Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Clowns, Hammers, Scorecards, and Con Man: The Dubious and Fraudulent Data From Dennis Montgomery That Allegedly Proved Foreign Election Intrusion
The Illustrated Primer ^ | 02/12/2021 | Yaacov Apelbaum

Posted on 02/12/2021 5:45:47 PM PST by SeekAndFind

On early January, 2021, Mary Fanning and Alan Jones published two pieces in The American Report titled:

Proof Positive: Coordinated Cyberwarfare Attack Against US By China, Russia, Iran, Iraq, Pakistan To Steal Election From Trump.

and

STEALING AMERICA: ‘Former’ Communist Comey Got SCORECARD Election Hacking
Source Code And Knew SolarWinds Was Not Secure

These articles claim to have a positive proof of a massive coordinated international cyber attack against multiple US election sites during the first week of December, 2020. The stated aim of this attack was allegedly to steal the elections from Trump. The authors of these articles claim that two secret tools were used in the attack, one called “Hammer” the second called “Scorecard”. The source of this high-grade secretive Intel was a mysterious and apparently very well contacted individual by the name of Dennis Lee Montgomery.

The American Report articles came with a large volume of supporting data sets and charts that purports to show the details of these massive cyber attacks. The data includes source and target IP and MAC address, the method of infiltration, and the vote count changes to several voting systems.  All in all, a smoking gun and the stuff that cyber unicorn dreams are made of.

I wasn’t aware of this claim until a friend asked me to look it over. It didn’t take long to reach the conclusion that the Montgomery data referenced in these two articles is a crude fabrication.

Sample data issues
Image 1
: Sample data anomalies. (1) One of the sources for the alleged attack, an entity called “SHENZHEN SUNRISE TECHNOLOGY CO.,LTD. 200”, is a Hong Kong based company, but, it shows up with 157 different IP address ranges in the Beijing area. (2) The “LA PAZ COUNTY CELECTIONS” shows up in two different states with two different IP addresses. (3) The IP address of the Michigan Alcona county targets is both 3.134.56.143 (Columbus, Ohio) and 107.180.25.0 (Ashburn, Virginia)

A superficial evaluation of Montgomery’s data shows that it’s laced with large number of errors and anomalies. Here are a few examples:

  1. Many of the source and destination IP addresses don’t match the locations specified in the location description
  2. Some of the company/entity names don’t match the assigned geo locations
  3. The “SOURCE OWNER” column uses DBA names for companies instead of the actual legal name, which is what you would get if you did an actual low level IP to organization resolution
  4. All of the destinations are protected with firewalls, so, the “INTRUSION METHOD” referencing the word “FIREWALL” is meaningless. From the limited attack vocabulary its obvious that whoever wrote this isn’t familiar with actual cyber offensive operations
  5. The DATE column is missing a time zone data. The odd distribution pattern of date time stamps also strongly suggests that they are non organic and were produced using some sort of a cyclic function with a random number generator
  6. Some of the records are incomplete, for example, one row states that “TRUMP: DOWN 44,905”, but it failed to add the a “Y” under the corresponding “SUCCESS” column
  7. The tabs on the spreadsheet show that the titles were created manually (“Sheet 1” vs. “Sheet1”), which is unlikely if this data came from an automated process
  8. The values in the fields titled “SOURCE ID” and “TARGET ID”, which have a MAC address format were most likely created with a random number generator. A sampling of these MAC addresses yielded no results of knows network card manufacturers

As far as the man behind the source of this highly secretive information, it turns out that it came form Dennis Montgomery. A certified lifelong shyster with multiple high visibility cons to his name. As Ecclesiastes 1:9 observes, there is nothing new under the sun, and it turns out that Montgomery latest con is almost identical to several other projects he pulled over the years on some sophisticated victims like the DoD, CIA, various LEAs, and the DOJ.

Dennis Lee Montgomery The Con Man
Image 2
: The profile of king of con Dennis Lee Montgomery and his promoter Mary Fanning Penny 

It’s not entirely clear who paid Montgomery to forge the data and promote this fabrication. Motivation wise, It could be just another con and money making venture, but, it’s also possible that it’s a political gambit that is designed to kill any real discussion about potential election fraud.

My advice to anyone reading The American Report and contemplating the truthfulness of these QAnon style prophetic claims is: be aware of false prophets, they come to you in sheep’s clothing, but inwardly they are ravenous wolves. 

If you want to investigate possible election fraud, you don’t need fantastic hush-hush sources that come from ‘secrete’ government projects. Just focus on factual evidence that can stand-up in court. Like for example: official CCTV footage with chain of custody verification that shows identifiable vehicles delivering dozens of ballot boxes in the wee hours of the night. Then, counting these ballots without supervision and the resulting one sided statistical vote anomalies.


References and Sources
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object classification

https://apelbaum.files.wordpress.com/2021/02/mike-zullo-interviews-dennis-montgomery.mp3 Audio 1: Excerpt of a 2017 Mike Zullo interview with Dennis Montgomery. Most of the claims made by Montgomery during the interview show a complete ignorance of cyber security tradecraft and practices

When the FBI tied Montgomery to a tree – Page 5

Click to access cyber-attack-data.pdf
Document 1: Dennis Montgomery’s foreign election cyber attack data set

MAC Address Lookup
IP Address Lookup


TOPICS: Computers/Internet; Conspiracy; Politics; Society
KEYWORDS: cyberwarfare; dennismontgomery; electionfraud; fraud; hammer; scorecard; security
Poor Mike Lindell got conned into including Dennis Montgomery's disinformation in his film proving that the November election was stolen - ABSOLUTE PROOF.
1 posted on 02/12/2021 5:45:47 PM PST by SeekAndFind
[ Post Reply | Private Reply | View Replies]

To: SeekAndFind

Not surprising. That spreadsheet contained data that would have been very hard to obtain, such as the exact number of changed votes. If you are able to obtain such specific info, you should be ready and willing to explain EXACTLY how you got it. Where’s the big document containing the details?


2 posted on 02/12/2021 6:25:56 PM PST by TChad (The MSM, having nuked its own credibility, is now bombing the rubble.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

Thanks for following up and exposing this as a fraud. It will be interesting if we learn who financed this scam.


3 posted on 02/12/2021 6:26:04 PM PST by Ben Hecks (Don't Google it - Duck it!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

Bkmk


4 posted on 02/12/2021 7:11:18 PM PST by sauropod (#ImpeachMcConnell. #Resist. #NotMyPresident.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

I don’t know why it is, but for some reason I have found different searches for IP addresses have returned different data on the IP. I’ve seen different geolocation searches turn up highly different locations for the same IP, and I have come up with different owners as well.

I assume it has to do with things like your company getting service from a Cable internet provider, who uses another provider itself, and one search throws out your exact location, while the other throws out the home office of your internet provider’s provider, who could be in a different state because it operates across five or six states.

Using this as a basis to debunk the data is suspicious to me, as it might not be malicious, but just a consequence of how different search systems work.

Likewise, the fact some show a vote change, but fail to add Y to the column asking if there was success would say to me this was turned out automatically, and not by somebody going line by line and making it up.

I don’t vouch for anybody, or know where this data came from or if it is legit, but we should be careful with anybody trying to debunk it all off a “superficial” inspection. My impression was if just 70 or 80% of it, or even 30 or 40% of it is accurate, and the rest was pulled from incomplete or poorly aggregated, or unverifiable sources, it is still a bombshell.

Somebody needs to explain exactly where this came from, if it was a legit government leak, or the product of a capable contractor.


5 posted on 02/12/2021 7:19:01 PM PST by AnonymousConservative (DO NOT send me sensitive information, I am under domestic surv coverage, and they will see it too.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

Are we to understand from this that any mention of “Hammer & Scorecard” is a reference to total fabrication, wishful thinking, and a phantom menace?


6 posted on 02/12/2021 7:25:10 PM PST by Fester Chugabrew (No audit. No peace.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: AnonymousConservative

RE: Somebody needs to explain exactly where this came from, if it was a legit government leak, or the product of a capable contractor.

When I saw this portion of Mike Lindell’s film - ABSOLUTE PROOF, these were my first questions :

1) Who is this Mary Fanning who is the source of this spreadsheet that Mike Lindell’s film is showing? What’s her technical background and her expertise?

2) Where and How did she collect and gather her data? Who provided it for her?

These were the basic and NECESSARY questions that come to mind and are reasonable ones. That these were not even addressed is the major flaw in this particular segment of the film.


7 posted on 02/12/2021 7:25:29 PM PST by SeekAndFind
[ Post Reply | Private Reply | To 5 | View Replies]

To: SeekAndFind

Are we also to understand from this that voting machines are in no way ever connected to the internet and the Antrim County, MI anomalies are a fiction?


8 posted on 02/12/2021 7:28:03 PM PST by Fester Chugabrew (No audit. No peace.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

Those are great questions, but let’s wait for the New York Times to provide some investigative efforts, okay?


9 posted on 02/12/2021 7:29:32 PM PST by Fester Chugabrew (No audit. No peace.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Fester Chugabrew

RE: Are we also to understand from this that voting machines are in no way ever connected to the internet and the Antrim County, MI anomalies are a fiction?

First question on internet connection — Jovan Pulitzer has PUBLICLY demonstrated that the Dominion Voting machines DO connect to the internet. Therefore all statements by their employees up to their CEO that the machines are not internet connectible are FALSE. See here:

https://pjmedia.com/election/victoria-taft/2020/12/30/tech-expert-shocks-ga-election-fraud-hearing-with-news-he-got-into-voting-system-with-wifi-n1293439

The Antrim County anomalies are NOT fiction. It is true that thousands of votes for Trump were switched to Biden. Whether they were DELIBERATE or a result of human error is in dispute.


10 posted on 02/12/2021 7:35:14 PM PST by SeekAndFind
[ Post Reply | Private Reply | To 8 | View Replies]

To: SeekAndFind

Qtards were spreading this nonsense all over Free Republic.

Dumbasses.


11 posted on 02/12/2021 7:37:01 PM PST by Mariner (War Criminal #18)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

That there are errors in the spreadsheet is not surprising, and they don’t disprove the entirety. And it’s not surprising that their are people happy to criticize Dennis Montgomery. A way to “debunk” the spreadsheet is to identify data related to a county where equipment audits have actually occurred, namely Antrim County, MI. How do claimed IP and MAC addresses for Antrim County precincts line up with the audit findings? If the precincts actual have equipment with the MAC IP and addresses on the chart, check the logs on those machines for evidence of intrusion at the specified time. No such computer, or no such intrusion = debunked.

I’ve never thought it wise to hang any hats on the international cyberconspiracy angle. What would seem to be provable fraud via faked ballots, illegal voters, dead voters, out-of-staters, underaged, unregistered, unverified signatures, etc., are tangible, provable things that add up to more than enough to change the outcome of the election.


12 posted on 02/12/2021 7:52:08 PM PST by Chewbarkah
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

We seem to be of the same mind. Upon seeing the final portion of Lindell’s presentation, I was asking myself how easy it would be to fabricate the Fanning screenshots. This much I know: we believe too many things without investigating them. Who is going to investigate the author of *this* piece?


13 posted on 02/12/2021 7:57:23 PM PST by Fester Chugabrew (No audit. No peace.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Mariner
Dumbasses.

It is amusing that you call anyone else that. Thanks for the laugh.

14 posted on 02/12/2021 8:07:04 PM PST by MileHi ((Liberalism is an ideology of parasites, hypocrites, grievance mongers, victims, and control freaks.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: SeekAndFind

Read later.


15 posted on 02/12/2021 8:10:46 PM PST by NetAddicted (Just looking)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TChad
The entries that purport to be Mac addresses are very suspicious. Getting the Mac address of a device that is involved in a long range internet interaction of the sort used for hacking is very hard to do. Close to impossible in many cases.

The Mac address is not included in the TCP-IP packets sent over the internet, so obtaining it for a machine that is not on a local network is difficult. Getting the Mac address of a machine that you have detected IP traffic from involves getting access to an access point that machine is connected to, penetrating the source machine itself, or observing traffic on a local network it is attached to.

Even the most rudimentary hackers know how to avoid those situations.

16 posted on 02/12/2021 8:17:59 PM PST by freeandfreezing
[ Post Reply | Private Reply | To 2 | View Replies]

To: CodeToad

Ping


17 posted on 02/13/2021 4:15:09 AM PST by Travis McGee (EnemiesForeignAndDomestic.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

The data was pulled from the real data to create the presentation. More than one source of verifiable data of this type is in the hands of the Trump team.


18 posted on 02/13/2021 4:45:17 AM PST by Revolutionary ("Praise the Lord and Pass the Ammunition!")
[ Post Reply | Private Reply | To 1 | View Replies]

To: MileHi

Besides you, Qtard?


19 posted on 02/13/2021 8:09:07 AM PST by Mariner (War Criminal #18)
[ Post Reply | Private Reply | To 14 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson