Attack Vectors in Computerized Voting Systems: An Election Fraud Slideshow

The attached PDF slideshow, prepared by Bev Harris of, presents a detailed explanation of computerized election systems and the many ways they are vulnerable to undetected intrusion and rigging of election results. Cheating in elections is nothing new. But whereas the methods for defrauding traditional paper ballot elections are well-known and can be effectively countered by recognized chain of custody procedures and public observation, votes counted by computer software are not observable by the public, and the potential pathways of attack into computer-driven voting systems are limitless and impossible to defend. Absorb the lessons presented in this graphic summary, and you will begin to understand why.
This presentation courtesy of

BBV_attackpoints_SS.pdf9.04 MB