Did they put Biden in because they could plausibly (so plausibly!) LOSE?
Did they want Trump to start, or at least run up to, a second term?
Were they preparing to remove him, say via the 25th or maybe by some other induced incapacitation (terminal or otherwise), so that COG would move in and make 'other arrangements'?
Did DJT put a spike in their plans by MAKING JOE WIN? Did he put them in a situation they were completely unprepared for, with a President that no-one could wish for in their worst nightmares?
Did DJT set them up to destroy themselves in a debacle so complete that the entire gang/cabal/DS could never recover from the ignominy and shame? One that would earn the disgust not only of their enemies, but their own supporters and collaborators too?
Is this what we're seeing play out right now? Did they never think HE would lose? Who exactly fixed the election this time? Would anyone dream that their opponent would put THEM in power?
I'm going to weigh in here. I am neither low key nor a shill. But I will tell you PatelPatriot is dead wrong on 60% of devolution 10.
Source: I was actually there during some of those events. That's not how it went down. I've known Shawn Henry since ~2009, when he was heading up an FBI task force investigating transnational cybercrime. He's not TE-1. Dmitri Alperovitch might be, but more likely Eric Schmidt.
Clownstrike came into existence because the FBI wanted a "signatureless" cyber threat agent and they wanted attribution- basically, an automated agent to replace what humans at the FBI were doing, so they put out an RFI. Alperovitch was a VP at McAfee (during the malaise years under Intel) and put together a team to win the business, but Intel wasn't backing the new direction. So he formed Clownstrike on his own and ganked the coders from McAfee, turning it into a commercial product. A couple years after they got the FBI contract, Shawn retired and magicked himself into a VP job at CS, heading up their services practice (read: incident response, cleaning up the messes left when the product failed to do its job).
This is very common in cybersec startups.. they hire former Three Letter Agency types with some notoriety to give their Beta-quality products some cachet and to do the talk tracks at the major IT conferences.
On the CIS / Election-ISAC side, they put out an RFI as well- much more thorough, but CS was allowed to write the proposal in part. It was skewed so only their product was allowed, owing to a little-known (outside of Fedspace) requirement for FEDRAMP compliance. They got the contract because they wrote the spec for it.
The kicker?
CS's agent won't actually run on any of the machines it needs to protect, since it's a Windows-only system (they claim Mac, Linux, Android support but it's basically just a file-hashing engine that uses their cloud db).
Oh and it requires that the agent be connected to the Internet. Welcome to the Federal contracting world, it sucks. (I may have failed to mention that the EI-ISAC is almost entirely funded by CISA, aka DHS.. so that decision has Chris Krebs written all over it).
On to the last point in the title.
No, the Solarwinds hack was not done to get access to CS or Dominion. That's such a logic fail it made me laugh. Patel Patriot knows CS and FireEye are two different companies, but still manages to conflate the two.
I will tell you what I know about the "Solarwinds Hack". There was a vulnerability discovered in the Solarwinds Orion network management product, by 'hackers'. They were able to leverage it into a useful exploit that allowed them to move laterally through a victim's network. Since no one at Solarwinds was watching their support side, the hackers injected the working exploit (nicknamed "Sunburst") into Solarwinds' update packages, so anyone that downloaded an update for their Orion server over an almost 1-year period was pulling in an active exploit. Considering it's one of the most popular network managers on the planet, that's a spicy meatball- 2M unique companies affected.
At this point, the original hackers sold the exploit- exploit code, access to popped machines, a menu of stuff they got from victims. This original crew was almost certainly Russian Organized Crime.
A number of foreign intelligence services bought the 'package' from the OG crimesters. One of those was definitely China. The PLA modified some of the original capabilities and augmented them... effectively "gain of function" weaponization. They could now use it to traverse cloud services, and impersonate system-level access throughout a corporate infrastructure relying on MS Azure or AWS.
Same exploit, different goals. Criminals use it to ransom data in exchange for money. Nation-state actors are using it for covert surveillance and disinfo purposes. Unethical corporations are using it for Intellectual Property theft. In all of that, it's clear that white hats did not develop it for the purpose of going after Dominion or CS.
This is the only explanation of the Solarwinds hack that makes sense. Any time the left blames something on Russia, it means they're covering something up.
What’s funnier is the people that don’t want to allow others to express an opinion....
Those people are no better than the normies ignoring most of the facts.... and shouting it’s a conspiracy theory .....
I would be more afraid of the ‘High Key’ shills.....
You know the guys that push a narrative designed to draw in the ignorant or those that have no idea about Q or the Great Awakening and truly are the Q-Tards....!
The first comment after the artcle makes enormous sense to me. They never thought Joe would win. That is the only thing that makes sense. They had something planned for Trump's 2nd term so they ran the most ridiculous duo ever. Problem was their voter cheat machine was so ingrained, they ended up with a Keystone cops version of a steal and a president and vice president no one with an ounce of sense can defend.
Yup. I find a theory that makes sense and then someone gives a reasonable critique and I am scatching my head again. The only thing that keeps me going is the certainty that things aren't normal. When I start doubting, I just remember the so called innaugeration.
Crowdstrike is hot fucking garbage, and it's purchased by pointy-haired managers that don't pay attention to the disconnect between the marketing and real-world. The UI blows, management of it is a nightmare compared to the other industry leaders- but it does have lots of pretty charts an a nifty-looking threat-hunting interface that gets annoying after 5 minutes trying to get any practical work done.
In the real world, they have nearly the same efficacy as (free) Microsoft Defender (!) but with more false positives, must always be connected to the Internet (even to install it, which is something you totally want to do on a compromised machine), and 99% of its findings are done by people running manual tools on customer submissions (if you pay extra for Falcon Overwatch, Complete or the new Falcon Recon package).
They like to act like they're great by putting out a lot of press about a threat "discovered by crowdstrike first!" and attributing it to a specific hacker group or country based on network info. In reality, they're third or fourth to the party, but good cybersecurity researchers do responsible disclosure to the affected parties, and almost never do attribution, unless it's by behavior- not by IP address.
I do believe that the dominion website with solar winds logos was archived and I have heard it was theorized go be a white hat hack to get dominion data because I recall they later removed the logos if I am not mistaken.
And here's Patrick Gunnels narration of Devolution Part 11:
https://odysee.com/@ReadingEpicThreads:3/09.17.21-Patel-Patriot%27s-Devolution---Part-11_Edit:7
Thanks my fren.
Interesting comment on this article-
xtuartb 3 hr ago
I just had a thought:
One of the catchphrases of 17 was -
'They never thought she would lose'.
How about, for 2020 -
'THEY NEVER THOUGHT HE WOULD WIN'?
Did they put Biden in because they could plausibly (so plausibly!) LOSE?
Did they want Trump to start, or at least run up to, a second term?
Were they preparing to remove him, say via the 25th or maybe by some other induced incapacitation (terminal or otherwise), so that COG would move in and make 'other arrangements'?
Did DJT put a spike in their plans by MAKING JOE WIN? Did he put them in a situation they were completely unprepared for, with a President that no-one could wish for in their worst nightmares?
Did DJT set them up to destroy themselves in a debacle so complete that the entire gang/cabal/DS could never recover from the ignominy and shame? One that would earn the disgust not only of their enemies, but their own supporters and collaborators too?
Is this what we're seeing play out right now? Did they never think HE would lose? Who exactly fixed the election this time? Would anyone dream that their opponent would put THEM in power?
Just a thought..
My take, ...meh. I think there are other more likely scenarios. Though, I am but a mere human... no clairvoyance here.
Plausible. Pence had to do the “right” thing that day by certifying?
Well then I could think of a first arrest that would shock the world.
This
Red October. Turning into the torpedo's line of fire.
Boom? This was Nuclear!
Blinded by the light.
YUGE if true.
If
I'm going to weigh in here. I am neither low key nor a shill. But I will tell you PatelPatriot is dead wrong on 60% of devolution 10.
Source: I was actually there during some of those events. That's not how it went down. I've known Shawn Henry since ~2009, when he was heading up an FBI task force investigating transnational cybercrime. He's not TE-1. Dmitri Alperovitch might be, but more likely Eric Schmidt.
Clownstrike came into existence because the FBI wanted a "signatureless" cyber threat agent and they wanted attribution- basically, an automated agent to replace what humans at the FBI were doing, so they put out an RFI. Alperovitch was a VP at McAfee (during the malaise years under Intel) and put together a team to win the business, but Intel wasn't backing the new direction. So he formed Clownstrike on his own and ganked the coders from McAfee, turning it into a commercial product. A couple years after they got the FBI contract, Shawn retired and magicked himself into a VP job at CS, heading up their services practice (read: incident response, cleaning up the messes left when the product failed to do its job).
This is very common in cybersec startups.. they hire former Three Letter Agency types with some notoriety to give their Beta-quality products some cachet and to do the talk tracks at the major IT conferences.
On the CIS / Election-ISAC side, they put out an RFI as well- much more thorough, but CS was allowed to write the proposal in part. It was skewed so only their product was allowed, owing to a little-known (outside of Fedspace) requirement for FEDRAMP compliance. They got the contract because they wrote the spec for it.
The kicker?
CS's agent won't actually run on any of the machines it needs to protect, since it's a Windows-only system (they claim Mac, Linux, Android support but it's basically just a file-hashing engine that uses their cloud db).
Oh and it requires that the agent be connected to the Internet. Welcome to the Federal contracting world, it sucks. (I may have failed to mention that the EI-ISAC is almost entirely funded by CISA, aka DHS.. so that decision has Chris Krebs written all over it).
On to the last point in the title. No, the Solarwinds hack was not done to get access to CS or Dominion. That's such a logic fail it made me laugh. Patel Patriot knows CS and FireEye are two different companies, but still manages to conflate the two.
I will tell you what I know about the "Solarwinds Hack". There was a vulnerability discovered in the Solarwinds Orion network management product, by 'hackers'. They were able to leverage it into a useful exploit that allowed them to move laterally through a victim's network. Since no one at Solarwinds was watching their support side, the hackers injected the working exploit (nicknamed "Sunburst") into Solarwinds' update packages, so anyone that downloaded an update for their Orion server over an almost 1-year period was pulling in an active exploit. Considering it's one of the most popular network managers on the planet, that's a spicy meatball- 2M unique companies affected.
At this point, the original hackers sold the exploit- exploit code, access to popped machines, a menu of stuff they got from victims. This original crew was almost certainly Russian Organized Crime.
A number of foreign intelligence services bought the 'package' from the OG crimesters. One of those was definitely China. The PLA modified some of the original capabilities and augmented them... effectively "gain of function" weaponization. They could now use it to traverse cloud services, and impersonate system-level access throughout a corporate infrastructure relying on MS Azure or AWS.
Same exploit, different goals. Criminals use it to ransom data in exchange for money. Nation-state actors are using it for covert surveillance and disinfo purposes. Unethical corporations are using it for Intellectual Property theft. In all of that, it's clear that white hats did not develop it for the purpose of going after Dominion or CS.
Thanks for taking the time to type out what I couldn’t be arsed to.....
There are a lot of inconsistencies in the overall devolution theory here.... I would recommend guys go on to the QRB to find out for themselves....
But of course I must be a shill too for even thinking it....!
WWG1WGA
This is the only explanation of the Solarwinds hack that makes sense. Any time the left blames something on Russia, it means they're covering something up.
Kek 🤣 low-key shills
What’s funnier is the people that don’t want to allow others to express an opinion....
Those people are no better than the normies ignoring most of the facts.... and shouting it’s a conspiracy theory .....
I would be more afraid of the ‘High Key’ shills.....
You know the guys that push a narrative designed to draw in the ignorant or those that have no idea about Q or the Great Awakening and truly are the Q-Tards....!
WWG1WGA
…. And the Seth Rich tie in is what we’ve known for YEARS. Now Maybe revealed.
The first comment after the artcle makes enormous sense to me. They never thought Joe would win. That is the only thing that makes sense. They had something planned for Trump's 2nd term so they ran the most ridiculous duo ever. Problem was their voter cheat machine was so ingrained, they ended up with a Keystone cops version of a steal and a president and vice president no one with an ounce of sense can defend.
Yup. I find a theory that makes sense and then someone gives a reasonable critique and I am scatching my head again. The only thing that keeps me going is the certainty that things aren't normal. When I start doubting, I just remember the so called innaugeration.
Wonder if the CrowdStrike on the side the Petronas F1 team car is the same??
Crowdstrike is hot fucking garbage, and it's purchased by pointy-haired managers that don't pay attention to the disconnect between the marketing and real-world. The UI blows, management of it is a nightmare compared to the other industry leaders- but it does have lots of pretty charts an a nifty-looking threat-hunting interface that gets annoying after 5 minutes trying to get any practical work done.
In the real world, they have nearly the same efficacy as (free) Microsoft Defender (!) but with more false positives, must always be connected to the Internet (even to install it, which is something you totally want to do on a compromised machine), and 99% of its findings are done by people running manual tools on customer submissions (if you pay extra for Falcon Overwatch, Complete or the new Falcon Recon package).
They like to act like they're great by putting out a lot of press about a threat "discovered by crowdstrike first!" and attributing it to a specific hacker group or country based on network info. In reality, they're third or fourth to the party, but good cybersecurity researchers do responsible disclosure to the affected parties, and almost never do attribution, unless it's by behavior- not by IP address.
I do believe that the dominion website with solar winds logos was archived and I have heard it was theorized go be a white hat hack to get dominion data because I recall they later removed the logos if I am not mistaken.
They did remove the logos as soon as it became known.