Lindell: They verified the IP addresses, identified computers, longitude and latitude, buildings, and who did it

by

speakingaboutnews:

Lindell goes on to say:

“I want to tell you what’s coming. What I did last month, I sent people into the field, and they verified the IP addresses, identified computers, longitude and latitude, buildings, and who did it. We looked into it for 20 Chinese attacks on November 3. We had it verified by a third party. It will be labeled “Absolute Interference.” In those 20 cyberattacks from China (and there were thousands of them), they tipped over and changed five states: Michigan, Wisconsin, Pennsylvania, Georgia, and Arizona.

This will be published in my new documentary entitled “Absolute Interference” and will show that this was China’s attack on our country.”

+++

19:50

these were all flips so they actually are double

they’re double and then what does that do

if trump goes down biden goes up essentially

does everyone understand that?

this flip here you’re taking

47 away and adding 47 to the other guy

+++

Transcript

00:00
very good reason he’s going to be one of
00:02
the
00:03
experts witnesses of many we have once
00:05
we get this to the supreme court
00:08
so everybody you’re going to now hear
00:09
about his amazing credentials
00:13
so i’ve been um you know in cyber
00:16
security and
00:17
uh advanced threats for the better part
00:20
of 15 years
00:21
uh i.t you know longer than that
00:25
been around computers a long time right
00:26
so you’ve been working within the
00:28
government and the private sector
00:30
yeah okay both uh you know uh
00:33
companies personal and government right
00:37
and and with the with this this what we
00:39
have here on the screen
00:40
this is the certificates that we have
00:42
this is the highest standard in cyber
00:44
security that there is correct
00:47
certification right can you show i want
00:49
everyone to really see these
00:50
qualifications they’re amazing
00:52
okay so if we go here so where which
00:55
part of these do you
00:56
where you specialize in um probably the
00:59
first
01:00
four okay or defense offensive
01:03
operations
01:04
dfir which is digital forensic and
01:07
incident response and cloud security
01:09
okay if we go to the next page here i
01:11
want everybody to see this
01:13
this here this is protect and defend
01:16
when you talk about government right
01:18
this is your wheelhouse right here cyber
01:20
defense analysis everybody
01:22
uh is this correct cyber security
01:24
defense infrastructure
01:26
support incident response vulnerability
01:28
assessment and management
01:31
and essentially that kind of goes both
01:34
ways in this chart
01:35
so analyze the threat analysis
01:38
exploitation analysis
01:40
all source analysis targets and language
01:42
analysis
01:43
right so what i had you look into was in
01:46
uh directly in your wheelhouse correct
01:49
correct
01:50
so i wanted you all to see these amazing
01:52
credentials and now
01:54
what i had him look at was starting with
01:58
the raw data
01:59
all the way to the end basically do what
02:01
he does for the government and for the
02:03
private sector being one of the best
02:05
there is
02:06
so can you take us from the raw data and
02:08
by the way you’re going to see something
02:10
you didn’t see an absolute proof right
02:12
now
02:14
this is the computer why don’t you
02:16
explain what this is here
02:18
i mean really it’s just um the encrypted
02:21
data so
02:22
you have to take it from this form
02:26
in in hex and convert it
02:29
into you know human readable right now
02:32
now this is just one piece there’s a
02:34
there’s a lot right
02:36
yeah this is there’s there’s millions of
02:39
rows
02:40
millions of rows for the just for the
02:42
election just for the election
02:44
just for the election everyone hear that
02:46
so this is what
02:47
you start with now could this be i want
02:49
everyone to be clear on this
02:50
could this be taken from any other could
02:53
anyone duplicate these millions of rows
02:55
or whatever
02:56
with that was the first thing you had to
02:58
validate right because
03:00
yeah so each segment has its own unique
03:03
signature
03:04
and and so that’s what we look for and
03:07
um
03:07
you know starting there you preserve uh
03:11
you know the original copy to maintain
03:14
the you know chain of custody
03:15
of that so that it’s admissible and so i
03:18
work off a copy
03:20
um just like you know any other right
03:23
uh we use the right block so you know
03:26
nothing ever touches there
03:27
you know the source that right so to
03:30
explain that to everyone out there this
03:32
is when you’ve seen this for the first
03:34
time when you this is the first when
03:35
you’ve seen this
03:37
you what did you when right away you you
03:39
knew you were looking at something
03:41
that was real and you’ve seen it before
03:43
this kind of data
03:44
but you knew there was a lot of it yeah
03:47
so that
03:47
you know when i i first looked there’s
03:51
more to this you know um this
03:54
picture or image you know there’s more
03:57
rows there but
03:58
essentially the position of of this uh
04:01
shot was you know millions and millions
04:04
and millions of rows in
04:06
so i knew i was dealing with a lot of
04:09
data like and that that would be like a
04:11
big a big computer
04:13
a big computer a mega computer
04:17
so what he’s saying is he’s this just
04:19
this this
04:20
what we pulled here this little picture
04:23
is
04:23
mil there’s millions of rows just from
04:26
the election correct yeah
04:28
okay i want everybody to know that so
04:30
then what did you do when you started
04:31
you know
04:32
doing your job as a cyber expert
04:34
forensic
04:35
uh by the way i’m gonna ask one more
04:37
thing so what you’re saying is
04:39
these can’t be going in and be changed
04:41
correct they’re like
04:42
imprinted that so you know
04:45
there’s signatures and you know you can
04:48
look at the
04:49
actual uh you know
04:52
the drive of that data look at the
04:55
metadata you can see
04:56
when it was created when it was you know
04:59
changed essentially right so that would
05:02
be
05:02
you know the period just before the
05:05
election and
05:06
you know days after right but but nobody
05:09
could go back
05:10
in and change any of them it’s a cyber
05:12
footprint that’s locked in time is that
05:14
correct it’s
05:17
100 locked in time because you’re
05:19
capturing a packet as it
05:21
is being transferred right so you can’t
05:24
go
05:25
back and change it you can’t recreate it
05:28
there’s a time stamp there’s a signature
05:30
there’s you know a lot of different
05:32
identifying um you know identifiers
05:36
within that that are just you know
05:38
impossible to kind of
05:40
recreate so in your expert opinion 100
05:44
this could not be changed in any way
05:45
shape or form no and
05:47
you know the data that i worked off of
05:50
is a copy so you know that will never
05:54
that source data will never be altered
05:58
in its natural way what he means by that
06:01
preserve
06:01
so when this does get to the supreme
06:03
court it’s locked in hundred percent uh
06:05
what do you call it the chain of custody
06:08
and nothing it’s uh and now if we with
06:10
what you’re about to show us
06:12
what this would be a hundred percent
06:15
evidence in
06:16
in that that that this happened on
06:18
election night this china attacking
06:19
these
06:20
flips yeah um i mean
06:24
it’s it’s pretty it’s pretty impressive
06:27
it’s wild
06:28
i’ve been doing this a long time and uh
06:32
i have not quite encountered something
06:34
this uh
06:35
of this magnitude right not just as it
06:38
relates to
06:39
everybody but just the amount of data
06:42
that you need to
06:43
unencrypt to you know process
06:46
so with that raw data now i’m going to
06:49
show you when we’ve seen an
06:50
absolute proof all those lines going
06:52
back and forth each one of them was an
06:54
individual attack
06:55
and now we’re going to show you again so
06:58
if you didn’t watch absolute proof
07:00
go ahead and show us what we have here
07:01
what do we have on the screen
07:04
so right here when you see green that
07:07
is a successful um intrusion
07:10
meaning they they flip votes right red
07:14
is unsuccessful in terms of
07:18
uh flipping votes but it could be
07:20
reconnaissance
07:21
or you know passive recon just looking
07:25
at the different machines to see what
07:27
the totals are
07:29
so so so the green to say that again
07:32
the green attacks here as we’re watching
07:35
those were actually attacks that flipped
07:38
votes correct
07:39
from now from trump to biden correct
07:41
from trump
07:43
and the red one the red lines are all
07:45
they’re like checking on it
07:47
okay does everyone get that they’re
07:49
checking to see what what the tallies
07:51
are
07:51
and then they’re and then the green ones
07:53
are actually when it goes over this
07:54
computer and says hey i’m going to flip
07:56
some
07:56
because it’s keeping at the asserted
07:58
there’s a certain percentage correct
08:00
so so the red doesn’t necessarily
08:03
mean uh well it’s unsuccessful in terms
08:06
of flipping votes but
08:08
it serves a purpose because it
08:10
identifies which
08:12
votes to flip right so it comes back
08:14
gives an identifier then it’ll send a
08:16
green one over that gets through
08:18
flip the votes and it’s keeping these is
08:21
uh
08:21
in in your expertise is keeping this
08:24
so that the person that’s set to win the
08:26
election by a certain percentage
08:28
that’s all it’s doing is keeping that
08:30
now now before we get any further
08:32
now i i talked to you before we got on
08:35
here it happened in every state correct
08:38
and even alaskan hawaii right as you can
08:41
see
08:42
there that pretty much yeah look at this
08:45
okay
08:46
entire united states but what i had them
08:49
do i said
08:50
i want you to do show us just like 19
08:53
attacks
08:55
just on five states arizona
08:59
michigan pennsylvania wisconsin and
09:02
georgia
09:03
okay and what did we find here so
09:06
oh and by by the way now you what you’re
09:08
going to see these each one of these is
09:10
an attack and you have a
09:12
a graph here that’s going to show us
09:13
what they can what that means right
09:15
so when you’ve seen all those lines
09:17
everybody though that’s each one’s an
09:19
individual attack
09:21
and when you take that that kind of i
09:23
call it that gibberish that came off of
09:25
the machine that there’s millions of
09:27
those lines that we can’t read
09:29
and they converted each one of these is
09:31
a converted attack
09:33
that we’re going to read across this is
09:34
what you’ve seen in the first
09:36
absolute proof that mary read and each
09:39
one
09:40
that went across but now you’ve expanded
09:42
on that this
09:43
he what i’ve had him do here is validate
09:46
every single every single thing from ip
09:49
address to ids and he’s going to explain
09:51
each one as we go across
09:53
what happened yeah so each
09:56
each line will essentially represent
10:00
um one of the lines in the map
10:04
yep right so if you go uh
10:07
horizontally across that’s that’s
10:10
one line in the map we have 19 here
10:13
yeah there’s so there’s 19 of them here
10:16
119 attacks and they all came from
10:18
china oh came from china
10:21
now i want to show over here we go line
10:23
by line
10:24
let’s talk about the date and the time
10:26
stamp okay
10:27
and by the way i asked her i lasted
10:29
before we started
10:31
obviously they’re not going by third
10:33
fourth fifth because they’re on what you
10:34
were saying something to me
10:35
yes um they
10:39
uh so
10:42
when you’re looking at this it’s uh utc
10:45
time which is a
10:46
universal time and its military
10:49
would be zulu time um and so
10:52
essentially you have that utc you back
10:55
it up to
10:56
you know each state right i got you
10:59
it’ll be ahead
11:00
you know six hours from the east coast
11:03
you know
11:03
right going back towards the west right
11:05
on right so the source as we go through
11:08
what is the source
11:09
source is the source ip of the attack
11:12
so the you know that the bad guy
11:16
the bad guy now this ip now this
11:19
is the and then you have the lancer
11:21
launcher latitude and longitude
11:23
so this is the source so this should be
11:26
in china correct
11:28
and you validated every longitude
11:30
latitude and basically the building
11:31
where the attack came from correct
11:33
there’s a couple more that are outside
11:36
of
11:37
uh china but controlled
11:40
by china yeah okay so if you tell us
11:42
here so this would be the source the ip
11:44
address that you validated correct
11:46
the logistic latitude the building where
11:48
it’s at
11:50
and then here’s the province city
11:52
country i think everybody gets that
11:54
china where it came from so the source
11:56
was
11:57
in uh your original film
12:01
right so where it says beijing
12:04
you know by the netcom science intake no
12:07
so what that is is the actual network is
12:11
beijing by doing that comes
12:12
that’s right here yeah right i grabbed
12:15
what that
12:16
that network actual registration is and
12:19
so there’s the full full written
12:22
network which is beijing by the netcom
12:25
science and technology
12:26
so what does this mean it came right out
12:28
of here from that building that ip
12:30
address
12:31
and and i mean so the raw data you know
12:34
is being converted from chinese too oh
12:37
you had to convert it from chinese into
12:39
that
12:40
so the output for you know the original
12:43
source data
12:45
you know is coming in here right right
12:47
and so i
12:48
looked and grabbed you know that actual
12:53
english to you know go side by side with
12:57
what was the output to validate it right
13:00
wow okay then you get over here what’s
13:03
this
13:03
with network name what does that mean in
13:05
network registration
13:06
so when you’re going through
13:10
um you know there there are ghost ips or
13:13
you know essentially phantom ips that
13:15
are out there
13:17
no longer in use or you know being used
13:19
as
13:20
uh adversarially has bought you know
13:24
uh bot networks or you know just
13:26
different things
13:28
i wanted to validate is it current is it
13:31
registered
13:32
is it in use so you went above and
13:34
beyond the call of duty here on this one
13:36
yeah because i mean this this is a lot
13:39
of information but
13:40
you know you want to make sure it’s
13:41
ready and everyone it took a long time
13:43
to get these 19
13:45
correct and so now
13:48
what is this network name how is this
13:50
different from the network and they have
13:51
the network name of the network
13:53
registration
13:54
the network code what does all those
13:55
three of those mean we’re still on the
13:57
attacker correct we’re still on the
13:58
attacker so
14:00
you know it’s it’s different fields in
14:03
um the registration cyber guys know this
14:05
stuff
14:06
yeah it’s i mean if you register
14:10
your network you know that network name
14:12
could be a dba
14:14
okay i got you yeah okay okay
14:17
so now as we move on now this is all the
14:20
attacker
14:21
correct from here this is the attacker
14:24
and what was the commonality in everyone
14:25
was china
14:26
correct it was china every single one
14:29
these are just these 19 attacks of
14:31
about by the way um i think you told me
14:34
before
14:35
we had 202 995 counties were attacked
14:40
yeah that that is essentially the attack
14:44
surface is what we would call it
14:45
and so in all 50 states okay
14:49
so we this is just a sample we have here
14:51
of 19
14:52
of the 2995 counties that were attacked
14:55
but 19 just 19 of the flips correct
14:59
okay so now this is the target here so
15:02
what what does that mean this is the ip
15:04
address of the of the um
15:06
of the target machine you know
15:09
where it is latitude longitude you know
15:11
state
15:12
uh entry point would be the owner and
15:15
what the network registration is here in
15:17
the us
15:18
network code in some cases
15:22
uh almost all of us will get into
15:26
uh they’re they’re registered to
15:29
that county so most of the intrusions
15:31
look like they’re at the county level
15:33
right but uh
15:36
now now i want to ask you this so the
15:40
only way any of this could happen is if
15:42
the machines were online correct
15:44
yeah you wouldn’t you wouldn’t see this
15:46
otherwise right
15:47
right so what we have here then the
15:50
target
15:51
is the attacking with ip of the actual
15:53
computer
15:54
yes or the machine just right there
15:57
you wouldn’t have an ip if
16:00
it wasn’t if it wasn’t online yeah if it
16:02
wasn’t connected to the internet right
16:04
right then you have the longitude
16:06
latitude that would be the actual
16:07
building
16:08
it happened at the state michigan
16:11
entry point owner delta county so that’s
16:14
just to cut the county level
16:16
the network registration so you have the
16:18
actual now would these guys be guilty of
16:20
anything
16:21
that’s just the registration but you
16:23
know when you look at that registration
16:26
and the domain it goes back to delta
16:29
county so
16:30
you know they might say oh that’s
16:33
network
16:34
it’s actually the demand is registered
16:37
as delta county
16:39
okay i got you and then the network code
16:41
what would that mean
16:42
that’s essentially just the uh
16:46
codified intrusion now this is if they
16:49
either
16:49
tell us what intrusion means here so um
16:52
it could have used uh credentials
16:57
um implanted in the firewall
17:00
if there was one present or essentially
17:02
both right um
17:04
the star is just carrying uh
17:07
carrying over from the one above it oh i
17:09
guess okay okay
17:11
now this just means they got in and
17:13
flipped votes correct yes
17:14
yes okay now here what we want to show
17:17
this is really
17:18
important i want to show everyone so
17:20
trump down 3215.
17:22
you go all the way down here this one
17:24
here it goes all the way through these
17:26
trump down 24 to 24
17:29

  1. now and those there those are
    17:33
    time stamped you can’t change them
    17:36
    cyber flips that you have validated 100
    17:39
    percent
    17:40
    yeah is captured in the in the data
    17:43
    and you you know you’re
    17:47
    you’re you’re collecting information and
    17:50
    preserving it
    17:50
    in its state at the time so what we have
    17:53
    here
    17:54
    what you can see here trump down 3215
    17:58
    all the way down all these lists here
    17:59
    this is votes that were flipped
    18:01
    from trump to biden correct and then all
    18:05
    the
    18:05
    like here 24 311 votes flipped and that
    18:09
    was in uh michigan
    18:10
    okay remember michigan had that big
    18:13
    spike and all these
    18:14
    things too well so all of these
    18:17
    you have validated they’re like time
    18:19
    stamped in the computer is that correct
    18:21
    yeah so in that file you know you can
    18:24
    look
    18:24
    at that data and see if there’s been any
    18:27
    you know
    18:28
    anybody’s messed with it any sort of uh
    18:32
    anything done to it and you know it’s
    18:35
    essentially as
    18:36
    as it was so you’re a hundred percent
    18:38
    that these are everything on here is a
    18:40
    hundred percent accurate correct
    18:42
    as the data was collected right you know
    18:45
    we were seeing
    18:47
    votes go down you know during the
    18:50
    election which
    18:51
    was weird right you know just for
    18:54
    for me i pick up on stuff like that
    18:56
    right right right
    18:58
    wait if you’re adding you know it’s
    19:00
    right right building blockers
    19:02
    so you know looking at this
    19:06
    it it makes sense to you now it really
    19:08
    makes sense
    19:09
    it’s not just trump going down it’s
    19:11
    fighting going up right his numbers are
    19:12
    actually
    19:13
    they’re actually double let’s go to that
    19:15
    let’s look what happened so now
    19:17
    with just these 19 attacks everybody
    19:19
    just
    19:20
    19 in those five states let’s see what
    19:23
    happened
    19:24
    so 518
    19:28
    617 votes were switched from trump to
    19:31
    biden
    19:32
    in just those 19 intrusions okay
    19:37
    and now you have here what what do you
    19:38
    what explain what’s going on here
    19:40
    so this matches up to the um
    19:43
    the number above the 518 617
    19:47
    and it’s just broken out by street okay
    19:49
    by state
    19:50
    so now these were all these were all
    19:53
    flips so they actually are double them
    19:54
    they’re double and then what does that
    19:56
    do so if trump goes down
    19:59
    biden goes up essentially so does
    20:02
    everyone understand that
    20:03
    this flip here that that you’re taking
    20:05
    47 away and adding 47 to the other guy
    20:08
    so let’s go the next video here so
    20:10
    everyone i can do this part this is the
    20:12
    exciting
    20:13
    okay so out of those 19 flips that came
    20:16
    from china
    20:17
    over to these five states just 19 of
    20:20
    literally
    20:22
    okay here’s what it did here’s
    20:24
    pennsylvania georgia arizona michigan
    20:26
    and wisconsin
    20:27
    here’s what they told us that buying one
    20:30
    by
    20:31
    each state now remember with those 19
    20:35
    attacks you just seen the absolute
    20:37
    interference of our election by china
    20:40
    here is the switches and here’s what
    20:44
    donald trump
    20:45
    actually won each one of those states by
    20:47
    just with 19 of the flips
    20:49
    and actually these numbers are going to
    20:51
    be a lot more i just want to show you
    20:53
    one little attack
    20:54
    so now we have absolute proof
    20:58
    of absolute interference by china to
    21:01
    switch our election
    21:02
    and we have proven it with one of the
    21:04
    government’s own cyber experts
    21:07
    one of the best in his field certified
    21:10
    validated every single thing that we’ve
    21:12
    had in absolute proof
    21:14
    and we showed democrats earlier in this
    21:17
    film
    21:18
    that said you know what these machines
    21:20
    cannot be used because a foreign country
    21:22
    can attack us and flip our election
    21:24
    they said this but now you’ve got to see
    21:26
    this just the other day
    21:28
    like a week or so ago adam schiff and
    21:31
    kris krebs
    21:32
    said this willie geist good to see you
    21:35
    this morning can you be more specific on
    21:36
    china i think people
    21:38
    understand that china broadly is a
    21:40
    threat and i know this is what you’ll be
    21:41
    picking through
    21:42
    at the hearing today but if you’re an
    21:44
    american sitting watching this show
    21:46
    right now what is the most immediate
    21:48
    threat that china poses
    21:51
    well probably what would strike people
    21:53
    most in their living
    21:54
    room right now is that china has one of
    21:56
    the most capable
    21:58
    cyber hacking and cyber espionage
    22:01
    capabilities
    22:02
    so china may be in the process of
    22:05
    stealing your private data that may have
    22:06
    already stolen your private data if
    22:08
    you’re a business
    22:09
    owner or business leader they may have
    22:11
    stole your corporate trade secrets
    22:13
    uh they may be hacking into government
    22:15
    agencies to steal defense plans
    22:18
    uh so this is you know how china’s
    22:21
    actions influence people’s lives every
    22:23
    day it’s affecting
    22:24
    our economic competitiveness they don’t
    22:27
    need to do the same kind of research and
    22:28
    development we do if they can simply
    22:30
    steal it
    22:30
    from our innovators chris you look down
    22:33
    the barrel of these threats in your job
    22:35
    inside the government
    22:36
    how did you assess them at the time and
    22:38
    how different do you suspect they
    22:40
    are right now in terms of china so
    22:43
    i think the best characterization of the
    22:45
    chinese threat
    22:46
    it was was put posed by rob joyce who’s
    22:50
    now the
    22:51
    national security agency cyber security
    22:53
    directorate
    22:54
    leader and this was at a conference a
    22:56
    couple years ago out in san francisco
    22:58
    and he said russia is like a hurricane
    23:02
    china is like climate change so russia
    23:05
    is much more disruptive in the current
    23:07
    moment but
    23:08
    china is much more subtle much more
    23:12
    patient it’s almost a rope-a-dope they
    23:14
    kind of lull you to sleep you don’t see
    23:16
    it they use their soft power
    23:17
    very effectively and even at the local
    23:19
    level they influence politics not just
    23:22
    here in the halls of washington which
    23:23
    they do
    23:24
    but also in our local communities so
    23:26
    they’re they’re much more deliberate
    23:28
    they have a longer term strategy
    23:30
    as opposed to the russians who are
    23:31
    trying to make an impact
    23:33
    today so chris what does that mean when
    23:35
    you say that china influences
    23:37
    on the local level so if i’m sitting in
    23:39
    my town somewhere in america
    23:41
    china is putting its thumb on the scale
    23:43
    somehow what do you mean by that
    23:46
    absolutely so they they influence local
    23:49
    races if you think about some of the
    23:51
    confucius institutes that have been
    23:52
    established
    23:53
    across our country at colleges and
    23:55
    universities it’s an attempt to
    23:57
    influence
    23:58
    and say hey you know what hong kong is
    24:01
    part of china long term it’s it’s not
    24:03
    and
    24:03
    it you know same goes for taiwan um
    24:06
    the uyghur issue not a big deal this is
    24:09
    us uh
    24:10
    you know demonstrating our own
    24:11
    sovereignty so they they just try to
    24:14
    shape the narrative locally um
    24:17
    to their benefit so we can all agree
    24:19
    whether you’re a democrat or republican
    24:22
    doesn’t matter that china attacked our
    24:25
    country with their cyber technology
    24:27
    and we are in the middle of the biggest
    24:29
    national security threat
    24:30
    ever so now we’ve all seen more
    24:34
    evidence in apps

+++

Watch the whole thing:

Mike Lindell Presents: Absolute Interference The Sequel To Absolute Proof 2020 Election Fraud

+++

https://t.me/PatrickMByrne/771

NEW HAMPSHIRE: Windham Officials Reverse Course: Will Choose “Windham Incident” FORENSIC AUDITOR in PUBLIC!

+++

https://t.me/s/PatrickMByrne

+++

11 Responses to “Lindell: They verified the IP addresses, identified computers, longitude and latitude, buildings, and who did it”

  1. rosettasister Says:

    Lindell: They verified the IP addresses, identified computers, longitude and latitude, buildings, and who did it

    Lindell: They verified the IP addresses, identified computers, longitude and latitude, buildings, and who did it

    #unido #Lindell #coordinates

  2. rosettasister Says:

    #unido #Lindell #Arizona “84,287” #MaricopaCounty #maricopaaudit

  3. rosettasister Says:

    rosettasister.files.wordpress.com/2021/04/screen-shot-2021-04-20-at-9.58.50-am.png

    #unido #Lindell #Arizona “84,287” #MaricopaCounty #maricopaaudit

  4. rosettasister Says:

    Putin – The practice of staging coups d’état and planning political assassinations, incl those of high-ranking officials…this goes too far.

  5. rosettasister Says:

    “Lindell: They verified the IP addresses, identified computers, longitude and latitude, buildings, and who did it”

    Google v Bing algorithms ?

    IMHO Bing is more honest

    #unido #Lindell #algorithm #MaricopaCounty

    Odds are against truth-seekers actually stumbling upon the truth. Google might pretend you really don’t exist.

  6. rosettasister Says:

    https://www.anonymousconservative.com/blog/news-briefs-04-22-2021/

  7. rosettasister Says:

    https://www.anonymousconservative.com/blog/news-briefs-04-22-2021/

    Then, starting at 1:36:00, Lindell introduces a second piece of new material, a highly secret expert witness whose identity he conceals with pixelated masking and voice masking on the video, because apparently he will be exceptionally important in upcoming court cases.

    He begins by showing how impossible it would be for the evidence of hacking to be faked due to unique signatures in the data.

    Lindell then again shows the visual representation of the hacks coming in from overseas that changed votes, attacking polling places all over the country, including Hawaii and Alaska.

    He then asked the expert to show just 19 hacks in five different states in detail.

    All of the examined attacks came from China.

    He then shows how they have tracked each attack down to the latitude and longitude of the IP of the machines which performed them, how they routed their attacks into the target computers and through what specific networks, and what they did once they penetrated the computers.

    He then shows that these records produced a time-stamped record of 518,617 votes taken from Trump and given to Biden, in just those 19 specific intrusions in those 5 states.

    Those attacks took 518,617 votes from Trump, and give 518,617 votes to Biden, so it was as if Biden was given twice as many votes.

    Just those 19 flips would have given Trump clear, decisive victory in Pennsylvania, Georgia, Arizona, Michigan, and Wisconsin, and there were many more flips even than that, each apparently documented in such minute detail.

    Again, appears the evidence is decisive, but that does not necessarily mean anything, in a court system compromised by a hostile foreign intelligence operation.

    We will have to see where it goes.

    #unido #Lindell #MaricopaCounty

  8. rosettasister Says:

    http://discerningdem.blogspot.com/2021/04/lindell-he-then-shows-how-they-have.html

    He then shows how they have tracked each attack down to the latitude and longitude of the IP of the machines which performed them, how they routed their attacks into the target computers and through what specific networks

    #unido #Lindell #MaricopaCounty

  9. rosettasister Says:

  10. rosettasister Says:

  11. rosettasister Says:

    “The use of C-V2X (vehicle-to-everything communication) in the Evos enables its driver to navigate road hazards, as well as to improve safety and efficiency”

    Ford #Evos debuts at Auto Shanghai 2021 – Level 2 semi-autonomous driving, 1.1 m-wide display screen

    Ford Evos debuts at Auto Shanghai 2021 – Level 2 semi-autonomous driving, 1.1 m-wide display screen

    #unido “Vehicle to everything” #ford “C-V2X” #CV2X

Comments are closed.