13 Comments

I'm just seeing this. How did it turn out?

Expand full comment

No clear conclusion. It frustrates me that people who have strong technical skills at evaluating the validity of these claims always seem to be missing or held at arm's length. I'm still intrigued by the claim of 'passwords' being in the data because I know what that must imply IF TRUE; but there's no means to verify that any of the claims are meaningful or valid at this point, given that the rumored PCAPs are either fake, non-existent, or kept under key.

Expand full comment

5. Did someone at CISA supply the flawed software intentionally so the election could be hacked?

Expand full comment

We don't know the details at present; all we have to go by is Dr. Frank's oblique comment that software from CISA may have been involved, and that what was collected in the PCAPs and how touches on a "National Security" issue somehow. Need to keep watching...

Expand full comment

“….packets with gibberish in place of USERNAME and PASSWORD, and unless I could crack or steal the SSL certificate that was used to encrypt them, I wouldn’t be able to see them revealed. “

I believe the SSL cert used to encrypt the data packets is the public cert and can’t be used for decryption.

The private cert is what you’d need to decrypt.

Expand full comment

Dr Frank also said his analysis is as important as Lindell's. He has looked at actual votes by demographic group for each county in each state and backed into an algorithm with an R factor of near 1, that he was able to predict the vote tally using a "key" based on the 2010 census data. Noone's vote counted...all math and when the math "broke" on Election Day because so many Trump voters came out on that day, they had to stop counting and actually shove fake ballots into the system. Its even on tape in Fulton County and also Detroit. His work is demonstrated on Rumble. Seth Keshel and Draga Smith and others have corroborated and collaborated. Going to be interesting to final have some evidentiary hearings and airing of the data

Expand full comment

I've kept on top of all their work, and I was impressed with Frank (and his work) long before the Symposium. As a math guy, I "got it" right away, especially the correlation coefficients. Keshel and Draza's work is stellar, too, and provide independent parallel evidence which is extremely valuable. What I've always felt, though, is that *if* these rumored PCAPs existed (and were in the form that I know they would need to be in, to be admissible) then that data would provide the "kill shot". That's why I was dejected when the Symposium came to a close with questions swirling around that particular body of evidence.

Expand full comment

I agree, it would help the case...have to wonder if newly formed "Space Force" and white hats therein had the goods and brainpower and tech to pul it off. Also, by now the R State SOS's have provided their router data...humm...another layer to it

Expand full comment

I have also kept in the back of my mind the "Space Force" angle, for a number of reasons. One of them--that is out on the fringe with respect to hard evidence--is the whole "Italy Did It" claim set advanced by Maria Strollo Zack. I have been watching her carefully to try to figure out what, exactly, is her MO. It isn't what it appears to be, that's for certain. She did mention Lindell on occasion, so I'm watching and waiting to see what, if anything, comes of that whole thread, without prematurely trying to reach any conclusions about her fact set.

Expand full comment

Yes, she seems to be an interesting character in this.

Expand full comment

You left out the main reason that the symposium did not release the data at that time. Because of threats from some agency, that it might be illegal for them to do so publicly. Because of it being a National Security issue.

Expand full comment

I didn't leave that out unintentionally, it just wasn't relevant to the central theme of my post. I did note that Frank shed some additional light on it with Santilli. What was new, in Frank's commentary, was the allegation that CISA's own malware protection software was somehow involved in the vulnerability. That is interesting, if true.

Expand full comment

Thanks for the reply, and I realized you couldn't cover every aspect of the recent interview. Hopefully, others will give it a listen.

Expand full comment