Thread – Did the ChiComs Hack the Election?
1. Patrick Byrne (founder of overstock-dot-com) has been in the news lately (at least in independent media!), having been present in the White House meeting last weekend.
1. Patrick Byrne (founder of overstock-dot-com) has been in the news lately (at least in independent media!), having been present in the White House meeting last weekend.
2. He was subsequently interviewed on the @tracybeanz Dark to Light Podcast here (well worth a listen!): https://uncoverdc.com/2020/12/21/dark-to-light-a-meeting-with-the-president/
3. Byrne has been consistent in his exposure of foreign election meddling/hacking and support for President Trump. He is a thorn in the side of Wall Street, a de-centrist, and a Bitcoin/crypto advocate.
4. He joined a "white hat" cyber team that started more than a year ago and funded them since the summer, including adding more ethical hackers to understand all the issues, flaws, gaps, and design of Dominion.
5. "QSnatch" malware is the one backdoor for ChiCom hackers (or other states) to replace credentials of election officials at the voting stations remotely and far away.
6. Byrne has stated that the malware has been found on 75% of the servers used during the general election. This is Byrne's really excellent article and insights on "rigged evidence." https://www.deepcapture.com/2020/11/election-2020-was-rigged-the-evidence/
7. Along the same lines, a cybersecurity expert and friend passed on the following commentary after watching an earlier Byrne interview here:
8. [begin commentary] He seems quite credible, because a lot of what he says aligns with:
8A. The affidavit written by Russell James Ramsland, Jr.: https://www.courtlistener.com/recap/gov.uscourts.gand.283580/gov.uscourts.gand.283580.7.1_2.pdf
8A. The affidavit written by Russell James Ramsland, Jr.: https://www.courtlistener.com/recap/gov.uscourts.gand.283580/gov.uscourts.gand.283580.7.1_2.pdf
8B. The PBS NewsHour interview with Alex Halderman:
8C. And the OAN interview with Ron Watkins:
9. At 25:20-26:45 in the Patrick Byrne interview, he says foreign actors, particularly China, could have and did influence the election because of "QSnatch" that was infecting many Dominion servers.
10. DHS’s Cybersecurity and Infrastructure Security Agency (CISA) and the UK's National Cyber Security Centre (NCSC) actually warned about QSnatch back in July: https://thehackernews.com/2020/07/qnap-nas-malware-attack.html
11. Now, I haven't heard anyone else mention this "QSnatch" malware in relation to Dominion, but if their servers were indeed infected with this malware, the following details from the above Hacker News article are notable:
11A. The malware infects not just software, but firmware. This is no easy task for any random hacker to achieve.
11B. The malware targets devices manufactured by QNAP, a Taiwanese electronics company. China targets Taiwanese companies all the time.
11C. CISA and NCSC don't know how it's spreading. There are a few possibilities to explain this, but the most compelling to me is a supply chain attack, where devices get infected with the malware while they're on their way to the customer.
11C1. With QNAP being a Taiwanese company, again, China has the most opportunity to perform such an attack. CISA and NCSC even hinted that a supply chain attack might indeed be the infection vector.
11C2. In the Hacker News article, they said: "Verify that you purchased QNAP devices from reputable sources."
11D. The malware has only relatively recently been quickly spreading in North America and Western Europe, particularly in Germany. Funny how these places just happen to be where US election data got processed, and how this started just about a year before the election.
11E. The malware has five "modules". All five of them pertain to remote control over the infected device and any data it holds. This would have made it very easy for the malware authors and anyone they gave access to to tamper with the election.
11E1. I actually think all five of these modules together is overkill; some of these modules are redundant!
12. China is one of the few actors with the capability and opportunity to create and deploy such a malware.
13. The timing of the malware's rise, the locations of its spread, and the targeted nature of its functionality all imply that it was designed specifically to interfere with the US election. China is the most likely culprit behind this malware. [unquote]
14. This is some great analysis, as Communist China had the motivation, opportunity, access, and expertise to use this malware to influence the outcome of the election. ///The end.