My new Daily Dot article: Coffee Cty, GA missing laptop may impact Trump, Curling cases
Hello cypherpunks, Today the Daily Dot published my new investigative article regarding a missing laptop, heavily used by Trump co-defendant and then-election supervisor Mistory Hampton, that Coffee County, Georgia is going to the mat not to turn over, not to even locate. The southern rural county in the swing state is infamous for the January 2021 elections office breach that Hampton is accused of facilitating. That makes the laptop a suspected means of alleged crime, and yet Coffee County was like "What laptop?" for nearly two years before admitting in court last month that okay, surveillance footage does show Hampton with the silver laptop. Here's the link to my new investigation: https://www.dailydot.com/news/missing-laptop-trump-case-georgia/ I also self-published an accompanying blog post today that includes some of the cut passages. The blog post also includes, for the first time, 4 previously unreleased CCTV stills from the surveillance footage. Here's the link to my new blog post with a lot of interesting extra information: https://douglaslucas.com/blog/2023/12/19/extra-material-dailydot-investigati... Georgia is, of course, a swing state. My article includes a lot of tech details cypherpunks might find interesting, such as an .ost file, Microsoft Office 365 licenses, and the County refusing to back up official files on the elections desktop, as required by law, when the Georgia Bureau of Investigation came knocking because, they say, they feared accusations of tampering. Check out also, referenced in various places in these two pieces, a Coffee local / longtime lawyer's proposal that the elections board adopt independent counsel -- possibly pro bono and not conflicted like the county lawyers -- to help them and the public with a bottom-up internal inquiry in the breach and its aftermath. Thanks, :-Douglas
hi douglas! i’m directing my spam energy around your blog so i swamp it less. I visited this link:
Online distribution was via private access, not public internet. https://www.dropbox.com/s/gqlxtxuezipwxlx/08122022-000137.txt
answer my questions only if it is fun to! Should I know what I am looking at here? It looks like this might be a handpasted access log for a court-related file repository containing voting machine and digital forensics data from the months of dec 2020 through feb 2021. is this correct? how does it back that online distribution of compromised files was via private access? is this the folder that was used for distribution? what folder is it / what system is it from? are all these names, email addresses, companies, etc, the specific individuals that the files were distributed to? it’s cool to see right inside things like this!!
It's logs filed in court. They make up some of the exhibit(s) in a court-filed declaration by Kevin Skoglund, computer security expert for plaintiffs in Curling v. Raffensperger. Skoglund's full declaration is here https://douglaslucas.com/files/CurlingVRaffensperger_KevinSkoglundDeclaratio... Basically, SullivanStrickler is the Atlanta-based forensics firm from which technicians carried out much, though not all, of the breach. Their ownership is still supportive of it. After exfilitrating all voting computer files, these SullivanStrickler breachers put them on a restricted-access ShareFile for select Trumper allies to download. The logs you are looking at relate to this ShareFile accessing, showing that basically, the voting files are out there in the shadowy wild, but not in public hands, just in the hands of Trump allies ... so far, or as far as can be determined. Maybe they sold them to whomever. I wouldn't be surprised to see portions of it, or all of it, leaked at some point, but I think Trumpers are more interested in not getting arrested than they are in civil disobedience or debugging voting software. Dominion Voting Systems hasn't shown anything to indicate they care about the copying of their chief 'intellectual property' assets. Which is weird. Douglas On 2023-12-19 17:25, Karl Semich wrote:
hi douglas! i’m directing my spam energy around your blog so i swamp it less.
I visited this link:
Online distribution was via private access, not public internet.
https://www.dropbox.com/s/gqlxtxuezipwxlx/08122022-000137.txt
answer my questions only if it is fun to!
Should I know what I am looking at here?
It looks like this might be a handpasted access log for a court-related file repository containing voting machine and digital forensics data from the months of dec 2020 through feb 2021. is this correct?
how does it back that online distribution of compromised files was via private access? is this the folder that was used for distribution? what folder is it / what system is it from?
are all these names, email addresses, companies, etc, the specific individuals that the files were distributed to?
it’s cool to see right inside things like this!!
thanks douglas i found the events are reported elsewhere too random thoughts: you could possibly finetune a video-classification model to recover the speech from the video with a ton of phone call videos i guess people like this have/will be taking over our government unless we can figure these things out better On Tue, Dec 19, 2023 at 20:34 Douglas Lucas <dal@riseup.net> wrote:
It's logs filed in court. They make up some of the exhibit(s) in a court-filed declaration by Kevin Skoglund, computer security expert for plaintiffs in Curling v. Raffensperger.
Skoglund's full declaration is here
https://douglaslucas.com/files/CurlingVRaffensperger_KevinSkoglundDeclaratio...
Basically, SullivanStrickler is the Atlanta-based forensics firm from which technicians carried out much, though not all, of the breach. Their ownership is still supportive of it. After exfilitrating all voting computer files, these SullivanStrickler breachers put them on a restricted-access ShareFile for select Trumper allies to download. The logs you are looking at relate to this ShareFile accessing, showing that basically, the voting files are out there in the shadowy wild, but not in public hands, just in the hands of Trump allies ... so far, or as far as can be determined. Maybe they sold them to whomever. I wouldn't be surprised to see portions of it, or all of it, leaked at some point, but I think Trumpers are more interested in not getting arrested than they are in civil disobedience or debugging voting software. Dominion Voting Systems hasn't shown anything to indicate they care about the copying of their chief 'intellectual property' assets. Which is weird.
Douglas
On 2023-12-19 17:25, Karl Semich wrote:
hi douglas! i’m directing my spam energy around your blog so i swamp it less.
I visited this link:
Online distribution was via private access, not public internet.
https://www.dropbox.com/s/gqlxtxuezipwxlx/08122022-000137.txt
answer my questions only if it is fun to!
Should I know what I am looking at here?
It looks like this might be a handpasted access log for a court-related file repository containing voting machine and digital forensics data from the months of dec 2020 through feb 2021. is this correct?
how does it back that online distribution of compromised files was via private access? is this the folder that was used for distribution? what folder is it / what system is it from?
are all these names, email addresses, companies, etc, the specific individuals that the files were distributed to?
it’s cool to see right inside things like this!!
participants (2)
-
Douglas Lucas
-
Karl Semich