We demand that you immediately rescind your false and malicious tweet
asserting that Maricopa County “spoiled evidence” in the days before we
provided the server to the Senate. Your tweet, which relies on the “modified
date” shown in the screenshot as evidence of wrongdoing, is demonstrably
false; the only thing it does demonstrate is your auditors’ incompetence.
Name calling. Demands. Lol, this means nothing.
On April 12, 2021, the Elections Department shut down the server to be
packed up and made ready for delivery to the Senate. At no point was any
data deleted when shutting down the server and packing up the equipment.
Windows Servers will often change the “metadata” (additional data on files
such as creation date, access date, modified date, owner, etc.) on Microsoft
SQL database files based on actions performed on the Microsoft SQL
(MSQL) Services that are needed to run the databases.
I can't verify that info on SQL dbs on shutdown or stop. What I can verify is when a file is deleted the modified date is updated. I know that from every day pc use, and for normies/non-techies a simple google search will tell you that.
Maricopa County provided you the actual Dominion server as commanded by
your subpoena and we did not transfer or delete from that server any data
from the 2020 General Election that was subject to your subpoena. You have
now returned that server to us. Evidently your “auditors” made a copy of that
server and are conducting their analysis on the copy.
No shit. They had to do a copy. They cannot alter any files on the original machine. That is called evidence contamination. This is PC investigative work 101.
The screenshot reveals that your “auditors” were using R-Studio Network
Technician to conduct their analysis. That software is used to identify files
that are missing at the spot the software is told to search. Yet you provided
the screenshot falsely asserting that these identified “missing files” were
deleted and evidence was “spoiled”. Nothing in this screenshot indicates that
any file was deleted or spoiled. At most what can be discerned from this
screenshot is that R-Studio, as used by your “auditors,” did not locate within
the copy your vendor created the particular files listed in the column on the
right.
Jeebus. This is the equivalent of saying you don't know what this program does and you explaining it is lying. So you can't prove it. Wow. Just... wow.
Still, these files, and the Database, have the ominous red X-mark. We cannot
say for certain what that mark indicates—other than that it likely indicates that
R-Studio was unable to locate the files. The screenshot does not identify
what type of search your “auditors” ran, and you conveniently failed to provide
the full report the search generated.
O_O
Gaslighting. Clear glass lighting. This can be easily dispelled by a google search but whatevs.
So for claim 1, this is a Gaslighting. They are trying to implant the idea that Cyber Ninjas do not know what they are doing via legal speak. This is psyop act, design to discredit their work as nonsense.
• The Elections Department transported the subpoenaed material from
the Maricopa County Tabulation and Election Center (MCTEC) to your
custody at the Arizona Veterans Memorial Coliseum in box trucks
secured with a tamper-evident seal after being loaded at MCTEC.
• MCSO deputies observed the trucks being loaded and then escorted
the trucks to the Coliseum.
• Mr. Bennett gave approval to unload each truck. All the tamper-evident
seals were photographed by the Senate’s contractors as well as by
County representatives to confirm that the seals were still intact. And,
Mr. Bennett or his designee personally observed each seal being
broken before the trucks were unloaded.
And here we have it. This is broken chain of custody right here. They are claiming they weren't broken when sent, and were broken upon arrival. Its he said she said BS. This is how you fuck up a secure audit: doubt. When were they broken? Lets throw out the audit as a whole.
It'd be terrible if all of this was filmed. Just saying.
Anyways, the rest of the detail here is basically a them saying we did everything correctly, it was your guys that f'd this up.
Here is the real sauce here:
Early ballots returned by voters to MCTEC are placed into batches of
approximately 200 ballots and then examined by bipartisan Early Ballot
Processing Boards (“EV Processing Boards”). The EV Processing Boards
check the ballots in each batch with the human eye to determine whether, in
their judgment, the ballots are capable of being tabulated by the tabulation
machines, or whether they are damaged such that they will not be read by the
machines but must be duplicated pursuant to statute (A.R.S. § 16-621(A)).
Examples of damaged ballots that cannot be read by the tabulators include
ballots that are ripped or those that have had a drink spilled on them.
Because it is obvious the tabulators will not read such damaged ballots, those
ballots are removed from the batch and sent to a bipartisan Ballot Duplication
Board to be duplicated onto a new ballot as required by statute. (A.R.S. § 16-
621(A) and Elections Procedures Manual, Chapter 10, Part II(D) at 201). All
such duplicated ballots are then tabulated by the tabulation equipment, as the
law requires. The rest of the ballots in the batch are sent to the Central Count
Tabulators to be tabulated.
But not every ballot that is sent for tabulation can be read by the tabulators.
Sometimes the voters make stray marks that interfere with the tabulation
process. Or, the early ballot is printed slightly off-center. These unreadable
ballots are rejected when inserted into the Central Count Tabulators. In these
instances, those damaged ballots are sent to the bipartisan Ballot Duplication
Boards directly from the central count tabulation center.
That is pure bullshit. Regardless if a vote is rendered damage, they NEED to hold onto it.
This is how fraud happens. Seriously. We are just going to remake these ballots because they didn't work! Of course we didn't put them in the box with the others. These is pure chicanery if there is any to be had, and without the original ballots, we can never tell who the votes for. This is honestly an attempt to dismiss a legitimate question with long winded, condescending language to make Cyber Ninjas look inept when they are trying desperately downplay the ballots were replaced and therefore not included in the boxes of the ballots.
We cannot produce what we do not possess; and, we do not
possess additional passwords.
Well I won't bother pasting their response. Here it is in playground talk:
Maricopa: We don't have them, and even if we did, you can't have them because you aren't in the cool kids club!
This was an attempt to shift the blame, aka scapegoating. Jeebus, logical fallacy 101. It doesn't address the real question posed by that statement: how can you run an election if you aren't in control of your own machines?
We will not provide your “auditors” access to the County’s
routers because doing so would compromise the security of the
County’s network, which in turn could compromise the security of
sensitive, protected and critical data.
Routers don't contain any data like that. Just IP info, and routing info. That wouldn't incriminate or jeopordize anything or anybody.
We will not attend your meeting on May 18, 2021.
You were summoned by the senate. You just opened yourself up to legal litigation. They must have weighed the option of talking or being arrested for ignoring a summons. I hope the bail they post is ridiculously high.
Your “audit” is harming all of us, and we ask you to end it.
Somebody please think of the children! The world needs to be woken up, and if crimes occurred, they need to be brought out to the light. Ignoring this is more damaging to this county's well-being than not investigating it.
I appreciate the thought, but there is enough double posting around here. Besides, I do a lot of editorializing, and I don't want anybody to assume this is the way it is.
can i ask you about the chain of custody thing... they make it sound like there are pictures of it and the seals are ok to be in the box and not out side as part of compliance? can you rephrase or dumb down how you get broken chain?
I got a slight different take... They went on and on and on detailing the coc of the loading and delivery to Cyber Ninjas, but I don't think that was the chain of custody in question. Pretty much avoided anything like who printed the valid legal ballots, how they were distributed, how they were returned/collected... My guess is some how an ass load of fake ballots were found,...different paper, different printer.
I think the OUTSIDE boxes might have been properly sealed, but the inside boxes were the ones with issues. They would have no idea about the inside boxes until unloading them and opening the outside boxes.
I believe it isn't SQL, but SSMS that is installed. Security 101: you don't install any extra software onto a sever that is supposed to be tamper proof. SSMS is specifically designed as SQL data communication protocol.
Why the heck would you want to install something that allows the remote manipulation of data on the SQL server if there are supposed to be tamper proof?
That is an interesting question. SQL DB itself is plenty secure, but adding the program that you use to write SQL database entries on a system that is supposed to be secure is sketchy as hell.
You don't need management studio to run a SQL db. SHENANIGANS!
Hey look, a brand new account. Jeebus, you are glowing so much we can see you from orbit.
Seriously google search it. The red x's for the program represent a deleted file. Its not hard. I've used the damn program previously.
The screenshot is perfectly indicative of what happened, especially considering the fact the files were recovered from a deleted state. This is fact. Go try your shill stuff elsewhere.
Scenario1: how the hell does one delete files during imaging? How does one delete files during an imaging process? I've done literally hundreds of these images and that explanation makes zero sense. You don't touch the file structure, you are imaging a volume.
More importantly: have you even worked with SQL? I have. Extensively. Databases do not get deleted during normal operation. To delete databases the way they were deleted involves several deliberate steps that would need to occur including the stopping of services and disabling of auto-start of services on restart. And if security is as tight as it is supposed to be, normal users would not be able to touch those dbs at the file level without specific administrative access.
Its clear you aren't a developer, or engineer. You need to stop talking about what you don't know about.
Scenario 2: They already said during the Maricopa Audit hearing this week that the files were 100% recovered. In fact they stated this weeks ago, we just got the confirmation at that hearing
If the next thing you say is that the auditors deleted the files on purpose to bring heat the election board you need to go sit down and stop hitting whatever narcotic you are on.
Last, this really has nothing to do with these facts, but just an overall level of panic my the Democrats: Senate President Karen Fann just received a package of white powder. While powder came back negative, its a clear message that audit is making people sweat, and you are trying to demoralize folks and throw shade on the audit.
Gonna break this down:
Part 1 of TLDR)
We demand that you immediately rescind your false and malicious tweet asserting that Maricopa County “spoiled evidence” in the days before we provided the server to the Senate. Your tweet, which relies on the “modified date” shown in the screenshot as evidence of wrongdoing, is demonstrably false; the only thing it does demonstrate is your auditors’ incompetence.
Name calling. Demands. Lol, this means nothing.
On April 12, 2021, the Elections Department shut down the server to be packed up and made ready for delivery to the Senate. At no point was any data deleted when shutting down the server and packing up the equipment. Windows Servers will often change the “metadata” (additional data on files such as creation date, access date, modified date, owner, etc.) on Microsoft SQL database files based on actions performed on the Microsoft SQL (MSQL) Services that are needed to run the databases.
I can't verify that info on SQL dbs on shutdown or stop. What I can verify is when a file is deleted the modified date is updated. I know that from every day pc use, and for normies/non-techies a simple google search will tell you that.
Maricopa County provided you the actual Dominion server as commanded by your subpoena and we did not transfer or delete from that server any data from the 2020 General Election that was subject to your subpoena. You have now returned that server to us. Evidently your “auditors” made a copy of that server and are conducting their analysis on the copy.
No shit. They had to do a copy. They cannot alter any files on the original machine. That is called evidence contamination. This is PC investigative work 101.
The screenshot reveals that your “auditors” were using R-Studio Network Technician to conduct their analysis. That software is used to identify files that are missing at the spot the software is told to search. Yet you provided the screenshot falsely asserting that these identified “missing files” were deleted and evidence was “spoiled”. Nothing in this screenshot indicates that any file was deleted or spoiled. At most what can be discerned from this screenshot is that R-Studio, as used by your “auditors,” did not locate within the copy your vendor created the particular files listed in the column on the right.
Jeebus. This is the equivalent of saying you don't know what this program does and you explaining it is lying. So you can't prove it. Wow. Just... wow.
Still, these files, and the Database, have the ominous red X-mark. We cannot say for certain what that mark indicates—other than that it likely indicates that R-Studio was unable to locate the files. The screenshot does not identify what type of search your “auditors” ran, and you conveniently failed to provide the full report the search generated.
O_O
Gaslighting. Clear glass lighting. This can be easily dispelled by a google search but whatevs.
So for claim 1, this is a Gaslighting. They are trying to implant the idea that Cyber Ninjas do not know what they are doing via legal speak. This is psyop act, design to discredit their work as nonsense.
Part 2 of TLDR)
Talking about the chain of custody:
• The Elections Department transported the subpoenaed material from the Maricopa County Tabulation and Election Center (MCTEC) to your custody at the Arizona Veterans Memorial Coliseum in box trucks secured with a tamper-evident seal after being loaded at MCTEC. • MCSO deputies observed the trucks being loaded and then escorted the trucks to the Coliseum. • Mr. Bennett gave approval to unload each truck. All the tamper-evident seals were photographed by the Senate’s contractors as well as by County representatives to confirm that the seals were still intact. And, Mr. Bennett or his designee personally observed each seal being broken before the trucks were unloaded.
And here we have it. This is broken chain of custody right here. They are claiming they weren't broken when sent, and were broken upon arrival. Its he said she said BS. This is how you fuck up a secure audit: doubt. When were they broken? Lets throw out the audit as a whole.
It'd be terrible if all of this was filmed. Just saying.
Anyways, the rest of the detail here is basically a them saying we did everything correctly, it was your guys that f'd this up.
Here is the real sauce here:
Early ballots returned by voters to MCTEC are placed into batches of approximately 200 ballots and then examined by bipartisan Early Ballot Processing Boards (“EV Processing Boards”). The EV Processing Boards check the ballots in each batch with the human eye to determine whether, in their judgment, the ballots are capable of being tabulated by the tabulation machines, or whether they are damaged such that they will not be read by the machines but must be duplicated pursuant to statute (A.R.S. § 16-621(A)). Examples of damaged ballots that cannot be read by the tabulators include ballots that are ripped or those that have had a drink spilled on them. Because it is obvious the tabulators will not read such damaged ballots, those ballots are removed from the batch and sent to a bipartisan Ballot Duplication Board to be duplicated onto a new ballot as required by statute. (A.R.S. § 16- 621(A) and Elections Procedures Manual, Chapter 10, Part II(D) at 201). All such duplicated ballots are then tabulated by the tabulation equipment, as the law requires. The rest of the ballots in the batch are sent to the Central Count Tabulators to be tabulated.
But not every ballot that is sent for tabulation can be read by the tabulators. Sometimes the voters make stray marks that interfere with the tabulation process. Or, the early ballot is printed slightly off-center. These unreadable ballots are rejected when inserted into the Central Count Tabulators. In these instances, those damaged ballots are sent to the bipartisan Ballot Duplication Boards directly from the central count tabulation center.
That is pure bullshit. Regardless if a vote is rendered damage, they NEED to hold onto it.
This is how fraud happens. Seriously. We are just going to remake these ballots because they didn't work! Of course we didn't put them in the box with the others. These is pure chicanery if there is any to be had, and without the original ballots, we can never tell who the votes for. This is honestly an attempt to dismiss a legitimate question with long winded, condescending language to make Cyber Ninjas look inept when they are trying desperately downplay the ballots were replaced and therefore not included in the boxes of the ballots.
We cannot produce what we do not possess; and, we do not possess additional passwords.
Well I won't bother pasting their response. Here it is in playground talk:
Maricopa: We don't have them, and even if we did, you can't have them because you aren't in the cool kids club!
This was an attempt to shift the blame, aka scapegoating. Jeebus, logical fallacy 101. It doesn't address the real question posed by that statement: how can you run an election if you aren't in control of your own machines?
We will not provide your “auditors” access to the County’s routers because doing so would compromise the security of the County’s network, which in turn could compromise the security of sensitive, protected and critical data.
Routers don't contain any data like that. Just IP info, and routing info. That wouldn't incriminate or jeopordize anything or anybody.
We will not attend your meeting on May 18, 2021.
You were summoned by the senate. You just opened yourself up to legal litigation. They must have weighed the option of talking or being arrested for ignoring a summons. I hope the bail they post is ridiculously high.
Your “audit” is harming all of us, and we ask you to end it.
Somebody please think of the children! The world needs to be woken up, and if crimes occurred, they need to be brought out to the light. Ignoring this is more damaging to this county's well-being than not investigating it.
You should take these two comments of yours and give them their own post. Love your breakdown! ;)
I appreciate the thought, but there is enough double posting around here. Besides, I do a lot of editorializing, and I don't want anybody to assume this is the way it is.
Well fine then, be that way :-P
(j/k - great comments & summation)
Great job
can i ask you about the chain of custody thing... they make it sound like there are pictures of it and the seals are ok to be in the box and not out side as part of compliance? can you rephrase or dumb down how you get broken chain?
oh and code monkey has some video of the boxes being opend or someshit
Its basically he said, she said crap.
They say there are no problems, everything was properly packed, and you signed off on it.
We say: this was sketch.
This is the most dangerous part of the audit. If they can cast enough doubt on the audit, the results can be contested.
COC ISSUES BEING ADDRESSED IN MEETING RIGHT NOW https://www.azleg.gov/videoplayer/?clientID=6361162879&eventID=2021051030
so they are saying we just signed off on it the way it came??!! no fucking way cyber ninjas would do that
I got a slight different take... They went on and on and on detailing the coc of the loading and delivery to Cyber Ninjas, but I don't think that was the chain of custody in question. Pretty much avoided anything like who printed the valid legal ballots, how they were distributed, how they were returned/collected... My guess is some how an ass load of fake ballots were found,...different paper, different printer.
I think the OUTSIDE boxes might have been properly sealed, but the inside boxes were the ones with issues. They would have no idea about the inside boxes until unloading them and opening the outside boxes.
yeah agreed with the gaslighting, didnt matt deperno say sql decertified the election?
I believe it isn't SQL, but SSMS that is installed. Security 101: you don't install any extra software onto a sever that is supposed to be tamper proof. SSMS is specifically designed as SQL data communication protocol.
Why the heck would you want to install something that allows the remote manipulation of data on the SQL server if there are supposed to be tamper proof?
Oh. Management studio?
That is an interesting question. SQL DB itself is plenty secure, but adding the program that you use to write SQL database entries on a system that is supposed to be secure is sketchy as hell.
You don't need management studio to run a SQL db. SHENANIGANS!
I'm seeing a whole lot of "You can't prove we did" and not a lot of "We can prove we didn't"
No, it's a screenshot and a narrative that the screenshot does not support. Simple as.
[USER WAS BANNED FOR HAVING AN EDUCATED OPINION BACKED BY EXPERTISE, WHILST DISSENTING FROM MSM NARRATIVE. THINK ABOUT THAT]
Hey look, a brand new account. Jeebus, you are glowing so much we can see you from orbit.
Seriously google search it. The red x's for the program represent a deleted file. Its not hard. I've used the damn program previously.
The screenshot is perfectly indicative of what happened, especially considering the fact the files were recovered from a deleted state. This is fact. Go try your shill stuff elsewhere.
No, you didn't and no it doesn't
Scenario 1, files were deleted as part of normal operations and person imaginging drive screwed up
Scenario 2, files were secure wiped on 4/12 in which case they were not recovered
[USER WAS BANNED FOR HAVING AN EDUCATED OPINION BACKED BY EXPERTISE, WHILST DISSENTING FROM MSM NARRATIVE. THINK ABOUT THAT]
Your explanation is just silly.
Scenario1: how the hell does one delete files during imaging? How does one delete files during an imaging process? I've done literally hundreds of these images and that explanation makes zero sense. You don't touch the file structure, you are imaging a volume.
More importantly: have you even worked with SQL? I have. Extensively. Databases do not get deleted during normal operation. To delete databases the way they were deleted involves several deliberate steps that would need to occur including the stopping of services and disabling of auto-start of services on restart. And if security is as tight as it is supposed to be, normal users would not be able to touch those dbs at the file level without specific administrative access.
Its clear you aren't a developer, or engineer. You need to stop talking about what you don't know about.
Scenario 2: They already said during the Maricopa Audit hearing this week that the files were 100% recovered. In fact they stated this weeks ago, we just got the confirmation at that hearing
If the next thing you say is that the auditors deleted the files on purpose to bring heat the election board you need to go sit down and stop hitting whatever narcotic you are on.
Last, this really has nothing to do with these facts, but just an overall level of panic my the Democrats: Senate President Karen Fann just received a package of white powder. While powder came back negative, its a clear message that audit is making people sweat, and you are trying to demoralize folks and throw shade on the audit.
Its time for you to go.
If the file was written to at shut down, as they claim, the access time would have changed. But a deletion would change only the modified time.
A deletion would not change the modified time, because the file is not being modified the file table is.
[USER WAS BANNED FOR HAVING AN EDUCATED OPINION BACKED BY EXPERTISE, WHILST DISSENTING FROM MSM NARRATIVE. THINK ABOUT THAT]