While playing a round of golf,
— Breaking911 (@Breaking911) January 26, 2022
Donald Trump says he’s the “45th and 47th” President of the United States.
pic.twitter.com/t223Q8ziTD
While playing a round of golf,
— Breaking911 (@Breaking911) January 26, 2022
Donald Trump says he’s the “45th and 47th” President of the United States.
pic.twitter.com/t223Q8ziTD
ZuckBucks-Connected Private Organization Taught Election Officials To ‘Control The Narrative’ About Mail-In Voting https://t.co/HZdCzVvH1K
— Mollie (@MZHemingway) January 26, 2022
Democrat voters may be morons, but the Democrat party and their propagandists are damn good at two things: Lying and creating propaganda. Their ability to twist facts into narratives politically beneficial to themselves is simply amazing. Imagine if they put all that energy into doing something positive for the American people. Of course their voters rarely hear alternative viewpoints, so that makes it a little easier.will25u said:ZuckBucks-Connected Private Organization Taught Election Officials To ‘Control The Narrative’ About Mail-In Voting https://t.co/HZdCzVvH1K
— Mollie (@MZHemingway) January 26, 2022
I hope Zuck burns in hell!will25u said:ZuckBucks-Connected Private Organization Taught Election Officials To ‘Control The Narrative’ About Mail-In Voting https://t.co/HZdCzVvH1K
— Mollie (@MZHemingway) January 26, 2022
Well he was raised Jewish and his wife is Buddhist, so as far as I understand the Christian view on these things that should do the trick unless he converted.ProgN said:I hope Zuck burns in hell!will25u said:
. . .
He's a progressive and their ideology is rooted in the 7 deadly sins so I'd bet he burns whether he converts or not.Faustus said:Well he was raised Jewish and his wife is Buddhist, so as far as I understand the Christian view on these things that should do the trick unless he converted.ProgN said:I hope Zuck burns in hell!will25u said:
. . .
https://www.businessinsider.com/mark-zuckerberg-more-religious-fatherhood-facebook-issues-2020-1
Twitter doesn't show the wink.Retired FBI Agent said:
Wow. He conceded the 46th spot.
This is HB205 if anyone wants to track it. Thanks to @MZHemingway for doing so much coverage of the Zuckerberg election problem.
— The Virginia Project (@ProjectVirginia) January 27, 2022
🚨 BREAKING 🚨
— Sean Parnell (@SeanParnellUSA) January 28, 2022
Act 77, Pennsylvania’s no excuse mail in ballot law, is found to be UNCONSTITUTIONAL by the Commonwealth Court.
Thanks to @WallyZimolong & Greg Teuful for believing in this case & crushing the argument!
Huge victory for the people of Pennsylvania!
Article goes on...Quote:
By Mark Niesse, The Atlanta Journal-Constitution
Updated Jan 26, 2022
Hacking is possible, experts say, but there's no sign 2020 election was rigged
Update: A judge is considering releasing a redacted version of the report based on requests in court Thursday from Secretary of State Brad Raffensperger and plaintiffs in an election security lawsuit.
A confidential report alleges that hackers could flip votes if they gained access to Georgia's touchscreens, drawing interest from the U.S. Department of Homeland Security, Louisiana election officials and Fox News.
One key agency hasn't asked the court to disclose the report: the Georgia secretary of state's office.
There's no sign that state election officials have done anything about the vulnerability, a potential flaw dangerous enough to be kept under seal, labeled in court as "attorneys' eyes only" six months ago.
The vulnerability hasn't been exploited in an election so far, according to examinations of the state's Dominion Voting Systems equipment, but election security experts say it's a risk for upcoming elections this year. Investigations have repeatedly debunked allegations of fraud in the 2020 election.
Georgia election officials won't say what actions they've taken, if any, to improve security or detect tampering. State election officials declined to answer questions about a report they haven't seen, which outlined the flaw as part of a lawsuit aimed at forcing the state to abandon its $138 million voting system that prints out paper ballots and instead use paper ballots filled out by hand.
Several election integrity advocates said Georgia Secretary of State Brad Raffensperger shouldn't ignore the issue, even if he believes existing protections would prevent illicit access to voting equipment.
"It's really concerning that the Georgia secretary of state and Dominion are kind of putting their head in the sand," said Susan Greenhalgh, an election security consultant for plaintiffs suing over Georgia's voting system. "Common sense would say you would want to be able to evaluate the claims and then take appropriate action, and they're not doing any of that."
Dominion became a frequent target of misinformation after the 2020 election, when election skeptics falsely claimed the company's voting equipment produced fraudulent results. Georgia's election results were checked by a recount of all 5 million paper ballots and multiple investigations.
Voting machine penetrated
The vulnerability was first alleged in sealed court documents in July by Alex Halderman, a computer science professor at the University of Michigan. As an expert for plaintiffs in the election security lawsuit, Halderman gained access to Georgia voting equipment for 12 weeks and produced a 25,000-word secret report.
Halderman found that malicious software could be installed on voting touchscreens so that votes are changed in QR codes printed on paper ballots, which are then scanned to record votes, according to court documents. QR codes aren't readable by the human eye, and voters have no way to know whether they match the printed text of their choices.
The vulnerability could be exploited by someone with physical access to a voting touchscreen, such as a voter in a polling place, or by an attacker who used election management system computers, Halderman said. A hacker in a polling place could only target one touchscreen at a time, limiting the number of votes that could be changed, but an attack on election management systems could have a broader impact.
"It is important to recognize the possibility that nefarious actors already have discovered the same problems I detail in my report and are preparing to exploit them in future elections," Halderman wrote in a September declaration. Halderman has said there's no evidence that Dominion voting machines changed votes in the 2020 election.
Raffensperger, the state's top election official, said Halderman is a longtime critic of Georgia's voting technology who was only able to create the hack after a judge gave him access to voting equipment and passwords. He said voting in Georgia is more secure than ever because of audits, voter ID requirements and a ban on collecting and returning multiple absentee ballots.
"Claiming you can break into a system after being given unfettered access is like claiming you can break into a house after being given the keys and alarm codes," Raffensperger said Wednesday.
Though the Georgia secretary of state's office is a defendant in the court case, the judge hasn't allowed anyone to view the details of Halderman's report besides attorneys and expert witnesses. Halderman also produced a version of the report that redacts sensitive information, but the secretary of state's office hasn't seen or asked to see it.
Raffensperger said he doesn't object to the judge making Halderman's report public so election officials could review it for themselves.
"The smoke and mirrors techniques of Professor Halderman and the plaintiffs in this case does not serve Georgia voters well," Raffensperger said.
Gov. Brian Kemp called on Raffensperger to safeguard Georgia's voting machines from potential risks.
"He should immediately gather all relevant information regarding this report, thoroughly vet its findings, and assure Georgians he is doing everything possible to ensure the system, procedures and equipment are completely secure," said Kemp spokeswoman Katie Byrd on Wednesday.
WOW--> A report by the Brennan Center for Justice at New York University Law School flagged the Wallace map as a partisan gerrymander, and FiveThirtyEight’s Nathaniel Rakich labeled the new congressional map as having a “strong pro-Democratic bias.”
— David Reaboi, Late Republic Nonsense (@davereaboi) January 28, 2022
WTF.
Republicans are in court to overturn the heavily biased map, which goes from a 6-6 split to a 10-2 Democrat advantage.
— David Reaboi, Late Republic Nonsense (@davereaboi) January 28, 2022
Obviously this comes ahead of the near-certain Red Wave of 2022, and NJ Democrats are trying to cheat to stop the bleeding.https://t.co/82I4bYCDYn pic.twitter.com/na6C3VKc0U
Ha! will25u also linked the Brennan Center for Justice (that was the org in conjunction with NYU that amalgamated all the election law changes in various states - albeit in an heavily partisan voice).will25u said:WOW--> A report by the Brennan Center for Justice at New York University Law School flagged the Wallace map as a partisan gerrymander, and FiveThirtyEight’s Nathaniel Rakich labeled the new congressional map as having a “strong pro-Democratic bias.”
— David Reaboi, Late Republic Nonsense (@davereaboi) January 28, 2022
WTF.Republicans are in court to overturn the heavily biased map, which goes from a 6-6 split to a 10-2 Democrat advantage.
— David Reaboi, Late Republic Nonsense (@davereaboi) January 28, 2022
Obviously this comes ahead of the near-certain Red Wave of 2022, and NJ Democrats are trying to cheat to stop the bleeding.https://t.co/82I4bYCDYn pic.twitter.com/na6C3VKc0U
It's (D)ifferent this time.TRM said:
That Abrams lawsuit, how did it survive all the ripeness and damages claims unlike the Republican lawsuits?
It's (D)ifferent...TRM said:
That Abrams lawsuit, how did it survive all the ripeness and damages claims unlike the Republican lawsuits?
Quote:
The final section of the Arizona Senate full forensic audit of Maricopa County's 2020 election is finally beginning.
Quote:Quote:
SPECIAL MASTER NAMES COMPUTER EXPERTS TO EXAMINE COUNTY ROUTERS AND SPLUNK LOGSQuote:
Former U.S. Congressman John Shadegg, serving as the Special Master in the settlement agreement relating to the subpoenas issued by the Arizona State Senate to Maricopa County, Arizona, is releasing the names of the computer experts who will examine the County's routers and Splunk logsQuote:
As agreed, by the parties, the examination of the routers and Splunk logs is for the purpose of answering questions posed by the Senate related to the November 3, 2020, General Election during the time between October 7 and November 20, 2020.
The experts who will work with the Special Master to answer the questions are:
Quote:
Jane Ginn
Principal Cyber Cybersecurity Threat Analyst
Cyber Threat Intelligence Network, Inc.
Brad E. Rhodes
Independent Cybersecurity Consultant & Adjunct Professor
Gannon University
Andrew Keck
Chief Technology Officer Owner
Profile Imaging of Columbus, LLC
LinkQuote:
The Arizona Senate has provided their questions to the Special Master.Quote:
Questions from the Arizona State Senate to Special Master John ShadeggQuote:
[ol]Is there any evidence that the routers or managed switches in the election network, or election devices (e.g., tabulators, servers, signature-matching terminals, etc.), have connected to the public internet? How, if at all, were the routers and managed switches in the election network secured against unauthorized or third party access? Is there any evidence of such access? Do the routers or splunk logs contain any evidence of data deletion, data purging, data overwriting, or other destruction of evidence or obstruction of the audit? In preparing and in support of your answer to each of the foregoing questions, please consider and explain whether each of the following supports or undermines your previous answers and, further, provide copies of each of the following:
[ol]output from the show clock detail command. output from the show version command. output from the show running-config command. output from the show startup-config command. output from the show reload command. output from the show ip route command. output from the show ip arp command. output from the show users command. output from the show logging command. output from the show ip interface command. output from the show interfaces command. output from the show tcp brief all command. output from the show ip sockets command. output from the show ip nat translations verbosecommand. output from the show ip cache flow command. output from the show ip cef command. output from the show snmp user command. output from the show snmp group command. output from the show clock detail command. output from the show audit command. output from the show audit filestat command. output from the show access-list command output from the show access-list [access-list-name] for each access listcontained on each router. output from the show access-list appliedcommand. output from the show routing table command output from the show ARP command. listing of all interfaces, the MAC address for each interface and the correspondingIP addresses for each MAC. [/ol][/ol]
bb. output from the show IP Arp command for eachof the IP addresses associated with
the router.
cc. results of the write core command.
dd. listing of all current and archived router configuration files (including the name,
date of creation, date of modification, size of the file andhash valued of each configuration file).
ee. the routing table and all static routes.
ff. a listing of all MAC addresses for all devices (tabulators, poll books, HiPro
Scanners, ICC, Adjudication Workstations, EMS Workstations, and Election
ManagementServer, etc) utilized in the November 2020 general election.
gg. reports from the Router Audit Tool.
hh. Complete listing of the Splunk indexers including the MAC address and IP address
for each indexer.
ii. collective analysis, using Red Seal, of all routers contained in the Maricopa County
network and routing reports to the internet for each interface (including any routes that would allow connections from the 192.168.100.x, 192.168.10.x and 192.168.5.x subnets).
jj. netflow data for the voting network and all other networks leading to the gateway router(s) that have internet access containing the following data elements for each data transmission:
- Date
- Source MAC Address
- Source IP Address
- Source Port
- Destination MAC Address
- Destination IP Address
- Destination Port
- Type of protocol
- Size of the packet.
kk. Splunk data containing the following data elements at a minimum:
- Date
- Source MAC Address
- Source IP Address
- Source Port
- Destination MAC Address
- Destination IP Address
- Destination Port
- Type of protocol
- Size of the packet.
- Any affiliated Splunk alert or notification data
ll. netflow and splunk data related to any unauthorized access by Elliot Kerwin or his affiliates of the Maricopa County registration server and/or network.
mm. all splunk data related to the following windows logs on the EMS Server: EMS Workstations, Adjudication Workstations, ICC systems, HiPro Scanners, and thePoll Worker laptops.
For each of the foregoing questions, please limit your answers to the time period beginning on October 7, 2020 and ending on November 20, 2020.
Because that should have been done last year, but the Maricopa County Board of Supervisors and the corrupt Sec of State Hobbs blocked it with ridiculous lies, such as the routers had sensitive criminal information from the Sheriff's Department (Soros funded Sheriff BTW) and voters personal information...on routers...which are not even storage devices.Funky Winkerbean said:
Why the somber face?
Careful, statements like this tend to draw out the 'greatest tech mind' on TexAgs.aggiehawg said:Because that should have been done last year, but the Maricopa County Board of Supervisors and the corrupt Sec of State Hobbs blocked it with ridiculous lies, such as the routers had sensitive criminal information from the Sheriff's Department (Soros funded Sheriff BTW) and voters personal information...on routers...which are not even storage devices.Funky Winkerbean said:
Why the somber face?
It could be thorough enough. It really depends if they maintained a SysLog database and if they made the data immutable. A router, by itself, is only going to store the current logs that will rotate over time. So, when they pulled the 'anonymous login script' crap for 30k+ failed attempts, any real log information would have been wiped from the router storage. If, however, routers are connected to a SysLog server, those entries are written to a searchable database. Since they have multiple offices in different city locations, I would expect they do. Something to store configurations, changes, etc, otherwise it would be a management nightmare.aggiehawg said:
What do you think about the specificity regarding the routers and the splunk logs? What they will be looking for?
Is it thorough?
Happy to play a small part with you and will carrying the load on this thread. You guys have a gift for finding the hidden.aggiehawg said:
Thanks. You have been my IT guy throughout this debacle and have been of great assistance.
We both have our rat trails. His is on twitter. Mine are blogs and websites.We fixed the keg said:Happy to play a small part with you and will carrying the load on this thread. You guys have a gift for finding the hidden.aggiehawg said:
Thanks. You have been my IT guy throughout this debacle and have been of great assistance.
My pleasure.richardag said:
We fixed the keg
Thanks for the post, very enlightening.