top of page

New SCOTUS Filing re Voting Machines and Election Fraud

The Mike Lindell–supported submission to SCOTUS dated 14 March 2024 on behalf of Kari Lake and Mark Finchem regarding election manipulation using electronic voting systems was posted a few days ago.

The filing petitions SCOTUS to take up the case since the lower courts have refused to address the evidence presented. The work is partly on the back of that by election official Tina Peters. Her experience is briefly discussed in the documentary [S]election Code and her findings are presented in the so-called Mesa Reports.

This submission to SCOTUS is 210 pages, most of which are appendixes. The main text is merely 38 pages.

To those who have been following, it reads similarly to whatever has been floating out there but there is new evidence. Of course, whether SCOTUS acts on this or not remains to be seen.

From p.12 to p.13:

C. New evidence of misconduct in prior elections. Petitioners recently obtained system log (“SLOG”) files from Maricopa’s 2020 election that are at odds with Maricopa’s statements to the district court with respect to material facts on which the district court relied in dismissing petitioners’ claims for lack of standing. Based on that new information, petitioners seek to amend their allegations of jurisdiction under 28 U.S.C 1653. Specifically, the SLOG files show: ● In place of the Arizona-certified election software that Maricopa claimed to use, Maricopa’s election software has been surreptitiously altered with respect to components controlling how ballots are read and tabulated. The election results put through this uncertified software are unreliable. Contrary to Maricopa’s representations to the district court, the election software Maricopa used in the 2020 election is not approved by the EAC or for use in Arizona in violation of Arizona law. The SLOG files show that Maricopa used the same uncertified software in the 2022 election. ● Contrary to Maricopa’s representations to the district court, Maricopa did not conduct statutorily mandated pre-election logic and accuracy (“L&A”) testing prior to the November 2020 election on all its vote center tabulators. Instead, Maricopa L&A tested only five spare tabulators. Maricopa did the same thing in connection with the November 2022 election.
Further, in Dominion’s contract with Maricopa—and its contracts with other counties nationwide—Dominion commits to protecting election data with high-level Federal Information Processing Standard (“FIPS”) level encryption. New evidence shows that, since at least 2020, Dominion configured its machines with the decryption keys in an election database table in plain text—protected by nothing other than Windows log-in credentials that are easily bypassed—enabling any malicious actor total control over its electronic voting systems. This security breach violates common sense, to say nothing of FIPS-level encryption. While this breach has the game-changing magnitude of the Allies’ deciphering Germany’s ENIGMA machine in World War II, it is far worse. Dominion leaves the decryption keys bare, in plain text. Embedded Dominion employees or any malicious actor who knows where to look can gain total access and control over an election. It is like a bank telling the public they have the most secure vault in the world, and then taping the combination on the wall next to the vault door. Even worse, key logging features that would record system activity showing such control can also be manipulated or disabled, thereby rendering any penetration of this system nearly undetectable.

Be sure to subscribe to our mailing list so you get each new Opinyun that comes out!



Screen Shot 2021-12-09 at 4.49.31 PM.png

10% Off


bottom of page