Anonymous ID: fd5c5e Sept. 25, 2021, 12:17 p.m. No.95528   🗄️.is 🔗kun   >>5566 >>5574 >>5692 >>5705 >>5713

1 of

 

On his Telegram, CM posted a link to the IGA Report by We The People AZ Alliance which, dastingly, was uploaded byJordan Conradson.

https://www.scribd.com/document/527239370/IGA-Report-by-We-The-People-AZ-Alliance

 

CMs post is about 3 redacted individuals that are probably going to get targeted by the AZ AG....

''This document describes redacted names and alleged crimes committed.

 

Which lady would have a key card to the server room?

 

Who do you think Subject 1, Subject 2 and Subject 3 are?

 

source:

https://www.scribd.com/document/527239370/IGA-Report-by-We-The-People-AZ-Alliance

108.9Kviewsedited

Sep 25 at 08:07

''

https://t.me/CodeMonkeyZ/1803

 

A post prior to the above was:

''... I wonder who deleted the data ...

 

Would the county recorder know?

Stephen "Chucky" Richer?

 

How about the MCBOS chairman?

Jack "Sellout" Sellers?

 

--

 

I do know that AG BRNOVICH knows.

 

BRNOVICH MUST INDICT

145.8Kviews

Sep 25 at 05:45''

https://t.me/CodeMonkeyZ/1801

Anonymous ID: fd5c5e Sept. 25, 2021, 12:30 p.m. No.95529   🗄️.is 🔗kun   >>5566 >>5692 >>5713

2 of 2

The IGA Report by We The People AZ Alliance highlights other A.R.S violations. If I were to guess, the AZ AG will focus on these four areas at a minimum:

 

1) Duplicate Ballots

2) Deletion of Data

3) Possession of Maricopa County Voter Information

4) Unprotected Voting Systems

 

Duplicate Ballots:

We have interviewed two completely independent witnesses that state the ballots that are duplicated are loaded into a thumb drive and driven to Runbeck for printing.Those printed ballots are then returned to MCTEC for tabulation. Our witnesses both indicated that this was done by one, unaccompanied election worker. We have identified that election worker as __. This is a serious chain of custody issue as electronic ballots are to be treated with the same protocols and security as paper ballots. The observers at the tabulation center were denied the right to observe this process, accompany Ms. _____, or follow her to Runbeck. One witness indicated that she made several trips to Runbeck daily and that she worked very close with the Dominion representatives in the tabulation room. Violation of A.R.S. § 16-625 and AZSOS Policy and Procedure Manual Chapter 8, Section III (C), Observation Transport of Ballots.

 

Deletion of Data

During the Senate audit, there was a question regarding files being deleted or altered. Logs showed this occurs on 4/12/2021. Video review of MTEC server room shows Subject 1 ( ___) using her key card to allow Subject 2 _) and Subject 3 ( _____) to enter the server room and leaving them unattended at the approximate time the log shows files being deleted/altered. (Exhibit 7, Server Room)This is a violation of A.R.S. § 16-625. Electronic data and digital images;ballots; security, A.R.S. §16-624. Disposition of official returns and ballots,52 USC 20701: Retention and preservation of records and USC 42-1974Retention and preservation of records and papers by officers of elections.

 

Possession of Maricopa County Voter Information

 

As a government agency operating on behalf of the people, a minimum standard is a reasonable expectation. Minimum standards for use of USB devices are not being met and are strongly discouraged in both NIST and in CISA recommendations. Unencrypted USB flash drives and cards were used and continue to be used at MCTEC. The user does not need a password to move around USB flash drives or CF cards.

 

Multiple items, including non-encrypted USB sticks, were seized November 5,2020 at the residence of Elliott Kerwin, who was in possession of Maricopa County voter information. This is a violation of A.R.S. § 16-625, AZSOS Manual Pg 96 Chapter 4, Section III (3-7), (https://youtu.be/YLIS68YfMYU?t=2529 )

 

Unprotected Voting Systems

 

Video observation shows that systems are not protected from command line access. Systems were rebooted and commands were given to the system without an administrative password or control being required. This leaves the system vulnerable to administrative tasks and code scripting. (Exhibit16, Command Line) This is a violation of A.R.S. § 16-625