Posted on 03/03/2024 12:36:23 PM PST by ransomnote
Noah’s Nightly Newsletter – 3/4/24
https://truthlion.com/noahs-nightly-newsletter-3-4-24/
* Texas’ Wildfires May Have Long Term Effect On Beef Cattle Industry
* Bitcoin Is Inches Away From A New All Time High, Bo Polny Told Me What Happens Next…
* The Upcoming U.S. Eclipse Just Got Even Stranger!
* HANK KUNNEMAN: “There will be secrets that will be revealed that will cause so much damage”
* Nikki Haley Finally Wins A GOP Primary, Trump Responds
* NEW REPORT Claims Nikki Haley Is Cancelling All Ad Spend, Is She Done?
* 9-0: Supreme Court Unanimously Sides With President Trump In Landmark Ruling
* Colorado Secretary Of State Has Meltdown On Live TV After UNANIMOUS Supreme Court Ruling Against Her
* President Trump Addresses The Nation After Historic SCOTUS Win
* Does President Trump’s Big SCOTUS Win Give Enough Time To Get His Name BACK ON The Paper Ballots?
* How Is It That More Americans Don’t Know About This “Silent Boycott” That’s Crushing Woke Corporations?
A look of Stupid Surprise. I guess she really thought SCOTUS would just ratify their ignorance of constitutional law and, of course, the actual need to convict someone of “insurrection”.
I was wondering where everyone went!
! Sent to Daughter!
THE LARGEST VOTING MACHINE MANUFACTURER’S STUNNING ADMISSION TO TEXAS ATTORNEY GENERAL KEN PAXTON...
“The Manuals also include the passwords needed to access such menus...”
https://immutabletruthelections.substack.com/p/the-largest-voting-machine-manufacturers
Excerpt:
lection Systems and Software (ES&S) have been doing their best to hide Federal and State Election Records from the public. When we started requesting “Audit Logs” and other “Official Election Records” they quickly sent out a bulletin to their customers to not comply with our lawful public records requests for “Official Election Records”. I previously covered this illicit activity last year.
Recently Texas Attorney General Ken Paxton ruled that Texas election administrators were required to provide the “Audit Logs” and “Election Records” that we had been requesting.
In ES&S’ attempt to conceal some of the information requested, they claimed that to disclose some of the information that we had requested would constitute a violation of United States Copyright law.
I personally challenged this exemption under a “Fair Use” exemption to United States Copyright Law to every Texas municipality using ES&S systems to administer elections in Texas. I specifically noted the United States Justice Department position on “Fair Use”.
“…inconceivable that any court would hold such reproduction to constitute infringement.”
ES&S countered with a 27 page legal brief explaining that my particular uses did not meet the legal requirements under “Fair Use”. They also made a stunning admission that completely exposed the extent of the ACTUAL FRAUD that ES&S has been a massive beneficiary of.
On pages 6 - 7 ES&S clearly states that the manuals that we had requested copies of contained default administrator logins and passwords. .....
This stunning admission by ES&S to Texas Attorney General Ken Paxton is an admission that ES&S knowingly and willingly violated every cybersecurity protocol and best practice in place today. This is an admission that ES&S has not followed NIST guidelines nor CISA guidelines for electronic systems and software deemed to be “Critical Infrastructure”.
This admission by ES&S certainly does explain why they do not want anyone inspecting the “Machine Configuration Reports”, “Audit Logs” and “Error Logs”. It certainly appears that ES&S’ idea of security best practices are security by obscurity.
This stunning admission by ES&S to Texas Attorney General Ken Paxton is an admission that ES&S knowingly and willingly violated every cybersecurity protocol and best practice in place today. This is an admission that ES&S has not followed NIST guidelines nor CISA guidelines for electronic systems and software deemed to be “Critical Infrastructure”.
This admission by ES&S certainly does explain why they do not want anyone inspecting the “Machine Configuration Reports”, “Audit Logs” and “Error Logs”. It certainly appears that ES&S’ idea of security best practices are security by obscurity.
Any voting system connected to the internet via a modem or network device should not be used to administer elections. We know that they are. ES&S openly admitted that their systems were.
.....To to recap, ES&S knowingly included passwords and logins in their manuals, that allow for anyone with the login and password to access the systems. ES&S also then built and deployed these systems, with modems and network cards that are connected to the internet.
.....
On pages 6 - 7 ES&S clearly states that the manuals that we had requested copies of contained default administrator logins and passwords. See below:
different. The Requestor demands to be “provided” with manuals and other items for the DS2000, DS450, DS850, ExpressTouch, ExpressVote, and ExpressVote XL, all of which are products of ES&S. (See Exhibit A). The Manuals for these voting systems contain detailed information on the structure, logic, operation, and functionalities of the equipment. Specific 4 17 U.S.C.A. S 101 et seq; see also https://www.copyright.gov/what-is-copyright/# Last accessed:
February 21, 2024.
4867-3231-9398.6
Page 7
February 26, 2024
confidential information relating to these items include, but is not limited to, administrator access information (which allows election administrators the ability to access certain menus and make changes to settings, including security settings, contained within the equipment).
The Manuals also include the passwords needed to access such menus and provide detailed Information on the settings and options contained within those menus. Some of the Manuals
also detail how to access, manage and change the election qualification code, administrator passcodes, override passcodes, and election passcodes.
If such information were made widely available, there is a material, substantial risk that nefarious actors could anonymously and openly exploit such information, which poses a serious threat to critical Texas voting system infrastructure.
More images available at https://immutabletruthelections.substack.com/p/the-largest-voting-machine-manufacturers
Obama must write her speeches: attack Donald Trump and promise clear skies, a chicken in every pot and mama's apple pie. . . . . . "Hope and Change" 🤷😂
I think she has been promised that DJT will be no problem... he will be taken 'out'👈
Any voting system connected to the internet via a modem or network device should not be used to administer elections. We know that they are. ES&S openly admitted that their systems were.
Is there any remote communication technology associated with your proposed solution?
If so, explain.
ES&S RESPONSE
The future upgrade includes adding the remote communications technology both dialup and wireless supported by our other products to this product release. The future EMS network is
based on the proposed technology architecture. The EMS system includes a Windows 2008 R2 Server and Windows 7 Professional Workstations. The Workstations can be either desktop or laptop computers. The Workstations are then connected to the server using a gigabit switch.
The current closed loop LAN was given top priority when adding the wireless and wired data communications to the network architecture. In order to support the wireless and wired communications, a Demilitarized Zone (DMZ) was setup to host an SFTP Server. The DMZ configuration includes a Cisco ASA 5505 firewall and a Windows 2008 R2 Communications
Server. This Server hosts both a SFTP and a Syslog Server. This Server may also host a Routing and Remote Access (RAS) Server if wired (dialup) communications is used.
The firewall supports three VLANs, Outside (Internet), Inside (EMS Network), and DMZ (SFTP Server). The firewall has a specialized configuration, which only allows: l) the SSH protocol Enhancing the State of Colorado Election Process Uniform Voting System Request for Proposal
December 4, 2013
Section 9.0 — General Questions
14 between the Internet and DMZ, 2) the SSH protocol between the DMZ and the EMS Network, 3) the Network Time Protocol (NTP) to set its internal clock, and 4) logging to a Syslog server resident on the Server in the DMZ.
*******The DS200 Tabulators use wireless modems to connect to the SFTP Server via the Internet.********* (my emphasis)
In order to logon to the SFTP Server, each DS200 Tabulator is given a unique User ID and Password. The SFTP Server is configured to only allow the DS200 to push (send) data to the SFTP Server. The DS200 Tabulators are not allowed to pull data from the SFTP Server. The DS200 Tabulators may also use wired (dialup) modems to connect to the SFTP Server via the RAS Server. When using wired modems, before the DS200 Tabulator can communicate to the SFTP Server, it must first authentication with the RAS Server using Windows User ID and Password Authentication.
The Regional Results Transfer application allows results files accumulated on DS200 media devices at remote polling locations to be sent to Election Central from Regional Results Transfer sites. The Regional Results Transfer application runs on a Window 7 PC. The network options
include Ethernet, dialup, wireless mobile broadband and MiFi (mobile WiFi). In order to pull data into the EMS Network, an SFTP Client is installed on one of the ERM
Workstations within the EMS Network. The SFTP Server is configured to only allow the SFTP Client to pull (receive) data from the SFTP Server in the DMZ. The SFTP protocol used by both SFTP Server and SFTP Client is FIPS 140-2 compliant. Attached is a network diagram and a list containing hardware configurations and the required COTS software for the proposed system. The DS850 can be connected to the EMS network to an SFTP Server hosted on the EMS Server.
Each DS850 is given a unique User ID and Password. The SFTP Server is setup so that the DS850 transmitted data is stored directly into the proper election data folder on the EMS Server.
s/b Sol Duc Falls
The fact patterns of Seth Rich’s murder and Donald Young’s murder have nearly the same fact patterns, both killed to protect a Dem Presidential candidate, both have earmarks of similar wetwork contractors being used.
~~~~~~~~~~~~
Another person killed Scalia. I remember a wiki-leaked email from Podesta to (?) someone that clearly referred to Scalia’s murder.
I’m not fully convinced about the blue roof thing.
THe name on the can of paint makes it funny...
The smallest act of kindness
is worth more than the greatest intention.
Khalil Gibran
Duh....teeny print is my excuse (and increasingly poor eyesight)
Goodnight L.J.!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.