In a recent government meeting, serious concerns were raised regarding the security vulnerabilities of the Dominion Voting System used in New Mexico elections. A speaker highlighted that the system has failed to adhere to basic security protocols, notably storing encryption keys in plain text within the same database it is meant to protect. This alarming oversight allows anyone with access to the election system to potentially decrypt, alter, and re-encrypt data without leaving a trace.
The speaker further revealed that the encryption keys were obtained through a public document request and used by cybersecurity experts to access New Mexico's election database. They also pointed out that the passwords for election supervisors and technicians were alarmingly simplistic and uniform across the state, raising fears of widespread susceptibility to manipulation.
Additionally, it was claimed that the New Mexico election system, despite official assertions that it is not connected to the Internet, may actually be accessible remotely. This assertion was supported by testimony from a previous Senate hearing, suggesting that remote access by the Cybersecurity and Infrastructure Security Agency (CISA) could expose the system to potential threats.
Concerns were also raised about the processing of official election results, which reportedly occur on an uncertified, cloud-based system, further complicating the security landscape. The speaker emphasized that any voting system failing to meet state election code requirements should be decertified, urging local officials to address these vulnerabilities promptly.
The meeting underscored the need for heightened scrutiny and reform of election security measures in New Mexico, as officials and community members alike called for immediate action to safeguard the integrity of the electoral process.