Maricopa County Officials Refusing to Turn Over Routers to Auditors

When accused of a crime, innocent people do not block the evidence of their innocence from coming forward.
 
Maricopa County Officials Refusing to Turn Over Routers to Auditors
if the election was legitimate, why is the Media-Dem Party fighting against an audit so hard? They are hiding the evidence of election fraud.

that is why

How about some jail time for refusing to comply with a subpoena
They're refusing to turn them over because the demand was too broad.

"The routers the Senate subpoena commanded the county produce support all of these departments, not just elections operations. This includes critical law enforcement data that, by law, cannot be disclosed, as well as Maricopa County residents’ protected health information and full social security numbers."

Source
 
They're refusing to turn them over because the demand was too broad.

"The routers the Senate subpoena commanded the county produce support all of these departments, not just elections operations. This includes critical law enforcement data that, by law, cannot be disclosed, as well as Maricopa County residents’ protected health information and full social security numbers."

Source

From the article ...

"We had previously believed that the risk would be eliminated by redacting the law enforcement data on the routers and not producing it. But we were informed that redaction did not eliminate the risk," Deputy County Attorney Joseph LaRue said in a letter this week to Senate Audit Liaison Ken Bennett, reports The Arizona Daily Independent. "We also learned that if criminal elements or others gained access to this data, it might compromise county and federal law enforcement efforts and put the lives of law enforcement personnel at risk."

OK ... just WHO "informed" you ... perchance the dnc ???

The operative word is IF ... THERE ARE ALREADY SAFEGUARDS IN PLACE. You can "what if" something ad nauseum ... which is precisely what the dims are doing
 
can some geek tell me why routers would have ANY information stored on them.......I thought the routers on my network just passed data through.......
 
can some geek tell me why routers would have ANY information stored on them.......I thought the routers on my network just passed data through.......

Here is a graduate thesis on router forensics.

https://dione.lib.unipi.gr/xmlui/bi...echniques,directing functions on the Internet.

There simply is too much to talk about, but to tell it simply. Like any computer equipment cache and other information is stored and using forensic techniques you can obtain information about hacking events or changes to data packages at the router itself. (This is VERY simplified).
 
can some geek tell me why routers would have ANY information stored on them.......I thought the routers on my network just passed data through.......

They do route data hence the name. However they have to know where to send the data, hence the need for routing tables in the edge routers.

Many core networks use Multi Protocol Label Switching (MPLS) which routes IP packets through paths via labels instead of looking at the complex router routing tables. It is a routing protocol which operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as layer 2.5.
 
Last edited:
Maricopa County Officials Refusing to Turn Over Routers to Auditors
https://www.newsmax.com/politics/maricopa-county-auditors-2020-election/2021/05/07/id/1020526/


if the election was legitimate, why is the Media-Dem Party fighting against an audit so hard? They are hiding the evidence of election fraud.

that is why

How about some jail time for refusing to comply with a subpoena

The so-called auditors are in violation of U.S. Constitutional law at waging war against the 2020 and certified electoral process. They all should be arrested for engaging in something that should put them in prison instead of attempting to conspire against a fair, lawful and certified 2020 election. It would be great if the feds were to go down there and break the racket up!
 
Here is a graduate thesis on router forensics.

https://dione.lib.unipi.gr/xmlui/bi...echniques,directing functions on the Internet.

There simply is too much to talk about, but to tell it simply. Like any computer equipment cache and other information is stored and using forensic techniques you can obtain information about hacking events or changes to data packages at the router itself. (This is VERY simplified).

I find it hard to believe that anything found on a router is going to reveal the social security number of Maricopa residents or put law enforcement lives at risk as claimed in the OP article......
 
I find it hard to believe that anything found on a router is going to reveal the social security number of Maricopa residents or put law enforcement lives at risk as claimed in the OP article......

Yeah, that is unlikely, nor is it likely the folks doing the audit would reveal or use that personally identifying information for any nefarious purpose. They clearly do not want any inspection of the routers, this is usually because they know there is some "there there"... likely somebody left open the internet connection during voting which is a violation of the law and leaves the election open for election fraud (not voter fraud, Jarod, this is a different animal).
 
I’m far from a computer geek but that seems a stretch to me as well.

They could find out certain IP addresses I suppose from the routing tables, and presumably the access lists to determine what traffic is allowed into and out of the router network. Although access to their firewall ingress and egress rules would be more useful.

Egress Filtering

Description

Egress filtering is the practice of monitoring, controlling and restricting traffic leaving a network with the objective of ensuring that only legitimate traffic is allowed to leave and that unauthorised or malicious traffic is prevented from doing so.

Egress filtering is primarily achieved through the use of predefined security rules and policies implemented on the perimeter firewall, to block outbound traffic that uses protocols and destination ports that are unnecessary or subject to abuse. Network administrators are advised to ensure that appropriate measures are taken to prevent unauthorised access to the internet access router, as it is located outside the perimeter firewall, and if SNMP enabled, that apprioate measues are implemented to prevent it from being exploited.

While Egress filtering is not primarily focused on protecting one's own network, it does serve to protect the networks of other organisations, by preventing the spread of malware or traffic with a forged source (spoofed) IP address from leaving the network that has been compromised, either through the deliberate malicious activity of an individual user or the malicious activity caused by infections, botnets and other malware within the network


Ingress Filtering

Description

Ingress filtering is the practice of monitoring, controlling and restricting traffic entering a network with the objective of ensuring that only legitimate traffic is allowed to enter and that unauthorised or malicious traffic is prevented from doing so.

Ingress filtering is primarily achieved through the use of predefined security rules (e.g. packet filtering) and policies implemented on the perimeter firewall, to ensure that inbound traffic is from the network from which it claims to originate from. Network administrators are advised to ensure that appropriate measures are taken to prevent unauthorised access to the internet access router, as it is located outside the perimeter firewall, and if SNMP enabled, that apprioate measues are implemented to prevent it from being exploited.

Ingress filtering is a simple and effective method to limit the impact of a Denial of Service (DoS) attack, by denying traffic with a forged source (spoofed) IP address access to the network, and to help ensure that traffic is traceable to its correct network.

https://www.ncsc.gov.ie/emailsfrom/DDoS/Ingress-Egress/index.html
 
grampsy falls in and out of consciousness, didn't know the election was already over

I should do a poll: who is the biggest Calicunt?


Reagan's Gizzards

Daesh

McSlobber

IQ64

Crypiss

Cawacko

Bill

The last two are really only for the sake of completeness.
 
Last edited:
Yeah, that is unlikely, nor is it likely the folks doing the audit would reveal or use that personally identifying information for any nefarious purpose. They clearly do not want any inspection of the routers, this is usually because they know there is some "there there"... likely somebody left open the internet connection during voting which is a violation of the law and leaves the election open for election fraud (not voter fraud, Jarod, this is a different animal).
. How do you know they won’t use it for nefarious purposes? The whole recount sounds hinky. QAnon guys business conducting audit, bamboo fiber theory by another QAnut. It’s a joke and some AZ Senators are starting to regret their vote to audit.
 
Back
Top