I understand what they are supposed to be, but how did Mike get his hands on them? And how does he know what he has are legit?
To go along with that, does he have anyway of proving these are legit captures? or is that what this is supposed to prove?
$5,000,000 to anyone who can prove it's fake.
Considering nobody seems to have access to the pcaps, pretty hard to prove fake
The reward is not for anyone. You must be AT the cyber symposium to be eligible.
Dr. Frank in his interview yesterday said they were acquired from the Space Force. You know they are legit because they can be corroborated by the IP addresses they contain. It would be an impossible task to falsify 37 terabytes of PCAP data.
They could fake data but it would be way to hard to get away with it. They could be selective but would get busted from mistakes. They are fucked either way. Sort of like the fake votes snd such.
Suicide weekend and arrests sre that much closer.
Definitely impossible to produce these PCAP's when you consider the complexity. It's not just the IP addresses, the data needs to perfectly reflect the real world live feeds which are public, so sequence of changes, size of changes, timing of changes, location of changes...and even then you need to have intimate knowledge of the systems which are being targeted which are proprietary....and all this work done perfectly, packaged and delivered in a little over 2 months
Despite all this, someone will eventually ask "Where did you get this load of crap from?". As ignorant as that question would be, it's loaded with doubt inducing deceit targeting the very people you're trying to convince.
I think the sheer number of tech security experts there will be sufficient to legitimise the data, but if it doesn't, they desperately needs some official acknowledgement that it was somehow collected by Space Force.
Taking and examining PCAPs is what I didn't in the AF before I got out a couple months ago. Watching this is like picking up amateur boxing and then watching Tyson or Merryweather go at it for my first time.
Yep, I was really taken aback about that. Space force is not another rocket man group, they are also-- Cyber space force.
You could covertly reroute/duplicate traffic for parts of the world's internet through a satellite hop and then sniff the contents flowing between ground and satellite station. If discovered, claim it was a configuration mistake.
Think prism.
Wirh operations like these, it is imperatieve bot tot divulge means and methods, though prism is already out.
Other methods may be in place, though.
Andere of course, there is still the Frankfurt servers.
Not sure why this was downvoted. Look up NSA PRISM program.
We've got Lieberman with brain interfacing nano transistors and you think making TCP/IP traffic look legit is the impossible thing to do?
if it's fake it'll be easy to debunk.
37 TB is huge. i wonder if they captured the complete packets (headers and payload). I would expect the payloads to be encrypted. of course space force might be able to decrypt the payloads using quantum computers. this movie is getting good!
Packet captures, typically, are captured outside the system - on the network. It can be anywhere between the two end points. I believe the white hats had the system under surveillence and packet captures were one aspect of it.
It is possible to becapturing on the device itself too. but it would typically require modifying the configuration and installed software - would by itself invalidates the machines. So I think there was some military level surveillence on the networks.
He knows its legit because he probably got it from the Q team.
If they were not legit captures, it would be very easy to prove they were fake, but correlating something in the packets - the origin, destination, time sequence etc.
Remember, not only do the captures show any foreign interference, it wouldn also be showing the sequence of events as it happened. So that can be correlated as well.
Packet captures can also happen internally or externally on the network -- I'm sure they will spin it as an inside Dominion leaker provided the packets as part of a internal audit.
This way Dominion can't scream foul play.
They're super de duper fucked.
Frank said they had a sniffer program running that collected in real time.
Not only that white hats cloned the entire Dominion/Scytl network they got everything.
Do you have the clip of this? I would love to hear the full clip, it would give some idea.
I vaguely remember last year there being something going on about all internet traffic being captured and reviewed. I'll have to dig and circle back.
Dennis Montgomery, the whistleblower who built THE HAMMER program for foreign surveillance was in the news during the Out of the Shadows documentary.
Obama had commandeered the HAMMER and tuned it against Americans. So every internet traffic gets sent via HAMMER and an AI decides whether to keep any of the packets for further review in future.
That may have been what i was reading. Seems right.
Just found something that blew my mind. Check this hit piece on the symposium: https://www.washingtontimes.com/news/2021/aug/11/mike-lindells-lead-cyber-expert-says-they-cant-pro/
(Ignore all the smears they start off with, and search for HAMMER)
These people are reporting that this data indeed came from HAMMER and was provided to Lindell by Montgomery, who apparently had a stroke the day before the symposium. I am getting goosebumps.
Yes, this is fake news article, but why are they talking about Hammer? We were just speculating this very thing independantly. They claim that Hammer is a conspiracy theory and at the same time, say the data came from there.
LOT more going on here.
I don't have time to answer from scratch, but I'm hoping some copypasta from an old post of mine will help:
Good explanation and I usually do just the mailing thing with the addresses as the header and such, but you went a step further with the encryption. I've always felt explaining the encryption part would be too much for anyone to understand when they're trying to understand how packet capturing is done.
However, I think OP's question (as well as mine) is how did Lindell obtain the pcaps from all of the servers? It probably was done internally but would most likely get caught if they were running a packet sniffer like Wireshark so it might have been done externally, like connecting to the router, but to have pcaps of EVERY server? That's insane and requires a lot of manpower so how did Lindell get them all?
If they were able to connect to the routers to do pcaps, they should know the passwords to the routers, which means they knew the election officials also know what the passwords are.
I don't think Mike has said where they came from or how they were obtained. I've always thought it sure sounds like a military operation with a lot more access than average people have.
Very nice. Tks for taking the time.
They have not said where they got the packets from.
Dr. Frank allude that they may of come from white hat hackers possibly the Space Force since the traffic went to space via Satellite transmission https://exposure.locals.com/post/930772/interview-w-dr-frank (About 7 minutes in or -39.00 on the timer)
In 2016, I worked in IT for a very large county. The IT department managed the servers for the board of elections. A day before the election I was in a meeting with the security officer and he panicked at what he saw on his screen. Then he showed me and explains. The network was being flooded with packets as a hack attempt to enter our system. I asked him where they were coming from and he said south east Asia. In other words China. I know this is legitimate as I saw it with my own eyes in 2016.
If they were taken in real time, when 'someone hit record' then the fact that he is broadcasting them means the 'someone' who got them was authorized to or there would be trouble in having something like this. My guess is that someone was the mil. and DT. And so he is auth to have them.
That gives me confidence theyre legit. No takers on the 5 milllion adds to that. My guess is Mike has a trusted role in this, part of a plan to save America.
Mike Lindell Presents: Absolutely 9-0
https://home.frankspeech.com/tv/video/mike-lindell-presents-absolutely-9-0
He begins the video talking about his sources—white hat hackers working for the government, etc. He also interviews one of the guys--disguised; it’s interesting.
Probably wireshark
You can never capture all the packets at full snaplen with wireshark. This is probably something military grade.
Basically, Internet Protocol (IP) works like postcards in the regular mail. Each "card" has a to address, a from address, a datestamp and a message. Everything that uses IP is sent that way, including pictures and sounds.
A message that will not fit on to one card requires the use of many cards. They keep track of which cards are in the same message with Transmission Control Protocol (TCP).
Each one of those IP cards constitutes a "packet" so packet capture is like someone tapping in to the mail system and photocopying all the postcards. You can then knit them together to get the compete message.
Simply described. Every communication whether it is data or voice has to establish a connection. The call request, the answer of that request, the answer back to establish the circuit, the circuit establishement, the actual transmission is all time stamped and recorded. It also has the volume of data transmitted during that period of time.
So once you have this data (from the network routers) you can discover every connection. You know when, how much, and from where it came and where it went.
Did that help?
Regarding where Mike got the data... as far as I know, that hasn't been disclosed yet.
He mention that he got them but wouldn’t say from where. He said it doesn’t matter where I got them from just that we have them
Then this would be the information that was rumored after the election where the server was found in Germany that had all the data on it? This would be similar to that, or would be actually that data?
IF it is fake, seems like someone from dominion or in charge of the voting systems could make a cool $5 million if it's easily debunked..... which if it's fake would be obvious to them... Mike is a stand up dude and I'm sure if he and his team saw evidence to refute it, they would say so and give the 5 million.
Hmmmmmmm this is really big then.
I guess the next question would be, why are republican congress people attending this event and mass tweeting about it.... but I probably already know the answer to this.
When your computer is on a home network, the packets are broadcast to everyone on the network. And each computer only looks for their ip address to see if the packets are intended for them.
However all computers on the network are getting the packets. So you only need a computer connected to a network to start logging and recording all of the data being sent on the network.
It looks like the voting machines were being connected to the internet, and using wifi. So any of the staff who knew about the wifi network and the wifi password could connect to the access point, and capture all of the packets being broadcast on the network.
Probably because he has multiple people assisting in the packet capture. The staff at each one of the polling sites should be capturing packets from wifi on the client-side. And he might have whistle blowers from dominion capturing packets on the server side.
So the packets from the client-side and server-side should match up and validate each other. That should give you enough confirmed data-points that you know are correct, to validate the rest of the data.
Also if the packets are in real-time, it would be very hard to write a spoof program to inject realistic fake data into the packet capture to try and pretend like something else is happening.
When information is sent over the network, it doesn't go straight from point a to point b. It get sent over a network, where the data bounces between different computers in different data centers before finally getting to the server.
For instance, even opening up google.com will probably be forwarded through 10 different computers before arriving at google. And all of this information is logged. The problem is that this raw log of information is pretty worthless, because there's so much data you wouldn't know what to look for.
But if you have the packet captures from the client and the server. You know which ip addresses, and what time they sent the information. And this should be stored in the logs of all of the different data centers that the packets pass through. And if they check their logs, they should be able to validate that, "yes, this traffic did pass through here". And it's likely that the Space Force, or NSA has access to these logs.
What it basically proves is foreign interference. You have a log of all of these different points all the way through election night of these voting machines that are connected to the internet.
So you'll likely have a record of all of the vote tallies as they are happening through the night. So the voting machines send packets to the dominion server for the current vote of { trump : 200k, biden 50k }, and then you have packets going to and from a foreign server that say { trump : -50k, biden : + 50k }.
And then in the next dominion server check you see { trump: 150k, biden :100k }. The information can be tracked to see when and how votes are being changed, depending on the totals they are reporting back. And when those change based on when the voting machine connected to a foreign server.
I was just going to say Space Force, but your answer is much better🐸👌
In a network information being sent between to IoT devices can be monitored using software potentially a MITM situation or various other methods meaning whatever information was being sent either to flip votes or what have you from the source it was sent from or to the destination it was sent to is all recorded
Source; Studying for CCNA 200-301 and soon to be network engineer.
I'm betting he got them from the military. I don't have much to bet with, but... So, comment below says Dr Frank tells us they're from the Space Force. Guess I won the bet. lol.
It can be external or internal. To know what you are looking for the packet normally has a header. I remember back in the day sniffing yahoo messenger and chat. Just to get the protocol so you could replicate the packet for your own program to make booters or bots.
The problem with the pcap narrative is that government would need to be involved/admit to it in order to legitimize the claim.
That being said, depending on what the data consists of, could reveal quite a bit. I would imagine a coder/hacker would probably have their own program/daemon with its own communication protocol, and this infiltration would be small and custom.
However if it was done the newage way, it'd be "let's backdoor Teamviewer in and use that" or that could already be a "feature" as Dominion has done tech support via remote desktop before. If it is some sort of VNC/Teamviewer/RDP connection, then if you can decypher and refeed that stream/protocol I would imagine you'd essentially be seeing a videotape replay of what they did on their remote control.
IIRC there was an article about "rogue" audit teams outside some of the polling centers with the ability to packet sniff the wifi connections and collect the data.
u/TheRoyalRob:
So lets say it isn't encrypted (or it is but key is known or shared by the network). What to do ? Simply you start some sniffer between communicating computers (let's say on some computer between,but that isn't only way) and you have packets captured.
It is all old story with Alice,Bob and Eve(sdopper)...
Nobody has even seen them. Mike is showing fucking pictures from some windows computer that is out of date on its updates. Its bad how unprofessional the claims seem to be. I was anticipating actual packet captures with actual data and headers etc. Instead we get some graphics that look like they have been created in Microsoft Paint with no supporting data. What a big nothingburger.
You type your 5020th 'LOL' from mom's basement once again, post a random image.. No actual content.
Yet don't travel to SD to collect the easy 5 mil to finally move out of mom's basement.
Seems legit. Checks out.. (sorry your pedo world is crumbling down around you)
"Posting like a faggot" would be nothing more than providing the most basic three letters of 'LOL'. It is the most minimalistic, laziest form of doing the most absolute next to nothing, possible. You are of the degenerate movement that thinks 'LOL' is an argument.
You may try to pretend to act like an ally in this fight. But you give your position away easily. If you have something worth while, speak it. Or get off the pot.
If you were truely drawn to Lindell and these three days.. spit it out, or get off the pot.
If you are unimpressed with Lindell today, and the last 9 months, you factually wouldn't be here now. Not given your short, and obvious post history. You are only here to try and stop the the unstopable drain flow. Not working.
There are millions here to learn more or observe for the first time. They post nothing but learn. Your past, useless posts are logged. You tried to be stealth for brief minute. But the good people here will sniff you out and act accordingly.
I stand by my, sorry your degenerate community is threatened by true Americans finally waking up. There is truth here if you wish to wake up. There is no judgement here on past decisions made.
Go earn your 5 million then, son.
All else is just bullshit, then. (hows my english?)
I like how you don't think "shit or get off the pot" isn't the most American thing ever.
It is inconceivable that the pcaps under discussion here were not encrypted. The fact that Mike has them likely means whomever obtained them had access to the cryptographic keys involved. If so, then it is effectively impossible that they were altered. Faking them would also be effectively impossible. Consider them as safe and certain as your digital banking activity. Therefore, your criticisms are a bit wrongheaded. Regardless, mocking laughter is a form of logical fallacy and makes you look like a jackass. You should always strive to treat others with respect, how I'm sure you would like to be treated, yourself.
I vote jacksass.
Not sure if this is going through dominion though so we'll see.
I only meant it as constructive criticism. If we allow ourselves to break decorum, often chaos follows. Sure, it can be fun to cut loose from time to time, but you have to consider the cost.
I also suspect there may be some highly secret means to break these various encryptions and whatnot, but it is certainly not common or e-commerce and banking wouldn't be possible anymore.
It is fine to disagree, even good! I was just trying to encourage more respectful interaction and pointing out where things kinda went off the rails. It's all good, tho :) We can unite against evil and argue about the minor differences after! :D
Have a good night!
You can edit captures, but it would be very easy to find something in it - timestamp, IP addresses, event of sequence - something that does not correspond to what happened that day.
I respectfully disagree with this. What all these tools do is make sure the edited capture is valid, and pass all integrity checks, and can even ensure specific vagaries of the hardware/network stack used are reflected in the edited packets.
But what they cannot do is ensure the edited packets perfectly capture all verifiable events of the day. That is a job for humans, or very sophisticated AI (even more sophisticated than Zuck).
The way I explain this to people is, think of capture editing as photoshopping.
You can photoshop it so well that a picture looks real in every way. But making sure that whats shown in the picture - the trees, the leaves, the buildings - correspond to where they are in reality, its a totally different question.
My guess is, PCAPs proves the real election results.
And then, we will be provided an irrefutable proof that PCAPs are authentic, perhaps from the military source that conducted the election, based on one of the Trump EOs.
It's purely an academic discussion, but if it were the black hats, then the whole "election fraud" is a psyop - which doesnt make sense. If its the white hats, then it doesnt make sense unless you actually believe the election fraud did not occur.
But I think what you are really saying is that our opponents will claim the PCAP is not legit. I will wait for Mike's symposium to finish to see what the real answer to that is. Its definitely more than "5 million to anyone who proves they are fake"
The best part about this place is, it takes just one person such as yourself to point out the misinformation, and its gone.
I'd say keep going - most of us here want the truth, even if it sometimes bursts a particular bubble we were enjoying.
On a side note, just what IS it about wanting the truth? It's driving me nuts that I'm surrounded by people who don't seem affected by it one way or the other. It seems to be more about who I AM than what I THINK. Feeling the struggle big time lately, grateful to be able to connect - however superficially - with others who just won't look the other way when they see something off.
any text/file/data can be altered, yes, but when there are corresponding matching text/file/data elsewhere any alteration would be detectable by comparing them. ipso facto they cannot be altered (without detection).
IF you have packets of info that change an election result, and the election result was changed, then the packets are real. If they are not real, and faked, then the results which tally with them are also fake. So by discrediting the packets, you discredit the election result. If you accept the packets are real, and they do not tally with the audited results, then you prove the election was tampered with. It is a double bind.