Electronic voting machines, basically computers programmed to tabulate the vote data that is input, have been around for a long time. Probably about as long as hacking into computers, an issue that has been concern for that same period of time.
Observers, even election experts, often have made claims about the porous defenses built into the machines, and sometimes have been sued by voting machine corporations for expressing their doubts.
Now Tulsi Gabbard, President Donald Trump’s director of national intelligence, has confirmed in a bombshell announcement that there is “evidence that electronic voting machines have been tampered with to manipulate election outcomes in the United States,” a report in the Gateway Pundit reveals.
BREAKING: Tulsi Gabbard just announced at the Cabinet meeting that her office has obtained evidence of massive vulnerabilities on voting machines that allow hackers to flip votes. WHOAH!!!
“We have evidence of how these electronic voting systems have been vulnerable to hackers… pic.twitter.com/3KGuyyO60n
— George (@BehizyTweets) April 10, 2025
The report described Gabbard’s revelation as “jaw-dropping” and explained she said, “We have evidence of how these electronic voting systems have been vulnerable to hackers for a very long time and vulnerable to exploitation to manipulate the results of the votes being cast, which further drives forward your mandate to bring about paper ballots across the country so that voters can have faith in the integrity of our elections.”
One of the president’s executive orders concerns elections managers being required to use paper ballots, and not be allowed to rely solely on electronic machines.
The Pundit explained, “Her statement confirmed what many conservatives have long suspected — that the very foundations of America’s electoral system have been compromised.”
The report said, “Last year, some of the world’s top hackers convened in Las Vegas for the annual DEF CON conference, specifically at the Voting Village event, to probe and expose vulnerabilities in voting machines set to be used in the upcoming November election. From Friday through Sunday, hackers at Voting Village tested various voting machines and related equipment, attempting to bypass security measures. Harri Hursti, co-founder of Voting Village, noted that the list of vulnerabilities found was extensive but consistent with previous years.”
Further, Scott Algeier, of the Information Technology-Information Sharing and Analysis Center, told the publication the solution isn’t simple.
“Even if you find a vulnerability next week in a piece of modern equipment that’s deployed in the field, there’s a challenge in getting the patch and getting the fix out to the state and local elections officials and onto the equipment before the November election. It’s not a 90-day fix, It’s not a Microsoft every Tuesday, issue your patch and everything works fine. It’s a pretty complicated process.”
Voting machines, in fact, have been documented to have been hacked previously. In 2017 at DEF CON, one hacker took just 90 minutes to get inside the voting machine and vote remotely.
The report continued, “In 2023, University of Michigan Professor of Computer Science and Engineering J. Halderman, revealed in a Georgia courtroom that Dominion Voting Systems were vulnerable to hacks.”
HOLY CRAP! Tulsi Gabbard announces they’ve FOUND EVIDENCE of voting machines vulnerable to TAMPERING to steal elections
“We have evidence of these electronic voting systems being vulnerable to hackers and vulnerable to exploitation to manipulate the results.”
How is this… pic.twitter.com/5wDvogdbu5
— Nick Sortor (@nicksortor) April 10, 2025
Click this link for the original source of this article.
Author: Bob Unruh
This content is courtesy of, and owned and copyrighted by, https://www.wnd.com and its author. This content is made available by use of the public RSS feed offered by the host site and is used for educational purposes only. If you are the author or represent the host site and would like this content removed now and in the future, please contact USSANews.com using the email address in the Contact page found in the website menu.