Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Video: Gwinnett County Official Admits To Taking Data From The Election Management System, Plugging It Into A Laptop, Then Filtering It With Excel
Right Journalism ^ | 12.02.2020 | Natalie Dagenhardt

Posted on 12/02/2020 7:51:37 AM PST by USA Conservative

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-36 last
To: Scrambler Bob

There is one tool that Excel has that is unique. It is ASAP Utilities. Talk about a Swiss Arm Knife.

I also like Gnumeric (xml based) spread sheet. It has RegEx tool built right into it. Little or no documentation, but incredibly powerful editing. It also exports excellent HTML output.


21 posted on 12/02/2020 8:50:30 AM PST by Texas Fossil ((Texas is not where you were born, but a Free State of Heart, Mind & Attitude!))
[ Post Reply | Private Reply | To 7 | View Replies]

To: rigelkentaurus
To have USBs involved in our election process is knowingly fraudulent.

Most of the tabulating machines are not online and the only way to get ballots/vote totals from them is some type of memory card. If they aren't networked I'm not sure how else to do it.

In this case it sounds like the servers also didn't have a network connection the laptop could access.

22 posted on 12/02/2020 8:56:35 AM PST by semimojo
[ Post Reply | Private Reply | To 8 | View Replies]

To: All

I worked as the IT Database point of contact when Georgia used Diebold as their voting system. All USB ports were disabled and there was no wifi system available.

Everyone is doing Monday Morning Quarterbacking when we need to prepare for the next game. Early voting starts soon for the two Senate seats here in Georgia. What are we going to do about our defense?

Post Mortem on the November 3rd election.

We know what the rat strategy is and how they play the game. We need to counter their efforts.

The rats have access to all ballots. Those that have been placed and those that are available to harvest. They are taking the spreadsheet and completing the non-voting ballots and placing them in the rat category. That is how they knew what ballots to cure and what they could harvest.


23 posted on 12/02/2020 8:59:49 AM PST by Dacula (Don't NY - MY GA!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: semimojo

If the server and tabulating machines did not have a network connection, then the data had to be on the USB drive. This negates their excuse.


24 posted on 12/02/2020 9:00:22 AM PST by Ingtar
[ Post Reply | Private Reply | To 22 | View Replies]

To: Texas Fossil

And the OS is Android portable cellular communications based - you just can’t make this stuff up


25 posted on 12/02/2020 9:01:32 AM PST by rdcbn1
[ Post Reply | Private Reply | To 20 | View Replies]

To: Ingtar
If the server and tabulating machines did not have a network connection, then the data had to be on the USB drive. This negates their excuse.

I don't understand. It sounds to me like the data had been uploaded to the server and was probably on the local network. The Dominion guy wanted to do some analysis or reporting so downloaded some data from the server to move it to the laptop via USB.

Did I miss something?

26 posted on 12/02/2020 9:18:26 AM PST by semimojo
[ Post Reply | Private Reply | To 24 | View Replies]

To: semimojo

Problem: distributed computers, ie voting machines, must be air gapped and have no USB ports so how to move the final files to the vote counting machine?

First, the voting machines should be SSD storage. Second, the entire drive should be encrypted. Third, the voting machine is only storing encrypted ballot information and not processing or tabulating them. At the end of the voting day, the machines can only report total ballots stored for matching with number of voters who signed in. Then the machines must be powered down creating a time stamp of when that happened. Also, each ballot would have an encrypted time stamp. No one in outside the few people in the final counting room would have the encryption keys to unlock the stored ballots, the key is unique to registered voting machine. The machines are physically transferred to the counting location. Machines are physically connected to the counting machine which is also air gapped.

Then, each machine must under certification including that it is registered prior to the election, that it contains valid time stamped encrypted ballots, and that the number of ballots contained is appropriate, etc. After certification, the counting server transfers, unencrypts, counts, audits, tabulates each machine’s data.

No reporting is possible until all registered machines are accounted for and certified. At that point, the machine’s data is marked completed, final, and locked. Only then are final reports available, printed, and then scanned into a connected machine. Scanned version is compared to the printed version and certified as identical and results posted.

This example is just thrown together while I typed it, and could certainly be improved, hardened and any issues with what I wrote fixed, but it is just to illustrate that the voting machine problem could be solved. A proper and complete system design could be done in detail with a proper team over a number of months as planning is the most critical step.

A secure system can be created and seriously, what is being done is really not that complex. However, the goal must be fully audited and fully certifiable at each step, and guarantee chain of custody with as absolutely secure steps as humanly possible. None of those is present in this election.

Still have to start with clean voter roles, proof of identity including systematic prevention of a third party voting for another person (especially a poll worker), and the absentee / mail-in ballots have to be addressed. But using USBs, connected machines, moving live files of votes across the internet, making partial results known during the process to anyone is nonsense to the highest degree.


27 posted on 12/02/2020 9:47:58 AM PST by rigelkentaurus
[ Post Reply | Private Reply | To 22 | View Replies]

To: rdcbn1

No, you can’t.

Head shake.

https://votingsystems.cdn.sos.ca.gov/vendors/dominion/ds52remote.pdf


28 posted on 12/02/2020 10:15:21 AM PST by Texas Fossil ((Texas is not where you were born, but a Free State of Heart, Mind & Attitude!))
[ Post Reply | Private Reply | To 25 | View Replies]

To: rigelkentaurus
The major international oil company that I worked for banned all USB drives

The same thing with the banks I've worked for. The USB ports were locked down on all computers.

29 posted on 12/02/2020 10:24:05 AM PST by PallMal
[ Post Reply | Private Reply | To 8 | View Replies]

To: rigelkentaurus
The machines are physically transferred to the counting location. Machines are physically connected to the counting machine which is also air gapped.

Is this more secure than sneakernetting a memory card of some type?

At least for the Dominion machines the tabulator writes the ballot and vote counts to an encrypted memory card. It seems that a proprietary device to read that card and physically transfer the data to a compatible reader on the server would both preserve the original data and isolate and protect the tabulator.

30 posted on 12/02/2020 10:31:47 AM PST by semimojo
[ Post Reply | Private Reply | To 27 | View Replies]

To: semimojo

They said they got the data from the net. None of those devices are supposed to be on the net... I am probably wrong, but it sounds iffy to me.


31 posted on 12/02/2020 10:48:58 AM PST by Ingtar
[ Post Reply | Private Reply | To 26 | View Replies]

To: Ingtar
They said they got the data from the net.

"He downloads data from the Election Management Server onto a USB..."

32 posted on 12/02/2020 10:54:24 AM PST by semimojo
[ Post Reply | Private Reply | To 31 | View Replies]

To: semimojo

USB access by definition is a pathway to introduce malware, spyware, viruses both intentional and unintentionally, even boot a separate operating system then mounting the host device to access its files. Once a USB is then separated, it can be substituted or edited in another device or have malware, spyware, viruses introduced during transport.

How many people had the knowledge of the encryption keys? Encryption is not the end all when physical access is possible and especially so when the encryption keys could be compromised.


33 posted on 12/02/2020 11:00:39 AM PST by rigelkentaurus
[ Post Reply | Private Reply | To 30 | View Replies]

To: rigelkentaurus
USB access by definition is a pathway to introduce malware, spyware, viruses both intentional and unintentionally, even boot a separate operating system then mounting the host device to access its files.

Well, you need to pick your poison. Connecting the tabulators to another system offers the same chance for compromise.

It seems the safest approach might be to have separate USB drives for each tabulator so a compromised USB drive could only infect one machine.

34 posted on 12/02/2020 12:03:09 PM PST by semimojo
[ Post Reply | Private Reply | To 33 | View Replies]

To: semimojo

first:

About LeadStories.com: Since February 2019 we are an active part of Facebook’s partnership with third party fact checkers...
Since April 2020 we also provide fact checking related advice and services to ByteDance, the company running TikTok.
No full overview of our expenses and revenue for 2020 is available yet because the year is still ongoing. However, here is an overview of our main funding sources so far this year, which are mostly the same as last year except for the addition of ByteDance LLC (for fact checking related work for TikTok) and a small IFCN grant:
Facebook LLC
Google LLC
ByteDance LLC...ETC
https://leadstories.com/about.html

don’t you know some “Fact Check” mob would be trying to debunk the Dominion/Xavier Khouri/USB story almost as soon as the video emerged! how bizarre are the quotes by Sterling?

1 Dec: Lead Stories: Fact Check: Election Video Does NOT Show Worker ‘Manipulating’ Data In Gwinnett County, Georgia
Fact Check
by Dana Ford
(Dana Ford is an Atlanta-based reporter and editor. She previously worked as a senior editor at Atlanta Magazine Custom Media and as a writer/ editor for CNN Digital)
(Gabriel Sterling, the Georgia’s voting system implementation manager) addressed that claim during a press conference at the state Capitol on December 1, 2020. He said:
“A 20-something tech in Gwinnett County today has death threats and a noose put out, saying he should be hung for treason because he was transferring a report on batches from an EMS [election management system] to a county computer so he could read it.”

Sterling said that he spoke with representatives of Dominion Voting Systems, who described the worker as “one of the better ones they got.” About the contractor, Sterling said:
“His family is getting harassed now. There’s a noose out there with his name on it. It’s just not right.”...
“This kid took a job. He just took a job, and it’s just wrong. I can’t begin to explain the level of anger I have right now over this. And every American, every Georgian — Republican and Democrat alike — should have that same level of anger.”...

Separately, Dominion spokesperson Michael Steel spoke to allegations of voter fraud during a Fox News interview published on November 22, 2020. Here’s the relevant part from that report:

(Fox excerpt)
When asked if a poll worker could use a USB thumb drive to add votes for a candidate, Steel said that the vote tabulators do not have such access. He also said they are not connected to the internet.
“It’s not physically possible to do what they’re describing,” he reiterated.

Lead Stories has written quite a bit about Dominion since the 2020 election. Here’s a look at our latest coverage LINKS
https://leadstories.com/hoax-alert/2020/12/fact-check-election-video-does-not-show-worker-manipulating-data-in-gwinnett-county-georgia.html


35 posted on 12/02/2020 4:13:09 PM PST by MAGAthon
[ Post Reply | Private Reply | To 34 | View Replies]

To: USA Conservative

As soon as a USB was inserted into the machine the game was over. If it was already there, and then removed, game it is over.


36 posted on 12/02/2020 4:15:43 PM PST by RinaseaofDs
[ Post Reply | Private Reply | To 2 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-36 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson