Performing an audit is hard. Trying to do an accurate audit is even harder, However, if you are just looking to rubber-stamp the numbers the election fixers used, it’s very easy to do an audit.
You play Twister, Life, and canasta for a few days and then you announce that the election figures are exactly right. The Maricopa County Supervisors paid $100k to perform a sham audit so that the Supervisors could say I told you so.
The problem arose when the state Senate decided to hire their own auditors and they hired Cyber Ninjas, experts on electronic fraud. They had no problem finding problems with the count. They found ballots marked with sharpies, duplicate ballots, over 74,000 write-in ballots that were never requested, and many other assorted errors in the count, including the use of counterfeit ballots.
VIDEO OF THE DAYIdiots Twerk On Ambulance After Shooting In Oakland, CA
Ben Cotton and his team were selected by the Cyber Ninjas to address the IT work related to Maricopa County’s results in the 2020 Election. Cotton did the work that the other two firms were supposed to do. Cotton was able to find errors even though the Maricopa County Supervisors were totally uncooperative. They literally took the Fifth Amendment when questioned about irregularities. They should have saved themselves that $100k because they will need it to hire criminal defense attorneys.
Below is a list of items addressed by Cotton during his presentation to the Arizona Senate last Thursday.
- Auditors have collected over 2,000 Terabytes of data, the vast majority is video footage.
- What Maricopa County has told the public is often drastically different than their response to the legal subpoena.
- Maricopa didn’t use a forensically secure process to clone drives. Dates and times were altered by their cloning process.
- On March 11th, 2021 someone with Admin access to the (EMS) election management system ran a script that produced 37,646 queries looking for blank passwords. The system has only 8 user accounts. (see below)
- Windows Security Event Logs before February 5th, 2021 are missing.
- Every election Administrator account, no matter the user, all have the same password.
- When the Dominion software was installed in August 2019, Administrative passwords were created, and haven’t been changed since.
- The vulnerabilities that exist on the Maricopa election systems would take an average script kiddie less than 10 minutes to gain access to these systems.
- Maricopa’s election system uses ibutton key fobs as the 2nd step in logins. Maricopa and Dominion have refused to provide these fobs to auditors. (see below).
- It’s become readily apparent there are severe cybersecurity problems with the way the election management system and network was maintained.
- We are seeing anonymous logins at the system level that do not follow that pattern of normal Windows behavior.
- After both sides agreed on a solution, Maricopa County then refused to release that router data.
- Maricopa can’t check the configuration of its own election system without relying on Dominion employees.
- The two EAC audits hired by Maricopa earlier in the year appear not to have addressed cybersecurity aspects, not even shared passwords.
- Not a single bit of data was changed on any device in the auditor’s possession. Use of a “write block” device prevented this. Images were made bit by bit, then an MD5 hash value was applied. There is no need to purchase new machines.
- There have been no antivirus updates, operating system updates, or security patches applied to the election system since August 2019, the date Dominion software was installed.
The auditors hired by the county supervisors found none of this stuff. Gee, I wonder why.