The Maricopa County Supervisors have still not complied with lawful subpoenas from the state Senate, even after the damning revelations from the auditor’s press conference. They are still refusing to hand over routers, Splunk logs, and fobs. But, there is a simple way to get them to comply. Arrest them. Put them behind bars and let them see what jail life is like and don’t let them out until they comply.
One of the major concerns presented by audit officials is the missing event logs. The logs were deleted by 37,646 consecutive login queries in one day. That does not sound accidental to me. Every election Administrator account has the same password no matter the user.
Dominion has two full-time staff onsite servicing the Maricopa County election system. The current Dominion software was installed in August 2019. Since that date, there have been no antivirus updates, no operating system updates, or any security patches. Administrator accounts were also created on that date, each having the exact same password. These are actions of a ‘worst in class’ IT Department and it is a deliberate subterfuge of an election system. Common practice is to update patches on a much more regular basis.
Does this explain why on-demand ballots were misprinted with offsets of up to 3200%? Did somebody hack and change the system configuration of on-demand printers?
In addition, Maricopa County’s Twitter account says, somebody “was “inappropriately accessing and downloading”, in other words breaching, “publicly available information”.
A Maricopa County Employee described this information breach as an “intrusion” and scrubbing of voter registration information. This is the same “publicly available” information that the county referred to. Police “raided the individual’s home” and retrieved this data within seven hours.
They raided his home and arrested him for inappropriately accessing publicly available info?
Were the E-pollbooks, which are connected to tabulators and WiFi accessed?
We cannot know without the subpoenaed routers, passwords, Splunk logs, and iButton fobs.
The routers show when and where data was transmitted to and from. Splunk logs log this data along with the MAC address of the device which was utilized.