arrow left
arrow right
  • Maurice F. Johnson, Patricia Erway, Michelle Pique, Fabiola Iris Lough, Inna Sturtevant, Brian Gonzales vs Frank Phiilips, Denton County Elections Administrator; Andy Eads, Denton County Judge; Ryan Williams; Denton County Commissioner; Ron Marchant, Denton County Commissioner; Bobbie J Mitchell, Denton County Commissioner; Dianne Edmonson, Denton County Commissioner Other Civil document preview
  • Maurice F. Johnson, Patricia Erway, Michelle Pique, Fabiola Iris Lough, Inna Sturtevant, Brian Gonzales vs Frank Phiilips, Denton County Elections Administrator; Andy Eads, Denton County Judge; Ryan Williams; Denton County Commissioner; Ron Marchant, Denton County Commissioner; Bobbie J Mitchell, Denton County Commissioner; Dianne Edmonson, Denton County Commissioner Other Civil document preview
  • Maurice F. Johnson, Patricia Erway, Michelle Pique, Fabiola Iris Lough, Inna Sturtevant, Brian Gonzales vs Frank Phiilips, Denton County Elections Administrator; Andy Eads, Denton County Judge; Ryan Williams; Denton County Commissioner; Ron Marchant, Denton County Commissioner; Bobbie J Mitchell, Denton County Commissioner; Dianne Edmonson, Denton County Commissioner Other Civil document preview
  • Maurice F. Johnson, Patricia Erway, Michelle Pique, Fabiola Iris Lough, Inna Sturtevant, Brian Gonzales vs Frank Phiilips, Denton County Elections Administrator; Andy Eads, Denton County Judge; Ryan Williams; Denton County Commissioner; Ron Marchant, Denton County Commissioner; Bobbie J Mitchell, Denton County Commissioner; Dianne Edmonson, Denton County Commissioner Other Civil document preview
  • Maurice F. Johnson, Patricia Erway, Michelle Pique, Fabiola Iris Lough, Inna Sturtevant, Brian Gonzales vs Frank Phiilips, Denton County Elections Administrator; Andy Eads, Denton County Judge; Ryan Williams; Denton County Commissioner; Ron Marchant, Denton County Commissioner; Bobbie J Mitchell, Denton County Commissioner; Dianne Edmonson, Denton County Commissioner Other Civil document preview
  • Maurice F. Johnson, Patricia Erway, Michelle Pique, Fabiola Iris Lough, Inna Sturtevant, Brian Gonzales vs Frank Phiilips, Denton County Elections Administrator; Andy Eads, Denton County Judge; Ryan Williams; Denton County Commissioner; Ron Marchant, Denton County Commissioner; Bobbie J Mitchell, Denton County Commissioner; Dianne Edmonson, Denton County Commissioner Other Civil document preview
  • Maurice F. Johnson, Patricia Erway, Michelle Pique, Fabiola Iris Lough, Inna Sturtevant, Brian Gonzales vs Frank Phiilips, Denton County Elections Administrator; Andy Eads, Denton County Judge; Ryan Williams; Denton County Commissioner; Ron Marchant, Denton County Commissioner; Bobbie J Mitchell, Denton County Commissioner; Dianne Edmonson, Denton County Commissioner Other Civil document preview
  • Maurice F. Johnson, Patricia Erway, Michelle Pique, Fabiola Iris Lough, Inna Sturtevant, Brian Gonzales vs Frank Phiilips, Denton County Elections Administrator; Andy Eads, Denton County Judge; Ryan Williams; Denton County Commissioner; Ron Marchant, Denton County Commissioner; Bobbie J Mitchell, Denton County Commissioner; Dianne Edmonson, Denton County Commissioner Other Civil document preview
						
                                

Preview

Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 86 of 170 PagelD 480 311. 312. 313. 314. 315. 316. cyberspace in at least 18 States. Voter data was successfully exfiltrated in two states and in a subset of those 18, attackers could have altered or deleted voter registration data. Mr. Halderman states Russia has sophisticated offensive cyber capabilities as well as intent to use them to hack elections in other locations. He goes on to cite published reports of Russian involvement in hacking the Ukrainian election in 2014. He states that countries other than Russia have similar offensive cyber capabilities. The U.S. Senate Select Committee on Intelligence reported findings and recommendations based upon its investigation into cybersecurity threats to U.S. election infrastructure. Mr. Halderman cites this report as evidence of vulnerabilities in the existing election system used in the United States. Further he quotes DNI Coats and DHS Secretary Nielsen of Russia’s continuing goal to interfere in the elections within the U.S. to achieve a variety of outcomes favorable to Russia. He specifically calls out the Paperless Direct Recording Electronic (DRE) voting machines as being particularly vulnerable to exploit. he DRE machines do not create a paper record of each vote. Paperless DRE machines are notoriously vulnerable to cyber attacks that can cause a multitude of issues. Votes can changed or erased. Extra votes can be cast, and machines can be made to not work at all. He goes on to state that paperless DRE machines do not provide even adequate security against cyber attacks. He points out Dominion voting systems as being exclusively used in the State of Georgia and that over the past 15 years he, and others, have repeatedly warned of the vulnerabilities in this system. These vulnerabilities include both hardware and software flaws. There are also network architectural weaknesses that cannot be repaired through software updates. hese types of voting systems use software that can be reprogrammed. Any attacker gaining privileged access to that software can modify it to do anything. He has proven through multiple demonstrations how easy it is to install malware on these systems. Mr. Halderman cites the first major study of voting systems conducted in 2003 where it was discovered the source code contained multiple errors and vulnerabilities. The States of Maryland and Ohio commissioned independent studies and the resulting assessments confirmed the vulnerabilities in the Dominion voting systems. 79Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 87 of 170 PagelD 481 3i7. 318. 319. 320. 321. 322. In 2006, another independent security researcher also identified vulnerabilities, primarily in the software update mechanism that would allow upload of malware. That same year, Mr. Halderman and others reverse engineered a Dominion voting system and identified multiple additional vulnerabilities. As part of this study, they developed malware that would modify all the vote records, audit logs, and protective counters, preventing any forensic examination from discovering the crime. The malware was also designed to spread automatically to other voting machines. This was propagated by the removable memory cards used to program the ballot design. In 2007, Mr. Halderman participated in two independent studies for the States of California and Ohio. In both studies, additional vulnerabilities were discovered that would allow malware to be installed and propagated to cause even more harm than the virus created during the 2006 test. Mr. Halderman states that some of the vulnerabilities could be resolved by improving the underlying software. Other vulnerabilities are more serious and require hardware and software changes. As a result, California, despite having a paper ballot trail, decided to decertify the Dominion voting system in use at that time. Mr. Halderman points out there are a variety of techniques available to sophisticated attackers to compromise non-internet connected systems. One of those techniques is the removable media cards being exploited via the Election Management System (EMS) prior to insertion in the voting machine. He also states the EMS has recently had remote access software installed which creates another means of exploitation. The physical security measures in place to secure the removable memory cards are also weak and can be easily compromised. Mr. Halderman goes on to describe how a potential attack might take place. The attacker would gain access to the election management computers via weak cyber security. The attacker would then target the pre-election ballot programming with malware that would spread from machine to machine. This malware would automatically shift “a few percent of the vote” to a particular candidate. Mr. Halderman then describes the inadequacy of certain physical security measures, such as tamper evident seals. These would be less than adequate when the memory card is 80Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 88 of 170 PagelD 482 323. 324, 325, 327. 328. 206 hitps:/f inserted with the malware already loaded. Furthermore, logic and accuracy tests only validate the ballot design or counting logic. Such tests would fail to detect malware as it could be programmed to detect and circumvent logic and accuracy tests or only perform on election day. Mr. Halderman states the existing measures to defeat election and voting fraud do not provide a way to determine if fraud occurred during the election or afterward. Malware could be programmed to make it appear statistically probable despite the countermeasure testing taking place. In fact, the malware would delete itself and all log files, thereby preventing any kind of forensic evidence. Mr. Halderman states the only way to reliably safeguard a voting system from future cyber attacks is to generate and examine physical evidence of voter intent, in the form of a voter-verifiable paper trail. Optical scan paper ballots are the most widely used and secure technology available for casting votes, according to Mr. Halderman. The manipulation of both paper and electronic ballots could still be compromised but would require more extensive resources. Mr. Halderman points out that with the monies associated with the Help America Vote Act (HAVA) 2002 in conjunction with the U.S. Senate Select Committee on Intelligence recommendation that States replace outdated voting systems with newer systems that have a verified paper trail. He also states the use of all DRE type machines should be discontinued. DECLARATION OF SHAWN SMITH Shawn Smith, retired Military officer with a Master’s degrees in National Security Affairs and in Aeronautical Science, filed a declaration on 6/8/22 into Kari Lake, et al. v. Karie Hobbs, Arizona Secretary of State (case 2:22-cv-00677-JJt)2". In this declaration, he states that his military occupational specialty was space and missile operations, and he has extensive experience in operating, planning, training, testing, and commanding the employment of complex, computer-based military weapons systems. He states that ‘I have been asked to testify about the threat of the compromising of our supply chain and attack(s) to U.S. national security systems and critical infrastructure, in es.ttttexas.com, case’ TX_SOS_Election Violation References See Declaration of Shawn Smith 81Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 89 of 170 PagelD 483 329. 330. 331, 332) 333. particular to election related systems, including voting systems and consequently, to elections.” As noted in other expert affidavits and declarations, Smith describes the vulnerability of the U.S.’s critical systems, resulting from compromised supply chains, to include elections. He states that it is his, “conclusion that U.S. elections are critically vulnerable to exploitation by foreign adversaries through compromising of our computerized election systems through supply chains.” He goes on to say, that despite this fact, the U.S. Government appears to be keenly aware of the risk of supply chain compromise to the nation’s critical systems. This same awareness does not appear to extend to any agency responsible for the “procurement, security, certification or use of election and voting systems, nor to imbue them with any capacity to respond effectively.” The targeting of U.S. voting and election systems must be an extraordinarily high priority for foreign powers and bad actors. Smith demonstrates that supply chain compromise is pervasive, sophisticated, widespread and can take place at any stage of the supply chain including: Manipulation of development tools, development environment, source code repositories (public or private), source code in open-source dependencies, software update/distribution mechanisms, compromised and/or infected system images (multiple cases of removable media infected at the factory), replacement of legitimate software with modified versions, sales of modified/counterfeit products, and shipment interdiction. Smith explains that the public lacks awareness of the severity and pervasiveness of threats to supply chain compromise from malicious cyber activity commonly being portrayed by media as an opportunistic hacker, rather than nation state operated or sponsored advanced persistent threat (APT) groups. Smith identifies a multitude of such APT groups that have in the past and are currently utilizing supply chain attacks, as well as evidence of many investigations and reports. Prosecutions have occurred by several U.S. entities including the DOJ, Department of Commerce, National Counterintelligence and Security Center, Office of the Director of National Intelligence, National Institute of Standards and Technology, CISA, and the FBI. Smith demonstrates that the institutions, measures, laws, and guidelines intended to secure U.S. elections are grossly inadequate: 82Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 90o0f170 PagelD 484 a. Supply chain threats for critical computer-based infrastructure, such as election ecosystems, are so severe and extensive that the “computer networks of the Cybersecurity and Infrastructure Security Agency (CISA), the very U.S. government institution responsible for critical infrastructure security, were compromised by software supply chain attacks in 2020, the SolarWinds, SUNBURST and SUPERNOVA attacks, for ten months or more without detection and, even then, that compromise only became known to CISA due to the intervention of a private company.” b. “In the light of CISA’s inability to defend even its own computer systems from nation-state level supply chain attacks from March through December 2020, little credence can be given to CISA’s July declaration that the 2020 election would be ‘the most secure election in modern history, and its declaration in November 2020 that the 2020 election was the “most secure in American history.’” c. “CISA has acknowledged, as early as October 2020, that APRs have targeted not only the Federal government, but state, local, tribal, and territorial (SLTT) governments, critical infrastructure, and elections organizations, including successful APT establishment of unauthorized access to election support systems.” d. Despite repeated warnings and recommendations from NIST, the technical body and agency identified in TITLE 52, USC to advise the EAC, to take measures to secure against supply chain attacks since 2012, the EAC has effectively provided no standards, procedure or safeguards to implement those recommended protections for election systems and elections. e. To date, nearly all the systems certified and in use in the United States have no supply chain security, nor any testing or verification of the security as a result of the EAC’s failures to implement protections. Although the latest version of the VVSG acknowledges supply chain risk manages as a necessity, no real safeguards were added. Smith states, “these standards are barely better than the EAC’s non- existent standards for electronic poll books, centralized statewide voter registration systems, and election auditing systems. 83Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 91of170 PagelD 485 f. According to VVSG, security testing guidelines do not even require VSTLs to review common vulnerabilities and exploits that are publicly available. g. “The EAC’s standards of accreditation for VSTLs do not even ask, let alone require, awareness in the VSTLs of supply chain vulnerabilities in computerized voting systems, much less awareness or proficiency in the detection of supply chain compromises, or in their assessment of effective mitigation, where even possible, by voting system vendors.” h. The Technical Guidelines Development Committee (TGDC) is the advisory body established by HAVA to “assist the (EAC) in the development of (VVSG)”, includes far more “lawyers, politicians, public affairs, and psychology grads than computer scientists or software expert, at a 4:1 ratio.” In addition, of those few committee members that are computer scientists and software experts included the director for software development at one of the largest US voting system vendors. i. Although NIST recommended to the TGDC that no wireless devices be permitted on voting systems as early as 2006, the “TGDC” in 2020 still held a “compromise position” with no prohibition on wireless devices for the latest 2021 VVSG. Smith states, “permitting wireless devices in computerized voting systems is irrational and indefensible in light of the known and persistent threats to those systems.” j. “The EAC has demonstrated inadequate awareness, comprehension, and response to the clear and present danger posed by foreign nation states, supply chain attacks against the computers and components used in U.S. voting systems.” Furthermore, the EAC “can’t be relied upon to protect U.S. elections by competently examining voting systems, prior to use, for indicators of compromise and vulnerability.” k. Laboratory Director, and corporate principal, for the VSTL Pro V & V, stated that he had no “specialized expertise in cybersecurity testing or analysis or cybersecurity risk analysis,” in a federal court testimony in 2020. 1. Furthermore, the same VSTLs, despite lacking specialized expertise in cybersecurity testing or cybersecurity risk analysis, are responsible to not only conduct initial and modification testing, but are also responsible to recommend to 84Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 92 o0f170 PagelD 486 the EAC whether those changes may be implemented without testing, as “de minims.” Smith describes several other factors that further negatively impact the security of elections m. “Even if states and localities could afford the caliber of cybersecurity expertise needed to defend voting systems, the U.S. workforce of qualified cyber professionals is too small to staff voting systems offices in 50 states, much less over our 3,000 U.S. Counties. Hart InterCivic appears to use Hewlett-Packard computers, which are remanufactured and assembled overseas, containing overseas-manufactured components, built by foreign workers, and all without U.S government oversight and “effectively no safeguards in the entirety of the testing and certification regime for voting systems” n. “ES&S is owned by the private equity firm McCarthy Group, which doesn’t disclose the information of investors, including if any other investments or financial interests, have a controlling interest in ES&S.” H. DECLARATION OF JOHN R. MILLS This is a summary of the Declaration of John R. Mills. It is provided without amplification or supposition.2°7 334. 335. 27 https Mr. Mills is a retired Colonel in the United States Army Reserve. He has also served as Former Director of Cybersecurity Policy, Strategy, and International Affairs, as a Senior Civilian in the Office of the Secretary of Defense. This afforded nearly 40 years of service to the United States of America and gave him extensive experience in the employment of cyberspace capabilities. He has held a Top Secret Sensitive Compartmented Information (SCI) security clearance since approximately 1988. Mr. Mills has also been an Adjunct Professor teaching graduate level cybersecurity law and policy at the University of Maryland, Global Campus since 2013. His final uniformed position within DoD was as liaison to DHS where he coordinated the national response to emergencies and threats to the United States. The testimony of Mr. Mills regarding the use of remote access operations for the unlawful entry and purposes into computer networks was requested. The information is files. ttttexas.com/ case TX_SOS_ Election Violation References See Declaration of John R. Mills 85Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 93 o0f170 PagelD 487 336. 337. 338. 339, 340. 341. 342 343. 344. unclassified and based on his personal experience, publicly available reporting and open source information. Remote access operations are designed to gain access to computer networks to avoid detection and residual forensic evidence. This is accomplished via implanted malware, other software and/or algorithms that facilitate access to the targeted system. Remote access is not the same as remote maintenance. Remote access is intended as a legitimate activity subject to active or passive monitoring and logging of the event. Remote maintenance can be compromised to suit the needs of remote access operations given discoverable vulnerabilities. The capabilities to conduct remote access have greatly expanded since the 1980s. The primary user of remote access is the U.S. Intelligence Community in close partnership with the Department of Defense and Federal Law Enforcement. Remote access operations capability is not limited to the United States. Several countries, organizations, and individuals have developed skillsets with varying degrees of sophistication. These actions have accelerated over the last 20 years and have become commonplace among nation state and private actors. Electronic election infrastructure is considered critical infrastructure and can be subjected to remote access operations. A successful remote access operation could change vote totals rendering elections null and void. Employment of machine-based algorithms to enhance remote access operations is well within the skillset of nation-state actors such as China, Russia, Iran, and Venezuela. This capability also exists with non-nation state actors. Mr. Mills states his review of the Mesa County Forensic reports are consistent with remote access operations. He has served as a sworn election official and understands the U.S. election process at the county level. Due to this and his previous experience amentioned, he states he has very low confidence in the security of American election critical infrastructure. Mr. Mills contradicts the claims of the U.S. Intelligence Community, Homeland Security, and Law Enforcement Agencies that they have the ability to defend election infrastructure from remote access operations. He states, their high level of confidence is not supported, and in some cases, may be false. He goes on to relate the breach of the 86Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 94 of 170 PagelD 488 Office of Personnel Management which, despite the resources available to stop such an attack, failed to do so. 345. In his professional opinion, the statement, “The November 3” election was the most secure in American history” asserted by CISA, had little, if any, basis in fact. 346. Mr. Mills continues by highlighting the statements made by CISA would require assessment of the indicators used by the National Intelligence Collection priorities to track, monitor, and collect during the 2020 election. Furthermore, he states, the capability of CISA to detect, assess, and respond to remote access operations in a timely manner, with high confidence, is unrealistic and they have a poor track record to back up this statement. 347. Mr. Mills states the Mesa County findings are consistent with publicly known intrusion sets, that are likely nation state level, with intimate insider knowledge of the infrastructure. He likens the actions taken by the actors be so deeply technical that anyone monitoring the activity would be unable to detect what was happening given the level of complexity. 348. Throughout Mr. Mills career he has received a variety of training, some of which includes work in the Special Operations community. Part of that work included planning, implementing, observing, and recommending during elections both in the United States and in foreign countries. 349. Mr. Mills had the opportunity to provide advice for the January 2020 elections in Taiwan. Among his many recommendations were to keep the process as simple as possible. This included reliance upon paper ballots, hand counting, and minimization of election machines as well as any connectivity components or sub-components. In addition, he advised that any tabulation of ballots (when not hand-counted) be performed as transparently as possible, and on machines with no other features other than to tabulate the ballot. This would limit the ability to conduct remote access operation methods to the power cord used to power the tabulating machines. 350. Asaresult, the Taiwanese elections were conducted flawlessly. The counting of ballots was done live with multiple observers from both parties. As the ballot was verified and passed through the tabulator, the counts were changed automatically for all to see. 87Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 95 of170 PagelD 489 351, 352 353. 354. 355. 356. 357 358. Mr. Mills then provides a history of remote access operations from post World War II to the present. Mr. Mills states there is no independent third party review of electronic voting systems. The level of expertise by those officials who review or access these systems is woefully inadequate. He states contractors use intellectual property rights or contractual terms to deny any third party review of the election systems they provide. Mr. Mills further states that the culture within the U.S. Intelligence Community actively stifled any findings from analysts that concluded China interfered in the 2020 U.S. elections. Even going so far as to pressure analysts to change or withdraw their support proof of Chinese actions. Mr. Mills goes on to state that while federal government officials are well meaning, they simply do not understand U.S. election infrastructure. He points out anomalies in various statements made Mr. Chris Krebs, then Director of CISA, who claimed the election of 2020 was secure. Mr. Mills highlights the inaccuracies in multiple statements made by Mr. Krebs. Mr. Mills points out that ES&S has admitted to building in remote access to their machines. He goes on to state that many of the security procedures designed to restrict the ability of remote access operations, are not being used. Mr. Mills concludes by assessing the current voting process has become over- sophisticated; and asks why it would need to this way. He raises legitimate questions of why counties are spending inordinate amount of resources on a technology environment without an evaluation of whether it is truly necessary. He further assesses there are no checks and balances on sworn elected officials and that the entire notion of electronic voting machines needs to be revisited. 88Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 96 of 170 PagelD 490 I. TEXAS COUNTY FAILURES HOOD COUNTY 359. Hood County Commissioners, in addition to election officials, have failed to confirm if the voting equipment in Hood County is properly certified. 360. On July 28, 2021, Michele Carew was questioned about the issue of non-sequential ballots.2°% 361. November 9, 2021, Plaintiff Karen Towell addressed the Hood County Commissioner’s court regarding the lack of accredited VSTLs and thereby the lack of state certifications. Plaintiff provided evidence similar to the evidence in this case.?” 362. Michele Carew resigned shortly after the November 2021 meeting. 363. ES&S was the voting system employed within Hood County." a. ES&S was first utilized for elections in Hood County in 2008 and continued to be used through the November 2020 election. b. According to Melissa Welborn, H. R. Director or Hood County, ES&S version 3.4.1.0 was utilized for the November 2020 elections. c. The last certification on file indicates that ES&S version 3.4.1.0 was certified in April 2014. 364. On February 9, 2021, a contract was signed with Hart Intercivic voting systems for use in elections in Hood County. *!! a. Certification for Hart Intercivic Verity Voting software version 2.4*!* is on file with the Secretary of State website.?!? b. Hood County records indicate that Hart Intercivic software version 2.4.2 was utilized for the November 2, 2021, elections. 208 https:/www.texastribune.org/202 1/10/01 texas-election-official-hood, (Last visited 5/20/22) 209 https://duckduckgo.com/?q=hood+county+commissioner+meeting&iax=videos&ia=videos&iai=https%3A%2F%2F www. youtube.com%2Fwatch® o3 Fv’/3 DuguEcPW 7P_A (Lasted visited 5/20/22) 21° hitps files. tttte: tion_Violation_References See Hood County ES&S Contract 21! hitps://files. ttttexas.com, ion_Violation References See Hood County Hart Contract 212 https:/www.sos. state. tx.us, elections’ fois sysexamy hart-verity-2.4-certification-order.pdf (Last visited on 5/18/22) 213 See Tex. Elec Code § 122.036 89Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 97 of170 PagelD 491 c. During inspection of the Hart Intercivic Verity Voting 2.4.2, conducted on April 14-17, 2020, one examiner noted an “over-vote” issue and yet still recommended the version for certification.?!* 4. In the voting process, an “over-vote” bring up a warning when more than one candidate can be voted for in a specific race. However, when you make your selection to continue, there is an automatic de-selection of another candidate chosen rather than allowing the voter to decide who gets deselected. This could lead to voter confusion and a casting of an unintended vote without the voter’s knowledge. d. Another note in the Hart InterCivic Certification Test Report Modification document states that Verity Voting version 2.4 is Hart InterCivic Verity Voting 2.4.2. No other version of any Hart modified software/firmware is certified under an original version number as modified versions are not the same as the original. The original version is also not decertified for use in Texas.?!> e. Inan “Electrical Hardware Test Plan” Verity Voting 2.4 Discrepancies, conducted by SLI Compliance, issues arose with the “proposition text not saving properly during election creation” and “loss of audio clarity when audio speed set to high”. (Emphasis added) ?'° eu geste, cies) inugnteaee eet smog rape Sng Sectoncaten Jecesa nomenon lemantent CNRS STN | (ses | Section free [cco lraroe lament (mantener [Addressed tha ely wrens netic Fo afew bem (teen 214 https:/vww.sos.texas. gov’ elections/forms/sysexam/brandon-hurley-hart-2.4.pdf visited 5/18/22) 215 See Tex. Elec Code § 122.031 (a) 216 https://Wwww.eac. gow sites/de %20Verity’020Voting’»s202.4% h=hart%202.4.2 (Last files/voting_system fil mr G%20- ODiscrepaney"o20Report.pdt Last visited 07/22/202: 90Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 98 of170 PagelD 492 f. Listed discrepancies by SLI Compliance for Hart InterCivic Verity Voting version 2.4 were “repaired” by updating to Hart InterCivic Verity Voting firmware version 2.4.2. All state of Texas certifications for these versions are currently approved under version 2.4, 365. SLI Compliance is not an accredited laboratory in accordance with the Voting System Test Laboratory Program Manual ver. 2.0 effective May 31, 2015, page 38, Sec 3.6.1. 366. On May 3, 2021, Hood County Attorney, Matthew Mills, sent a letter to Attorney General the use , Ken Paxton, requesting clarification of ballot numbering issues associated with of election machines in Hood County.?!7 2! 367. A letter from Roger B. Borgelt of Borgelt Law dated July 29, 2021, to the Attorney General , Ken Paxton, outlines the questions that Hood addressed in the cited letter above from Matthew Mills, May 3, 2021, concerning the ballot numbering for Hart Intercivic current! a. b. y in use in Hood County. “Secretary of State claims that TEX ELEC § 122.001 provides authority for the Secretary to prescribe “operating procedures” related to voting systems, 7!° nothing in the Election Code grants the Secretary the authority to provide advice to ignore specific sections of the Election Code — laws and procedures are not equal.” Several times, in the letter from Borgelt Law, it is noted that inconsistent numbering violates several Texas Election Codes (TX Election Code § 52.062, §51.006, §51.007, §51.008, §51.010, §62.007, §62.009). “The Secretary is the Chief Election Officer of the State of Texas.”*? Among other duties, the Secretary has been tasked by the Legislature with "obtain[ing] and maintain[{ing] uniformity in the application, operation, and interpretation of [the Election] code."*?! As part of performing this duty, the Secretary is required to "prepare detailed and comprehensive written directives and 217 https://katychristianmagazine.com/wp-content/uploads/ 202 |12/Request-for-Opinion-on-Ballot-Numbering_RQ- O405-K 218 See Tex. . Elec Code ter.pdf (Last visited 5/18/22) 52.062 219 See Tex. Elec Code § 31.003 220 See Tex. Elec Code § 31.001 22! See Tex. Elec Code § 31.003 91Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 99 o0f170 PagelD 493 instructions relating to and based on [the Election] code and the election laws outside this code."**? The Secretary must "distribute these materials to the appropriate state and local authorities having duties in the administration of these laws." “The Secretary's deficient guidance to counties violates the Separation of Powers clause of Art. 2, Sec. 1 of the Texas Constitution. Further, because the Secretary is providing counsel to counties to ignore Tex. Elec. Code §§ 52.062, 51.006, 51.007, and 51.008, this is a violation of the Suspension of Laws provision in Art. 1, Sec. 28 of the Texas Constitution. The Constitution provides that only the Legislature can suspend laws - not the Secretary, a member of the Executive Branch. These actions by the Secretary are contrary to the Legislature's intent that the Election Code be interpreted and applied uniformly across this State for voting systems. See Tex. Elec. Code § 122.032. By suspending laws and authorizing exceptions to Tex. Elec. Code § 52.062, and other statutes, the Secretary is failing to perform his ministerial duty. Surely the Legislature did not intend for any of these provisions to be waived, ignored, or violated.” 368. The SoS recommendations for ballot numbering procedures for Hart InterCivic System and correctly notes that Tex. Elec Code § 52.062 requires ballots to be prepared with The first option, ordering blank ballot stock with pre-printed numbers, complies with Section 52.062, as the ballots can be numbered consecutively beginning with “1.” This plainly satisfies both the letter and spirit of Section 52.062 and thus ensures counties’ adherence to other election laws, such as those cited supra, that relate to ballot numbering. The second option purports to provide an alternative to Section 52.062 for counties using the ES&S and Hart InterCivie systems. According to the Secretary, the Hart InterCivic “ballot is assigned a unique identifier when printed.” However, theiSeeretaryiacknowledges!in Appendix A that the laék"6f'consecutively-numbereds ballots: renders,it:impossiblerfor'election*officials:to ‘fully Complyewith portions-of the Election: Code: “The ballots shall be tracked, distributed, and retained just as you would with a traditional pre-printed full ballot in accordance with Sections 51,006, 51.007, 51.008 with the exception of notating the serial number of the ballot ranges.”* (Emphasis added.) ‘Theweltemnaineersnconst zed SoH minimum, TER Code 2 6 and 5 ermore, ihe’ Secretary consecutive numbers to begin with “1”. The two oops for meeting this requirement. 22 Ig, 92Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 100 of 170 PagelD 494 369. On November 1, 2021, Virginia Hoelscher, Chair of the Opinion Committee for Attorney General Ken Paxton, sent the following letter to Matthew Mills, Hood County Attorney: “Re: Procedure for numbering election ballots and which officials are authorized to select the method for numbering ballots (RQ- 0405-KP) Dear Mr. Mills: Thank you for requesting a written opinion from this office. Section 402.042 of the Government Code requires this office to issue an opinion within 180 days of receiving a request for one unless we explain to the requestor in writing before the deadline why the opinion will be delayed. Accordingly, we are notifying you that we will a issue an Shate (how will ‘officials Gainer carial nie me mare to Shin, "oO will officials at polls determine if ballots are properly numbered) and 620009 (how will election judges place numbered ballots face down for voters to choose thei ballot). In short, the Should General Paxton determine that Tex. Elec. Code § 52.062 is discretionary and that computerized machines are permitted to generate random text values onto ballots in lieu of consecutive numbering starting with “1,” Texas election law will be plunged into confusion and. uncertainty because violations of several of these ballot numbering statutes are not only illegal, but punishable criminally: a) i i placesisa@lass:@misdemeanon See Tex. Elec. Code § 51.010(c)). sollingelocatonsscar ECan "CH HT PERANI ( ee Tex. lee, Code ‘31 “007(b), 51,008(d)), and 13 TAC § 7.125(a)(10)), and Tex. Penal Code § 37.10(3)). opinion on your request within 180 days of the date received because we need more time to review the law, complete the analysis that your request requires, and finalize the formal opinion. We will make every effort to issue this opinion as soon as possible.” 370. To our knowledge, non-sequential ballots have been used in all Hood County elections since the Hart InterCivic equipment was first employed in 2021. 371. By Defendants’ own admission via the State of Texas’ Secretary of State website regarding education of the HAVA 2002; knowingly certified voting software, systems and modification without a valid VSTL accreditation via the EAC. 93Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 1010f170 PagelD 495 PARKER COUNTY 372. Parker County Commissioners, County Judge and election officials, have failed to confirm and properly certify the voting equipment in Parker County. 373. October 6, 2021, Plaintiff Jennifer B. Edwards met with Larry Walden, Parker County Commissioner, Precinct 3, regarding the lack of accredited VSTLs and thereby the lack of state certifications for the November 3, 2020, elections in Parker County. 374. October 13, 2021, Plaintiff Jennifer B. Edwards met with Larry Walden, Parker County Commissioner, Precinct 3 and John Forrest, Parker County Attorney regarding the lack of accredited VSTLs and thereby the lack of state certifications. 375. October 20, 2021, Plaintiffs Jennifer B. Edwards and Jennifer Williams met with Larry Walden, Parker County Commissioner, Precinct 3, Crickett Miller, Parker County Elections Administrator and John Forrest, Parker County Attorney regarding the lack of VSTL’s and thereby the lack of state certifications. 376. October 23, 2021, Plaintiff Jennifer B. Edwards sent letter via email to Pat Deen, Parker County Judge requesting an emergency meeting of the Parker County Election Commission be called to present findings regarding the lack of accredited VSTLs and thereby the lack of state certifications. 377. November 1, 2021, Plaintiffs, Jennifer Williams and Jennifer B. Edwards emailed Elections Administrator Crickett Miller; County Commissioners Steve Dugan, George Conley, Craig Peacock, and Larry Walden; County Attorney John Forrest; County Judge Pat Deen; and Sheriff Russ Autheir alerting them to fact that the election machines have not been certified as is required by law. Certified letters with evidence were sent to the District Attorney Jeffrey Swain and the District Judges Craig Townson and Graham Quisenberry. 378. March 25, 2022, Plaintiffs Jennifer B. Edwards and Jennifer Williams submitted sworn affidavits to Jeffrey Swain, Parker County District Attorney in accordance with Tex. Elec. Code § 273 regarding the lack of accredited VSTLs and thereby the lack of state certifications. 379. Hart InterCivic Voting System 2.4 was utilized in Parker County for the November 3, 2020, election. 94Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 102 0f170 PagelD 496 a. According to Crickett Miller, Parker County Election Administrator, Hart version 2.4 was utilized for the November 2020 general elections. b. Certification for Hart Intercivic Verity Voting software version 2.4 is on file with the Secretary of State website.” (Judicial Notice: Parker County regarding 2.4) c. Inconsistent numbering violating several Texas Elections Codes (TX Election Code § 52.062, §51.006, §51.007, §51.008, §51.010, $62.007, §62.009).?4 380. SLI Compliance is the VSTL that certified Hart InterCivic voting systems and equipment. 381. SLI Compliance is not an accredited laboratory in accordance with the Voting System Test Laboratory Program Manual ver. 2.0 effective May 31, 2015, page 38, Sec 3.6.1.75 382. By Defendants’ own admission via the State of Texas’ Secretary of State website regarding education of the HAVA 2002; knowingly certified voting software, systems and modification without a valid VSTL accreditation via the EAC. COMAL COUNTY 383. Comal County Commissioners, in addition to election officials, have failed to confirm the voting equipment in Comal County was/is properly certified. 384. Comal County removed the Elections Administrator position due to malfeasance. 385. The County Clerk is the responsible elections official. There is a Deputy under the County Clerk named the Elections Coordinator. a. Bobbie Koepp, Comal County Clerk b. Cynthia Jaqua, Deputy under the Clerk - Elections Coordinator 386. Comal County used KNOWiNK Poll Pads that were updated the night before the November 3, 2020, General Election. 387. Comal County has not provided the version of KNOWiNK poll pad software that was utilized during the November 3, 2020. 388. KNOWiNK Poll Pads version 2.4.9 was certified by the SoS on January 23, 2020.22 What version of software were the poll pads upgraded to the night before the November 3, 2020, 223 https.//www.sos.state.tx.us/elections/ forms sysexamyhart-verity-2.4-certification-order.pdf (Last visited 5/25/22) 224 See Parker County page 9 lof this case 25 https: /www.eac, gow sites/default files/eac_assets/1/28/VSTLManual%207%208%2015%%20FINAL.pdf (Last visited 5/25/22) 226 httpsv/Wwww.sos. texas. gov elections/forms’sysexam/knowink-poll-pad-certification-letter.pdf Last visited 06/10/22 95Case 4:22-cv-00576-P-BJ Document13 Filed 07/25/22 Page 103 of 170 PagelD 497 General Election? 389. The purchase of these pads was contracted via Hart InterCivic under contract in 2018 with software, maintenance, and upgrade options. 390. The SoS’s office did not inspect the KNOWiNK Poll Pad updated/modified changes as required by law.227 a. Defendants Koepp and Jaqua did not address the violation of Tex. Elec Code with the SoS’s office and or make the voters aware of lack of certification. b. Defendants Koepp and Jaqua authorized the update/modification of poll books with clear knowledge of Tex. Elec Code. 391. KNOWiNK performed an update the night before the election of November 3, 2020, similar to how an iPhone updates via a network connection.” 392. Election officials throughout the country-from North Texas to Georgia-reported issues with poll pads from St. Louis-based KNOWiNK. 393. In some locations; the poll pads also activated ballots on voting machines which forced some voters to fill out selections on paper ballots. 394. The Defendants proceeded to utilize the paper forms and provided pencils.?”° 395. KNOWiNK poll pads went down November 3, 2020, across the state affecting Comal County elections. a. Marcia Ridley, Spalding County Board of Elections, attributed the problem to a vendor’s 11" hour update per a representative for the election technology vendor, dominion Voting Systems, told her office that it had uploaded some kind of “update” the night before the election and that this had created the glitch.” (emphasis added) 27 See Tex. Elec Code 31.014 28 htips:/www. ksat.com/news local/2020/1 1/03 polling-pads-down-at-comal-county-voting-locations/ Last visited 06/10/22 229 https: /vww.ksat.com/news local/2020/1 1/03 polling-pads-down-at-comal-county-voting-locations/ Last visited 06/10/22 25 https: /Wwww.politico.com/news/2020, 11/04 georgia-election-machine-glitch-434065 Last visited 06/10/22 96Case 4:22-cv-00576-P-BJ Document13 Filed 07/25/22 Page 104 0f170 PagelD 498 396. 397. 398. 399. 400. 401. Ridley initially told POLITICO on Nov. 3 that Dominion, which prepares the poll books for counties before elections, “uploaded something last night, which is not normal, and it caused a glitch.” The glitch prevented poll workers from programming the voter smart cards for the voting machines. In her initial comments last week, Ridley said that a representative for the two companies called her office after poll workers began having problems with the equipment on the morning of the election. The representative said at the time that the problem was due to an upload to the machines by one of their technicians overnight, Ridley told POLITICO. As a result, “three reports of races not being included on a ballot,”:?*! a. Contests seats on the New Braunfels ISD Board of Trustees b. District 2 (Nancy York claiming victory over incumbent Michael Calta by 12 votes) c. District 4 (John Tucker claiming victory over incumbent Matthew Sargent by 251 votes) d. Lake Dunlap Proposition not being on the appropriate ballot. Impacted precincts due to failure of poll pads include 301, 302, 303 and 201. This resulted in County Judge to extend voting hours due to poll pad failures. Defendant Bobby Koepp's statement to KensS in which she offers only a partial responsibility, “It’s part of my duties to make sure that everybody gets what they’re supposed to get when they come to vote, and I do take responsibility for that”; in which the Defendant continues placing blame at KNOWiNK. “But in my defense, I honestly feel [KnowInk] needs to make it right. They need to make a statement and need to tell everybody what happened.” Defendant Bobby Koepp believes it is up to the candidates to request a do-over. “We are doing everything in our power to...try to figure out exactly how many votes were cast that didn’t get the opportunity to vote the way they needed to.” The day prior Defendant Bobby Koepp stated to one candidate, Sargent, that reported his 23! https:/www.ken: election-day-tech-issi inity’hill-country-reporter/comal-county-investigates-scope-of- ~aa4dd-60edde2db052 Last visited 06/10/22 97Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 105 of 170 PagelD 499 name and race not on the ballot but submitted in error; “If this had been brought to our attention before the vote was submitted, we could have canceled out the vote and reviewed the problem. ..”?5? 402. Sargent is left wondering and...” waiting for the county to step up and say there is a problem or to let us know what they are going to do to fix it.....Or to make us feel all warm and fuzzy that every vote got counted.” 403. Sargent’s complaint to the SoS Office states...potential violation from the handbook for Election Judges and Clerks 2020, which in part requires presiding election judges to cease using malfunctioning equipment installed at polling places “immediately after discovering that the equipment is not functioning properly.”?*4 404. Sargent’s continues, “The county knew about the problem no later than 10:41 am and continued to utilize the equipment without shutting the polling places(s). Even though this was a software issue, and the ballots were not loading correctly the machines were not properly functioning. The equipment should have been shut down until the software issue could have been corrected.” 405. Defendants Koepp and Jaqua authorized and continued to use Hart InterCivic voting systems and equipment after many reported malfunctions including but not limited to lack of paper ballot and ballot numbering. 406. After multiple PIA requests, Comal County did not provide the Letter of Approval from the SoS to Comal County approving the contract for the purchase of Hart Verity Voting 2.4. as pursuant to Tex. Elec Code.’*° Making the election null and void if the document does not exist. 407. By Defendants’ own admission via the State of Texas’ Secretary of State website regarding education of the HAVA 2002; knowingly certified voting software, systems and modification without a valid VSTL accreditation via the EAC. 252 hups://www.kens5.com article/news/politics/elections/election-day-glitches-led-to-reports-of-absence-of-races- and-propositions-on-some-ballots-comal-co-says/273-308a3 fae-49a9-41e4-a4bf-7 11 266c28310 Last visited 06/10/22 233 https://www.kens and-propositions-on-s 06/10/22 34 https: /herald-zeitung.com/community_alert/article_ $62bdcaa-2483-1 Leb-9728-fb0da9e3734c.html Last visited 06/10/22 235 See Tex. Elec Code § 123.035 (a), (b), (c), (4). ‘ae m/article/news/politics/el me-ballots-comal-co-s: tions election-day-glitches-led-to-reports-of-absence-of-races- 3 fue-49a9-4 Led-a4b f-711266c28310 Last visited 98Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 106 of 170 PagelD 500 TARRANT COUNTY 408. Tarrant County Commissioners, in addition to election officials, have failed to confirm and properly certify the voting equipment in Tarrant County. 409. Hart Intercivic Verity Voting 2.3, 2.4 and 2.5 contain numerous COTS components,?3© and that all three versions lack proper EAC certifications according to HAVA 2002. 410. Halderman’s statement with regard to close proximity of the voting system to the internet rings true. There are several components of the election infrastructure ecosystem utilized by Tarrant County for all three elections that give cause for concern. a. November 3, 2020, election contained one or more of these aspects/components but not limited to: 411. Verity Touch Writer DUO are daisy chain configurations comprised of a Verity controller device and up to twelve Ballot Marking Devices?*” (BMDs). The Implications of the utilization of these types of election systems will be addressed in a following section. 412. Verity Scan equipped with a Relay Kit”** enables direct transmission of cast vote records from Verity Scan (precinct ballot counter or tabulator) via a preferred telecommunications carrier, to a central election office. 413. Per the contract obtained between Tarrant County and Hart Intercivic 9 Relay Kits (COTs modems) were acquired”? 414. Hart Intercivic,’4° as well as Dominion Voting Systems, and ES&S, have disclosed”*! that some tabulators have wireless modem capabilities, offered as an add-on to base model kits. Add-on modem kits (e.g., Relay Kits) not only put elections at heightened 236 https://www.eac.gov/ voting-equipment registered-manufacturers: hart-intercivic-ince (Last visited 5/23/22) 257 hitps://www.stat.berkeley.edu ~stark/Preprints bmd-p19.pdf (Last visited 5/23/22) https://www.michigan.gov/documents sos/071B7700128_Hart_Exhibit_2_to_Sch_A_Tec_Reg_556894_7.pdf 239 hitps://files.ttttexas.com/case/TX_SOS_Election_Violation References See Appendices C & E 249 hitps://www.eac. vow sites/default files/voting_systemfiles/Attachment_G_- As_Run_Hart_Verity_Voting 2.2.2 EAC Modification Test_Plan_vl.2 pdf See page 15, 20 (Last visited 5/23/22) 241 https: /www.nbenews.com polities/elections’ online-vulnerable-experts-find-nearly-three-dozen-u-s-voting- nll 36 (Last visited 5/23/22) 99Case 4:22-cv-00576-P-BJ Document 13 Filed 07/25/22 Page 107 of 170 PagelD 501 vulnerability,”*? but also decertify2? EAC certification?’ of the system, according to Kevin Skoglund, Senior Technology Advisor at the National Election Defense Coalition. 415. The Master Agreement between Tarrant County and Hart Intercivic was signed on August 13, 2019. However, the Relay Kits do not appear as a component included within the 2.3 version of Verity Voting per the EAC Certificate for Conformance," nor is it mentioned in the Memorandum >“ of the SoS. 416. Relay Kits are listed as components of Verity Voting 2.2.2.4’ and as an option for Verity 2.4. Moreover, the application acceptance ** date for version 2.4 (including the Relay kit) is after the contract for 2.3 was signed, on August 15, 2019, by Tarrant County””?. 417. The EAC later issued certification of Verity Voting 2.4 (despite the lack of examination by an accredited VSTL) on February 21, 202075° 418. The Relay Kit is never mentioned in the TX SoS Memorandum of certification, and yet somehow Tarrant County purchased 9 Relay Kits (modems) outside of the scope of 2.3 that also had not even begun the EAC certification process.”*! 419. Brandon Hurley, an SoS appointed examiner, cited the connectivity capabilities of this make and version of voting system in his examination report. He reported that Hart Intercivi