August 16, 2022

Milne News

News Reported Raw, Real and Truthfully

Home » U.S Army Says Reports They Seized Servers In Germany Are False, Rumor Stemmed From Separate Incident

U.S Army Says Reports They Seized Servers In Germany Are False, Rumor Stemmed From Separate Incident

4 min read
U.S Army Says Reports They Seized Servers In Germany Are False, Rumor Stemmed From Separate Incident

There have been numerous reports that the U.S. Army raided a Frankfurt office belonging to Spanish election software company Scytl to seize servers that had evidence of voting irregularities in the Nov. 3 U.S. election.

In response to these reports both the US Army and Scytl issued statements to The Associated Press that the claim is not true. They added that Scytl does not have offices or servers in Frankfurt, Germany.

The story went viral on Saturday after people on social media were sharing reports published by websites saying servers that would reveal wrongdoing in the U.S. election had been confiscated by U.S. military forces in Germany.

Most posts said the servers belong to the software company Scytl, which is based in Barcelona, and others suggested the servers housed information from Dominion Voting Systems.

The reports followed a Zoom call that featured Republican Rep. Louie Gohmert of Texas, suggesting that “U.S. Army forces” had seized servers from a Frankfurt office of the software company Scytl.

In his remarks, Gohmert acknowledged that the information about the alleged raid only came from a “German tweet in German,” and he said, “I don’t know the truth.”

According to the company, Scytl does not tally votes.

When asked by The Associated Press if the Army had engaged in an operation to recover servers in Germany, an Army spokesperson responded Saturday, “Those allegations are false.”

Scytl also denied the claim by releasing a statement on Friday titled, “Fact Checking Regarding US Elections: Debunking Fake News.”

In the statement Scytl said: “We do not have servers or offices in Frankfurt” and “The US army has not seized anything from Scytl in Barcelona, Frankfurt or anywhere else.” It also says Scytl does not “tabulate, tally or count votes in the US.”

Dominion Voting added a statement on their website that reads: “There have been no “raids” of Dominion servers by the U.S. military or otherwise, and Dominion does not have servers in Germany.  CISA has refuted this claim on Twitter, and the U.S. Army has also confirmed to the Associated Press that it’s false.”

Scytl Did House Servers In Germany In 2019 “Temporarily”

Jonathan Brill, the president and general manager for Scytl’s U.S. division, told the Associated Press that the company had a temporary connection to Frankfurt last year. “Backup servers in Frankfurt were used for a specific project for the European Parliament in 2019,” Brill said. “These back-up servers were closed in September 2019.”

Brill said when it comes to the U.S. elections, “Scytl products sold to US customers are fully housed in the US, utilizing Amazon Web Services and have never been housed in Germany.”

Scytl and Dominion do not have ties to one another, according to statements from both companies

“There is no truth whatsoever to the claims,” a Dominion spokesperson wrote in an email when asked if the company stored data on servers in Germany and if it was aware of a U.S. military operation to seize those servers.

Reports of U.S. Army raid in Germany may stem from separate incident

U.S. security sources said that reports the U.S. military recently seized computer servers in Germany likely pertain to an earlier raid by German authorities over a different issue involving hacked police files.

“There’s some cross-information about what happened and where,” an intelligence official with expertise in cyber operations told Just the News. “Verified reports about one incident probably got conflated with speculation about another.”

Just The News reports: The “verified reports” involve a July raid on a German server that hosted sensitive, hacked files from U.S. law enforcement agencies, authorities said. The files reportedly were accessed over the summer, in the course of a Houston data breach.

In that incident, labelled “BlueLeaks,” the group calling itself “Distributed Denial of Secrets” [DDoS] reportedly used a German computer server to share sensitive U.S. police material.

The material, stolen from more than 200 federal, state, and local law enforcement agencies, spanned 25 years. It included a lot of audio and video files, along with names, personal phone numbers, and emails of law enforcement officers throughout the United States of America.

Prosecutors in the Saxony region of Germany seized the DDoS server back in July.

“Due to a U.S. request for preliminary security in the context of international mutual legal assistance in criminal matters, the Zwickau public prosecutor secured a server in a data center in Falkenstein (Vogtland) on July 3, 2020, which can be assumed to have been accessed by people on the Internet under the name Distributed Denial of Secrets (DDosecrets),” German prosecutors said.

You can also follow us on:

Help Milne News stay online and continue our great work in bringing you the News Reported Raw, Real and Truthfully…No BS…Any donation is greatly appreciated:

Thank you for your support.

Or Via Stripe:  any kind of credit or debit card:  Visa, MasterCard, American Express, JCB, Discover, and Diners Club. (NO SIGN UP REQUIRED)

Get the latest news delivered straight to your inbox for free every day by signing up below.


Leave a Reply