“[In reply to Seth Keshel] Here is what I posted to both of them - and then they BANNED ME!!!!!!!
Karen FANN and Wendy Rogers are treasonous traitors! The Maricopa Board of Supervisors failed to comply with a subpoena for both the routers and the logs. That makes them criminals - you go to jail for that, yet neither the Sergeant at Arms nor the AZ Senate bothered to go through the necessary steps to arrest them all. Instead…what does Karen FANN do? She NEGOTIATES with the Board of Supervisors (the CRIMINALS) and allows the Board of Supervisors to take the power away from the auditors - the Cyber Ninjas - and she allows the Board of Supervisors to select anyone they want as a “third party” to take custody of the routers and logs. So this person who gets custody of everything is called a “SPECIAL MASTER,” WHO THE CRIMINALS GET TO HIRE and who these criminals will pay!!!! It doesn’t get any worse! Who do they select? JOHN SHADEGG a former representative who ENDORSED STEVEN RICHARD FOR MARICOPA COUNTY RECORDER. Who is Steven Richard? Steven Richard wrote a 36 page report stating there was ZERO fraud in the elections in Maricopa County. JOHN SHADEGG IS CONNECTED WITH THE KOCH BROTHERS. JOHN SHADEGG DOESN’T EVEN HAVE TO PREPARE A REPORT AND HIS DECISION IS FINAL. JOHN SHADEGG GETS TO HIRE HIS OWN TEAM OF “IT EXPERTS” TO REVIEW THE ROUTERS! HOW IS THIS A WIN FOR “WE THE PEOPLE” KAREN??? KAREN FANN AND WENDY ROGERS - you ARE TREASONOUS TRAITORS! You PLAYED US. HOW MUCH DID YOU SELL US OUT FOR???? F YOU BOTH! I HOPE GOD HAS A VERY VERY SPECIAL PLACE FOR YOU 2 COCKROACHES - IN HELL!!!! F YOU BOTH!”
The Routers were needed for hard evidence of IP traffic to foreign countries. Hard evidence. However, wouldn’t CISA already have monitored/recorded ALL traffic? Are they comp’d? I recall manning shakeups etc.
According to CIS (Center for Internet Security - a 501c3 non profit) they, CIS, has intrusion detection monitors (probably the Albert Sensors we heard about at the cyber symposium) on all state networks.
Here is a NBC Nightly News segment that was aired before the election of 2020 and is publicly displayed in the video history on CIS's Youtube page. (youtube link)
When I heard about the "Albert Sensor(s)" after the Mike Lindell's Cyber Symposium, I poked around the internet and it lead me to CIS.
I do not know the relation between CISA and CIS. Allegedly, according to the Wikipedia entry, CIS hosts the Multi-State Information Sharing and Analysis Center (MS-ISAC) and the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) ... I would assume there is some level of information sharing considering what they are capable of monitoring.
CIS has one location in upstate NY.
From wiki;
Cybersecurity and Infrastructure Security Agency
Not to be confused with Cybersecurity Information Sharing Act.
The Cybersecurity and Infrastructure Security Agency (CISA) is a standalone United States federal agency, an operational component under Department of Homeland Security (DHS) oversight.[4] Its activities are a continuation of the National Protection and Programs Directorate (NPPD). CISA was established on November 16, 2018 when President Donald Trump signed into law the Cybersecurity and Infrastructure Security Agency Act of 2018.[5][4] Brandon Wales served as Acting Director until Jen Easterly was unanimously confirmed by the Senate on July 12, 2021 and became Director.[6][1]
So is Jen Easterly a White Hat?
I have no idea. I stopped digging a while back when evidence came out that some election equipment has built-in mobile data capability. If devices are using mobile (cell) connections then routers, logs and network security as a whole means nothing. A mobile connection would circumvent that state network entirely.
Also, if any of the eleciton devices had wifi capability built in(aparently some do) or have USB ports that are not filled with glue, it would be trivial for a person or group of persons with enough credentials to setup all these devices to communicate over wifi to a wireless router of their choosing and then could direct that traffic over a mobile network again circumventing the state network completely. ^could do the same thing with wired connection but it would be harder to hide.
I have no idea what is going on at CISA or what exactly they even do but these election machines are way WAY too easy compromise.
Completely. We know it, and they know we know.