EVIDENCE-DOMINION INTERNAL EMAILS
Dominion v Byrne
Bailey v. Antrim County was a lawsuit alleging fraud and vote manipulation in the 2020 presidential election using Dominion systems. The case sought forensic audits and exposed critical errors, vote flipping, and chain-of-custody breakdowns, ultimately dismissed by the court. The case was dismissed by the court under the dubious assertion that the statewide audit remedy sought by the plaintiff had already been satisfied thereby making further proceedings moot. The court referenced a Risk Limiting Audit performed under the supervision of MI SoS Jocelyn Benson as the basis for their assertion. It should be noted that this audit did not include any analysis of the election returns in Detroit – Michigan’s largest city and responsible for ~8% of the statewide vote.
Same Election Theft Features Evident In Venezuela Referenced In Dominion Internal Emails
The forensic images of the Dominion Voting System Election Management System (EMS) Server obtained during discovery in Bailey v Antrim County lawsuit reveals a significant number of common features. This correlation appears to validate assertions that electronic voting systems had been used to manipulate election results in the United States.
Antrim reports reveal that Dominion system technicians and ElectionSource contractors exercised “utility tool”–like capabilities: by preparing, distributing, and updating project configuration files (such as VIFCHOICEINSTANCE.DVD) across all tabulators and the EMS, these insiders could inject, flip, or nullify votes in bulk for entire counties. These operations bypassed standard precinct controls and local oversight, allowing for undetectable, mass vote manipulation in a manner directly analogous to the SAES Utility Tool specified in the whistleblower’s testimony
The forensic investigation documented that unsecured digital ballot PDFs could be widely distributed, copied, and printed—sometimes by election staff at home or through external cloud vendors. This enabled ballot box stuffing with phantom ballots not tied to actual voters or registrations. The breakdown of chain-of-custody on ballots permitted creation and introduction of fraudulent votes, closely matching the fake voter registration and phantom precinct tactic described in Venezuela.
Manipulation of vote tallies, error suppression, and direct mapping changes within project files enabled tabulators and the EMS to produce manufactured results—i.e., shifting votes between candidates, suppressing legitimate ballots, or triggering “undervotes” that were never flagged reliably. These manipulations could be coordinated centrally or by trusted insiders, resulting in seamless physical and electronic accounting that could only be disproven by intensive hand-audit of all ballots, mirroring the “war room” result direction cited by the whistleblower
The forensic review found that Antrim’s voting system software and hardware configurations allowed, and in some cases programmed, automatic overwriting and truncation of critical logs. Error messages related to index shifts and ballot misalignment were suppressed as “undervotes,” preventing auditors or poll workers from detecting manipulation. There was no adequate version control or change tracking for project files, making retrospective analysis very difficult—paralleling the log overwriting and deletion method described in Venezuela.
ElectionSource (Dominion vendor) and Michigan’s Secretary of State coordinated audits and limited the scope of reviews granted to county officials, threatening legal action against independent forensic efforts. Auditors were systematically denied full access to system internals, project files, and logs most relevant to potential manipulation. This restricted “selective auditing” ensured that outside investigators only saw sanitized or partial data, directly paralleling what the whistleblower documented for Smartmatic and Dominion systems in Venezuela and abroad.
Antrim forensic reports verified that system-wide credentials, default passwords (such as “123456”), and remote project file deployment by third-party ElectionSource employees allowed system-wide remote access to manipulate tabulators and EMS machines. Physical and remote connections were allowed, enabling manipulation both during and after elections without oversight—matching the hardware-enabled remote access risk outlined in the whistleblower account.
The technical documentation noted architectural and licensing links between Dominion, Smartmatic, and Sequoia voting systems—many components based on or adapted from foreign (Venezuelan, Chinese, Taiwanese) original code and supply chains. Dominion project files, encryption keys, and code repositories were accessible to out-of-state and international parties and vendors, exposing the system to risk from foreign oversight and remote vendor control, as described in the whistleblower’s testimony on global election manipulation methods.
Sheriff Leaf Letters to Federal Officials
Dominion Internal Emails
Top 10 Assertions By Pro-Machine Groups Debunked
The testimony provided by Venezuelan whistleblower debunks 7 out of 10 of the top assertions made by those who believe we can have secure elections with electronic voting systems. All ten assertions are debunked when including a broader set of evidence.
See Evidence