Hi again!
I'm Justin Mealey, and I testified at the Georgia Senate hearing today. Our team provided hard evidence of voter fraud, using the same data the Georgia certified the state with.
Here's a copy of the testimony: https://rumble.com/vcay7j-data-scientists-shocking-election-testimony.html
I wanted to do an AMA so that people can ask more questions related to our data methodology, clarify items about the voting process which we painstakingly investigated across multiple states, and hear your ideas about we could better get the word out about the fact that we seem to be one of the only groups operating off of hard, irrefutable conclusions based off of data.
EDIT: Thanks so much for the questions (heading to bed) -- hope I was able to clarify a few things for you guys. We'll ask Dave (the head data scientist who also testified from my group) to come do any AMA tomorrow as well.
EDIT 2: I'm sort of back right now (9AM EST) so will be periodically checking for new questions as I refresh tdw looking for spicy memes to repost on facebook.
EDIT 3: (10:32AM EST) I'm going to post a reply to a MrCaveman (which, thank you for the question) that I really want everyone to read:
https://thedonald.win/p/11RO7PRc9Q/x/c/4Drwoe2gIJ7?d=50
When doing work that you deem is important, the most vital thing you can have is focus. A lot of the times that means putting to the side all of the noise that surrounds a certain path. The poll pads are the noise when it comes to the actual ability to commit fraud during this election.
If you were creating a system to enact a fraud, how many points of contact would you design for that system to interface with in the voting process? How many confederates would you need to enable in that system? One way we've discovered only requires one true confederate to enact in a county, and we've actually identified some of these actual confederates. Depending on how things go, we might have to just release that in a video in the future.
My point being, that while your intentions are good (as most everyone's on this site's are), they distract from the actual fraud. By distracting from the actual fraud, parts of which we've proved through hard data analysis, it actually detracts from the ability for us to bring that fraud to light and abolish it.
Please, for the love of God, stop talking about poll pads.
There's a major difference between intranet and internet. When we're talking about devices connecting to the internet, we're talking about something communicating with another device across networks. What you're looking at in that image are just wi-fi networks, which can be (and are in this case) mostly intranets without actual internet access. You'd connect to that network, be able talk to other devices on the network, and that's about it. It's necessary because of the nature of some of the command and control systems in the software employed at these precincts.
All that being said, the systems we have in place are bullshit. There's a reason media folks have constantly parroted back that "widespread voter fraud is near impossible to enact". It's because they're basing that statement off of the decentralized nature of our past voting systems, where we counted paper ballots, ballots were tabulated, and at every step of the way you'd have audit-able trails of paper.
That's not the system we have today.
Georgia in particular is the most centralized state in the union. It's so centralized, that the county doesn't even find out how the county voted until the Secretary of State TELLS the county how the county voted. Does that seem right to you?
Anyhow, focusing on internet connectivity of devices is a red herring.
What I’m reading from this is that bad actors would only need to compromise ONE node (GA SoS and/or his office) vs a multitude of nodes.
Wondrous security, isn’t it?
You would think so, but there are places in the topography before that which are just as vulnerable.
For instance, the dominion SQL database that runs a cron job adding up reports uploaded to it via FTP. All of the systems downstream of that just trust that data 100%.
Was that the same FTP server hosted at: https://dvsfileshare.dominionvoting.com/ Which up until the SolarWinds hack dropped and people caught wind of it, proudly showed a SolarWinds logo at the bottom of the page. This page was also completely unsecured http a couple weeks ago and they fixed it after being called out on Twitter about it.
I really hope you meant SFTP! But something tells me not.
I’m and engineer for a carrier-class network devices company. What you just wrote about Dominion’s lack of security protocol just made my skin crawl, and not in a good way. 😧
I get what you are saying, but say I was close enough or even in the room with these machines with a laptop (or thermostat apparently) that was connected to the internet (via hotspot or something). Then I hack into one of these Intranet nodes. That is essentially these machines being connected to the internet, and since one thing on the intranet is connected to the internet everything on the intranet is connected (pretty much bypassing any firewall/security measures). I am an automation engineer and one of the biggest security risks is someone getting into the intranet where all of the devices are. If that happens, those devices have minimal security that can be easily bypassed (if someone knows what they are doing) and they could easily be spoofed (unauthorized device making itself look like the authorized one) to send false data. Also, the Dominion CEO said none of their machines have wireless capabilities (lie).
I commented something similar. Just because they're intranets it shouldn't be dismissed so easily.
are you saying he didn't actually remotely connect into voting systems? or that somehow, being able to remotely connect to something that needs to be really secure, doesn't make it less secure?
I wouldn't dismiss it so quickly just because the network you'd connect to has no gateway to the internet. A network breach is a big deal because devices can access two networks at once. If I had a laptop with a wifi antenna and one with a 4G antenna I could let in and out anyone I wanted to their network.
It’s a lot of ifs. Actual hacking involves root accesses, co-opting api calls or processes for unintended actions, or disabling devices. None of those things occurred here, so as far as I’m concerned, is not hacking.
There are many types of hacking and yes what you describe are some of them but not all of the ways. By definition, "Hacking" is just finding a short-cut or compromising computer systems, personal accounts, computer networks, or digital devices. Another way to define hacking is simply as the use of technology or related knowledge to successfully bypass a challenge.
It's not that many it's. It's one. And only one of many examples.
The point was it shouldn't be dismissed solely because they were on a network with no internet access when the internet can easily brought to that network.
It's the first step. Gain access to the network. From there we get into the other things you mentioned gaining root access etc... But you have to start somewhere and saying
Is not at all the limit of the possible capabilities.