MORE OUTRAGEOUS ACTS: Maricopa
County Attorney Claims They Can’t Provide
Routers and Passwords to Auditors – Here’s
Why This Is Questionable
Gateway Pundit,
by
Joe Hoft
Original Article
Posted By: Harlowe,
5/10/2021 11:24:40 AM
We received a report over the weekend dated May 3 from the Maricopa County Attorney’s office directed to the audit team in Maricopa County explaining that they just weren’t able to provide routers requested by the auditors. They also shared that they had provided all the passwords they had to the audit crew.(Snip)We noted that the Sherriff of Maricopa County, Paul Penzone, was cc’d in the letter. He is probably better known for the $2 million in support from George Soros in 2016 in the Deep State’s effort to see Sheriff Joe lose for the first time in seven elections. This was reported in Arizona at the time:
Reply 1 - Posted by:
DVC 5/10/2021 11:47:18 AM (No. 780812)
Would they lie about this? Of course they would. And they probably are lying.
8 people like this.
We CAN handle the truth, Massive Fraud allowed.
7 people like this.
Reply 3 - Posted by:
downnout 5/10/2021 12:35:20 PM (No. 780881)
It is just amazing how often Soros’ name pops up relative to “questionable” events.
14 people like this.
Reply 4 - Posted by:
LadyVet 5/10/2021 12:46:44 PM (No. 780902)
Implication is that elected officials did not have the password to the admin account. This would mean that Dominion kept the password and could do whatever they wanted. BIG PROBLEM.
No wonder Dominion is threatening whistleblowers with billion $$ lawsuits. Intimidation to hide their actions.
13 people like this.
Reply 5 - Posted by:
hershey 5/10/2021 1:33:04 PM (No. 780946)
They need to be hauled out of office in hot tar and dusted with feathers before being tied to a rail and run out of town...wankers...wonder how their bank accounts look???
2 people like this.
Reply 6 - Posted by:
DVC 5/10/2021 1:38:32 PM (No. 780959)
#5, that would be in prep for their appointment with the firing squads.
3 people like this.
Reply 7 - Posted by:
happywarrior 5/10/2021 1:47:18 PM (No. 780969)
As Juanita Broaddrick wrote on Twitter: it's like buying a car and the salesman won't hand over the keys.
2 people like this.
Reply 8 - Posted by:
angelgrammi 5/10/2021 1:52:13 PM (No. 780974)
If you don't have the passwords and routers, the system doesn't belong to you. Period.
8 people like this.
Reply 9 - Posted by:
javaboy 5/10/2021 2:52:50 PM (No. 781021)
The arguments implying the router stores private information about people (or any of the other sensitive info claimed by the letter) is entirely bogus. Routers are network/Internet switchboards and their logging is limited to that function. Routers do not generally (or by default) log the actual packets of information which goes through them (though they might send the packets to some location for storage) - the sheer amount of the actual packet data is simply too large to be logged by the router. Routers do however (or are at least able to) log WHERE the packets came from and WHERE they were sent. The logs can be used to determine if there was outside access to internal devices, or if internal devices sent/received information to external locations. The internal and external devices can be any device with an IP address connected to a network (phone, tablet, laptop, IP camera, NAS, etc). The logs would contain some combination of: timestamp; source IP (and possibly device name); section IP (and again possibly a device name); the port (ie 80 normally used for http, 21 for ftp, etc); and several other pieces of metadata which can be used to determine what type of activity was going on. These logs are routinely used for security purposes and to monitor activity (to detect problems). Routers can also be programmed to route certain types of traffic to specific IP "locations" and to basically control traffic on the networks in which they are attached. If the actual packet data was logged somewhere, it truly would be interesting to see - especially if the software/firmware images were available. In such a case, the entire process could be replayed from the logs (this is sometimes done for troubleshooting and security purposes).
If someone is trying to hide the logs, they are trying to hide the activity which was logged. If they are trying to hide the "image," they are trying to hide the traffic programming. There is absolutely no truth to the "justifications" given in the letter.
10 people like this.
Reply 10 - Posted by:
javaboy 5/10/2021 2:57:09 PM (No. 781023)
My previous post has a couple of auto-correct typos. For instance, "section IP" should be "destination IP"
If computers really do ever try to take over, they are going to have to get a lot smarter than they are now :-)
0 people like this.
Reply 11 - Posted by:
Nimby 5/10/2021 3:01:12 PM (No. 781028)
Pay an 18 year old who can hack into the system
0 people like this.
Reply 12 - Posted by:
Omen55 5/10/2021 3:17:28 PM (No. 781038)
It's time for the judge to start throwing dem into jail for contempt.
2 people like this.
Reply 13 - Posted by:
DVC 5/10/2021 3:28:54 PM (No. 781050)
Yes, exactly why they are desperate to keep the router logs from being revealed. Count on the fact that they WILL show that external sources accessed the "Voting machines" and gave them external commands all during the election. Probably actually be able to identify WHERE the external computers were located. Were they even inside the USA?
The router logs a crucial to understand who was controlling these "voting machines", and you can see it was NOT the election officials, and it sure as hell wasn't the voters.
Massive fraud is being peeled back, bit by bit and the crooked players are fighting every inch of the way.
5 people like this.
Reply 14 - Posted by:
dolphin 5/10/2021 4:23:23 PM (No. 781074)
What #9 said. But what are we going to do about it? They keep getting away with murder. (Do I mean that literally? Maybe.)
1 person likes this.
Reply 15 - Posted by:
MickTurn 5/10/2021 4:37:23 PM (No. 781090)
IF they don't have them then they farmed out all THEIR WORK to Dominion and their contractors...likely highly ILLEGAL and why they are fighting to keep this under wraps. Sorry Crooks, IT's pretty obvious what you allowed Dominion to do and now you're covering it up. GET A ROPE, LOTS OF THEM!
2 people like this.
Reply 16 - Posted by:
stablemoney 5/10/2021 5:07:02 PM (No. 781122)
The evidence of the CCP and Democrat Party conspiracy to steal the election is on those routers, which is why the Democrat's don't want the routers looked at.
2 people like this.
Reply 17 - Posted by:
Peach1 5/10/2021 5:25:10 PM (No. 781136)
Can’t provide, or WONT provide?
Definitely the latter.
1 person likes this.
Below, you will find ...
Most Recent Articles posted by "Harlowe"
and
Most Active Articles (last 48 hours)