Sidney Powells civil filing document is here:
A few quick snippets from supporting affidavits:
I was an electronic intelligence analyst under 305th Military Intelligence with experience
gathering SAM missile system electronic intelligence. I have extensive experience as a white hat hacker used by some of the top election specialists in the world. The methodologies I have employed represent industry standard cyber operation toolkits for digital forensics and OSINT, which are commonly used to certify connections between servers, network nodes and other digital properties and probe to network system vulnerabilities.
In my professional opinion, this affidavit presents unambiguous evidence that Dominion Voter Systems and Edison Research have been accessible and were certainly compromised by rogue actors, such as Iran and China. By using servers and employees connected with rogue actors and hostile foreign influences combined with numerous easily discoverable leaked credentials, these organizations neglectfully allowed foreign adversaries to access data
I have advanced training from the Defense Intelligence Agency (DIA), Central Intelligence Agency (CIA), National Security Agency (NSA), DHS office of Intelligence & Analysis (I&A) and Massachusetts Institute of Technology(MIT).3.I am employed by a large defense contractor as a chief cyber security engineer and a subject-matter expert in cyber security…
A Man-in-the-Middle (MITM) cyber attack was carried out by covert operators using sophisticated tools, such as Hammer and Scorecard. The MITM attack occurred in two ways. Initially, remote operatives used USB memory cards containing cryptographic keys and access system back doors to alter votes in battleground states. Subsequently, the results were forwarded to Scytl/SOE Software servers located in Frankfurt, Germany (previously, Barcelona, Spain). The MITM attack was structured to ensure sufficient data alteration had occurred prior to forwarding the tallied results to the Scytl/eClarity Software Electronic Night Reporting (ENR) system. The reason election data are forwarded overseas is to avoid detection and monitoring by the USIC to obfuscate the MITM.k.In my expert opinion, theDVS Democracy Suite, Scytl/SOE Software/eClarity and Smartmatichave not produced auditable results in the 2020 election. It is evident that ballots were not properly validated, system records were not kept, and the system experience considerable instability even several days prior to November 4, 2020 that require DVS to implement software changes at the last minute. In addition, the disparity in data distribution after 4:30 AM on November 4, 2020 indicates significant systemic anomalies that were widespread among all battleground states.
The evidence is both extensive and persuasive and indicates large-scale fraud by remote operators.
…I conclude that a combination of lost cryptographic key contained on stolen USB memory cards, serious exploitable system and software vulnerabilities and operating system backdoor in DVS,Scytl, SOE Software/eClarity and Smartmatic created the perfect environment to commit widespread fraud in all states where these systems are installed. My analysis of the 2020 Election from NY Times data shows statistical anomalies across the battleground state votes.
These failures are widespread and systemic-and sufficient to invalidate the vote counts .17. I conclude with high confidence that the election 2020 data were altered in all battleground states resulting in a hundreds of thousands of votes that were cast for President Trump to be transferred to Vice President Biden.
These alterations were the result of systemic and widespread exploitable vulnerabilities in DVS, Scytl/SOE Software and Smartmatic systems that enabled operators to achieve the desired results. In my view, the evidence is overwhelming and incontrovertible.