Dear WA State patriots (and allies), I’m sorry for not posting a real newsletter. But I’ve been doing some digging and researching into when our state got subverted. While digging through the Revised Code of Washington (specifically 29a.60, and 29.80, as well as RCW 42.56, I’m finding some additional details that just make me go ‘what the actual f@#$?!’, and ‘this is just plain ugly’.
Without going into it, it looks like things happened around July 2004 with SB 6417, which makes any voter registration record obtained through specific state agencies, non-viewable to the public, except by court order.
The problem with THAT, is, the judge can make an exemption ruling on such a records request, if compelled to do so, or if such cause wouldn’t be in the public or government interest…
The statute also allows an agency to show cause to deny such a records request.
I’ll have a full newsletter on this nastiness within a week. I have quite a bit to sort through, as well as some anecedotes and conversations I need to remember, regarding this issue.
Woah I looked at SB 6417, must be a typo as it lead to a good fortune cookie of HB 2678:
1 AN ACT Relating to modifying cybercrime provisions; and amending
RCW 9A.90.030 and 9A.90.080.2
3 BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF WASHINGTON:
4 Sec. 1. RCW 9A.90.030 and 2016 c 164 s 3 are each amended to
read as follows:5
6 The definitions in this section apply throughout this chapter
unless the context clearly requires otherwise.7
8 (1) "Access" means to gain entry to, instruct, communicate with,
9 store data in, retrieve data from, or otherwise make use of any
10 resources of electronic data, data network, or data system, including
via electronic means.11
12 (2) "Cybercrime" includes crimes of this chapter.
13 (3) "Data" means a digital representation of information,
14 knowledge, facts, concepts, data software, data programs, or
15 instructions that are being prepared or have been prepared in a
16 formalized manner and are intended for use in a data network, data
program, data services, or data system.17
18 (4) "Data network" means any system that provides digital
19 communications between one or more data systems or other digital
20 input/output devices including, but not limited to, display
21 terminals, remote systems, mobile devices, and printers.
H-4439.1
SUBSTITUTE HOUSE BILL 2678
State of Washington 65th Legislature 2018 Regular Session
By House Public Safety (originally sponsored by Representatives
Tarleton, Hudgins, Jinkins, Ortiz-Self, and Irwin)
READ FIRST TIME 02/02/18.
p. 1 SHB 2678
1 (5) "Data program" means an ordered set of electronic data
2 representing coded instructions or statements that when executed by a
3 computer causes the device to process electronic data.
4 (6) "Data services" includes data processing, storage functions,
5 internet services, email services, electronic message services, web
6 site access, internet-based electronic gaming services, and other
7 similar system, network, or internet-based services.
8 (7) "Data system" means an electronic device or collection of
9 electronic devices, including support devices one or more of which
10 contain data programs, input data, and output data, and that performs
11 functions including, but not limited to, logic, arithmetic, data
12 storage and retrieval, communication, and control. This term does not
13 include calculators that are not programmable and incapable of being
used in conjunction with external files.14
15 (8) "Identifying information" means information that, alone or in
16 combination, is linked or linkable to a trusted entity that would be
17 reasonably expected to request or provide credentials to access a
18 targeted data system or network. It includes, but is not limited to,
19 recognizable names, addresses, telephone numbers, logos, HTML links,
20 email addresses, registered domain names, reserved IP addresses,
21 usernames, social media profiles, cryptographic keys, and biometric
identifiers.22
23 (9) "Malware" means any set of data instructions that are
24 designed, installed, or used, without authorization and with
25 malicious intent, to disrupt computer operations, monitor computer
26 use, gather information about a person or organization, gather
27 sensitive information, or gain access to private computer systems.
28 "Malware" does not include software that installs security updates,
29 removes malware, or causes unintentional harm due to some deficiency.
30 It includes, but is not limited to, a group of data instructions
31 commonly called viruses or worms, that are self-replicating or self32 propagating and are designed to infect other data programs or data,
33 consume data resources, modify, destroy, record, or transmit data, or
34 in some other fashion usurp the normal operation of the data, data
system, or data network.35
36 (10) "White hat security research" means accessing a data
37 program, service, or system solely for purposes of good faith
38 testing, investigation, identification, and/or correction of a
39 security flaw or vulnerability, where such activity is carried out,
p. 2 SHB 2678
1 and where the information derived from the activity is used,
primarily to promote security or safety.2
3 (11) "Without authorization" means to knowingly circumvent
4 technological access barriers to a data system in order to obtain
5 information without the express or implied permission of the owner,
6 where such technological access measures are specifically designed to
7 exclude or prevent unauthorized individuals from obtaining such
8 information, but does not include white hat security research or
9 circumventing a technological measure that does not effectively
10 control access to a computer. The term "without the express or
11 implied permission" does not include access in violation of a duty,
12 agreement, or contractual obligation, such as an acceptable use
13 policy or terms of service agreement, with an internet service
14 provider, internet web site, or employer. The term "circumvent
15 technological access barriers" may include unauthorized elevation of
16 privileges, such as allowing a normal user to execute code as
17 administrator, or allowing a remote person without any privileges to
run code.18
19 Sec. 2. RCW 9A.90.080 and 2016 c 164 s 8 are each amended to
read as follows:20
21 (1) A person is guilty of electronic data tampering in the first
22 degree if he or she maliciously and without authorization:
23 (a)(i) Alters data as it transmits between two data systems over
an open or unsecure network; or24
25 (ii) Introduces any malware into any electronic data, data
system, or data network; and26
27 (b)(i) Doing so is for the purpose of devising or executing any
28 scheme to defraud, deceive, stalk, or extort, or commit any other
29 crime in violation of a state law not included in this chapter, or of
30 wrongfully controlling, gaining access to, or obtaining money,
property, or electronic data; or31
32 (ii) The electronic data, data system, or data network is
33 maintained by a ((governmental [government])) government agency.
34 (2) Electronic data tampering in the first degree is a class C
felony.35
--- END ---
p. 3 SHB 2678
OK in summary this is the catch all to the rigging of elections by cybercrime aka Dominion & King Co OmniBallot utilizes AWS Object Lock (=Amazon= fire bells fire bells) to ensure immutable document (ballot) storage. Sure you betcha!
So we can boil it down at least in part to a corrupt judiciary. No surprise here.
I have designated my property in King Co. as a US Constitutional zone. Where all your rights are recognized as per the original Constitution of the United States of America. So yes this year once again we will celebrate the 4th of July with fireworks of every type available.
Woah I looked at SB 6417, must be a typo as it lead to a good fortune cookie of HB 2678:
1 AN ACT Relating to modifying cybercrime provisions; and amending
RCW 9A.90.030 and 9A.90.080.2
3 BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF WASHINGTON:
4 Sec. 1. RCW 9A.90.030 and 2016 c 164 s 3 are each amended to
read as follows:5
6 The definitions in this section apply throughout this chapter
unless the context clearly requires otherwise.7
8 (1) "Access" means to gain entry to, instruct, communicate with,
9 store data in, retrieve data from, or otherwise make use of any
10 resources of electronic data, data network, or data system, including
via electronic means.11
12 (2) "Cybercrime" includes crimes of this chapter.
13 (3) "Data" means a digital representation of information,
14 knowledge, facts, concepts, data software, data programs, or
15 instructions that are being prepared or have been prepared in a
16 formalized manner and are intended for use in a data network, data
program, data services, or data system.17
18 (4) "Data network" means any system that provides digital
19 communications between one or more data systems or other digital
20 input/output devices including, but not limited to, display
21 terminals, remote systems, mobile devices, and printers.
H-4439.1
SUBSTITUTE HOUSE BILL 2678
State of Washington 65th Legislature 2018 Regular Session
By House Public Safety (originally sponsored by Representatives
Tarleton, Hudgins, Jinkins, Ortiz-Self, and Irwin)
READ FIRST TIME 02/02/18.
p. 1 SHB 2678
1 (5) "Data program" means an ordered set of electronic data
2 representing coded instructions or statements that when executed by a
3 computer causes the device to process electronic data.
4 (6) "Data services" includes data processing, storage functions,
5 internet services, email services, electronic message services, web
6 site access, internet-based electronic gaming services, and other
7 similar system, network, or internet-based services.
8 (7) "Data system" means an electronic device or collection of
9 electronic devices, including support devices one or more of which
10 contain data programs, input data, and output data, and that performs
11 functions including, but not limited to, logic, arithmetic, data
12 storage and retrieval, communication, and control. This term does not
13 include calculators that are not programmable and incapable of being
used in conjunction with external files.14
15 (8) "Identifying information" means information that, alone or in
16 combination, is linked or linkable to a trusted entity that would be
17 reasonably expected to request or provide credentials to access a
18 targeted data system or network. It includes, but is not limited to,
19 recognizable names, addresses, telephone numbers, logos, HTML links,
20 email addresses, registered domain names, reserved IP addresses,
21 usernames, social media profiles, cryptographic keys, and biometric
identifiers.22
23 (9) "Malware" means any set of data instructions that are
24 designed, installed, or used, without authorization and with
25 malicious intent, to disrupt computer operations, monitor computer
26 use, gather information about a person or organization, gather
27 sensitive information, or gain access to private computer systems.
28 "Malware" does not include software that installs security updates,
29 removes malware, or causes unintentional harm due to some deficiency.
30 It includes, but is not limited to, a group of data instructions
31 commonly called viruses or worms, that are self-replicating or self32 propagating and are designed to infect other data programs or data,
33 consume data resources, modify, destroy, record, or transmit data, or
34 in some other fashion usurp the normal operation of the data, data
system, or data network.35
36 (10) "White hat security research" means accessing a data
37 program, service, or system solely for purposes of good faith
38 testing, investigation, identification, and/or correction of a
39 security flaw or vulnerability, where such activity is carried out,
p. 2 SHB 2678
1 and where the information derived from the activity is used,
primarily to promote security or safety.2
3 (11) "Without authorization" means to knowingly circumvent
4 technological access barriers to a data system in order to obtain
5 information without the express or implied permission of the owner,
6 where such technological access measures are specifically designed to
7 exclude or prevent unauthorized individuals from obtaining such
8 information, but does not include white hat security research or
9 circumventing a technological measure that does not effectively
10 control access to a computer. The term "without the express or
11 implied permission" does not include access in violation of a duty,
12 agreement, or contractual obligation, such as an acceptable use
13 policy or terms of service agreement, with an internet service
14 provider, internet web site, or employer. The term "circumvent
15 technological access barriers" may include unauthorized elevation of
16 privileges, such as allowing a normal user to execute code as
17 administrator, or allowing a remote person without any privileges to
run code.18
19 Sec. 2. RCW 9A.90.080 and 2016 c 164 s 8 are each amended to
read as follows:20
21 (1) A person is guilty of electronic data tampering in the first
22 degree if he or she maliciously and without authorization:
23 (a)(i) Alters data as it transmits between two data systems over
an open or unsecure network; or24
25 (ii) Introduces any malware into any electronic data, data
system, or data network; and26
27 (b)(i) Doing so is for the purpose of devising or executing any
28 scheme to defraud, deceive, stalk, or extort, or commit any other
29 crime in violation of a state law not included in this chapter, or of
30 wrongfully controlling, gaining access to, or obtaining money,
property, or electronic data; or31
32 (ii) The electronic data, data system, or data network is
33 maintained by a ((governmental [government])) government agency.
34 (2) Electronic data tampering in the first degree is a class C
felony.35
--- END ---
p. 3 SHB 2678
OK in summary this is the catch all to the rigging of elections by cybercrime aka Dominion & King Co OmniBallot utilizes AWS Object Lock (=Amazon= fire bells fire bells) to ensure immutable document (ballot) storage. Sure you betcha!
So we can boil it down at least in part to a corrupt judiciary. No surprise here.
I have designated my property in King Co. as a US Constitutional zone. Where all your rights are recognized as per the original Constitution of the United States of America. So yes this year once again we will celebrate the 4th of July with fireworks of every type available.
Thank you for all the research you’re doing!! I know that takes hours and hours…God bless you!!!
Thank you so much for your persistent investigating. It does not go un noticed!
https://kuow.org/stories/king-county-and-wa-secretary-of-state-clash-over-online-voting
That sounds great J especially for a newby like me… 😎
Thank you so much for all your research and willingness to organize and keep us informed.
Funny that Wyman ended up working for "Let's Go Brandon"! So many RINO's!!!
I'm also going to look into July 2004 with SB 6417! Way to go J!! Thank you once again.