on
cybersecurity, open source investigation and penetration testing of networks. We
employ a wide variety of cyber and cyber forensic analysts. We have patents
pending in a variety of applications from novel network security applications to
SCADA (Supervisory Control and Data Acquisition) protection and safe browsing
solutions for the dark and deep web. For this report, I have relied on these
experts and resources.