Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Georgia officials warn judge of ‘grave consequences’ if they’re not allowed to wipe, reset voting machines
BPR ^ | December 5, 2020 | Frieda Powers

Posted on 12/05/2020 6:01:24 AM PST by Golden Eagle

Election officials in Georgia warned of “grave and serious consequences” if they are prevented from resetting voting machines in several counties.

A judge’s temporary restraining order to keep voting machines untouched in Cobb, Gwinnett, and Cherokee Counties is being challenged by election officials who contend that the machines need to be prepared for the upcoming Senate runoff elections in January. The officials have asked the court to lift the block so the Dominion Voting machines can be properly wiped and reset.

Machines needed for in-person voting are being prevented from having their memory cards cleared of data from the Nov. 3 election, according to the officials who requested the restraining order be lifted in a court filing on Thursday.

Voting equipment was set to be tested beginning on Dec. 3 but that has been delayed due to a Nov. 29 restraining order, issued by U.S. District Judge Timothy Batten, in response to attorneys Sidney Powell and Lin Wood who requested the order and an injunction against any altering to the machines in their case challenging Georgia’s presidential election results.

“The temporary restraining order has grave and serious consequences,” Kristi Royston, the elections supervisor for Gwinnett County’s Board of Voter Registrations and Elections, said in a declaration as part of the court filing Thursday.

(Excerpt) Read more at bizpacreview.com ...


TOPICS: Miscellaneous
KEYWORDS: dirtygeorgia; kristiroyston; timothybatten
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-75 last
To: Golden Eagle

a solution is that they use the machines of other states that are not in dispute


61 posted on 12/05/2020 7:33:23 AM PST by californian by choice
[ Post Reply | Private Reply | To 1 | View Replies]

To: ctdonath2
Can’t hold a runoff election if no machines available.

There are available machines all over the country. Put them on a truck and haul them to GA.

62 posted on 12/05/2020 8:09:46 AM PST by PistolPaknMama
[ Post Reply | Private Reply | To 11 | View Replies]

To: Golden Eagle
Why 'grave and serious'? Why not 'dangerous and harmful'?

I guess those are the just the two words that happened to tumble out of the democrat media neurolinguistic programming FearWords!® random-scary-headline-adjectives™ generator bag this morning.

63 posted on 12/05/2020 8:17:51 AM PST by tinyowl (A is A)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle

It’s severely serious. Get real! We should not even be planning a runoff on JAn 5th using the same machines and 900,000 absentee ballots with unmonitored drop boxes.


64 posted on 12/05/2020 8:20:09 AM PST by Georgia Girl 2 (The only purpose of a pistol is to fight your way back to the rifle you should never have dropped)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle
prevented from having their memory cards cleared of data

How do they get the data off the cards? Are there no spare cards? They can't copy the data to a secured backup device or server?

65 posted on 12/05/2020 8:26:25 AM PST by McGruff (Only 11 days until Electoral College meets.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Samurai_Jack
There needs to be grave and serious consequences if they DO!

Exactly! But it gives me hope that the election day software may still be in there.

66 posted on 12/05/2020 8:32:21 AM PST by libertylover (Remember: Deep State hated Jesus too.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Golden Eagle

Lame excuse.

The “wipe clean” and reset does not take weeks to do, not even a single week.

The court ought to say to the Georgia election officials either make secure full data images for the machines or wait.


67 posted on 12/05/2020 8:43:42 AM PST by Wuli
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle

WHO hired & paid for the portable shredding truck that was busy in Georgia this past week?


68 posted on 12/05/2020 8:46:14 AM PST by ridesthemiles ( )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Samurai_Jack

Why in the hell would it take more than say 72 hours to wipe and reset an electronic voting machine?

I remember watching the Brexit count process, and have been thinking that is what needs to happen for any future elections. Might be slower, but integrity and accuracy is what counts.


69 posted on 12/05/2020 8:50:17 AM PST by voicereason (The RNC is like the "one-night stand" you wish you could forget.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Golden Eagle

“Grave and serious consequences” if they are prevented from resetting voting machines in several counties.

A lot of words said when only one would cover it GUILTY.


70 posted on 12/05/2020 9:25:07 AM PST by Vaduz (women and children to be impacIQ of chimpsted the most.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle

Who will they kill next?


71 posted on 12/05/2020 9:26:38 AM PST by petitfour (APPEAL TO HEAVEN)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PallMal; ShadowAce
Then get new memory cards, save the current cards, and archive the data!

One of the thing that our side would want would be a copy of each of these cards to make sure no hanky-panky is done to them.

Here's what I'd do: With observers present. The procedure below will create a validated image of the card that can be saved, and provided to anyone who wants to look at it from a forensics or data perspective.

All of the following is performed from just about any Unix/Linux computer, and is completely read-only on the card itself. At no point is the card even mounted for writing. In the following lines that start with "###" are my comments explaining what is being done. Lines that start with "$" are the actual commands being issued.

### First, create an empty directory
$ mkdir votecard

### change to that directory
$ cd votecard/

### verify the directory is empty
$ ls -l
total 0

### Without mounting the card, create an image of it on the local hard disk
$ sudo dd if=/dev/sdd1 of=card1.img
246175+0 records in
246175+0 records out
126041600 bytes (126 MB, 120 MiB) copied, 16.1644 s, 7.8 MB/s

### verify that the image file exists.
$ ls -l 
total 123088
-rw-r--r-- 1 root root 126041600 Dec  5 15:38 card1.img

### Get a cryptographic hash of the image. Have all observers write this hash down.
$ sha256sum card1.img 
c17e384050ce33ac2a715c8a75658194b56cfde60da7eac6208b779f4cbae8c4  card1.img

### Do the same thing, except this time dump the results into a file.
$ sha256sum card1.img > card1.img.sha256.txt

### Validate the contents of the hash file. Observers can compare against written value
$ cat card1.img.sha256.txt
c17e384050ce33ac2a715c8a75658194b56cfde60da7eac6208b779f4cbae8c4  card1.img

### Mount the image file 
$ sudo mount -o loop card1.img /mnt

### Check contents of the mounted filesystem
$ ls -l /mnt
total 1448
-rwxr-xr-x 1 root root 534745 Dec  5 15:18 Data1.pdf
-rwxr-xr-x 1 root root 182297 Dec  5 15:18 Data2.txt
-rwxr-xr-x 1 root root 361228 Dec  5 15:18 Data3.txt
-rwxr-xr-x 1 root root 398098 Dec  5 15:18 Data4.txt
-rwxr-xr-x 1 root root      0 Apr 14  2015 file.txt

### Get a cryptographic hash of each individual file. Write these down or take screen shot.
$ sha256sum /mnt/*
d2b8b2074603e125983ca592e38d4e19df4eef0206c4098744a3c66ab2ef6545  /mnt/Data1.pdf
8ed8bb156040cbff0a102bc75674923072295ad10be37345afab3e3bcbca0f69  /mnt/Data2.txt
74035a1111b76cbce1d1097895280e756ef164b9bc25e5d409c7cc56f3318c1d  /mnt/Data3.txt
82b3b635828731b05bdb9f84e0febf18714944cc8a9a1eaa4b665fec26155a04  /mnt/Data4.txt
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855  /mnt/file.txt

### Get cryptographic hash of each individual file, and store it in a file.
$ sha256sum /mnt/* > card1.files.sha256.txt

### Check contents of file hashes. Make sure the contents of the file matches 
###  the written hashes or screenshot.
$ cat card1.files.sha256.txt
d2b8b2074603e125983ca592e38d4e19df4eef0206c4098744a3c66ab2ef6545  /mnt/Data1.pdf
8ed8bb156040cbff0a102bc75674923072295ad10be37345afab3e3bcbca0f69  /mnt/Data2.txt
74035a1111b76cbce1d1097895280e756ef164b9bc25e5d409c7cc56f3318c1d  /mnt/Data3.txt
82b3b635828731b05bdb9f84e0febf18714944cc8a9a1eaa4b665fec26155a04  /mnt/Data4.txt
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855  /mnt/file.txt
$ 

### Unmount the image file

$ sudo umount /mnt

### take a look at the files that now exist in the directory.
$ ls -l
total 123096
-rw-r--r-- 1 root root       404 Dec  5 15:41 card1.files.sha256.txt
-rw-r--r-- 1 root root 126041600 Dec  5 15:42 card1.img
-rw-r--r-- 1 root root        76 Dec  5 15:39 card1.img.sha256.txt

If you look at this post you can see more information about why the 'sha256sum' program can be used to validate the contents of the files, and the image itself.

Once all of the above is complete on each card, the originals should be sealed until the all of the legal issues have been dealt with. The state can by a new stack of fresh cards/drives or whatever to use in the upcoming election.

Any competent Unix/Linux nerd can validate the above procedure. The disk images can be provided to any person or organization that would like to take a look at them. One of the cool things about using the 'dd' command to image the cards is that it actually provides a byte-for-byte copy of the card itself. There are tools you can use to see deleted files and other information on the card. It does not just copy the files/directories of the file, but is actually an exact image of the card itself.

Anyone can validate after that point that the hashes match. The computer used to generate all of this data can be a completely stand-alone box that has no network connection, and for the truly paranoid, could be installed from validated media immediately before this imaging process is initiated.

72 posted on 12/05/2020 2:19:03 PM PST by zeugma (Stop deluding yourself that America is still a free country.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Golden Eagle

bttt


73 posted on 12/05/2020 2:20:07 PM PST by Pajamajan ( PRAY FOR OUR NATION. I will never be a peaceful slave in a new Socialist America.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle

So they cannot commit their next crime if they’re required to keep the evidence of the last crime?


74 posted on 12/05/2020 2:28:07 PM PST by gitmo (If your theology doesn't become your biography, what good is it?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma
Good job.

I know that you can get the sha256 hash of the data, individual files, folders, etc. This is normal SOP for any industry where security is paramount.

We need judges groomed, now and in the future, to understand basic computer technology and terminology. Can you imagine if Dominion person said anything like that to any of us with a straight face, and we're sitting as judges?

75 posted on 12/05/2020 2:48:00 PM PST by PallMal
[ Post Reply | Private Reply | To 72 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-75 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson