Yeah, I know. First post and all. Get over it - this is the first time I've been motivated to speak. And you all would be wise to listen.
First, let me say that I do not now, nor have I ever, worked at an "agency," nor do I have any clearance or any obligation not to speak (no NDA). So I'm free to speak.
In my past, I functioned as a consultant. At one point I was assisting a party that was contemplating making purchases of companies/technologies in a unique "space" and then merging the companies/technologies.
What space?
I want you to imagine that a great many of the engineers that created various aspects of Prism (yes, the Prism that Snowden told us about) went into private enterprise. I want you to further imagine that they started up various companies that created various platforms that were, say, metaphorically ten degrees off of Prism, and had applications that were commercial. This is not imaginary, friends. There's about a dozen such companies. And I looked at all of their platforms.
Before I advance, I can hear you object: "but I never heard of these companies or platforms."
Let me explain how they work: (1) the platforms require subscription access and are expensive; (2) the subscribers are all corporate; (3) the corporations have to explain who they are and why they want the subscription - money alone won't buy access; (3) then they audit the corporation and force it to create a room with controlled access, and they ensure that only people from within said room are permitted to access their platforms; and (4) all of the individuals within the aforementioned room are required to have an appropriate security clearance - those are the people accessing these platforms. Got it?
So, basically, I'm talking about a weird netherworld where it's not quite clear where the government ends and private business begins. But, technically, on its face, it's all private business.
The point is that I explored all of these platforms, and I know what they do. And they all have a common ancestor. Prism. So it's not too hard to form reasonable conclusions about its capabilities.
Now, on to True The Vote (TTV). Almost without a doubt, TTV has been assisted by the NSA with both: (i) datasets; and (ii) the platform used to analyze the datasets.
Let's start with the datasets. Because of a DIFFERENT "tour of duty" as a consultant, I can tell you with 100% certainty that it is not possible to buy datasets that permit inquiry into where devices (phones) were without massive gaps in either: (1) devices; or (2) timeframes. So you CAN buy information about devices and their locations, but the information will have huge gaps in it, and would not permit TTV to do what it did.
That said, here's what happened. Every 30 seconds, the WiFi transceiver in your phone is spinning up and looking for WiFi networks. On about the same timeframe, your cellular radio is spinning up and looking for cell towers. The information concerning the following is exported by the makers of the O/S of your device: (1) what WiFi networks are visible; (2) their respective signal strengths; (3) timestamps; (4) what cell towers are visible; (5) their respective signal strengths; and (6) timestamps. None of this is available to developers of apps, by the way. Apple deprecated access to all of this information LONG ago. Anyhow, by virtue of the O/S exporting this information, the NSA has this information for every device. And they use it to query a database, and what is returned is your location ("If at such-and-such time, these WiFi networks were visible with these strengths, and these cell towers were visible with these strengths, where was the device at such time?"). The government drives around metro areas recording WiFi networks, cell towers, and their strengths, and correlating that to location. And it works VERY well in urban areas - but like shit outside of urban areas. Anyhow, that's how TTV knows where the devices were with no gaps in timeframes or devices. They had access to this dataset. That also why TTV only "bought" datasets for urban areas. The dataset supplied to them by the NSA is only accurate in urban areas. As I said, this technique does not work at all outside of urban areas. (5G changes all of this, but that is another story for another post.)
Now, what you need to know is this. Those platforms I mentioned previously. They do, indeed, have geofiltering and geoanalysis capabilities. But that's about 5% of what they do. They mainly find connections between people. These platforms permit a user to seek out every message sent by any particular individual across essentially any messaging system. That's where this is going next.
Let me paint a picture.
Let's say TTV uses its platform to identify all devices that began life more than 100 miles from a given "crooked" nonprofit, and arrived at the non-profit within a travel span of, say, 2 days. Well, that's the driver of the truck that the trafficked the ballots. Where did the tuck start from? Well, that's the company responsible for trafficking the ballots. Who are its executives? Now use the aforementioned platforms to find all of their messages, to examine all wire transfers to and from them personally and their companies, to examine every suspicious activity report filed against their respective bank accounts, and so on.
You end up figuring out who printed ballots, who shipped the ballots, who filled out the ballots, and who financed it all. That's where this is going. And I'm not guessing about the capabilities of the platforms. I know their capabilities for certain, which means I know the capabilities of the NSA's platform that was undoubtedly furnished to TTV. And I'm not guessing about the datasets. With 100% certainty, TTV is being supported by elements within the NSA, who are probably sanitizing the delivery of the datasets and platform through intermediate "private" companies, so TTV can say that it did not get anything from the NSA.
Sorry - this is long, and probably both winding and confusing. I am typing this in a sort of flow-of-consciousness manner. If you care to, fire away with anything, and I'll respond as I can.
So Q told us that the 🤡's in America were highly jealous of what the NSA had accomplished.
Reading through this, it almost sounds as though the 🤡's leveraged the original software contractors for PRISM to create some shell companies to front a similar capability that lived in the corporate space.
Agreed. OP explained it just as a private company would hire X contractor to analyze/record X internal logistics.
E.g. You work for (company). You want to know what people are saying about your product on let's say this site.... So company hires an outside firm to collate any and all product information here and then they return this information back to the company to ascertain and proceed with whatever causal/effect plan of action they deem necessary.
Just replace company with clowns, and product with voter data.... Ya know, I bet they use this (or similar) methods for their public cyber attacks too. E.g. glowies/shills/et al
You are more correct than you may know.
So is it accurate to say the Chinese do this through a command and control system, whereas prism et. al. cast a net over a more diverse and open environment? Almost mainframe vs WAN kind of thing? I mean, everybody will use everything they have, but that's how I look at the different approaches.