Election fraud stories

I as I said in my previous post I work with computer security. I know how tough that is to do right and how easy it is to believe things are security when it’s actually, for all practical purposes, a wide open system.

I only had one story from the election security world and I didn’t think that was sufficient to make my point. Just a few minutes ago I found another story which may help to prove the point that my concerns about election security also being a very difficult problem. The information was from a somewhat private forum so I’m removing the attribution:

I recently had an old guy from Northeast Philly tell me they used to grow beards for Election Day. Because you could get 3 or 4 votes out of a good beard by shaving a little off before revoting.

My personal story comes from an acquaintance of mine who used to live in Indiana. They were a volunteer who helped count ballots. Ballots, by law, would be discarded if there were extraneous marks on it. The ballot counters would put a small piece of pencil lead under their thumbnail. When a ballot came through that was a “straight ticket” of the opposing party, which became relatively ease to identify with a little practice, they would give the ballot a swipe with their leaded thumbnail and then show it to the opposition ballot counter who would agree the ballot should be discarded.

It is this sort of thing that makes me believe all the testimony from numerous election officials and elected politicians claiming the elections were fair and honest are meaningless. Even if they watched the process with their own eyes a skilled fraudster could get away with massive fraud and the observer would be clueless.

Good security is very, very difficult.

A security story

My job is computer security. My job, among other things, is to think like a bad guy and then prevent security breaches and/or catch them soon after they have begun executing their “kill chain”. Most people, even many very smart people, do not have the capacity to think like a bad guy. I have a real life story to illustrate.

Just because this is computer security don’t think this isn’t relevant to current events of a vital importance to the entire nation. I’ll tie all together before the end.

Please do not assume this happened at the company I work for. I have contacts with many other people in the security industry. We often share stories. Sometimes this story sharing is to warn others of how clever the bad guys are and how they succeeded or almost succeeded. Other times stories are shared about how mind bogglingly stupid and numerous some of the mistakes were in the implementation of a computer network system.

This story is about how stupid and numerous the mistakes were.

The type of business and other potentially identifying aspects of the story have been changed to protect the guilty. But the critical aspects of the story are true.

The company penetration testers were asked to test a tool used by customer facing employees. This tool allowed employees to assist the customers with their business with the company. It gave the employees access to personal information about the customer. The personal information access was required for the employee to do their job. The tool had been “released to production” months before the penetration testers (and apparently or other security professionals) took a look at things.

A simplified view of the tool architecture looked something like this:image

Database Servers A & B are the only servers applicable to the Customer Assist Tool. The other Database Servers are for other web applications unrelated to the Customer Assist Tool.

Everything from the Load Balancer up were Internet facing. It wasn’t originally designed that way. Originally everything seen in this diagram was inside the corporate network. But because of COVID they had “reasons” and they changed the design so employees working from home could easily access the Customer Assist Tool.

The Internet facing Customer Assist Tool required a company network username and password. The Load Balancer did not. The Load Balancer accepted connections from anyone on the Internet. The Database Servers did not require any security tokens or login. Anything coming from the Load Balancer was considered valid.

The penetration testers didn’t bother trying to do a brute force attack on the login to the Customer Assist tool. They connected directly to the Internet facing Load Balancer and sent queries to the Database Servers. If they knew just a tiny bit of unique public information about the customers, say an email address, phone number, street address, or Social Security Number, they could then get access to extremely personal information from the database.

The penetration testers sounded the ALL HANDS ON DECK alarm. The incident response people (IR) showed up.

The software developers (SDs) of the system were brought into the virtual room and told this is a really big problem. Except for biologically required breaks you’re not leaving the room until this is fixed.

SDs: “We don’t see why this is such a big deal. Someone would have to know the URL for the load balancer. And the only people that might know it are the users of the tool. And we don’t think very many, if any of them are smart enough to figure it out.”

IRs: <blink><blink> “The penetration testers figured it out. And the bad guys out there do this sort of stuff all the time. It’s how they make their money. I’m not going to waste our time explaining this to you. Fix the problem. NOW!”

The IRs then asked how far the logs go back, “You do have logs, right?” The software developers assured the IRs they had logs. The logs went back 90 days. There probably were a few days of missing traffic between when the system was released to production and the oldest log files but most of it was there.

IRs: “Okay, good. We can find out if there was actually any customer information lost.”
SDs: “Oh. You want logs for that? We just log activity at the Customer Assist Tool Web Application. The penetration testers, and any bad guy activity, won’t be in those logs.”
IRs: “Okay…. are there ANY log on the database servers?”

The SDs go looking and find there are generic web logs available that go back to the beginning of the release to production. The IRs looked at the logs for a few seconds and realized the IP addresses of all the requests are of the Load Balancer. There is no indication of the origin of the request. Requests from the Customer Assist Tool are indistinguishable from a request from anywhere else on the Internet.

What about load balancer logs? Maybe. But they don’t go back very far. And if they do exist, all the data is intermixed with the other web applications and other Database Servers.

Within a few hours the SDs have a fix.

IRs: “Tell me about your fix.”

SDs: “The login credentials of the employee used to login to the Customer Assist Tool are passed to the Database Server which validates the credentials before responding.”

IRs: “Okay, we should improve upon that, but maybe that will be good enough that we don’t have to shut down the application until a permanent fix is in place. But that’s a question for our VPs to discuss. Oh, by the way, how many employees do you have authorized to use this tool?”

SDs: “Uhhh… all company employees can use this tool.”

IRs: <blink><blink> “Everyone in the company? Really?” <IRs go to the tool and verify they have access>

SDs: “Yes. If someone improperly used the tool to gain access to customer information when they weren’t supposed to they could be caught and could lose their job. Therefore the customer information is safe from misuse.

IRs: <some facepalm><others bang their heads against the wall> “This is a large company. There are thousands of employees. Anyone on the Internet can find valid company credentials in five minutes or less. We disable hundreds of accounts per week as we find credentials on the web ourselves.”

SDs: <blink><blink>

The story goes on but the important part is that the SDs, not stupid people, made a ton of errors. These errors started with not getting a security professional in the room when they changed the design. The errors compounded dramatically from there.

They had a world view much different than the bad guys and the security professionals.Things which could not even be imagined by the SDs were child’s play to the penetration testers and the IRs.

Now to tie this to current events. Our recent election.

Several courts reviewing the lawsuits claiming foul play have concluded the election was fair and honest.or, at least, there was insufficient evidence of widespread fraud to change the results.

As seen in the story above there are failures modes which not only allow unauthorized access/fraud but make it impossible to determine if such access/fraud occurred. Furthermore, unless someone is experienced in thinking like a bad guy they can honestly believe everything is “fair and honest” and be completely, totally, catastrophically, wrong.

I trust the courts to know their profession. I don’t trust them with security issues. I trust them to accurately asses the integrity of our election far less than the SDs could accurately asses the security of their system. The system they designed and built.

The legal professionals of the court did not design or build the election system. They did not evaluate the security after the (supposedly) COVID inspired changes were made from the viewpoint of a security professional. The original election security features had evolved over hundreds of years and thousands of people poking at it, finding faults, and attempting to prevent future fraud and errors. In the span of a few months a few people made changes which did not go through nearly as rigorous review as the pre COVID system.

I don’t know with a 100% guarantee that sufficient fraud occurred to change the election results. I do know, with 100% certainty, that many people were highly motivated to commit fraud. I do know, with 100% certainly, that some fraud occurred. I’m nearly certain the system in use has issues which make it impossible to detect fraud after the fact.

The bottom line to this is that anyone who says the election was fair and honest because the courts say it was is either lying or placing their trust in a body of people that don’t know anywhere enough about security to make that call.

Quote of the day—John F. Kennedy

Those who make peaceful revolution impossible will make violent revolution inevitable.

John F. Kennedy
March 13, 1962
Address on the first Anniversary of the Alliance for Progress
[I grew up with this being part of my understanding of what made the U.S. different from so many other governments of the world throughout history. I never imagined this might be a prophecy for our future.

We now have a situation where essentially half of the population believes a fraudulent election gave the presidency to a candidate who openly, and proudly, states they plan to deny every citizen their basic, inalienable, human rights.

See also the other times when I referenced this same quote.

Today there are other Kennedy quotes which are also applicable:

We live in interesting times.—Joe]

Quote of the day—Petr Svab

An elections supervisor in Coffee County, Georgia, demonstrated in recent videos posted online how Dominion Voting Systems voting software allows votes to be changed through an “adjudication” process. The process allows the operator to add vote marks to a scanned ballot as well as invalidate vote marks already on the ballot.

Adjudication should only serve to resolve issues of voters marking ballots incorrectly, such as filling the bubbles in a way that doesn’t clearly show who he or she voted for. Yet it appears a substantial number of ballots went through that process, at least in some Georgia counties. As the Coffee County supervisor, Misty Martin, showed, the system can be set to allow adjudication of all scanned ballots, even blank ones, and effectively allow the operator to vote those ballots.

Petr Svab
December 10, 2020
How Dominion Software Allows Changing, Adding Votes
[Interesting.

The article makes it sounds like tampering with the vote is fairly easy and perhaps undetectable.

After thinking about this problem for all of 30 seconds… If I were writing the software for this feature it would print out a copy of the original ballot with the adjudicated vote indicated, a GUID (Globally Unique Identifier) and a hash of votes and the GUID. The GUID and hash would be stored in the database with the other vote results. This would make an audit relatively easy and resistant to tampering.

Perhaps they did that or even something far better. But the article doesn’t indicate that. Concerns such as this need to be investigated.—Joe]

Quote of the day—SilverDeth

The rubes they’ve been working all these years are roused, pissed off and looking for the nearest pitchfork. And I don’t mean that metaphorically. ALL OF THE GUNS sold out over Thanksgiving weekend.

ALL.
OF.
THEM.

Our “betters” should have taken them before they started blatantly nullifying elections. Pride and arrogance has done in our owners, like so many tyrants before. They mistook “negotiation, forbearance and appeasement,” for “surrender.”

What these Cloud Dwelling Nimrods, fail to understand is this sudden swelling of anger has little to do with Trump specifically – and everything to do with the ARROGANCE our civic masters.

Donald Trump was never anything but a symptom of an amok government and a deadly warning to our elite. He was Joe-Six-Pack NICELY telling Mordor’s brain-trust to back the F*CK OFF. The message was ignored, mocked and then followed by a host of deliberate provocations and indignities.

Well, congratulations – “nice” just stormed out the door with his AR and a serious attitude problem. “Nice” ain’t entirely sure what to ventilate first, but that’s O.K., because “nice” bought several billion rounds of .223 in over the last few years.

SilverDeth
December 7, 2020
2020 Just Keeps Shittin’ in our Mouths
[Via Matthew Bracken.

We live in interesting times and the clock is ticking down to the decisive second…—Joe]

Quote of the day—Samuel Alito

The application for injunctive relief presented to Justice Alito and by him referred to the Court is denied.

Samuel Alito
Supreme Court Justice
December 8, 2020
Supreme Court Denies to Block Pennsylvania From Certifying Election Results
[For some reason I find it amusing this is the entire order from the court on this case.—Joe]

Quote of the day—Gem Micheo

The OIG made several recommendations to the agency to attempt to fix the program. At this point we believe the program is beyond repair as it is completely mismanaged and it has eroded the workforce and public confidence. This program has only served to further scare the American public about government surveillance programs.

Gem Micheo
December 1, 2020
Air Marshal National Council
Inspector General Investigation “TSA did not properly plan, implement, and manage its Quiet Skies Program.”
[I’ve been saying the government was going about the prevention of terrorism of air travel for about 20 years now. Here is one of my first web articles on it.

A good rule of thumb is that if the government attempts to do something the free market could do the government will fail. The failure also has a good chance of being spectacular.

One of my two favorite examples are:

  1. For about 70 years the USSR attempted to increase domestic food production. The food lines persisted and continuous mass hunger, if not starvation was only avoided because of the black market distribution of the produce from private gardens.
  2. For those same 70 years the U.S. government attempted to decrease domestic food production to increase prices for farmers who frequently suffered economic stress because of a glut, and hence low prices, of crops. They also failed. Compare price of wheat today to that of 60 years ago and take into account inflation, the price of fuel, the price of fertilizer, labor, and equipment:image

The TSA has the correct letters in its acronym. They are just in the wrong order and stand for the wrong words. It should be A Security Theater.—Joe]

Quote of the day—Paul Rosenberg

Another case whose settlement should be announced soon involves another gun industry loophole custom-made for the “bad guy with a gun”:  replica antique black powder guns (that are nonetheless fully functional). Collectively, what these cases show is how deeply dishonest the “good man with a gun” rhetoric really is. It’s not that such people don’t exist. But they’re not the people the NRA and the gun industry have been looking out for.

Quite the contrary: They’ve been used as human shields to fend off gun safety activists and reasonable regulation, while the “bad man with a gun” demographic has been catered to for decades, as the body count continues to grow. With the NRA in crisis and the industry’s PLCAA bulwark teetering, the time is ripe for a historic, responsibility-focused shift in gun policy. And the fact that Congress is still paralyzed no longer matters all that much. Change is coming anyway.

Paul Rosenberg
December 5, 2020
Real gun reform without Congress: Lawsuits demolish the “good guy with a gun”
[We may have some rough times ahead of us.—Joe]

Quote of the day—Mitchell Harrison

Upon arrival in the processing room located on Level S of State Farm Arena, we were supposed to watch the processing of the Absentee Ballots from the observation area which was delineated by a fenced area of roping secured by posts. This observation area we were put in was very distant from the staff actually processing the ballots. The room where the ballot processing took place is a very large room, and this distance effectively prevented our actual observation of the process. In addition other areas of this – again very large – room were not visible at all from our observation area.

For example, the machine that copied the UOCAVA electronically received ballots (sometimes called military ballots) onto a paper copy of the same could only be viewed from the side and the doors to that area were positioned in a way that prevented us from viewing of this process. Additionally, the scanners that scanned the absentee ballots were not visible to us at all.

Sometime after 10 o’clock p.m., the counting activity slowed. Shortly afterward, a younger lady with long braided but blog hair yelled out to all of them they should stop working and come back tomorrow (the next day, November 4th) at 8:30 A.M.. Thereafter all but 4 election employees left State Farm, leaving just the blond haired lady (who Michelle and I assumed was the supervisor), to older ladies and Regina Waller at the location. This lady had appeared through the night and Michelle and I believed her to be the supervisor.

Another task we had been given by Brandon was to inquire how many ballots had been processed and how many were still left to go. We posed these questions to Regina Waller, the Public Affairs Manager for Elections. She seem uncomfortable at times answering us, and she called someone which we interpreted as asking for help on how to respond to us. Ultimately she refused to answer our questions and told us we had to “look it up on the website”. In all, we asked Regina Waller for this information at least three separate times and she would not give us an answer.

Mitchell Harrison
November 2020
Attachment 28 Exhibit Affidavit of Mitchell Harrison
[This is directly related to this post.

I post this in response to those who say:

Nobody told them to stay. Nobody told them to leave. Nobody gave them any advice on what they should do. And It was still open for them or the public to come back in to view at whatever time they wanted to, as long as they were still working.

I would like to point out that to the best of my knowledge none of the responses from the poll workers are under oath or submitted such that they can be punished for perjury if they lied. If the affidavits in the court documents are knowingly in error then the providers of those documents are subject to criminal prosecution.

While it may be true the observers were not specifically told to leave the observation area there was no meaningful observation possible. The behavior toward of the poll workers was very suspicious (read Michelle Branton’s affidavit as well).

If they want to reassure the public the ballot counting was honest they should:

  • Provide the video showing appropriate chain of custody of the ballot boxes from opening to when they were scanned and stored for recount.
  • Do signature verification of all ballots with functional observation
  • Recount the ballots with functional observation.

All case documents are here.—Joe]

Quote of the day—Ermiya Fanaeian

The left’s idea of a ‘gun nut’ typically is white men who are upper class and see this as a hobby that will make their egos bigger. But the reality is this is a form of empowerment for me.

As working-class people, we should not be disarmed. There is everlasting violence against LGBTQ people that oftentimes politicians, on whatever side of the aisle, are not addressing, and we need to be able to protect ourselves.

And because of that, I came to this understanding that the March for Our Lives goals do not align with my goals.

Ermiya Fanaeian
November 28, 2020
Huge Utah gun control advocate flips, launches a pro-gun group after her ‘awakening’ about America
[The truth will set you free.—Joe]

Quote of the day—Donald J Trump

Video footage from #Georgia shows that poll workers were told to stop counting and leave, while 4 people stayed behind to continue counting ballots in private.

Donald J Trump
December 3, 2020
Comment on YouTube
[Via daughter Jaime.

Watch both videos. They’re short.

I find it “interesting” these people weren’t concerned with the video surveillance cameras. Have they done this so many times and gotten away with it that they just didn’t have any concern about this time being different?

It certainly looks to me like a bunch of people need to be prosecuted.

We live in interesting times.—Joe]

Quote of the day—Kyle Smith

The Chump Effect is Meigs’s clever term for the bipartisan, broadly shared feeling that various systems are rigged in favor of elites, insiders, and favored groups, which leads to a breakdown in societal trust and trust in institutions. If those guys don’t have to play by the rules, we think, why should I? Meigs delves into social-science experiments that show people motivated by the Chump Effect can act irrationally by effectively volunteering to pay a cost in order that others be punished for ignoring norms.

The political implications of the Chump Effect are obvious: Meigs begins with the story of a man who asked Elizabeth Warren if he, who scrimped to put his child through college, would be entitled to a refund under her proposed new system to forgive student loans. “Of course not,” was Warren’s response. The man was furious: He was being made a chump.

Kyle Smith
November 12, 2020
The Chump Effect
[Emphasis added.

The Chump Effect is a significant component of why socialism and communism always fail.

The politicians don’t abide by state or U.S. Constitutions let alone the laws they pass. Why should they expect others to abide by their laws and regulations?–Joe]

Quote of the day—Predator

It is very rare indeed that one gets to witness a completely naked individual walk up to a large hornet’s nest and begin striking it with a stick after handcuffing himself to the tree the nest is in.

I’m reminded of that line from the movie, “I’m not locked in here with you, you’re locked in here with me.”

Predator
December 1, 2020
[I’m not so sure it’s as clear cut as that. But, still, we certainly do live in interesting times.—Joe]

Quote of the day—Republican state lawmakers in Pennsylvania

RESOLVED, That the House of Representatives:

(1) Recognize allegations of substantial irregularities and improprieties associated with mail-in balloting, precanvassing and canvassing during the November 3, 2020, election.

(2) Disapprove of the infringement on the General Assembly’s authority pursuant to the Constitution of the United States to regulate elections.

(3) Disapprove of and disagree with the Secretary of the Commonwealth’s premature certification of the results of the November 3, 2020, election regarding presidential electors.

(4) Declare that the selection of presidential electors and other Statewide electoral contest results in this Commonwealth is in dispute. 2020D13219 – 4 – 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 (5) Urge the Secretary of the Commonwealth and the Governor to withdraw or vacate the certification of presidential electors and to delay certification of results in other Statewide electoral contests voted on at the 2020 general election.

(6) Urge the United States Congress to declare the selection of presidential electors in this Commonwealth to be in dispute.

Republican state lawmakers in Pennsylvania
November 30, 2020
THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE RESOLUTION No. 1094 Session of 2020 (also available here)
Introduced by DIAMOND, NELSON, SCHEMEL, ROTHMAN, RYAN, KEEFER, JONES, ROWE, PUSKARIC, GLEIM, COOK, DUSH, BOROWICZ, ZIMMERMAN, METCALFE, MALONEY, MOUL, ROAE, RAPP, COX, KAUFFMAN, DAVANZO, DOWLING, IRVIN, BERNSTINE, LEWIS, GREINER, WARNER, OWLETT, TOBASH, MACKENZIE, METZGAR, SANKEY, KNOWLES, WHEELAND, JOZWIAK, B. MILLER, RIGBY AND HICKERNELL
[Read the whole thing, less than five pages, and attempt to convince me that there should not be a bunch of people, including members of the Pennsylvania Supreme Court, going to prison over the crap they pulled.

I was talking to a friend yesterday. And a friend of his lives in Pennsylvania and saw a lot of unethical, if not illegal, stuff. Among other things, there were people wheeling people that were total “vegetables” in on wheelchairs to vote. Their “helper” would get them through the voter ID stuff and then vote for them. They were also also places where people could vote and votes were being counted but were called something other than a “polling place”. And because they where a “polling place” there were no observers required.

I urged that this person report the activities to law enforcement. My friend said he would forward the suggestion to his friend.

We live in interesting times.—Joe]

Withholding information

From The Epoch Times:

At a public hearing in Arizona with select members of the state legislature and members of President Donald Trump’s legal team, lawmakers called for their colleagues to support an upcoming resolution that would delay the release of the state’s Electoral College votes.

Arizona state Rep. Mark Finchem told reporters during the Nov. 30 hearing that they hope to have a resolution “within the next 24 to 48 hours.” The state holds 11 Electoral College votes.

“We are clawing our Electoral College votes back, we will not release them,” Finchem said. “That’s what I’m calling on our colleagues in both the House and Senate to do—exercise our plenary authority under the U.S. Constitution.

From National File:

After the state’s hearing into election integrity was only halfway through, Arizona State Rep. Mark Finchem, a Republican, issued a call for his colleagues to withhold the state’s Electoral College votes, as he believes there is enough significant evidence of fraud to invalidate the state’s votes.

From USSA News:

After the state’s hearing into election integrity was only halfway through, Arizona State Rep. Mark Finchem, a Republican, issued a call for his colleagues to withhold the state’s Electoral College votes, as he believes there is enough significant evidence of fraud to invalidate the state’s votes.

“We are clawing our electoral college votes back, we will not release them. That’s what I’m calling our colleagues in both the House and the Senate to do,” added Finchem. “Exercise our plenary authority under the U.S. Constitution.”

From Before Before It’s News:

Arizona State Rep. Mark Finchem ““We are clawing our electoral college votes back, we will not release them”, Gosar: “Biden’s thugs will not steal this election.”

From (We) Are The News:

Arizona Rep. Mark Finchem seeks to prevent the state from assigning its Electoral College votes to Joe Biden

After the state’s hearing into election integrity was only halfway through, Arizona State Rep. Mark Finchem, a Republican, issued a call for his colleagues to withhold the state’s Electoral College votes, as he believes there is enough significant evidence of fraud to invalidate the state’s votes.

“We are clawing our electoral college votes back, we will not release them. That’s what I’m calling our colleagues in both the House and the Senate to do,” added Finchem. “Exercise our plenary authority under the U.S. Constitution.”

Those reports on the hearing, and many, many, more, were found using a Bing search for the set of words (no quotations):

We are clawing our Electoral College votes back

No reference to the hearing was found in any major media outlet.

The same search with Google yielded one article in the Citizens Journal and one Twitter post.

The same search with Google News yielded nothing.

That news sources and major corporations withhold the activities of state legislatures from the people proves we live in a very different world from the one I believed we lived in when I took classes in U.S. history and U.S. government when I was in High School.

I’m reminded of the often reported story from when the concentration and death camps were liberated after WWII. The residents of the nearby cities were (perhaps figuratively)dragged through the camps to see the horrors. These nearby residents claimed they did not know what was happening in the camps. The Nazis had controlled the flow of information and given, at least semi-, plausible reasons for the orders and trains full of people brought to the camp.

And so it is with the parties of evil today that withhold information from the people to hide their activities.

We live in interesting times.

Respond appropriately.

Quote of the day—Patrick Basham

Despite poor recent performances, media and academic polls have an impressive 80 percent record predicting the winner during the modern era. But, when the polls err, non-polling metrics do not; the latter have a 100 percent record. Every non-polling metric forecast Trump’s reelection. For Trump to lose this election, the mainstream polls needed to be correct, which they were not. Furthermore, for Trump to lose, not only did one or more of these metrics have to be wrong for the first time ever, but every single one had to be wrong, and at the very same time…

Patrick Basham
November 27, 2020
Reasons why the 2020 presidential election is deeply puzzling
[Via Scott Adams and daughter Jaime.

We live in interesting times.—Joe]

Quote of the day—Navid Keshavarz-Nia, Ph.D., Ed.D.

I conclude with high confidence that the election 2020 data were altered in all battleground states resulting in a hundreds of thousands of votes that were cast for President Trump to be transferred to Vice President Biden. These alterations were the result of systemic and widespread exploitable vulnerabilities in DVS, Scytl/SOE Software and Smartmatic systems that enabled operators to achieve the desired results. In my view, the evidence is overwhelming and incontrovertible.

Navid Keshavarz-Nia, Ph.D., Ed.D.
November 25, 2020
DECLERATION OF DR. NAVID KESHAVARZ-NIA
[I wish the lawyer writing this up knew how to use a spell checker.

Via daughter Jaime.

See also HUGE! Sidney Powell Witness Whom NY Times Described as “Always the Smartest Person in the Room” Concludes Hundreds of Thousands of Votes Transferred from Trump to Biden IN ALL BATTLEGROUND STATES.

Some of Keshavarz-Nia credentials:

I have a Bachelor’s degree in Electrical and Computer Engineering and a Master’s degree in Electronics and Computer Engineering from George Mason University, a Ph.D. degree in Management of Engineering and Technology from CalSouthern University and a Doctoral (Ed.D) degree in Education from George Washington University. I have advanced training from the Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), National Security Agency (NSA), DHS office of Intelligence & Analysis (I&A) and Massachusetts Institute of Technology (MIT).

I am employed by a large defense contractor as a chief cyber security engineer and a subject-matter expert in cyber security. During my career, I have conducted security assessment, data analysis and security counterintelligence, and forensics investigations on hundreds of systems. My experience spans 35 years performing technical assessment, mathematical modeling, cyber-attack pattern analysis, and security counterintelligence linked to FIS operators, including China, Iran, North Korea, and Russia. I have worked as a consultant and subject-matter expert supporting the Department of Defense, FBI and US Intelligence Community (USIC) agencies such as the DIA, CIA, NSA, NGA, and the DHS I&A supporting counterintelligence, including supporting law enforcement investigations.

Also:

11. Despite DVS’s constant denial about the flaws of its systems, the company’s ImageCast Precinct optical scanner system was totally hacked in August 2019. This occurred during the largest and most notable hacker convention, called DEFCON Voting Machine Hacking Village in Nevada. The DVS ImageCast Precinct is an integrated hybrid voting equipment by combining an optical paper ballot and ballot marking device to allow accessibility for the visually impaired. The system runs the Busybox Linux 1.7.4 operating system, which has known medium to high level exploitable vulnerabilities to allow remote attackers to compromise the VDS. (J. Moss, H. Hurtsi, M. Blaze et al., Voting Village Report, DEFCON Village Report in association with and Georgetown University Law Studies; Online Source: https://media.defcon.org/DEF%20CON%2027/voting-village-report-defcon27.pdf). The report indicated that “many of the specific vulnerabilities reported over a decade earlier (in the California and Ohio studies, for example) are still present in these systems today (A. Padilla, Consolidated report by California Secretary of State, Top-to-Bottom Review summary and detailed report, Page 4 (Online Source: https://www.sos.ca.gov/elections/ovsta/frequently-requested-information/top-bottom-review)

The operating system software is Busybox Linux 1.7.4. This was released in 2008. Yes, the O/S of the voting software in states of the most interest to the entire nation has not been updated in over 12 years. In the computer security world this is regarded as something close to highly radioactive and the hardware using this software should be immediately removed from network connections then decommissioned or updated.

In my job I report, on a weekly basis, computers which I have found that have reached end of life and are no longer supported when they are just one day past the date of last support. Something 12 years past support with a connection to the Internet would have my VP talking to someone else’s VP in a very stern tone of voice.

I know of some cases where the offending computer has been immediately disconnected from the network with no effort to contact the owners. The attitude being something along the lines of, “If they are this ignorant, stupid, and/or careless, they don’t deserve to be notified. Let them figure it out on there own—if they can.”

In this case the company has known for “over a decade” the system was insecure. My inclination is that this was no accident or carelessness. There is a high probability this was deliberate. People should go to prison for this.

It looks as if the Kraken has been released.—Joe]

Quote of the day—Matt Braynard

It’s unfortunate, but short of a judge ordering a do-over, another election … short of that, I really don’t see how you fix this.

This election, it appears to me, has been decided by ballots that are highly questionable. They’re anomalous.

I cannot say with confidence who won this election. I don’t think anybody can.

Matt Braynard
November 25, 2020
Election Findings Could ‘Easily’ Overturn 3 States, Data Analyst Concludes
[We live in interesting times.—Joe]

Quote of the day—BLM Activist

You can’t talk about education, and you can’t talk about black issues, and LGBT issues, and exclude them as if they’re some individual issue; you need to be looking at this using intersectionality.

It means recognizing that there is one common enemy: the white man. The systems that they use are capitalism, patriarchy, and fascism. They were created and perpetuated by white men, for white men, in the interests of white men.

And once we realize that we are all fighting the same fight, it just strengthens the army. A problem shared is a problem halved. Imagine if we all realized and came together and grouped together?

All of these groups of people, the issues they face, it all comes from the same people: white men. So we need to get rid of them.

BLM Activist
July 19, 2020
Exclusive Video: BLM Activist Says White Men Are ‘The Common Enemy’, ‘We Need to Get Rid of Them’
[Lesson learned from the 20th Century: If someone says they want to kill an entire class of people… Believe them! Then respond appropriately.—Joe]

Quote of the day—Concerned American

if/when Trump’s legal remedies do not prevail over the Reds’ efforts, the America of your youth has been conquered in full by the Communists.

Concerned American
November 24, 2020
The Crisis Is Here
[While I understand the concern, I’m not in complete agreement it’s game over.—Joe]