Recently, investigative journalist Yehuda Miller have received several FOIA documents that completely redefine what we have been told to believe about the 2020 US presidential election.
The election was heralded by the Democratic Party, Joe Biden, the mainstream media, and former CISA head Chris Krebs as the most secure election in US history.
Chris Krebs, the former CISA director fired by Donald Trump, testified before Congress on December 16, 2002, after being fired. Krebs was called to testify before the United States Senate Governmental Affairs Committee on Homeland Security.
Krebs announced that day: “The 2020 election was the most secure in the history of the United States.”
But were the 2020 elections really the most secure elections in the history of the United States?
Yehuda Miller and The Gateway Pundit intend to release a series of FOIA documents in the coming days showing that Chris Krebs was not honest with the American public during his testimony and that he clearly knew his statements were inaccurate.
On Monday, we published information about a secret Election Day 2020 phone call organized by the Cybersecurity and Infrastructure Security Agency (CISA).
CISA describes itself as the operational leader for federal cybersecurity and the national coordinator for critical infrastructure security and resilience. However, since its founding, CISA has transformed into a much more sinister and politicized organization.
Founded in 2018, CISA was originally intended to be an auxiliary agency designed to protect “critical infrastructure” and defend against cybersecurity threats. In the years since its creation, however, CISA has metastasized to become the nerve center of the federal government’s nationwide social media surveillance and censorship operations.
By 2020, CISA was regularly reporting social media posts that allegedly spread “misinformation” on social media platforms. By 2021, CISA had a formal “Mis-, Dis- and Mal-information” (MDM) team. In 2022 and 2023, in response to growing public and private criticism of CISA’s unconstitutional behavior, CISA attempted to disguise its activities, doubly claiming that it served a purely “informational” role.
The Gateway Pundit’s Jim Hoft is currently the lead plaintiff in the Missouri-Louisiana lawsuit against Joe Biden that will head to the Supreme Court in March.
The plaintiffs challenge the Biden regime’s censorship apparatus, arguing that the federal government cannot infringe on Americans’ free speech. CISA today is central to the government’s censorship system.
On Monday, The Gateway Pundit published evidence that CISA officials held a private meeting on November 3, 2020 at 3:30 pm Eastern Time, with select members of a secret “Election Security Initiative.”
This was an exclusive meeting of CISA officials and their exclusive campaign partners. It took place late in the afternoon on election day. It reportedly lasted half an hour.
The Gateway Pundit published this report on Monday.
You can read the first report here and below:
EXCLUSIVE: FOIA documents reveal secret Election Day 2020 meeting with CISA, Dominion, ES&S, ERIC, FBI, left-wing organizations, state officials and others – Only recently discovered
Today, The Gateway Pundit releases new information proving that Chris Krebs was not honest during his testimony in December 2020.
Yehuda posted this letter to America last night on X:
Dear America,
CISA told you the 2020 election was “safe and secure.”
Yet CISA has compiled a report on the security and vulnerabilities of many “Election Infrastructure” (EI) offices across the country for the 2020 election year.
The report was hidden from the public.
The report has now been obtained legally via the Freedom of Information Act FOIA.
You don’t have to be a computer expert to understand that our election offices are as porous as Swiss cheese.
It appears to be the biggest violation of the 14th Amendment, treating voters differently. All voters must be able to vote in the same safe way.
Read the report with your own eyes and ask yourself why was it hidden from the public?
Do you still trust some official who knew about this but didn’t inform the public?
Yehuda Miller recently obtained the Election Infrastructure (EI) Subsector Cyber Risk Summary. report for 2020 through a FOIA request.
The report provides analysis, findings and recommendations derived from observed non-attributable cybersecurity trends between November 3, 2019 and November 3, 2020—Election Year 2020 (EY20).
The report was released in March 2021 and included data known to CISA officials for the 2020 election year.
On page two of the report – CISA released its analysis of U.S. Election Infrastructure (EI) entities in 2020.
CISA’s analysis of the data available for the IE entities assessed showed that:
** 76% of EI entities for which CISA performed a Risk and Vulnerability Assessment (RVA) had weaknesses in spearphishingwhich provide adversaries with an entry point to launch attacks
** 48% of the entities had a critical or high-severity vulnerability on at least one Internet-accessible host that provided potential attack vectors to adversaries
** 39% of entities ran at least one risky service on an Internet-accessible hostproviding the
opportunity for threat actors to attack otherwise legitimate services** 34% of the entities were running unsupported operating systems (OS) on at least one Internet-accessible hostwhich exposes entities to compromise.
From the second page of the report – the highlights are ours:
How can 2020 be considered a “secure” election when 76% of election infrastructure had spearfishing weaknesses and 48% of entities had a critical or high vulnerability on at least one internet-accessible host?
The CISA report then goes on to describe how election officials can fix these vulnerabilities in the system. Of course, this means that vulnerabilities are still accessible to foreign actors.
On page four of the report – CISA reports that an Advanced Persistent Threat (APT) has successfully obtained US voter registration data!
In the run-up to the 2020 election, an APT actor was able to obtain U.S. voter registration data, including in at least one case from a state election website, and launched an election-related disinformation campaign. In October 2020, CISA also observed APTs targeting election infrastructure in state, local, tribal, and territorial (SLTT) government agency networks. As of October 24, 2020, CISA had no evidence indicating that the integrity of election data was compromised.
On page seven of the report – CISA CyHy scan detected 48,796 total vulnerabilities on hosts in the 324 participating EI entities.
Of those vulnerabilities, 319 (0.80%) were of critical severityAND 1,820 (4.55%) were of high severity based on the CVSS base score.
On page fifteen of the report – Officials found another 451 vulnerabilities and weaknesses in the systems.
In the year 2020, CISA performed RPT and RVA for 108 EI entities. The RPT and RVA teams performed penetration testing, phishing assessments, web application assessments, and database assessments. These teams identified 451 findings (see Figure 12), i.e. vulnerabilities and weaknesses that present a risk to the entity.
Does it seem safe to you?
How can you claim that the 2020 election was “the most secure election ever” when your own agency’s own reports state that 76% of the infrastructure had spearphishing weaknesses, 48% of the infrastructure had critical vulnerabilities or of high severity and 39% of the infrastructure was running at least one risky service on an Internet-accessible host?
On pages fifteen and sixteen of the report – There is more discussion about spearphishing threats.
During assessments, spearphishing weaknesses were the most common finding observed across 73% of entities (see Figure 13). The widespread success of spearphishing indicates that the entities assessed had inadequate border and host protections. This weakness allowed spearphishing emails to cross network boundaries and subsequently be executed on the local host with the help of a user performing some action, such as clicking a link or opening a file that launches the execution of malicious payloads. In addition to indicating a lack, or poor implementation, of technological protections, this finding may also indicate a lack of cybersecurity awareness and recognition of spearphishing among users, which leaves the entity vulnerable. This finding is important to review and address by all EI entities, as many threat actors regularly initiate attacks using spearphishing to acquire credentials and establish initial remote access.
This CISA report completely destroys former DHS official Chris Krebs and his scandalous testimony under oath before the United States Senate.
Krebs obviously wasn’t honest with the Senate committee in 2020.
The Gateway Pundit and Yehuda Miller plan to release more incriminating documents in the coming days.
Here is the complete CISA Election Infrastructure Subsector Cyber Risk Summary 2020 Vulnerabilities Report.