Connect with us

Hi, what are you looking for?

Crime

Military Source with Knowledge says Servers ‘Compromised’ by China and Iran, Mentions Facebook

President Donald J. Trump is contesting the media’s results of the 2020 Presidential election, and after weeks of confusion over what evidence Trump’s legal team has to contest the results, the details are starting to come out in legal documents and hearings.

“A digital forensic analysis by a former military intelligence analyst whose name was redacted in an affidavit accompanying attorney Sidney Powell’s lawsuit against Michigan officials, claims to present unambiguous evidence that Dominion Voter Systems servers were accessible to and were certainly compromised by rogue actors, such as Iran and China,” The Epoch Times reported, Sunday.

Remember that the two countries have a strategic pact with each other to beat America. According to a July 2020 foreign policy.com article, “Iran’s Pact With China Is Bad News for West Tehran’s new strategic partnership with Beijing will give the Chinese a strategic foothold and strengthen Iran’s economy and regional clout.”

Powell’s complaint, filed on Nov. 25 against Michigan Gov. Gretchen Whitmer, Michigan Secretary of State Jocelyn Benson, and the Michigan Board of State Canvassers, cites the affidavit (pdf) as authored by a former electronic intelligence analyst under 305th Military Intelligence and purporting to show that “the Dominion software was accessed by agents acting on behalf of China and Iran in order to monitor and manipulate elections, including the most recent US general election in 2020.”

A separate complaint (pdf) in Georgia, expands on the assertion, claiming that, “by using servers and employees connected with rogue actors and hostile foreign influences combined with numerous easily discoverable leaked credentials, Dominion neglectfully allowed foreign adversaries to access data and intentionally provided access to their infrastructure in order to monitor and manipulate elections, including the most recent one in 2020.”

The news of the sworn testimony by a top military expert emerges days after Powell’s client, General Mike Flynn, was given a Presidential pardon from events stemming from the Crossfire Hurricane attempted to take down of Flynn and President Donald J. Trump, and on the same day that Flynn had his first interview with WVW, where Flynn told listeners that Americans need to look at the sworn affidavits in Attorney Sidney Powell’s lawsuits.

In the same interview from Sunday, three-star General McInerney joined them and said, “General Flynn, people must realize was the Senior Military Intelligence officer in the US Commands at the Defense Intelligence agency. He is a career intelligence officer and knows this stuff backward and forward,” he said.

In the same interview, McInerney said that the “Kracken” was the name for the 305 Battalion of Special Forces, who were used to seize servers in Frankfurt Germany.

I covered that interview here:

MICHIGAN

Excerpts from the 17 page avadavidt follows:

“I was an electronic intelligence analyst under 305” Military Intelligence with experience
gathering SAM missile system electronic intelligence. I have extensive experience as a white
hat hacker used by some of the top election specialists in the world. The methodologies I
have employed represent industry standard cyber operation toolkits for digital forensics and
OSINT, which are commonly used to certify connections between servers, network nodes
and other digital properties and probe to network system vulnerabilities.

Tama US citizen and I reside location in the United States of America.
Whereas the Dominion and Edison Research systems exist in the internet of things, and
whereas this makes the network connections between the Dominion, Edison Research and
related network nodes available for scanning,

And whereas Edison Research’s primary job is to report the tabulation of the count of the
ballot information as received from the tabulation software, to provide to Decision HQ for
election results,

And whereas Spiderfoot and Robtex are industry standard digital forensic tools for evaluation
network security and infrastructure, these tools were used to conduct public security scans of
the aforementioned Dominion and Edison Research systems,

A public network scan of Dominionvoting.com on 2020-11-08 revealed the following inter-
relationships and revealed 13 unencrypted passwords for dominion employees, and 75 hashed passwords available in TOR nodes: Same public scan also showed a direct connection to the group in Belgrade as
highlighted below:”

The document shows that there are connections to Serbia, Iran and China and to Facebook.

“Unrelated, but also a point of interest is CTCL or Center for Tech and Civic Life funded by
Mark Zuckerberg. Within their github page (https://github.com/ctcl), one of the programmers
holds a government position. The Bipcoop repo shows tanderegg as one of the developers, and he works at the Consumer Financial Protection Bureau:”

More from the document:

“In my professional opinion, this affidavit presents unambiguous evidence that Dominion
Voter Systems and Edison Research have been accessible and were certainly compromised
by rogue actors, such as Iran and China. By using servers and employees connected with
rogue actors and hostile foreign influences combined with numerous easily discoverable

Leaked credentials, these organizations neglectfully allowed foreign adversaries to access data.”

GEORGIA

From the 104 page legal document:

“An Affiant, who is a network & information cyber-security expert,
under sworn testimony explains that after studying the user manual for
Dominion Voting Systems Democracy software, he learned that the
information about scanned ballots can be tracked inside the software
system for Dominion:
(a) When bulk ballot scanning and tabulation begins, the
“ImageCast Central” workstation operator will load a batch of ballots
into the scanner feed tray and then start the scanning procedure
within the software menu. The scanner then begins to scan the
ballots which were loaded into the feed tray while the “ImageCast
Central” software application tabulates votes in real-time.
Information about scanned ballots can be tracked inside the
“ImageCast Central” software application.
(See attached hereto Exh 22, Declaration of Ronald Watkins, at par. 11).


Affiant further explains that the central operator can remove
or discard batches of votes. “After all of the ballots loaded into the
scanner’s feed tray have been through the scanner, the “ImageCast Central”
operator will remove the ballots from the tray then have the option to either
“Accept Batch” or “Discard Batch” on the scanning menu …. “(Id. at par. 8).


Affiant further testifies that the Dominion/Smartmatic user manual
itself makes clear that the system allows for threshold settings to be set to
mark all ballots as “problem ballots” for discretionary determinations on where
the vote goes. It states:


During the scanning process, the “ImageCast Central” software will
detect how much of a percent coverage of the oval was filled in by the
voter. The Dominion customer determines the thresholds of which the
oval needs to be covered by a mark in order to qualify as a valid vote.
If a ballot has a marginal mark which did not meet the specific
thresholds set by the customer, then the ballot is considered a
“problem ballot” and may be set aside into a folder named
“NotCastImages”. Through creatively tweaking the oval coverage
threshold settings it should be possible to set thresholds in such a way
that a non-trivial amount of ballots are marked “problem ballots” and
sent to the “NotCastImages” folder. It is possible for an administrator
of the ImageCast Central work station to view all images of scanned
ballots which were deemed “problem ballots” by simply navigating via
the standard “Windows File Explorer” to the folder named
“NotCastImages” which holds ballot scans of “problem ballots”. It is
possible for an administrator of the “ImageCast Central” workstation
to view and delete any individual ballot scans from the
“NotCastImages” folder by simply using the standard Windows delete
and recycle bin functions provided by the Windows 10 Pro operating
system.
Id. at pars. 9-10.

The Affiant further explains the vulnerabilities in the system when
copy of the selected ballots that are approved in the Results folder are made

to a flash memory card – and that is connected to a Windows computer
stating:
It is possible for an administrator of the “ImageCast Central”
workstation to view and delete any individual ballot scans from the
“NotCastImages” folder by simply using the standard Windows delete
and recycle bin functions provided by the Windows 10 Pro operating
system. … The upload process is just a simple copying of a “Results”
folder containing vote tallies to a flash memory card connected to the
“Windows 10 Pro” machine. The copy process uses the standard dragn-drop or copy/paste mechanisms within the ubiquitous “Windows
File Explorer”. While a simple procedure, this process may be error
prone and is very vulnerable to malicious administrators.”

General Flynn was right, jumping into the legal documents is very informative.

Click to comment

Leave a Reply

Your email address will not be published.

ULTRA MAGA REPUBLICAN

PRO ❤️ LIFE

Patriot Supply

You May Also Like

Copyright © 2022 Unite America First. Turbocharged by Adrevv

0