CrowdStrike poised to steal Nov. 5th election

Who is CrowdStrike?

The software company controls America’s cybersecurity, including elections.

Details are in this story dated March 15th:

https://nakedtruth.news/nakedtruthnews/cgi-stephen-zakowicz-julie-ziegler-dhs-contractors-dominion-voting-elections-california-mitigation-diagnostics-continuous-cisa-dhs-homeland-security-rov-sbcounty-sos-ca-ga-mi-crowdstrike-rob-sheldon?rq=crowdstrike

CrowdStrike is the Giant Black Widow Spider at the center of the nation’s cyber web.

They are poised to steal the Presidential Election on November 5th.

How?

CrowdStrike’s contract with county election boards explains it.

The contract, updated on February 1st, is linked here:

`https://www.cisecurity.org/terms-and-conditions-table-of-contents/cis-endpoint-security-services-via-crowdstrike

A disconnected Albert server in Lincoln County, Washington.

Albert sensors are installed to inspect and monitor all state election data in both directions.

https://statetechmagazine.com/article/2019/11/states-can-get-election-security-assist-albert-sensors

https://www.cisecurity.org/services/albert-network-monitoring

According to a clause in Election Board contracts, CrowdStrike has legal rights to its voter and employee personal identifying information (PII) database.

It permits this data to be transferred internationally.

And sold multiple times to the highest bidders.

This clause is imaged here:

https://www.cisecurity.org/terms-and-conditions-table-of-contents/cis-endpoint-security-services-via-crowdstrike

What are examples of personally identifiable information (PII)?

According to the Pentagon, examples of personally identifiable information (PII) include :

  • Social security number (SSN), passport number, driver's license number, taxpayer identification number, patient identification number, and financial account or credit card number

  • Personal address and phone number

  • Biometric records such as photographic images (especially of the face or another distinguishing characteristic), x-rays, fingerprints, retina scans, voice signatures, facial geometry

  • Information that, when combined with other information like that listed above, can then be used collaboratively to identify a specific individual. For example, date of birth, place of birth, race, religion, geographical indicators, employment information, medical information, education information, and financial information.

https://dpcld.defense.gov/Privacy/About-the-Office/FAQs/#2

Executive Order 14117, dated February 28th, became law on March 28th.

Details are in this story:

https://nakedtruth.news/nakedtruthnews/pii-personally-identifiable-information-executive-order-biden-americans-sensitive-personal-data?rq=pii

The new law legalizes identity theft.

Three million fraudulent voter registrations were found in an audit of New York State’s 2020 election results.

Invalid registrations are used to create phony mail-in ballots through secret, undetectable programming in the voter rolls.

Details are in this story:

  • Dominion’s Dell-VMware covertly steals elections

https://nakedtruth.news/nakedtruthnews/malaysia-dominion-vmware-flips-covertly-votes-steal-elections-dell-virtual-machine-vm-byrne-ballot-scanners-change-becker-marc-elias-democracydocket-david-cartercenter-mayer-jonathan-mail-in-absentee?rq=vmware

These fraudulent voter registration software systems operate independently of any on-site County Board of Elections equipment or software.

Valid registration voter registration lists can be fraudulently replicated as many as a dozen times.

Fake mail-in ballots are then created and counted as votes.

That was one method used to steal the 2020 Election.

False mail-in ballots will be used again to steal the Nov. 5th Election.

Details are in these stories:

  • Three million fraudulent voter registrations found in NY election audit

https://nakedtruth.news/nakedtruthnews/three-million-votes-verified-fraudulent-ny-2020-election-auditny-usps-marly-hornik-citizens-audit-truethevote-hillary-lawyer-marc-elias-identity-theft-mail-in-ballots-drop-boxes-cybercom-nsa-dod?rq=hornik

  • Elections are stolen using mail-in ballots

https://nakedtruth.news/nakedtruthnews/hillary-marc-elias-runbeck-konnech-scytl-drop-boxes-usps-azcentral-protocol-china-eugene-yu-dod-pentagon-elections-stolen-mail-in-ballots-malaysia-blackrock-donilon-cathy-russell-panasonic?rq=mail-in

  • Hillary’s lawyer controls U.S. Mail’s “Election Strike Team” to rig the Nov. 8th Election with fake mail-in ballots

https://nakedtruth.news/nakedtruthnews/ap-cnn-marcelias-marc-elias-hillary-russian-dossier-usps-mail-strike-teams-rig-plant-crossfire-hurricane-marti-johnson-pelosi-schumer-biden-hr-3076-washingtonpost-usatoday-perkinscoie-fusion-102417?rq=mail-in

According to the CrowdStrike contract, the devices include “but are not limited to”:

  • mobile monitors

  • phones

  • tablets

  • and other Android and iOS devices.

This contract provision has been imaged here:

Other co-conspirators in the plot to steal November 5th are named in the CrowdStrike Election Board contracts.

They are ES&S, CISA, and CIS.

ES&S manufactures and sells voting machine equipment and services.

It has a market share of 60% of America’s voting machine systems.

Other fraudulent voting systems like Dominion and HartIntercivic have a 28% market share.

CIS is a for-profit business that masquerades as a non-profit.

Their Sales Manager is Lee Noriega.

https://www.cisecurity.org/about-us/leadership/lee-noriega

Non-profits are exempt from:

  • public information requests

  • disclosure of its donors

CISA is part of the Department of Homeland Security (DHS).

It stands for Cybersecurity and Infrastructure Security Agency.

https://www.essvote.com/media-resources/hearing-election-security-ess-statement/

ES&S customers think they are dealing with just them.

They aren’t.

They are dealing with CrowdStrike too.

ES&S has clearance from Homeland Security to have their election data and votes tabulated at Idaho Labs.

Idaho National Labs is part of the U.S. Department of Energy.

https://inl.gov/feature-story/from-copper-wires-to-supercomputers/

U.S. Dominion Voting Systems does, too.

Details are in this story:

https://nakedtruth.news/nakedtruthnews/idaho-labs-tabulates-dominion-votes-tabulate-battelle-biolabs-china-ft-detrick-jehs-kuh-coomer-eric-inl-national-cnn-dar-leaf-stefanie-lambert-tunnell-

More details of the partnership between ES&S, Homeland Security (DHS), and CISA are in this 14-page letter to Congress dated March 26th, 2019, from Tom Burt, CEO of ES&S :

Page Two of 14 Pages

https://s3.amazonaws.com/dl.ncsbe.gov/State_Board_Meeting_Docs/2019-07-28/Certification/Voting%20System%20Certification/ESS/FW_%20%5BExternal%5D%20ES%26S%20Responds%20to%20Senators'%20Letter.pdf

The Center for Internet Security (CIS) runs the Security Operations Center in East Greenbush, NY, six miles southwest of Albany, the capital of New York.

CIS has access to 13,000 government organizations and their data bases.

According to their website linked here:

https://www.cisecurity.org/ms-isac

A two minute look Inside the U.S. Election Cyber Security Center.

Arlington, VA, Oct. 30th, 2020, only AP had access

https://newsroom.ap.org/editorial-photos-videos/detail?itemid=6fc76ee1399342a8a44391bf533ad8ad&mediatype=video&source=youtube

Previous
Previous

Supreme Court hears 80 of the 8,000 cases it reviews

Next
Next

Uranium One convict’s release date is on May 31st