Friday, October 4, 2024
Reporting that matters

Election fraud case documents accuse over 20 Chinese companies of cyberattack. Data outlines method of attack, network details, specific manipulation allegations and more in evidence package

How did a pillow salesman obtain a robust package of cybersecurity data? That’s the first question we have when looking…

By Mike Johnson , in Politics US World , at June 25, 2021 Tags: , ,

How did a pillow salesman obtain a robust package of cybersecurity data? That’s the first question we have when looking at this document and others filed in Lindell v. US Dominion, Inc in a district court in Minneapolis.

To clarify, this reporting neither supports or denies any validity of the content provided. We are only confirming that these documents do in fact exist and encourage our readers to do their own research.

The case, filed originally on June 3rd, 2021, contains one specific piece of evidence from Mike Lindell that we didn’t expect to see. The report filed alleges a cyberattack from Chinese, Ukrainian and South Korean networks providing incredibly explicit details about those networks, companies and methods of entry into county voting machines across the United States.

Support the national challenger by donating cryptocurrency with the button below.

We think it’s worth noting that the data provided is not vague in any capacity, and honestly I think it’s worth understanding where this data was gained. We’ll highlight some examples below.

Page 3 of 8 provides details including coordinates, source ip addresses, cities and provinces in multiple countries but mainly china. The time data is specific to the minute.
Page 4 seems to highlight specific networks.
Page 5 highlights the network registrations. This is an extremely in-depth reporting as it ties the financial entities connected to these networks by name.
Page 6 highlights the network codes and the target ip addresses for the attacks, and the state that those targets are in. It’s worth noting that these states are all swing states, and most of the focus is on Michigan and Pennsylvania.
Page 7 of this document highlights the alleged method of access to the network, highlighting the specific vulnerability. Many of these attacks are alleged to have used credentials as an intrusion method.
Page 8 is arguably the most controversial as it alleges the specific amount of votes manipulated and which candidate they were manipulated against.

Regardless of the validity of these accusations, it’s hard to deny that the data presented lacks detail, as it covers nearly every single aspect imaginable and appears to be state of the art in terms of the data collected on what the documents and allege.

Overall, it’s been 8 months since the 2020 election day and there is still a flurry of legal action taking place surrounding it, the sooner we discuss and highlight the validity or lack of validity to these claims, the sooner America can heal.