Cybersecurity "Expert" here. Yes, tampering will be very evident. Worst case scenario is that the hard drives were replaced and system reloaded which would initiate a criminal investigation into the BoS, those involved and likely lead to conviction on numerous state and federal election law.
I saw something here this morning saying that AZ was gathering the signatures to recall everyone on the AZ Board of Elections in Maricopa county. I think they went just a weeeeee bit too far this time.
Refusal of multiple subpoenas ordering the handover of Dominion voting machines. They said publicly that they would do it then refused when it came time multiple times. Again, multiple subpoenas was ignored.
Not an expert, but I've heard people say that at the top level, the engineers are able to detect is things were altered or deleted. That it's very difficult to hide that kind of thing from these top national security type of people. But, I guess we'll find out.
They can, and I'm hoping that's what's meant by a "forensic" audit of the machines -- forensic data recovery is the retrieval of deleted digital files.
About the only way data can ever be truly, permanently deleted is via physical destruction of the hard drive -- and even then, the odds are it's already been uploaded and archived to cloud servers elsewhere.
That "audit" was simply a recount of the "adjudicated" ballots. These words have very specific meanings. If I give you $100,000 in counterfeit dollars, how many dollars do you have? 0. That's all that they did, was count adjudicated ballots and genuine ballots. If the rejection rate is 85% like it was in Antrim, then they can pretty much make the numbers whatever they want.
Theres a chain of custody that the auditors can follow. That will most likely be broken because we know in some states mail in envelopes were deatroyed and adjucation occured at extremely high rates. This is a good legal area to start in.
You can look for deleted files and time stamps to look or tampering. They can image the drives to take off site for further testiglng. I would hope they can test directly on one of the machines too.
The forensic guys should have more info on the internals of the machine. I'm sure there is plenty more for them to do when it comes to checking what the software did. One key item that look at is why they used floating point calculations.
I am not an auditor, I'm basing this statement off my decades or IT work.
Restore bits and bytes from the hw if they tried to delete it from the software. Not sure what these types of overpriced 5 in one scanner/printers can do in whatever software they have, but it sure looks like we have a solid autist on the job!
Will it really matter? Couldn't they by now have hidden any evidence of fraud? They have had months to do so.
Cybersecurity "Expert" here. Yes, tampering will be very evident. Worst case scenario is that the hard drives were replaced and system reloaded which would initiate a criminal investigation into the BoS, those involved and likely lead to conviction on numerous state and federal election law.
I saw something here this morning saying that AZ was gathering the signatures to recall everyone on the AZ Board of Elections in Maricopa county. I think they went just a weeeeee bit too far this time.
What's too far about that? Just curious
Refusal of multiple subpoenas ordering the handover of Dominion voting machines. They said publicly that they would do it then refused when it came time multiple times. Again, multiple subpoenas was ignored.
Just like Georgia, Wisconsin, Pennsylvania, etc.
Not an expert, but I've heard people say that at the top level, the engineers are able to detect is things were altered or deleted. That it's very difficult to hide that kind of thing from these top national security type of people. But, I guess we'll find out.
They can, and I'm hoping that's what's meant by a "forensic" audit of the machines -- forensic data recovery is the retrieval of deleted digital files.
About the only way data can ever be truly, permanently deleted is via physical destruction of the hard drive -- and even then, the odds are it's already been uploaded and archived to cloud servers elsewhere.
I think it will considering ONLY one actual audit has been done. the rest were blocked by RINO state legislatures and SoS's
That "audit" was simply a recount of the "adjudicated" ballots. These words have very specific meanings. If I give you $100,000 in counterfeit dollars, how many dollars do you have? 0. That's all that they did, was count adjudicated ballots and genuine ballots. If the rejection rate is 85% like it was in Antrim, then they can pretty much make the numbers whatever they want.
This is the correct answer.
Ding! Another lucky winner winner, chicken dinner! Updoot for you. ?
Theres a chain of custody that the auditors can follow. That will most likely be broken because we know in some states mail in envelopes were deatroyed and adjucation occured at extremely high rates. This is a good legal area to start in.
You can look for deleted files and time stamps to look or tampering. They can image the drives to take off site for further testiglng. I would hope they can test directly on one of the machines too.
The forensic guys should have more info on the internals of the machine. I'm sure there is plenty more for them to do when it comes to checking what the software did. One key item that look at is why they used floating point calculations.
I am not an auditor, I'm basing this statement off my decades or IT work.
Restore bits and bytes from the hw if they tried to delete it from the software. Not sure what these types of overpriced 5 in one scanner/printers can do in whatever software they have, but it sure looks like we have a solid autist on the job!
Expert here, not in cybersecurity though.