On November 12th, Dr. Frank spoke with Pete Santilli and revealed some bombshells while discussing his preparatory work for the upcoming Supreme Court filing slated for the week of Thanksgiving.
No clear conclusion. It frustrates me that people who have strong technical skills at evaluating the validity of these claims always seem to be missing or held at arm's length. I'm still intrigued by the claim of 'passwords' being in the data because I know what that must imply IF TRUE; but there's no means to verify that any of the claims are meaningful or valid at this point, given that the rumored PCAPs are either fake, non-existent, or kept under key.
We don't know the details at present; all we have to go by is Dr. Frank's oblique comment that software from CISA may have been involved, and that what was collected in the PCAPs and how touches on a "National Security" issue somehow. Need to keep watching...
“….packets with gibberish in place of USERNAME and PASSWORD, and unless I could crack or steal the SSL certificate that was used to encrypt them, I wouldn’t be able to see them revealed. “
I believe the SSL cert used to encrypt the data packets is the public cert and can’t be used for decryption.
Dr Frank also said his analysis is as important as Lindell's. He has looked at actual votes by demographic group for each county in each state and backed into an algorithm with an R factor of near 1, that he was able to predict the vote tally using a "key" based on the 2010 census data. Noone's vote counted...all math and when the math "broke" on Election Day because so many Trump voters came out on that day, they had to stop counting and actually shove fake ballots into the system. Its even on tape in Fulton County and also Detroit. His work is demonstrated on Rumble. Seth Keshel and Draga Smith and others have corroborated and collaborated. Going to be interesting to final have some evidentiary hearings and airing of the data
I've kept on top of all their work, and I was impressed with Frank (and his work) long before the Symposium. As a math guy, I "got it" right away, especially the correlation coefficients. Keshel and Draza's work is stellar, too, and provide independent parallel evidence which is extremely valuable. What I've always felt, though, is that *if* these rumored PCAPs existed (and were in the form that I know they would need to be in, to be admissible) then that data would provide the "kill shot". That's why I was dejected when the Symposium came to a close with questions swirling around that particular body of evidence.
I agree, it would help the case...have to wonder if newly formed "Space Force" and white hats therein had the goods and brainpower and tech to pul it off. Also, by now the R State SOS's have provided their router data...humm...another layer to it
I have also kept in the back of my mind the "Space Force" angle, for a number of reasons. One of them--that is out on the fringe with respect to hard evidence--is the whole "Italy Did It" claim set advanced by Maria Strollo Zack. I have been watching her carefully to try to figure out what, exactly, is her MO. It isn't what it appears to be, that's for certain. She did mention Lindell on occasion, so I'm watching and waiting to see what, if anything, comes of that whole thread, without prematurely trying to reach any conclusions about her fact set.
You left out the main reason that the symposium did not release the data at that time. Because of threats from some agency, that it might be illegal for them to do so publicly. Because of it being a National Security issue.
I didn't leave that out unintentionally, it just wasn't relevant to the central theme of my post. I did note that Frank shed some additional light on it with Santilli. What was new, in Frank's commentary, was the allegation that CISA's own malware protection software was somehow involved in the vulnerability. That is interesting, if true.
I'm just seeing this. How did it turn out?
No clear conclusion. It frustrates me that people who have strong technical skills at evaluating the validity of these claims always seem to be missing or held at arm's length. I'm still intrigued by the claim of 'passwords' being in the data because I know what that must imply IF TRUE; but there's no means to verify that any of the claims are meaningful or valid at this point, given that the rumored PCAPs are either fake, non-existent, or kept under key.
5. Did someone at CISA supply the flawed software intentionally so the election could be hacked?
We don't know the details at present; all we have to go by is Dr. Frank's oblique comment that software from CISA may have been involved, and that what was collected in the PCAPs and how touches on a "National Security" issue somehow. Need to keep watching...
“….packets with gibberish in place of USERNAME and PASSWORD, and unless I could crack or steal the SSL certificate that was used to encrypt them, I wouldn’t be able to see them revealed. “
I believe the SSL cert used to encrypt the data packets is the public cert and can’t be used for decryption.
The private cert is what you’d need to decrypt.
Dr Frank also said his analysis is as important as Lindell's. He has looked at actual votes by demographic group for each county in each state and backed into an algorithm with an R factor of near 1, that he was able to predict the vote tally using a "key" based on the 2010 census data. Noone's vote counted...all math and when the math "broke" on Election Day because so many Trump voters came out on that day, they had to stop counting and actually shove fake ballots into the system. Its even on tape in Fulton County and also Detroit. His work is demonstrated on Rumble. Seth Keshel and Draga Smith and others have corroborated and collaborated. Going to be interesting to final have some evidentiary hearings and airing of the data
I've kept on top of all their work, and I was impressed with Frank (and his work) long before the Symposium. As a math guy, I "got it" right away, especially the correlation coefficients. Keshel and Draza's work is stellar, too, and provide independent parallel evidence which is extremely valuable. What I've always felt, though, is that *if* these rumored PCAPs existed (and were in the form that I know they would need to be in, to be admissible) then that data would provide the "kill shot". That's why I was dejected when the Symposium came to a close with questions swirling around that particular body of evidence.
I agree, it would help the case...have to wonder if newly formed "Space Force" and white hats therein had the goods and brainpower and tech to pul it off. Also, by now the R State SOS's have provided their router data...humm...another layer to it
I have also kept in the back of my mind the "Space Force" angle, for a number of reasons. One of them--that is out on the fringe with respect to hard evidence--is the whole "Italy Did It" claim set advanced by Maria Strollo Zack. I have been watching her carefully to try to figure out what, exactly, is her MO. It isn't what it appears to be, that's for certain. She did mention Lindell on occasion, so I'm watching and waiting to see what, if anything, comes of that whole thread, without prematurely trying to reach any conclusions about her fact set.
Yes, she seems to be an interesting character in this.
You left out the main reason that the symposium did not release the data at that time. Because of threats from some agency, that it might be illegal for them to do so publicly. Because of it being a National Security issue.
I didn't leave that out unintentionally, it just wasn't relevant to the central theme of my post. I did note that Frank shed some additional light on it with Santilli. What was new, in Frank's commentary, was the allegation that CISA's own malware protection software was somehow involved in the vulnerability. That is interesting, if true.
Thanks for the reply, and I realized you couldn't cover every aspect of the recent interview. Hopefully, others will give it a listen.