Okay. Now it's not just insane. It could also be criminal, as a leak of actual voting system software at MyPillow CEO Mike Lindell's three-day, so-called "cyber symposium" in South Dakota may have imperiled the security of the Gubernatorial Recall election now under way in California. We've got some exclusive details on today's BradCast. [Audio link to full show is posted below this summary.]
First up, before the details on what appears to have happened at Lindell's bizarre circus show in Sioux Falls, some very quick news, on the Census Bureau's release of 2020 data today and the GOP's plans to use it to gerrymander themselves into a U.S. House majority; U.S. plans to evacuate the embassy in Kabul as the Taliban retakes much of Afghanistan; Support from national teacher's unions to mandate vaccination or testing for the nation's school staff; and Rightwing radio host COVID and vaccine deniers findings themselves dead and/or hospitalized...with COVID.
Then, it's on to the 2020 "stolen election" Crazy Train still unfolding in MAGALand.
On Wednesday, a U.S. District Court judge appointed by Donald Trump, ruled that Dominion Voting Systems' $1.6 billion defamation lawsuits against Trump attorneys Sidney Powell, Rudy Giuliani and, yes, Mike Lindell, may proceed. Judge Carl J. Nichols' 44-page ruling [PDF] denied all parts of the defendants various Motions to Dismiss. Suffice to say it did not go well for them, on any front, leading former crack-addict and current phony stolen-election addict Lindell to declare the ruing "the worst decision a judge has made in the history of this country." (Which someone named Dred Scott would likely dispute.)
But the real madness has been unfolding in South Dakota this week, at Lindell's three-day "Cyber Symposium" that was promised to reveal "absolute proof" that the 2020 election was stolen through a massive, sophisticated cyberattack by China (I think.) Lindell's promised "proof" of the steal was so unimpeachable that it was to result, he's been declaring for weeks, in an immediate 9 to 0 decision by the U.S. Supreme Court to reinstate Trump to the White House this Friday the 13th!
It may not work out that way, however. The far-right newspaper Washington Times published a gob-smacking story on Wednesday, in which a cyber expert hired by Lindell himself to examine and explain the super-secret 37 terabytes of data --- said to have been captured from Internet transfers just days after the November election, revealing that China flipped millions of votes --- told the paper that the data and claims about them were illegitimate.
It's a simply coo-coo for Cocoa Puffs story --- again, from a Rightwing outlet --- detailing how none of Lindell's claims appear to be real, and seem to be sourced to a former Government contractor who was also the source of (false) claims that the Obama Administration wiretapped Trump Tower in 2016. But, as Lindell's own experts explained to the Washington Times, the data doesn't show what it is supposed to show...but that may only be because the source dude supposedly had a stroke the day before the symposium!
Lindell's expert, who says there still could be some evidence of something anyway in the data they did examine, told the paper: "We were handed a turd. And I had to take that turd and turn it into a diamond."
But now the loony toons story takes a potentially much darker turn, albeit a somewhat confusing one. Mother Jones' AJ Vicens does a fine job attempting to make at least some sense of what has happened with this part of the story over the last several days. It seems to involve an election official named Tina Peters, County Clerk of Mesa County, Colorado (who is now apparently being investigated by state law enforcement authorities), a guy named Ron Watkins, widely thought to be "Q" of the infamous Q-Anon MAGA conspiracy world, and potentially a former campaign manager for Rep. Lauren Boebert (R-CO). See Vicens for that part of the story.
The upshot is that duplicate images said to be of stolen hard drives containing actual, proprietary Dominion Voting System software, seemingly from Mesa County, was released at Lindell's Cyber Symposium and is now said to be out in the wild, as it was made available for download to pretty much anybody with the technical know-how to grab it.
This afternoon, we confirmed with legendary Finnish cybersecurity and voting systems expert Harri Hursti, who is at South Dakota conference, apparently serving as an analyst for a news outlet, that the hard drives do, in fact, contain Dominion's Election Management System (EMS) software, though not its source code, as some have reported via Twitter. As Dominion explains on its website, the EMS "Drives the entire election project through a single comprehensive database...From election definition to results reporting." It is, in short, the heart of the entire Dominion election system suite.
"What was shared were 3 different images of installed EMS systems," Hursti told me via email from Sioux Falls. "I can confirm that those were circulated for copying. It [isn't] source code as such, but part of the code is interpreted code, there is human readable and editable things there."
Hursti is well known in the voting system world, where his most notorious "white hat" hack of a Diebold voting system was revealed in HBO's Emmy-nominated 2006 documentary, Hacking Democracy; He was also featured in their 2020 Emmy-nominated Kill Chain: The Cyber War on America's Elections; and, in what may have been Hursti's first American film interview, my own with him in 2010's award-winning Murder, Spies and Voting Lies: The Clint Curtis Story. He also heads up the infamous DefCon Voting Village in Las Vegas each year, and most recently was tapped by the state of New Hampshire to oversee a very thorough, professional and transparent post-election audit to determine why the Diebold optical-scanners in the town of Windham miscounted several hundred votes in a State Representative race last November.
In other words, his credentials here are impeccable. Though what the dangers of the release of Dominion's software into the wild may be is still less than clear. Particularly as it pertains to the September 14th Gubernatorial Recall election now underway here in California. It's something that I am still trying to dig into. Dominion's EMS software is used in a number of large jurisdictions in the state, including San Diego County, San Francisco and Riverside Counties.
Earlier this week, I spoke on The BradCast with cybersecurity and voting system expert Rich DeMillo, founder of Georgia Tech's School of Cybersecurity and Privacy, about serious vulnerability concerns that have recently emerged [PDF] in a long-running federal lawsuit seeking to ban Dominion's touchscreen vote systems across the state of Georgia. How this new security breach may now come into play in either that case, here in California, or in any of the other many jurisdictions which use the same software across the nation, is unclear at the moment. One expert I spoke with this afternoon, however, said it does seem to prove yet again that "security by obscurity" (attempting to keep vulnerable software safe by keeping it a secret) doesn't actually work, especially when it comes to voting systems.
More on this story, I suspect, in the days ahead.
Finally, we close today with Desi Doyen and our latest Green News Report, as Senate Dems move forward with critical climate legislation in their $3.5 trillion reconciliation package, even as deadly, climate change-fueled wildfires, heat waves and floods continue to wreak absolute havoc around the globe this week...
(Snail mail support to "Brad Friedman, 7095 Hollywood Blvd., #594 Los Angeles, CA 90028" always welcome too!)