Ok here is a serious problem with the #CyberSymposium claim of evidence and hear me out here. The first speaker walked the audience audience why the chain-of-custody is beyond important for voting. #CyberSymposiumX
1/
That if the chain is broken we can have fraud in an election. He's right about that. However chain-of-custody for ANY evidence is beyond important as it helps verify the evidence as legitimate, including evidence of election fraud. #CyberSymposium#CyberSymposiumX
2/
The first speaker also primed the audience that we'd see the evidence live shortly as Ron Watkins (aka CodeMonkey, aka "Q" himself most likely) would spend hours with the us sifting through evidence to show us how the voting machines were hit. #CyberSymposium#CyberSymposiumX
3/
They mentioned that Mr. Watkins had not seen this data prior so this would be a live dissection of the forensic evidence. Great, I've been waiting for this to review it in depth. #CyberSymposium#CyberSymposiumX
4/
After numerous technical difficulties Mr. Watkins is, via video conference, introduced and right out of the gate he states the data he will be working with is "allegedly" two forensic images from a Dominion server. #CyberSymposium#CyberSymposiumX
5/
These images are before and after a software update that "prove" the server was manipulated to change votes. Here's the thing... immediately the broke the cardinal rule: verify the chain of custody! #CyberSymposium#CyberSymposiumX
6/
They pounded it into the audience and then promptly forgot when it came to their evidence. Mr. Watkins repeated the word "allegedly" multiple times and then said he was "told" that the first forensic image was from 2019. #CyberSymposium#CyberSymposiumX
7/
Again, a massive chain of custody violation. I can create forensic images. It's not hard to do. Anyone could have mocked these up to look like anything. They also stated these were found publicly and would be giving out the link so I'll look. #CyberSymposium#CyberSymposiumX
8/
For all we know these images are part of an actual disinformation campaign from a foreign government. Maybe they're legit. Without that understanding, it's 100% suspect and cannot be trusted. #CyberSymposium#CyberSymposiumX
9/
Objectively, it cannot hold up in court. Imagine fabricating evidence of a crime and then the legal system doesn't verify it's authentic. That's what this is! #CyberSymposium#CyberSymposiumX
end/
• • •
Missing some Tweet in this thread? You can try to
force a refresh
The #CyberSymposium is back for the last day. Mike Lindell is saying that he was attacked last night at this hotel and that his team has discovered threats against the conference and the guests. They're claiming this is all to discredit them. #CyberSymposiumX
1/
Also a "credible" threat about a "poison pill" in their "data stream." All of these statements need verification and validation. #CyberSymposium#CyberSymposiumX
2/
They're saying they will be turning over all of this evidence to the US government (interesting since they have consistently said they don't trust said government). #CyberSymposium#CyberSymposiumX
3/
At the #CyberSymposium Ron Watkins' lawyer just told him that a "Coden(sp?) James Hayes" took, with authorization, physical hard drives from the Mesa County Clerk and he made illegal copies of them and they need to stop this "examination." #CyberSymposiumX
1/
So who knows what's going on. What they are looking at are images or allegedly copies of physical hard drives. Does this Hayes person know how to make a forensic imagine? #CyberSymposium#CyberSymposiumX
2/
Can they now prove what they're looking at came from an actual hard drive owned, used and verified by Dominion? Still no confirmed Chain of Custody here! #CyberSymposium#CyberSymposiumX
3/
At the #CyberSymposium someone in a @VMware shirt just got on stage & explained that this alleged image is a web server (IIS) & that when IPv6 is enabled it shows an insecure configuration and that the logs shows something connected to it. #CyberSymposiumX
1/
And yeah, that's an incorrect assessment on IPv6 security. IPv6 security is a lecture I've actually given to IT Directors at conferences! #CyberSymposium#CyberSymposiumX
2/
Also, this logging doesn't show ill intent either because they can't be deciphered here to ID the IPv6 remote address and they haven't tried. #CyberSymposium#CyberSymposiumX
3/
The explanation of a "packet capture" at the #CyberSymposium is somewhat right. But the pivot into requesting the routers isn't neccessarily right. They're making the assumption that routers are actually logging traffic in this nature. 1/
Basic routers don't typically have verbose logging that is stored. Enterprise routers will. We can easily ID by model if a router would have that information. #CyberSymposium 2/
Also, if those requests from voting machines are actually going to the internet odds are their traffic is being encrypted w/ TLS encryption. So unless that router is both enterprise & can decrypt/inspect SSL/TLS traffic, they're useless to Mike Lindell. #CyberSymposium 3/
Still watching/listening to the #CyberSymposium when not in meetings. We have once again shifted away from talking about alleged evidence into politics again. They really need to stick to the evidence if they want a fair assessment by news organizations.
1/
"Why won't they let us into the voting machines to see what is going on?" Good question but there are clear reasons not to share Intellectual Property with the public, ie the theft of it. They were talking about China stealing IP so it can't be both ways. #CyberSymposium
2/
Also, third party independent auditors can get access into these systems by signing contracts and NDAs to protect the IP. The @CISAgov also has a solid breakdown of audit standards: cisa.gov/rumorcontrol #CyberSymposium 3/
As regular speaker at #CyberSymposium events/webinars/conferences, ~50-100 times yearly, I can honestly say I've never heard any of the following at any event:
-Jimmy Kimmel's politics
-Immigration opinions
-Shuttering a pipeline
-The progressive left
-the fake news media
1/
-the politics of COVID19
-secretly Chinese backed private equity firms
-"Patriot" business owners
-Crack addiction
-Defamation is a trick of the left
-George Soros
I'm watching the #CyberSymposium and I just want to hear and see the evidence!
2/
These other topics are undermining their case. Evidence should stand alone. Also the "experts" are not participating in this discussion in an unbiased manner. Independent audits need to be performed by independents. #CyberSymposium
3/