It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Finally! Forensic Election Audit in Maricopa County (AZ) Begins Next Week

page: 232
114
<< 229  230  231    233  234  235 >>

log in

join
share:

posted on Aug, 3 2021 @ 12:54 PM
link   

originally posted by: nemonimity
a reply to: Nunyabizisit

I did miss that one. And yeah from my early days in IT, the trouble I could have caused with a wireless device and bios level access to users computers lol



Good times.



posted on Aug, 3 2021 @ 01:03 PM
link   

originally posted by: nemonimity
a reply to: Nunyabizisit

I did miss that one. And yeah from my early days in IT, the trouble I could have caused with a wireless device and bios level access to users computers lol



I was just reviewing the last few pages and noticed another ETA you may have missed regarding obfuscation:



Those pools always use fake MACs from a series that will never be assigned to a manufacturer.

Monkey did indicate recent communication with Pillow Man, so Monkey probably already knows what the PCAPS look like, and if MAC is obfuscated.

We don't though.



posted on Aug, 3 2021 @ 01:10 PM
link   
Here's an itemized listing of the County's objections to complying with the subpoenas, written by the County Attorney, Adel Allister:

The Maricopa County attorney, Allister Adel, wrote a more fulsome response on behalf of the county. The response can be summarized as follows:

They do not acknowledge a breach of the voter registration server but, rather, state that “an individual programmatically accessed the County Recorder’s website.

One week’s notice is not sufficient time to produce information consistent with that breach, and their workers were too busy complying with the retrieval of ballots and tabulators on short notice from the auditors.

Requested ballot images were already provided on April 22 on pallet 46, and “if Cyber Ninjas have misplaced them, please direct them to the 5-terabyte Lacie hard drive that includes the subfolder named AFFIDAVITS.”

The Recorder is “prepared to deliver to the Senate the nearly two million ballot envelopes,” but the proper security must be put in place.

They continue to say the passwords requested are the “sole custody and control of Dominion Voting Systems, and the County has no right to ‘access’ them.”

They cannot supply voter records with change history. The Recorder has those and will work to secure the records.

They hold firm on their position on routers—they will not comply because of sensitive information on them. They also continue to deny connections to the internet of the Tabulators.

The Maricopa County Election Management System is not connected to the internet.

No Splunk logs will be provided.

They rejected the subpoenas because the state legislature is out of session.

Arizona Senate Subpoenas Met With Non-Compliance
edit on 3-8-2021 by Boadicea because: spelling



posted on Aug, 3 2021 @ 01:16 PM
link   
a reply to: Boadicea


"an individual programmatically accessed the County Recorder’s website"


A distinction without a difference.

Aren't they clever.



posted on Aug, 3 2021 @ 01:19 PM
link   
It's up on YouTube. Any bets on how long will it last? LOL!



posted on Aug, 3 2021 @ 01:21 PM
link   

originally posted by: Nunyabizisit
a reply to: Boadicea


"an individual programmatically accessed the County Recorder’s website"

A distinction without a difference.

Aren't they clever.


Indeed -- They obviously think so!

Something very curious, this County Attorney just so happened to go to the emergency room with a head injury on election night. It may be nothing. It may be something. I don't know. But it doesn't sit right with me.



posted on Aug, 3 2021 @ 01:23 PM
link   

originally posted by: shooterbrody
a reply to: Nunyabizisit
Well connected.




Thank you.

Sometimes I stumble on things.

Really hope this is one of them.





posted on Aug, 3 2021 @ 01:25 PM
link   
a reply to: Boadicea


Just noticed this:

"No Splunk logs will be provided"



Confirming that they exist?



posted on Aug, 3 2021 @ 01:26 PM
link   
It's up at Gateway Pundit now --

** CodeMonkeyZ BOMBSHELL ** Dominion Whistleblower Speaks Out – Releases Admin Password Proving Remote Access –VIDEO

There are several screenshots of the significant computer screens at the link.
---------------------------------------------

I did a Google search to see who is reporting, and this message was at the top:

It looks like these results are changing quickly

If this topic is new, it can sometimes take time for results to be added by reliable sources

I've never seen this message before. But I don't doubt it!



posted on Aug, 3 2021 @ 01:28 PM
link   

originally posted by: Nunyabizisit
a reply to: Boadicea

Just noticed this:

"No Splunk logs will be provided"

Confirming that they exist?


Almost confirming it by NOT confirming it. I expect they would have said, "We have no Splunk logs to turn over" if that were the case.



posted on Aug, 3 2021 @ 01:50 PM
link   
Time to "circle back" for a summary, if anyone can answer:

Why did Dominion executives say their election hardware does NOT connect to the World Wide Web (Internet)?

What can be done if Dominion hardware can connect to the internet?

How is CodeMonkeyZ's "whistleblower" proving that the Dominion hardware in Arizona (and other states?) arrives Internet-ready?

Is he proving that Internet communications did occur between Dominion equipment and "someone" beyond range of the in-house modem/router?

WHERE DO WE NOW STAND?




posted on Aug, 3 2021 @ 01:51 PM
link   
a reply to: Boadicea

I posted below message in a few places.

No worthwhile responses yet.



If Maricopa isn't obfuscating external MAC, and Monkey has bios password, and Pillow Man has PCAPS (even if encrypted), then Ninjas now have everything they need to determine if there was external access on election night.

No router logs necessary!

Can anyone confirm or debunk?



posted on Aug, 3 2021 @ 02:15 PM
link   

originally posted by: carewemust
Time to "circle back" for a summary, if anyone can answer:

[snip]

How is CodeMonkeyZ's "whistleblower" proving that the Dominion hardware in Arizona (and other states?) arrives Internet-ready?


If I'm understanding correctly, this is shown starting at about the 1:00 mark when a screenshot is shown the option for a connection, grayed out so disabled, but then confirms Dominion could enter a password and enable the connection.


Is he proving that Internet communications did occur between Dominion equipment and "someone" beyond range of the in-house modem/router?


Not that I can see. Just that the machine has the capability. In this specific example, it is "grayed out" and therefore disabled, but Dominion has the capability to enable it.


WHERE DO WE NOW STAND?


Good question. If I'm interpreting Karen Fann's tweet appropriately, she seems to feel that they've given the County enough rope to hang themselves, and they did. So I would assume she has something planned. And since her tweet came after CMZ's release -- rather than after the formal responses from the County and Dominion -- it would seem that something is being coordinated.

Perhaps this is a little more pressure to get the BoS to hand over the routers? Is it perhaps a little extra pressure on any weak links to see the light? Come over to the sunshine side? Are they dripfeeding to inform the public, and prepare the public, before going scorched earth?

I don't know. I'm watching the usual spaces for anything new in between getting other things done!




posted on Aug, 3 2021 @ 02:15 PM
link   
a reply to: Nunyabizisit

I think the Packet captures would be the smoking gun if they can be read. even the logs may not contain the information needed depending on their verbosity. With PCAPs you could tell exactly what was in and where the packets were traveling to or from.
edit on 3-8-2021 by nemonimity because: the != they



posted on Aug, 3 2021 @ 02:16 PM
link   

originally posted by: Nunyabizisit
a reply to: Boadicea

If Maricopa isn't obfuscating external MAC, and Monkey has bios password, and Pillow Man has PCAPS (even if encrypted), then Ninjas now have everything they need to determine if there was external access on election night.

No router logs necessary!

Can anyone confirm or debunk?


I wish I knew. That would definitely be good to know!



posted on Aug, 3 2021 @ 02:27 PM
link   

originally posted by: nemonimity
a reply to: Nunyabizisit

I think the Packet captures would be the smoking gun if the can be read. even the logs may not contain the information needed depending on their verbosity. With PCAPs you could tell exactly what was in and where the packets were traveling to or from.



Agreed.

I had little interest in pcaps before today because I assumed that they were encrypted, that nobody would decrypt for them (nsa), and that ninjas didn't know MACs.

Now if someone could determine if Maricopa is obfuscating this might change everuthing.

Haven't figured out that part yet.


Hmm....

I wonder if whistleblower provided EAS settings/key?

Then could read external PCAPS even if encrypted.



Boom.

Just noticed.

TLS-EAS key is on the workstation setup sheet with settings blacked out.

Monkey has Dominion's TLS key!


Would mean that Pillow Man's PCAPS can now be read, even if encrypted.


Can anyone confirm or debunk?



posted on Aug, 3 2021 @ 02:30 PM
link   
a reply to: Nunyabizisit

Yeah, if they've got the key they'd have the castle.



posted on Aug, 3 2021 @ 02:32 PM
link   

originally posted by: nemonimity
a reply to: Nunyabizisit

Yeah, if they've got the key they'd have the castle.



Hopefully Monkey will confirm posession of key.


edit on 3-8-2021 by Nunyabizisit because: (no reason given)



posted on Aug, 3 2021 @ 02:41 PM
link   

originally posted by: Boadicea

originally posted by: Nunyabizisit
a reply to: Boadicea

If Maricopa isn't obfuscating external MAC, and Monkey has bios password, and Pillow Man has PCAPS (even if encrypted), then Ninjas now have everything they need to determine if there was external access on election night.

No router logs necessary!

Can anyone confirm or debunk?


I wish I knew. That would definitely be good to know!


Ok so the long answer to all of this is multi-part.

You cant "obfuscate" a MAC address, you can spoof it, but not render it unintelligible. A network packet cant be processes without a valid MAC address, even if it's being spoofed to appear to be another MAC.

BIOS password? unless they plan on changing the configuration of a machine of ANYTHING with a basic input/output system, the BIOS password doesnt help to indicate anything about remote communication potential other than possibly being used to detail the exact devices installed.

Packet captures MAY or may not indicate external access. Packets can just as easily be captured from a machine sending packets to "air" as they can to a valid outside source. Think of a mobile phone as a great example. Your mobile phone is sending a heartbeat signal (or packet) to a tower even if there are no towers in range to hear it, though in context of this discussion IF there are packet captures it does at least show there's something TRYING to communicate...the important part here would be to ascertain from exactly what device the packets are being captured from.



posted on Aug, 3 2021 @ 02:44 PM
link   
a reply to: alphabetaone


Was a long time ago, but spoofing was the word I was looking for.


I think Monkey has dominion's TLS key.

Trying to confirm.

Would that change your opinion on pcaps?



new topics

top topics



 
114
<< 229  230  231    233  234  235 >>

log in

join