CISA was hacked, and how this relates to YOUR local county! CISA is under the Department of Homeland Security. Then CIS is a private corporation founded by the federal govt (CISA and DHS). They and their partners in crime have contracts with counties across Wisconsin and the USA to “protect” the counties’ IT computer networks from ransomware, hackers, and malicious code. The private yet federal government-controlled CIS subcontracts with Crowdstrike – yes, that Crowdstrike. The company that set up Hillary Clinton’s servers in the closet at her home. Then, when the FBI told Crowdstrike to give them those servers, Crowdstrike took them and hid them in a warehouse. And CIS subcontracts with Endpoint Services (depending on your geographic location in the USA). One or more of Crowdstrike, CIS, CISA, DHS Endpoint, Falcon Services, Albert Sensor has complete access to your county's computer network. They can see everything; they know and have access to every single IP address of your county – it is in the contract(s). Note there are different levels; sometimes the “service” is provided free, and other counties pay for it. Albert Sensor, Falcon Device, Endpoint Services, Crowdstrike, Firstnet, OneNet. Do public records with your county for these contracts. Firstnet and/or OneNet also carry the 911 service and Emergency Response communications. CISA is piggybacking on one or both of those. Educate your county supervisors as to what is going on. The Feds can see EVERYTHING in your county’s business. Yes, the voting results also, before anyone else. This is how you stop all this: these are really insurance contracts. Yet none of these entities are licensed insurance brokers or companies. Gather the contracts, educate your county supervisors, file an official complaint to your state’s insurance commission, copy your county supervisors. Your county is really breaking the law also as they have no authority to enter into an illegal contract. "CISA hacked via Ivanti vulnerabilities: The US cybersecurity agency CISA took two of its systems offline last month after discovering that they had been compromised through the exploitation of vulnerabilities in Ivanti products, The Record reported. The impacted devices were reportedly associated with systems that house critical chemical sector information. It’s unclear if the attackers targeted CISA’s Ivanti devices as part of a targeted attack, and whether any information was compromised." From: Security Week, CyberSecurity News, Insight and Analysis, March 15, 2024. #CISA #AlbertSensor #DHS #CIS @elonmusk @EmeraldRobinson
~T edit: Only challenge I have to this mostly factual post from X is that the [hrc]'s servers were actually set up by [goog]'s own ceo, Eric Schmidt in NoKo in 2015-16. The rest of the players, including all in the above had direct involvement.
I've discussed all this before here.
https://twitter.com/TrueNorth444/status/1770304009011855619?t=tn7Nyo89aACHdt8_x2duHw&s=19
~T edit: Only challenge I have to this mostly factual post from X is that the [hrc]'s servers were actually set up by [goog]'s own ceo, Eric Schmidt in NoKo in 2015-16. The rest of the players, including all in the above had direct involvement.
I've discussed all this before here.
https://twitter.com/TrueNorth444/status/1770304009011855619?t=tn7Nyo89aACHdt8_x2duHw&s=19
X (formerly Twitter)
True North (@TrueNorth444) on X
Add to this, the fact that the Automatic Voter Registrations taking place at your DMV - guess who registered the domains?
—>CISA
So effectively, all of your private information at the DMV was also hacked - the same entity involved in Voter Registrations.…
—>CISA
So effectively, all of your private information at the DMV was also hacked - the same entity involved in Voter Registrations.…