Is RUNBECK simply a ballot printer?
https://runbeck.net/wp-content/uploads/Runbeck_VoteCORE_Election_Management_Software.pdf
https://runbeck.net/wp-content/uploads/Runbeck_VoteCORE_Election_Management_Software.pdf
FBI recovered the bitcoin ransom money?
They either
1. Cracked bitcoin crypto (unlikely)
2. Apprehended the hackers (likely)
3. Transferred money from their own BTC wallet back to the victim (plausible)
They either
1. Cracked bitcoin crypto (unlikely)
2. Apprehended the hackers (likely)
3. Transferred money from their own BTC wallet back to the victim (plausible)
Quite simply:
If the Arizona Audit proves that Maricopa County was full of systematic, SMART & autoMATIC election fraud, then other states will certainly also conduct forensic audits.
If election fraud is -proven- to be a widespread issue with similar techniques used throughout the country, restoring confidence in elections will be a most difficult task.
If the Arizona Audit proves that Maricopa County was full of systematic, SMART & autoMATIC election fraud, then other states will certainly also conduct forensic audits.
If election fraud is -proven- to be a widespread issue with similar techniques used throughout the country, restoring confidence in elections will be a most difficult task.
FBI Affidavit explaining how they ended up recovering ransomware bitcoins was released.
The FBI watched the suspects try to launder the bitcoin through different addresses until the bitcoin landed on an exchange (the redacted section is the name of the exchange that the hackers used).
From there, the FBI simply contacted the exchange and asked for the private key to the coins.
https://storage.courtlistener.com/recap/gov.uscourts.cand.379840/gov.uscourts.cand.379840.1.0.pdf
The FBI watched the suspects try to launder the bitcoin through different addresses until the bitcoin landed on an exchange (the redacted section is the name of the exchange that the hackers used).
From there, the FBI simply contacted the exchange and asked for the private key to the coins.
https://storage.courtlistener.com/recap/gov.uscourts.cand.379840/gov.uscourts.cand.379840.1.0.pdf
❤1
When you put your crypto coins into an exchange, the exchange owns your private key until you withdraw.
Exchanges working closely with law enforcement is the biggest takeaway from this affidavit, but is also common sense.
If the exchange had a strong KYS program, then the thieves will likely be arrested sooner than later. However, many exchanges dont do vigorous KYS, so it is possible the thieves got away with it this time and will know better than putting coins into an exchange next time.
Exchanges working closely with law enforcement is the biggest takeaway from this affidavit, but is also common sense.
If the exchange had a strong KYS program, then the thieves will likely be arrested sooner than later. However, many exchanges dont do vigorous KYS, so it is possible the thieves got away with it this time and will know better than putting coins into an exchange next time.
The ransomware hacker group
—
- Skilled enough to take down entire industries.
- Knowledgeable enough about cryptocoins to build a “business” out of it.
- Dumb enough to deposit illegal money into the crypto equivalent of a bank...
—
- Skilled enough to take down entire industries.
- Knowledgeable enough about cryptocoins to build a “business” out of it.
- Dumb enough to deposit illegal money into the crypto equivalent of a bank...
Are the recent domestic ransomware attacks an alphabet agency dry run for their clandestine offensive network security forces?
Government weaponized hackers explain the incompetence and why their story fell apart so quickly.
Government weaponized hackers explain the incompetence and why their story fell apart so quickly.
Lawyer Matt DePerno seems to have proven that the election servers were logged into REMOTELY during the election.
https://twitter.com/mdeperno/status/1402508089958490114
https://twitter.com/mdeperno/status/1402508089958490114
The EMS is essentially the brains of the election. It tallies the votes and prepares the final output for the county.
If the EMS was accessed remotely and anonymously, that means the entire county’s election is compromised.
If the EMS was accessed remotely and anonymously, that means the entire county’s election is compromised.
Forwarded from Arizona Conservatives Take Action (Patriot)
What Are Splunk Logs? Why Are They So Important for the Audit?
@ArizonaConservatives Eric, Trooper, and Jerry break it down for us.
👉 What are splunk logs❓
Eric: Splunk is a very popular security and distributed systems monitoring application that provides a dashboard for network operations personnel to catch abnormal events and changes across all connected computers and computerized equipment.
If they were using Splunk and were using it properly then there should be a record of many things that would help focus forensic audits.
Trooper: The logs capture critical data, like user_ID's, actions taken, date-timestamps, adjudication and other corrections or changes to votes, counts, rejections, etc... Look in any audit training manual: concealing, deleting, modifying, tampering, or refusing to provide access to logs - is in fact a criminal indicator.
👉 Why are splunk logs important to the audit❓
Eric: Splunk logs would be absolutely critical to reveal what happened on election night and thereafter — whether or not curious Internet traffic happened, for one thing, and to show a trail of infiltration and/or manipulation. We absolutely need them.
Trooper: The reason the Splunk logs and keys are important is because they were configured to directly support the event recording of things like ballot scanning, vote changing, tabulation counts and errors, etc... They offer critical insight and record of what/ when/ how the machines were utilized in ballot handling and vote tabulating/adjustment processes.
The logs are public records because they are in fact germane to the voting/ballot tabulation, adjudication, rejection, and adjustment processes, among other things. This is material information. They are literally withholding evidence and intentionally obstructing the audit.
Jerry: I work in Cybersecurity and have experience with Splunk. That said, those logs will expose a trove of events that may have taken place on election day. It would have captured all anomalous behavior as well as any outside network traffic that may have infiltrated the election systems. It's no wonder they don't want to release those logs as any half way competent Security Analyst would be able to easily identify fraud. SIEM tools such as Splunk are specifically designed to not only detect a potential breach but to also provide an audit trail to get to the bottom of what happened
Eric: If there was any kind of security monitoring, like Splunk et al, we need to see those logs since they might show if hackers created new accounts with root access, etc., and other things including configuration that would show how packets were routed to/from election equipment. In a way, Splunk is like a real-time audit…as long as it is configured to catch the vulnerabilities that could alter results. If we’re mining for information, Splunk is gold.
Its importance cannot be understated.
The BOS needs to hand over the rest of the information, routers, logs, access, chain-of-custody everything.
❗️Please take a minute to call or email Paul Boyer who is blocking the contempt resolution, which would enable subpoena enforcement. And contact Senators Fann and Petersen to ask why they are not filing a motion to compel.
Contact details 👉🔗 https://t.me/ArizonaConservatives/2025
We haven’t come this far only to let the Supervisors get away with fraud.
—-
@ArizonaConservatives Eric, Trooper, and Jerry break it down for us.
👉 What are splunk logs❓
Eric: Splunk is a very popular security and distributed systems monitoring application that provides a dashboard for network operations personnel to catch abnormal events and changes across all connected computers and computerized equipment.
If they were using Splunk and were using it properly then there should be a record of many things that would help focus forensic audits.
Trooper: The logs capture critical data, like user_ID's, actions taken, date-timestamps, adjudication and other corrections or changes to votes, counts, rejections, etc... Look in any audit training manual: concealing, deleting, modifying, tampering, or refusing to provide access to logs - is in fact a criminal indicator.
👉 Why are splunk logs important to the audit❓
Eric: Splunk logs would be absolutely critical to reveal what happened on election night and thereafter — whether or not curious Internet traffic happened, for one thing, and to show a trail of infiltration and/or manipulation. We absolutely need them.
Trooper: The reason the Splunk logs and keys are important is because they were configured to directly support the event recording of things like ballot scanning, vote changing, tabulation counts and errors, etc... They offer critical insight and record of what/ when/ how the machines were utilized in ballot handling and vote tabulating/adjustment processes.
The logs are public records because they are in fact germane to the voting/ballot tabulation, adjudication, rejection, and adjustment processes, among other things. This is material information. They are literally withholding evidence and intentionally obstructing the audit.
Jerry: I work in Cybersecurity and have experience with Splunk. That said, those logs will expose a trove of events that may have taken place on election day. It would have captured all anomalous behavior as well as any outside network traffic that may have infiltrated the election systems. It's no wonder they don't want to release those logs as any half way competent Security Analyst would be able to easily identify fraud. SIEM tools such as Splunk are specifically designed to not only detect a potential breach but to also provide an audit trail to get to the bottom of what happened
Eric: If there was any kind of security monitoring, like Splunk et al, we need to see those logs since they might show if hackers created new accounts with root access, etc., and other things including configuration that would show how packets were routed to/from election equipment. In a way, Splunk is like a real-time audit…as long as it is configured to catch the vulnerabilities that could alter results. If we’re mining for information, Splunk is gold.
Its importance cannot be understated.
The BOS needs to hand over the rest of the information, routers, logs, access, chain-of-custody everything.
❗️Please take a minute to call or email Paul Boyer who is blocking the contempt resolution, which would enable subpoena enforcement. And contact Senators Fann and Petersen to ask why they are not filing a motion to compel.
Contact details 👉🔗 https://t.me/ArizonaConservatives/2025
We haven’t come this far only to let the Supervisors get away with fraud.
—-
Telegram
Arizona Conservatives Take Action
❗️CTA❗️AZ Machine Audit Stalled Because of County Supervisors Obstruction
According to @VoteLizHarris, the machine portion of the audit is hitting a snag because the Supervisors are withholding 2 key subpoenaed items: Splunk logs and hardware tokens.
The…
According to @VoteLizHarris, the machine portion of the audit is hitting a snag because the Supervisors are withholding 2 key subpoenaed items: Splunk logs and hardware tokens.
The…
Are SPLUNK logs being withheld from the auditors?
Please contact Paul Boyer asap and ask him to answer.
Please contact Paul Boyer asap and ask him to answer.
Auditors in AZ are almost finished with the hand counting portion of the audit.
Good job!!
Good job!!
Not everything I post is meant for the same audience.
Something that doesn’t make sense to you might be able to strike a specific chord in the person I am addressing.
Something that doesn’t make sense to you might be able to strike a specific chord in the person I am addressing.
❤1
Messages sent yesterday were received by intended recipient.
Deleted.
What happens when a ballot is returned to sender?
Deleted?
Have a good weekend.
Deleted.
What happens when a ballot is returned to sender?
Deleted?
Have a good weekend.