Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: All

Dominion Voting Systems Patents Given In 2019 To China Bank For Collateral
Project Camelot ^ | 11.13.20 | Paul Collin / FR Posted on 11/22/2020, 3:01:00 PM by malach

Dominion Voting Systems Inc. ’18 Patents’ and ‘Intellectual Property Rights’ exchanged on September 25, 2019 for Collateral from HongKong Shanghai Banking Corporation ( People’s Republic of China ), Patent Numbers, Descriptions, Collateral Security Agreement plus more ....

‘For more than the past decade, a plethora of questions surround ‘high-technology’ issues in-to ‘voting manipulations’ ( counterfeiting, liquid chemical matrix compound copying, fraudulent templating, etc. ), ‘security countermeasure features’ and ‘anti-security counter-countermeasure features’ having remained hidden from public view; a few of which, are now briefly outlined....

DOMINION VOTING SOLUTIONS was founded in 2002 in Toronto, Canada by John Poulos and James Hoover. DOMINION VOTING SOLUTIONS INCORPORATED [ of Denver, Colorado is 1 of the 3 voting machine companies used in American Presidential Elections ] purchased PREMIER ELECTION SOLUTIONS from a company named ELECTION SYSTEMS AND SOFTWARE L.L.C. [ ES&S of Omaha, Nebraska is another 1 of the 3 voting machine companies used within American Presidential Elections ] during May, 2010 plus, SEQUOIA VOTING SYSTEMS INCORPORATED ( of Oakland, California ) in June, 2010.

After DOMINION VOTING SYSTEMS INC. acquired those voting machine companies, it relocated away-from Toronto, Canada to Denver, Colorado in America. Both SEQUOIA and PREMIER voting equipment firms are known as original equipment manufacturers (OEM).

As a point of reference, the third (3rd) voting system machine manufacturer (used in American Presidential Elections ), is HART INTERCIVIC INCORPORATED ( of Austin, Texas )....

Paul Collin E-MAIL: UnwantedPublicity@GMAIL.Com
WWW: KentronIntellectResearchVault.WordPress.Com
(Excerpt) Read more at projectcamelotportal.com ...


4 posted on 11/26/2020 4:03:12 PM PST by Liz ( Our side has 8 trillion bullets; the other side doesn't know which bathroom to use. )
[ Post Reply | Private Reply | To 3 | View Replies ]


To: Liz

Bttt


12 posted on 11/26/2020 4:07:07 PM PST by Guenevere (No weapon formed against you shall prosper, and you will refute every tongue that accuses you(Isaiah)
[ Post Reply | Private Reply | To 4 | View Replies ]

To: Liz

bttt


65 posted on 11/26/2020 6:23:19 PM PST by linMcHlp
[ Post Reply | Private Reply | To 4 | View Replies ]

To: Liz; SelfhatingMillennial; LilFarmer; MikeyB806; Lazamataz; Mr. K
Re Iran

Joint Cybersecurity Advisory Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data

See Sidney Powell's work (documents submitted in Georgia) at:

https://www.courtlistener.com/docket/18694655/pearson-v-kemp/

Scroll down to:

"MOTION for Temporary Restraining Order IMMEDIATE HEARING REQUESTED . . ."

"[Attachment 2] Exhibit Joint CyberSecurity Advisory Exhibit"

https://www.courtlistener.com/recap/gov.uscourts.gand.284055/gov.uscourts.gand.284055.6.2.pdf

October 30, 2020

EXCERPT:

- - -

Analysis by CISA and the FBI indicates this actor scanned state websites, to include state election websites, between September 20 and September 28, 2020, with the Acunetix vulnerability scanner . . . Acunetix is a widely used and legitimate web scanner, which has been used by threat actors for nefarious purposes. Organizations that do not regularly use Acunetix should monitor their logs for any activity from the program that originates from IP addresses provided in this advisory and consider it malicious reconnaissance behavior.

Additionally, CISA and the FBI observed this actor attempting to exploit websites to obtain copies of voter registration data between September 29 and October 17, 2020 . . . This includes attempted exploitation of known vulnerabilities, directory traversal, Structured Query Language (SQL) injection, web shell uploads, and leveraging unique flaws in websites.

CISA and the FBI can confirm that the actor successfully obtained voter registration data in at least one state. The access of voter registration data appeared to involve the abuse of website misconfigurations and a scripted process using the cURL tool to iterate through voter records. A review of the records that were copied and obtained reveals the information was used in the propaganda video.

CISA and FBI analysis of identified activity against state websites, including state election websites, referenced in this product cannot all be attributed to this Iranian APT actor. FBI analysis of the Iranian APT actor's activity has identified targeting of U.S. elections' infrastructure . . . within a similar timeframe, use of IP addresses and IP ranges - including numerous virtual private network (VPN) service exit nodes - which correlate to this Iran APT actor . . . and other investigative information.

- - -

The Joint CyberSecurity Advisory Exhibit includes several specific illustrations of the investigations' findings.

- - -

89 posted on 11/28/2020 8:19:29 AM PST by linMcHlp
[ Post Reply | Private Reply | To 4 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson