Wed Aug 11 04:24:32 +0000 2021

 · 5 min read
 · trapezoid of discovery

[tweet] [link]
Thanks to the incredible reporting by @OldNewsman at the @DailySentinelGJ, I believe I was able to independently verify that the screenshot Ron Watkins shared out that contained BIOS passwords for Dominion machines originated from Mesa County, CO

https://www.gjsentinel.com/news/western_colorado/sos-probe-of-clerk-peters-office-could-lead-to-criminal-charges/article_bc30f4c4-f94a-11eb-8a8c-73381ff7968e.html

[tweet] [link]
I did this by locating a per-county breakdown of Dominion equipment published by the CO SoS in 2020: https://www.sos.state.co.us/pubs/elections/VotingSystems/files/2020/ColoradoVotingEquipmentbyCounty2020.pdf

And here's Ron's screenshot for reference

[tweet] [link]
To make things easy on myself, I copy/pasted the text from the PDF and turned it into a CSV. I then pared that CSV down to just the Dell and Canon equipment used by each county since that's all that's visible in Ron's screenshot.

That CSV is here: https://pastebin.com/UK5niLHR

[tweet] [link]
I then used a terrible python script to iterate through the CSV to look for counties that use the same combination of hardware used in Mesa

(forgive me, it's late, I've had a long week, and my brain is mush from being yelled at by Lindell for 12 hours) https://pastebin.com/PU4xWvs6

[tweet] [link]
Of course, the CSV contains hardware that's not visible in Ron's screenshot. So I pared down the Mesa dictionary to only contain the specific hardware types that are visible in his screenshot.

Even after paring the list down, Mesa is still the only county with that blend of HW

[tweet] [link]
If you want to poke around the json yourself to verify, here's that as well: https://pastebin.com/1yULvweD

[tweet] [link]
Tl;dr: if the screenshot Ron posted did in fact originate from a CO county, there's only 1 county in CO that happens to use the same mix of hardware visible in the screenshot.

That same county also happened to get searched by the CO SoS today for potentially leaking data to Ron

[tweet] [link]
BTW, if you don't want to mess with parsing a CSV, here are a few side-by-sides of Ron's screenshot and the inventory listed in https://www.sos.state.co.us/pubs/elections/VotingSystems/files/2020/ColoradoVotingEquipmentbyCounty2020.pdf

(see next few tweets)

[tweet] [link]
The number of ICCs match

[tweet] [link]
The EMS Server, EMS Clients, and ADJ Clients match

[tweet] [link]
The ICVAs (that are visible in Ron's screenshot, at least) also match

[tweet] [link]
Last random tidbit: The leak allegedly occurred during a "trusted build update", for which Peters was present. That would help explain why the docs posted by Ron were all related to updating the electronic voting systems

https://www.gjsentinel.com/news/western_colorado/sos-probe-of-clerk-peters-office-could-lead-to-criminal-charges/article_bc30f4c4-f94a-11eb-8a8c-73381ff7968e.html

[tweet] [link]
Lol, this is not getting any better for Tina Peters. I decided to re-watch Ron Watkins' whistleblower video. It's a little blurry, but you can spot a date in the Acronis backup software.

That date? 5/25...the same day of the Mesa Co. trusted build update, per the CO SoS

[tweet] [link]
I'll leave ya'll with a fun game to play. At :34 seconds in, the hostname is briefly visible before being quickly obscured. I wasn't able to get a clear enough shot to make it out, but maybe someone more handy at capturing frames will have better luck.