Why the police didn’t search the RV in 2019

To better answer the questions that come to mind after this comment I give you the following. From Police Say They Tried to Contact Nashville Bombing Suspect Anthony Warner After 2019 Warning:

Nashville police said Wednesday that they repeatedly tried to reach Anthony Warner, the deceased suspect in the city’s Christmas Day bombing, soon after being told in 2019 that he was making bombs inside an RV at his home.

Joel Siskovic, a spokesman for the FBI in Memphis, said Wednesday there was no allegation of a crime made at the time to the bureau or police.

“If we were going to take action like a search warrant, we would have had to have probable cause,” Mr. Siskovic said. “We weren’t even at the stage where a crime had been alleged.”

The person who told the police he was making the bombs was his girlfriend who told them this did so after the police were called to the home because she was making suicidal threats.That visit didn’t provide a solid enough basis to get a warrant:

The woman, who officers determined was in need of a psychological evaluation, identified herself as Mr. Warner’s girlfriend and warned police that her boyfriend “was building bombs in the RV trailer at his residence.”

Assuming all this is true, I have to give law enforcement a pass for not stopping the bomber much earlier.

Nashville bomber news

This is one of the best reports I have read so far:

Authorities are exploring evidence that Nashville, Tennessee, bombing suspect Anthony Quinn Warner was interested in various conspiracy theories

Some writings found by investigators believed to be associated with Warner, who was killed in the Christmas Day RV explosion, contain ramblings about assorted conspiracy theories, sources said.

Multiple law enforcement sources also told ABC News earlier this week that investigators looked at whether Warner had paranoia about 5G cellular technology.

Investigators are continuing to analyze chemical residue from the scene and are working to narrow down the chemicals that were likely used to make the explosive device.

They are also looking into how the suspect allegedly acquired the bomb-making materials to ensure there were no accomplices.

Sources told ABC News that receipts and credit card account information indicates Warner allegedly purchased items that could be used to construct a bomb, though they cautioned that certain common chemicals have uses that could have nothing to do with bomb-making.

The 5G cellar theory as a motive seems to be the best match for the publicly available evidence.

Quote of the day—Pam Belluck

A small number of Covid patients who had never experienced mental health problems are developing severe psychotic symptoms weeks after contracting the coronavirus.

Pam Belluck
December 28, 2020
Small Number of Covid Patients Develop Severe Psychotic Symptoms
[That’s scary stuff.

I know three people who have recovered from COVID. One was daughter Xenia.—Joe]

Quote of the day—David Codrea

Why citizens wanting to know what the rules are even had to ask – and why that was being evaded – only becomes clear when you come to grips with the obvious: ATF knows it doesn’t have a consistent set of standards by which to apply its evaluations. And it’s not like everyone hasn’t been aware of the problem for a long time.

David Codrea
December 23, 2020
ATF Rules Capricious, Arbitrary, Political, and Stupid
[I have nothing to add.—Joe]

Quote of the day—Brad Smith

As much as we appreciate the commitment and professionalism of so many dedicated public servants, it is apparent to us that the current state of information-sharing across the government is far from where it needs to be. It too often seems that federal agencies currently fail to act in a coordinated way or in accordance with a clearly defined national cybersecurity strategy. While parts of the federal government have been quick to seek input, information sharing with first responders in a position to act has been limited. During a cyber incident of national significance, we need to do more to prioritize the information-sharing and collaboration needed for swift and effective action. In many respects, we risk as a nation losing sight of some of the most important lessons identified by the 9/11 Commission.

One indicator of the current situation is reflected in the federal government’s insistence on restricting through its contracts our ability to let even one part of the federal government know what other part has been attacked. Instead of encouraging a “need to share,” this turns information sharing into a breach of contract. It literally has turned the 9/11 Commission’s recommendations upside down.

Brad Smith
December 17, 2020
A moment of reckoning: the need for a strong and global cybersecurity response
[Free markets have their faults. But if you want something really messed up then have a government do it. Why else do you think they are so good at war? You send your government to some other country and they mess up that country.—Joe]

Quote of the day—Doug Casey

The government has no alternative but to “do something.” They will—they have to—print more money to keep the rotten house of cards from collapsing on itself.

The Democrats have already said that they want to increase the next stimulus to over $3 trillion. The fact that most of the last round of stimulus was either overtly wasted, went to cronies, or can’t be accounted for, is completely lost on them. They recognize that unless they give a lot of money directly or indirectly to the hoi polloi, there are going to be millions of them on the streets.

Approximately 11 million renters and 4 or 5 million mortgagees are now in forbearance. They’ll be kicked out of their houses and apartments come January 1, barring a huge bailout. Where are those people going to go?

If Obama had made good on his ridiculous promise about shovel-ready projects, there’d be a lot more bridges that they could camp out under. But he didn’t. They have a real problem on their hands. Millions of people have been living above their means and have no savings. At this point, if they let landlords and banks kick all those people out, a number of things will happen. Residential property prices will collapse. Millions of people will be scrambling for somewhere to live. Lots of banks and landlords would go bust.

The longer the government kicks the can down the road, the bigger the inevitable bust will be. The stimulus money will have to continue because Biden doesn’t want it all to come unglued on his watch. The State is not only going to have to pay individuals and business owners that their idiotic policies have busted. They’ll be subsidizing banks, landlords, and utility companies—because you can’t live in a house or an apartment without water and electricity.

It’s worse than that because even if you cover the bare essentials, there’s no money leftover for maintenance. There will be millions of buildings across the country suffering from deferred maintenance. The South Bronx, East St. Louis, and Baltimore will be replicated across the country.

Doug Casey
December 2020
Doug Casey on What Happens When the Suspension on Evictions Ends
[You might also want to watch Fight for the Soul of Seattle and The Worst Economic Collapse Is Starting Now. And this is real:

If someone trespasses by pitching a tent on private property or walks out with a handful groceries from the corner market or steals power tools with the intent of reselling them online in order to pay for a basic need like food or rent, the city of Seattle may be OK with that.

The cities are driving productive people out and inviting the lazy and criminals in. The tax revenue is way down and is responding by raising taxes.

I can’t imagine it improving with their mindset. They are in a death spiral that is likely to pull the entire country, if not the world, into it.

Another data point is that, as a construction guy I know was telling me recently, “No one wants to work anymore. They just want to stay home and collect their checks.”

Free money isn’t free. There will be a price paid. And the one, probably, good thing that may come out of the Biden/Harris administration is that the coming collapse will be easier to place on the heads of the Marxist rather than the free market advocates.

We live in interesting times.—Joe]

Moral cowardice

Via daughter Jaime:

The following is my transcript in case the original goes away:

It was written by someone is a current staffer for one of the Supreme Court Justices…

I’ll just describe the report to you the report which I just read and you can make of it what you will.

He said that the Justices they always do [sic] went into a closed room to discuss, you know, cases they are taking or to debate. There’s no phones, no computers, no nothing, no one else is in the room except for the nine Justices.

It’s typically very civil. They usually don’t hear any sound. They just debate what they are doing.

But when the Texas case was brought up, he said he heard screaming through the walls as Justice Roberts and the other liberal justices were insisting that this case not be taken up.

And the reason, the words that were heard through the wall when Justice Thomas and Alito were citing Bush versus Gore, from John Roberts were, “I don’t give a [blank] about that case. I don’t want to hear about it. At that time we didn’t have riots!”

So what he was saying, was that he was afraid of what would happen if they did the right thing. And I’m sorry, but That. Is. Moral. Cowardice.

And we, in the SREC, I’m a SRC member, we put those words in very specifically because the charge of the Supreme Court is to openly be our final arbitrator, our final line of defense, for right and wrong. And they did not do their duty.

So I think we should leave these words in because I want to send a strong message them.

See also 1:32:31 (Its Texas Congressman Matt Patrick Texas Cong. Dist. 32) for more context.

This is, literally, hearsay evidence. But if true, SCOTUS is sending a very clear message of how to get your way if the law and evidence isn’t on your side. The message will be heard loud and clear and the lesson learned will have dire long term consequences.

Update: This is probably false, at least in part. They have been meeting via video conferencing for months.

H/T to https://twitter.com/AdamPiersen/status/1339804928479473665

It’s possible something like this happened on a video call, but we have no evidence of that.

Election questions

From a comment thread:

In many cases if proper procedures are not followed it would be impossible to show fraud occurred even if it were massive. Should the plaintiffs have to prove fraud occurred when the defendants eliminated the possibility of such proof? Do you really want that to be the law of the land?

Election fraud stories

I as I said in my previous post I work with computer security. I know how tough that is to do right and how easy it is to believe things are security when it’s actually, for all practical purposes, a wide open system.

I only had one story from the election security world and I didn’t think that was sufficient to make my point. Just a few minutes ago I found another story which may help to prove the point that my concerns about election security also being a very difficult problem. The information was from a somewhat private forum so I’m removing the attribution:

I recently had an old guy from Northeast Philly tell me they used to grow beards for Election Day. Because you could get 3 or 4 votes out of a good beard by shaving a little off before revoting.

My personal story comes from an acquaintance of mine who used to live in Indiana. They were a volunteer who helped count ballots. Ballots, by law, would be discarded if there were extraneous marks on it. The ballot counters would put a small piece of pencil lead under their thumbnail. When a ballot came through that was a “straight ticket” of the opposing party, which became relatively ease to identify with a little practice, they would give the ballot a swipe with their leaded thumbnail and then show it to the opposition ballot counter who would agree the ballot should be discarded.

It is this sort of thing that makes me believe all the testimony from numerous election officials and elected politicians claiming the elections were fair and honest are meaningless. Even if they watched the process with their own eyes a skilled fraudster could get away with massive fraud and the observer would be clueless.

Good security is very, very difficult.

A security story

My job is computer security. My job, among other things, is to think like a bad guy and then prevent security breaches and/or catch them soon after they have begun executing their “kill chain”. Most people, even many very smart people, do not have the capacity to think like a bad guy. I have a real life story to illustrate.

Just because this is computer security don’t think this isn’t relevant to current events of a vital importance to the entire nation. I’ll tie all together before the end.

Please do not assume this happened at the company I work for. I have contacts with many other people in the security industry. We often share stories. Sometimes this story sharing is to warn others of how clever the bad guys are and how they succeeded or almost succeeded. Other times stories are shared about how mind bogglingly stupid and numerous some of the mistakes were in the implementation of a computer network system.

This story is about how stupid and numerous the mistakes were.

The type of business and other potentially identifying aspects of the story have been changed to protect the guilty. But the critical aspects of the story are true.

The company penetration testers were asked to test a tool used by customer facing employees. This tool allowed employees to assist the customers with their business with the company. It gave the employees access to personal information about the customer. The personal information access was required for the employee to do their job. The tool had been “released to production” months before the penetration testers (and apparently or other security professionals) took a look at things.

A simplified view of the tool architecture looked something like this:image

Database Servers A & B are the only servers applicable to the Customer Assist Tool. The other Database Servers are for other web applications unrelated to the Customer Assist Tool.

Everything from the Load Balancer up were Internet facing. It wasn’t originally designed that way. Originally everything seen in this diagram was inside the corporate network. But because of COVID they had “reasons” and they changed the design so employees working from home could easily access the Customer Assist Tool.

The Internet facing Customer Assist Tool required a company network username and password. The Load Balancer did not. The Load Balancer accepted connections from anyone on the Internet. The Database Servers did not require any security tokens or login. Anything coming from the Load Balancer was considered valid.

The penetration testers didn’t bother trying to do a brute force attack on the login to the Customer Assist tool. They connected directly to the Internet facing Load Balancer and sent queries to the Database Servers. If they knew just a tiny bit of unique public information about the customers, say an email address, phone number, street address, or Social Security Number, they could then get access to extremely personal information from the database.

The penetration testers sounded the ALL HANDS ON DECK alarm. The incident response people (IR) showed up.

The software developers (SDs) of the system were brought into the virtual room and told this is a really big problem. Except for biologically required breaks you’re not leaving the room until this is fixed.

SDs: “We don’t see why this is such a big deal. Someone would have to know the URL for the load balancer. And the only people that might know it are the users of the tool. And we don’t think very many, if any of them are smart enough to figure it out.”

IRs: <blink><blink> “The penetration testers figured it out. And the bad guys out there do this sort of stuff all the time. It’s how they make their money. I’m not going to waste our time explaining this to you. Fix the problem. NOW!”

The IRs then asked how far the logs go back, “You do have logs, right?” The software developers assured the IRs they had logs. The logs went back 90 days. There probably were a few days of missing traffic between when the system was released to production and the oldest log files but most of it was there.

IRs: “Okay, good. We can find out if there was actually any customer information lost.”
SDs: “Oh. You want logs for that? We just log activity at the Customer Assist Tool Web Application. The penetration testers, and any bad guy activity, won’t be in those logs.”
IRs: “Okay…. are there ANY log on the database servers?”

The SDs go looking and find there are generic web logs available that go back to the beginning of the release to production. The IRs looked at the logs for a few seconds and realized the IP addresses of all the requests are of the Load Balancer. There is no indication of the origin of the request. Requests from the Customer Assist Tool are indistinguishable from a request from anywhere else on the Internet.

What about load balancer logs? Maybe. But they don’t go back very far. And if they do exist, all the data is intermixed with the other web applications and other Database Servers.

Within a few hours the SDs have a fix.

IRs: “Tell me about your fix.”

SDs: “The login credentials of the employee used to login to the Customer Assist Tool are passed to the Database Server which validates the credentials before responding.”

IRs: “Okay, we should improve upon that, but maybe that will be good enough that we don’t have to shut down the application until a permanent fix is in place. But that’s a question for our VPs to discuss. Oh, by the way, how many employees do you have authorized to use this tool?”

SDs: “Uhhh… all company employees can use this tool.”

IRs: <blink><blink> “Everyone in the company? Really?” <IRs go to the tool and verify they have access>

SDs: “Yes. If someone improperly used the tool to gain access to customer information when they weren’t supposed to they could be caught and could lose their job. Therefore the customer information is safe from misuse.

IRs: <some facepalm><others bang their heads against the wall> “This is a large company. There are thousands of employees. Anyone on the Internet can find valid company credentials in five minutes or less. We disable hundreds of accounts per week as we find credentials on the web ourselves.”

SDs: <blink><blink>

The story goes on but the important part is that the SDs, not stupid people, made a ton of errors. These errors started with not getting a security professional in the room when they changed the design. The errors compounded dramatically from there.

They had a world view much different than the bad guys and the security professionals.Things which could not even be imagined by the SDs were child’s play to the penetration testers and the IRs.

Now to tie this to current events. Our recent election.

Several courts reviewing the lawsuits claiming foul play have concluded the election was fair and honest.or, at least, there was insufficient evidence of widespread fraud to change the results.

As seen in the story above there are failures modes which not only allow unauthorized access/fraud but make it impossible to determine if such access/fraud occurred. Furthermore, unless someone is experienced in thinking like a bad guy they can honestly believe everything is “fair and honest” and be completely, totally, catastrophically, wrong.

I trust the courts to know their profession. I don’t trust them with security issues. I trust them to accurately asses the integrity of our election far less than the SDs could accurately asses the security of their system. The system they designed and built.

The legal professionals of the court did not design or build the election system. They did not evaluate the security after the (supposedly) COVID inspired changes were made from the viewpoint of a security professional. The original election security features had evolved over hundreds of years and thousands of people poking at it, finding faults, and attempting to prevent future fraud and errors. In the span of a few months a few people made changes which did not go through nearly as rigorous review as the pre COVID system.

I don’t know with a 100% guarantee that sufficient fraud occurred to change the election results. I do know, with 100% certainty, that many people were highly motivated to commit fraud. I do know, with 100% certainly, that some fraud occurred. I’m nearly certain the system in use has issues which make it impossible to detect fraud after the fact.

The bottom line to this is that anyone who says the election was fair and honest because the courts say it was is either lying or placing their trust in a body of people that don’t know anywhere enough about security to make that call.

Quote of the day—John F. Kennedy

Those who make peaceful revolution impossible will make violent revolution inevitable.

John F. Kennedy
March 13, 1962
Address on the first Anniversary of the Alliance for Progress
[I grew up with this being part of my understanding of what made the U.S. different from so many other governments of the world throughout history. I never imagined this might be a prophecy for our future.

We now have a situation where essentially half of the population believes a fraudulent election gave the presidency to a candidate who openly, and proudly, states they plan to deny every citizen their basic, inalienable, human rights.

See also the other times when I referenced this same quote.

Today there are other Kennedy quotes which are also applicable:

We live in interesting times.—Joe]

Quote of the day—Petr Svab

An elections supervisor in Coffee County, Georgia, demonstrated in recent videos posted online how Dominion Voting Systems voting software allows votes to be changed through an “adjudication” process. The process allows the operator to add vote marks to a scanned ballot as well as invalidate vote marks already on the ballot.

Adjudication should only serve to resolve issues of voters marking ballots incorrectly, such as filling the bubbles in a way that doesn’t clearly show who he or she voted for. Yet it appears a substantial number of ballots went through that process, at least in some Georgia counties. As the Coffee County supervisor, Misty Martin, showed, the system can be set to allow adjudication of all scanned ballots, even blank ones, and effectively allow the operator to vote those ballots.

Petr Svab
December 10, 2020
How Dominion Software Allows Changing, Adding Votes
[Interesting.

The article makes it sounds like tampering with the vote is fairly easy and perhaps undetectable.

After thinking about this problem for all of 30 seconds… If I were writing the software for this feature it would print out a copy of the original ballot with the adjudicated vote indicated, a GUID (Globally Unique Identifier) and a hash of votes and the GUID. The GUID and hash would be stored in the database with the other vote results. This would make an audit relatively easy and resistant to tampering.

Perhaps they did that or even something far better. But the article doesn’t indicate that. Concerns such as this need to be investigated.—Joe]

Quote of the day—Samuel Alito

The application for injunctive relief presented to Justice Alito and by him referred to the Court is denied.

Samuel Alito
Supreme Court Justice
December 8, 2020
Supreme Court Denies to Block Pennsylvania From Certifying Election Results
[For some reason I find it amusing this is the entire order from the court on this case.—Joe]

Quote of the day—Mitchell Harrison

Upon arrival in the processing room located on Level S of State Farm Arena, we were supposed to watch the processing of the Absentee Ballots from the observation area which was delineated by a fenced area of roping secured by posts. This observation area we were put in was very distant from the staff actually processing the ballots. The room where the ballot processing took place is a very large room, and this distance effectively prevented our actual observation of the process. In addition other areas of this – again very large – room were not visible at all from our observation area.

For example, the machine that copied the UOCAVA electronically received ballots (sometimes called military ballots) onto a paper copy of the same could only be viewed from the side and the doors to that area were positioned in a way that prevented us from viewing of this process. Additionally, the scanners that scanned the absentee ballots were not visible to us at all.

Sometime after 10 o’clock p.m., the counting activity slowed. Shortly afterward, a younger lady with long braided but blog hair yelled out to all of them they should stop working and come back tomorrow (the next day, November 4th) at 8:30 A.M.. Thereafter all but 4 election employees left State Farm, leaving just the blond haired lady (who Michelle and I assumed was the supervisor), to older ladies and Regina Waller at the location. This lady had appeared through the night and Michelle and I believed her to be the supervisor.

Another task we had been given by Brandon was to inquire how many ballots had been processed and how many were still left to go. We posed these questions to Regina Waller, the Public Affairs Manager for Elections. She seem uncomfortable at times answering us, and she called someone which we interpreted as asking for help on how to respond to us. Ultimately she refused to answer our questions and told us we had to “look it up on the website”. In all, we asked Regina Waller for this information at least three separate times and she would not give us an answer.

Mitchell Harrison
November 2020
Attachment 28 Exhibit Affidavit of Mitchell Harrison
[This is directly related to this post.

I post this in response to those who say:

Nobody told them to stay. Nobody told them to leave. Nobody gave them any advice on what they should do. And It was still open for them or the public to come back in to view at whatever time they wanted to, as long as they were still working.

I would like to point out that to the best of my knowledge none of the responses from the poll workers are under oath or submitted such that they can be punished for perjury if they lied. If the affidavits in the court documents are knowingly in error then the providers of those documents are subject to criminal prosecution.

While it may be true the observers were not specifically told to leave the observation area there was no meaningful observation possible. The behavior toward of the poll workers was very suspicious (read Michelle Branton’s affidavit as well).

If they want to reassure the public the ballot counting was honest they should:

  • Provide the video showing appropriate chain of custody of the ballot boxes from opening to when they were scanned and stored for recount.
  • Do signature verification of all ballots with functional observation
  • Recount the ballots with functional observation.

All case documents are here.—Joe]

Quote of the day—Donald J Trump

Video footage from #Georgia shows that poll workers were told to stop counting and leave, while 4 people stayed behind to continue counting ballots in private.

Donald J Trump
December 3, 2020
Comment on YouTube
[Via daughter Jaime.

Watch both videos. They’re short.

I find it “interesting” these people weren’t concerned with the video surveillance cameras. Have they done this so many times and gotten away with it that they just didn’t have any concern about this time being different?

It certainly looks to me like a bunch of people need to be prosecuted.

We live in interesting times.—Joe]

Quote of the day—Predator

It is very rare indeed that one gets to witness a completely naked individual walk up to a large hornet’s nest and begin striking it with a stick after handcuffing himself to the tree the nest is in.

I’m reminded of that line from the movie, “I’m not locked in here with you, you’re locked in here with me.”

Predator
December 1, 2020
[I’m not so sure it’s as clear cut as that. But, still, we certainly do live in interesting times.—Joe]

Quote of the day—Republican state lawmakers in Pennsylvania

RESOLVED, That the House of Representatives:

(1) Recognize allegations of substantial irregularities and improprieties associated with mail-in balloting, precanvassing and canvassing during the November 3, 2020, election.

(2) Disapprove of the infringement on the General Assembly’s authority pursuant to the Constitution of the United States to regulate elections.

(3) Disapprove of and disagree with the Secretary of the Commonwealth’s premature certification of the results of the November 3, 2020, election regarding presidential electors.

(4) Declare that the selection of presidential electors and other Statewide electoral contest results in this Commonwealth is in dispute. 2020D13219 – 4 – 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 (5) Urge the Secretary of the Commonwealth and the Governor to withdraw or vacate the certification of presidential electors and to delay certification of results in other Statewide electoral contests voted on at the 2020 general election.

(6) Urge the United States Congress to declare the selection of presidential electors in this Commonwealth to be in dispute.

Republican state lawmakers in Pennsylvania
November 30, 2020
THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE RESOLUTION No. 1094 Session of 2020 (also available here)
Introduced by DIAMOND, NELSON, SCHEMEL, ROTHMAN, RYAN, KEEFER, JONES, ROWE, PUSKARIC, GLEIM, COOK, DUSH, BOROWICZ, ZIMMERMAN, METCALFE, MALONEY, MOUL, ROAE, RAPP, COX, KAUFFMAN, DAVANZO, DOWLING, IRVIN, BERNSTINE, LEWIS, GREINER, WARNER, OWLETT, TOBASH, MACKENZIE, METZGAR, SANKEY, KNOWLES, WHEELAND, JOZWIAK, B. MILLER, RIGBY AND HICKERNELL
[Read the whole thing, less than five pages, and attempt to convince me that there should not be a bunch of people, including members of the Pennsylvania Supreme Court, going to prison over the crap they pulled.

I was talking to a friend yesterday. And a friend of his lives in Pennsylvania and saw a lot of unethical, if not illegal, stuff. Among other things, there were people wheeling people that were total “vegetables” in on wheelchairs to vote. Their “helper” would get them through the voter ID stuff and then vote for them. They were also also places where people could vote and votes were being counted but were called something other than a “polling place”. And because they where a “polling place” there were no observers required.

I urged that this person report the activities to law enforcement. My friend said he would forward the suggestion to his friend.

We live in interesting times.—Joe]

Withholding information

From The Epoch Times:

At a public hearing in Arizona with select members of the state legislature and members of President Donald Trump’s legal team, lawmakers called for their colleagues to support an upcoming resolution that would delay the release of the state’s Electoral College votes.

Arizona state Rep. Mark Finchem told reporters during the Nov. 30 hearing that they hope to have a resolution “within the next 24 to 48 hours.” The state holds 11 Electoral College votes.

“We are clawing our Electoral College votes back, we will not release them,” Finchem said. “That’s what I’m calling on our colleagues in both the House and Senate to do—exercise our plenary authority under the U.S. Constitution.

From National File:

After the state’s hearing into election integrity was only halfway through, Arizona State Rep. Mark Finchem, a Republican, issued a call for his colleagues to withhold the state’s Electoral College votes, as he believes there is enough significant evidence of fraud to invalidate the state’s votes.

From USSA News:

After the state’s hearing into election integrity was only halfway through, Arizona State Rep. Mark Finchem, a Republican, issued a call for his colleagues to withhold the state’s Electoral College votes, as he believes there is enough significant evidence of fraud to invalidate the state’s votes.

“We are clawing our electoral college votes back, we will not release them. That’s what I’m calling our colleagues in both the House and the Senate to do,” added Finchem. “Exercise our plenary authority under the U.S. Constitution.”

From Before Before It’s News:

Arizona State Rep. Mark Finchem ““We are clawing our electoral college votes back, we will not release them”, Gosar: “Biden’s thugs will not steal this election.”

From (We) Are The News:

Arizona Rep. Mark Finchem seeks to prevent the state from assigning its Electoral College votes to Joe Biden

After the state’s hearing into election integrity was only halfway through, Arizona State Rep. Mark Finchem, a Republican, issued a call for his colleagues to withhold the state’s Electoral College votes, as he believes there is enough significant evidence of fraud to invalidate the state’s votes.

“We are clawing our electoral college votes back, we will not release them. That’s what I’m calling our colleagues in both the House and the Senate to do,” added Finchem. “Exercise our plenary authority under the U.S. Constitution.”

Those reports on the hearing, and many, many, more, were found using a Bing search for the set of words (no quotations):

We are clawing our Electoral College votes back

No reference to the hearing was found in any major media outlet.

The same search with Google yielded one article in the Citizens Journal and one Twitter post.

The same search with Google News yielded nothing.

That news sources and major corporations withhold the activities of state legislatures from the people proves we live in a very different world from the one I believed we lived in when I took classes in U.S. history and U.S. government when I was in High School.

I’m reminded of the often reported story from when the concentration and death camps were liberated after WWII. The residents of the nearby cities were (perhaps figuratively)dragged through the camps to see the horrors. These nearby residents claimed they did not know what was happening in the camps. The Nazis had controlled the flow of information and given, at least semi-, plausible reasons for the orders and trains full of people brought to the camp.

And so it is with the parties of evil today that withhold information from the people to hide their activities.

We live in interesting times.

Respond appropriately.

Quote of the day—Patrick Basham

Despite poor recent performances, media and academic polls have an impressive 80 percent record predicting the winner during the modern era. But, when the polls err, non-polling metrics do not; the latter have a 100 percent record. Every non-polling metric forecast Trump’s reelection. For Trump to lose this election, the mainstream polls needed to be correct, which they were not. Furthermore, for Trump to lose, not only did one or more of these metrics have to be wrong for the first time ever, but every single one had to be wrong, and at the very same time…

Patrick Basham
November 27, 2020
Reasons why the 2020 presidential election is deeply puzzling
[Via Scott Adams and daughter Jaime.

We live in interesting times.—Joe]

Quote of the day—Navid Keshavarz-Nia, Ph.D., Ed.D.

I conclude with high confidence that the election 2020 data were altered in all battleground states resulting in a hundreds of thousands of votes that were cast for President Trump to be transferred to Vice President Biden. These alterations were the result of systemic and widespread exploitable vulnerabilities in DVS, Scytl/SOE Software and Smartmatic systems that enabled operators to achieve the desired results. In my view, the evidence is overwhelming and incontrovertible.

Navid Keshavarz-Nia, Ph.D., Ed.D.
November 25, 2020
DECLERATION OF DR. NAVID KESHAVARZ-NIA
[I wish the lawyer writing this up knew how to use a spell checker.

Via daughter Jaime.

See also HUGE! Sidney Powell Witness Whom NY Times Described as “Always the Smartest Person in the Room” Concludes Hundreds of Thousands of Votes Transferred from Trump to Biden IN ALL BATTLEGROUND STATES.

Some of Keshavarz-Nia credentials:

I have a Bachelor’s degree in Electrical and Computer Engineering and a Master’s degree in Electronics and Computer Engineering from George Mason University, a Ph.D. degree in Management of Engineering and Technology from CalSouthern University and a Doctoral (Ed.D) degree in Education from George Washington University. I have advanced training from the Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), National Security Agency (NSA), DHS office of Intelligence & Analysis (I&A) and Massachusetts Institute of Technology (MIT).

I am employed by a large defense contractor as a chief cyber security engineer and a subject-matter expert in cyber security. During my career, I have conducted security assessment, data analysis and security counterintelligence, and forensics investigations on hundreds of systems. My experience spans 35 years performing technical assessment, mathematical modeling, cyber-attack pattern analysis, and security counterintelligence linked to FIS operators, including China, Iran, North Korea, and Russia. I have worked as a consultant and subject-matter expert supporting the Department of Defense, FBI and US Intelligence Community (USIC) agencies such as the DIA, CIA, NSA, NGA, and the DHS I&A supporting counterintelligence, including supporting law enforcement investigations.

Also:

11. Despite DVS’s constant denial about the flaws of its systems, the company’s ImageCast Precinct optical scanner system was totally hacked in August 2019. This occurred during the largest and most notable hacker convention, called DEFCON Voting Machine Hacking Village in Nevada. The DVS ImageCast Precinct is an integrated hybrid voting equipment by combining an optical paper ballot and ballot marking device to allow accessibility for the visually impaired. The system runs the Busybox Linux 1.7.4 operating system, which has known medium to high level exploitable vulnerabilities to allow remote attackers to compromise the VDS. (J. Moss, H. Hurtsi, M. Blaze et al., Voting Village Report, DEFCON Village Report in association with and Georgetown University Law Studies; Online Source: https://media.defcon.org/DEF%20CON%2027/voting-village-report-defcon27.pdf). The report indicated that “many of the specific vulnerabilities reported over a decade earlier (in the California and Ohio studies, for example) are still present in these systems today (A. Padilla, Consolidated report by California Secretary of State, Top-to-Bottom Review summary and detailed report, Page 4 (Online Source: https://www.sos.ca.gov/elections/ovsta/frequently-requested-information/top-bottom-review)

The operating system software is Busybox Linux 1.7.4. This was released in 2008. Yes, the O/S of the voting software in states of the most interest to the entire nation has not been updated in over 12 years. In the computer security world this is regarded as something close to highly radioactive and the hardware using this software should be immediately removed from network connections then decommissioned or updated.

In my job I report, on a weekly basis, computers which I have found that have reached end of life and are no longer supported when they are just one day past the date of last support. Something 12 years past support with a connection to the Internet would have my VP talking to someone else’s VP in a very stern tone of voice.

I know of some cases where the offending computer has been immediately disconnected from the network with no effort to contact the owners. The attitude being something along the lines of, “If they are this ignorant, stupid, and/or careless, they don’t deserve to be notified. Let them figure it out on there own—if they can.”

In this case the company has known for “over a decade” the system was insecure. My inclination is that this was no accident or carelessness. There is a high probability this was deliberate. People should go to prison for this.

It looks as if the Kraken has been released.—Joe]