It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Xtrozero
originally posted by: Gryphon66
a reply to: rickymouse
I can grasp that claims are made by one side that the systems are not closed networks. I have yet to see any proof of that. The only thing you've said is "all a hacker needs is information on how to get in." Yes, I'll accept that surely. Is it your claim that this publicly available document does that?
So how do they transfer the data from a closed network, or independent machines to the main hub for collection? It seems they used flash drives? The ones my company doesn't allow ever due to security reasons... pretty f'ed up way if that is what they did. At some point that data from the machines needs to be transferred, so how many steps is that and what was the security at each step?
I'm actually asking for real and not Trolling... Seems we focus on the machines and not the process to get the votes actually counted for real. If they used flash drives would there be away to take one and change votes on the drive before sending the information? Are the flash drives physically delivered or plugged in to send the information on an open network?
Are each machine totals recorded per machine and then verifiable along the whole process? So lets say one machine A00002X3 has a manual count verified by poll watcher 12,000 votes Trump and 9000 votes Biden. Can I go back at from the total vote counts in the end and still see a break down of each machine and verify machine A00002X3 votes are still that same?
It just seems to me there are a number of risk areas in the whole process.
originally posted by: Xtrozero
Are each machine totals recorded per machine and then verifiable along the whole process? So lets say one machine A00002X3 has a manual count verified by poll watcher 12,000 votes Trump and 9000 votes Biden. Can I go back at from the total vote counts in the end and still see a break down of each machine and verify machine A00002X3 votes are still that same?
It just seems to me there are a number of risk areas in the whole process.
originally posted by: lordcomac
There were reports of mail-in ballots that had never been folded- being scanned in by the stack.
There were reports of mail-in ballots being separated from their signed envelopes during the initial counts, making it impossible to reconcile a signed ballot from one just printed off in the back room.
There were reports of staff "moving" digitally counted votes around, changing total vote counts.
At every turn, the courts are seemingly trying to prevent an investigation... or at least delay one long enough for the evidence to be covered up. Even the flow charts in this thread show clear evidence of these systems being connected to the "internet", not a closed network... and there's no shortage of ignored and uninvestigated claims of fraud.... followed by a cover-up to hide the evidence.
Anecdotal evidence is evidence from anecdotes: evidence collected in a casual or informal manner and relying heavily or entirely on personal testimony.
originally posted by: NoCorruptionAllowed
Have you noticed that the folks who believe the election was fair have decided their best strategy is personal attacks on people who want an audit? What’s that tell you?
That plus those who attempt to downplay things like this in the OP also tell us everything we need to know about them personally..
originally posted by: LookingAtMars
The information in the contract is marked confidential at the bottom of each page.
I hope some of our experts have time to look at it. It gives away a lot more than the spreadsheet does.
4.1.2 Contractor System Proposal. If State provides Contractor with Functional Requirements,
Contractor shall, at no additional cost to State, analyze such Functional Requirements to determine the
minimal amount and type of Solution that Contractor believes State needs to purchase in order to meet the
Functional Requirements. Within ten (10) business days of its receipt of the Functional Requirements,
Contractor shall deliver to State a written proposal (each a “Contractor System Proposal”) which shall
thereupon become part of the Guaranteed Functionality and be attached to the applicable Solution Order.
The Contractor System Proposal shall detail at a minimum (as applicable): (a) the Solution components
required to meet the applicable Functional Requirements; (b) the minimal operating system, network, and
third-party software necessary to run the Designated Licensed Programs in conformity with the Functional
Requirements;
and (c) the estimated cost for such Solution determined in accordance with this Agreement.
Nothing contained in the Contractor System Proposal shall obligate State to purchase any Solution or
portion thereof.
11.7 Data and Network Security.
11.7.1 Contractor is responsible for providing network security and security for such of its facilities where its servers or other network equipment are located. Contractor shall also comply with its own then current security policies and procedures, and its security policies and procedures shall comply with laws and regulations applicable to Contractor.
regarding how the system handles power failure situations.
Network Failure during Ballot Generation
Dominion tabulators are not connected to the Internet. In some jurisdictions, though not in Antrim, cellular modems are used for very brief periods, after the polls are closed, to transmit unofficial results from the precincts to the county headquarters. In Antrim, the tabulator memory cards are sealed and delivered to the county clerk by hand and there is no Internet connectivity, which could pose a potential risk of hacking, he said.
originally posted by: Gryphon66
a reply to: Xtrozero
Those are good questions. If the computers can't connect to an external network, or use a cellular modem, how is the data going to be transferred except in external media (like a flash drive). My guess would be that the system in a given polling place creates some sort of paper certificate for the count? Hopefully the flash drives have proper security?
I haven't done any research on that at all X. Good question.
In Antrim, the tabulator memory cards are sealed and delivered to the county clerk by hand and there is no Internet connectivity, which could pose a potential risk of hacking, he said.
originally posted by: Gryphon66
a reply to: HalWesten
Dominion tabulators are not connected to the Internet. In some jurisdictions, though not in Antrim, cellular modems are used for very brief periods, after the polls are closed, to transmit unofficial results from the precincts to the county headquarters. In Antrim, the tabulator memory cards are sealed and delivered to the county clerk by hand and there is no Internet connectivity, which could pose a potential risk of hacking, he said.
Detroit Free Press
Paraphrase of Poulos testimony.
originally posted by: Gryphon66
a reply to: Xtrozero
Those are good questions. If the computers can't connect to an external network, or use a cellular modem, how is the data going to be transferred except in external media (like a flash drive). My guess would be that the system in a given polling place creates some sort of paper certificate for the count? Hopefully the flash drives have proper security?
I haven't done any research on that at all X. Good question.
originally posted by: a325nt
a reply to: carewemust
Obama sold the free press to the CIA via EOs, CNN was first in line begging for it.
They've been in on it since day one, they just never expected their compliance in 2016 cheating to be insufficient
originally posted by: HalWesten
originally posted by: Gryphon66
a reply to: Xtrozero
Those are good questions. If the computers can't connect to an external network, or use a cellular modem, how is the data going to be transferred except in external media (like a flash drive). My guess would be that the system in a given polling place creates some sort of paper certificate for the count? Hopefully the flash drives have proper security?
I haven't done any research on that at all X. Good question.
I looked up some of the Dominion equipment and watched the operation video for the tabulator. Accessories are connected via USB ports on the side under some doors. Easily connected, AND there is an RJ45 port and a USB port in one area that the modem is connected to to transfer the election results to wherever that call is made. I'm assuming it's a cell phone fob.
Other doors are labeled CF1 and CF2, possibly Compact Flash cards? I haven't watched all the videos to find out.