Forwarded from General Flynn ๏ธ
Trudeau called these people protecting their rights, freedoms and the very liberties each of us enjoy as free citizensโฆNazis! ๐ก๐จ๐ฆ๐บ๐ธ
๐ฅ109โค16๐16
Forwarded from General Flynn ๏ธ
This media is not supported in your browser
VIEW IN TELEGRAM
B_ _ _ _ _ _ probably doesnโt remember this statement by our President.
โค96๐ฅ54๐21๐1
Do not let the Washington State Democrats deny the horrific history that gun control laws have been used against Black and Brown Americans, Ethnic Minorities, First Nation members, as well as Women. These gun control laws have always been, are now, and will be in the future; horrifically racist and misogynistic. There is zero excuse.
https://web.archive.org/web/20220213155722/https://www.mtv.com/news/2900230/the-really-really-racist-history-of-gun-control-in-america/
Sen. Patty Kuderer to Sen Marko Liias pushing a bill that will prevent Washington residents from saving lives. Not just our own lives, but of Law Enforcement officers, as seen on 10 February 2022. Where two Peaceful Valley area residents defended Whatcom deputies who were shot. It was the actions of Civilians with firearms who saved the deputies from a suspect with a shotgun.
Attorney General Bob Ferguson's own requested report, done in 2018; denies what AG Ferguson wants. There is zero evidence that a magazine capacity limitation ban will save lives.
What is clear, is that the actions of the Washington state leadership does support, is the continued, intentional violation of Human Rights by forcing historic racist gun control laws that are maliciously mislabeled as "gun safety" or "public safety" while actively creating the environment where Rape victims are brutally assaulted by their attacker; Francisco Carranza-Ramirez; 35-year-old Francisco Carranza-Ramirez was charged with raping a woman in a wheelchair inside her White Center home in October of 2018, and pleaded guilty in February. (see archived link below)
So, when Sen. Patty Kuderer claims that "women's rights aren't gun rights" she is facilitating the rapes, domestic violence assaults, and murderers of Washington Women.
https://web.archive.org/web/20220213154441/https://www.yaktrinews.com/convicted-rapist-suspected-of-attacking-disabled-victim-again-in-washington-after-release/
https://web.archive.org/web/20220213155722/https://www.mtv.com/news/2900230/the-really-really-racist-history-of-gun-control-in-america/
Sen. Patty Kuderer to Sen Marko Liias pushing a bill that will prevent Washington residents from saving lives. Not just our own lives, but of Law Enforcement officers, as seen on 10 February 2022. Where two Peaceful Valley area residents defended Whatcom deputies who were shot. It was the actions of Civilians with firearms who saved the deputies from a suspect with a shotgun.
Attorney General Bob Ferguson's own requested report, done in 2018; denies what AG Ferguson wants. There is zero evidence that a magazine capacity limitation ban will save lives.
What is clear, is that the actions of the Washington state leadership does support, is the continued, intentional violation of Human Rights by forcing historic racist gun control laws that are maliciously mislabeled as "gun safety" or "public safety" while actively creating the environment where Rape victims are brutally assaulted by their attacker; Francisco Carranza-Ramirez; 35-year-old Francisco Carranza-Ramirez was charged with raping a woman in a wheelchair inside her White Center home in October of 2018, and pleaded guilty in February. (see archived link below)
So, when Sen. Patty Kuderer claims that "women's rights aren't gun rights" she is facilitating the rapes, domestic violence assaults, and murderers of Washington Women.
https://web.archive.org/web/20220213154441/https://www.yaktrinews.com/convicted-rapist-suspected-of-attacking-disabled-victim-again-in-washington-after-release/
MTV News
The (Really, Really) Racist History Of Gun Control In America
The origin of gun control โ and its impact on black Americans โ is being forgotten
๐66
Forwarded from Salon Bas Bleu (s h)
stop the mag ban house letter size v2.jpg
901.9 KB
Super Civic Action today on Super Bowl Sunday!
๐31
Please open Telegram to view this post
VIEW IN TELEGRAM
๐85๐5๐ข1
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ74๐12
Forwarded from Project Veritas
Media is too big
VIEW IN TELEGRAM
Project Veritas shows you UNSEEN deposition footage of NYTโs Editorial Writer Elizabeth Williamson during Defamation Lawsuit with Sarah Palin
#DeposeNYT
#DeposeNYT
๐25๐ฅ10
Forwarded from Project Veritas
Media is too big
VIEW IN TELEGRAM
NYT Senior Copy Editor Linda Cohn Under Oath: โOh My Godโฆ How Could We Get This Wrong?โ
#DeposeNYT
#DeposeNYT
๐39๐ฅ5๐1
Forwarded from Jack Posobiec
BREAKING: Multiple Freedom protesters arrested at Ambassador Bridge, vehicles towed https://thepostmillennial.com/freedom-protesters-ambassador-bridge-arrested?utm_campaign=64483
The Post Millennial
BREAKING: Freedom protesters arrested at Ambassador Bridge, vehicles towed
Windsor police said multiple freedom protesters were arrested and vehicles were towed just after dawn near the Ambassador Bridge.
๐ข44๐28๐3
Please open Telegram to view this post
VIEW IN TELEGRAM
๐32
Forwarded from Behizy
On February 2nd, Professor J. Alex Halderman sent his unredacted Dominion machine report to CISA and on the 4th he sent it to Dominion per the judge's authorization
Now both Dominion and CISA are filling emergency motions to keep the report sealed from the public
WHY?
Dominion specifically wants to prevent OAN, Newsmax & Fox News from seeing it.
Also opposing motions from Mike Lindell, Sidney Powell, Patrick Bryne and Rudy Guiliani
If they had nothing to hide, why the panic?
Now both Dominion and CISA are filling emergency motions to keep the report sealed from the public
WHY?
Dominion specifically wants to prevent OAN, Newsmax & Fox News from seeing it.
Also opposing motions from Mike Lindell, Sidney Powell, Patrick Bryne and Rudy Guiliani
If they had nothing to hide, why the panic?
๐66๐ฅ18
Forwarded from KanekoaTheGreat
Vice: Critical US Election Systems Have Been Left Exposed Online (Aug. 8, 2019)
The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been connected to the internet for months and possibly years, including in some swing states.
The systems the researchers found are made by Election Systems & Software, the top voting machine company in the country. They are used to receive encrypted vote totals transmitted via modem from ES&S voting machines on election night...
A New York Times story I wrote last year, however, showed that the modem transmissions do pass through the internet, and even an ES&S document that the company supplied to Rhode Island in 2015 calls the modem transmission of votes an โinternetโ transmission.
A document for modem transmissions from voting machines made by Dominion Voting Systemsโanother top voting machine company in the countryโsimilarly discusses TCP-IP and SSL, both protocols used for internet traffic.
โThe configurations show TCP-IP configuration and โSSL Optional,โ making it clear that at least the vendors know their systems are connecting through the internet, even if their election official customers do not realize it or continue to insist to the public that the systems are not connected to the internet,โ Skoglund said.
https://www.vice.com/en/article/3kxzk9/exclusive-critical-us-election-systems-have-been-left-exposed-online-despite-official-denials
@KanekoaTheGreat
The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been connected to the internet for months and possibly years, including in some swing states.
The systems the researchers found are made by Election Systems & Software, the top voting machine company in the country. They are used to receive encrypted vote totals transmitted via modem from ES&S voting machines on election night...
A New York Times story I wrote last year, however, showed that the modem transmissions do pass through the internet, and even an ES&S document that the company supplied to Rhode Island in 2015 calls the modem transmission of votes an โinternetโ transmission.
A document for modem transmissions from voting machines made by Dominion Voting Systemsโanother top voting machine company in the countryโsimilarly discusses TCP-IP and SSL, both protocols used for internet traffic.
โThe configurations show TCP-IP configuration and โSSL Optional,โ making it clear that at least the vendors know their systems are connecting through the internet, even if their election official customers do not realize it or continue to insist to the public that the systems are not connected to the internet,โ Skoglund said.
https://www.vice.com/en/article/3kxzk9/exclusive-critical-us-election-systems-have-been-left-exposed-online-despite-official-denials
@KanekoaTheGreat
VICE
Exclusive: Critical U.S. Election Systems Have Been Left Exposed Online Despite Official Denials
The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been connected to the internet for months and possibly years, including in some swing states.
๐28๐ฅ12
Forwarded from KanekoaTheGreat
Media is too big
VIEW IN TELEGRAM
Who unlocked the magnetic doors on the east side of the Capitol on January 6thโ
When George Tenney first tried to open them, both were locked. Then after he pointed at the doors and said something, the left door opened.
#SmokeyInsider #GreenSidesPack #ScruffyBouncer #January6
https://twitter.com/FreeStateWill/status/1487517697961345025
@KanekoaTheGreat
When George Tenney first tried to open them, both were locked. Then after he pointed at the doors and said something, the left door opened.
#SmokeyInsider #GreenSidesPack #ScruffyBouncer #January6
https://twitter.com/FreeStateWill/status/1487517697961345025
@KanekoaTheGreat
๐ฅ43๐2
Forwarded from KanekoaTheGreat
Voting Machines: What Could Possibly Go Wrong? (Nov. 5, 2018)
Elections Systems & Software, LLC, and Dominion Voting, account for about 80 percent of US election equipment. A third company, Hart Intercivic, whose e-slate machines have recently been reported to be flipping early votes in the current Senate race in Texas between Beto OโRourke and Ted Cruz, accounts for another 11 percent. The enormous reach of these three vendors creates an obvious vulnerability and potential target for a corrupt insider or outside hacker intent on wreaking havoc.
These vendors supply three main types of equipment that voters use at the polls: optical or digital scanners for counting hand-marked paper ballots, direct record electronic (usually touchscreen) voting machines, and ballot-marking devices that generate computer-marked paper ballots or โsummary cardsโ to be counted on scanners. Contrary to popular belief, all such equipment can be hacked via the Internet because all such equipment must receive programming before each election from memory cards or USB sticks prepared on the countyโs election management system, which connects to the Internet.
Thus, if an election management system is infected with malware, the malware can spread from that system to the memory cards and USB sticks, which then would transfer it to all voting machines, scanners, and ballot-marking devices in the county. Malicious actors could also attack election management systems via the remote access software that some vendors have installed in these systems. ES&S admitted earlier this year that it has installed remote access software in election management systems in 300 jurisdictions, which it refuses to identify.
The memory cards or USB sticks used to transfer the pre-election programming from the election management system to the voting machines, scanners, and ballot-marking devices constitute another potential attack vector. In theory, the person who distributes those cards or USB sticks to the precincts could swap them out for cards containing a vote-flipping program.
Memory cards are also used in the reverse directionโto transfer precinct tallies from the voting machines and scanners to the election management systemโs central tabulator, which aggregates those tallies. Problems can occur during this process, too.
The most worrisome aspect of all these various vulnerabilities is thatโshould they be exploitedโwe will be unable to prove whether and to what extent they have affected the outcome of an election.
https://web.archive.org/web/20210314182553/https://www.nybooks.com/daily/2018/11/05/voting-machines-what-could-possibly-go-wrong/
@KanekoaTheGreat
Elections Systems & Software, LLC, and Dominion Voting, account for about 80 percent of US election equipment. A third company, Hart Intercivic, whose e-slate machines have recently been reported to be flipping early votes in the current Senate race in Texas between Beto OโRourke and Ted Cruz, accounts for another 11 percent. The enormous reach of these three vendors creates an obvious vulnerability and potential target for a corrupt insider or outside hacker intent on wreaking havoc.
These vendors supply three main types of equipment that voters use at the polls: optical or digital scanners for counting hand-marked paper ballots, direct record electronic (usually touchscreen) voting machines, and ballot-marking devices that generate computer-marked paper ballots or โsummary cardsโ to be counted on scanners. Contrary to popular belief, all such equipment can be hacked via the Internet because all such equipment must receive programming before each election from memory cards or USB sticks prepared on the countyโs election management system, which connects to the Internet.
Thus, if an election management system is infected with malware, the malware can spread from that system to the memory cards and USB sticks, which then would transfer it to all voting machines, scanners, and ballot-marking devices in the county. Malicious actors could also attack election management systems via the remote access software that some vendors have installed in these systems. ES&S admitted earlier this year that it has installed remote access software in election management systems in 300 jurisdictions, which it refuses to identify.
The memory cards or USB sticks used to transfer the pre-election programming from the election management system to the voting machines, scanners, and ballot-marking devices constitute another potential attack vector. In theory, the person who distributes those cards or USB sticks to the precincts could swap them out for cards containing a vote-flipping program.
Memory cards are also used in the reverse directionโto transfer precinct tallies from the voting machines and scanners to the election management systemโs central tabulator, which aggregates those tallies. Problems can occur during this process, too.
The most worrisome aspect of all these various vulnerabilities is thatโshould they be exploitedโwe will be unable to prove whether and to what extent they have affected the outcome of an election.
https://web.archive.org/web/20210314182553/https://www.nybooks.com/daily/2018/11/05/voting-machines-what-could-possibly-go-wrong/
@KanekoaTheGreat
The New York Review of Books
Voting Machines: What Could Possibly Go Wrong?
United States elections are not evidence-based elections. Only two states, Colorado and New Mexico, conduct manual audits sufficiently robust to detect vote tally manipulation. Depending on the type of voting system used, some jurisdictions may have no paperโฆ
๐ฅ24๐10