The Colorado voting machine security breach, overseen by Secretary of State Jena Griswold, is a masterclass in incompetence and deceit—an epic calamity not of malice but unchecked ineptitude. A recently leaked conference call with Colorado’s county clerks lays bare the ineffectiveness of the...
americanliberty.news
Leaked Call Reveals Colorado Secretary Of State’s Cover-Up Of Dominion Voting Password Leak
The
Colorado voting machine security breach, overseen by Secretary of State
Jena Griswold, is a masterclass in incompetence and deceit—an epic calamity not of malice but unchecked ineptitude. A recently leaked conference call with Colorado’s county clerks lays bare the ineffectiveness of the response, and adds a new layer of bureaucratic bungling. Deputy Secretary of State
Christopher Beall admitted that the Secretary of State’s office actively kept the leak of the passwords hidden from county clerks to avoid media exposure. Their plan? Keep the secret until after the election—without even bothering to change the passwords in a timely manner. This debacle is another nail in the coffin for faith in
electronic voting systems, further underscoring the need for a return to paper ballots and same-day voting, at least for federal elections, to ensure the integrity of our electoral process.
Four full months passed as this ticking time bomb lay in wait, passwords exposed to anyone who cared enough to look online. It was like an open buffet for anyone with ill intent. Worse yet, when county officials finally learned of the breach, the office’s response was dismal at best—an ad hoc rush five days before the election to change the compromised passwords. Adams County Clerk Josh Zygielbaum, frustrated and incredulous, called out the process during the conference call. “Honestly, I’m not very confident in this process,” he said. Zygielbaum’s concerns were brushed aside, with Deputy Secretary Beall attempting to downplay the risks by dismissively explaining that the breach involved BIOS-level passwords—as if that made the system immune to compromise.
This isn’t merely a local administrative error. It is a significant threat to the very foundation of electoral integrity—a threat fostered by a combination of bureaucratic negligence, lax security protocols, and Griswold’s dogged refusal to take meaningful action. Not only was the BIOS password exposed, but it was maintained unencrypted, sitting vulnerably in an Excel spreadsheet on state network drives. One might think these officials were desperate to be hacked. And when it comes to passwords—their approach violated even the most basic CISA guidelines, rules that have been around for more than fifteen years. Apparently, securing voting systems is a task too advanced for those in charge.
Contrary to Griswold’s initial reassurances that this was a minor, isolated error, it later emerged—through the admissions of Deputy Secretary Beall—that more than half of Colorado’s counties were affected. One cannot help but marvel at the level of ineptitude required to let a disaster like this go unnoticed for so long. If you leave your house door wide open for a few minutes, you should assume that something may have happened inside. Griswold and her merry band of public servants managed to leave the door open for four months and then acted surprised when people noticed.
- Advertisement -
The absurdity didn’t end with merely downplaying the scope of the breach. When Zygielbaum challenged Beall, pointing out the recklessness of making last-minute changes to voting systems during an election week, Beall’s response was cold comfort. “There is no possibility that any of these password changes will ‘crash the system,'” Beall claimed, speaking as though he could guarantee the flawless execution of hasty password changes conducted by staff with little to no specific training in election systems. In fact, Griswold’s team admitted that some technicians being dispatched had never worked on voting machines before. Their credentials? Generic
cybersecurity experience—with the assumption that this was enough to secure the foundational infrastructure of democracy.
If there is one thing clear about basic cybersecurity, it is that you cannot be this reckless without consequences. Any compromise of BIOS passwords in a critical infrastructure computer requires assuming that the entire system has been compromised unless proven otherwise. We are talking about passwords that give direct access to the foundational layer of a voting machine—and by extension, the very process by which we select our representatives. If that isn’t the definition of critical infrastructure, then what is?
And it wasn’t just the BIOS passwords. Once one voting system component is compromised, anything connected to it—LAN cables, HDMI cables, even air-gapped systems using removable media—must be assumed compromised as well. It’s Cybersecurity 101. CISA, the lead federal agency for election infrastructure security, lays out clear standards and procedures for handling such incidents. The very least Colorado could have done is follow them. Instead, they opted for a comedic routine of denial, delay and deception.
The immediate actions taken by Griswold’s office can best be described as an exercise in performative futility. Day 1: they found out (through their vendor, no less), scrambled to remove the .xlsx file from the web after a leisurely four-month gap, and reported it—to CISA, naturally. Did they bother telling Colorado election officials or the public? Of course not. Why trouble the plebeians with such trivialities?
Days passed, and when the state GOP learned of the breach and the media caught wind, Griswold finally came out of her bunker. Her strategy? A classic: evade, obfuscate and pretend everything was under control. Griswold claimed that each voting machine required two separate passwords, with different people or groups entrusted with only one password each, making it supposedly impossible for the machines to be compromised. This claim was false. Even if it were true, the group not supposed to have the BIOS passwords could have simply downloaded them from the internet, meaning that multiple individuals certainly had complete and unfettered access to the machines. They dispatched people to change a handful of passwords, and Griswold went on a media blitz, making a futile attempt to gloss over the enormity of the breach. Day 9 saw Governor
Jared Polis attempt his own desperate act of damage control, ordering a broader, albeit equally ineffective, response to ensure password changes. Apparently, it takes helicopters to change passwords in Colorado.
But what Griswold and Polis both failed to do was address the real danger: the integrity of the voting systems themselves. The affected machines were still in use, election officials continued to tabulate votes with them, and—most damningly—no real forensic analysis was ever conducted to determine the scope and impact of the compromise. At no point did anyone pause and take a breath to say, “Maybe we should actually stop using these machines until we’re absolutely sure they’re safe.”
A proper response would have been as follows: first, halt the use of all affected systems; second, image the compromised machines to preserve the evidence; third, bring in qualified cyber forensic experts to determine if, when, and how the systems were breached; fourth, address the timing and impact of any compromise, especially since this breach was active during the Colorado primary election. And fifth—and only after all other steps were satisfactorily completed—remove any malicious influence, if possible, and restore functionality. None of this happened.
What did happen, instead, was a spectacle of bureaucratic incompetence that would be almost humorous if it weren’t undermining the sanctity of Colorado’s elections. The public was told, “Nothing to see here, folks, move along,” as if we’re all too stupid to understand the ramifications of a four-month breach that affected a majority of the state’s counties. Anyone insisting today that Colorado’s voting systems are secure, or that citizens can rest assured their votes have been accurately counted, is either woefully ignorant or has a vested interest in upholding the false narrative of a “swift response.”
Consider, for comparison, the case of Tina Peters. The former Mesa County Clerk, convicted in October 2024 for allowing access to her county’s voting systems to a security consultant in 2021, received a nine-year prison sentence. Nine years for trying to determine if voting machines were secure—yet Griswold’s office escapes unscathed after spilling the keys to half the state for four months. How is it that Peters is demonized while Griswold and her team, despite being blatantly negligent, get a pass? It seems there are different rules for those in power, especially if they have the right political connections.