Forwarded from General Flynn ️
Trudeau called these people protecting their rights, freedoms and the very liberties each of us enjoy as free citizens…Nazis! 😡🇨🇦🇺🇸
🔥109❤16👍16
Forwarded from General Flynn ️
This media is not supported in your browser
VIEW IN TELEGRAM
B_ _ _ _ _ _ probably doesn’t remember this statement by our President.
❤96🔥54👍21👎1
Do not let the Washington State Democrats deny the horrific history that gun control laws have been used against Black and Brown Americans, Ethnic Minorities, First Nation members, as well as Women. These gun control laws have always been, are now, and will be in the future; horrifically racist and misogynistic. There is zero excuse.
https://web.archive.org/web/20220213155722/https://www.mtv.com/news/2900230/the-really-really-racist-history-of-gun-control-in-america/
Sen. Patty Kuderer to Sen Marko Liias pushing a bill that will prevent Washington residents from saving lives. Not just our own lives, but of Law Enforcement officers, as seen on 10 February 2022. Where two Peaceful Valley area residents defended Whatcom deputies who were shot. It was the actions of Civilians with firearms who saved the deputies from a suspect with a shotgun.
Attorney General Bob Ferguson's own requested report, done in 2018; denies what AG Ferguson wants. There is zero evidence that a magazine capacity limitation ban will save lives.
What is clear, is that the actions of the Washington state leadership does support, is the continued, intentional violation of Human Rights by forcing historic racist gun control laws that are maliciously mislabeled as "gun safety" or "public safety" while actively creating the environment where Rape victims are brutally assaulted by their attacker; Francisco Carranza-Ramirez; 35-year-old Francisco Carranza-Ramirez was charged with raping a woman in a wheelchair inside her White Center home in October of 2018, and pleaded guilty in February. (see archived link below)
So, when Sen. Patty Kuderer claims that "women's rights aren't gun rights" she is facilitating the rapes, domestic violence assaults, and murderers of Washington Women.
https://web.archive.org/web/20220213154441/https://www.yaktrinews.com/convicted-rapist-suspected-of-attacking-disabled-victim-again-in-washington-after-release/
https://web.archive.org/web/20220213155722/https://www.mtv.com/news/2900230/the-really-really-racist-history-of-gun-control-in-america/
Sen. Patty Kuderer to Sen Marko Liias pushing a bill that will prevent Washington residents from saving lives. Not just our own lives, but of Law Enforcement officers, as seen on 10 February 2022. Where two Peaceful Valley area residents defended Whatcom deputies who were shot. It was the actions of Civilians with firearms who saved the deputies from a suspect with a shotgun.
Attorney General Bob Ferguson's own requested report, done in 2018; denies what AG Ferguson wants. There is zero evidence that a magazine capacity limitation ban will save lives.
What is clear, is that the actions of the Washington state leadership does support, is the continued, intentional violation of Human Rights by forcing historic racist gun control laws that are maliciously mislabeled as "gun safety" or "public safety" while actively creating the environment where Rape victims are brutally assaulted by their attacker; Francisco Carranza-Ramirez; 35-year-old Francisco Carranza-Ramirez was charged with raping a woman in a wheelchair inside her White Center home in October of 2018, and pleaded guilty in February. (see archived link below)
So, when Sen. Patty Kuderer claims that "women's rights aren't gun rights" she is facilitating the rapes, domestic violence assaults, and murderers of Washington Women.
https://web.archive.org/web/20220213154441/https://www.yaktrinews.com/convicted-rapist-suspected-of-attacking-disabled-victim-again-in-washington-after-release/
MTV News
The (Really, Really) Racist History Of Gun Control In America
The origin of gun control — and its impact on black Americans — is being forgotten
👍66
Forwarded from Salon Bas Bleu (s h)
stop the mag ban house letter size v2.jpg
901.9 KB
Super Civic Action today on Super Bowl Sunday!
👍31
Please open Telegram to view this post
VIEW IN TELEGRAM
👎85👍5😢1
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥74👍12
Forwarded from Project Veritas
Media is too big
VIEW IN TELEGRAM
Project Veritas shows you UNSEEN deposition footage of NYT’s Editorial Writer Elizabeth Williamson during Defamation Lawsuit with Sarah Palin
#DeposeNYT
#DeposeNYT
👍25🔥10
Forwarded from Jack Posobiec
BREAKING: Multiple Freedom protesters arrested at Ambassador Bridge, vehicles towed https://thepostmillennial.com/freedom-protesters-ambassador-bridge-arrested?utm_campaign=64483
The Post Millennial
BREAKING: Freedom protesters arrested at Ambassador Bridge, vehicles towed
Windsor police said multiple freedom protesters were arrested and vehicles were towed just after dawn near the Ambassador Bridge.
😢44👎28👍3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍32
Forwarded from Behizy
On February 2nd, Professor J. Alex Halderman sent his unredacted Dominion machine report to CISA and on the 4th he sent it to Dominion per the judge's authorization
Now both Dominion and CISA are filling emergency motions to keep the report sealed from the public
WHY?
Dominion specifically wants to prevent OAN, Newsmax & Fox News from seeing it.
Also opposing motions from Mike Lindell, Sidney Powell, Patrick Bryne and Rudy Guiliani
If they had nothing to hide, why the panic?
Now both Dominion and CISA are filling emergency motions to keep the report sealed from the public
WHY?
Dominion specifically wants to prevent OAN, Newsmax & Fox News from seeing it.
Also opposing motions from Mike Lindell, Sidney Powell, Patrick Bryne and Rudy Guiliani
If they had nothing to hide, why the panic?
👍66🔥18
Forwarded from KanekoaTheGreat
Vice: Critical US Election Systems Have Been Left Exposed Online (Aug. 8, 2019)
The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been connected to the internet for months and possibly years, including in some swing states.
The systems the researchers found are made by Election Systems & Software, the top voting machine company in the country. They are used to receive encrypted vote totals transmitted via modem from ES&S voting machines on election night...
A New York Times story I wrote last year, however, showed that the modem transmissions do pass through the internet, and even an ES&S document that the company supplied to Rhode Island in 2015 calls the modem transmission of votes an “internet” transmission.
A document for modem transmissions from voting machines made by Dominion Voting Systems—another top voting machine company in the country—similarly discusses TCP-IP and SSL, both protocols used for internet traffic.
“The configurations show TCP-IP configuration and ‘SSL Optional,’ making it clear that at least the vendors know their systems are connecting through the internet, even if their election official customers do not realize it or continue to insist to the public that the systems are not connected to the internet,” Skoglund said.
https://www.vice.com/en/article/3kxzk9/exclusive-critical-us-election-systems-have-been-left-exposed-online-despite-official-denials
@KanekoaTheGreat
The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been connected to the internet for months and possibly years, including in some swing states.
The systems the researchers found are made by Election Systems & Software, the top voting machine company in the country. They are used to receive encrypted vote totals transmitted via modem from ES&S voting machines on election night...
A New York Times story I wrote last year, however, showed that the modem transmissions do pass through the internet, and even an ES&S document that the company supplied to Rhode Island in 2015 calls the modem transmission of votes an “internet” transmission.
A document for modem transmissions from voting machines made by Dominion Voting Systems—another top voting machine company in the country—similarly discusses TCP-IP and SSL, both protocols used for internet traffic.
“The configurations show TCP-IP configuration and ‘SSL Optional,’ making it clear that at least the vendors know their systems are connecting through the internet, even if their election official customers do not realize it or continue to insist to the public that the systems are not connected to the internet,” Skoglund said.
https://www.vice.com/en/article/3kxzk9/exclusive-critical-us-election-systems-have-been-left-exposed-online-despite-official-denials
@KanekoaTheGreat
VICE
Exclusive: Critical U.S. Election Systems Have Been Left Exposed Online Despite Official Denials
The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been connected to the internet for months and possibly years, including in some swing states.
👍28🔥12
Forwarded from KanekoaTheGreat
Media is too big
VIEW IN TELEGRAM
Who unlocked the magnetic doors on the east side of the Capitol on January 6th❓
When George Tenney first tried to open them, both were locked. Then after he pointed at the doors and said something, the left door opened.
#SmokeyInsider #GreenSidesPack #ScruffyBouncer #January6
https://twitter.com/FreeStateWill/status/1487517697961345025
@KanekoaTheGreat
When George Tenney first tried to open them, both were locked. Then after he pointed at the doors and said something, the left door opened.
#SmokeyInsider #GreenSidesPack #ScruffyBouncer #January6
https://twitter.com/FreeStateWill/status/1487517697961345025
@KanekoaTheGreat
🔥43👍2
Forwarded from KanekoaTheGreat
Voting Machines: What Could Possibly Go Wrong? (Nov. 5, 2018)
Elections Systems & Software, LLC, and Dominion Voting, account for about 80 percent of US election equipment. A third company, Hart Intercivic, whose e-slate machines have recently been reported to be flipping early votes in the current Senate race in Texas between Beto O’Rourke and Ted Cruz, accounts for another 11 percent. The enormous reach of these three vendors creates an obvious vulnerability and potential target for a corrupt insider or outside hacker intent on wreaking havoc.
These vendors supply three main types of equipment that voters use at the polls: optical or digital scanners for counting hand-marked paper ballots, direct record electronic (usually touchscreen) voting machines, and ballot-marking devices that generate computer-marked paper ballots or “summary cards” to be counted on scanners. Contrary to popular belief, all such equipment can be hacked via the Internet because all such equipment must receive programming before each election from memory cards or USB sticks prepared on the county’s election management system, which connects to the Internet.
Thus, if an election management system is infected with malware, the malware can spread from that system to the memory cards and USB sticks, which then would transfer it to all voting machines, scanners, and ballot-marking devices in the county. Malicious actors could also attack election management systems via the remote access software that some vendors have installed in these systems. ES&S admitted earlier this year that it has installed remote access software in election management systems in 300 jurisdictions, which it refuses to identify.
The memory cards or USB sticks used to transfer the pre-election programming from the election management system to the voting machines, scanners, and ballot-marking devices constitute another potential attack vector. In theory, the person who distributes those cards or USB sticks to the precincts could swap them out for cards containing a vote-flipping program.
Memory cards are also used in the reverse direction—to transfer precinct tallies from the voting machines and scanners to the election management system’s central tabulator, which aggregates those tallies. Problems can occur during this process, too.
The most worrisome aspect of all these various vulnerabilities is that—should they be exploited—we will be unable to prove whether and to what extent they have affected the outcome of an election.
https://web.archive.org/web/20210314182553/https://www.nybooks.com/daily/2018/11/05/voting-machines-what-could-possibly-go-wrong/
@KanekoaTheGreat
Elections Systems & Software, LLC, and Dominion Voting, account for about 80 percent of US election equipment. A third company, Hart Intercivic, whose e-slate machines have recently been reported to be flipping early votes in the current Senate race in Texas between Beto O’Rourke and Ted Cruz, accounts for another 11 percent. The enormous reach of these three vendors creates an obvious vulnerability and potential target for a corrupt insider or outside hacker intent on wreaking havoc.
These vendors supply three main types of equipment that voters use at the polls: optical or digital scanners for counting hand-marked paper ballots, direct record electronic (usually touchscreen) voting machines, and ballot-marking devices that generate computer-marked paper ballots or “summary cards” to be counted on scanners. Contrary to popular belief, all such equipment can be hacked via the Internet because all such equipment must receive programming before each election from memory cards or USB sticks prepared on the county’s election management system, which connects to the Internet.
Thus, if an election management system is infected with malware, the malware can spread from that system to the memory cards and USB sticks, which then would transfer it to all voting machines, scanners, and ballot-marking devices in the county. Malicious actors could also attack election management systems via the remote access software that some vendors have installed in these systems. ES&S admitted earlier this year that it has installed remote access software in election management systems in 300 jurisdictions, which it refuses to identify.
The memory cards or USB sticks used to transfer the pre-election programming from the election management system to the voting machines, scanners, and ballot-marking devices constitute another potential attack vector. In theory, the person who distributes those cards or USB sticks to the precincts could swap them out for cards containing a vote-flipping program.
Memory cards are also used in the reverse direction—to transfer precinct tallies from the voting machines and scanners to the election management system’s central tabulator, which aggregates those tallies. Problems can occur during this process, too.
The most worrisome aspect of all these various vulnerabilities is that—should they be exploited—we will be unable to prove whether and to what extent they have affected the outcome of an election.
https://web.archive.org/web/20210314182553/https://www.nybooks.com/daily/2018/11/05/voting-machines-what-could-possibly-go-wrong/
@KanekoaTheGreat
The New York Review of Books
Voting Machines: What Could Possibly Go Wrong?
United States elections are not evidence-based elections. Only two states, Colorado and New Mexico, conduct manual audits sufficiently robust to detect vote tally manipulation. Depending on the type of voting system used, some jurisdictions may have no paper…
🔥24👍10
Forwarded from KanekoaTheGreat
New York Governor Kathy Hochul unmasked for a Broadway red carpet appearance two days after saying she is "not ready" to lift mask mandates for school children.
@KanekoaTheGreat
@KanekoaTheGreat
👎88👍3🔥1