Skip to comments.Clowns, Hammers, Scorecards, and Con Man: The Dubious and Fraudulent Data From Dennis Montgomery That Allegedly Proved Foreign Election Intrusion
Posted on 02/12/2021 5:45:47 PM PST by SeekAndFind
On early January, 2021, Mary Fanning and Alan Jones published two pieces in The American Report titled:
Proof Positive: Coordinated Cyberwarfare Attack Against US By China, Russia, Iran, Iraq, Pakistan To Steal Election From Trump.
STEALING AMERICA: ‘Former’ Communist Comey Got SCORECARD Election Hacking
Source Code And Knew SolarWinds Was Not Secure
These articles claim to have a positive proof of a massive coordinated international cyber attack against multiple US election sites during the first week of December, 2020. The stated aim of this attack was allegedly to steal the elections from Trump. The authors of these articles claim that two secret tools were used in the attack, one called “Hammer” the second called “Scorecard”. The source of this high-grade secretive Intel was a mysterious and apparently very well contacted individual by the name of Dennis Lee Montgomery.
The American Report articles came with a large volume of supporting data sets and charts that purports to show the details of these massive cyber attacks. The data includes source and target IP and MAC address, the method of infiltration, and the vote count changes to several voting systems. All in all, a smoking gun and the stuff that cyber unicorn dreams are made of.
I wasn’t aware of this claim until a friend asked me to look it over. It didn’t take long to reach the conclusion that the Montgomery data referenced in these two articles is a crude fabrication.
Image 1: Sample data anomalies. (1) One of the sources for the alleged attack, an entity called “SHENZHEN SUNRISE TECHNOLOGY CO.,LTD. 200”, is a Hong Kong based company, but, it shows up with 157 different IP address ranges in the Beijing area. (2) The “LA PAZ COUNTY CELECTIONS” shows up in two different states with two different IP addresses. (3) The IP address of the Michigan Alcona county targets is both 22.214.171.124 (Columbus, Ohio) and 126.96.36.199 (Ashburn, Virginia)
A superficial evaluation of Montgomery’s data shows that it’s laced with large number of errors and anomalies. Here are a few examples:
As far as the man behind the source of this highly secretive information, it turns out that it came form Dennis Montgomery. A certified lifelong shyster with multiple high visibility cons to his name. As Ecclesiastes 1:9 observes, there is nothing new under the sun, and it turns out that Montgomery latest con is almost identical to several other projects he pulled over the years on some sophisticated victims like the DoD, CIA, various LEAs, and the DOJ.
Image 2: The profile of king of con Dennis Lee Montgomery and his promoter Mary Fanning Penny
It’s not entirely clear who paid Montgomery to forge the data and promote this fabrication. Motivation wise, It could be just another con and money making venture, but, it’s also possible that it’s a political gambit that is designed to kill any real discussion about potential election fraud.
My advice to anyone reading The American Report and contemplating the truthfulness of these QAnon style prophetic claims is: be aware of false prophets, they come to you in sheep’s clothing, but inwardly they are ravenous wolves.
If you want to investigate possible election fraud, you don’t need fantastic hush-hush sources that come from ‘secrete’ government projects. Just focus on factual evidence that can stand-up in court. Like for example: official CCTV footage with chain of custody verification that shows identifiable vehicles delivering dozens of ballot boxes in the wee hours of the night. Then, counting these ballots without supervision and the resulting one sided statistical vote anomalies.
References and Sources
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object classification
https://apelbaum.files.wordpress.com/2021/02/mike-zullo-interviews-dennis-montgomery.mp3 Audio 1: Excerpt of a 2017 Mike Zullo interview with Dennis Montgomery. Most of the claims made by Montgomery during the interview show a complete ignorance of cyber security tradecraft and practices
When the FBI tied Montgomery to a tree – Page 5
Click to access cyber-attack-data.pdf
Document 1: Dennis Montgomery’s foreign election cyber attack data set
MAC Address Lookup
IP Address Lookup
Not surprising. That spreadsheet contained data that would have been very hard to obtain, such as the exact number of changed votes. If you are able to obtain such specific info, you should be ready and willing to explain EXACTLY how you got it. Where’s the big document containing the details?
Thanks for following up and exposing this as a fraud. It will be interesting if we learn who financed this scam.
I don’t know why it is, but for some reason I have found different searches for IP addresses have returned different data on the IP. I’ve seen different geolocation searches turn up highly different locations for the same IP, and I have come up with different owners as well.
I assume it has to do with things like your company getting service from a Cable internet provider, who uses another provider itself, and one search throws out your exact location, while the other throws out the home office of your internet provider’s provider, who could be in a different state because it operates across five or six states.
Using this as a basis to debunk the data is suspicious to me, as it might not be malicious, but just a consequence of how different search systems work.
Likewise, the fact some show a vote change, but fail to add Y to the column asking if there was success would say to me this was turned out automatically, and not by somebody going line by line and making it up.
I don’t vouch for anybody, or know where this data came from or if it is legit, but we should be careful with anybody trying to debunk it all off a “superficial” inspection. My impression was if just 70 or 80% of it, or even 30 or 40% of it is accurate, and the rest was pulled from incomplete or poorly aggregated, or unverifiable sources, it is still a bombshell.
Somebody needs to explain exactly where this came from, if it was a legit government leak, or the product of a capable contractor.
Are we to understand from this that any mention of “Hammer & Scorecard” is a reference to total fabrication, wishful thinking, and a phantom menace?
RE: Somebody needs to explain exactly where this came from, if it was a legit government leak, or the product of a capable contractor.
When I saw this portion of Mike Lindell’s film - ABSOLUTE PROOF, these were my first questions :
1) Who is this Mary Fanning who is the source of this spreadsheet that Mike Lindell’s film is showing? What’s her technical background and her expertise?
2) Where and How did she collect and gather her data? Who provided it for her?
These were the basic and NECESSARY questions that come to mind and are reasonable ones. That these were not even addressed is the major flaw in this particular segment of the film.
Are we also to understand from this that voting machines are in no way ever connected to the internet and the Antrim County, MI anomalies are a fiction?
Those are great questions, but let’s wait for the New York Times to provide some investigative efforts, okay?
RE: Are we also to understand from this that voting machines are in no way ever connected to the internet and the Antrim County, MI anomalies are a fiction?
First question on internet connection — Jovan Pulitzer has PUBLICLY demonstrated that the Dominion Voting machines DO connect to the internet. Therefore all statements by their employees up to their CEO that the machines are not internet connectible are FALSE. See here:
The Antrim County anomalies are NOT fiction. It is true that thousands of votes for Trump were switched to Biden. Whether they were DELIBERATE or a result of human error is in dispute.
Qtards were spreading this nonsense all over Free Republic.
That there are errors in the spreadsheet is not surprising, and they don’t disprove the entirety. And it’s not surprising that their are people happy to criticize Dennis Montgomery. A way to “debunk” the spreadsheet is to identify data related to a county where equipment audits have actually occurred, namely Antrim County, MI. How do claimed IP and MAC addresses for Antrim County precincts line up with the audit findings? If the precincts actual have equipment with the MAC IP and addresses on the chart, check the logs on those machines for evidence of intrusion at the specified time. No such computer, or no such intrusion = debunked.
I’ve never thought it wise to hang any hats on the international cyberconspiracy angle. What would seem to be provable fraud via faked ballots, illegal voters, dead voters, out-of-staters, underaged, unregistered, unverified signatures, etc., are tangible, provable things that add up to more than enough to change the outcome of the election.
We seem to be of the same mind. Upon seeing the final portion of Lindell’s presentation, I was asking myself how easy it would be to fabricate the Fanning screenshots. This much I know: we believe too many things without investigating them. Who is going to investigate the author of *this* piece?
It is amusing that you call anyone else that. Thanks for the laugh.
The Mac address is not included in the TCP-IP packets sent over the internet, so obtaining it for a machine that is not on a local network is difficult. Getting the Mac address of a machine that you have detected IP traffic from involves getting access to an access point that machine is connected to, penetrating the source machine itself, or observing traffic on a local network it is attached to.
Even the most rudimentary hackers know how to avoid those situations.
The data was pulled from the real data to create the presentation. More than one source of verifiable data of this type is in the hands of the Trump team.
Besides you, Qtard?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.