Mike Lindell: absolute proof !!

3 years ago
315

But what we are seeing here if we look at these charts is that there were cybersecurity experts who began collecting information on November 1st. They collected terabytes of information before, during, and after the election… which document the foreign intrusion and fraud that happened. This was documented from 2995 counties in the United States and was collected in realtime. In the first column it shows the time and IP address of the hacker. The second column is the owner or source of that IP address. It shows the ID of the computer that entered into our election. The next is the target IP address. The next is the target state and county. And then the ID address of another computer in the United States. The next column is the method. Ie: using credentials or broke through the firewall. The next column is whether it is successful. Sometimes it is not successful. In the final column is the votes changed. In Emmett country election they stole thousands of votes from Donald Trump and gave it to Joe Biden. We see multiple intrusions into our election. You’ll notice over 66% of these intrusions come from China. Why is this important. Somethings were set in place during the COVID 19 virus. So each one of these is proof of identification of what took place at which time.
This is forensic evidence showing the hacking attempts of our election showing exactly where they came from and what they did. They show which computer exactly in what state and what county. It also shows the votes they stole from Donald Trump.
Every one was Donald Trump down, down, down.
This is the biggest attack in history. There are thousands of pages of every single attack. We see this from multiple places across China, but also from Iran.. this is the threat to our election. And give us the exact totals that Trump actually got. Trump won 79 million votes and Biden got 68 million. And that is not counting all the other kind of fraud that happened during the election.
This is a graphical representation of the hacking of our election from before the election until after the election. They documented the footprints of the foreign intrusion. Foreign powers chose who would rule in our country.
The cybersecurity battlefield was planned beforehand. This was an act of war by our foreign adversaries. The video will show it. This is the surveillant system that was built by the cybersecurity teams. They built these tools to keep this country safe. Every line the IP dresses on the chart.
It is the documentation of the realtime theft of our elections.
This type of information was given to James COmey in 2015. They knew our election machines were open to hacking. It is important to understand is that there are algorithms which steal the votes at the transfer point. That is between the machines and the secretary of the state office.

Loading 1 comment...