SlideShare a Scribd company logo
1 of 17
Download to read offline
1
Declaration of XXXXXXXXX.
Pursuant to 28 U.S.C Section 1746, I, XXXXXXXX, make the following
declaration.
1. I am over the age of 21 years and I am under no legal disability, which would prevent me
from giving this declaration.
2. I was an electronic intelligence analyst under 305th
Military Intelligence with experience
gathering SAM missile system electronic intelligence. I have extensive experience as a white
hat hacker used by some of the top election specialists in the world. The methodologies I
have employed represent industry standard cyber operation toolkits for digital forensics and
OSINT, which are commonly used to certify connections between servers, network nodes
and other digital properties and probe to network system vulnerabilities.
3. I am a US citizen and I reside at {redacted} location in the United States of America.
4. Whereas the Dominion and Edison Research systems exist in the internet of things, and
whereas this makes the network connections between the Dominion, Edison Research and
related network nodes available for scanning,
5. And whereas Edison Research’s primary job is to report the tabulation of the count of the
ballot information as received from the tabulation software, to provide to Decision HQ for
election results,
6. And whereas Spiderfoot and Robtex are industry standard digital forensic tools for evaluation
network security and infrastructure, these tools were used to conduct public security scans of
the aforementioned Dominion and Edison Research systems,
7. A public network scan of Dominionvoting.com on 2020-11-08 revealed the following inter-
relationships and revealed 13 unencrypted passwords for dominion employees, and 75
hashed passwords available in TOR nodes:
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.631 Filed 11/25/20 Page 1 of 17
2
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.632 Filed 11/25/20 Page 2 of 17
3
8. The same public scan also showed a direct connection to the group in Belgrade as
highlighted below:
9. A cursory search on LinkedIn of “dominion voting” on 11/19/2020 confirms the numerous
employees in Serbia:
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.633 Filed 11/25/20 Page 3 of 17
4
10. An additional search of Edison Research on 2020-11-08 showed that Edison Research has an
Iranian server seen here:
Inputting the Iranian IP into Robtex confirms the direct connection into the “edisonresearch”
host from the perspective of the Iranian domain also. This means that it is not possible that the
connection was a unidirectional reference.
A deeper search of the ownership of Edison Research “edisonresearch.com” shows a connection
to BMA Capital Management, where shareofear.com and bmacapital.com are both connected to
edisonresearch.com via a VPS or Virtual Private Server, as denoted by the “vps” at the start of
the internet name:
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.634 Filed 11/25/20 Page 4 of 17
5
Dominionvoting is also dominionvotingsystems.com, of which there are also many more
examples, including access of the network from China. The records of China accessing the server
are reliable.
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.635 Filed 11/25/20 Page 5 of 17
6
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.636 Filed 11/25/20 Page 6 of 17
7
11. BMA Capital Management is known as a company that provides Iran access to capital
markets with direct links publicly discoverable on LinkedIn (found via google on
11/19/2020):
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.637 Filed 11/25/20 Page 7 of 17
8
The same Robtex search confirms the Iranian address is tied to the server in the Netherlands,
which correlates to known OSINT of Iranian use of the Netherlands as a remote server (See
Advanced Persistent Threats: APT33 and APT34):
12. A search of the indivisible.org network showed a subdomain which evidences the existence
of scorecard software in use as part of the Indivisible (formerly ACORN) political group for
Obama:
13. Each of the tabulation software companies have their own central reporting “affiliate”.
Edison Research is the affiliate for Dominion.
14. Beanfield.com out of Canada shows the connections via co-hosting related sites, including
dvscorp.com:
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.638 Filed 11/25/20 Page 8 of 17
9
This Dominion partner domain “dvscorp” also includes an auto discovery feature, where new in-
network devices automatically connect to the system. The following diagram shows some of the
related dvscopr.com mappings, which mimic the infrastructure for Dominion and are an obvious
typo derivation of the name. Typo derivations are commonly purchased to catch redirect traffic
and sometimes are used as honeypots. The diagram shows that infrastructure spans multiple
different servers as a methodology.
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.639 Filed 11/25/20 Page 9 of 17
10
The above diagram shows how these domains also show the connection to Iran and other
places, including the following Chinese domain, highlighted below:
15. The auto discovery feature allows programmers to access any system while it is connected to
the internet once it’s a part of the constellation of devices (see original Spiderfoot graph).
16. Dominion Voting Systems Corporation in 2019 sold a number of their patents to China (via
HSBC Bank in Canada):
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.640 Filed 11/25/20 Page 10 of 17
11
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.641 Filed 11/25/20 Page 11 of 17
12
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.642 Filed 11/25/20 Page 12 of 17
13
Of particular interest is a section of the document showing aspects of the nature of the patents
dealing with authentication:
17. Smartmatic creates the backbone (like the cloud). SCYTL is responsible for the security
within the election system.
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.643 Filed 11/25/20 Page 13 of 17
14
18. In the GitHub account for Scytl, Scytl Jseats has some of the programming necessary to
support a much broader set of election types, including a decorator process where the data is
smoothed, see the following diagram provided in their source code:
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.644 Filed 11/25/20 Page 14 of 17
15
19. Unrelated, but also a point of interest is CTCL or Center for Tech and Civic Life funded by
Mark Zuckerberg. Within their github page (https://github.com/ctcl), one of the programmers
holds a government position. The Bipcoop repo shows tanderegg as one of the developers,
and he works at the Consumer Financial Protection Bureau:
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.645 Filed 11/25/20 Page 15 of 17
16
20. As seen in included document titled
“AA20-304A-
Iranian_Advanced_Persistent_Threat_Actor_Identified_Obtaining_Voter_Registration_Data
” that was authored by the Cybersecurity & Infrastructure Security Agency (CISA) with a
Product ID of AA20-304A on a specified date of October 30, 2020, CISA and the FBI
reports that Iranian APT teams were seen using ACUTENIX, a website scanning software, to
find vulnerabilities within Election company websites, confirmed to be used by the Iranian
APT teams buy seized cloud storage that I had personally captured and reported to higher
authorities. These scanning behaviors showed that foreign agents of aggressor nations had
access to US voter lists, and had done so recently.
21. In my professional opinion, this affidavit presents unambiguous evidence that Dominion
Voter Systems and Edison Research have been accessible and were certainly compromised
by rogue actors, such as Iran and China. By using servers and employees connected with
rogue actors and hostile foreign influences combined with numerous easily discoverable
leaked credentials, these organizations neglectfully allowed foreign adversaries to access data
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.646 Filed 11/25/20 Page 16 of 17
17
and intentionally provided access to their infrastructure in order to monitor and manipulate
elections, including the most recent one in 2020. This represents a complete failure of their
duty to provide basic cyber security. This is not a technological issue, but rather a
governance and basic security issue: if it is not corrected, future elections in the United States
and beyond will not be secure and citizens will not have confidence in the results.
I declare under penalty of perjury that the forgoing is true and correct to the best of my
knowledge. Executed this November 23th
, 2020.
Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.647 Filed 11/25/20 Page 17 of 17

More Related Content

Similar to Gov.uscourts.mied.350905.1.15

AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsDr David Probert
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
Analysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined RadioAnalysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined RadioJuanRios179
 
Linked in researchpaper
Linked in researchpaperLinked in researchpaper
Linked in researchpaperJuanRios179
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeUlf Mattsson
 
Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Bob Radvanovsky
 
Chinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plantChinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plantRohanMistry15
 
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...Danny Friedmann
 
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docxhyacinthshackley2629
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.pptMaruthi N.E
 
CHAPTER GOALS AND OBJECTIVES2➢ What is the key fu
CHAPTER GOALS AND  OBJECTIVES2➢ What is the key fuCHAPTER GOALS AND  OBJECTIVES2➢ What is the key fu
CHAPTER GOALS AND OBJECTIVES2➢ What is the key fuJinElias52
 
Centurylink 2018 threat report
Centurylink 2018 threat reportCenturylink 2018 threat report
Centurylink 2018 threat reportAndrew Prosser
 
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...Editor IJMTER
 
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxcarlibradley31429
 
Case in PointInaction Caused Costly Hacking At Large Retailer.docx
Case in PointInaction Caused Costly Hacking At Large Retailer.docxCase in PointInaction Caused Costly Hacking At Large Retailer.docx
Case in PointInaction Caused Costly Hacking At Large Retailer.docxcowinhelen
 
The Investigatory Powers Bill and journalism
The Investigatory Powers Bill and journalismThe Investigatory Powers Bill and journalism
The Investigatory Powers Bill and journalismPaul Bradshaw
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
 

Similar to Gov.uscourts.mied.350905.1.15 (20)

AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Analysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined RadioAnalysis of Rogue Access Points using Software-Defined Radio
Analysis of Rogue Access Points using Software-Defined Radio
 
Linked in researchpaper
Linked in researchpaperLinked in researchpaper
Linked in researchpaper
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
Security Wars
Security WarsSecurity Wars
Security Wars
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)Project RUGGEDTRAX Findings Report (28-Nov-2015)
Project RUGGEDTRAX Findings Report (28-Nov-2015)
 
Chinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plantChinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plant
 
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
Danny Friedmann, Sinking the Safe Harbour with the Legal Certainty of Strict ...
 
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
CHAPTER GOALS AND OBJECTIVES2➢ What is the key fu
CHAPTER GOALS AND  OBJECTIVES2➢ What is the key fuCHAPTER GOALS AND  OBJECTIVES2➢ What is the key fu
CHAPTER GOALS AND OBJECTIVES2➢ What is the key fu
 
Centurylink 2018 threat report
Centurylink 2018 threat reportCenturylink 2018 threat report
Centurylink 2018 threat report
 
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
Analyzing the effectualness of Phishing Algorithms in Web Applications Inques...
 
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docxAssignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx
 
Security Management
Security ManagementSecurity Management
Security Management
 
Case in PointInaction Caused Costly Hacking At Large Retailer.docx
Case in PointInaction Caused Costly Hacking At Large Retailer.docxCase in PointInaction Caused Costly Hacking At Large Retailer.docx
Case in PointInaction Caused Costly Hacking At Large Retailer.docx
 
The Investigatory Powers Bill and journalism
The Investigatory Powers Bill and journalismThe Investigatory Powers Bill and journalism
The Investigatory Powers Bill and journalism
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 

More from ELIAS OMEGA

Os Protocolos dos Sábios de Sião.pdf
Os Protocolos dos Sábios de Sião.pdfOs Protocolos dos Sábios de Sião.pdf
Os Protocolos dos Sábios de Sião.pdfELIAS OMEGA
 
CLUBE DA MORTE- E-BOOK GRÁTIS O INFORMANTE
CLUBE DA MORTE- E-BOOK GRÁTIS O INFORMANTECLUBE DA MORTE- E-BOOK GRÁTIS O INFORMANTE
CLUBE DA MORTE- E-BOOK GRÁTIS O INFORMANTEELIAS OMEGA
 
A sinagoga de Satanas.pdf
A sinagoga de Satanas.pdfA sinagoga de Satanas.pdf
A sinagoga de Satanas.pdfELIAS OMEGA
 
45 METAS PARA COMUNIZAÇÃO DO MUNDO.pdf
45 METAS PARA COMUNIZAÇÃO DO MUNDO.pdf45 METAS PARA COMUNIZAÇÃO DO MUNDO.pdf
45 METAS PARA COMUNIZAÇÃO DO MUNDO.pdfELIAS OMEGA
 
AGENDA GLOBAL 2030- BRASIL-manual_gt-1 (1).pdf
AGENDA GLOBAL 2030- BRASIL-manual_gt-1 (1).pdfAGENDA GLOBAL 2030- BRASIL-manual_gt-1 (1).pdf
AGENDA GLOBAL 2030- BRASIL-manual_gt-1 (1).pdfELIAS OMEGA
 
AGENDA GLOBAL 2030-BRASIL-guia-integracao-ods-2017_red.pdf
AGENDA GLOBAL 2030-BRASIL-guia-integracao-ods-2017_red.pdfAGENDA GLOBAL 2030-BRASIL-guia-integracao-ods-2017_red.pdf
AGENDA GLOBAL 2030-BRASIL-guia-integracao-ods-2017_red.pdfELIAS OMEGA
 
MUDANÇAS CLIMATICAS E O AUMENTO DOS URSOS POLAR 2021Proceedings_of_the_First_...
MUDANÇAS CLIMATICAS E O AUMENTO DOS URSOS POLAR 2021Proceedings_of_the_First_...MUDANÇAS CLIMATICAS E O AUMENTO DOS URSOS POLAR 2021Proceedings_of_the_First_...
MUDANÇAS CLIMATICAS E O AUMENTO DOS URSOS POLAR 2021Proceedings_of_the_First_...ELIAS OMEGA
 
A_Maçonaria_na_História_do_Brasil,_a_visão_de_Tito_Lívio_Ferreira.pdf
A_Maçonaria_na_História_do_Brasil,_a_visão_de_Tito_Lívio_Ferreira.pdfA_Maçonaria_na_História_do_Brasil,_a_visão_de_Tito_Lívio_Ferreira.pdf
A_Maçonaria_na_História_do_Brasil,_a_visão_de_Tito_Lívio_Ferreira.pdfELIAS OMEGA
 
Fraude nas Urnas 2022.pdf
Fraude nas Urnas 2022.pdfFraude nas Urnas 2022.pdf
Fraude nas Urnas 2022.pdfELIAS OMEGA
 
Os Vikings no Brasil - Jacques de Mahieu.pdf
Os Vikings no Brasil - Jacques de Mahieu.pdfOs Vikings no Brasil - Jacques de Mahieu.pdf
Os Vikings no Brasil - Jacques de Mahieu.pdfELIAS OMEGA
 
Ecoterrorismo_Ecologia_radical_Dom_Bertrand_de_Orleans_e_Bragança.pdf
Ecoterrorismo_Ecologia_radical_Dom_Bertrand_de_Orleans_e_Bragança.pdfEcoterrorismo_Ecologia_radical_Dom_Bertrand_de_Orleans_e_Bragança.pdf
Ecoterrorismo_Ecologia_radical_Dom_Bertrand_de_Orleans_e_Bragança.pdfELIAS OMEGA
 
Covid19 - A Batalha das Vacinas
Covid19 - A Batalha das Vacinas Covid19 - A Batalha das Vacinas
Covid19 - A Batalha das Vacinas ELIAS OMEGA
 
Resoluções_do_Encontro_Nacional_de_Direitos_Humanos_do_PT_Partido.pdf
Resoluções_do_Encontro_Nacional_de_Direitos_Humanos_do_PT_Partido.pdfResoluções_do_Encontro_Nacional_de_Direitos_Humanos_do_PT_Partido.pdf
Resoluções_do_Encontro_Nacional_de_Direitos_Humanos_do_PT_Partido.pdfELIAS OMEGA
 
pndh3 BRASIL 2030.pdf
pndh3 BRASIL 2030.pdfpndh3 BRASIL 2030.pdf
pndh3 BRASIL 2030.pdfELIAS OMEGA
 
Holocausto Judeu ou Alemão.pdf
Holocausto Judeu ou Alemão.pdfHolocausto Judeu ou Alemão.pdf
Holocausto Judeu ou Alemão.pdfELIAS OMEGA
 
Tirania global ... passo a passo.pdf
Tirania global ... passo a passo.pdfTirania global ... passo a passo.pdf
Tirania global ... passo a passo.pdfELIAS OMEGA
 
A HISTÓRIA OCULTA DO EX-PRESIDENTE DO BRASIL Luiz Inácio Lula da Silva A MÃO ...
A HISTÓRIA OCULTA DO EX-PRESIDENTE DO BRASIL Luiz Inácio Lula da Silva A MÃO ...A HISTÓRIA OCULTA DO EX-PRESIDENTE DO BRASIL Luiz Inácio Lula da Silva A MÃO ...
A HISTÓRIA OCULTA DO EX-PRESIDENTE DO BRASIL Luiz Inácio Lula da Silva A MÃO ...ELIAS OMEGA
 

More from ELIAS OMEGA (20)

Os Protocolos dos Sábios de Sião.pdf
Os Protocolos dos Sábios de Sião.pdfOs Protocolos dos Sábios de Sião.pdf
Os Protocolos dos Sábios de Sião.pdf
 
TERRA-2 (2).pdf
TERRA-2 (2).pdfTERRA-2 (2).pdf
TERRA-2 (2).pdf
 
TERRA-2 ().pdf
TERRA-2 ().pdfTERRA-2 ().pdf
TERRA-2 ().pdf
 
CLUBE DA MORTE- E-BOOK GRÁTIS O INFORMANTE
CLUBE DA MORTE- E-BOOK GRÁTIS O INFORMANTECLUBE DA MORTE- E-BOOK GRÁTIS O INFORMANTE
CLUBE DA MORTE- E-BOOK GRÁTIS O INFORMANTE
 
A sinagoga de Satanas.pdf
A sinagoga de Satanas.pdfA sinagoga de Satanas.pdf
A sinagoga de Satanas.pdf
 
45 METAS PARA COMUNIZAÇÃO DO MUNDO.pdf
45 METAS PARA COMUNIZAÇÃO DO MUNDO.pdf45 METAS PARA COMUNIZAÇÃO DO MUNDO.pdf
45 METAS PARA COMUNIZAÇÃO DO MUNDO.pdf
 
EIR Soros.pdf
EIR Soros.pdfEIR Soros.pdf
EIR Soros.pdf
 
AGENDA GLOBAL 2030- BRASIL-manual_gt-1 (1).pdf
AGENDA GLOBAL 2030- BRASIL-manual_gt-1 (1).pdfAGENDA GLOBAL 2030- BRASIL-manual_gt-1 (1).pdf
AGENDA GLOBAL 2030- BRASIL-manual_gt-1 (1).pdf
 
AGENDA GLOBAL 2030-BRASIL-guia-integracao-ods-2017_red.pdf
AGENDA GLOBAL 2030-BRASIL-guia-integracao-ods-2017_red.pdfAGENDA GLOBAL 2030-BRASIL-guia-integracao-ods-2017_red.pdf
AGENDA GLOBAL 2030-BRASIL-guia-integracao-ods-2017_red.pdf
 
MUDANÇAS CLIMATICAS E O AUMENTO DOS URSOS POLAR 2021Proceedings_of_the_First_...
MUDANÇAS CLIMATICAS E O AUMENTO DOS URSOS POLAR 2021Proceedings_of_the_First_...MUDANÇAS CLIMATICAS E O AUMENTO DOS URSOS POLAR 2021Proceedings_of_the_First_...
MUDANÇAS CLIMATICAS E O AUMENTO DOS URSOS POLAR 2021Proceedings_of_the_First_...
 
A_Maçonaria_na_História_do_Brasil,_a_visão_de_Tito_Lívio_Ferreira.pdf
A_Maçonaria_na_História_do_Brasil,_a_visão_de_Tito_Lívio_Ferreira.pdfA_Maçonaria_na_História_do_Brasil,_a_visão_de_Tito_Lívio_Ferreira.pdf
A_Maçonaria_na_História_do_Brasil,_a_visão_de_Tito_Lívio_Ferreira.pdf
 
Fraude nas Urnas 2022.pdf
Fraude nas Urnas 2022.pdfFraude nas Urnas 2022.pdf
Fraude nas Urnas 2022.pdf
 
Os Vikings no Brasil - Jacques de Mahieu.pdf
Os Vikings no Brasil - Jacques de Mahieu.pdfOs Vikings no Brasil - Jacques de Mahieu.pdf
Os Vikings no Brasil - Jacques de Mahieu.pdf
 
Ecoterrorismo_Ecologia_radical_Dom_Bertrand_de_Orleans_e_Bragança.pdf
Ecoterrorismo_Ecologia_radical_Dom_Bertrand_de_Orleans_e_Bragança.pdfEcoterrorismo_Ecologia_radical_Dom_Bertrand_de_Orleans_e_Bragança.pdf
Ecoterrorismo_Ecologia_radical_Dom_Bertrand_de_Orleans_e_Bragança.pdf
 
Covid19 - A Batalha das Vacinas
Covid19 - A Batalha das Vacinas Covid19 - A Batalha das Vacinas
Covid19 - A Batalha das Vacinas
 
Resoluções_do_Encontro_Nacional_de_Direitos_Humanos_do_PT_Partido.pdf
Resoluções_do_Encontro_Nacional_de_Direitos_Humanos_do_PT_Partido.pdfResoluções_do_Encontro_Nacional_de_Direitos_Humanos_do_PT_Partido.pdf
Resoluções_do_Encontro_Nacional_de_Direitos_Humanos_do_PT_Partido.pdf
 
pndh3 BRASIL 2030.pdf
pndh3 BRASIL 2030.pdfpndh3 BRASIL 2030.pdf
pndh3 BRASIL 2030.pdf
 
Holocausto Judeu ou Alemão.pdf
Holocausto Judeu ou Alemão.pdfHolocausto Judeu ou Alemão.pdf
Holocausto Judeu ou Alemão.pdf
 
Tirania global ... passo a passo.pdf
Tirania global ... passo a passo.pdfTirania global ... passo a passo.pdf
Tirania global ... passo a passo.pdf
 
A HISTÓRIA OCULTA DO EX-PRESIDENTE DO BRASIL Luiz Inácio Lula da Silva A MÃO ...
A HISTÓRIA OCULTA DO EX-PRESIDENTE DO BRASIL Luiz Inácio Lula da Silva A MÃO ...A HISTÓRIA OCULTA DO EX-PRESIDENTE DO BRASIL Luiz Inácio Lula da Silva A MÃO ...
A HISTÓRIA OCULTA DO EX-PRESIDENTE DO BRASIL Luiz Inácio Lula da Silva A MÃO ...
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Gov.uscourts.mied.350905.1.15

  • 1. 1 Declaration of XXXXXXXXX. Pursuant to 28 U.S.C Section 1746, I, XXXXXXXX, make the following declaration. 1. I am over the age of 21 years and I am under no legal disability, which would prevent me from giving this declaration. 2. I was an electronic intelligence analyst under 305th Military Intelligence with experience gathering SAM missile system electronic intelligence. I have extensive experience as a white hat hacker used by some of the top election specialists in the world. The methodologies I have employed represent industry standard cyber operation toolkits for digital forensics and OSINT, which are commonly used to certify connections between servers, network nodes and other digital properties and probe to network system vulnerabilities. 3. I am a US citizen and I reside at {redacted} location in the United States of America. 4. Whereas the Dominion and Edison Research systems exist in the internet of things, and whereas this makes the network connections between the Dominion, Edison Research and related network nodes available for scanning, 5. And whereas Edison Research’s primary job is to report the tabulation of the count of the ballot information as received from the tabulation software, to provide to Decision HQ for election results, 6. And whereas Spiderfoot and Robtex are industry standard digital forensic tools for evaluation network security and infrastructure, these tools were used to conduct public security scans of the aforementioned Dominion and Edison Research systems, 7. A public network scan of Dominionvoting.com on 2020-11-08 revealed the following inter- relationships and revealed 13 unencrypted passwords for dominion employees, and 75 hashed passwords available in TOR nodes: Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.631 Filed 11/25/20 Page 1 of 17
  • 2. 2 Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.632 Filed 11/25/20 Page 2 of 17
  • 3. 3 8. The same public scan also showed a direct connection to the group in Belgrade as highlighted below: 9. A cursory search on LinkedIn of “dominion voting” on 11/19/2020 confirms the numerous employees in Serbia: Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.633 Filed 11/25/20 Page 3 of 17
  • 4. 4 10. An additional search of Edison Research on 2020-11-08 showed that Edison Research has an Iranian server seen here: Inputting the Iranian IP into Robtex confirms the direct connection into the “edisonresearch” host from the perspective of the Iranian domain also. This means that it is not possible that the connection was a unidirectional reference. A deeper search of the ownership of Edison Research “edisonresearch.com” shows a connection to BMA Capital Management, where shareofear.com and bmacapital.com are both connected to edisonresearch.com via a VPS or Virtual Private Server, as denoted by the “vps” at the start of the internet name: Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.634 Filed 11/25/20 Page 4 of 17
  • 5. 5 Dominionvoting is also dominionvotingsystems.com, of which there are also many more examples, including access of the network from China. The records of China accessing the server are reliable. Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.635 Filed 11/25/20 Page 5 of 17
  • 6. 6 Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.636 Filed 11/25/20 Page 6 of 17
  • 7. 7 11. BMA Capital Management is known as a company that provides Iran access to capital markets with direct links publicly discoverable on LinkedIn (found via google on 11/19/2020): Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.637 Filed 11/25/20 Page 7 of 17
  • 8. 8 The same Robtex search confirms the Iranian address is tied to the server in the Netherlands, which correlates to known OSINT of Iranian use of the Netherlands as a remote server (See Advanced Persistent Threats: APT33 and APT34): 12. A search of the indivisible.org network showed a subdomain which evidences the existence of scorecard software in use as part of the Indivisible (formerly ACORN) political group for Obama: 13. Each of the tabulation software companies have their own central reporting “affiliate”. Edison Research is the affiliate for Dominion. 14. Beanfield.com out of Canada shows the connections via co-hosting related sites, including dvscorp.com: Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.638 Filed 11/25/20 Page 8 of 17
  • 9. 9 This Dominion partner domain “dvscorp” also includes an auto discovery feature, where new in- network devices automatically connect to the system. The following diagram shows some of the related dvscopr.com mappings, which mimic the infrastructure for Dominion and are an obvious typo derivation of the name. Typo derivations are commonly purchased to catch redirect traffic and sometimes are used as honeypots. The diagram shows that infrastructure spans multiple different servers as a methodology. Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.639 Filed 11/25/20 Page 9 of 17
  • 10. 10 The above diagram shows how these domains also show the connection to Iran and other places, including the following Chinese domain, highlighted below: 15. The auto discovery feature allows programmers to access any system while it is connected to the internet once it’s a part of the constellation of devices (see original Spiderfoot graph). 16. Dominion Voting Systems Corporation in 2019 sold a number of their patents to China (via HSBC Bank in Canada): Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.640 Filed 11/25/20 Page 10 of 17
  • 11. 11 Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.641 Filed 11/25/20 Page 11 of 17
  • 12. 12 Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.642 Filed 11/25/20 Page 12 of 17
  • 13. 13 Of particular interest is a section of the document showing aspects of the nature of the patents dealing with authentication: 17. Smartmatic creates the backbone (like the cloud). SCYTL is responsible for the security within the election system. Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.643 Filed 11/25/20 Page 13 of 17
  • 14. 14 18. In the GitHub account for Scytl, Scytl Jseats has some of the programming necessary to support a much broader set of election types, including a decorator process where the data is smoothed, see the following diagram provided in their source code: Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.644 Filed 11/25/20 Page 14 of 17
  • 15. 15 19. Unrelated, but also a point of interest is CTCL or Center for Tech and Civic Life funded by Mark Zuckerberg. Within their github page (https://github.com/ctcl), one of the programmers holds a government position. The Bipcoop repo shows tanderegg as one of the developers, and he works at the Consumer Financial Protection Bureau: Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.645 Filed 11/25/20 Page 15 of 17
  • 16. 16 20. As seen in included document titled “AA20-304A- Iranian_Advanced_Persistent_Threat_Actor_Identified_Obtaining_Voter_Registration_Data ” that was authored by the Cybersecurity & Infrastructure Security Agency (CISA) with a Product ID of AA20-304A on a specified date of October 30, 2020, CISA and the FBI reports that Iranian APT teams were seen using ACUTENIX, a website scanning software, to find vulnerabilities within Election company websites, confirmed to be used by the Iranian APT teams buy seized cloud storage that I had personally captured and reported to higher authorities. These scanning behaviors showed that foreign agents of aggressor nations had access to US voter lists, and had done so recently. 21. In my professional opinion, this affidavit presents unambiguous evidence that Dominion Voter Systems and Edison Research have been accessible and were certainly compromised by rogue actors, such as Iran and China. By using servers and employees connected with rogue actors and hostile foreign influences combined with numerous easily discoverable leaked credentials, these organizations neglectfully allowed foreign adversaries to access data Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.646 Filed 11/25/20 Page 16 of 17
  • 17. 17 and intentionally provided access to their infrastructure in order to monitor and manipulate elections, including the most recent one in 2020. This represents a complete failure of their duty to provide basic cyber security. This is not a technological issue, but rather a governance and basic security issue: if it is not corrected, future elections in the United States and beyond will not be secure and citizens will not have confidence in the results. I declare under penalty of perjury that the forgoing is true and correct to the best of my knowledge. Executed this November 23th , 2020. Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.647 Filed 11/25/20 Page 17 of 17