Ron Watkins [CodeMonkeyZ] – Telegram
Ron Watkins [CodeMonkeyZ]
147K subscribers
829 photos
216 videos
31 files
889 links
Ron Watkins [ gab.com/codemonkey ]
Download Telegram
Hmm... what is a magnet link..?
This media is not supported in your browser
VIEW IN TELEGRAM
I was asked to do a talk for the Patriot Double Down event organized by John and Amy in Las Vegas on October 22-25.

More info

https://thepatriotvoice.us
I was able to uncover a noscript that WEAKENS the EMS server on purpose.
I was also able to uncover a bunch of deleted election log files that spanned years.

It will be exciting to see what all of you sleuths will be able to find.
Was the DOMINION EMS server in your district artificially WEAKENED?
Why does Dominion have a function that purposefully opens their servers up to cyber attack?

Is this part of the “trade secrets” that Dominion so desperately tries to hide?
Forwarded from SkyNet Platforms
I have a security+ certification and 23+ years in IT/IS professionally, 35 years total.

That screenshot CMZ posted is a noscript to disable security features on windows and apply an unsecure "group policy" to the windows system that 'dehardens" it (eg: removes security settingSs) — included is a setting that exposes remote logon and file sharing vulterabilities by removing certificate-validation (untrusted logon sources) for file-share, remote-desktop and remote administration (RPC). This setting is ONLY needed for network connected systems - and, the setting itself creates a system vulnerability highly targeted by hackers for remote exploits (rootkits, code execution, machine reconfiguration, file sharing access, etc) It then stops and starts sql server.

The group policy file referenced is unknown (eg: no sample provided by CMZ), but based on the noscript ffile comments it likely does other things that remove security features.

@CodeMonkeyZ feel free to DM me if you need any more information - I saw your magnet links and could analyze it further if needed. I have strong credentials, re: long-time big-tech, government and private-sector tech who is in the top 1% of the field. This includes experience with content-moderation systems and how the platforms use them.

I can also tell you that considering machine configurations are included with "certified" election systems, that running this would contramand that regulatory requirement (no config changes without audit trail and oversight) and unless those noscripts / components are listed in the certification as "allowed, for approved maintenance operations" they are rogue and their presence (even absent execution) would decertify the system.
Forwarded from Mark Finchem
💥 Mesa County Colorado Recorder confirmed active erasure of evidence from Dominion systems, but by Dominion not her office. The County Recorder made a forensic copy because she believed that something nefarious was about to happen at the hands of the Colorado Secretary of State. That’s right, proof beyond PCAP, there was forensic evidence that was actively erased, which is a violation by Dominion and the Colorado Secretary of State.
Regarding today’s event:

We had technical difficulties getting started and had communication issues due to server attacks on our communication lines and instability of the public live streams.
People were asking why we didn’t run tools on the data. It is because we were not remoted into a Windows server that had the image loaded; we had just mounted a forensic image of the files and were able to view the file tree and files only. Due to the setup of the forensic image, we were not able to run tools such as regedit, event viewers, or dll analyzers. We could not run the executable files inside the forensic image.
We did not have a windows server setup with the image loaded due to obtaining the publicly-available data at the last minute. There simply was not enough time to setup a server because the show was already scheduled and we wanted to do it live.
We came across unprepared, and it is true in a sense because we had just obtained the data. It was my very first time looking at the data and I did not know what exactly would be found on the systems ahead of the event.

Interestingly, we did uncover a few critical things:
1. There appeared to be web server logs which potentially indicate that the server was accepting and executing commands remotely.
2. Election related data pre-upgrade was not present on the machine post-upgrade. This indicates that election related data was deleted or otherwise removed during the upgrade process.
3. The server had a suspicious configuration noscript designed to remove server security, potentially opening the machine up to a network hack.

These issues warrant additional investigation.
👍1😁1
Mike Lindell’s Cyber Symposium is over the target.
Stay safe out there.
In Mesa County, only the SECRETARY OF STATE had access to the Dominion Bios passwords.
Why is Jena Griswold trying to blame Tina Peters for the bios passwords leak when only Jena Griswold should have had access?
If the bios passwords were leaked, then Jena Griswold’s team leaked the passwords.

If the passwords were stolen, then Jena Griswold was not keeping the passwords securely.

Jena Griswold has compromised Colorado Elections either way.
Why is Jena Griswold raiding houses and offices?
Is she trying to frame others for her own mistake?
Did Jena Griswold leak the Mesa County bios passwords to frame Ms Tina Peters?
All Colorado county clerks need to be aware of this:
The Secretary of State might try to frame you for leaking something that you dont even have access to or responsibility over.
Will Colorado’s County Clerks all fall into line now that Jena Griswold has demonstrated that she will use her office to attack her political enemies?
How many more scapegoats does Jena Griswold need?
Will Colorado’s County Clerks stand together against this tyranny?
👍1
Tina Peters is a legend.
Do you feel the tides turning?
Join the Codemonkeyz Chat:
https://news.1rj.ru/str/codemonkeyzchat

Added a new rule and a few new mods to help keep things organized.

Rules:
no porn
no doom
no spam
no threats of violence

Mods:
Pepper, Arte, TT, Fletch17, Z (@maintenance_room), NinjaStuntZ (@thehallsofjusticewatchtower), Qanon John (@QAnonJohn17)