So everyone understands, cellular modems are WORSE than a shared network infrastructure with firewall and gateway. At least you can confirm the security has been breached this way, with a cell modem somebody could utilize a stingray or cell simulator and MiM attack unnoticed.
Wow Michigan purchased dominion systems when they were NOT EAC CERTIFIED. At the time of contract the system was NOT EAC certified.
Ohhhhhh snap!! Hit pay dirt! The dominion tabulators in Michigan have been modified from the base bid to provide wireless access. They have an internal modem and can utilize 3G via an external module.
Oh would you look at that. The TABULATORS are connected wirelessly. In addition to the RTR server also having a wireless connection. The tabulators utilize a listener module (cellular switch/router basically) to communicate to the EMS.
Remember. This is straight from .gov
Because I am so sure that NO Hacker had cracked the .net framework and encryption that they are using, let alone back trace the election results RTR transmissions to know exactly where/what to attack if they monitored results server.
Oh wait… they did exactly this in past.
What. The. Actual. Fuck.
@GovWhitmer you have some explaining to do. This is STRAIGHT FROM YOUR CONTRACT!!!!!!
At no point did they go through “bit by bit” and evaluate the logs and the data. They literally did basic log checks, didn’t even
/1
Bother checking the unallocated space on the drive. They didn’t recover or inspect the unallocated space on the drive, which as we all know, contained remnants of internet connectivity. They literally looked at the basic logs that were still available on the machines.
/2
If ANY data or proof of internet connection was deleted from the logs, of course it’s clearly not going to be there in the written data. OF COURSE you have to check and recover the unallocated space on the drive!!!!
/3
I am SO sick and tired of the lies being spread by the media and the operatives out there. Every state has different laws on when they can begin counting mail in ballots. This “myth” about how all the mail in ballots were counted last, is a complete LIE.
/1
Many states started counting long before Election Day. Some states have laws they cannot begin until Election Day. Then others have rules that they cannot start until polls close, but CAN with discretion of the poll managers/election managers. The massive spikes
/2
Being blamed on all of the mail in ballots being counted last, is a LIE. Mail in ballots had been counted all day long, the mail in ballots defintiely swung to the left, no question. The fact of the matter though is that “swing” towards the left, was 70, maybe 80 percent
I would like to note. That EVERY SINGLE thing I claimed from the beginning regarding the network infrastructure configuration in Arizona was just proven true today, on the record, by an expert witness.
If networks were shared, within the county or state, that single breach /1
Could lead to the access of EVERY SINGLE MACHINE on the private side of the network. Once you get past the gatekeeper, if updates, malware/virus software, password best practices, are not completed and follow guidelines, you can create your own little back door to a machine /2
On the protected side which will just sit there waiting for the right moment that the election machines are turned on. The moment the time is right, you can then access anything, do your business, and then remotely activate the EXACT scripts talked about today to cover your /3
@BrianKempGA@GaSecofState what in the actual hell were you guys thinking. You better get hiring the best criminal defense attorneys you can find. This is disgustingly criminal behavior.
So any guesses why these ballots are in their own pen. With an officer present while Bennett (pretty sure it’s him) points at them, and they sit there talking about them. You will notice the padlock on the corner of the gate as well. Counterfeit?