Some highlights from Dr. Shiva (Full report):
- images of ballot envelopes with an approval stamp behind the basic graphics of the envelope, suggesting tampering
- Heat map showing signature legibility percentage flipped from 95% legible and 5% illegible four weeks before the election to an inverse relationship of 5% legible and 95% illegible four days after the election
- 34,448 duplicates from 17126 voters. County reported 0
- 25% surge in duplicates from November 4th to November 9th
- 1,919 blank signatures stamped as approved. County Reported 1,455
- 587 bad signatures. County reported 0
- 934 late returns. County Reported 0
- 2580 scribbles. County reported 0
Some highlights from Doug Logan, CEO of CyberNinjas(Full reports):
- 9,041 more mail ballots returned and recorded than the official number sent.
- 3,432 more ballots cast than the list of people who show as having cast a vote
- 23,344 people voted via mail in ballot even though they showed as having moved and no one with that last name shows as living at that address.
- 2,600 excess duplicate ballots.
- 2,382 people voted in person after having moved out of the county.
- 5,047 voted in more than one county for up to 5,295 votes.
- At least one batch of 50 ballots were tabulated twice.
- 255,326 Early Votes show in the VM55 that do not have a corresponding EV33 entry.
- 282 votes from deceased.
- 393 with incomplete names.
- 2861 voters have shared an AFFSEQ number with another voter.
Some highlights from Ben Cotton, CEO of CyFIR (Full report):
- Federal law requires election data to be preserved for 22 months following an election. "Maricopa County failed to preserve the operating system security logs" within the required timeframe.
- The system had 2 bootable drives, which is not an approved configuration.
- More than 85,000 files were deleted between October 28 and November 5th, 2020 and more than 1 million files were deleted between November 1st 2020 and March 16th 2021.
- A script was run multiple times to intentionally overwrite the security logs, including the day before the auditors received the system. They have the screenshots of the people who were at the machines at the times the machines were tampered with.
- Maricopa County's system had a single password for all users and administrators. The password was created on system initialization and was never changed.
- There were hundreds of anonymous logins including remote logins.
- Remote Access, Terminal Services, and IPV6 were enabled on the EMS server. 59 ports open on boot with high port listening activity. Connectivity to the internet has been established, in violation of Arizona law and contrary to what we have been told about the system.
- The County's auditors claimed they found no internet history, but CyFIR found significant internet history in unallocated disc space.
- One EMS system connection to the internet happened on February 1, 2021, which coincides with the beginning of the audit and a purge of thousands of files.
Overall:
- numerous state laws were not followed.
- chain of custody was not accurately kept, making it impossible who touched what and when.
- obstruction occurred to prevent a full audit.
- it was impossible to certify the election.
You missed one highlight:
Apple Mectin is BASED.