Dominion

Breaking: Forensic Probe Reveals Iranian Back Door Connection With Dominion

The Dominion Voting Systems equipment used in our totally rigged fraudulent election had a secret back door connection straight to Iran. One of the affidavits that President Donald Trump’s legal team brought to the emergency meeting with Arizona legislators on Monday details the infuriating results of a forensic probe.

Dominion targeted by ‘white hat’ hackers

In the wake of this year’s explosion of election controversy, an unidentified “electronic intelligence analyst” took a crack at the Dominion machines used in the election.

His affidavit swears that he’s assigned to the “305th Military Intelligence” division with “extensive experience as a white hat hacker used by some of the top election specialists in the world.” He found things which could affect the outcome of the election.

The investigator used “industry standard” digital forensics tools to “certify connections between servers, network nodes and other digital properties.”

His probe for network system vulnerabilities using Spiderfoot and Robtex found a bunch of them in the Dominion network.

Dominion, it turns out, works with Edison Research and the equipment for both companies exists “in the internet of things.” That makes their network connections “available for scanning.”

Edison’s part in the drama is to “report the tabulation of the count of the ballot information as received from the tabulation software, to provide to Decision HQ for election results.”

Passwords and more passwords

A few days after the election, on November 8, the investigator found “13 unencrypted passwords for Dominion employees, and 75 hashed passwords available in TOR nodes,” on Dominionvoting.com, which isn’t a good thing.

The Onion Router is used to enable anonymous communication by directing internet traffic through an overlay network.

Since LinkedIn used to show that most of the Dominion engineers lived and worked in Serbia, it’s no surprise that the auditor found “a direct connection to the group in Belgrade.” Things got spooky when he started looking at Edison Research. That company has an “Iranian server.”

The sworn affidavit states, “inputting the Iranian IP into Robtex confirms the direct connection into the ‘edisonresearch’ host from the perspective of the Iranian domain also.

This means that it is not possible that the connection was a unidirectional reference.” In other words, it made two way communication possible.

The tech also found evidence that both Dominionvoting and dominionvotingsystems.com along with other Dominion addresses were accessed by China. “The records of China accessing the server are reliable,” he writes.

Dominion

Dominion linked to Obama, Iran and China

Dominion partner Edison Research is connected with BMA Capital Management through a Virtual Private Server. BMA, in turn, “is known as a company that provides Iran access to capital markets with direct links publicly discoverable on LinkedIn.”

Not only that, “the same Robtex search confirms the Iranian address is tied to the server in the Netherlands.” A server already listed on international “Advanced Persistent Threat” bulletins.

When he ran down a connected server identified as indivisible.org, the cybersleuth found “the existence of scorecard software in use as part of the Indivisible (formerly ACORN) political group for Obama.”

One of the Dominion partners conveniently used “an auto discovery feature” which maps new connections automatically. He has a nifty diagram to show “how these domains also show the connection to Iran and other places,” including one in China. Auto discovery allows “programmers to access any system while it is connected to the internet.”

In 2019, the election equipment firm “sold a number of their patents to China.” They used a bank in Canada as a cutout. In his professional opinion, The investigator calls what he found “unambiguous evidence that Dominion Voter Systems and Edison Research have been accessible and were certainly compromised by rogue actors, such as Iran and China.

By using servers and employees connected with rogue actors and hostile foreign influences combined with numerous easily discoverable leaked credentials, these organizations neglectfully allowed foreign adversaries to access data and intentionally provided access to their infrastructure in order to monitor and manipulate elections, including the most recent one in 2020.

Sponsored
0 comments
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Article
rejects

Turncoat REJECTS President Trump

Next Article
seat

We Just Flipped Another House Seat RED

Related Posts