(Jordan Conradson) On Friday, Attorney General Mark Brnovich opened an investigation into Maricopa County’s failure to comply with valid and enforceable legislative subpoenas as requested by Arizona State Senator Sonny Borrelli.
Related Is Maricopa’s VRAS System at the Heart of Election Fraud?
by Jordan Conradson, August 8th, 2021
Attorney General Brnovich sent notice to Maricopa County with a request for a written response from the Maricopa County Board of Supervisors by 5:00 p.m. on Friday, August 20, 2021.
This comes after Maricopa County failed to comply with subpoenas for routers, passwords, splunk logs, and other items relating to the 2020 election.
In response to the Senate, the County sent a disdainful letter that attacked the efforts of their constituents volunteering for the audit and shared more tweets claiming innocence.
Our election professionals and Board members have complied w/Senate demands & supplied everything professional auditors would need to do their job. In fact, you can find results from 2 audits performed by certified companies the County hired here: maricopa.gov/5681/Elections#azaudit
The County has made consistent efforts to meet Senate demands that were safe and supported by law. Of course, we can only provide what we actually have. Find the facts and learn more about election processes at https://t.co/PHPv4LKhkc https://t.co/iwkThng8UD pic.twitter.com/km9aWIc9Zy
— Maricopa County (@maricopacounty) August 5, 2021
The Arizona Senate’s latest subpoena requested the following items from the County.
These subpoenas are safe and supported by law.
1. All reports, findings and other documents concerning any breach of the voter registration server, the Maricopa County Recorder’s Office systems, or any other aspect of the Maricopa County elections systems at any time within six months of the November 3, 2020 general election.
2. All ballot envelopes received in connection with the November 3, 2020 general election, or digital images of the same.
3. All user names, passwords, pins and/or security keys or tokens required to access, or otherwise relating to, any and all ballot tabulation devices used in connection with the November 3, 2020 general election in Maricopa County. This is specifically for all levels of access, including, but not limited to, administrator access or any other level of access required to access and print the configuration of the ICP2 devices. This request also includes any materials that the County does not possess but which it has a right to access.
4. All Maricopa County registered voter records to date, with any and all change histories including but not limited to the following:
- The field that was added, removed, or changed
- A timestamp (date and time) for the change
- Identifying information for the individual who made the change (internal employee ID and/or IP address)
5. All routers used in connection with the November 3, 2020 general election, or virtual images of the same, and the public IP of each such router.
6. All Splunk logs, network logs, net flows, or similar data related with systems associated in any way with the administration of the November 3, 2020 general election, for the time period beginning 60 days before the election and ending 90 days after the election.
Maricopa County claims that all of these items were given to the Senate already and that “No routers have ever been connected to the tabulation equipment or the Election Management System. The County will not provide its network routers used to support over 50 departments as there are significant security risks posed by producing its routers.”
The routers do not carry data. They only show where data has been sent. What are they hiding?
In addition, they claim that “all logs needed to independently assess whether the tabulation equipment connected to the internet were provided to the Senate”. This includes Windows Security Event Logs.
Not all logs. Only the logs that the county says are “needed”.
They still have not answered the question, who ran a script with 37,646 queries to delete Windows Security Event Logs prior to February 5th, 2021? Who deleted these election logs and what was on them?
Dominion Voting Machines was subpoenaed for “all user names, passwords, pins and/or security keys or tokens”. In May, they responded to the Arizona Senate saying,
“Releasing Dominion’s intellectual property to an unaccredited, biased, and plainly unreliable actor such as Cyber Ninjas would be reckless, causing irreparable damage to the commercial interests of the company and the election security interests of the country… No company should be compelled to participate in such an irresponsible act.”
The County is not in possession of these administrative passwords which give the user complete and total access to the system. Only Dominion has this level of control over our elections.
Dominion will not release this information to the Arizona Senate, citing their intellectual property rights.
Since when are private companies granted intellectual property rights over our elections? Do the commercial interests of Dominion take precedence over U.S. national security interests?
Dominion was hired by Arizona to provide a free, fair, and TRANSPARENT election. They are not fulfilling their contract.
The County and Dominion’s refusal to cooperate is causing serious concern.
[the_ad_group id=”25840″]
Stillness in the Storm Editor: Why did we post this?
The news is important to all people because it is where we come to know new things about the world, which leads to the development of more life goals that lead to life wisdom. The news also serves as a social connection tool, as we tend to relate to those who know about and believe the things we do. With the power of an open truth-seeking mind in hand, the individual can grow wise and the collective can prosper.
– Justin
Not sure how to make sense of this? Want to learn how to discern like a pro? Read this essential guide to discernment, analysis of claims, and understanding the truth in a world of deception: 4 Key Steps of Discernment – Advanced Truth-Seeking Tools.
Stillness in the Storm Editor’s note: Did you find a spelling error or grammatical mistake? Send an email to corrections@stillnessinthestorm.com, with the error and suggested correction, along with the headline and url. Do you think this article needs an update? Or do you just have some feedback? Send us an email at sitsshow@gmail.com. Thank you for reading.
Source:
[the_ad id=”121669″]
Leave a Reply