WAS THE CPAC PRESENTATION A MASSIVE LETDOWN?

Election activists: Take a moment, breathe, and look around.

🧵 1/25

#ElectionFraud #ForeignInterference
#TreasonHasConsequences
#TrumpWon

👇🏻Supporting Material 👇🏻
As with @Thaleresq, all of the discussion I see is focused on who delivered the message & how it was delivered.

Based on discussions last night, @CannConActual & @realjoeoltmann saw more info & are justifiably frustrated that it wasn’t all put in the public sphere. 2/25
I agree with them. No one should be allowed to sequester information about our elections.

The public deserves to know everything.

But why aren’t we talking AT ALL about the information that was presented?

Why are we always so focused on the messenger? 3/25
THE CLAIMS: They claim to have analyzed images for several counties & draw conclusions about server infrastructure vulnerabilities & exploitations.

This is NOT a report about election machines.

It’s analysis & findings about government servers & other IT infrastructure. 4/25
KEY FINDINGS:
- 3,700 pages of vulnerabilities, each of which dates back to 2004
- A Chinese Footprint with .cn server locations (just like with Konnech)
- French Malware embedded into the code of Dominion EMS 5.12 or hidden in the Dynamic Link Library (DLL)
(Cont) 5/25
- Deleted log files = connections by external users over internet & via opened ports on the Election Prod Server – Poulos testified that this was impossible

- Anti-Forensics enabled to make forensic investigations more difficult. For us critical infrastructure. NFW
(Cont) 6/25
- Riddled with PowerShell (PS) scripts – can ONLY be nefarious

- Chinese app (QQ.EXE) embedded in the system —known for online chatting & VOIP calls; this is malware leveraged by the CCP for data and intelligence

(Cont) 7/25
- QQ.EXE appears to be the conduit to Network Areas Storage (NAS) located in China

- Iranian state sponsored actors are track-ably inside our government IT infrastructure AND SPECIFICALLY INSIDE OUR ELECTIONS SYSTEMS in a coordinated way.
8/25
Each of these revelations, assuming the analysis can be backed up, is explosive. Every single bullet point needs to be investigated.

Further, this analysis supports @patel_patriot’s #Devolution7 and DNI Ratcliff’s IC Minority Report delivered Jan 7, 2021. 👀
9/25
See forwarded thread for more on Devolution 7.

Here is the DNI Minority Report:

context-cdn.washingtonpost.com/notes/prod/def….

10/25
I appreciate the skepticism of those deep in the movement that understand the tech & want to get it all out.

It’s absolutely the right posture.

It strengthens our movement’s credibility that we police our own with such a Berean commitment to truth. Never stop. 11/25
That said, I don’t think we were the audience of this CPAC PRESENTATION.

The presenters’ messaging & style resonates with the “moderate middle.”

That makes them more receptive to the information.

Actually, for the “moderate middle” (that hates us), it’s likely to.
12/25
I met Jeff Buongiorno at the Cyber Symposium. I spoke to him for probably an hour about his campaign against @LauraLoomer. He was disparaging her in the exact same way & with the exact same style that he went after @realMikeLindell today. 13/25
In other words, he was a self promoting prick.

I told him he had zero chance of beating Laura in a free and fair election.

Then I forgot about him.

14/25
Josh Merritt is a name that holds almost mythical power in our movement.

For some, you may as well be saying “Voldemort.”
15/25
But no one capable of assessing technical capabilities questions Josh Merritt’s technical capabilities.

He knows his domain, and his findings on Iran are massive.

Everyone should be pressuring their legislators to DEMAND THE TRUTH. 16/25
Letter to Congress with these findings. 17/25

conservative-daily.com/election/concl…
With that in mind, I heard @ParikhClay express concern that they were drawing conclusions when delivering forensic findings.

This is an excellent point that needs to be considered. 18/25
Now, these findings should be able to be validated and the methods peer reviewed, etc.

This wasn’t legal testimony.

It was a presentation at CPAC meant to persuade people in the middle about foreign influence in our elections — you’re going to have to have a “so what.” 19/25
And, again, we weren’t the audience. This wasn’t meant to influence people that are already bought in on foreign influence in our elections. 20/25
I would like to see our side dig in & put the doubt to rest.

@ParikhClay @CannConActual @realjoeoltmann — since you’ve seen this first hand & have seen more — the findings appear explosive.

Just the findings presented today.

Are they explosive?

21/25
If so, why aren’t we talking about them?

Setting aside whether or not we like the messenger or his delivery, from my view these findings affirm:
- @KanekoaTheGreat’s reporting about Chinese servers via Konnech
(Cont) 22/25

open.substack.com/pub/kanekoa/p/…
- @idontexistTore’s affidavit from 2020 Toresays.com
- The architecture analysis done by @realjoeoltmann in late 2020
- The vulnerability & critical infrastructure assessments done by @ShawnSmith1776 in late 2020

***All in 2020 — all now known and indisputable***… twitter.com/i/web/status/1…
- All of @CannConActual’s election reporting.

canncon.substack.com
24/25
The work of Ed Solomon, Bobby Piton, Seth Keshel & so many others…

It’s affirmed by the findings revealed in the presentation from the Self Promoting Prick & Voldemort this morning.

Be pissed about the messenger, the scope, the delivery…

But what about the substance?

25/END

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Ashe in America

Ashe in America Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(