Here are my notes from the #AZAudit today. I am only putting out new info and trying not to rehash previous info I have already released. Thank you Senator @AmandaChaseVA for coming. Hopefully, we were able to shine light on some techniques you can use in Virginia. (1/4)
Contributors to the AZ Audit
- Tens of thousands of donors donating $5-$50 apiece
- Help has come from VOICESandVOTES.org
- Help has come from FUNDtheAUDIT.org
- Over 2,000 vetted volunteers have volunteered so far
(2/4)
Timetable
- Almost finished with counting the ballots
- Paper examination has accelerated.
- One day this week, an incredible 90,000 ballots were counted by 21 tables.
- As of 11 June, delegations will have visited from GA, NV, PA, VA, AK, CO, WA, MI (3/4)
Refined takeaways
- Voter roll software nationwide is highly vulnerable.
- Voter rolls should be tied to driver's licenses.
- For example, Medicare knows when someone dies, so voter rolls should be similarly cleaned up (4/4)

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Wendy Rogers

Wendy Rogers Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @WendyRogersAZ

3 Jun
Tour of AZ Audit with visiting PA delegation state senators Doug Mastriano, Col US Army (ret) and Cris Dush, MSgt USAF (ret) along with PA state rep Rob Kauffman (chair of PA House Judiciary Cte).

AZ legislators:
State senators Wendy Rogers R-Flagstaff, (1/13)
Sonny Borrelli R-Havasu
State reps Leo Biasiucci R-Havasu, Joe Chaplik R-Scottsdale, Jacqueline Parker R-Mesa

Cyber Ninjas is precisely what kind of firm to be able to lead this audit?
- They are an application security company, which has allowed a quick understanding on (2/13)
how election system applications work in detail.
- Their modus operandi is to perform Threat Modeling.
- That is: They figure out ways a system can be attacked.
- How to identify a threat and protect against it.
- They find what the artifacts are in order to prove (3/13)
Read 13 tweets
28 May
Here are some of my takeaways from the audit yesterday:
Increase in capacity now:
From 17 to 32 paper inspection tables using microscopic cameras
From 20 to 44 counting tables (yellow, green, blue)
From 4 to 12 aggregation tables
The pace is picking up daily
More audit forensics are done each day
Theoretically, mail-in ballots should all be of the same type, composition, and fiber with little to no variance. So if variances ARE seen, there should be an explanation, if there is no explanation, then that is a gap.
Read 21 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(