Ron Watkins [CodeMonkeyZ]
148K subscribers
829 photos
215 videos
31 files
889 links
Ron Watkins [ gab.com/codemonkey ]
Download Telegram
What is RUNBECK?
If the auditors in Arizona end up proving significant fraud occurred in Maricopa County, the entire “perfect election” narrative goes out the window.
Other states and counties will immediately start their own audits.
Wont be long before critical mass is achieved and all the dominoes come crashing down.
All eyes on the audit(s)!

WW3?
^Distraction

Alien invasion?
^Distraction

Fauci created Covid19?
^Distraction

Gaza strip land invasion?
^Distraction

Orbital energy weapon destroys RV CAMPER in middle of city?
^Distraction
Kevin Runbeck patent application for a ballot duplication system and methods.
https://uspto.report/patent/app/20190311030
February 2021, Runbeck Election Services announced a new CEO after Kevin Runbeck left his FORTY YEAR tenure as CEO.

https://www.yourvalley.net/anthem-independent/stories/runbeck-election-services-promotes-ellington-to-ceo,212056?
FBI recovered the bitcoin ransom money?

They either
1. Cracked bitcoin crypto (unlikely)
2. Apprehended the hackers (likely)
3. Transferred money from their own BTC wallet back to the victim (plausible)
Quite simply:
If the Arizona Audit proves that Maricopa County was full of systematic, SMART & autoMATIC election fraud, then other states will certainly also conduct forensic audits.
If election fraud is -proven- to be a widespread issue with similar techniques used throughout the country, restoring confidence in elections will be a most difficult task.
FBI Affidavit explaining how they ended up recovering ransomware bitcoins was released.
The FBI watched the suspects try to launder the bitcoin through different addresses until the bitcoin landed on an exchange (the redacted section is the name of the exchange that the hackers used).
From there, the FBI simply contacted the exchange and asked for the private key to the coins.

https://storage.courtlistener.com/recap/gov.uscourts.cand.379840/gov.uscourts.cand.379840.1.0.pdf
1
When you put your crypto coins into an exchange, the exchange owns your private key until you withdraw.
Exchanges working closely with law enforcement is the biggest takeaway from this affidavit, but is also common sense.
If the exchange had a strong KYS program, then the thieves will likely be arrested sooner than later. However, many exchanges dont do vigorous KYS, so it is possible the thieves got away with it this time and will know better than putting coins into an exchange next time.
The ransomware hacker group

- Skilled enough to take down entire industries.
- Knowledgeable enough about cryptocoins to build a “business” out of it.
- Dumb enough to deposit illegal money into the crypto equivalent of a bank...
Are the recent domestic ransomware attacks an alphabet agency dry run for their clandestine offensive network security forces?
Government weaponized hackers explain the incompetence and why their story fell apart so quickly.
You cannot stop the TRUTH.
Lawyer Matt DePerno seems to have proven that the election servers were logged into REMOTELY during the election.

https://twitter.com/mdeperno/status/1402508089958490114
The EMS is essentially the brains of the election. It tallies the votes and prepares the final output for the county.
If the EMS was accessed remotely and anonymously, that means the entire county’s election is compromised.
Forwarded from Arizona Conservatives Take Action (Patriot)
What Are Splunk Logs? Why Are They So Important for the Audit?

@ArizonaConservatives Eric, Trooper, and Jerry break it down for us.

👉 What are splunk logs

Eric: Splunk is a very popular security and distributed systems monitoring application that provides a dashboard for network operations personnel to catch abnormal events and changes across all connected computers and computerized equipment.

If they were using Splunk and were using it properly then there should be a record of many things that would help focus forensic audits.

Trooper: The logs capture critical data, like user_ID's, actions taken, date-timestamps, adjudication and other corrections or changes to votes, counts, rejections, etc... Look in any audit training manual: concealing, deleting, modifying, tampering, or refusing to provide access to logs - is in fact a criminal indicator.

👉 Why are splunk logs important to the audit

Eric: Splunk logs would be absolutely critical to reveal what happened on election night and thereafter — whether or not curious Internet traffic happened, for one thing, and to show a trail of infiltration and/or manipulation. We absolutely need them.

Trooper: The reason the Splunk logs and keys are important is because they were configured to directly support the event recording of things like ballot scanning, vote changing, tabulation counts and errors, etc... They offer critical insight and record of what/ when/ how the machines were utilized in ballot handling and vote tabulating/adjustment processes.

The logs are public records because they are in fact germane to the voting/ballot tabulation, adjudication, rejection, and adjustment processes, among other things. This is material information. They are literally withholding evidence and intentionally obstructing the audit.

Jerry: I work in Cybersecurity and have experience with Splunk. That said, those logs will expose a trove of events that may have taken place on election day. It would have captured all anomalous behavior as well as any outside network traffic that may have infiltrated the election systems. It's no wonder they don't want to release those logs as any half way competent Security Analyst would be able to easily identify fraud. SIEM tools such as Splunk are specifically designed to not only detect a potential breach but to also provide an audit trail to get to the bottom of what happened

Eric: If there was any kind of security monitoring, like Splunk et al, we need to see those logs since they might show if hackers created new accounts with root access, etc., and other things including configuration that would show how packets were routed to/from election equipment. In a way, Splunk is like a real-time audit…as long as it is configured to catch the vulnerabilities that could alter results. If we’re mining for information, Splunk is gold.

Its importance cannot be understated.

The BOS needs to hand over the rest of the information, routers, logs, access, chain-of-custody everything.

❗️Please take a minute to call or email Paul Boyer who is blocking the contempt resolution, which would enable subpoena enforcement. And contact Senators Fann and Petersen to ask why they are not filing a motion to compel.

Contact details 👉🔗 https://t.me/ArizonaConservatives/2025

We haven’t come this far only to let the Supervisors get away with fraud.
—-
Are SPLUNK logs being withheld from the auditors?

Please contact Paul Boyer asap and ask him to answer.
Where are the SPLUNK LOGS?
Auditors in AZ are almost finished with the hand counting portion of the audit.
Good job!!