Starting a thread here to analyze the affidavit from the former 305th Military Intelligence analyst. His/Her name is redacted, so I'll just call it the #305th /1
The affidavit makes conclusions that are not supported by the data he provided. The data does not show exposed network vulnerabilities or connections, but connections between *domain names*. They are are not the same #305th /2
http://belgrade.dominionvoting.com , for example. This is just a subdomain name; no surprise that companies have branch operations in other countries, with a local server to support their efforts. Of itself, DNS name entries provide no access to servers or election systems in the US. /3
The China connection is especially wrong. Data shows there’s been a patent assignment to HSBC Canada - that is in no way connected to China, HSBC is a British company, with a proud history from the British colony of Hong Kong. #305th /4
The affiant tries to make another China connection by pointing out that http://dominionvotingsoftware.com  is registered to an agent in China. Domain registration means nothing, anyone can do it. Maybe the registration violates Dominion's trademark, but that is for them to fight. #/305th /5
And, domain names or DNS entries do not, of themself, give access to Dominion voting systems or networks. They are just name entries. #305th /6
The affidavit does show some vulnerabilities on the server hosting http://dominionvoting.com , but the company’s corporate website is not the same as their voting systems. Their actual voting systems are air-gapped, access to one does give access to the other. #305th /7
The Scytl vote reporting servers in Spain are normal, as the company is from Spain. I think it’s stupid that US would use outside companies for web reporting/visualization of vote results, but it doesn’t matter - none of those results are official #305th /8
the http://scorecard.indivisible.com  subdomain name evidence is silly: it's just another website. Doesn't show any connection to "Scorecard" software. Scorecard is a common name, in this case ,Indivisible displayed a web page to score Biden versus Trump. #305th /9
This affiant did not use the resources of the 305th Military Intelligence Battalion. Instead, used off-the-shelf domain name discovery tools, Spiderfoot & Robtex. Neither are, despite what the affidavit asserts, "network security and infrastructure" tools. #305th /10
It does mention a public network scan of http://dominionvoting.com , but does not mention what tool was used. Some usernames & passwords were exposed, maybe the only interesting finding. Further research needed to find if those passwords lead anywhere. #305th /11
There are several graphs included in the affidavit, but no mention of how they were generated. Other folks have found these graphs on 4chan or 8chan or similar bulletin board. #305th /12
I could go on, but I am disappointed in the evidence provided by this former military analyst. It's trainee-grade material, not relevant evidence to hacked voting systems. #305th /13
You can follow @twoslicesobread.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.