Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Attorney Sidney Powell Releases 270 Page Document on Massive 2020 Election Fraud Involving Foreign Interference
GATEWAY PUNDIT ^ | 12/26/2020 | Jim Hoft

Posted on 12/26/2020 5:31:36 PM PST by bitt

Kraken 2.0:

Attorney Sidney Powell released an explosive document on foreign interference to Zenger News this week.

The document includes 270 pages of affidavits, evidence and testimony from numerous witnesses and sources.

The 270 page document details election fraud, names and all!

The document includes military and alphabet testimony, and details everything from interference, to origins of voting machine fraud, to cybersecurity intrusions into us elections systems and more.

Zenger wrote, “Powell contends that documents in the binder prove direct foreign interference and fraud tainted the Nov. 3 presidential election, and that President Donald Trump was re-elected. The entire binder is reproduced here for exclusively.”

Here is the 270 page document via Zenger News


TOPICS:
KEYWORDS: bloggers; clown; electionfraud; foreigninterference; lawyer; nokrakenjustcrack; sidneypowell; sidneypowelldoc
Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160161-172 next last
To: bitt
The 270 page document details election fraud, names and all!

The document includes military and alphabet testimony, and details everything from interference, to origins of voting machine fraud, to cybersecurity intrusions into us elections systems and more.

Zenger wrote, “Powell contends that documents in the binder prove direct foreign interference and fraud tainted the Nov. 3 presidential election, and that President Donald Trump was re-elected.

Trump, in his video speech last week: "Americans need to know the facts."

Thomas Jefferson, in the Declaration of Independence: "Let facts be submitted to a candid world."

Lots of people right now: "Let's see what happens."

141 posted on 12/27/2020 2:24:54 AM PST by meadsjn (, )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Steve Van Doorn

This Joshua Merritt thing has been dominating this thread too much. There are other things in Powell’s 270 page report that do not depend on Joshua Merritt’s creds. There is substantial evidence to support election fraud without Merritt’s evidence. One part should not discredit the entire weight of the whole.


142 posted on 12/27/2020 2:29:45 AM PST by jonrick46 ( Leftnicks chase illusions of motherships at the end of the pier.)
[ Post Reply | Private Reply | To 101 | View Replies]

To: proust

To pique your interest for her book coming out this Summer.
$24.95 for all the juicy Kraken details...


143 posted on 12/27/2020 3:12:49 AM PST by EEGator
[ Post Reply | Private Reply | To 14 | View Replies]

To: bitt

Meanwhile the rest of idiot America is waiting for a joe biden inaugural


144 posted on 12/27/2020 3:21:49 AM PST by ronnie raygun ( Massive mistakes are made by arrogant fools; massive evils are committed by evil people.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt
"Attorney Sidney Powell Releases 270 Page Document on Massive 2020 Election Fraud Involving Foreign Interference"

Hmmmm…..is that so? Well, "No Standing." Next.

145 posted on 12/27/2020 3:29:04 AM PST by SkyPilot ("I am the way and the truth and the life. No one comes to the Father except through me." John 14:6)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

here are some key areas of the report:
Below gives an example and shows some of the problems with the 2020 presidential election.It shows enough that one can see how the dems stole the election and have been doing so for many years.
much of it concentrates on Iranian interference with our elections:
Alert (AA20-296B)
Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems
below is the beginning of the joint cyber security advisory.

JOINT CYBER SECURITY ADVISORY
Table of contents

https://us-cert.cisa.gov/sites/default/files/2020-10/AA20-304A-Iranian_Advanced_Persistent_Threat_Actor_Identified_Obtaining_Voter_Registration_Data.pdf

Iranian Advanced Persistent Threat Actor
Identified Obtaining Voter Registration Data
SUMMARY
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge
(ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor
techniques.
This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security
Agency (CISA) and the Federal Bureau of Investigation (FBI). CISA and the FBI are aware of an
Iranian advanced persistent threat (APT) actor targeting U.S. state websites—to include election
websites. CISA and the FBI assess this actor is responsible for the mass dissemination of voter
intimidation emails to U.S. citizens and the dissemination of U.S. election-related disinformation in
mid-October 2020.
1
(Reference FBI FLASH message ME-000138-TT, disseminated October 29,
2020). Further evaluation by CISA and the FBI has identified the targeting of U.S. state election
websites was an intentional effort to influence and interfere with the 2020 U.S. presidential election.
TECHNICAL DETAILS
Analysis by CISA and the FBI indicates this actor scanned state websites, to include state election
websites, between September 20 and September 28, 2020, with the Acunetix vulnerability scanner
(Active Scanning: Vulnerability Scanning [T1595.002]). Acunetix is a widely used and legitimate web
scanner, which has been used by threat actors for nefarious purposes. Organizations that do not
regularly use Acunetix should monitor their logs for any activity from the program that originates from
IP addresses provided in this advisory and consider it malicious reconnaissance behavior.
Additionally, CISA and the FBI observed this actor attempting to exploit websites to obtain copies of
voter registration data between September 29 and October 17, 2020 (Exploit Public-Facing
1 See FBI FLASH, ME-000138-TT, disseminated 10/29/20, https://www.ic3.gov/Media/News/2020/201030.pdf.
This disinformation (hereinafter, “the propaganda video”) was in the form of a video purporting to misattribute
the activity to a U.S. domestic actor and implies that individuals could cast fraudulent ballots, even from
overseas. https://www.odni.gov/index.php/newsroom/press-releases/item/2162-dni-john-ratcliffe-s-remarks-atpress-conference-on-election-security.
To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact
your local FBI field office at
When available, please include the following information
regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of
equipment used for the activity; the name of the submitting company or organization; and a designated point of
contact. To request incident response resources or technical assistance related to these threats, contact CISA at
This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information
carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public
release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction.
For more information on the Traffic Light Protocol, see
FBI | CISA TLP:WHITE
Page 2 of 10 | Product ID: AA20-304A
TLP: WHITE
Application [T1190]). This includes attempted exploitation of known vulnerabilities, directory traversal,
Structured Query Language (SQL) injection, web shell uploads, and leveraging unique flaws in
websites.
CISA and the FBI can confirm that the actor successfully obtained voter registration data in at least
one state. The access of voter registration data appeared to involve the abuse of website
misconfigurations and a scripted process using the cURL tool to iterate through voter records. A
review of the records that were copied and obtained reveals the information was used in the
propaganda video.
CISA and FBI analysis of identified activity against state websites, including state election websites,
referenced in this product cannot all be fully attributed to this Iranian APT actor. FBI analysis of the
Iranian APT actor’s activity has identified targeting of U.S. elections’ infrastructure (Compromise
Infrastructure [T1584]) within a similar timeframe, use of IP addresses and IP ranges—including
numerous virtual private network (VPN) service exit nodes—which correlate to this Iran APT actor
(Gather Victim Host Information [T1592]), and other investigative information.
Reconnaissance
The FBI has information indicating this Iran-based actor attempted to access PDF documents from
state voter sites using advanced open-source queries (Search Open Websites and Domains [T1593]).
The actor demonstrated interest in PDFs hosted on URLs with the words “vote” or “voter” and
“registration.” The FBI identified queries of URLs for election-related sites.
The FBI also has information indicating the actor researched the following information in a suspected
attempt to further their efforts to survey and exploit state election websites.
• YOURLS exploit
• Bypassing ModSecurity Web Application Firewall
• Detecting Web Application Firewalls
• SQLmap tool
Acunetix Scanning
CISA’s analysis identified the scanning of multiple entities by the Acunetix Web Vulnerability scanning
platform between September 20 and September 28, 2020 (Active Scanning: Vulnerability Scanning
[T1595.002]).
The actor used the scanner to attempt SQL injection into various fields in
/registration/registration/details with status codes 404 or 500.
/registration/registration/details?addresscity=-1 or 3*2<(0+5+513-513) —
.................

Exfiltration
Obtaining Voter Registration Data
Following the review of web server access logs, CISA analysts, in coordination with the FBI, found
instances of the cURL and FDM User Agents sending GET requests to a web resource associated
with voter registration data. The activity occurred between September 29 and October 17, 2020.
Suspected scripted activity submitted several hundred thousand queries iterating through voter
FBI | CISA TLP:WHITE
Page 4 of 10 | Product ID: AA20-304A
TLP: WHITE
identification values, and retrieving results with varying levels of success (Gather Victim Identity
Information [T1589]). A sample of the records identified by the FBI reveals they match information in
the aforementioned propaganda video.
Requests
The actor used the following requests.
2020-10-17 13:07:51 x.x.x.x GET /x/x voterid=XXXX1 443 - x.x.x.x curl/7.55.1 -
200 0 0 1406
2020-10-17 13:07:55 x.x.x.x GET /x/x voterid=XXXX2 443 - x.x.x.x curl/7.55
...................

Alert (AA20-296B)
Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems
Original release date: October 22, 2020
Print Document
Tweet
Like Me
Share
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that Iranian advanced persistent threat (APT) actors are likely intent on influencing and interfering with the U.S. elections to sow discord among voters and undermine public confidence in the U.S. electoral process.

The APT actors are creating fictitious media sites and spoofing legitimate media sites to spread obtained U.S. voter-registration data, anti-American propaganda, and misinformation about voter suppression, voter fraud, and ballot fraud.

The APT actors have historically exploited critical vulnerabilities to conduct distributed denial-of-service (DDoS) attacks, structured query language (SQL) injections attacks, spear-phishing campaigns, website defacements, and disinformation campaigns.

Technical Details
These actors have conducted a significant number of intrusions against U.S.-based networks since August 2019. The actors leveraged several Common Vulnerabilities and Exposures (CVEs)—notably CVE-2020-5902 and CVE-2017-9248—pertaining to virtual private networks (VPNs) and content management systems (CMSs).

CVE-2020-5902 affects F5 VPNs. Remote attackers could exploit this vulnerability to execute arbitrary code. [1].
CVE-2017-9248 affects Telerik UI. Attackers could exploit this vulnerability in web applications using Telerik UI for ASP.NET AJAX to conduct cross-site scripting (XSS) attacks.[2]
Historically, these actors have conducted DDoS attacks, SQL injections attacks, spear-phishing campaigns, website defacements, and disinformation campaigns. These activities could render these systems temporarily inaccessible to the public or election officials, which could slow, but would not prevent, voting or the reporting of results.

A DDoS attack could slow or render election-related public-facing websites inaccessible by flooding the internet-accessible server with requests; this would prevent users from accessing online resources, such as voting information or non-official voting results. In the past, cyber actors have falsely claimed DDoS attacks have compromised the integrity of voting systems in an effort to mislead the public that their attack would prevent a voter from casting a ballot or change votes already cast.
A SQL injection involves a threat actor inserting malicious code into the entry field of an application, causing that code to execute if entries have not been sanitized. SQL injections are among the most dangerous and common exploits affecting websites. A SQL injection into a media company’s CMS could enable a cyber actor access to network systems to manipulate content or falsify news reports prior to publication.
Spear-phishing messages may not be easily detectible. These emails often ask victims to fill out forms or verify information through links embedded in the email. APT actors use spear phishing to gain access to information—often credentials, such as passwords—and to identify follow-on victims. A malicious cyber actor could use compromised email access to spread disinformation to the victims’ contacts or collect information sent to or from the compromised account.
Public-facing website defacements typically involve a cyber threat actor compromising the website or its associated CMS, allowing the actor to upload images to the site’s landing page. In situations where such public-facing websites relate to elections (e.g., the website of a county board of elections), defacements could cast doubt on the security and legitimacy of the websites’ information. If cyber actors were able to successfully change an election-related website, the underlying data and internal systems would remain uncompromised..
Disinformation campaigns involve malign actions taken by foreign governments or actors designed to sow discord, manipulate public discourse, or discredit the electoral system. Malicious actors often use social media as well as fictitious and spoofed media sites for these campaigns. Based on their corporate policies, social media companies have worked to counter these actors’ use of their platforms to promote fictitious news stories by removing the news stories, and in many instances, closing the accounts related to the malicious activity. However, these adversaries will continue their attempts to create fictitious accounts that promote divisive storylines to sow discord, even after the election.
Mitigations
The following recommended mitigations list includes self-protection strategies against the cyber techniques used by the APT actors:

Validate input—input validation is a method of sanitizing untrusted input provided by web application users. Implementing input validation can protect against security flaws of web applications by significantly reducing the probability of successful exploitation. Types of attacks possibly prevented include SQL injection, XSS, and command injection.
Audit your network for systems using Remote Desktop Protocol (RDP) and other internet-facing services. Disable the service if unneeded or install available patches. Users may need to work with their technology vendors to confirm that patches will not affect system processes.
Verify all cloud-based virtual machine instances with a public IP; do not have open RDP ports, unless there is a valid business reason to do so. Place any system with an open RDP port behind a firewall, and require users to use a VPN to access it through the firewall.
Enable strong password requirements and account lockout policies to defend against brute-force attacks.
Apply multi-factor authentication, when possible.
Apply system and software updates regularly, particularly if you are deploying products affected by CVE-2020-5902 and CVE-2017-9248.
For patch information on CVE-2020-5902, refer to F5 Security Advisory K52145254.
For patch information on CVE-2017-9248, refer to Progress Telerik details for CVE-2017-9248.
Maintain a good information back-up strategy that involves routinely backing up all critical data and system configuration information on a separate device. Store the backups offline; verify their integrity and restoration process.
Enable logging and ensure logging mechanisms capture RDP logins. Keep logs for a minimum of 90 days, and review them regularly to detect intrusion attempts.
When creating cloud-based virtual machines, adhere to the cloud provider’s best practices for remote access.
Ensure third parties that require RDP access are required to follow internal policies on remote access.
Minimize network exposure for all control system devices. Where possible, critical devices should not have RDP enabled.
Regulate and limit external to internal RDP connections. When external access to internal resources is required, use secure methods, such as VPNs, recognizing VPNs are only as secure as the connected devices.
Be aware of unsolicited contact on social media from any individual you do not know.
Be aware of attempts to pass links or files via social media from anyone you do not know.
Be aware of unsolicited requests to share a file via online services.
Be aware of email messages conveying suspicious alerts or other online accounts, including login notifications from foreign countries or other alerts indicating attempted unauthorized access to your accounts.
Be suspicious of emails purporting to be from legitimate online services (e.g., the images in the email appear to be slightly pixelated and/or grainy, language in the email seems off, the email originates from an IP address not attributable to the provider/company).
Be suspicious of unsolicited email messages that contain shortened links (e.g., via tinyurl, bit.ly).
Use security features provided by social media platforms, use strong passwords, change passwords frequently, and use a different password for each social media account.
See CISA’s Tip on Best Practices for Securing Election Systems for more information.
.................
https://fas.org/sgp/crs/misc/IF10677.pdf
What Does the Designation Mean?
While both DHS and the EAC provided assistance to states
in addressing the security concerns that arose in the run-up
to the November 2016 election, the CI designation had
several notable consequences:
 It raised the priority for DHS to provide security
assistance to election jurisdictions that request it and for
other executive branch actions, such as economic
sanctions that the Department of the Treasury can
impose against foreign actors who attack elements of
U.S. CI, including tampering with elections.
 It brings the subsector under a 2015 United Nations
nonbinding consensus report (A/70/174) stating that
nations should not conduct or support cyber-activity that
intentionally damages or impairs the operation of CI in
providing services to the public. It also states that
nations should take steps to protect their own CI from
cyberattacks and to assist other nations in protecting
their CI and responding to cyberattacks on it. The report
was the work of a group of governmental experts from
20 nations, including Russia and the United States.
 It provided DHS the authority to establish formal
coordination mechanisms for CI sectors and subsectors
and to use existing entities to support the security of the
subsector. Those mechanisms are used to enhance
information sharing within the subsector and to facilitate
collaboration within and across subsectors and sectors.
For example, both the FBI and the Office of the Director
of National Intelligence (ODNI) have participated in
briefing election officials on threats to the EIS
........................

Allied Security Operations Group
Antrim Michigan Forensics Report
REVISED PRELIMINARY SUMMARY, v2
Report Date 12/13/2020
Client: Bill Bailey
Attorney: Matthew DePerno
A. WHO WE ARE
1. My name is Russell James Ramsland, Jr., and I am a resident of Dallas County,
Texas. I hold an MBA from Harvard University, and a political science degree
from Duke University. I have worked with the National Aeronautics and Space
Administration (NASA) and the Massachusetts Institute of Technology (MIT),
among other organizations, and have run businesses all over the world, many of
which are highly technical in nature. I have served on technical government
panels.
2. I am part of the management team of Allied Security Operations Group, LLC,
(ASOG). ASOG is a group of globally engaged professionals who come from
various disciplines to include Department of Defense, Secret Service,
Department of Homeland Security, and the Central Intelligence Agency. It
provides a range of security services, but has a particular emphasis on
cybersecurity, open source investigation and penetration testing of networks. We
employ a wide variety of cyber and cyber forensic analysts. We have patents
pending in a variety of applications from novel network security applications to
SCADA (Supervisory Control and Data Acquisition) protection and safe browsing
solutions for the dark and deep web. For this report, I have relied on these
experts and resources.
B. PURPOSE AND PRELIMINARY CONCLUSIONS
1. The purpose of this forensic audit is to test the integrity of Dominion Voting
System in how it performed in Antrim County, Michigan for the 2020 election.
2. We conclude that the Dominion Voting System is intentionally and purposefully
designed with inherent errors to create systemic fraud and influence election
results. The system intentionally generates an enormously high number of ballot
errors. The electronic ballots are then transferred for adjudication. The intentional
errors lead to bulk adjudication of ballots with no oversight, no transparency, and
no audit trail. This leads to voter or election fraud. Based on our study, we
conclude that The Dominion Voting System should not be used in Michigan. We
further conclude that the results of Antrim County should not have been certified.
2
3. The following is a breakdown of the votes tabulated for the 2020 election in
Antrim County, showing different dates for the tabulation of the same votes.
Date Registered
Voters
Total
Votes
Cast
Biden Trump Third
Party Write-In
TOTAL
VOTES
for
President
Nov 3 22,082 16,047 7,769 4,509 145 14 12,423
Nov 5 22,082 18,059 7,289 9,783 255 20 17,327
Nov 21 22,082 16,044 5,960 9,748 241 23 15,949
4. The Antrim County Clerk and Secretary of State Jocelyn Benson have stated that
the election night error (detailed above by the vote “flip” from Trump to Biden,
was the result of human error caused by the failure to update the Mancelona
Township tabulator prior to election night for a down ballot race. We disagree and
conclude that the vote flip occurred because of machine error built into the voting
software designed to create error.
5. Secretary of State Jocelyn Benson’s statement on November 6, 2020 that “[t]the
correct results always were and continue to be reflected on the tabulator totals
tape . . . .” was false.
6. The allowable election error rate established by the Federal Election Commission
guidelines is of 1 in 250,000 ballots (.0008%). We observed an error rate of
68.05%. This demonstrated a significant and fatal error in security and election
integrity.
7. The results of the Antrim County 2020 election are not certifiable. This is a result
of machine and/or software error, not human error.
8. The tabulation log for the forensic examination of the server for Antrim County
from December 6, 2020consists of 15,676 individual events, of which 10,667 or
68.05% of the events were recorded errors. These errors resulted in overall
tabulation errors or ballots being sent to adjudication. This high error rates proves
the Dominion Voting System is flawed and does not meet state or federal
election laws.
9. These errors occurred after The Antrim County Clerk provided a re-provisioned
CF card with uploaded software for the Central Lake Precinct on November 6,
2020. This means the statement by Secretary Benson was false. The Dominion
Voting System produced systemic errors and high error rates both prior to the
update and after the update; meaning the update (or lack of update) is not the
cause of errors.
3
10. In Central Lake Township there were 1,222 ballots reversed out of 1,491 total
ballots cast, resulting in an 81.96% rejection rate. All reversed ballots are sent to
adjudication for a decision by election personnel.
11. It is critical to understand that the Dominion system classifies ballots into two
categories, 1) normal ballots and 2) adjudicated ballots. Ballots sent to
adjudication can be altered by administrators, and adjudication files can be
moved between different Results Tally and Reporting (RTR) terminals with no
audit trail of which administrator actually adjudicates (i.e. votes) the ballot batch.
This demonstrated a significant and fatal error in security and election integrity
because it provides no meaningful observation of the adjudication process or
audit trail of which administrator actually adjudicated the ballots.
12. A staggering number of votes required adjudication. This was a 2020 issue not
seen in previous election cycles still stored on the server. This is caused by
intentional errors in the system. The intentional errors lead to bulk adjudication of
ballots with no oversight, no transparency or audit trail. Our examination of the
server logs indicates that this high error rate was incongruent with patterns from
previous years. The statement attributing these issues to human error is not
consistent with the forensic evaluation, which points more correctly to systemic
machine and/or software errors. The systemic errors are intentionally designed to
create errors in order to push a high volume of ballots to bulk adjudication.
13. The linked video demonstrates how to cheat at adjudication:
https://mobile.twitter.com/KanekoaTheGreat/status/1336888454538428418
14. Antrim County failed to properly update its system. A purposeful lack of providing
basic computer security updates in the system software and hardware
demonstrates incompetence, gross negligence, bad faith, and/or willful noncompliance in providing the fundamental system security required by federal and
state law. There is no way this election management system could have passed
tests or have been legally certified to conduct the 2020 elections in Michigan
under the current laws. According to the National Conference of State
Legislatures – Michigan requires full compliance with federal standards as
determined by a federally accredited voting system laboratory.
15. Significantly, the computer system shows vote adjudication logs for prior years;
but all adjudication log entries for the 2020 election cycle are missing. The
adjudication process is the simplest way to manually manipulate votes. The lack
of records prevents any form of audit accountability, and their conspicuous
absence is extremely suspicious since the files exist for previous years using the
same software. Removal of these files violates state law and prevents a
meaningful audit, even if the Secretary wanted to conduct an audit. We must
conclude that the 2020 election cycle records have been manually removed.
4
16. Likewise, all server security logs prior to 11:03 pm on November 4, 2020 are
missing. This means that all security logs for the day after the election, on
election day, and prior to election day are gone. Security logs are very important
to an audit trail, forensics, and for detecting advanced persistent threats and
outside attacks, especially on systems with outdated system files. These logs
would contain domain controls, authentication failures, error codes, times users
logged on and off, network connections to file servers between file accesses,
internet connections, times, and data transfers. Other server logs before
November 4, 2020 are present; therefore, there is no reasonable explanation for
the security logs to be missing.
17. On November 21, 2020, an unauthorized user unsuccessfully attempted to zero
out election results. This demonstrates additional tampering with data.
18. The Election Event Designer Log shows that Dominion ImageCast Precinct
Cards were programmed with new ballot programming on 10/23/2020 and then
again after the election on 11/05/2020. These system changes affect how ballots
are read and tabulated, and our examination demonstrated a significant change
in voter results using the two different programs. In accordance with the Help
America Vote Act, this violates the 90-day Safe Harbor Period which prohibits
changes to election systems, registries, hardware/software updates without
undergoing re-certification. According to the National Conference of State
Legislatures – Michigan requires full compliance with federal standards as
determined by a federally accredited voting system laboratory.
19. The only reason to change software after the election would be to obfuscate
evidence of fraud and/or to correct program errors that would de-certify the
election. Our findings show that the Central Lake Township tabulator tape totals
were significantly altered by utilizing two different program versions (10/23/2020
and 11/05/2020), both of which were software changes during an election which
violates election law, and not just human error associated with the Dominion
Election Management System. This is clear evidence of software generated
movement of votes. The claims made on the Office of the Secretary of State
website are false.
20. The Dominion ImageCast Precinct (ICP) machines have the ability to be
connected to the internet (see Image 11). By connecting a network scanner to
the ethernet port on the ICP machine and creating Packet Capture logs from the
machines we examined show the ability to connect to the network, Application
Programming Interface (API) (a data exchange between two different systems)
calls and web (http) connections to the Election Management System server.
Best practice is to disable the network interface card to avoid connection to the
internet. This demonstrated a significant and fatal error in security and election
integrity. Because certain files have been deleted, we have not yet found origin
or destination; but our research continues.
5
21. Because the intentional high error rate generates large numbers of ballots to be
adjudicated by election personnel, we must deduce that bulk adjudication
occurred. However, because files and adjudication logs are missing, we have not
yet determined where the bulk adjudication occurred or who was responsible for
it. Our research continues.
22. Research is ongoing. However, based on the preliminary results, we conclude
that the errors are so significant that they call into question the integrity and
legitimacy of the results in the Antrim County 2020 election to the point that the
results are not certifiable. Because the same machines and software are used in
48 other counties in Michigan, this casts doubt on the integrity of the entire
election in the state of Michigan.
23. DNI Responsibilities: President Obama signed Executive Order on National
Critical Infrastructure on 6 January 2017, stating in Section 1. Cybersecurity of
Federal Networks, “The Executive Branch operates its information technology
(IT) on behalf of the American people. The President will hold heads of executive
departments and agencies (agency heads) accountable for managing
cybersecurity risk to their enterprises. In addition, because risk management

Above is a perfect example of how voter fraud using the scytl/dominion machines was effected in this one case.
It’s illustrative since it is the same method used over and over and over. It’s a slick form of cheating that is hard to trace and can only be discovered by an expert such as the one below

My name is Russell James Ramsland, Jr., and I am a resident of Dallas County,
Texas. I hold an MBA from Harvard University, and a political science degree
from Duke University. I have worked with the National Aeronautics and Space
Administration (NASA) and the Massachusetts Institute of Technology (MIT),
among other organizations, and have run businesses all over the world, many of
which are highly technical in nature. I have served on technical government
panels.
2. I am part of the management team of Allied Security Operations Group, LLC,
(ASOG). ASOG is a group of globally engaged professionals who come from
various disciplines to include Department of Defense, Secret Service,
Department of Homeland Security, and the Central Intelligence Agency. It
provides a range of security services, but has a particular emphasis on
cybersecurity, open source investigation and penetration testing of networks. We
employ a wide variety of cyber and cyber forensic analysts. We have patents
pending in a variety of applications from novel network security applications to
SCADA (Supervisory Control and Data Acquisition) protection and safe browsing
solutions for the dark and deep web. For this report, I have relied on these
experts and resources.
B. PURPOSE AND PRELIMINARY CONCLUSIONS
The purpose of this forensic audit is to test the integrity of Dominion Voting
System in how it performed in Antrim County, Michigan for the 2020 election.
2. We conclude that the Dominion Voting System is intentionally and purposefully
designed with inherent errors to create systemic fraud and influence election
results. The system intentionally generates an enormously high number of ballot
errors. The electronic ballots are then transferred for adjudication. The intentional
errors lead to bulk adjudication of ballots with no oversight, no transparency, and
no audit trail. This leads to voter or election fraud. Based on our study, we
conclude that The Dominion Voting System should not be used in Michigan. We
further conclude that the results of Antrim County should not have been certified.
the above shows how the dems manipulated millions of votes and were able to do it most anywhere in the world.

This should be incriminating evidence for Sidney POwells group to use in making the case that there were not free and fair elections.


146 posted on 12/27/2020 4:31:20 AM PST by rodguy911 ((FreeRepublic home of the free because of the Brave---Where we go One))
[ Post Reply | Private Reply | To 1 | View Replies]

To: bitt

People have been put on Death Row and executed with less evidence...


147 posted on 12/27/2020 5:44:18 AM PST by trebb (Fight like your life and future depends on it - because they do.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: RummyChick

People have been put on death row and executed with less evidence.


148 posted on 12/27/2020 5:45:09 AM PST by trebb (Fight like your life and future depends on it - because they do.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: DoubleNickle

Ahh, it was you. You can see it made an impression on me because you addressed the thing that had been the most important to me.

There will still be people that believe the Army is lying and everyone is lying and that Joshua is even lying now..and that he really is everything Powell was making him out to be.

To that I say...good luck with believing Powell is going to save the day

The very fact that she outed her own super secret witness shows was a mess up all of this has truly been


149 posted on 12/27/2020 5:50:50 AM PST by RummyChick (I BLAME KUSHNER)
[ Post Reply | Private Reply | To 124 | View Replies]

To: bitt

Two documents are readable with evidence, the Navarro report and the Ramsland report. The rest is crap in my opinion.


150 posted on 12/27/2020 5:56:52 AM PST by kvanbrunt2 (spooks won on day 76)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GeorgeWashington1777

True dat.


151 posted on 12/27/2020 6:18:25 AM PST by OKSooner (This right here is how to do a paragraph break. ==> <p>)
[ Post Reply | Private Reply | To 76 | View Replies]

To: kvanbrunt2
The rest is crap in my opinion.

=========
Not sure about "crap" but just loose ends on a ball of thread that need to be teased and pulled to see if the information leads elsewhere. Work papers forming a body of knowledge.

152 posted on 12/27/2020 7:30:02 AM PST by ptsal (Vote R.E.D. >>>Remove Every Democrat ***)
[ Post Reply | Private Reply | To 150 | View Replies]

To: malach

RE: Tell your Senators and Representatives to read this, especially p.66-70+....

I am behind enemy lines in Gretchen Whitmer’s Michigan.
The all Dem representation here will be happy to ignore the item or toss it into the garbage.

Their minds are closed. I know they know their party cheated. They know they are doing things that are evil. Doing it all anyway like teens carjacking a luxury car and then robbing a convenience store and going out for a good time later. With no consequences. “No suspects.”


153 posted on 12/27/2020 7:45:00 AM PST by frank ballenger (End vote fraud harvesting,non-citizen voting & leftist media news censorship or we are finished.)
[ Post Reply | Private Reply | To 130 | View Replies]

To: proust

Yeah, it’s rubbish. I flipped through it and it’s a bunch of crap.


154 posted on 12/27/2020 8:12:26 AM PST by dinodino ( )
[ Post Reply | Private Reply | To 14 | View Replies]

To: Eccl 10:2
That is not a summary, and it tells the reader absolutely nothing.

A table of contents is an ordered overview or summary that describes to anyone who can read, exactly what is contained in a book or document.
155 posted on 12/27/2020 10:15:30 AM PST by Brown Deer (America First!)
[ Post Reply | Private Reply | To 57 | View Replies]

Comment #156 Removed by Moderator

To: teletech

“The proof is there but courts do NOT like to overturn elections and I suspect we won’t win with the best of the best. Will Pence help now? Well THAT is the $64,000 question isn’t it.”

It isn’t just the courts. There’s been no success in convincing Republican controlled state legislatures in overturning their state’s results despite the Constitution giving the state legislatures the authority to do so.


157 posted on 12/27/2020 1:56:10 PM PST by Armscor38
[ Post Reply | Private Reply | To 78 | View Replies]

To: teletech
The proof is there but courts do NOT like to overturn elections

Our side isn't trying to OVERTURN the election.

158 posted on 12/27/2020 1:57:55 PM PST by Balding_Eagle ( The Great Wall of Trump ---- 100% sealing of the border. Coming soon. )
[ Post Reply | Private Reply | To 78 | View Replies]

To: j.havenfarm

“Your comment is one of the most trenchant I’ve read since the election. Yes, this election was stolen. But this blizzard of bombshells, promises of dramatic revelations, free beer tomorrow, etc. is getting us nowhere fast. Powell, Giuliani, whoever: as you say, fighting in and of itself is pointless unless you really can... as you have repeatedly promised... deliver a knockout blow”

I find it curious this adulation for those supposedly on our side who are racking up impressive loss records and have yet to deliver on promises.

I’m sure the likes of Powell and others will try and put the blame on others but in the end, they have to take full responsibility because they couldn’t overcome obstacles and that’s all on them.


159 posted on 12/27/2020 2:17:33 PM PST by Armscor38
[ Post Reply | Private Reply | To 111 | View Replies]

To: faithhopecharity; bitt; All

“..not in time for it to do any good..”

I believe it will do TONS of good in GEORGIA and future elections.

Republicans are already aggressive in GEORGIA like making sure there are many Republican poll watchers that won’t leave before the counting is over,, etc..

We learned by our mistakes in not realizing just how corrupt most Dems are.

And maybe it’s not too late for President Trump. We need a lot of PRAYING.


160 posted on 12/27/2020 2:43:01 PM PST by Sun (Pray that God sends us good leaders. Please say a prayer now.)
[ Post Reply | Private Reply | To 10 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160161-172 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson