Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: Mount Athos

Reformatted . . .


Dominion is only one piece of the puzzle.

Everyone is talking about investigating paper ballots and evidence of dead voters, but there are other layers to our election IT infrastructure with glaring vulnerabilities! The vulnerabilities outlined below could allow quick and impossibly large vote count changes.

Russel Ramsland of Allied Security Operations Group, walks through vulnerabilities of software used in 2018 and 2020 elections:

Russel Ramsland of Allied Security Operations Group - YouTube video:
https://www.youtube.com/watch?v=ficae6x1Q5A

Russel Ramsland of Allied Security Operations Group:
https://asog.us/


TL;DW:

As a result of the 2002 HAVA Act, most counties don’t run elections anymore. Private Companies with Private Shareholders under contract to counties run our elections. And these companies do it with virtually NO Transparency or Supervision.

• The entire election system infrastructure is a complex patchwork of various private companies doing various parts of it. ALL of it is exposed to the internet, the idea of it being air-gapped is a myth. The voting companies own manuals show this. Some of these companies conduct elections all over the world, effectively being in a position to control some of the outcomes

• Some of the companies are foreign owned with servers outside this country, and they are the last ones to actually control the so-called “unofficial” votes. BUT, it is the “Unofficial” votes that eventually control “Official” votes.

• There are no security standards for election software. Hence any certifications are largely just agreed on an ad hoc basis between the certifying company and the election company and therefore don’t mean much.

• Most State SOS offices fail to grasp the extent and vulnerabilities within their systems, and so they grant waiver to their State law and voting code to counties and election companies which exacerbate the problem.

• Investigation revealed at least a dozen or more entry points where votes can and are being switched and the audit trails changed or erased so that a forensic investigation finds no trace. It has to be caught in real time. Even the operator of the election system can change votes undetected.


Error log comparisons across counties illustrate suspicious activity

• Found Voting Companies’ public facing sites to be vulnerable, such that:

— Admin names and passwords for critical information files are in the open, in a file, right before each file containing critical information

— Voter Registration lists by precinct (Worldwide) including all DL (Download?) info and Personally Identifiable Information (PII)

— All previous vote uploads

— All Source Code (Many companies are using the same basic source code structure)

• Found software so vulnerable that operators and even some outside players can change votes utterly undetected, either NO audit trail (Hart) or erasable or changeable audit trail (ES&S, Dominion, etc.), so no evidence of vote changing can be found

— Access to the companies’ entire AWS (Amazon Cloud) databases

— All ballots

— All counting and tallying functions

• Discovered they could make any candidate win or lose by directly altering votes at the server/database level for any election most companies conduct, worldwide.

• Many state’s votes are stored, controlled, and reported by a company in Frankfurt, Germany.

• Issue with tabulation software can ‘flip’ under votes to opposite candidate

• Vulnerabilities explain how 138,339 ballots could be counted within 3 hours and go 100% to Biden

• Explains ridiculous turnout numbers in many states


Detectable malware called QSnatch has the following capabilities:

• Log and scrape credentials for counties, as well as ability to login to password protected areas of their sites

• Execute arbitrary code on a device

• Steal config and log files

• The only way to get rid of QSnatch is a full factory reset before patching a device. (QSnatch is able to dodge security patches that target itself)


Found instances of the following:

• “Ghosts” -— These are people using another person’s residence as their legal permanent address for voting purposes and no one living there has ever heard of them.

• “Phantoms” -— These are people who check in under their own name, but their vote is somehow attributed to someone else. Or, people who check in to vote and find someone has already voted in their name.

• “Purged” or “Tampered” -— These are voting records the County posts as having been voted, but then later are purged or otherwise tampered with, and sometimes re-instated with different data later at a later date. Dallas has approximately 57,000 instances of this thus far. Harris (county) has around 250,000 instances. On some days, the number of votes tampered with are so huge it can only be done by computer programming. However, some days the number of votes tampered with are small enough that local operators could be doing it.


Escalation:

• DHS eventually had some employees in the field sit down with ASOG to look at gathered data. They agreed that the data was accurate and that the vulnerabilities are horrible. They have been unable to accelerate the issue to their supervisors effectively

• FBI has no interest in the findings and turned ASOG away many times

• I have sent this video through Trumps voter fraud form with some context - advising that they speak with Ramsland if they haven’t already.



6 posted on 11/10/2020 12:49:46 AM PST by linMcHlp
[ Post Reply | Private Reply | To 1 | View Replies ]


To: linMcHlp

thank you. Wow I did a poor job on this post


9 posted on 11/10/2020 1:01:25 AM PST by Mount Athos
[ Post Reply | Private Reply | To 6 | View Replies ]

To: linMcHlp

Mark


12 posted on 11/10/2020 1:58:40 AM PST by griswold3 (Democratic Socialism is Slavery by Mob Rule)
[ Post Reply | Private Reply | To 6 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson