Anonymous ID: 6fb643 Jan. 3, 2021, 6:44 p.m. No.12303039   🗄️.is 🔗kun   >>3121 >>3129 >>3135 >>3240 >>3375 >>3525 >>3582 >>3583

https://twitter.com/DavidShafer/status/1345868002026205184

 

David Shafer

@DavidShafer

President

@realDonaldTrump

has filed two lawsuits - federal and state - against

@GaSecofState

. The telephone conference call

@GaSecofState

secretly recorded was a “confidential settlement discussion” of that litigation, which is still pending.

5:01 PM · Jan 3, 2021·Twitter for iPhone

11.2K

Retweets

1.6K

Quote Tweets

32.2K

Likes

David Shafer

@DavidShafer

·

3h

Replying to

@DavidShafer

The audio published by @TheWashingtonPost is heavily edited and omits the stipulation that all discussions were for the purpose of settling litigation and confidential under federal and state law.

Anonymous ID: 6fb643 Jan. 3, 2021, 6:51 p.m. No.12303135   🗄️.is 🔗kun

>>12303039

>https://twitter.com/DavidShafer/status/1345868002026205184

David Shafer

@DavidShafer

Proud father, happy husband, former state senator and now Chairman of the Georgia Republican Party.

Anonymous ID: 6fb643 Jan. 3, 2021, 7 p.m. No.12303252   🗄️.is 🔗kun   >>3287 >>3359 >>3375 >>3525 >>3583

https://creativedestructionmedia.com/investigations/2021/01/03/gas-sos-raffensperger-gave-hackers-roadmap-to-infiltrate-machines-a-year-before-election/

 

GA’s SoS Raffensperger Gave Hackers Roadmap To Infiltrate Machines A Year Before Election

by George EliasonJanuary 3, 2021

 

GA SoS Brad Raffensperger posted what is essentially a guide to hack Dominion, ES&S, and Smartmatic voting systems during the summer of 2019, one year ahead of the 2020 elections. This made every aspect of the Dominion Voting Systems Democracy Suite open for business to anyone in the business of skewing elections. Raffensperger gave them a year to prepare with the actual components Dominion uses and perfect the methodologies used to hack the GA election.

 

This link is to the redacted GA Master Technical Evaluation. Although redacted, the report left every route needed to hack and control each technical component Dominion uses as well as adding an actual vulnerability to get hackers started.

 

The GA evaluation also lists the scanners needed to find the source code and all possible routes into all three systems. I’ll be getting back to this later but it even identifies Dominion’s source code.

 

Just to make sure I have your attention, below is a list of every piece of Dominion equipment that GA certified. Each piece is listed from the evaluation as a link showing how to hack it. A comprehensive breakdown is in the GA contract. There is no mention of a firewall on the Dominion system at all in the evaluation because it’s not “online,” even though routes to every sandboxed system are available to hackers through WiFi and Bluetooth components inside the sandbox itself.

 

In short, there is no security on the Dominion system at all. Most importantly, you’ll see how the election is being stolen from the inside.

 

The stories about the election tallies being sent overseas to Germany, Rome, the UK, Canada, and other exotic places to be processed are true. Inside Dominion’s contract is a use of temporary foreign worker’s clause for the GA general election. This is Dominion’s contract with the State of Georgia.

 

Dominion hired workers in foreign countries to service the 2020 election. Dominion uses 3 or 4 levels of access keys to operate the Democracy Suite system. Just to be able to work from outside the United States, these foreign nationals working with the ballots need have master tech keys. With the tech keys every part of the system is open and every election file is available and changeable.

 

The following is from ES&S’ contract with Michigan. ES&S is a close mirror company to Dominion. Both companies offer remote access for election servicing work.

 

 

ES&S offered remote access to voting equipment as recently as last year, according to this ten-year contract between ES&S and the state of Michigan — with a start date of March 1, 2017. The contract offers election officials the choice of an on-site technician at $1,575/day or a “remote access” option at “$250 per election set-up.” ES&S Michigan Contract

 

How big is the barn door Raffensperger opened to hackers? — over 20 pieces of equipment which represent what you see at a polling station and what you don’t see. Raffensperger’s list identified every avenue for hackers to explore for every election in 2020. Dominion specializes in selling outdated, no longer supported systems and equipment. The links below show how easy it is to find hacking instructions for everything in the polling station.

 

CONT

https://sos.ga.gov/admin/uploads/MasterTechnicalEvaluation_redacted.xls

Anonymous ID: 6fb643 Jan. 3, 2021, 7:03 p.m. No.12303287   🗄️.is 🔗kun   >>3359 >>3375 >>3525 >>3583

>>12303252

>GA’s SoS Raffensperger Gave Hackers Roadmap To Infiltrate Machines A Year Before Election CONT

 

Dominion, Dominion Mobile Ballot Printing solution – DELL LATITUDE E3480 + OKIDATA C712DN are Bluetooth connected (not counted in GA cert process), Polling Place Scanner, PPS Tabulator, Mac Mini, ISYNC, Bluetooth, sandbox, Dominion ImageCast Precinct scanner, Windows, Linux, Android, SQL Server, SQLite, Virtual environment, private network, KNOWINK – Ruby on Rails, ( EPDMS), iPads are WiFi connected, wireless hotspots, EPDMS LAN

 

As an example, and because the ballot on demand printers are always on, hackers can use the Bluetooth to gain direct access to the “offline” network connected directly to Dominion’s Democracy Suite and always have access to the entire system. KNOWINK’s PollPad provides WiFi and Bluetooth access but is supposed to have some kind of firewall. Below, you’ll see how KNOWINK made that useless.

 

For the full drawdown specifications on Dominion’s equipment, refer to the GA contract linked above and found online.

 

The image below is Dominion’s own diagram for the election system in use. Every one of the 20 hackable+ pieces above correlates to what shown in the diagram.

 

All of Dominion’s minimalist security features for their software and equipment are delivered standard in the off position. In most cases security measures are never turned on. Part of this is Dominion’s insistence that the system is offline. This was found in testing conducted in 2002 as Diebold products and again in 2016 after Dominion took over Diebold products.

 

Dominion is managing all the elections through Amazon Cloud environments backed by Cisco. Ex-employee hacked Cisco’s AWS Infrastructure; erased virtual machines. The main benefit of the cloud was protection against DDOS attacks. This cloud is what KNOWINK is using as their baseline security. It doesn’t work if you are already inside the system.

https://creativedestructionmedia.com/investigations/2021/01/03/gas-sos-raffensperger-gave-hackers-roadmap-to-infiltrate-machines-a-year-before-election/

CONT

Anonymous ID: 6fb643 Jan. 3, 2021, 7:08 p.m. No.12303359   🗄️.is 🔗kun   >>3371 >>3375 >>3525 >>3583

>>12303252

>>12303287

>GA’s SoS Raffensperger Gave Hackers Roadmap To Infiltrate Machines A Year Before Election CONT

 

https://creativedestructionmedia.com/investigations/2021/01/03/gas-sos-raffensperger-gave-hackers-roadmap-to-infiltrate-machines-a-year-before-election/

 

Dominion’s Ballot Marking Device

 

The one piece of equipment not listed above is the Dominion BMD or ballot marking device. After the election equipment is certified for use, no changes can be made to the software or hardware without SoS and EAC approval and maintain the certification for the election.

 

According to a 2020 election lawsuit filed in GA, during September 2020 ahead of the general election GA SoS Raffesperger ordered county election officials to do a complete software wipe of the BMDs and install brand new software that never went through the certification process. As of the October 2nd report, Dominion had not submitted a request for this major change with the U.S. Election Assistance Commission (EAC).

 

According to the Master Technical Evaluation listed above, both Dominion and the GA SoS are very clear on the fact that this breaks the certification for GA and may well get the ballots voters cast tossed as a result. The new software was never even tested to see if it caused other issues with the system.

 

GA SoS Raffensperger ordered counties to make the change knowing it is illegal in GA and puts the onus of liability on the county election managers themselves if they complied. This email, from the lawsuit shows how serious the situation is. SoS Raffensperger also helped draft a loophole in the law to make EAC certification meaningless even though GA law demands compliance with Federal election standards.

 

This is where things get interesting with the Ballot marking Devices (BMDs). The only TRUE record of what vote was cast is in the hand of the voter who can read it. The following shows why using unreadable barcode makes it impossible for a voter to know when fraud is being committed with the Dominion system.

 

According to the GA evaluation linked above, when the BMDs are in operation there are two open and accessible ports on the machines.

 

Other than the obvious point of hackable access, which I’ll get to momentarily, what you may not know is the Diebold machines GA replaced in 2019 were Dominion owned machines. Dominion bought Diebold in 2010 from ES&S including all the software and licensing that ran the systems. The source code for Dominion and ES&S is the same C++ Diebold machines used in Georgia that ran from 2002-2019.

 

The new Dominion machines are running the same hacked C++ source code as the machines they replaced. I first found this in the GA Tech Eval where the GA evaluators listed the two scanners needed to find all the hacking vulnerabilities in the Dominion Democracy Suite system and disclosed the first vulnerability enough to get lazy hackers interested.

 

The first scanner, Nessus, is a top of the line web-property vulnerability scanner. The second one, Style Cop is what interested me after looking it up. Style Cop is used for C++ source code scans. This confirmed Dominion is still using the Diebold source code and why the liscencing it received from ES&S was in perpetude.

 

From the Dominion’s GA contract we see the Democracy Suite system includes the following Third-Party Software. Earlier versions of these unsupported software were part of the Dominion owned Diebold system.

 

EMS Standard Server Prerequisites•Microsoft Visual J#•Microsoft Visual C++ 2013 Redistributable Package•Microsoft Visual C++ 2013 Redistributable Package (64bit) •Microsoft Visual C++ 2015 Redistributable Package (32bit)• Java Runtime Environment•Microsoft SQL Server 2016 Standard -(Microsoft SQL Server Management Tools) •Cepstral Voices •Arial Narrow Fonts

 

EMS Client Workstation Prerequisites•Microsoft Visual J#•Microsoft Visual C++ 2013 Redistributable Package•Microsoft Visual C++ 2015 Redistributable Package 64bit•Java Runtime Environment• Maxim iButton Driver•Adobe Reader•Microsoft Access Database Engine•Open XML SDK 2.0 for Microsoft Office•Arial Narrow Fonts

 

The crossover from Diebold to Dominion isn’t just to give a historic perspective. The corrupted system CD Media outlined going back to the 2002 election in Cracking Dominion’s Source Code- It’s been called a threat to National Security since 2003 was in service under Dominion auspices from 2010 until Dominion replaced it with what amounts to an equipment update and software enhancement.

 

The lawsuit against Dominion linked above was begun in 2020 by the same people that investigated how much manipulation could be done in 2003, 2006, and 2016.

 

 

much moar at link

Anonymous ID: 6fb643 Jan. 3, 2021, 7:09 p.m. No.12303371   🗄️.is 🔗kun   >>3555 >>3625

>>12303359

>Dominion bought Diebold in 2010 from ES&S including all the software and licensing that ran the systems.The source code for Dominion and ES&S is the same C++ Diebold machines used in Georgia that ran from 2002-2019.