In early January of 2021, Mary Fanning and Alan Jones published two pieces in The American Report entitled:
Proof Positive: Coordinated Cyberwarfare Attack Against US By China, Russia, Iran, Iraq, Pakistan To Steal Election From Trump
STEALING AMERICA: ‘Former’ Communist Comey Got SCORECARD Election Hacking Source Code And Knew SolarWinds Was Not Secure
These articles claim to have a positive proof of a massive coordinated international cyber attack against multiple US election sites during the first week of November, 2020. The stated aim of this attack was allegedly to steal the election from Trump. The authors of these articles claim that two secret tools were used in the attack: one called “Hammer” and the second called “Scorecard”. The source of this highly secretive information was a mysterious and ‘well connected’ individual by the name of Dennis Montgomery.
The American Report articles came with a large number of supporting data sets and animated charts (the same material was also used in Mike Lindell’s movie “Absolute Proof”) that purports to show the details of these cyber attacks. The data includes source and target IP and MAC addresses, the method of infiltration, and the vote count changes to several voting systems. All in all, it seems like a real smoking gun and the stuff that cyber unicorn dreams are made of.
I wasn’t aware of this claim until a friend asked me to look it over. It didn’t take long to reach the conclusion that the Montgomery data referenced in the two articles and in Lindell’s movie is a crude fabrication and is a forgery.
Image 1: Sample data anomalies: (1) A sources for the alleged attack, an entity called “SHENZHEN SUNRISE TECHNOLOGY CO.,LTD. 200”, is a Shenzhen/Hong Kong based company, but, instead of providing a specific IP address with a building, floor, and room # location of the machine which is allegedly launching the attack, it lists 157 generic company IP addresses. (2) The “LA PAZ COUNTY ELECTIONS”, which is in Arizona, shows up in two different states (Michigan and Wisconsin) with two different IP addresses. (3) The IP address of the Michigan Alcona county target is both 188.8.131.52 (Columbus, Ohio) and 184.108.40.206 (Ashburn, Virginia)
Running even basic analytics on Montgomery’s data shows that it’s laced with errors and anomalies. Here are a few examples:
- Many of the source and destination IP addresses don’t match the geolocations specified
- Some of the company/entity names don’t match the assigned locations (e.g. a company identified in Beijing China is actually located in Hong Kong)
- The “SOURCE OWNER” column uses DBA names for companies instead of the actual legal name, which is what you would get if you did a low level IP to organization resolution (a mandatory step for the intelligence to be actionable)
- All of the destinations are protected with firewalls so the “INTRUSION METHOD” referencing the word “FIREWALL” is meaningless. From the limited attack vocabulary used in the document it’s obvious that whoever wrote this isn’t familiar with actual cyber offensive operations
- The DATE column is missing time zone information. The repeating distribution pattern of date time stamps also strongly suggests that they are non-organic and rather were produced using some sort of cyclic function with a random number generator
- Some of the records are incomplete. For example, one row in the “CHANGED VOTES” column states “TRUMP: DOWN 44,905”, but it failed to add the “Y” under the corresponding “SUCCESS” column
- The tabs on the spreadsheet show that the titles were created manually (“Sheet 1” vs. “Sheet1” missing the space), which is unlikely if this data came from an automated process
- The values in the fields titled “SOURCE ID” and “TARGET ID” which have a MAC address format were most likely created with a random number generator. A sampling of these addresses yielded no results of known network card manufacturers.
As for Dennis Montgomery, the source behind this high value intelligence, he is a certified lifelong con man with what appears to be a long rap sheet of scams. As Ecclesiastes 1:9 observes, there is nothing new under the sun and it turns out that Montgomery’s latest con is almost identical to several others he pulled off over the years on targets such as the DoD, CIA, various LEAs, and the DOJ.
It’s not entirely clear who paid Montgomery to create/promote this fabrication. Motivation wise, it could be just another money making venture, but, it’s more likely a well organized and funded active measures that is designed to kill any discussion about real election fraud.
As for his chief promoter Mary Fanning and Alan Jones, conducting a cursory evaluation of their body of work shows little original intelligence and a large amount of high grade/high volume disinformation operations. Here is one example (and don’t worry, you don’t need top secret US government clearance and years of intelligence training to view/understand it).
In a January 14, 2021 tweet entitled: “PRO RUSSIAN LDNR OPERATIVE WITH ANTIFA AT THE CAPITAL BUILDING”, Fanning positively identified an Antifa and a Russian operator at the Capital riots. This post illustrates her MO. A continues spray of tiny bits of truth in a sea of deception, also known as the firehose of falsehoods.
The individual depicted in Mary Fanning’s image standing next to the horned Viking (an actor that goes by the name of Jake Angeli AKA Jacob Anthony Chansley, who has no public ties to Antifa) is indeed Sergai Dybynyn, but, the classification of his political and operational linkage is wrong. Dybynyn is affiliated with members of the Ukrainian nationalist movement, some of which openly embrace extreme rightwing and fascist ideologies. Fanning’s arrest warrant source claim for Dybynyn is also wrong, it wasn’t issued by the “Ukrainian Ministry of Interior” but rather by the Pro-Russian separatist: “DSP of the Ministry of Internal Affairs of the LPR (Lugansk People’s Republic).”
Image 4: Disinformation in its purest form and its sources. The actual identity of Sergai Dybynyn, who Mary Fanning misidentified during the Capital riots as “pro-Russian” and his arrest warrant by the Lugansk People’s Republic. Before you start screaming that the “Zhidobanderite” image on Ihor Kolomoysky’s T-shirt was photoshopped, chill, this alliance/marriage of convenience with the ideology of the Právyi Séktor is well documented.
Image 5: A deeper dive into Dybynyn and three other related individuals wanted in the LPR arrest warrants. All four are Ukrainian nationalists. Roman Bochkala, one of the wanted man, is a US Peace Crops volunteer in Ukraine who visits the US regularly and has attended training in the US (via the Open World program). Interestingly, he also seems to be frequent flyer on various US military aircrafts. If you are still not convinced about what these people really think about the Russians, check the message on Roman’s right hand bandage.
My advice to anyone reading The American Report and contemplating swallowing the Montgomery forgeries or other QAnon style sleeping pills is; be aware of false prophets, they come to you in sheep’s clothing but inwardly they are ravenous wolves.
If you want to investigate/prove possible election fraud, you don’t need hush-hush data that purports to come from ‘secrete leaked’ NSA/CIA projects or anonymous individuals. Just focus on factual legally obtained evidence that can stand-up in court. For example, official CCTV footage with chain of custody verification that shows identifiable vehicles delivering dozens of ballot boxes in the wee hours of the night. Processing these ballots without supervision and the resulting one sided statistical vote anomalies should tell you something. If you claim to have seen ballots being shredded/burned, produce the actual shredded evidence, they can be easily verified and reassembled. If you suspect voting machine irregularities in a specific race, conduct a manual re-count of the paper ballots and compare it to the voting machine count. Don’t accept fantastic stories about voting related Delta force raids in Germany or votes being transmitted overseas via military satellites in order to be manipulated. This is all disinformation that is designed to destroy the credibility of any challenge to real voting irregularities and it’s coming form the same ‘patriotic’ sources that produce the Operation Trust content, AKA QAnon.
If you don’t like what you see around you and want to change it, don’t wait for the ‘good guys’ to do it for you. There are no good guys out there. JFK Jr. is not coming back to save us and you certainly shouldn’t trust Sessions or Barr. Instead, get personally involved and hold your representatives accountable at the ballot. Here is a simple litmus test: disregard what any politician says about foreign, economic, immigration and other policies. Instead focus on one thing and one thing only: the complete breakup of big tech and SM monopolies like Microsoft, Google, Amazon, Facebook, and Twitter. This should be the only priority for the next election cycle. Any politician who didn’t/doesn’t actively works for their breakup and continues to support their Section 230 protection should be voted out of office.
*** Update 02/21/2021 ***
Errare Humanum est…Jeff Nyquist, who was Mary Fanning’s source for Dybynyn’s identification as a Russian operator at the capital claim has updated his post to reflect Dybnynin’s actual political affiliation. Thank you Jeff for citing my post.
References and Sources
XRVision Sentinel AI Platform – Face recognition, image reconstruction, and object classification
Audio 1: Excerpt of a 2017 Mike Zullo interview with Dennis Montgomery. Most of the claims made by Montgomery during the interview show a complete ignorance of cyber security tradecraft and practices
Document 1: Dennis Montgomery’s foreign election cyber attack data set
Video 1: Content promoted by Mary Fanning. January 7, 2021, The Ukrainian Information Agency (UNIAN) and the Glavred (1plus1) TV station disinformation publications falsely identifying Russian supporters of President Trump storming the Capitol building
Copyright 2021 Yaacov Apelbaum, All Rights Reserved.