Packet Captures are just that - captures of raw data packets traveling in cyberspace.
Imagine Willy Wonka and the Chocolate Factory, when the TV boy gets zapped into a million pieces.
The data transfers in compressed packets that read like a pile of lego parts and a script telling you how to reassemble them. The final product file is bulky and hard to ship, so you deconstruct it, squish the parts together and give instructions.
Doing this also allows you to move large files in intermittent spurts so network systems aren't bogged down serving a single request at a time.
Anyone can put up a "net" and collect the packets, if you know what "frequency" they are being sent among the millions of other packets other people are also sending.
That's what they have.
Next comes figuring out the instructions. If you know what you're doing, you got that file in the datastream too, otherwise you're mix-and-matching the pieces until you get lucky and find a pattern, which could LITERALLY take a millennia.
Reassemble it and you can reconstruct the file as it was in TRANSIT. If it is encrypted, you have a few more steps to decrypt it -- that is, unless, the packets were already decrypted with the intent to modify them anyway.
Now comes the crux of the matter:
If you capture when the packets LEAVE and ARRIVE from their destinations, you can see if they have been tampered with during the datastream. How that works is, a middle-man server is sent the real packets and has a pre-programmed code that modifies the packets at the COMPRESSION level. That's not small beans, that's top-tier espionage.
Keep in mind, the fact the packets were collected unencrypted is proof Dominion let it leak on purpose.
This is what the VAST majority of experts are waiting for here. If they get the Packet Captures, they can tell if Lindell actually has packets either going TO China or FROM China. If he has both, then they can prove 100% that China tweaked the packets.
If he has anything other than ACTUAL packets that were intercepted from China (which would require putting together a team ahead of time to set up the "net") this whole thing is a wash.
With the vast quantity of information required to not be dismissed as inauthentic packets outright, there are really only three options:
A. He has the receipts and they are legit.
B. Someone who DOES HAVE ACCESS to the real information feed fed him a line of packets data that was modified to intentionally sabotage Lindell's efforts.
C. He doesn't even have ANY data packets at all and this is all coming out of literally thin air (very unlikely).
Another way to describe it...
It's an envelope. Envelopes have an address, where I came from, and data inside. That's a packet.
Not sure why no one is saying it this way. Super simple, y'all.
Have the PCAPs mean they have all the envelopes flowing to/from a specific place. Think of this like having access to the central processing location for your mail service. They have that entire building, only they also know what was in the envelopes, provided they weren't encrypted.
True. But it is a bit more than just that.
You're also taking a big thing and chopping it up, then sending those packets one at a time.
So, it's like taking a house apart and sending a brick at a time.
That way, the highway you are trying to move the house on doesn't prevent all the cars from passing by because a literal house is taking up all lanes.
It's more complex, absolutely. But for non-technical people, they need it the most simple terms.
Everyone understands when you say, they opened the envelope and read the letter. Or they saw where it was addressed to and where it came from.
Pillow Guy has claimed since January that the packers were captured by 'good guys' during the election.
We'll see whether the packets will be released tomorrow, as well as what the cyber experts at the conference think. They probably have already been hacking away at them today while CMZ/Frank/Waldron were doing the botched presentation of the Mesa voting machine HDD.
It looks like the fumble with the HDD image today was because of poor preparation.
But who knows, it could be part of Pillow Guy's strategy to look bad on purpose. He might be trying to bait the MSM/crooks into a false sense of security. "The Pillow Conference is a joke! Their cyber experts can't possibly catch us". Who knows if he will catch Dominion by surprise tomorrow.
I’m not sure if you can still find them on the internet anymore, but Tsutomu Shimomura showed the world what can be done with packet captures when he was hacked by Kevin Mitnick.
Very impressive and I expect we will be seeing similar things with these packet captures Mike has.
Popcorn loaded and ready.
Yeah, the whole HDD debacle could be done on purpose to fool the cabal into thinking Pillow Mike has nothing. Tomorrow, the real hammer could drop.
Packets is all fine and dandy but it is only a technical detail. What happened is live election results got sent to somewhere, who then sent back altered results which became the official recorded results. So if your audit has the number that got sent, and your official result is the number that got sent back, that completely proves that the place they got sent to and came back from determined the results, not the audited real totals. Fraud is proven and has an IP address.
Can’t disagree with any of that mate.....
Another option is that this is all a holding op like Graham was doing..... it just keeps niggling me.... I guess that is the skeptic in me....😉
WWG1WGA
Ugh, typo in the title.
I've been spelling they as the a lot lately...
PCAPs can be intercepted and changed, but it requires a large amount of coordination with both sides of the exchange, both with sender and receiver.
Because the packet transfer gets delayed so they can be doctored, it will stand out like a sore thumb if the data stream to the receiver is getting throttled. Unless someone is listening in, you could miss it.
You gotta keep in mind this one thing, though. These ballot machines should NEVER have been connected to the internet. That you can get some packet captures on them is damning in and of itself.
The possible sequence of events:
A machine has run a number of ballots and is ready to report.
As it is finalizing the report, it pings the data off to China or whomever.
It is modified and returned to the ballot machine as it is transferring the data to either the local network or a flash drive.
The final machine is none-the-wiser on the file it receives, as the FILE wasn't modified, the components of the file were, which gets past file security structures. There will be no trace on the file of tampering, as it happened in transit.
Delete the file/database on the machine and only the final file is available for review.
D. Lindell got the supposed pcaps from notorious con artist Dennis Montgomery, who put a bunch of garbage data into a hex editor in order to milk some cash out of a rich guy who doesn’t know tech & was prepared to believe whatever someone claiming to be a “cyber expert” told him.
I looked at the Dennis Montgomery PCAPs and the excel version being sent around in late November. All garbage.
If I had to guess, they were mostly the guest network at State Farm Arena, most of the "china" traffic was going to TikTok or AWS; all the Russia traffic was kaspersky av updates. A couple of others called this out on the chans, but IIRC, CM noted that was not the dataset in use.
Possible, which is why I'm not too excited about this so far.