It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Boadicea
a reply to: tanstaafl
One of this things mentioned during the latest hearing is that the same password was used by everyone since the machine was put into service. So am I understanding correctly that because there was only one password used, ever, that they would not necessarily know the specific person?
And would this include where any access originated?
So could the logs tell them from where someone was accessing the machines? And how would that appear? Would the logs show a geographical location it was being accessed from? Or a specific computer the accessor was using?
And is it safe for me to assume it would also show if any information transmitted/downloaded during that access? But not necessarily the information transmitted/downloaded?
Sorry for all the questions... if you cannot/don't want to answer, that's fine. I'm just trying to understand it for myself!
originally posted by: network dude
a reply to: Boadicea
IP addresses can be used to identify the location of the intrusion, but VPN's can mask the locations and obfuscate the identity.
Correct. You could even determine file sizes, and depending on the log levels that were set, you could possibly see filenames. But not the data itself.
originally posted by: Boadicea
a reply to: tanstaafl
So purely hypothetically speaking (LOL!), if someone accessed the machines early the morning of Election Day to download/upload 10,000 brand spanking new bogus voter registrations, would it be possible to cross reference data logs or something to match the transmission with the end result?
Would it show exactly where that new data was download/uploaded (I'm not sure of the correct term here), as in directly to the voter registration database?
Or would someone have to actually look at all that happened anywhere and everywhere on the system, and then identify and isolate a 10gb download on the router logs with a 10gb download at the same time on the registration database?
originally posted by: Nunyabizisit
a reply to: tanstaafl
I've tried to make it non technical enough for consumption here before, and didn't do very well.
originally posted by: tanstaafl
originally posted by: Nunyabizisit
a reply to: tanstaafl
I've tried to make it non technical enough for consumption here before, and didn't do very well.
Rotflmao! That is because my knowledge and skills are more general and higher level (higher in a sense of being less technical and more management level). I'm just a sysadmin, I manage a small shop, couple of VMWare hosts and less than a dozen virtual machines, a few switches, any our Watchguard perimeter firewall/intrusion detection/router device, a bunch of VoIP phones, etc...
I can manage some simple scripts, but I'm sure any competent programmer would either just have a good laugh or run away screaming if they got a look at any of the ones I've written.
originally posted by: Nunyabizisit
Am pretty similar, except haven't managed my own machines for quite a while now.
And I specialized in Citrix/HyperV instead of VMWare (just due to clients I was serving).
originally posted by: network dude
a reply to: Boadicea
One thing about the intrusion possibility is that the machines were not supposed to be connected to the internet at all. And each machine has a "mac" address associated with the network port. It's specific to each machine, and none are the same, so if a voting machine was tied to the network at the time of election, the routers should have that data stored in the log files. All that is needed to cause a really, really large stink is to find ONE voting machine tied to the internet during election time.
I have a feeling that is why the routers aren't being turned over.
originally posted by: IndieA
And I'm nowhere near as knowledgeable about networks as you two, but if Mike Lindell has the election data he claims to have, all the packet captures of every hacked voting machine and every altered vote, and the county router records happen to match, wouldn't that also be a big deal?
ABC News reported:
The Justice Department on Wednesday released guidance intended to caution states embarking on so-called post-election ‘audits’ of vote counts for the 2020 presidential election that they must not run afoul of federal voting laws.
The guidance, previously previewed last month by Attorney General Merrick Garland in his policy address on voting rights, outlines federal statutes that the department says elections officials must adhere to during such “audits,” such as preserving all federal elections materials and making sure they’re not tampered with.
“This document sets down a marker that says the Justice Department is concerned about this, and we will be following this closely,” a DOJ official told reporters on a media conference call Wednesday.