Anonymous ID: 6cf070 Oct. 21, 2022, 12:31 p.m. No.17700841   🗄️.is 🔗kun   >>0845 >>0855 >>0862 >>0885 >>0897 >>0906

Was hunting for ballot printing companies being used by Pennsylvania and/or Michigan and came across a couple of election fraud memories I thought I would remind anons of.

first, was this twat thread from Patrick Byrne.

 

https://web.archive.org/web/20210104145638/https://twitter.com/PatrickByrne/status/1346108097690009600

 

https://web.archive.org/web/20210110121937/https://twitter.com/PatrickByrne/status/1346108104656777216?s=20

 

Patrick Byrne

‏ @PatrickByrne

 

READ AND RETWEET AS THOUGH THE LIFE OF YOUR NATION DEPENDS ON IT. WHICH IT DOES. Citizens, I am going to add to the picture with more information. I am not going to let this pass while keeping information to myself.I am going to walk you through 2 narratives.

06:55 - 4. Jan. 2021

 

180 Retweets

225 „Gefällt mir“-Angaben

🐳🐋BABYBELUGA🐋🐳

AReebel

Brad Green

🎇 2021 Breb 🎇

IguanaMama

WarriorMom5

Just_Heather

LlamaFierce❤️🦙 🔥

President Elect👨🏿‍🦲Negrito Bembom

 

4 Antworten 180 Retweets 225 Gefällt mir

 

Neue Unterhaltung

Patrick Byrne

‏ @PatrickByrne

45 Sek.vor 45 Sekunden

 

A printing shop in Michigan prints ballots for Delaware County, Pennsylvania and as Lancashire County, Pennsylvania (this is normal). But along with the ballots it prints on contract and delivers to those counties, it prints some ballots that get diverted to Bethpage, New York.

2 Antworten 48 Retweets 75 Gefällt mir

Patrick Byrne

‏ @PatrickByrne

44 Sek.vor 44 Sekunden

 

There, a boiler room of folks fill in "Biden" (often without even voting downballot). The ballots (which are forensically legitimate, given that they come from the same print shop as the good ballots, ) then get trucked into Pennsylvania and mailed. Hundreds of thousands.

1 Antwort 23 Retweets 40 Gefällt mir

Patrick Byrne

‏ @PatrickByrne

44 Sek.vor 44 Sekunden

 

We have all of that documented. Texts, statements, affidavits, everything.

1 Antwort 21 Retweets 30 Gefällt mir

Patrick Byrne

‏ @PatrickByrne

44 Sek.vor 44 Sekunden

 

We also know thatthis same ballot printing company (and other firms in the same family) also print for Michigan, Wisconsin, Arizona, and Georgia.

1 Antwort 16 Retweets 23 Gefällt mir

Patrick Byrne

‏ @PatrickByrne

44 Sek.vor 44 Sekunden

 

Narrative #2:China sent counterfeit ballots to Fulton County, Georgia. During the counting on election night, all but four people were shoved out of the counting operation on the grounds of a dangerous "water main break" (that turned out to be "a toilet overflowed").

1 Antwort 11 Retweets 16 Gefällt mir

Patrick Byrne

‏ @PatrickByrne

43 Sek.vor 43 Sekunden

 

Last Wednesday,December 30,the Georgia Senate Judiciary voted to inspect those Fulton County voting operations. Hours later (as I have previously posted) an Enterprise vans pulled up and got filled up with voting materials.

1 Antwort 9 Retweets 7 Gefällt mir

Patrick Byrne

‏ @PatrickByrne

43 Sek.vor 43 Sekunden

 

A shredding company in neighboring Cobb County, Georgia was on December 31 given roughly 3,000 pounds of ballots to shred. Authorities have come into possession of those materials.

1 Antwort 9 Retweets 10 Gefällt mir

Patrick Byrne

‏ @PatrickByrne

43 Sek.vor 43 Sekunden

 

A handful of papers stuck to the side of the shredding bin. They include some unshredded ballots (which 2 federally certified forensic examiners have affied do not match the legitimate ballots).ALSO, A SHIPPING RECEIPT FROM THE CHINESE FIRM THAT PRINTED THE BALLOTS! IN CHINESE!

1 Antwort 10 Retweets 11 Gefällt mir

Patrick Byrne

‏ @PatrickByrne

43 Sek.vor 43 Sekunden

 

Word is the DOJ and DHS have been told to stand down. That President Trump himself has had to call agents on the ground asking them to continue. If you think they should continue, retweet to let @TheJusticeDept know your feelings.

1 Antwort 7 Retweets 9 Gefällt mir

Anonymous ID: 6cf070 Oct. 21, 2022, 12:45 p.m. No.17700855   🗄️.is 🔗kun   >>0862 >>0885 >>0897 >>0906

>>17700841

>first, was this twat thread from Patrick Byrne.

Then there's Rudy, and Knowink Pollbooks.

 

Came across thisPA Department of State september 2020 evaluation of Knowinkagain

 

A couple of times post election while Rudy was working in PA made some ink references. As the fake news put it,

 

Rudy Giuliani's hair dye (INK) streaked down his face in bizarre press .

 

Then he was interviewed with ink all over his hands.

 

https://www.dos.pa.gov/VotingElections/Documents/Voting%20Systems/Knowink%202.5.1/Knowink%20251%20Final%20Approval%20Report.pdf

Anonymous ID: 6cf070 Oct. 21, 2022, 1:14 p.m. No.17700885   🗄️.is 🔗kun   >>0890 >>0897 >>0906

>>17700855

>>17700855

 

>>17700841

>>17700855

>Came across thisPA Department of State september 2020 evaluation of Knowinkagain

 

 

They cover their ass by saying you can't configure it to connect to muh internet, then they give out the password for peer to peer, which is: password, and claim they were hacked if they get caught.

Oh and thepollbook server is run on Amazon Web Services

totally securist and safeist election eva

Pulling some info from the Knowink Eval:

 

The demonstration and documentation review determined that Poll Pad 2.5.1 consistsof iPads installed with Poll Pad 2.5.1 application configured as Poll Pad kiosks (Poll Pads)to perform voter check-in activity at the polling place, and ePulse 2.5.1 hosted on a cloud server to perform administrative functions. The system can allow the following modes of configuration, but these can also be deactivated where not permitted:

•A live (fully connected) mode where data flows continuously between cloud-based ePulse servers and all Poll Pads in use at a polling place;

•A restricted server communication mode where the system can be configured to transfer only operational/performance data from the Poll Pads to the ePulse cloud server. The data transmitted does not contain any voter check-in data. This configuration if permitted allows monitoring of the polling place devicesremotely;

 

Page 7 of 27

A peer to peer communication mode where the Poll Pads at a polling place communicate to each otherwithout any connection to the ePulse cloud server. This configuration allows voter check-in data to sync up in a polling place, thus allowing the use of multiple Poll Pads at a polling place.The networked environment, if activated, could make the EPB system vulnerable to hacking attempts,possibly compromising the integrity of check-in data and/or allowingunauthorized access to voter data. The Department staff analyzed the connectivity configurations discussed during the demonstration in conjunction with the documentation provided and existing Department test protocols for Electronic Poll Books todetermine the connectivity approved for use in Commonwealth of Pennsylvania, which minimizes the security risks and maximizes the benefits in moving to an EPB solution.

 

c.ObservationsDepartment staff noted the following as part of the demonstration and documentation review. 1)Poll Pad 2.5.1 uses software configuration features to determine the final functional behavior of the system. In addition to the demonstration and subsequent analysis and evaluation performed demonstrating that the system can be configured to satisfy all the statutory requirements, the Department will also require documentation after purchase confirming that the system setup complies with the approved configuration. 2)Poll Pad 2.5.1 includes configurable functionalities added to be system executables to satisfy certain jurisdictional specific requests. 3)The deployed system security posture will depend on the parameters selected during setup. This will necessitate validating the configuration during and after setup to ensure that the system is configured in a secure manner. 4)Poll Pad 2.5.1 when deployed in live (fully connected) and restricted server communication mode can communicate with the cloud server located outside of the polling place and transmit transactional and operational data throughout E lection Day

to the ePulse server. The live (fully connected) and restricted communication mode maintains a communication channel between the polling place and cloud server for the entire time the polls are open on Election Day. These can be disconnected, which is the only approved setting during polling hours in Pennsylvania.

Anonymous ID: 6cf070 Oct. 21, 2022, 1:23 p.m. No.17700890   🗄️.is 🔗kun   >>0897 >>0906

>>17700885

>Oh and thepollbook server is run on Amazon Web Services

 

>totally securist and safeist election eva

So Knowink takes your local paper based poll book and digitizes it into a Clown Cloud based database.

What could go wrong?

 

What Is AWS GovCloud (US)?

PDF

 

AWS GovCloud (US) consist of isolated AWS Regions designed to allow U.S. government agencies and customers move sensitive workloads into the cloud

 

by addressing their specific regulatory and compliance requirements, including Federal Risk and Authorization Management Program (FedRAMP) High, Department of Defense Security Requirements Guide (DoD SRG) Impact Levels 4 and 5, and Criminal Justice Information Services (CJIS). To assist customers in managing their obligations under U.S. export control regimes such as the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR), AWS GovCloud (US) regions are logically and physically administered exclusively by AWS personnel that are U.S. citizens only. In this guide, the term AWS GovCloud (US) Regions refer to both AWS GovCloud (US-West) and AWS GovCloud (US-East) Regions.

 

You can run workloads that contain all categories of Controlled Unclassified Information (CUI) data and government-oriented, publicly available data in AWS GovCloud (US). For a list of compliance frameworks, see AWS GovCloud (US) Security

 

. AWS GovCloud (US) supports the management of regulated data by offering the following features:

 

Restricting physical and logical administrative access to AWS personnel that are U.S. citizens only.

 

Providing FIPS 140-2 endpoints. (For details on each service, see the Service Endpoints section.)

 

Depending on your requirements, you can also run unclassified workloads in the AWS GovCloud (US) regions; and use the unique capabilities of these regions.

Note

 

AWS manages physical and logical access controls for the AWS boundary. However, the overall security of your workloads is a shared responsibility, where you are responsible for controlling user access to content in your AWS GovCloud (US) account.

 

The AWS GovCloud (US) User Guide provides details on setting up your AWS GovCloud (US) account, identifies the differences between AWS GovCloud (US) Regions and other AWS Regions, and defines usage guidelines for processing ITAR-regulated data within the AWS GovCloud (US). This guide assumes that you are familiar with Amazon Web Services (AWS)

 

.

 

Additional resources:

 

For pricing information, see AWS GovCloud (US) Pricing

 

.

 

For information about the differences between AWS GovCloud (US) Regions and other AWS Regions, see AWS GovCloud (US) Compared to Standard AWS Regions.

 

For more information about meeting US Government compliance requirements please, see AWS GovCloud (US)

 

.

 

For a list of AWS or AWS GovCloud (US)–related resources, see Related Resources.

 

The Details About the CIA's Deal With Amazon

 

A $600 million computing cloud built by an outside company is a "radical departure" for the risk-averse intelligence community.

By Frank Konkel

Aerial view of the Pentagon (Reuters)

July 17, 2014

 

The intelligence community is about to get the equivalent of an adrenaline shot to the chest. This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks.

 

For the first time, agencies within the intelligence community will be able to order a variety of on-demand computing and analytic services from the CIA and National Security Agency. What’s more, they’ll only pay for what they use.