On Friday, Attorney General Mark Brnovich opened an investigation into Maricopa County’s failure to comply with valid and enforceable legislative subpoenas as requested by Arizona State Senator Sonny Borrelli.
Attorney General Brnovich sent notice to Maricopa County with a request for a written response from the Maricopa County Board of Supervisors by 5:00 p.m. on Friday, August 20, 2021.
This comes after Maricopa County failed to comply with subpoenas for routers, passwords, splunk logs, and other items relating to the 2020 election.
In response to the Senate, the County sent a disdainful letter that attacked the efforts of their constituents volunteering for the audit and shared more tweets claiming innocence.
Our election professionals and Board members have complied w/Senate demands & supplied everything professional auditors would need to do their job. In fact, you can find results from 2 audits performed by certified companies the County hired here: maricopa.gov/5681/Elections#azaudit
The County has made consistent efforts to meet Senate demands that were safe and supported by law. Of course, we can only provide what we actually have. Find the facts and learn more about election processes at https://t.co/PHPv4LKhkc https://t.co/iwkThng8UD pic.twitter.com/km9aWIc9Zy
— Maricopa County (@maricopacounty) August 5, 2021
The Arizona Senate’s latest subpoena requested the following items from the County.
These subpoenas are safe and supported by law.
1. All reports, findings and other documents concerning any breach of the voter registration server, the Maricopa County Recorder’s Office systems, or any other aspect of the Maricopa County elections systems at any time within six months of the November 3, 2020 general election.
2. All ballot envelopes received in connection with the November 3, 2020 general election, or digital images of the same.
3. All user names, passwords, pins and/or security keys or tokens required to access, or otherwise relating to, any and all ballot tabulation devices used in connection with the November 3, 2020 general election in Maricopa County. This is specifically for all levels of access, including, but not limited to, administrator access or any other level of access required to access and print the configuration of the ICP2 devices. This request also includes any materials that the County does not possess but which it has a right to access.
4. All Maricopa County registered voter records to date, with any and all change histories including but not limited to the following:
- The field that was added, removed, or changed
- A timestamp (date and time) for the change
- Identifying information for the individual who made the change (internal employee ID and/or IP address)
5. All routers used in connection with the November 3, 2020 general election, or virtual images of the same, and the public IP of each such router.
6. All Splunk logs, network logs, net flows, or similar data related with systems associated in any way with the administration of the November 3, 2020 general election, for the time period beginning 60 days before the election and ending 90 days after the election.
Maricopa County claims that all of these items were given to the Senate already and that “No routers have ever been connected to the tabulation equipment or the Election Management System. The County will not provide its network routers used to support over 50 departments as there are significant security risks posed by producing its routers.”
The routers do not carry data. They only show where data has been sent. What are they hiding?
In addition, they claim that “all logs needed to independently assess whether the tabulation equipment connected to the internet were provided to the Senate”. This includes Windows Security Event Logs.
Not all logs. Only the logs that the county says are “needed”.
They still have not answered the question, who ran a script with 37,646 queries to delete Windows Security Event Logs prior to February 5th, 2021? Who deleted these election logs and what was on them?
Dominion Voting Machines was subpoenaed for “all user names, passwords, pins and/or security keys or tokens”. In May, they responded to the Arizona Senate saying,
“Releasing Dominion’s intellectual property to an unaccredited, biased, and plainly unreliable actor such as Cyber Ninjas would be reckless, causing irreparable damage to the commercial interests of the company and the election security interests of the country… No company should be compelled to participate in such an irresponsible act.”
The County is not in possession of these administrative passwords which give the user complete and total access to the system. Only Dominion has this level of control over our elections.
Dominion will not release this information to the Arizona Senate, citing their intellectual property rights.
Since when are private companies granted intellectual property rights over our elections? Do the commercial interests of Dominion take precedence over U.S. national security interests?
Dominion was hired by Arizona to provide a free, fair, and TRANSPARENT election. They are not fulfilling their contract.
The County and Dominion’s refusal to cooperate is causing serious concern.