Did you see this tidbit?
"...Additionally, in March 2021 (four or five months AFTER the election) 37,646 queries hit the system for a “blank password on a system that only contained 8 accounts,” according to Cotton.
Cotton explained that “clearly, there was a script executed by an EMS admin.” He has no idea where that script came from. That is why he needs the router logs and Splunk data.
The system works on a FIFO basis, first in first out. This is a critical point because once the system hits 20 megabytes of information, the older information is deleted.
Therefore, as Petersen summarized, those 37,646 queries churned the data, so data is only available back to February of 2021..."
So.
For those who don't understand why this is direct evidence of fraud, let me explain why they did this:
- There is only 20 MB of space available on the computer system for these crucial log files. That can always be changed and increased, but these systems probably didn't generate enough log entries under normal operation to saturate those files in a standard election process and cause the log file size to exceed 20 MB (just a guess).
- If you get more than 20 MB of log files, system will "FIFO" out (First In, First Out) and chop the oldest text off of the log files so they can continue to write new data to the logs. There are many systems that will choke and cause errors if they cannot write to a log file if they are configured to do so, so many systems are configured this way.
- Someone logged on who could run scripts as an administrator which would allow them to run without entering a password. NOTE: They likely had dozens if not hundreds of people who used the Administrator password, and it was probably known to people who they had no idea knew what it was. They may have even had it taped to the monitors for all I know (this happened in Antrim County, Michigan). This means they have no idea, none whatsoever who ran that script 37,646 times.
- Whoever that person was repeatedly ran the script. Each time they ran the script, the act generated a log entry saying the script was being run with no password, and that the script was run.
- As the script ran and generated a log file entry, it caused the log file to grow larger and larger in size until it reached 20 MB.
- With each running of the script that generated a log file entry, it began to cut off the older log file entries, most likely the ones from before, during, and after November 3, 2020.
- With each running of the script and the accompanying log file entry, any critical and important log file entries from the time surrounding the November 3rd election were chopped off and discarded.
- Whoever the unknown and malicious "administrator" described above was had to repeat this script 37,646 times until they were satisfied no critical or damning log files remained from around the election window.
As someone who has had to personally inspect computers for malicious, intentional activity, the absence of logs (erased) or the manipulation of logs as described above is a GIANT RED FLAG that someone was trying to hide something and cover their tracks.
Of course, there may have been a valid reason someone ran a script all those times. But nobody knows why, what the script did exactly, where the script came from, and...most of all...who ran it.
IF THEY CAN GET THE ROUTER LOGS, THEY MAY WELL BE ABLE TO SEE WHERE THIS SCRIPT WAS BEING RUN FROM.
THEY CAN MATCH UP THE DATES AND TIMES THE SCRIPT WAS RUN WITH THE ROUTER LOG FILE DATES AND TIMES.
AND THAT MAY BE WHY THE PEOPLE RESPONSIBLE FOR THIS FRAUD ARE RESISTING WITH ALL THEIR MIGHT TO RELEASE THE ROUTER INFORMATION.