My big issue so far is the lack of chain of custody of these files they're looking at! If they are looking at a forensic image of a Dominion machine with exterior ipv6 address logs, boom case closed. But... At this point they haven't demonstrated where the image came from!!!
I'm assuming it's legit, but you know what they say about assumptions.
(post is archived)