Skip to comments.Are any Cyber Security Freepers or Reporters going to Mike Lindell's Cyber Symposium?
Posted on 08/08/2021 8:01:10 PM PDT by FR_addict
We've been studying how PCAPS are captured, but haven't come up with a plausible way that someone captured election intrusions in all the States in real-time.
I imagine the CIA can do it and probably did, but how could someone else do it and give the data to Mike?
Also does Mike have just the metadata from the PCAPs or does he also have the data, which surely was encrypted with TLS. The meta data would have everything need to prove an intrusion, but wouldn't have the election vote data. Do you think he is comparing the PCAP meta data to the election night tallies when the votes were switched from Trump to Biden and/or third party candidate. Or does he have the meta data and the actual encrypted data?
Has anyone come up with any ideas how the PCAPs could be captured from all the election machines?
good questions. i’m going to be watching. that’s for sure.
I asked this question yesterday. There were some helpful Freepers with computer expertise who were very helpful. You can read their responses to my post:
Private party possession of packet captures from official government networks is highly unlikely.
And often felonious.
If TLS was used in the packet transmission, then either the sender was capturing all traffic prior to sending it, and hence prior to encryption, and provided him the unencrypted packets, or a receiver captured all received packets after decrypting them and provided the received packets to him.
Or, the operation was being done as a man in the middle attack and somebody involved in the attack is the source of the unencrypted PCAPs.
Or, an older, insecure version of TLS/SSL was used and the encryption was broken using known vulnerabilities in the older protocols.
Just re-replying from another post.
Chinese MSS has been very active in global elections, and for some time.
But there is another, more than capable, (and some would suggest even more capable, and long term structurally “tied in” country. And its almost hard to blame them for the effort.
“It appears Soros lead Dominion is off the table in Wyoming. The Soros company Diebold (which also used Smartmatic software) was forced off the “formal table” several years ago.
However, it too was tied at the hip (contractually/by choice) to what was ultimately Spain’s heavily GRU and BND infiltrated cyber crypto front company SCYTL. SCYTL was purchased by Komarov’s (Komarov identified in the early 90’s as GRU) owned Paragon Group from Southwest Germany, about two months before our US NOV 2020 election.
Paragon Group was believed by a number of analyst, as largely running SCYTL up to two years prior. SCYTL (also Soros funded and related) had, and has large group server farms between Frankfurt and Weisbaden, Germamy, near a dozen US and NATO intel installations/facilities.
Konstantin Komarov, Founder & CEO Paragon, purchases SCYTL —
Interesting — https://en.m.wikipedia.org/wiki/Scytl
The other two US voting platforms reported as widely used and incorporating Smartmatic exp software, (originally called SMOTE-B, which originated with Alexander Lazarovic’s GRU Serb team, and later used in SCORECARD), were Heart Intercivic (Romney related), and ES&S.
It’s also interesting, Dmitri Alperovich (of DNC Crowdstrike), had historical ties to both Paragon’s Komarov and the SMOTE-B Lazarovich team.
At least a few analyst have concluded possible to probable links to the murders of Seth Rich (probable), and Haney (possible, and likely to inform key poc’s within the Trump/SOCOM structure), as well as known linkage to the Clinton/Obama efforts with the Kremlins global scale “Skolkovo” project, on the Northeast side of Moscow.
Many possible pitfalls for elections going forward.”
Maybe that’s why Mike won’t tell us where he got the info.
To protect his source(s).
Thanks for the link. Read through the posts.
I was just assuming TLS encryption was used, but then again these voting machine companies claim that their machines are not even connected to the Internet. So who knows. Maybe they didn’t even use data encryption. Then Mike would have the metadata and the election voting data.
Just have to figure out how someone was able to capture all the intrusions into the election machines in all the States.
Putting up 5 mil tells me there is something there.
Someone like McAfee (if he were alive or had a below-the-radar cyber team) might know how to do the packet captures in all 50 states in real time.
Or did the person or persons giving Mike the packet data work for the CIA, NSA or other government agency.
It’s very hard to capture packets from election machines that aren’t even hooked up to the internet.
Will it start at Midnight on the 10th?
Many people testified that the machines were connected to the Internet.
I believe this election voting data situation surely involves heavy-hitters with deep pockets, as in nation state(s). None of this was done by some guy in the proverbial basement surrounded by pizza boxes and Mountain Dew.
We are 10 years out from the discovery of Stuxnet, and considering the stakes on all sides involved with whether or not President Trump remained President, I believe something, or even more than one thing, just as sophisticated as Stuxnet was involved here.
With you all the way.
I thought it was Tuesday morning, but haven’t found the time yet.
Thanks so much.
I often wondered why President Trump never offered 5 million for proof.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.