Color me increasingly suspicious of the sudden ‘uptick’ in cyber hacking reports. The timeline tells a bigger story and my hunch is this is the creation of cover for a future U.S. government position that audit outcomes should be ignored because cyber security breaches are common.
In March of this year the media reported about the U.S. Department of Homeland Security getting ready to hire public companies, individual contractors outside government, to scour public data and social media in order to provide information for the new “domestic terror watch lists.” From the description it appeared DHS was going to pay “big tech” (Google, Facebook, YouTube, Instagram, SnapChat, Twitter, etc.), via contracts, to hire and organize internal monitoring teams to assist the government by sending information on citizens they deem “dangerous”, ie “domestic extremists” {LINK}.
To facilitate that national security objective the Feds were going to need to work with outside government entities, FBI contractors, to permit access to monitoring systems. However, additionally interesting…. immediately after that DHS announcement suddenly there’s an uptick in cyber intrusions, pipelines hacked etc. Then the FBI says they recovered the ransom payment by knowing the private credentials to the hackers. That’s very fishy.
Now today:
(Daily Mail) Hackers have stolen 26 million user logins for tech giants including Amazon, Apple, Facebook as well as vital payment information in the latest online security breach.
The malware hack, exposed by cybersecurity provider NordLocker, also saw payment details nabbed from 3.25 million computers that run Windows software. It was uncovered after researchers discovered a 1.2 terabyte database filled with stolen personal information.
The other firms whose accounts were targeted include eBay, Instagram, Netflix, Paypal, Roblox, Steam, Twitch and Twitter. It saw victims computers’ infected by opening emails, or downloading bootleg software, and enabled the malware to take screenshots of their browsing activity – including private login details. (read more)
In the background of these data breaches CTH is noting that U.S. officials are now admitting U.S. election systems are connected to the internet: “according to a team of 10 independent cybersecurity experts who specialize in voting systems and elections. While the voting machines themselves are not designed to be online, the larger voting systems in many states end up there, putting the voting process at risk. That team of election security experts say that last summer, they discovered some systems are, in fact, online.” [link]
Obviously I’m professionally cynical of all DC interests and motives; nothing they do is altruistic and everything is based on their model of self-preservation of power. As a consequence I cannot help but think this sudden uptick in hacking and data-network breaches; that just happens to begin right after DHS announces their partnership with outside agencies for on-line monitoring; may be connected to a larger objective around the election audits.
If the outcome of any election audit can be dismissed because the background noise is deafening with the sound of the hacking and cyber-intrusion narrative; and if any audit outcome can be marginalized or ridiculed because of the potential for data manipulation; then we are essentially seeing a re-run of the “bathtub principle”.
Bathtub Principle = you don’t want to get in trouble with your landlord for the broken fishtank ruining the carpet, so you let the bathtub overflow creating a bigger mess to cover for the problem.
If the deep state wants to cover for 2020 election fraud perhaps they would flood the zone with cyber-intrusions to undermine any electronic evidence? It would not be the first time we have seen this type of cover operation.
Suspicious cat remains, well, suspicious…
Russians again?
Probably the Amish this time.
So by extension then, we are under attack by a Swiss-German tribe.
Your analysis is probably correct. Everything is suspect when it comes to government and their cohorts.
I believe absolutely NOTHING that comes from the government or the Enemedia.
If the federal government and the Enemedia said that tomorrow morning the Sun would rise from the East–I’d be facing West.
Same here- believe absolutely NOTHING from the govt or MSM. Literally NOTHING.
“cover for a future U.S. government position that audit outcomes should be ignored because cyber security breaches are common.”
They’ll have to explain why an election system which was not, by law, allowed to be on the internet was. Stupid people will overlook this fact but people here will not.
Sundance is correct to point to the changes we are seeing and considering the useful potential it may hold.
Why are there so many high profile hacks suddenly? Well… actually, that has been going on a LOT for the past few years. The ACCURATE questions is “Why are so many hacks being elevated into the news stream so often?”
The role the media plays is critically important.
I think they are willing to deal with the fallout about lying about the machines being connected to the internet. The consequences for breaking that law are much less severe and can be routed to a small handful of people. Whereas fraud is a death sentence, and the net can get very large, very fast.
Fraud on a scale that flipped not just one, but SEVERAL states (not yet definitively proven–yet) that in turn, flipped a presidential election is a game-changer. It pretty much upends everything in this country. All the media narratives, all the Big Tech censorship–everything. It truly becomes a crisis.
Thus, the feds / Ruling Class / Left knows that a domino effect is quite possible if AZ proves that ballot “irregularities” caused the state to improperly certify the presidential winner. If that happens, then GA, MI, WI and PA will have tremendous pressure placed on them. There may be no stopping or slowing it down at that point.
I think Mike Lindell, is likely setting on a piece of information: What if, it was not only countries such as China flipping votes during the election but internal agencies.
Most of the media are just propaganda machines authorized by Obama and paid for by the government.
While I do not dismiss the possibility that Lindell is in possession of such evidence / information, I also know that if he is, it places his life in great jeopardy.
But the other problem is that if–as you theorize–Lindell does possess such information, how does he inject it into the information artery of public consciousness without it being distorted, defamed, twisted or outright discounted?
To date, there’s not a court in this country who will touch such evidence. And if a court won’t accept it, how does Lindell elevate his evidence to a level (or medium) that forces the Ruling Class / Left / et al into a defensive position that they cannot defend, spin, or ignore?
SPECULATION
Think about it. Dr Frank gave us all the clue. They had to have a computer online before, during and after the election to do all the computations necessary.
Then he said they’re changing votes in every state.
How many supercomputers running at the same time would this take to control all of those voting machines before, during and after plus do the computations for each.
Evidence, I am assuming you mean the same kind his organization has already produced for external countries. This does not seem to be a problem.
But, I agree with you on getting anyone to look at the evidence, if it does exist. I would probably wait until after President Trump is back in office.
Maximus-Cassius: I may be wrong, but I think it doesn’t matter how much evidence Mike or anybody else has, it really doesn’t matter until it is elevated to a level of proof. The only place I know of where the evidence can be looked at and judged as true is in the courts.
As you say, so far no court will touch it. I don’t know what would have to happen for this to change.
Many people are angry at the “no standing” statement of the Supreme Court.
Many people understand that current behavior by politicians / media to stop the audit(s) probably indicate fraud.
Many people will begin to believe that for justice to occur, they themselves will need to become “law and order.”
There will not be a need for ANY COURT’s opinion.
I think you’re right.
Think about how many unelected federal bureaucrats hated the Trump administration because he was a threat to their power. We were watching an movie that’s been around for a while, “Burn After Reading” and it takes place in DC. What a cesspool. These schmucks just go from one government agency to another. It’s like a big washing machine and the only thing that ever gets spit out for the American people is their vile dirty filthy evil corruption.
I’m so sick of it.
Violation of that law decertifies an election which President Trump did NOT concede. That leaves the door open for a legal battle challenging the results. And he will.
Why are the hacks not being prosecuted? If they can track down ransomware accounts and retrieve bitcoins, they can track down the people.
If they want to.
Because they might have to admit that it’s their contractors doing the hacking?
Can you prosecute yourself?
LOL..Amen.
“They’ll have to explain why an election system which was not, by law, allowed to be on the internet was. Stupid people will overlook this fact but people here will not.”
There you go, dumping a metric ton of sand in their gears.
Two words from article
…Kris Krebs
” no internet connection ” ???
P o s
Mockingbird Media.
We all knew this day would come.
…..”it was only a matter of when”
VSGPDJT
” a future U.S. government position that audit outcomes should be ignored because cyber security breaches are common.”
So should outcomes of police murder investigations also be ignored because murders are common?
Seems we are well on the way to do so, yes.
Defund the police
Empty the prisons
~These people are sick; evil.
offcoursenation: We are rapidly approaching this point. When looting, burning property and assaulting the police has been ignored for over a year now, what’s next?
I haven’t seen any rush to stop the daily slaughter caused by gangs in cities like Chicago. It’s become so common, it’s just ignored.
Maybe. But aren’t audits a look backwards? I don’t see how they could tie in current hacking to it. Besides that, I thought the audits were internet free (unlike the elections)
Also, if they try to dismiss current audits due to hacking potential….
Doesn’t that just strengthen the evidence that the actual election may have easily been hacked?
That being said….there is no doubt they will try to redirect or muddy up audit results.
It’s an attempt to muddy the waters.
If it becomes inevitable that there will be proof of election fraud, then it is in the interest of the fraudsters to create a perception that anyone could have hacked voting machines.
There appeared to be numerous reports and documentaries from main stream news corners about how elections could be hacked etc., which coincidentally boosted the claims that had come out concerning the 2016 election.
From November 4 until about sometime this spring, references to such things seemed to dry up tight in those same main stream corners, with “baseless“ seemingly becoming the byword of the day.
With enough distance and just the tiniest bit of a possibility that a new narrative could have been coordinated and be underway (Zucker’s chats revealed by Veritas come to mind), it certainly is interesting how hack stories of massive proportions are once again right out there. Hey, maybe there could be a congressional investigation; won’t that settle everything in no time flat?
Very true. However hacking won’t explain shady ass ballots in States that were decided on thin margins.
This.
Muddy the waters and give Lawfare talking points to tie up the courts for as long as needed.
dd_sc: In order to tie up the courts, the courts would first have to take the cases.
Regardless.! Hacked is hacked . which cannot be a ‘ho hum’! imo, technically, it should go to the supreme court for guidance as to how to proceed from here.
Jillian McNicholl: It should, but Scotus decides what cases it will take, so…don’t hold your breath.
Which means that they openly admit they are liars and that they ignored the Law’s protocols. Do they think people will not pick up on this?
The Russian collusion hoax will never die.
If we challenge Slo-Joe’s 81 million votes, they will revive the claim that Putin hacked Wisconsin for Trump. That whopper has been a huge fund-raiser for the Democrats in Hollywood: Babs and Meathead believe it.
Also, I think government seizing control of the internet is inevitable. They’re desperate for the licensing and taxation revenue. Mark Steyn joked about keeping your old fax machine, but they may become precious.
old fax machine and buy a shortwave radio.
And a vehicle without a computer, preferably diesel
I agree regarding the Internet. The government here can do what other countries do. An Internet blackout will be their next step and they’ll blame it on “hackers”. So, if that happens, continue to live your best life, continue to throw sand in the gears, and don’t panic.
Other things the federal government will do with the cooperation of the Pentagon: give us a good “Alien” scare, or a “Russian invasion” scare. IGNORE THEM and BE PREPARED to hole up for whatever they may throw at us. #Beans #Bullets #Bandaids
The Sundance line that I loved:
‘I’m professionally cynical…’
He is…..and for good reason.
He has an optimistic streak that comes out in the darkest of times though.
So …
Prepare for the worst, but know all is never lost. Live your best life….but fight your best fight too .
Well, in judo terms, take their forward momentum on the illegitimacy of anything online/software based and throw them onto the paper ballot mat.
How ’bout them purple fingers?
Good one. Sports analogies can be very useful in other types of contests methinks…Also, Sun Tzus Art of War is a good resource for combatting Rules for Radicals.
What a country we live in.
I’d vote for purple fingers any day & twice on Sunday.
Any third world country is able to run their elections better than we can.
Heck 47 of 48 European countries don’t allow the mail in shenanigans that were “allowed” last November.
I’ve been hatching a plan to get a new de-Googled phone and phone number, buy old used computers so I have different IP addresses, use a VPN, and take all manner of precautions such as putting my phone in a Faraday bag or just always leaving it in one location.
As for my old identity, I could start visiting sites that have nothing to do with my true interests, maybe using some kind of app that constantly spits out random nonsensical internet searches to replace my former internet presence with useless junk.
Would it work?
I think an appeal to heaven is the only thing that is going to work
TMonroe: I’m all in for prayer, but someone also has to take some action. I think prayer motivates action.
Pray, listen, do.
This guy has a lot of good info on that. I’ve been looking into it too. Have not heard of Faraday bags, thanks for the info!
https://gab.com/stirling/posts/104185530019113364
I have prepared for an emp.
I discovered that putting foil around the phone which went into the faraday bag, then into a metal briefcase is what was necessary to stop the incoming call.
As all my stuff is now electronic, I felt it important to protect records.
Good luck with that…………….
I know. They have a lot of tools that we don’t have.
Or you can just screw with google by getting about 200 old phones, turn them all on, travel around with the premise that you will show up on google maps as a traffic jam wherever you are?
I like it, I like it!
How to screw up Googke’s AI tracking of you:
Behave outside of the norm to cancel out what they know about you.
Such as when your not at computer ir tablet, be logged into YouTube and play MSNBC or CNN, etc.
This guy also sells VPN routers and de-Googled phones so Google cannot track you
I watched that and took notes. He is a great source.
Deplorable_Infidel: I appear to have unknowingly and innocently done this on some level. When you get appeals for money on the same day from The Southern Poverty Law Center and Bob Dole, the info on me appears to be somewhat confused.
It is also possible, and not necessarily unrelated to the audits, that the “hacks” are an attempt to condition people to accept an I-Patriot Act, Internet Real ID verification, and other measures designed to clamp down on free speech and free association on the internet.
We are watching the classic pattern in action: break item (internet security), offer big-government solution, advance agenda…
keeler: I share your particular interpretation. This is a planned cyber-0p (actually, a comprehensive campaign) to achieve political and economic objectives.
We are now going back to when Osama told agencies to stand down while all enemies were allowed to steal as much as possible.
Big tech is not being hacked by the CCP and every enemy of this country because big tech has been working hand in hand allowing this to happen.
Amazing how much intrusion has happened into our country in the last 5 months. Where the Hell is DHS and all of our so called infrastructure protectors ?
Sanjac: Where are the agencies tasked with protecting our infrastructure? As best as I can tell, doing nothing and/or cooperating fully with the enemies.
Let them paint the picture cyber attacks are easy. The fools fail to remember the machines were connected to the internet. If they were connected, they could be hacked. It doesn’t help their case, but it is a narrative: see so many hacks by the Russians and Chinese terror groups. See, it wasn’t fraud on our behalf; rather, it was foreign actors (to use cyber terminology).
Today, Garland’s BS statements are meant to intimidate, but that too can be flipped back at them.
I think the government’s angle (both fed and state) will be that nothing could hack true, government computer systems, and that a private cyber security outfit may not be as safe.
It’s not hacking when you do it to yourself.
I wouldn’t put it past the FBI to be the one’s doing the hacking. Nor would it surprise me.
Dwayne Diesel: Agreed, it’s intimidation to investigate the investigators for doing the job the fbi refused to do.
thank you (again), Sundance
One good thing that came from all of this is most people I know have zero trust in the government or the alphabets that prop them up anymore. They don’t even trust the military – I mean, at all.
TradeBait: A very good thing, the masses trusting the government got us in this mess. From The Patriot Act up and until Fauci’s fraud, it has all been actions to subdue our freedoms.
People have been awakened and best of all mad as h*LL. I think the leftist have overplayed their hand and are going to have a much harder time pulling off the next attack on our freedoms.
Voting system executives testify under oath that their systems are not on-line.
Government admits that voting systems are in fact, on-line.
(Silence)…………………….
Where is the prosecution for perjury? Two government entities have, when combined, official proof of perjury.
Why aren’t they being prosecuted? Until prosecutions occur, I know that the government is picking sides and letting lawbreaking go because they have an agenda they support. And they don’t care if people are breaking the law to accomplish that agenda.
I heard that they can manipulate the ballots right now. Attorney Matt DePerno explains it.
Dominion machines can be used to reopen the election, tabulate more ballots, and backdate them to election day.
https://home.frankspeech.com/tv/video/breaking-news-dominion-voting-machines-can-be-used-reopen-election-tabulate-more-ballots
Kris krebs
“Bathtub Principle = you don’t want to get in trouble with your landlord for the broken fishtank ruining the carpet, so you let the bathtub overflow creating a bigger mess to cover for the problem.”
Great democrat crimes have little democrat crimes to hide ’em
And little democrat crimes have lesser democrat crimes and so ad infinitum.
And the great democrat crimes themselves, in turn, have greater democrat crimes to bring on
While these again have greater still, and greater still, and so on.
― “Augustus DeMorgan”
The “Outside Contractors” —> “Big Tech Insiders” querying and releasing Obama’s Database.
I know me and we here are in that database.
AKA Vault 7
A few years back China actually “hacked” the database containing the personal information of everyone holding a classified security clearance. A security clearance requires filling out a form that is extremely comprehensive on your background history, family relations, financial state, etc etc. I put quotes on hacking because it turns out the government bureaucracy in charge of these files (OPM) had outsourced IT work to China (beyond stupid but so what). It doesn’t get any worse than this.
We also have all the tech monopolies constantly spying on everyone (Apple, Microsoft, Google) even to the extent of lying about their privacy policies. Leftist tech monopolies of course would never share information with leftist government agencies. And they would never lie if asked.
At this point, hacking is mainly useful for stealing money from online accounts or ransoming access to stored data or automated control systems (eg, pipelines). I think the horses have left the barn if they are trying to close the barn doors and set up an aposteriori excuse for ballot counting machines being hacked by Russians (naturally) to sow discord by sullying a perfectly legitimate election.
Then again. Given how much we have learned on the utter corruption of government and the political parties, you can not rule out anything. Suspect the worst and don’t extend trust to those who have forfeited any right to it.
I am also very suspicious. I have wondered if the pipeline hack payment was a money laundering scheme to pay off foreign actors. It wouldn’t surprise me if this latest was a way to circumvent privacy laws.
If all these big tech companies are helping the government……..Then I consider them part of the government.
Not private companies at all.
Corporatism, aka fascism, writ large.
Corporatism (“corporativismo” in Italian) is one of the main pillars of fascism.
“Fascism should more properly be called corporatism because it is the merger of state and corporate power.”
– Benito Mussolini
Mussolini ❤❤❤ fascist corporate oligarchs
Mussolini ❤❤❤ Facebook.
Mussolini ❤❤❤ Twitter.
Mussolini ❤❤❤ Apple.
Mussolini ❤❤❤ Google.
Mussolini ❤❤❤ UTube.
Mussolini ❤❤❤ Micrsoft.
Mussolini ❤❤❤ Coke.
Mussolini ❤❤❤ MLB.
When I read about DHS, I think back to some meetings (counseling sessions actually) I had about “give back”, which are illustrative of DHS culture .
DHS has a program for managers called “give back”. The program is not a secret, in fact its mentioned on the net in official publications.
The idea of “give back” is that managers should “give back” to the Agency for the bounty they received, by coaching lower graded employees.
I was a low-level Customs manager, but since I never received anything, I believed I was exempt from being forced to participate. Sure, I asked for stuff: better duty station, overseas assignment, TDY to a pleasant locale, adjustment to my schedule to make things easier on my family, etc. But I never got anything. All denied.
During the last meeting on this subject, my boss’s boss asked me why I was displaying such a poor attitude, when I was simply being called upon to give newer officers the benefit of three decades of experience.
Look, I replied, I would not inflict what I know on newer officers, they would curse me to eternity. They would wind up like me, burned out from years of giving 100% effort, and treated like a poodle that wet on the carpet. Sure, I could show then how to catch bad guys, but that definitely does not lead to advancement!
You see, I continued, the people who should be doing the coaching are those like Dr. O’Conner (CBP Chief of Staff at the time). By virtue of an internet degree and her friendship with Janet Napalitano, she started near the top of the agency, GS15. How much more pleasant it is this way, no? Think about it. No crawling thru rat-infested warehouses, no middle of the the night assignments on freezing wind-swept piers inhabited by belligerent longshoremen, no exposure to unknown/dangerous chemicals, no breathing Pemex gas fumes, etc etc. Just nestle into a warm, comfy office. Write some emails. Have a couple of meetings . Delegate the tricky stuff, and that’s it. Call it a day. Go home early. Beat the crowd to the Metro. Yep, that’s the coaching I should have had!
emet: Cynical no, yet I believe you earned that cynicism the hard way. You lived it, you earned the right.
God bless you for helping to keep me safe.
Starting to sound more and more like Skynet.
One explanation for all this current hacking…to throw us into the direction of the Great Reset.
FTA: I believe the entire agenda of the World Economic Forum is elevating these cyber-attacks has been for the sole purpose of pushing a governmental cryptocurrency and the elimination of paper money to defeat crime. The mere fact that the FBI could recover a portion of the ransom proves the point that moving to national cryptocurrency will not end FIAT, it will enhance the governments of the world to hunt down all money.
This entire push for Blockchain is to eliminate paper money so every transaction will be traced. The governments are allowing the cryptocurrencies to pop up to get people confidence in them, and then they will confiscate all cryptocurrencies and swap them out for the new improvised government crypto. Just as governments do when they cancel paper money, they will ask you how did you get this much? Where are your tax receipts?
This hacking is to drive more and more people into the arms of the Great Reset. Look at was all of sudden hacked – red meat and fossil fuels. The very things the WEF wants to end.
https://www.armstrongeconomics.com/world-news/cryptocurrency/cryptocurrency-the-wef-plot/
Yes, I think this is all about the Great Reset too. They have been doing simulations of cyber attacks to bring down the financial system (and they always do drills/simulations before one of their psyops go live, just like Event 201 simulated a respiratory pandemic a month before Covid).
https://www.sott.net/article/444410-Ice-Age-Farmer-Report-Next-crisis-bigger-than-COVID-Power-grid-finance-down-WEF-Cyber-polygon
https://www.sott.net/article/451356-From-Event-201-to-Cyber-Polygon-The-WEFs-Simulation-of-a-Coming-Cyber-Pandemic
Last year, the World Economic Forum teamed up with the Russian government and global banks to run a high-profile cyberattack simulation that targeted the financial industry, an actual event that would pave the way for a “reset” of the global economy. The simulation, named Cyber Polygon, may have been more than a typical planning exercise and bears similarities to the WEF-sponsored pandemic simulation Event 201 that briefly preceded the COVID-19 crisis.
Thanks for this info on Cyber Polygon and the SOTT sight. Will read and follow this with interest.
I love Suspicious Cat.
No news to me that voting equipment said to be secure was actually not only vulnerable, but was hacked. Anything with a modem is potentially vulnerable, and even counting machines, it turns out, transmitted data online. I have long believed that no elections should involve–in voting or counting–anything mechanical, and certainly anything with a modem.
Just as a coronavirus pandemic followed conventions and exercises to prepare for virus pandemics so perhaps a cyber pandemic will follow all these “tests” of cyber attacks. Isn’t a large convention or conference on cyber pandemics scheduled soon?
Yes, that was Event 201 (they always do simulations/drills before their psyops go live):
This is a good article on Event 201–you can see the similarities of the simulation and the real thing:
https://www.sott.net/article/434728-Is-it-time-to-launch-an-investigation-into-the-Bill-Melinda-Gates-Foundation-for-crimes-against-humanity
Amanda: They could investigate all they want to, but this is my cast of characters for the blame: CCP, WHO, NIH/CDC, Gates, Fauci-Brix tag team.
This has all gotten so rampant, I sometimes wonder why I even have a virus checker blocker or what ever one wants to call them.
Do believe that this is one of the reasons I’m pissed at people who feel it is just fine that Illegals still SS# and other IDs of Americans. Hey some Illegals have multiple sets of IDs so that they can cover al bases One for working, one for welfare type benefits and one for speeding tickets and arrests.
DeLeon says that it perfectly OK since the Illegals have some way to support themselves in America. H3LL NO!! Identity thief costs millions of Americans 100s of Billions yearly. Not all the moneys lost due to Identity Thief is by Illegals but a good % is. When things get hot they just buy them another, and if too hot they head back across the border until things cool down and start the Identity Thief cycle all over again.
Believe it or not these identities are gotten a lot through hacking computers.
In any country there should be ZERO Illegals, including America
Zero Illegals means Zero cases of identity Thief by Illegals
Maybe a cyber pandemic will reinstate all the restrictions of the Covid pandemic.
Benrod: I can see it now. Cue Fauci, temporarily on loan to NIA, to take to the mike and tell everyone to shut off their computers and phones so they won’t be hacked. The govt. will be frantically working with Big Teck to provide a defender that will cost billions but will be given free to the public by said government. “Quo Bono” ):
There is an increasing wave of people wanting an investigation of Dr Fauci and the WuHan lab……
”Squirrel”…….
and hackers have just stolen the personal information of 26 million……
I like to keep my life simple. I learned more than 40 years ago- whatever the “Government” tells me I’ll just belive the exact opposite. So far Ive been 90% accurate.
Exactly. All my purchases are made with cash.
I think more than providing a foundation for claims of unreliability – it is a test run or lead up to a complete shutdown of avenues whereby the forensic audit information will come out. They have no limits. Guide yourself accordingly.
Too big to fail or too big to govern. Paper ballots and ditch the cloud, only on premise servers.
johnnyfandango: No To Servers. If a computer is involved in any way there is the possibility/probability it can be connected to the internet. There are too many ways to do that now.
Excellent analysis Sundance. Thank you.
They need to build a massive database to determine the enemies and friends. The enemies were abandoning the normal channels like Facebook and Google etal, so they have chosen a more direct route that is much quicker. It also catches those fish that were not exposing themselves to the social networks. It may be a good sign. They might see that we are catching on faster than they were succeeding and they had to speed up the game. Just like the all hands on deck election steal, this may be because we were just not cooperating fast enough and they have had to risk a greater exposure than they planned.
I though Maxine Waters let it slip that Obama had begun such a project.
Every Dictator has / needs an enemies list.
Interesting train of thought. I had been thinking that these hacks were all part of the upcoming Cyber Polygon – a dry run for a cyber ‘pandemic’ to come, kind of like Event 201 was the dry run for COVID. While it all may be connected, it is interesting to think that they may be pushing that the votes were hacked, and therefore all audits are compromised. Of course, Jovan Pulitzer’s technology and audit techniques do not rely on internet hacking. And Dominion’s technology does. So, frankly, wouldn’t any insistence that audits could be hacked also assume that elections could be hacked as well? It has pretty much been proven that Dominion machines were online. And hackable. And that’s what we’ve been saying all along – the election was a fraud.
Jane Brown: The Russians did it, that’s always the coverup answer.
I wonder how many people inside the corrupt government agencies have left their prints on the cyber activity during the election
They may have much more to hide than we currently know.
And what was the name of that CIA program where they could hack into computers, and leave a fingerprint indicating that the hack came from elsewhere? Remember that Wikileaks’ Vault 7 exposed this. Would anyone put it past the corrupt CIA to be hacking our own internet systems, and retrieving their OWN ‘ransomware payments’????
Jane Brown: The cia has several such programs. I don’t remember all the names, but “The Hammer” was the spy on anybody and everybody tool.
The Hammer was the program where they could sweep your data, correspondence, phone calls, etc. But Vault 7 from Wikileaks spoke about an intelligence program where they could hack into computer/intelligence systems, and leave ‘fingerprints’ as though other entities (or countries) did it.
The Democrats are the enemy they are inline enemies of Americans and do everything in their power to destroy this Country. When we regain power and we will we need to be utterly ruthless with the Democrats and put them in jail after they are convicted. The ones that have committed treason need to be put before a firing squad and shot dead if convicted of treason of course.
As for all these hacks we know it was the CIA, department of justice, NSA and they blame it on everybody else. Basically they’re a bunch of liars, for their father is Satan and the father of lies!
With a crisis created, all sorts of solutions can be offered and cast as an act of benevolence and safety. Expect lots of “solutions“ offered from the usual sources, with corresponding consequences as far as control.
One of the questions regarding the future buy-and-sell issues put forth in the last chapters of a certain book was what will be the conditions to allow such a thing to occur. Really does not seem to take a stretch of the intellect to see how such a thing can not only occur, but how those who might have issues with the proposed system will be cast.
Could they could also be gathering data to sift through & find “seditionists?”
Google! For example
This company was created by the CIA to do all the following and pipe it directly to the NSA, with special government laws protecting it. So what the hell our they talking about, this is something they have been doing since 2010?
To facilitate that national security objective the Feds were going to need to work with outside government entities, FBI contractors, to permit access to monitoring systems. However, additionally interesting…. Immediately after that DHS announcement suddenly there’s an uptick in cyber intrusions, pipelines hacked etc. Then the FBI says they recovered the ransom payment by knowing the private credentials to the hackers. That’s very fishy.
I love Suspicious Cat and he’s always right.
They really are panicked. The insanity has ramped up to an insane level.
And by the way,
TRUMP WON!!!!
Our federal government has never been so corrupt. Time to start over.
I still can’t figure out why the question hasn’t been asked and answered: what reason for any vote tabulating equipment that can have totals changed.
Their very existence is PROOF of election fraud.
My yahoo account was hacked on Wednesday. Also my log in to my laptop was hacked later that day I received Ed security breach on my IPhone that Gab. Pinterest Kohls Offer up and Penn medicine was also hacked. Not a good day changing all my passwords
If the deep state wants to cover for 2020 election fraud perhaps they would flood the zone with cyber-intrusions to undermine any electronic evidence? It would not be the first time we have seen this type of cover operation.
This is possible, as outlined by Sundance above, but I would like to offer another point of view. What if this is all about laying down a worldwide internet censorship net like those already on Facebook. Step out of line, and you will get a visit from the FBI at 3:00AM.
*Some may observe:
Surveillance.
Google develops base Android at their own expense and licenses it to smartphone makers for next to nothing, as a result there are over 2.7 billion Android phones in use worldwide (72%). This is a surveillance sensor network beyond Orwell’s wildest dreams, including data, voice, audio, video, and location, all time-stamped by user. Remember: Google developed their Maps app in partnership with the US DoD and three-letter agencies, and they are joined at the hip, the public has no idea of the depth of their AI fusion surveillance schemes together under cover of “national security”.
The FBI recently secured carte blanche to hack private computers and networks, this is adding to the surveillance fusion. They can just as easily plant covert surveillance code on computers as they can search and delete files. A smartphone is a computing device too.
The multi-pronged plan for totalitarianism proceeds apace: Data surveillance and manipulation, rigged elections. Censorship and propaganda. Overhyped “public health emergency” with artifically-imposed distress as a pretext for enriching the corrupt and crashing the system (win-win), and trojan horse “vaccines” (to what end?). Identity class and cultural Marxism (divide and conquer).
The end state: NWO, Great Reset, complete totalitarianism.
(* Difficult to say whether I agree with any of these observations.)
smellor: That’s the reason I only use my phone for conversations for nothing important, and nothing else of any importance is on it. Apps are more ways to spy on you and collect information. The pictures are of pets and flowers. People want convenience, but there is a price.
Some have guessed that the Colonial pipeline hack shutdown may have been done by the deep state, to give us an example of why the govt should be given license to invade all computers and networks (“to keep us safe”). The FBI later announced they had assisted in recovering part of the ransom, by somehow producing a crypto key, interesting, no?
And notice that the FBI started hacking into private computers after the SolarWinds hack became public, supposedly to find and delete such malware. Do we trust the FBI to be doing this?
https://www.msn.com/en-us/money/markets/the-fbi-just-got-permission-to-break-into-private-computers-without-consent-so-it-can-fight-hackers/ar-BB1gzhPR
With the potential specter of govt claiming the 2020 election equipment may have been hacked before, during, and after the election (as cover for audit findings), combined with the FBI now granted authority to hack any private computer/network they please and delete files and who knows what else, I’m starting to think we are, indeed, in the final unraveling stage of the end of empire.
Hey, if I were a criminal organization, that’s what I’d do.
We can think like Machiavellian psychopaths, without being Machiavellian psychopaths.
sundance-
Thank you for hovering at 30k feet pointing out the shenanigans of the bolsheviks.
Its amazing how evil man can be.
Watch Wray – much talk today of him being the modern day Aldrich Ames.
Honestly, these leftists are so corrupt, so hellbent on disenfranchising the American voter, that by the end of they day, they will have manipulated everything and voila, we’ve all lost our voices.