I hadn't seen this discussed anywhere but I believe it's critical to know how the Maricopa board is responding to the claims leaked by auditors and which of their counterpoints are valid/misleading/invalid.
My understanding of what they argue:
-
The deleted files were part of the shutdown process of SQL Server or auditors did something fraudulent. (pg. 2)
-
They make a strangely specific counterpoint here also on pg. 2: "At no point was any data deleted when shutting down the server and packing up the equipment." Which is great, but was anything deleted before shutting down the server and packing up the equipment??
-
They claim after having been asked for chain of custody procedures that it was given to Ken Bennett. (pg. 4) I suspect what was being asked for was chain of custody procedure before the handoff, though I'm not sure.
-
They argue that discrepancy totals (pgs. 7-9) are off because when ballots identified as being unable to be read by the tabulators (through whatever sort of damage), they were taken out and sent to the Ballot Duplication Board.
-
They say that Dominion's password are "proprietary" and that Dominion will only provide them only to entities accredited by U.S. Elections Assistance Commission. (pg. 10)
I'm in no way qualified to debunk, rebunk, or even plain old fashioned missionary bunk any of this. Frankly much of the info we have at this point is just hearsay from either side. But I'd be pleased to have pedes in the know comment on this response.
Where were the ballots that were sent to the Ballot Duplication Board. I want proof and documentation that is where the missing ballots are.
The judge said that Cyber Ninjas' security measure were not proprietary or special. Why should Dominions passwords be equally as proprietary to the auditors?
Why does the system delete files in shut down when those files are supposed to be kept for up to two years after the election?
Sorry supervisors, databases don't routinely delete records or files. The entire point of a database is preservation of data. All efforts are taken to avoid corruption, and disappearing data is a form of corruption.