*****OFFICIAL ELECTION DAY THREAD*****

2,694,442 Views | 20889 Replies | Last: 2 yr ago by Whistle Pig
peacedude
How long do you want to ignore this user?
AG
Awww, yeah. He's still hitting 'em straight, too:

Retired FBI Agent
How long do you want to ignore this user?
Wow. He conceded the 46th spot.
https://tips.fbi.gov/
1-800-225-5324
will25u
How long do you want to ignore this user?
aggieforester05
How long do you want to ignore this user?
AG
will25u said:


Democrat voters may be morons, but the Democrat party and their propagandists are damn good at two things: Lying and creating propaganda. Their ability to twist facts into narratives politically beneficial to themselves is simply amazing. Imagine if they put all that energy into doing something positive for the American people. Of course their voters rarely hear alternative viewpoints, so that makes it a little easier.
ProgN
How long do you want to ignore this user?
will25u said:


I hope Zuck burns in hell!
Faustus
How long do you want to ignore this user?
ProgN said:

will25u said:

. . .
I hope Zuck burns in hell!
Well he was raised Jewish and his wife is Buddhist, so as far as I understand the Christian view on these things that should do the trick unless he converted.

https://www.businessinsider.com/mark-zuckerberg-more-religious-fatherhood-facebook-issues-2020-1
neil88
How long do you want to ignore this user?
AG
He could theoretically be part of the Remnant that is allowed in after the rapture. But hopefully he'll be banned.
ProgN
How long do you want to ignore this user?
Faustus said:

ProgN said:

will25u said:

. . .
I hope Zuck burns in hell!
Well he was raised Jewish and his wife is Buddhist, so as far as I understand the Christian view on these things that should do the trick unless he converted.

https://www.businessinsider.com/mark-zuckerberg-more-religious-fatherhood-facebook-issues-2020-1
He's a progressive and their ideology is rooted in the 7 deadly sins so I'd bet he burns whether he converts or not.
Faustus
How long do you want to ignore this user?
Yeah I figured it wouldn't be as satisfying if he was going to burn for being Jewish rather than the political angle.

Maybe it will be a double burning.
Funky Winkerbean
How long do you want to ignore this user?
AG
Retired FBI Agent said:

Wow. He conceded the 46th spot.
Twitter doesn't show the wink.
fasthorse05
How long do you want to ignore this user?
Prog buddy, maybe he'll do just that when he moves to Austin when it gets to 105 degrees in August
Hate is how progressives sustain themselves. Without hate, introspection begins to slip into the progressive's consciousness, threatening the progressive with the truth: that their ideas and opinions are illogical, hypocritical, dangerous, and asinine.
This is backed by data.
will25u
How long do you want to ignore this user?
Tailgate88
How long do you want to ignore this user?
AG
We need that in all 50 states.
aggieforester05
How long do you want to ignore this user?
AG
Zuckerberg bought the election...never forget
will25u
How long do you want to ignore this user?
Gator92
How long do you want to ignore this user?
AG
TLDR: Report stems from a lawsuit filed against Georgia by Stacy Abrams wanting to eliminate electronic voting.

Secret report finds flaw in Georgia voting system, but state in the dark

Quote:

By Mark Niesse, The Atlanta Journal-Constitution
Updated Jan 26, 2022
Hacking is possible, experts say, but there's no sign 2020 election was rigged

Update: A judge is considering releasing a redacted version of the report based on requests in court Thursday from Secretary of State Brad Raffensperger and plaintiffs in an election security lawsuit.

A confidential report alleges that hackers could flip votes if they gained access to Georgia's touchscreens, drawing interest from the U.S. Department of Homeland Security, Louisiana election officials and Fox News.

One key agency hasn't asked the court to disclose the report: the Georgia secretary of state's office.
There's no sign that state election officials have done anything about the vulnerability, a potential flaw dangerous enough to be kept under seal, labeled in court as "attorneys' eyes only" six months ago.

The vulnerability hasn't been exploited in an election so far, according to examinations of the state's Dominion Voting Systems equipment, but election security experts say it's a risk for upcoming elections this year. Investigations have repeatedly debunked allegations of fraud in the 2020 election.

Georgia election officials won't say what actions they've taken, if any, to improve security or detect tampering. State election officials declined to answer questions about a report they haven't seen, which outlined the flaw as part of a lawsuit aimed at forcing the state to abandon its $138 million voting system that prints out paper ballots and instead use paper ballots filled out by hand.

Several election integrity advocates said Georgia Secretary of State Brad Raffensperger shouldn't ignore the issue, even if he believes existing protections would prevent illicit access to voting equipment.
"It's really concerning that the Georgia secretary of state and Dominion are kind of putting their head in the sand," said Susan Greenhalgh, an election security consultant for plaintiffs suing over Georgia's voting system. "Common sense would say you would want to be able to evaluate the claims and then take appropriate action, and they're not doing any of that."

Dominion became a frequent target of misinformation after the 2020 election, when election skeptics falsely claimed the company's voting equipment produced fraudulent results. Georgia's election results were checked by a recount of all 5 million paper ballots and multiple investigations.

Voting machine penetrated
The vulnerability was first alleged in sealed court documents in July by Alex Halderman, a computer science professor at the University of Michigan. As an expert for plaintiffs in the election security lawsuit, Halderman gained access to Georgia voting equipment for 12 weeks and produced a 25,000-word secret report.

Halderman found that malicious software could be installed on voting touchscreens so that votes are changed in QR codes printed on paper ballots, which are then scanned to record votes, according to court documents. QR codes aren't readable by the human eye, and voters have no way to know whether they match the printed text of their choices.

The vulnerability could be exploited by someone with physical access to a voting touchscreen, such as a voter in a polling place, or by an attacker who used election management system computers, Halderman said. A hacker in a polling place could only target one touchscreen at a time, limiting the number of votes that could be changed, but an attack on election management systems could have a broader impact.

"It is important to recognize the possibility that nefarious actors already have discovered the same problems I detail in my report and are preparing to exploit them in future elections," Halderman wrote in a September declaration. Halderman has said there's no evidence that Dominion voting machines changed votes in the 2020 election.

Raffensperger, the state's top election official, said Halderman is a longtime critic of Georgia's voting technology who was only able to create the hack after a judge gave him access to voting equipment and passwords. He said voting in Georgia is more secure than ever because of audits, voter ID requirements and a ban on collecting and returning multiple absentee ballots.

"Claiming you can break into a system after being given unfettered access is like claiming you can break into a house after being given the keys and alarm codes," Raffensperger said Wednesday.

Though the Georgia secretary of state's office is a defendant in the court case, the judge hasn't allowed anyone to view the details of Halderman's report besides attorneys and expert witnesses. Halderman also produced a version of the report that redacts sensitive information, but the secretary of state's office hasn't seen or asked to see it.

Raffensperger said he doesn't object to the judge making Halderman's report public so election officials could review it for themselves.

"The smoke and mirrors techniques of Professor Halderman and the plaintiffs in this case does not serve Georgia voters well," Raffensperger said.

Gov. Brian Kemp called on Raffensperger to safeguard Georgia's voting machines from potential risks.
"He should immediately gather all relevant information regarding this report, thoroughly vet its findings, and assure Georgians he is doing everything possible to ensure the system, procedures and equipment are completely secure," said Kemp spokeswoman Katie Byrd on Wednesday.
Article goes on...

https://www.ajc.com/politics/secret-report-on-georgia-voting-system-finds-flaws-but-state-shows-no-interest/YKFEET2WE5BBPJ7TYVOYMBTIKQ/
will25u
How long do you want to ignore this user?

Keegan99
How long do you want to ignore this user?
AG
You mean that whoever writes an algorithm might not be some pure-of-heart objective mind? I'm shocked!
Faustus
How long do you want to ignore this user?
will25u said:



Ha! will25u also linked the Brennan Center for Justice (that was the org in conjunction with NYU that amalgamated all the election law changes in various states - albeit in an heavily partisan voice).

Good for them for calling out egregious gerrymandering on their own team.
TRM
How long do you want to ignore this user?
AG
That Abrams lawsuit, how did it survive all the ripeness and damages claims unlike the Republican lawsuits?
fasthorse05
How long do you want to ignore this user?
Every time I hear, or see, Raffensberger, I think of bill Clinton writing a book on fidelity, or the pelosi's writing investment books!
Hate is how progressives sustain themselves. Without hate, introspection begins to slip into the progressive's consciousness, threatening the progressive with the truth: that their ideas and opinions are illogical, hypocritical, dangerous, and asinine.
This is backed by data.
Rapier108
How long do you want to ignore this user?
TRM said:

That Abrams lawsuit, how did it survive all the ripeness and damages claims unlike the Republican lawsuits?
It's (D)ifferent this time.
Gator92
How long do you want to ignore this user?
AG
TRM said:

That Abrams lawsuit, how did it survive all the ripeness and damages claims unlike the Republican lawsuits?
It's (D)ifferent...

ETA: Rapier rapiered!
aggiehawg
How long do you want to ignore this user?
AG
Back to Arizona.

Quote:

The final section of the Arizona Senate full forensic audit of Maricopa County's 2020 election is finally beginning.
Quote:

Quote:

SPECIAL MASTER NAMES COMPUTER EXPERTS TO EXAMINE COUNTY ROUTERS AND SPLUNK LOGS
Quote:

Former U.S. Congressman John Shadegg, serving as the Special Master in the settlement agreement relating to the subpoenas issued by the Arizona State Senate to Maricopa County, Arizona, is releasing the names of the computer experts who will examine the County's routers and Splunk logs
Quote:

As agreed, by the parties, the examination of the routers and Splunk logs is for the purpose of answering questions posed by the Senate related to the November 3, 2020, General Election during the time between October 7 and November 20, 2020.
The experts who will work with the Special Master to answer the questions are:

Quote:

Jane Ginn
Principal Cyber Cybersecurity Threat Analyst
Cyber Threat Intelligence Network, Inc.

Brad E. Rhodes
Independent Cybersecurity Consultant & Adjunct Professor
Gannon University

Andrew Keck
Chief Technology Officer Owner
Profile Imaging of Columbus, LLC

Quote:

The Arizona Senate has provided their questions to the Special Master.
Quote:

Questions from the Arizona State Senate to Special Master John Shadegg
Quote:

[ol]
  • Is there any evidence that the routers or managed switches in the election network, or election devices (e.g., tabulators, servers, signature-matching terminals, etc.), have connected to the public internet?
  • How, if at all, were the routers and managed switches in the election network secured against unauthorized or third party access? Is there any evidence of such access?
  • Do the routers or splunk logs contain any evidence of data deletion, data purging, data overwriting, or other destruction of evidence or obstruction of the audit?
  • In preparing and in support of your answer to each of the foregoing questions, please consider and explain whether each of the following supports or undermines your previous answers and, further, provide copies of each of the following:
    [ol]
  • output from the show clock detail command.
  • output from the show version command.
  • output from the show running-config command.
  • output from the show startup-config command.
  • output from the show reload command.
  • output from the show ip route command.
  • output from the show ip arp command.
  • output from the show users command.
  • output from the show logging command.
  • output from the show ip interface command.
  • output from the show interfaces command.
  • output from the show tcp brief all command.
  • output from the show ip sockets command.
  • output from the show ip nat translations verbosecommand.
  • output from the show ip cache flow command.
  • output from the show ip cef command.
  • output from the show snmp user command.
  • output from the show snmp group command.
  • output from the show clock detail command.
  • output from the show audit command.
  • output from the show audit filestat command.
  • output from the show access-list command
  • output from the show access-list [access-list-name] for each access listcontained on each router.
  • output from the show access-list appliedcommand.
  • output from the show routing table command
  • output from the show ARP command.
  • listing of all interfaces, the MAC address for each interface and the correspondingIP addresses for each MAC.
  • [/ol][/ol]
    bb. output from the show IP Arp command for eachof the IP addresses associated with
    the router.
    cc. results of the write core command.
    dd. listing of all current and archived router configuration files (including the name,
    date of creation, date of modification, size of the file andhash valued of each configuration file).
    ee. the routing table and all static routes.
    ff. a listing of all MAC addresses for all devices (tabulators, poll books, HiPro
    Scanners, ICC, Adjudication Workstations, EMS Workstations, and Election
    ManagementServer, etc) utilized in the November 2020 general election.
    gg. reports from the Router Audit Tool.
    hh. Complete listing of the Splunk indexers including the MAC address and IP address
    for each indexer.
    ii. collective analysis, using Red Seal, of all routers contained in the Maricopa County
    network and routing reports to the internet for each interface (including any routes that would allow connections from the 192.168.100.x, 192.168.10.x and 192.168.5.x subnets).
    jj. netflow data for the voting network and all other networks leading to the gateway router(s) that have internet access containing the following data elements for each data transmission:

    • Date
    • Source MAC Address
    • Source IP Address
    • Source Port
    • Destination MAC Address
    • Destination IP Address
    • Destination Port
    • Type of protocol
    • Size of the packet.

    kk. Splunk data containing the following data elements at a minimum:

    • Date
    • Source MAC Address
    • Source IP Address
    • Source Port
    • Destination MAC Address
    • Destination IP Address
    • Destination Port
    • Type of protocol
    • Size of the packet.
    • Any affiliated Splunk alert or notification data

    ll. netflow and splunk data related to any unauthorized access by Elliot Kerwin or his affiliates of the Maricopa County registration server and/or network.
    mm. all splunk data related to the following windows logs on the EMS Server: EMS Workstations, Adjudication Workstations, ICC systems, HiPro Scanners, and thePoll Worker laptops.
    For each of the foregoing questions, please limit your answers to the time period beginning on October 7, 2020 and ending on November 20, 2020.


    Link
    Funky Winkerbean
    How long do you want to ignore this user?
    AG
    Why the somber face?
    aggiehawg
    How long do you want to ignore this user?
    AG
    Funky Winkerbean said:

    Why the somber face?
    Because that should have been done last year, but the Maricopa County Board of Supervisors and the corrupt Sec of State Hobbs blocked it with ridiculous lies, such as the routers had sensitive criminal information from the Sheriff's Department (Soros funded Sheriff BTW) and voters personal information...on routers...which are not even storage devices.
    We fixed the keg
    How long do you want to ignore this user?
    AG
    aggiehawg said:

    Funky Winkerbean said:

    Why the somber face?
    Because that should have been done last year, but the Maricopa County Board of Supervisors and the corrupt Sec of State Hobbs blocked it with ridiculous lies, such as the routers had sensitive criminal information from the Sheriff's Department (Soros funded Sheriff BTW) and voters personal information...on routers...which are not even storage devices.
    Careful, statements like this tend to draw out the 'greatest tech mind' on TexAgs.
    aggiehawg
    How long do you want to ignore this user?
    AG
    What do you think about the specificity regarding the routers and the splunk logs? What they will be looking for?

    Is it thorough?
    richardag
    How long do you want to ignore this user?
    Gator92
    If these allegations are true, and I believe they are, someone with the un-redacted copy should release a copy. I would think that would force all states using this crap ware to buy new more secure equipment.

    This BS has got to stop.
    Among the latter, under pretence of governing they have divided their nations into two classes, wolves and sheep.”
    Thomas Jefferson, Letter to Edward Carrington, January 16, 1787
    We fixed the keg
    How long do you want to ignore this user?
    AG
    aggiehawg said:

    What do you think about the specificity regarding the routers and the splunk logs? What they will be looking for?

    Is it thorough?
    It could be thorough enough. It really depends if they maintained a SysLog database and if they made the data immutable. A router, by itself, is only going to store the current logs that will rotate over time. So, when they pulled the 'anonymous login script' crap for 30k+ failed attempts, any real log information would have been wiped from the router storage. If, however, routers are connected to a SysLog server, those entries are written to a searchable database. Since they have multiple offices in different city locations, I would expect they do. Something to store configurations, changes, etc, otherwise it would be a management nightmare.

    The problem is, it has been long enough for a bad actor to delete the parts they want to keep hidden. With that said, too many smart people, are not smart enough to remove everything. I would be looking for those anomalies. Things like:

    • Dates being different on different devices. Example: Router A logs go back to 2019, but Router B logs only go back to 2020.
    • Compare xlate tables and look for differences. Example: If traffic passes from Router A through Router B, the xlate table for that time should show the MAC to IP mapping for both routers. If it is missing from one, it "could" point to data being deleted
    • Check simple things like comparing the startup config to the running config on each device. Some of the smartest people forget to save changes to the startup configuration when they try to cover their tracks. Example: When a router boots up, it boots the last save "startup configuration", if you make a change while the router is running it changes the "running configuration" If you don't save those changes to the startup config and reboot the router, it boots of the last saved configuration.
    • Look at the ACL's on all devices. Access control lists are traffic rules, what is allowed vs what is blocked. They should be constructed in an 'implicit deny all' meaning unless I put an entry in this list allowing something, it is blocked by default.

    The point being, someone could have deleted stuff thinking they got it all, but logs, translations, routes, etc get missed. If they maintained a SysLog database, chances are much better of finding something, even if they tried to hide it after the fact
    aggiehawg
    How long do you want to ignore this user?
    AG
    Thanks. You have been my IT guy throughout this debacle and have been of great assistance.
    We fixed the keg
    How long do you want to ignore this user?
    AG
    aggiehawg said:

    Thanks. You have been my IT guy throughout this debacle and have been of great assistance.
    Happy to play a small part with you and will carrying the load on this thread. You guys have a gift for finding the hidden.
    aggiehawg
    How long do you want to ignore this user?
    AG
    We fixed the keg said:

    aggiehawg said:

    Thanks. You have been my IT guy throughout this debacle and have been of great assistance.
    Happy to play a small part with you and will carrying the load on this thread. You guys have a gift for finding the hidden.
    We both have our rat trails. His is on twitter. Mine are blogs and websites.
    richardag
    How long do you want to ignore this user?
    We fixed the keg
    Thanks for the post, very enlightening.
    Among the latter, under pretence of governing they have divided their nations into two classes, wolves and sheep.”
    Thomas Jefferson, Letter to Edward Carrington, January 16, 1787
    We fixed the keg
    How long do you want to ignore this user?
    AG
    richardag said:

    We fixed the keg
    Thanks for the post, very enlightening.
    My pleasure.

    There are so many angles here, but I would damn sure start with building a massive searchable database from all the log and config files. From there you can start validating your scenarios. I want to know a list of devices that were not County owned assets that were on the network.

    If only they had a true management system like a Solarwinds setup you could see who did what and when, but my guess is they don't or didn't take the time to configure what they have. Hell, these people shared passwords and didn't do the most basic best practices. The silver lining here is people that lazy and/or that stupid would also not be smart enough to cover their tracks completely. Should be interesting.
    First Page Last Page
    Page 549 of 597
     
    ×
    subscribe Verify your student status
    See Subscription Benefits
    Trial only available to users who have never subscribed or participated in a previous trial.