BNN - Brandenburg News Network

BNN (Brandenburg News Network) 6/17/2024 BREAKING Election Investigation Jeff Buongiorno&Bob Terry

Published June 17, 2024, 9:48 a.m.

9am Jeff Buongiorno and a team of cyber experts have been investigating the crisis in our election infrastructure! Recently the information went viral and we will discuss current acceleration in information uncovering the fraud and theft in failed processes in our elections. Jeff Buongiorno is a cyber and data consultant who has worked in the IT field for over 30 years. Jeff built a successful Cyber company that works with US Manufactures in implementing business process and computer systems to accommodate the processes. Jeff accumulated over 100 IT certifications throughout his career and considers himself to be a jack of trade and Master of none. He is currently running for US Congress FL District 21 for a second time. Jeff has been an election reform activist since Nov 4th, 2020. Today we'll discuss a National Crisis caused by vulnerabilities in our election infrastructure. We will try to connect the dots between a vulnerable election infrastructure and the anomalies found in the data, some reaching the odds as farfetched as one in 15 trillion. 9:30am BREAKING NEWS - Election Compromise Exposed - Robert Terry. The only individual in the history of U.S. information technology (IT), who designed, patented and personally developed (wrote 100% of the proprietary source code) that comprised the software cybersecurity solution deployed throughout the White House Executive Office of the President (EoP), (2001-2008), which was also utilized by the CIA who managed the Weapons of Mass Destruction (WMD) Commission (2001-2006). Based the principles of the HUMAN IMMUNE SYTEM, and never required anti-virus updates. Featured in Federal Computer Week Magazine and PC World Magazine.  The FCW magazine article CONFIRMS that the White House solution worked so well that it “caused a fight” to emerge between the USGOV offensive groups who attack networks, and the defensive group who defends networks. (Please read the last 3 paragraphs of the FCW article)  Worked side-by-side with the former Senior Security Program Manager of Microsoft worldwide (Dr John Michener), who reported to Bill Gates. Featured in Computer World Magazine.  Upon the defection of Edward Snowden in 2013, the CIA Wikileaks that began in 2014/2017, and the stolen NSA tools in 2016, have been studying all leaked top secret documentation that specifically discusses offensive programming methods/communication techniques in order to target, penetrate, circumvent/bypass network defense/detection technologies. X/Twitter: Rumble:

Transcript in English (auto-generated)

Okay, good morning, and welcome to Brandenburg News Network. I am Donna Brandenburg, and this is our second shot at it this morning, everyone. Please pass this. I'm waiting for Bob to come back on, but I posted something in my Telegram channel, which I think is really important. So Jeff and Bob are both cybersecurity experts, and I believe we're running now. I'm going to check a few other things out here to make sure that we got this. But once again, go ahead and hit us. We're just going to keep coming back. And I know it's going to piss some people off, but so be it. Get on the right side of the world here. So this is what Bob did is he actually put some diagnostics on what was happening. And he said at the end of Jeff's segment and right before I was to start, the communications were disrupted by an incredible amount of noise appearing within communication streams. I attached one of my network scopes to monitor the integrity of the connection, and the noise started. I traced the noise back to an animizer, which cloaks the IP address, and they are used by hackers, et cetera, and governments. What a bunch of assholes. Yes, they are. But the great thing is, is guess what? We're just going to keep coming back. So let me make sure that my rebel channels are up here a minute. I'm hoping that. that it didn't end. Nope, we're still there. So, hey, welcome back. See if we'll re-engage everybody. We did not give up on this. So hopefully everybody will come back in and and stay with us again. I really do think that it's an important, that it is an important. So pass the link on to everyone because this was, clearly this is one of those things that they did not want to have happen. So somebody hacked into this and attacked us. And you know what, working in the world of technology, It's not something that we don't expect, especially if you're over the target. They're going to try to censor us. They're going to try to knock us out. They're going to try to get rid of us. And that's just the way the world works. And so when they do knock us down, when they do try to silence us and take us up, we have to come back and continue on. I didn't even start new Rumble links. I just went back in once I fixed it on the other end. I did start a new stream, and that seems to be where they were hacking us and where it was broken. So right now I'm just going to wait for Bob to come back on, and then I think we're going to be okay. So had a really interesting weekend at Turning Point, so we're waiting for Bob. Hang on a minute. Okay. Please pass the link on. All right. So he had a really interesting time at Turning Point Action. It was a wonderful time. I'll bring up, I'm going to bring up while waiting for Bob here. I'm going to wait. Let's see. I'm going to, he said he had a couple minutes before he can get back on. So that's okay. We'll bring up my Telegram channel. I had a really nice time. I met Laura Trump last week, Wednesday. And I got to tell you, I really like Laura Trump. I think she's smart. She's articulate and she's smart. She gave a wonderful, wonderful presentation at the Macomb County Republicans Lincoln Day Dinner. Had a great time there with friends. So that was big fun. And here's what Bob wrote out. And I'm going to see if we can bring Bob on. I'm assuming that everything's fixed now. So so that's what that's what Bob wrote. And I'll bring Bob on here a minute. Hey, Bob, how are you? Hi. There you go. It's fixed. Yeah, that was interesting, wasn't it? Yeah, that was a complete and total attack. And I'm amused. I'm actually very amused by it. I think that what we'll have to do is we'll have to go back and edit the rumble segments and such and re-up this. But I kind of expect it because what people don't understand when you're working in technology, you know, we have a little tech company and such, is that you get used to these cyber attacks. And when you're over the target on stuff, you may have a little glitch, but there's always ways to get around it if you're willing to stay with it and be persistent. It's a persistence thing. And so when they were attacking us before and I warned everybody, I said, just I'm like, stop messing with me. Only I didn't use that word because I said, we will come back and we will come back bigger. And you're going to be playing whack-a-mole with us. You can. You can try to disrupt it. It doesn't matter if you disrupt things that we're working on. We're going to come back. We're going to continue to come back. We're going to re-up what we have. And if people can't stay with that, well, they're probably not. qualified to be in the fight. You know, you know what I mean? When, if you're going to be in the fight to restore this nation, that means that you don't give up. You don't back down when things get tough, you just work harder. You don't back away from it, throw your hands up and say, Oh, whatever shall I do? You, you figure it out and come back harder. And I really do believe that. Can I make a comment? Sure. The truth is Donna, absolutely everything you said is correct, but I found what you just said to be something that's required to do anything of substance and cyber. I mean, it's just hard work. Yes. And, you know, it's, it's the oldest analogy in the whole world. You know, if anything's worth having, then you're going to have to work. I mean, you're going to, you're going to have to work. That's all there is to it. And, uh, you know, for me in my lifetime and what I experienced, it, it's a lot of work, but it's been great therapy. So, um, I'm just not afraid of the work, but there's so many people in this country. I hate to say this. They're weak and lazy. I'm going to say it. The easy button, like the old, what was it? The staples commercial or whatever hit the easy button. And, you know, I mean, anyway, you don't want to get me started on this. I do want to get you started on it because I actually had something that happened this weekend that I'm still mulling over because I have a hard time with people that are quitters. and and that's that's the reality of the the donna brandenburg world I'm trying to restore I shut everything down when I restarted this but I'm I'm just going to tell you what I i have very little little patience or respect for people who are quitters I just it's it's just my in my personal and once somebody quits or walks away from a challenge I usually don't give them the second chance because they've proven that they're too weak. Honestly, they're proven that they're too weak to handle things when it gets really tough. And that may sound like a really hard stand on things. I'm still opening things up again, guys, sorry. That may be a really hard stand on things, but God never promised us an easy walk. He promised us a walk, right? But he never said it was going to be easy. And when things go to hell, and they go to hell a lot when you're actually working on things that matter, you have one option, and that is to either be killed off in the effort, maybe even be killed off in real life. We don't know. But we know our government is willing to kill people off. And they do it without remorse. Or you keep walking and you trust God to finish... the fight and to be able to, to put you in positions where you can finish the fight or he equips you to finish the fight as, as you walk together. And every time that you, you face something that's difficult, that, that is, uh, a difficult situation, you get better, you get stronger. You, you learn things that you could never have done another way. It's not a bad thing, but, but quitting is not an option. And when somebody quits around me, I don't like say, Oh, I'm so sorry. You have your feelings hurt. I'm like, I'm like, you just proved you're not willing to stand to the end and, and fight this thing out. no matter what happens. And that may seem a little brutal, but if you find a weakness or a weak link in the chain, you can't just say, well, I'm going to keep propping this person up. Because when you get in a real fight, like a real fight of any kind where it's life and death, that's the person that's going to melt down, that you're going to have to carry off the battlefield and As they melt down around you, we can't have that. And people are going to have to get it in their heads that you either figure out that you're going to have the motivation to be tough enough to stand to the end or you're going to be moved out of the way. Because the rest of us who are going to fight this thing with our last breath are not going to drag you out and make sure that your feelings are always there. are always coming first. Because we got to fight on our hands. We've got a goal to save this nation, our families, our America, the world for that matter, because these people are murderers. And every time we have to waste time on someone who will not step up to get out of the play, play, play mold, because a lot of people, all they want to do is play. Every time we sacrifice one minute to that kind of a mentality, People are dying. And this nation is at risk. The nation is dying. And I don't know about you, but I'm pretty damn sick of it. And I'm just sick of it. This show, I'm very, very serious with you. This show, you're going to be the first person, I believe... I mean, I haven't done a very thorough analysis, but you're going to be the first person on your show this morning to show the facts of what's been going on. It relates to everything you just said. People taking their eye off the ball, people getting lazy, people not understanding the issues. Believe me, we're going to go through several bullet points this morning. And what I'm going to ask you to do is as these bullet points start, especially by the time we get to number four, you're probably going to want to say, stop the train. We've really got to look at this. And we really can't because there's like 25 bullet points. And by the time we get to the end of this, I think your audience is going to be very shocked of what we're truly up against today. And so, you know, it's just, it just is what it is. These are facts and it relates to all Americans. It relates to everybody. Um, you know, anybody that thinks, ha ha good for one party or, you know, they're just drinking the Kool-Aid. They don't realize what they're unleashing. Right. And, um, hang on. I'm going to re re up here, a post on X, see if we can reengage people here a minute. And, uh, Cyber attack over. Please, Pat, please join. There we go. And ready, set, post. There we go. So, yeah, please help us rebuild our audience, guys, because this was absolutely an intentional cyber attack because they don't want this information from Bob getting out there And, um, what's, what's actually happening. We have to be informed. We have to stay tough and we have to stay in the fight every single time. And when they hit us, we don't, we don't walk away from this. We come back and we hit it even harder. And, uh, I'm going to edit this down a little bit too today, because I'm going to be editing the next couple of days from all the interviews I did at Turning Point. I had some great interviews there. It was really amazing. I met I met Jack Posovic, and I interviewed him. I mean, the list is just amazing. For all of my friends out there that are actually really doing something, Carly Bonet was there, which I love her to pieces. and a lot of people that are actually working. The influencers and the people in front of the cameras, they're fun, all right, they're fun. But the people that are really doing something are behind the scenes and they don't come out of the shadows very often like you, Bob, because they're sitting down and they're working. Peter Berger, Jonathan Cagle, all of these people who are heroes that work behind the scene tirelessly. Jeff Bongiorno, Jason Ikes. I mean, there's so many people that I can mention. that it would take me an entire day to mention the people that I know, that I love, that are truly good guys, the white hats. And the white hats are in control. We're just working through probably one of the biggest stings in the history of the United States of America. And I said, it was funny, I had an interview this weekend with a gal and they were trying to get everybody out to vote. And I told the truth on something and she like lost her mind on it. She said, in your opinion, Are we able to have an honest election in this next election system? And I said, no, we're not. And it was live and she wanted to cut the feed and she started to talk over me and try to clarify it. And I said, let me clarify this. As long as we have electronic machines, they're being hacked at the operating systems for Microsoft and everything else that you brought up here. We will not have an honest election as long as we have the machines in place. However, we can overwhelm them if we have tons and tons and tons of people coming out and voting. We can overwhelm them. Please invite more people, guys. We need to build back the audience and pass these links on. And so I, and I said, but what's happening is when president Trump said we have it all, we have it all. And the warning is to the bad guys who think that they're going to hack this election, we're taking names and you literally. are going to be charged with the crimes you're committing and that you have committed. It's like, it's like gathering evidence right now. And the people who do not vote, who are Americans who decide to step out because they're weak and they're lazy and they're cowards and they don't go to vote. We're also taking note on that. We, all of us need to be, because we want to know, We want to know, I want to know who's going to be strong enough to stand to the end when things get really tough. We don't need a bunch of fair weather patriots. We need people that are willing to fight this thing out with every breath that they have in them. And this is one of the greatest stings you're ever going to see in your entire life. Just wait, wait, just wait. See if I'm right on this. So anyhow, where are we going to go with this today? Well, I'd like for you to bring up the email I sent you this morning. I would like for you to bring up the zebra underscore, which is the bullet points. If you display that on the screen. So you're going to have to give me a little bit of a, when I switch screens, just ask me to bring it up and then it'll just take me a minute, but I've got them all queued up. Okay. No problems because I'm actually not going to be looking at the screen. I'm going to try to go a little slower this morning. But here's what I respectfully ask. You're going to see things that are going to alarm you. You're going to see things that people just don't know about. You're going to want to stop. I won't be able to get through all of this. I mean, you have all the information. We can have more shows on all of this, but where I'm going to start this morning is, uh, There are states that are still going to be using Windows 7 on their Dominion voting machines. There are states that have come up to Windows 10. But just for a recap, I would like to inform the audience that all of this research is based on third party facts. It was available online. on the internet, and I'm going to connect a lot of dots this morning. So if you look at bullet point number one, there's attachments A and B. Essentially, the voting machine corporations talk about how they lock down the machines. svchost.exe, which is arguably considered a workhorse inside the Windows operating system. It has the firewall api.dll interlinked, and it takes commands from whoever is instructing it, and that can't be secured. Now, that's quickly to move through A and B. Just let me know when you're ready to go to bullet point two. Yeah. Okay. Any, any, any time you just go ahead and I'll switch the screen. Okay. So the Dominion source code. Now I'm sure there's a lot of naysayers that have heard this and say, how can Bob Terry come to this conclusion that there was no malicious code? What does he think he knows? Well, to the audience, I've got more formal education than a bull moose in full gallop, but the bottom line to it is I primarily use my common sense. There were a lot of states that perform what's called source code reviews. I happened to grab California as it was posted. Now, inside of that source code review, the key pages, if you scroll down to page seven, The key pages are 7 and 10. Well, that explains the type of software that comprises the Dominion voting machines. So what was so interesting about all this is while they were using C, C++, C Sharp, they're using Visual Basic Code, which we talked about on the last show I was on about having that activated, just how... If a computer is successfully penetrated, it can take over the whole machine. But now I made the comment that the software compile was around 20 years old. People are going to say, how did he know that? Well, if you'll scroll to page 10, okay, page 10 has a series of commands, the SQL statements, you'll see string copy. memcopy, string compare. All right, so these commands, these were original C++ commands, which with the inception of the actual language And by the way, that string copy, it says STRCOPY. That's actually a typo in the state of California source code review. It should be STRCPY, but that's of no matter. But people get so angry at me about bringing all this out. I thought I'd point that out. Where am I supposed to be? I'm not finding it. Page 10, page 10. Okay, so is it attachment 10? No, just scroll to page 10. You'll see SQL statements. It's not in the bullet point? No, no, no. Open bullet point 2. Oh, like click on this? Yeah, yeah. That's just a navigation through the bullet points, but there's a corresponding document called 2 underscore bullet points. It's not coming through on this. Okay. Well, let me just talk about it then. Yeah. All right. So what's going on in this source code review for the audience to know is that Dominion, the Dominion software, Dominion Voting Machine Corporation, they're using the original commands that anybody would use since the inception of C, C++. When The Internet came on the scene in 1995, and as it picked up use, these original C, C++, they're called functions, actually. They realized that they were very vulnerable. And so around 2003, 2004, 2005, new compilers came out with new commands. And basically it was very simple, very, very simple to take an editor and go through, like, for instance, I'll mention a command called string copy. It's S-T-R-C-O-P-Y. Now, this is a little technical, but the bottom line is that string copy function is vulnerable. And so the replacement for the newer compilers is called S underscore STRCPY. So all the programmers had to do is just go back and replace the older functions with the new secure functions. Most of them started with S underscore. And it's fairly easy to do, but obviously, Dominion Voting Corporation couldn't do that because that points to using older tools, which were right around 20 years old. So I can back up my facts with my research. So there you have the older code. Now, where this is really, really going to get interesting is put yourself back into 2020. We're in 2020, we're going through that year. The United States has basically shut down businesses. The cyber industry was just being overwhelmed with new business, but here's the rub. While the cyber industry was being overwhelmed with new business, basically most of the investors throughout the United States they stopped investing in cyber corporations. And I gotta stay on point, but a whole nother subject is that I firmly believe that the business model in the cyber industry has been broken for years. So what happened was all this business was available to all these cyber companies, but they were going through layoffs. Now, how can you have all this increased business, but cyber corporations laying people off? The reason why is that all these cyber corporations following the Silicon Valley venture capital model, which is used throughout Boston and in Texas and Austin, Texas, etc., all these cyber corporations were growing their business based on venture rounds. They just didn't have fundraising for an ABC. Some of these, most of these major corporations, cyber corporations had seven, eight, nine, 10 venture rounds, and they weren't building their company based off of revenues. They were building their company based off of raising capital. Well, when COVID-19 hit the train wreck appeared, the, the people investing held back They didn't have the revenues to sustain their their level of employment. They started having layoffs and yet at the same time being completely overwhelmed with new business. So, Donna, is that messed up or what? So, yeah. So the site, you know, it's just been inflation, artificial inflation. And the only people for years have been winning, you know, in the cyber industry or the venture capital groups. They have a venture around the next morning. They go out and buy a Lamborghini or Ferrari. I don't know. But anyway, so 3A security scorecard. Now, go back to 2020. They're trying to generate as much business as they can, the entire industry. So security scorecard. Their technology scans the Internet. They scan the Internet. It was just common sense to me to go, all right, all these cyber companies are hurting. So they're going to try to generate business. So they're going to use their technology to try to separate themselves from the pack. And so Security Scorecard comes out with this incredible report. that says Security Scorecard reveals that 75% of the U.S. states, 75% of the U.S. states are running, are not prepared for the election. Donna, you're going to have to give me a second. I'm having power fluctuations again. Yeah, it happens every time you get on. I think one of these days, I think we should just do a couple of days broadcast where we're sitting there in the studio and not trying to overcome the problems that happen when you're going over an online venue. It happens all the time. And if you're over the target, They're going to try to disrupt the communications. I think Bob went through seven power supplies the one time we were on. Okay. I'm okay. I flipped the toggle switch. I'm prepared. I'm back on. So to continue on now, Donna, consider this. So security scorecard comes out, and I'm going to just scroll through this, and I want to tell you what it says in the report. Bob, could I ask you something? Would you like to try to share your screen? Well, I would like to keep it the way it is because we've got a great connection, and I don't want any more curveballs thrown in. And I can come back on at any time. Yeah. Cause I, I'm just wondering, I'm just wondering if you could share your screen, you could click on and show people what you want. You want to try it? Well, I'm afraid, you know, if you don't mind, we finally got to get, you know, and I, and I'm not trying to, you know, it's just, we're flowing now. Okay. And if it's okay with you now, I want to have the audience note, be aware, you know, I'm sure Donna's going to post this. Anybody can download it and read it. Okay. You can download it and read it. You can contact me. I'll give it to you. This is research that was available, third-party research. So what happens, the security scorecard, they scan the entire country. And what is interesting is, They were sure to scan all of the battleground states. Now, what's interesting about this is they state in their report 75% of U.S. states and territory have an overall cyber health rated C and below. 35% have a D and below. Now, we're about to go into one of the biggest elections in the history of the United States, and none of the states, none of them are passing, and the battleground states, it's just atrocious. Now, here's what happens, to let the audience know. I find this, and about two weeks later, it was removed. It was removed. There was a lot of media pressure. People were coming after security scorecard like no tomorrow. I mean, they removed it. Now, what I'm going to do is I'm going to go into another cyber corporation and let me tell you what's happened here. Now, keep in mind the security scorecard I just mentioned, that was never brought up in any courts. that never really made mainstream media per se, meaning it wasn't on the nightly news or anything else. Nobody mentioned anything about these grades. Now, let me tell the public something else that's happened. So knowing that these cyber companies, that they're going to be scanning the internet, There is a very, very reputable cyber corporation called Alien Vault. Maybe two, three, 400 employees. Very respectable what they do. But going back to the source code review of all of the modules inside of the Dominion voting software, I noted that, wow, that visual basic, if somebody got access to that. Now, let me read to everybody what was posted on the Internet that never made it to the courts, never was in the media. Alien vault. If you read their categories, they scanned the entire United States looking for 2020 U.S. election systems. They identified a Dominion voting hack. It was using the VBS scripts. They identified 10 Dominion voting machines that had been completely hacked. Now, I want to bring everybody's attention to 2021, when the lawsuits started flying. I mean, really picking up momentum. Dominion finds all this information and posts it online. in June of 2021, and they find, it's in black and white, they find the voting machines. They say it was hacked. They were hacked. They were connected to the internet. They got through through the VBS scripts. Now, not only that, but they actually, on another webpage, They say, how could have this been missed? Election and voting machines, and they have the malware families. These voting machines were eaten up with various types of malware and ransomware, completely filleted. And it never... Donna, did you ever hear about this? No. You see, it never made it into the courts, right? It never made it into the media. It's all right there. So now we've got security scorecard that's scanned the entire United States. The 75% have a C grade, 35% have a D grade. They scan the battleground states. They're not ready. And then while all of this legal action ensues, here's Alien Vault, where they have a complete forensic analysis posted on their website and nobody knows about it. And they can't get it out because fake stream media won't cover it. Well, you know, the bottom line to it is that I submit to the audience that The Republicans were hiring what they believe was the best computer scientists in the United States. None of those supposed to be certified experts in cybersecurity, they never considered. They automatically accepted that the voting machines were secure. There wasn't a problem with the operating system. I mean, Donna, with all due respect, you talking about blinders on and I'm, I think you're kind about this. I don't think it's blinders. I think it's complicity because both the parties want to stay in power. If they wanted something to be done, somebody out there would have done something and nobody has done a thing. All right. So let's continue on because not only is that out there, which still needs to be brought up. how was this overlooked how was all of that overlooked this is a major some how there there needs to be more research as to why all this unfolded the way it did but now let me show you the nuclear tidal wave I'm going to get into this and you know donna what you said earlier about you know having people in the voting precincts and I saw what miss laura trump and the republican party having hundreds of lawyers you know throughout the nation but with all due respect to everyone you're talking about initiating what's called in the intelligence world human intelligence uh there's electronic intelligence and human intelligence you're You're going to go forth and you're going to deploy humans to watch things. But what you can't see is what's happening inside of the computers. And this is why I've been so adamant that people will most likely think that Bob Terry's a rude guy because I can't get people to listen. They think they've defined the problem and they know the scope and they do not. So I'm going to go into... Can I make a comment on that? That is exactly what I've seen with the clerks that I've talked to. There's only a couple of them that get it. They're all in the state of Michigan. They're all, no, we did it right. And they go immediately into defense mode and to what the hell happened mode. And let's investigate this. And if there's questions, maybe we should look into it because they're trying to defend their little silos that they have. But the problem is, is that When you are in charge of an organization, you don't just sit there and look at what you do and even if you're doing your best, you've got to have your finger on the pulse of everything that flows up to you. And if there's a glitch in software, let's just say for accounting, let's say you run a company and you've done everything right. And you decide to file for taxes or whatever. Your accounting is all done. You're filing for taxes. And you think you've done everything right. And all of a sudden, lo and behold, there's a glitch in the software and there's a whole area missing or there's something that you didn't specifically look at because it's bigger than you. That's what's happening here. The clerks are looking at what they put their hands on, but this is so much bigger than them. And there's no way to verify it once it gets to the machines. Well, let me say this to you, what I'm about to go into. Surely, surely the deploying the people in the human intelligence will have some positive effects, but what I'm about to show to your audience is, is that approach deploying all the human intelligence is, is, it's, it's, it's for what I'm about to go into with all due respect to all the Republicans is completely and totally worthless. And why I'm saying that I'm going to back it up. I'm going to back it up because if you, um, uh, go into attachment number five now let me let me just keep going through this you see back in 2018 it's relevant to the 2020 election going forward microsoft announced their defending democracy program now now donna listen to this that program was to protect this is what they write that on the attachment okay They want to play a critical role in defending democracy. They want to protect campaigns from hacking. They want to increase political transparency. Okay. Explore technical solutions to protect the, uh, electoral process, defend against disinformation, threats to our democratic process. So this defending democracy program is a major, major effort by Microsoft. And I got to keep moving here. Then what happens? Now, listen to this. You go into six, attachment six. Microsoft And their operating system is obviously proprietary. They decide that they're going to create a new form of software called Election Guard. Now, listen to this. Election Guard is going to be open source. And they... They commissioned a PhD student at MIT to go through it. Now, listen to this. Listen to what they have on their website. Election Guard is a way of checking election results are accurate and that the votes have not been altered, suppressed or tampered in any way. OK, they're putting now, Donna, listen to this with all the problems you've had or we've had with the Dominion Democrats. voting software and what people are claiming. And if you remember my previous shows, Microsoft is deploying election software in the election systems. Now, I'm looking at my own screen. I can't see your face, but you've got to be thinking, you know, are you kidding me? Now, let me continue, because like I said, every time you're going to want to. OK, now the election guard vote number seven. Okay, they've already deployed election guard into counties in the United States. They had it in Franklin County, Wisconsin in 2022. The states have let them put their open source software in actual elections. Did you know about this, Donna? No, you've got to be kidding me. No, it's real. Now, when I get through. No, I'm just saying that rhetorically. It's like these people are just. It's already happened. I haven't even got to the worst of it. Not even close. So they grow their division. Okay. of their defending democracy. Now I believe they changed it to democracy forward. But this Jenny, B-A-D-A-N-E-S, how do you pronounce that, Donna? Badines? Badines? Is that it? I don't know. I don't know how you pronounce it. But they have a director. They have a lot of people. Now you notice November 5th, 2020, you know, at the far right, you know, under the promote the use of election guard in American voting systems. You believe this? This is all on the internet, okay? They probably have at minimum a couple of hundred people, maybe a lot more. They're working full time, full time on this. Nobody has heard of all this. Now, listen to this. talking about the pot calling the kettle black, it says right there on the page, insecure elections nationwide. Which page are you on? I'm on attachment number eight. Eight underscore attachment number eight. The front. So now listen to this. This is what I want the audience to know. Everybody hears about how the 2020 election was secure, that they've locked everything down, that they that no, it couldn't happen. Now I've shown where cyber corporations, third party have gone out and said, no, no. I've shown the audience where the forensic reports exist to where the election systems were hacked with numerous forms of malware and ransomware. You have the other side going, no, no, no, that's not a problem. Now you've got Microsoft on November 5th, 2020 saying, Talking about their insecure elections nationwide. Does anybody want to call Rod Serling from the Twilight Zone? Right. Do you believe this, Donna? Unbelievable. Now, wait a minute. I'm going to keep going here. Let me go to nine. Okay. Now, you think that's bad? Mitre comes up. They form a new national election security lab. No kidding. Now, Microsoft is introducing their open source software. Now, MITRE has designed software called the MITRE Verifier. Number nine, just go, MITRE verifier independently verifies the accuracy of election guard and election results. So, Donna, with all due respect, while this plan for human intelligence is going to go out with lawyers and people standing there watching things electronically, There is a nuclear tidal wave coming at this country. There's going to be open source from Microsoft. There's going to be open source from MITRE. You're not going to know what's going on inside these computers. Now, what do you think of this? It's unreal. Do you see the reason why... People don't know this is going on. So now, just to go to bullet point number 10, okay, this is the pilot in Wisconsin, okay? This is the pilot. They talk about it and how they deployed it. They talked about, you know, what was going to happen with their pilots. They're really doing this, okay? They're doing this, and you'll notice this article, May 13, 2020. You didn't hear about this, but that pilot was underway, what, four or five months before the November 2020 presidential election. How many people knew about this? I would say almost no one. All right. So let me just keep going. Now, here's what I found. They have a roadmap. They have a roadmap how they're going to deploy this throughout the country. They have a roadmap of their development. All of this is out there. And if you'll notice to the right-hand side, we go, there's the 2023 roadmap, the 2022 roadmap, 2021, 2020, 2019. Okay. This has been a full-time effort underway by Microsoft and Not just Dominion Voting Machines. It's Microsoft with their Election Guard that's going to be on these machines. And there's the MITRE Verifier that's going to be working in unison. These two new pieces of software electronics. And I'm going to keep going before I give you the final, the big thrust here. All right, now. Want me to go to 12? Yeah, go to 12. You're going to pick up and you're going to see where... Their voting tracking software is clear to major hurdle. It's absolutely cleared it. You know, they got a green light. They're going forward with this. And suddenly this on the third page down was yellow highlight above the red. It says on Thursday, Microsoft and Hart. InterCivic, one of the three major voting machine vendors in the U.S., jointly announced a partnership to pilot the use of Election Guard in Hart's voting systems. Okay? The idea is to meld Hart's existing voting equipment with dramatically expanded software capabilities from Election Guard. It's going to be in the voting systems. How many... How many Republicans in Congress have brought this up, Donna? None. Zero. Nada. Now, let me just keep going. Yeah, we go to 12. No, go to 13. 13. Now, you bring this up, and suddenly, you know, on June 4th, 2021, Microsoft Election Guard e-voting integrity set to go in Hart's Verity platform. It's in the election systems, Donna. It's there. Okay. And guess what? Read the yellow. Trust in e-voting systems is a significant issue for our industry. The CEO of Florida-based e-voting vendor Smartmatic, Antonio Maxia, told Reuters in December that Donald Trump's conspiracy theory about his company and rival Dominion Systems threatened the future of the e-voting industry. They're deploying Microsoft software, open source, open source, and he's complaining about Donald Trump threatened the future of electronic voting. Now, the American public, everything everyone's listening to, they don't know all this software and all this electronics is happening right under their nose. Nobody knows anything about it. Now, let me show you this. I'm on 14. Now, what's happening here? Microsoft owns GitHub, which is a source code repository, etc. Election Guard... All of the open source is on GitHub for anyone in the world to download, including China, Russia, North Korea, Iran, you pick it. The whole world can download copies of what is going to be actually on the voting machines. You couldn't even make this stuff up. Well, Donna, nobody knows about it. This is why hopefully the people that have been angry at me because I've been short with them I mean this so respectfully donna they don't know what's happening they don't nobody nobody's I hate to say this these so-called cyber security experts I mean I'm a I'm a research scientist I design intense new code that never existed you have to approach this like a research scientist, these cybersecurity certifications, I'm so sorry to say this, Donna, but they don't design technology. They're just, if they do anything, they download open source. And so they're not of the mindset to go look what's really happening. I mean, this is development. This involves programmers. Even if they are using open source, it's still development. I mean, open source is, in my humble opinion, is not really development, but still they're wielding software. And people aren't looking at all this. But let me continue on. Let me go to 15. Now, I just brought up GitHub. But now of all things, they're going to post all of the software on GitHub. But now in April 7th, 2023. The powers that be because open source has become so dramatically bad. The first articles start coming out about, gosh, maybe it wasn't a good idea to have all this source code out there. Oh, really? You think so? Go figure. I mean, and they write and they write articles saying, look, you download this source code. You know, you're pretty much getting the keys to the kingdom now. from what everyone's using. So there's the third party proof where someone momentarily came to their senses and they published this kind of article. Now, keep in mind that all of this is out there on GitHub that can be downloaded. Now, to give you an example, Twitter uses open source. They keep their source code on GitHub. All of their source code was hacked. and downloaded. You believe this? All of Twitter's, it was stolen. The hackers have pretty much everything that makes Twitter go. Now, I'm going someplace with all this. And then on 17, the article, Microsoft's GitHub account hacked, private repository stolen. Now, keep in mind something. You're talking about an enigma wrapped in a quagmire. So far, none of what happened in terms of the critical events that confirm really what happened during the November 2020 election that these third-party cybersecurity corporations published on the internet, nobody brought that to the courts. or the attention of the American public. That's just a travesty. That cannot be explained. But now you've got Microsoft with their open source software of all things, they're partnered with voting machine corporations they're putting their software on the voting machine corporations the election guard they're putting it out on github for the world to download but but github is so vulnerable it's so absolutely vulnerable that twitter's had all of its code stolen and microsoft has had all of its accounts hacked so donna using common sense Do you see what's shaping up? How could you possibly, possibly guarantee the integrity of that source code? You can't. Well, let me keep going. So now... Again, in 2020, 2022, Microsoft conserves their source code stolen. So now the big problem, and I can get you the information on it, but basically hackers contaminating source code. Now, let me just go through 19 so you see how bad it is. One of, you see that ransomware group allegedly steals Microsoft's Bing and Cortana source code. Well, Bing is their proprietary internet explorer and Cortana, that's their desktop navigation system that you would use pretty much for anything that you want to do in a Microsoft. Donna, all that's been stolen. Scott, what do you think of that? Incredible. I knew you. Okay, now, number 20. Microsoft's own subsidiary, GitHub Breach. Look at this. They sold the certificates? They stole all of them. They stole all of them. now like I said this is a case analysis of event now I want you to read 21. here's the article they're getting the information on github they're writing code to weaponize all of the open source now If you want to, like I said, this is a nuclear tidal wave. The analogy is correct. This started out in this building, in this building, in this building, in this building. And now you've got Microsoft that's going to be on the voting machines with their election guard open source. You've got MITRE. That's going to be in the election systems. You've got it published on GitHub and you've got GitHub being completely hacked. And now you see, oh, by the way, whatever's out there, we're going to modify the programs. We're going to weaponize it. Then we're going to put it back on GitHub and allow it to download. Needless to say, listen to this. It's all out there on here. I'm going to go to 2022. And here's the article, Why So Much Open Source is Vulnerable to Hackers. Now look at this. 84% of code bases contained at least one known open source vulnerability, an increase of 4% a year. Now, look at this. You know, a whopping 84% of businesses are being jeopardized by open source code they use in their system. Okay. Then it says, the report's a wake-up call for companies that rely on open source. Now, this is a tidal wave. It is a tidal wave. It's a time bomb waiting to happen. Well, now, okay. Now, Look at this. How this is pertinent to this show is I've discussed the architectural doorway. It's there. This user, this is posted on Microsoft. Microsoft keeps putting software back on his computer. See what I'm saying? Yes. I've seen that happen before, too, where all of a sudden you'll take something off and all of a sudden it's back on again. Okay. So what do you think is going to happen when Microsoft, with all this open source and MITRE and these election systems, they're connected to the Internet? What do you think is going to happen to these voting machines? It's all happening. Gee. They can do whatever they want is what's going to happen. They can come and go. They can change things. Now, I'm going to show you something here, and this is up to April 2024. Now, you've got to keep in mind what all of the craziness going on in the legalities, in the lawsuits. Coffee County, Georgia, that was one of the key critical counties that turned the election from Trump to Biden. because they were up counting past midnight into the next day, yada, yada, yada. Now, all of a sudden, when everyone's saying, well, all of a sudden, they realize that Coffey County and their election systems, they were hacked, and they had to separate Coffey County from the rest of their statewide election systems. There it is now. Donna, so this is the last attachment, but let me just go over a couple of points here. All right. And here's, you know, this needs to get to the head of the Republican Party. Everything I've just shown you. And obviously, Donna, you're in tune with everything that's going on. You don't miss a trick over what some people are saying. And I would venture to state that probably 98% of what I've explained to the American people, you didn't even know about all this. Am I correct? I heard some of it, but not to be able to follow it down this path. So probably heard maybe, you know, you hear bits and pieces of things, maybe 5%, but not like this. Well, I mean, this, well, you know, like I said, I'm a technologist, but I'm an MBA too. So this is a case analysis, you know, connecting all the dots. And the terrible part about this is, is that no one working with the Republicans, nobody has bothered to put together the picture and the scope based on facts. This is not based on, like I said, anything but hard facts. Now, for all political parties out there that hear this, if you think this is just going to affect one party, you're very, very wrong. This is the capability of wielding this country to whoever's behind this. Overthrowing the country is what it is. Well, this is the capability of whoever's behind this to have everything pretty much go their way. So, I mean, this is hurting the Democrats as much as the Republicans, as much as the Libertarians, as much as the Independent. So, as much as the Independent. So, there's a couple of questions here. A couple of questions here that You have to really look at the whole picture now. So the first question is, this is the U.S. government involved in all of this. It is. MITRE, Microsoft, getting counties, putting their software on the voting machines, okay? Where's the U.S. government with the transparency? Where is the transparency for all these parties to feel secure over what's happened? What happened to the transparency? There isn't any. All right, now listen to this. So I'm asking the audience, no matter what your political affiliation is, All that I am presenting has been a full-time effort for at least the last five years. From anywhere, I would estimate minimum, excuse me, minimum two to 400 people, maybe well over 1200, maybe 1500 people, full-time working on all this, okay? Do you really believe, do you really believe, audience, that this election coming up with this kind of manpower ongoing for five years, that they're not going to use any of this software? Interesting question, isn't it? Yeah, well, they've proven that they're willing to do anything to stay in power. Now, let me, you know, I'm no political strategist, but now let me... Listen to this scenario. So we all know, we all know, as a matter of fact, you know, that there was a political party that just talked and talked and talked and talked and talked about how the Russians helped Donald Trump win the 2016 election. We had to listen to that, you know, for two, if not three years, about how the Russians... assisted donald trump so let's let's go into let's go into some facts so now they're saying that the russians helped donald trump donald trump's going to be running for president again and let's go into fisa foreign intelligence surveillance act anything that happens in fisa that has to do with terrorism we know now that there is a defined cyber terrorism We know that anything evolving FISA is top secret courts. We know that when things happen that have to do with terrorism, that American citizens can be detained. They cannot speak about it. They cannot discuss it. If they say anything about what's happening inside the FISA system, it's a felony. You go to federal prison. So, You see all these attacks. You see all these attacks. You've just seen what happened to Coffey County in April. Now, what if the government declares that the Russians or whoever are going to be trying to manipulate this election again and it is well within the purview of the president because it's terrorism to execute FISA, to have this technology that they deem secure on all of our election systems. No one can talk about it. Just when President Obama was in office, he wanted to pass Obamacare. He classified it. Elected politicians couldn't mention it or it's a federal felony. They go to jail. So who's to say with everything that's unfolded where a certain party is convinced that the Russians, you know, thwarted the election with FISA, with this software, with this software from MITRE and Microsoft on these machines, I humbly ask you something. This is where I'm begging for your help. What does it matter if you have 100 lawyers in a voting precinct? What does it matter who's standing around? It doesn't matter. You see, the Republicans are taking a human intelligence form at this, while what's coming at us is a nuclear tidal wave of electronic intelligence, which the human intelligence is clueless about. It's clueless. And then they shut down anybody that could be a whistleblower that's in a position of power. If it's under FISA. They're totally new tapped. They can't do a thing. So is there anything I've said to you this morning? What I'd love to hear from the audience. Do I sound like a raving madman or lunatic or somebody that's, you know, dreaming up. I'm taking facts of what's happened here and what's happened in the past. These are all facts. All right. And the fact is, is that, you know, the whole country's heard about Dominion voting machines. I mean, it's been in everybody's face for so long, but nobody knows about, these other two pieces of software that are being introduced that are open source, that each state, listen to this now, the secretary elections from each state can download this, okay, ensure the integrity. The voting machine corporations are putting it on, okay, but you've got MITRE is supposedly volunteering their time with a whole new division. All right. So you've got these two new massively important pieces of software being introduced to the entire environment. And so how is any human being going to control this? You can't. All right. This is why, this is why I think, you know, I mean, there's some other people that just introduced me to, and I've been pretty short with some people. They're very nice people. Okay. But a lot of people believe that they know the problem. Donna, they're not even close. And I know you're pretty shocked right now. And so, you know, the only, I mean, I'm just one person, all of this has got to get to, you know, Mrs. Laura Trump and it needs to be gotten to her yesterday. And I'm not a lawyer now. Okay. I mean, I, I, I write my own patents. I understand. you know, I think I could be a pretty good patent examiner myself because, but, but I don't even know the term. I mean, I think that, you know, there needs to be, you know, immediate legal action. I don't know if the term injunctions and appropriate term or whatever, but there needs to be, you know, stop the train right now. Where's all this source code? What are you doing with the source code? What is going on? You know, have, have you had, I don't even know if this is even possible what I'm about to say, but, You've got to bring in technologists, experts from each political party to go through line by line. And then who's to say Well, they can't even fix it that way because they're going to get in there and they're going to hack it again. So the only remedy for this is to go back to paper ballots, hand count. You cannot use an electric or electronic method for doing this. And anybody that's involved in this at any level is harboring foreign entity information. And joining into this, this is an act of war on this country. Well, the truth of the matter is. is that you're basically, you know, and I don't know the exact analogy here. Chinese election, or it's an enemy, it's a foreign enemy election. Yeah, but what's in the mind, this is so terribly sad, is that what's in the mind of the Republican Party isn't even close to the reality of what's happening. it's sad now this is why you know we've just gotten to know each other you know all these things that I'm you know I i it's unbelievable to me how terrible these these uh so-called experts have been how They didn't bring in these reports. I don't want to bring them in, though, Bob. The point here that I'm saying is that most of these people don't want things to change. I don't care if it's the Republican Party or Democrat Party. The people that are in the leadership positions don't want them to change. Now, I have great hope for Laura Trump. And I think that there, I think there are some good people that are in place that are working really hard. I like Laura Trump and I'll see if I can get this in her hands to, to lay this out and such. But, but the, the, the average person who doesn't have the tech skills that you have, they're not going to know this. It's taken me a lifetime to gather the knowledge I have, but I hope you don't mind me saying this. Okay. Okay. We're not prepared. And I hope that you believe it is true. I mean, I'm doing the math. I'm doing the math. We're not prepared. I read what her plan is to deploy all these people. And there's going to be human issues. OK, there's no doubt about that. That'll help with the human issues. But the tidal wave coming at the entire nation is electronic. And the truth is that. The American public is nowhere near prepared for this election. It's just a fact. I mean, this is why I've been so adamant. And this is why a lot of people, you know, think that, well, you know, Bob's an asshole. You know, I mean, you know, I'm trying to get people to stop, to stop. And, you know, you meet people. Now, Donna, I mean, they're so respectful. But there is another part. That plays a major issue in how they got away with this. And I mean this. And I had to present all this to you. And you see it now. People do not want to pay attention to any details. They want everything summarized. Well, this goes back to what I said earlier and why I'm a little annoyed because people have got a play, play, play mentality. Got to play all the time. Things got to be easy all the time or we're not willing to hammer through it. The point being is that we're losing our country. We're losing our way of life. We're probably going to lose our lives over this because we've let it go so long, at least a good portion of us will. And they don't realize the gravity of the fact that there is an end game to this that leads in death and destruction. They have already proved that they're willing to kill people to stay in power and such. And it's like, At this point in time, the plane is over. We have to get in here and do the real work and get this out there. And people want to know, what can I do? Well, stop grabbing headlines and get into the actual research. And as we try to get to the bottom of this, pass this information along and help educate the whole country so that we can get some people that can attack from many different directions, be it removal, the demand of getting rid of these electronic machines. We have to demand that they be removed. Something has to happen legally, and I don't know what it is. Something has to happen legally to stop the tidal wave. Well, each and every one of us has had our rights infringed upon with their overthrowing of the election with this coup. Every single person has standing to go after the people that were involved in this. And I'm going to say we need to name them out. Heart, ES&S, Dominion, Microsoft, all of the companies and the entities, GitHub, you know, all of these companies that had a role in destroying our sovereignty as a nation and placing these puppets in place. You know, it's easy to place the puppets. Well, we got to go to the puppet masters. You know what's so terribly sad? And I don't know. I don't know what Lord Trump is going to do about this or anything of the nature. But let me tell you, you know, obviously I've been talking about a lot of extremes because you've seen fact, fact, fact, fact, fact, fact. Now, listen to this. These people have published all of this on websites and nobody's paying attention. Right. I got a question for you. If we went through each one of these, each one of these... events, bullet points. The bullet points as well as what you have in here. I really think that what we need to do and I see what you did now and give me like a short paragraph because what I'm going to do is I'm going to go back and I'm going to clip these into short, short parts. The short paragraph over this is that there has been a machine that started in 2018 building that's been building, creating open source software to be deployed on all of our election systems. This actually made it through pilot programs and being certified in this all open source that can be downloaded by anybody in the world. And it's coming from Microsoft and MITRE. and they are going to be deploying all of this, you know, in our election systems. And they, based on their software and the electronics, will say what is secure and what's not. And are the political parties, other than obviously the Democrats, you know, have, you know, been completely unaware of all this even while you know how I described the architectural doorway as being hidden in plain sight remember that remember I said it's hidden in place there all you got to do is know it's right there in the computer you can use utilities and see what's going on nobody looked this is another scenario sad for the united states it's literally on the internet how it goes it's been there and nobody has looked So let's go through these one page at a time and give me just a quick synopsis of what we're looking at. And I'm going to run through all of these attachments. I want to go through it again with just short explanations so that I can clip them into small clips. That would take some time. I can send that to you. No, no, no. Just watch what I want to do here a minute. And what I'd like to do is, is let's do this. Now give us give a short description of the bullet points and what we're seeing here. All right. Well, it just number one, A and B, that just brings up the Windows 7 operating system and the SBC house. You go down to the next page of that. It'll be highlighted in red. Yeah, there it is. Those are the SVC hosts with the firewall API to where anything coming over the Internet, whoever can take control of that Windows 7 operating system. So if the voting machine software, you know, is running inside of a Windows 7 or Windows 8 or Windows 10 or Windows 11, the same thing can happen. So go ahead. Okay, this is the... Just one example of one sentence. The critical pages are page seven. Scroll down to page seven. Yeah, it's almost there. Yeah, there we go. Right there. Back up a little bit. Where's seven? Are we on seven? We're at seven. Okay, going down a little bit then. Going down a little bit more. Yeah, where it's highlighted there. Okay, stop right there. Stop right there. Okay, these are the modules that were on the Dominion voting machine. It says what languages they're using and, you know, it says, you know, the VB code there, you know, and that was active. So if you'll go down to page 10. Okay, a little higher. Okay, stop. Bring SQL statements to the top of the screen. Okay, so stop right there. So string copy, and by the way, that is supposed to be strcpy. Stream copy, mem copy. If you'll scroll down just a little bit more to the one more command there. Okay, and string compare. All right, those are older. Stop, stop right there. Those are older C functions that when the language C was released, those were original function commands. And as the internet progressed, they were considered insecure. And now for instance, where you see mem copy or string compare, there would be an S underscore S T R C M P. That's I suppose it means secure, but you wouldn't have all these vulnerabilities. They're not able to do that. They're not able to do that in this release. So hence do the math. It's 20 year old tools. OK, that's what we're showing here now are 20 year old tools that are in the software. Yeah, pretty much. I mean, if anybody truly wanted to secure, you know, they wouldn't be using these older 20 year old commands. You know, so, you know, they're using even if they're compilers or tools to build this software. They say, no, no, no. You know, we're using such and such. And if it did have the secure commands in it, they're not using them. They're using the older, you know, 20-year-old plus commands. I mean, C, the language was invented in 1972 by Bjorn Stroustrup, a brilliant Swedish scientist. And so these are his original commands. And, you know, why would you have a state-of-the-art compiler using... original commands. So, okay. Let's go to four. And then what's the next step here? All right. Okay. Now let me just scroll down just a touch, please. All right. Stop right there. All right. Now on your screen, as you show, let me, let me on my side so I can see a little better. Just give me a second, please. So we're at four. So now if you'll just look at, this is very, very, very important. Okay. extremely important if you'll just look at um it says related tags at the bottom left hand side now notice it was posted 2020 election systems dominion voting system hack do you see that now if you'll go just up a bit where it says ip ip contacted On the screen there, they list five IP addresses. Those are voting machines. Now, on the upper right-hand side, it says file type. It says VBS-ASCII text. They were able to find these voting machines. They were hacked. They got through by this VBS script. Now, if you'll do me a favor... If you'll just please scroll down from that screen to the next screen and bring up to the top of the screen where it says Dominion Voting System, how has this been missed? If you'll bring that to the screen, you'll see malware families at the bottom. And all you got to do is go across and count the malware. That's what they found on the voting machines. Is that not incredible or what is that? All right now. So you have a third party cyber security corporation. Now keep in mind, you know, in, in, in by June, 2021, all these lawsuits are flying and to correct me if I'm wrong, but, The voting machines weren't connected to the internet. And no, they were completely secure. This is the third party proof. They were hacked. Malware and ransomware were all over these machines. How did this not end up in the courts? And why? You see what I'm saying? Absolutely. It's incredible. Where do you want me to go from here? Do you want to go to five? Five, yes, please. All right. This is where Microsoft announced their defending democracy program. Now read just below the yellow highlights there, protect campaigns from hacking, increase political advertising, transparency online, explore tech, yada, yada, yada, yada, yada, all the stuff. Democracy, democracy. Right, right. Now you want to go to six. I don't, you probably have to. Yeah, this is, this is perfect. Okay, now it's six. Okay, now that's what it is. What is election guard? It explains. Okay, what it is, it's open source. They're building it. Now, by the way, I think I said it once before, but I believe Microsoft has changed the name of their defending democracy division to, I believe they call it now, democracy forward. So I don't want people to say, oh, he's got it all wrong. I think they changed the name of it, but Minor point, but you never know what people are going to argue with me about. So that's just explaining election guard. You can go through, read it, what they're doing. Now you can go to seven. What is the election guard again? It's open source software that Microsoft has commissioned a PhD student at MIT to go through and write correctly. And that's to be also, uh, certified by MITRE Corporation that it is to be deployed on the actual voting machines. And we're going to get into the attachments just to say that. It's actually been through the pilots and it's on voting machines for this election. So we're at seven? Okay. We're at seven. Okay. So I can't, let me just pull it up on my end over here so I can. Election Guard pilot partners. Right, right. So this is their pilot. Democracy Forward, Inferno Red, MITRE. MITRE? Yeah, Enhanced Voting Systems and Center for Civic Designs. Okay, they're all working together. They're all working together. And they're all doing this. And it's been deployed in counties. And obviously, the Republican Party has been asleep at the wheel. Isn't this it? I mean, it's all right there. It's all right there. Let's go to eight. Yeah. And all right. So Microsoft has a director now in charge of their defending democracy. Like I said, I think it's democracy forward, but what's so, you know, you're talking about everyone, you know, is saying that the election wasn't secure, you know, The other party's saying, oh, it was the most secure election. And I know you remember this, that they're saying that the 2020 election is the most secure election in history. But now, on Microsoft's website, they're saying insecure elections nationwide. I mean, Donna, with all due respect, I mean, with all due respect, what are the Republicans doing? There's There's Jenny Bidanes. I guess so. Yeah. But do you see what I'm saying? Yeah. I mean, you know, what the Republicans argued, which they had, you know, the wrong computer scientists all the way. They didn't even, it was completely the wrong argument. They don't have... They admitted guilt is what they did. They admitted that the elections were not secure. Nobody's putting all this together, Donna. It's so frustrating. So we go to nine. Okay. And MITRE forms up a new division called the National Election Security Lab. And they're building their own software called the MITRE Verifier. Okay. And the MITRE verifier verifies the accuracy of the election guard. So now all this new software, everyone talking about this is, you know, I'm sorry. You know, I was at Mar-a-Lago and I don't know if any of, you know, the president's staff. I mean, Miss Susie Wiles was there and she's a nice lady. She was a nice lady. But I tried to tell them, you know, you keep worrying about what happened in the 2020 election. You keep worrying about it. You have no idea what's coming at you. And Donna, with all due respect. Okay. I read body language more than I read anything coming out of anyone's mouth. And the body language was just, you know, terrible. I mean, you know, here comes just, you know, another little geek, um, trying to tell us what's going on, and nobody's prepared for this. Well, where did the MITRE partnership, the National Elections Security Lab, where did that come from? No kidding. How about that? That's a question I'm always wondering. It's these entities pop up all over the place. And they label themselves under all sorts of things. And they claim, oh, we're Republican. We're Democrat. We're grassroots. We're this. But nobody can explain to me where they came from. But nobody's tracking these events to put it all together. And believe me, let me say this to you. Yeah. You know, I might be the last of my generation in what I do. And I like to think I'm very proficient. But. You know, I'm not the only person in the United States that, you know, is capable of putting all this together. I mean, but I don't know what's happened with our parties just lost. They're lost. OK, so let's go to the next one. OK, so stay on track here with what's going on. So, yeah, so. So we go to 10, right? Yeah. All right. So. They talk about deploying election guard in their pilot in Wisconsin and how, and it was successful. I mean, it really was. And that's just a fact. This is a fact to try to get through to someone's head with all due respect to the audience, with all these know-it-alls that are so smart. I mean, these people, you know, they have the education background. They would make you think that they can control the space-time continuum and and they don't know that all this is going on this is a put okay so what what what happened here with wisconsin they selected the county go go to 11. let's go to 11. what what happened here with so it went to a lot wisconsin so they got microsoft as a pilot program in wisconsin right right and so they chose a county they deployed it now they went to a they went to a county in wisconsin That I believe it's a farming community. You know, it's not heavily populated. That basically all the farmers are Democrats. I think it's 99% registered Democrats. And that was their pilot. And they put it out. And they said, oh, it works. It's just fine. Okay. Now go to 11. Or at 12. Or at 12. Okay, hold on, hold on. So go to 12. You go to 12. I think we're at 12. Let me run back here. Yeah, we're at 12. Okay. So now, you know, these pilots, et cetera, have been going on. Their tracking software clears another major hurdle. They're using open source and they're partnering with voting machines. Nobody's heard of any of this. It's all out in everybody's face for anyone to read. This is the trail that we need to be on to find out what's happening. And, you know, as soon as we bring this stuff forward, we've got to act on it. Well, this entire case analysis is really what's happening. It's nobody's paying attention. Well, we're just going to keep talking about it and get them to pay attention. So now let's go to 13. Yeah. So this is where... The first voting machine corporation says, boom, election guard is going to be on the machine. And they're out of Florida. You know, Jeff, I wish Jeff would have been on the show for if he's listening right now. I mean, everything Jeff's trying to do. And Jeff's a hard worker. He's very, very, very intelligent. And he really is dedicated to what he's trying to do. But Jeff, being a human being, what he's doing is human intelligence. All this electronic intelligence is happening, and Florida's just not. Let's just stay with what's happening here so I can clip this down and tell people what's happening. So we're on 13. Microsoft's eGuard voting system goes into Hart's verified platform. Right, right. They're officially putting it into, I mean, this is no. They're putting it on the machines. They're putting it on voting machines. It's a done deal. Okay, let's go to 14. Okay. 14. This is where they're posting everything on GitHub. Now, this goes into another extremely important point. This is all the open source, but for the next four or five attachments, it talks about it's posted on GitHub. Anybody in the world can download it. Anyone in the world can download it. And this is the open source code that's in the voting machines that's on our election system. For the election guard, that's right. Anyone can hack this if they've got the source code and that they can get in there. They can literally vote. It can be hacked in a million different ways and including being downloaded to China. Right. So let me save you some time. So you don't have to open this. Just let me say this. So attachments 15, 16, 17, 18, 19, 20. All of those, 15, 16, 17, 18, 19, 20, are facts. Okay, let's go through those facts. They're facts that GitHub has been hacked. That source code shouldn't be able to be downloaded because it's causing so many problems. Okay. And that the open source is all vulnerable to hackers. And that, you know, 21, 22, 21 is there. Let's stay back to 15 and go, go. So I can clip it. Okay. So I can clip it. Okay. So 15 leaks, new threat. Okay. So 15 is a very important general article that says how dangerous it is for people to have the source code. I needed a third-party independent verification that was written April 2023. People are coming to their senses and saying, having your source code known... you know, is bad. It's bad. I've got another question. If they're already publishing it out there, but then when we want to go ahead and audit the elections, they say, no, we can't show our source code, but these morons have already published it out there to the hackers in China. It's an enigma wrapped in a quagmire. Am I getting my hands around this pretty well? Yeah, you are. They're letting go out there to all the hackers, but if you want to investigate this in a serious investigation, they're going, no, you can't look at the source code, but it's already out there. And they're going to say that the Secretary of Elections, they've certified it. Now, let me say something to you. We're obviously going through all of these points very quickly, but if you were to sit down have a cup of coffee or make yourself a drink at night. And if you were to see all the details and Donna, I'm not trying to beat a dead horse in the face here. This goes back to people wanting to summarize and they're not paying attention to detail. And I want to say something right now. Okay. And I'm not kidding about this. If I was on the other side involved with this, I would be laughing my butt off. All right. Because you just have no idea what's coming at us. Well, I think, though, Bob, this is part of the process of getting it out there and teaching people. They don't know what they don't know. So it's up to us right now to summarize. Now, the person who's done some teaching and such, we're going to go through these one at a time to lead people into the understanding. If we ended up fire hosing everyone with all of this information, That's not out there. Everyone's going to tune out. So we're going to go through slide by slide so that they know. So this is 15. Now let's go to 16. Okay. Well, that's simply where the facts that Twitter keeps their source code on GitHub and all of their source code was stolen. The same, you know, GitHub's where they can manipulate the algorithms on Twitter. Absolutely. And so this is where this leads us back to manipulating all the algorithms on Twitter. On ElectionGuard. On ElectionGuard. So now you can't find the information. They're trying to scrub their trail. All right, so now if you go to 17 and 18 and 19... Let's go to 17. All right, well, that's just where Microsoft's source code was stolen in 2020. They've gotten Microsoft. Microsoft can't even protect their own source code. So how in the world are you going to protect Election Guard from being contaminated or weaponized? These are all pertinent facts that relate. Right, because they're in the machines. And they leaked, they're hacked. The code is hacked. It's already on the machines. And they're using this across the United States. Now, you can go to 18. Microsoft confirms that the cyber attacks. Our code is, in fact, stolen. That's exactly what's happened. So 18. Not only have they put it out there, they're confirming that the source code is stolen, but yet they're not allowing us to get in there and have an audit of their source code because they say it's proprietary software. But these people have already hacked it to leakers and China and everybody else. This is why it's pertinent to the election. And people don't understand the magnitude of these events. Okay, let's go to 19. All right, now 19 is just more of Microsoft being stolen. Their Explorer was stolen and Cortana, which is their big desktop user navigation tool, that was stolen. That was stolen. And they've got ransomware group that is stealing things. They've got it all over the place. So everybody has this except for the people on the ground running the elections. They don't have a clue that this is happening. And then you throw in the Board of Elections. And anybody else has the power to prosecute them for not having the elections. They will not run a full stop on it because every damn one of them is in on it. Well, now, the thing about it is you keep going. Now, Microsoft has subsidiaries they own. This is number 20 I'm talking about. Yeah, we're there. Okay. And the subsidiary they own has their source code on GitHub. And their source code stole it. everything's being stolen now here's where what this is this is where now all this is relevant because when you go to 2021 excuse me when you go to 21 we'll go to 21 now okay weaponizing open source you see donna what they do is they steal it they make changes They've got the hashes, et cetera, so they can use stolen hashes and create that where it looks certified, but they load source code inside of it to weaponize it. So what is this? You wouldn't even see it. You wouldn't even know. There's no way we can audit it. So when they say we can't look into the source code, they're hiding the fact that that they, in fact, gave the code. They threw it out there that any hacker could have it, including China. They have had people in there that there are open source, weaponizing the open source apps, and they name them right there. They named some of them in this report. So now we know who has been weaponizing the apps. Well, we don't know who. Not all of them, but, I mean, we know some of them. and how they did it through these apps, how they hacked it through these apps, but yet they won't let us audit this and see for ourselves the hacks. Well, you know, I just want you to know this, and I mean this in all sincerity to the audience. You know, there's hundreds, if not, you know, I've got hundreds and hundreds of man hours putting us all together, probably more than a thousand man hours, you know, and I've done it on my own dime. The bottom line to all this is that you have no idea what's going to go on these voting machines. You don't. You just don't. Because we have no transparency. We've got no accountability. And we can't audit it. We can't hold anybody accountable. This is why, if you don't mind me saying, so all we... All we've got to do now is go to 22. That's just, well, it's very important, but it's not just. But how open source is vulnerable to hackers. All right. Now, which is which is it's a statement of fact. You know, a lot of the stuff from from 15 to 23 is critically important. But it's third party verifying. No, it's true. No, it's true. It's not just some guy intellectually jousting, trying to prove, you know, that he's he's, you know, an expert, you know, which is what. cybersecurity people. So we've got 84% of the code bases contained at least one known open source vulnerability. So they're hacking it through the open source code that they're installing, correct? Right. So if you put, if you put election guard out there with all these hacks, et cetera, happening, you know, what is the probability very realistically that, you know, election guard is going to be weaponized. 100%. Well, you know, I'm, I'm, I'm putting the facts out there, but the bottom line to all this is 20. Okay. 23 is what we've been talking about this whole time. You know, software just arrives back on a Microsoft computer. And, you know, and that's, that's just the way it is. And that's the architectural doorway. But of all things, you know, in attachment number 24, you know, One of the critical counties, like I said, Coffey County, that was kind of like ground zero for this whole voting nightmare. And there it is. Coffey County had to be disconnected from the rest of the election systems, and the article confirms they were hacked. So... So we know that they left the vulnerabilities in there. They installed them. When I go back to 23, it's like it goes back to confirming that nothing is truly deleted from the Internet at this point in time because they control the firewalls. They left themselves open doors to come in and leave without being detected. They leaked it to open source. entities and hackers can come and go as they please because they've all got the code. It's out there. But yet we can't go in and see the code to verify and make sure that we hold people accountable and have free and fair elections. I've got my hands around this. I think I do. Okay. Well, let me just say this to you. And I mean this. You know, you have been a very kind person to me. You've let me talk freely and This is why, and I hope, and I don't mean to leave any subliminal messages or any subliminal messages to the audience, but I hope now that however I've acted, you know, I've tried to be professional and I've gotten very annoyed over some people because they think they know what's happening. But now that you actually see what has been ongoing and that nobody's paying attention, And they aren't. They're not paying attention. They are in no way, shape or form truly paying attention. If this would not annoy the hell out of anybody that's truly looking for a fair election, I don't know what would. Because what it boils down to now to wrap this up is, yes, you're right. There's no transparency. But the key point is... Unless you're a hacker. Well, but the bottom line to it is this has been going on for five years. We know they're actually deploying all this on voting machines. What do you think is really going to happen? And the last point is you cannot, you cannot, if you do what I'm saying you're about to, if you overlook... the claims made in the 2016 election, if you overlook cyber terrorism, if you overlook all this is going on, if you take FISA for granted, you're making an incredible mistake. And all of this needs to get to the leaders that are trying and they need to take a chill pill, You know, if they've got to hit themselves over the head with a 16-pound ball-peen hammer, but you need to listen to the facts. You need to listen to the details. I think what's really important here is to distill it down into the facts, a factual case on how they're rigging the elections. Donna, here's the problem. But they're on distractions rather than the core of the problem. Here's the problem. Right. Let me tell you the problem. Seriously. There are so many detailed events. OK, we've got we've got. 24, and some of them have A's and B's, and they all need to be understood. And if you say distill it down, even if you want to talk a second about each bullet point, the people in power don't have enough patience to hear that. And that is a terrible travesty. That's a travesty. One of the things that we do on BNN, though, that I think does work is we do very long interviews so that we have time to talk about them. But for people to assimilate that information You have to give it to them in bite-sized pieces. It's like looking at an over a timeline. Not to say we can't get into any and all of these issues, but you've got to give them like a timeline of history to see how it fits together. And then you dig down in the details. Well, this is the bullet points. I mean, I've given it to you about as crisp as it can be. I mean, I've really tried, you know, but here's the bottom line, Donna, and I know you care, but the fact is we're losing and we're on a road to lose. Nobody's aware of this. And human intelligence is not gonna stop this electronic intelligence. We're on a path of losing big time. And people get so angry at me about saying this. We're not prepared. That's all there is to it. And now obviously you've been introduced to the facts. This is all really happening. Lots of money put behind this. Lots of manpower. They don't want to lose their position in power. But I think what we're going to do is end it like this and say, I really do believe that there are very good people that are in charge watching this, such as yourself, getting into the bottom of what's being done. And I don't believe that this is going to go completely all to hell. This is the biggest sting in the history of the United States. Whenever we have problems, we have to be able to look at those problems. from top to bottom, taking our time almost to a nauseam, looking for all these details like you've done, which is beautiful. And then once we put them out there, especially when we know things that other people don't know, once we put them out there, we give people time to digest this a little bit and assimilate it so that they can think their way through and join us in this fight that we have to write the elections. I do think that going through this bullet point by bullet point, looking and then going down each one of these is very valuable so that we can really understand exactly what was happening. But there's a lot of information there. And the average person, it takes a long time to get through this and go through the confusion that's out there because we're in the fog of war right now. There's no two ways about it. And things are kind of like, I've heard this so many times, people say, I don't even know who to believe. And it's like, well, and I always tell them, I said, believe nothing. But and that's what I really, truly believe that is that we have to start out with looking at everything. Not that we believe everything we hear or disbelieve it, but that we look at it and take the time to actually research it and come to our own conclusions. That's very important. I have a great job of it, really. I have one last question for you. And I want you to be brutally candid with me. There's no wrong answer. And I want you to be brutally, brutally candid with me. And here's what I'd like to ask you. And no matter what your answer is, I would like for you, if you would please, whatever you answer me with, to convey this to whoever you share this with. Did you expect this morning when I came on and I told you before that we have a nuclear tidal wave coming at us, did you expect to see all this? I was hoping to. I mean, did you know these facts? I knew the names of the entities that were out there, but I never connected the dots on what was going on. Did you expect to see all these? I'm trying to say people don't know that this is happening. I mean, right. But we can't berate them, Bob, for not knowing things. We bring things out there and show them. And then people are smart. They're going to pick up on this. And I understand it's really hard when you've worked for a very, very long time. And nobody's given a chance to listen to what you've done. But that's what we're doing right now. And I think that it's really a good process to bring people along with us with the things they don't know. And you can never expect to know what you don't know until you know it. I understand that. I'm just trying to ascertain that when I started going through all these events, you were blown away. Yeah, because I never connected the dots, which is what's so important. And I think this is really important. And never to understand it, that everybody has something to contribute, no matter who they are. And the people that have been silenced, such as yourself and myself, and mainstream fake stream media and the court systems by the political party. We've all been attacked in that way to be silenced. I mean, they hacked us this morning to try to keep us off the Internet. There's going to be a lot of people that walked away from this broadcast today. And they know what they're sitting back there laughing. But you know what? We have a million ways to come back at this as long as we have the footage, which we do. and put it out there. And when I say that when people mess with me, I will come back and hit them harder than they've ever believed. And that's why I wanted to go through this one step at a time. But we've got to be very careful with berating people for what they don't know or making them feel small because we just have to we have to just put it out there and say come on we're going to do this together and they will pick up on this and run with it and I think it's I think it's real important to to realize that People want to know. And when you, when, when they have access to bringing this out there, like you did, and we take the time to put it together and let them be able to see this information, they're going to be really grateful. But do you realize, first and foremost, I think I need to clarify my frustration. My biggest frustration is talking with people. that think they know all the issues and they don't want anyone telling or even trying to tell them anything. You know what it is, though? You know what it is? Sometimes it's in the way it's said. And for people to be open to it, you can't hit people over the head with a hammer. I'm not trying to do that. What I'm saying is that sometimes it's in the way that it's said. But human beings, I can tell you this with absolute certainty, human beings do never make a decision based on the correct metrics. If you've ever been in communications or anything like that, the reason why people make decisions, it's always because of perceived risk. It's never a logical thing because their emotions are hijacked. Well, I hope that you like everything I put together today. I do. I do very much. I want to tell you my biggest fear. I want to tell you my biggest fear, if you don't mind. Yes. I don't. I have tried to wrap my head around how critical information that was published by third-party cyber corporations that confirm the real argument and that there was a problem, that somehow was left out of everything. the opposing sides succeeded. You're a good person. And your intentions are always to do the right thing and the good thing. But we're not dealing with good people here. And so the people that are trying to silence you and everybody else, it wasn't being left out. It was absolutely intentionally obfuscated. And so this is an attack. It's not good people trying to do good. do the right thing. This is an attack. So when, when there's bad people out there, it's like, it's like, if you have, if you have a dog that bites or a snake or a snake that bites, we can't expect them to do the right thing because they're not going to do the right thing. Get in and mess up their plans and do it in another way, which is kind of a fun thing to fight. Right. But where I was going with that, if you just let me finish the end of the statement. Because they were so successful over that. Because I do see what's happening. And you're the first person that's given me a platform that's truly listened. We only have four months left, Donna. They've been working on this for five years. We're in general quarters drill. This is a good start, though. At least if you have one person that listens, then it spreads to more. Because it's not just me. Because I was watching the numbers while we were on this morning, some of the numbers. So it's getting out there to people. And so the thing of it is, when we deliver the message, it's got to be to the point. Because people don't have time for it. That's why I've got the bullet points. And that works really good. And so it's like, you know, I'll continue to, we'll continue to work through this so that people know. And, you know, in a very matter of fact, to the point message, because I think that to go down each one of these things is going to be really valuable. I really do. And if I try to pull it back to something that's understandable, I'm trying to pull things into something that is, okay, we're going to learn to run a marathon here. But we're going to start by taking steps because this is really kind of a training venue in a way, too. We walk, we start with baby steps and then we go to a little bit bigger stride. Then we start to jog. And once we get more people going in that way, then we can run. But if we fire hose everybody with this information, they're never going to put it together. And that's why I listen to everyone. I want your story out there. I want your information out there. But not only do I want it out there, I want it to be in a format that people can get their arms around this, realize the problem, and jump onto this to help other people understand so that we can attack this as a unified group. to know what the true problem is and not just have one or two of us bringing this forward, but have thousands and tens of thousands and hundreds of thousands of people moving together and saying, this ain't happening this time around. And if we have four months, it doesn't matter. We can turn this thing around in a matter of as long as we can continue to build the people that are willing to work for this and they understand the problem. The problem is in every single thing I've seen since running for governor of the state of Michigan, the problem is that there's so many distractions that people never get to the core of any problem out there. They don't realize how much subversion is out there because they're throwing bits and pieces of information like this that they can't even stop for two seconds. None of us can. Well, now you've got it. Now you've got it concise. Yes. And this is what needs to be done. And I think that we're going to continue to go down this in an investigative way till we get to the bottom of every single problem out there so that we can attack it. And I know I get criticized a lot because people have this play, play, play mentality. We want to be children. We want to jump on whatever's the next fun little thing to do. and act like children instead of acting like serious adults that want to fix this problem. And then in the midst of it, it's like it's like squirrel, squirrel, squirrel, squirrel, squirrel. And they can't. And it's very difficult. This is a human failing. It's very, very, very difficult to focus on things. I'm going to stop right here because it's 12 o'clock and I need to go and I know you do, too. But we're going to continue to go down this. We'll do this again next Monday. And we're going to bite this off in small chunks. You want me to come back on Monday? Yes. Okay. And so we can continue to do this. So you don't need to be afraid. You don't need to be fearful. It's not going to get out. We're going to continue in very bite-sized manner of getting this out so that people can say it. Okay? Well, thank you. Thank you. I know there's no timeframe on this, Bob. You don't need to feel panicked. I'm not like, I'm not, I'm not panicky. I'm not panicky. I just, I just, you know, there's a difference between trying to fire hose somebody. Okay. Which is wrong. And I wouldn't do that. I would not do that. But then there's also a difference being that you're running into people And I know you've run into this, Donna. But you just got to keep, I understand what you're trying to say. Believe me. I've been doing this for a long time, too. But the thing of it is, is that we just go baby steps and invite everyone in to just invite everyone in to join us. They need to join us. And let's stand as a unified front. Because it's hard. Now, I'm looking forward to Monday, but before you go, in all my research with everything I've done, I want to introduce my critical research assistant. I've got one person in my company that's at my side that basically oversees everything I do. And I'd like to introduce you to Sissy. Oh, hey, Sissy. It's your emotional support, Sissy. Four and a half pounds. And she lays right beside me. That's awesome. 16, 18 hours a day. And she has no problem French kissing. That's awesome. This is Sissy. Now you're a national celebrity, Sissy. There you go. Well, Bob, we need to go, but I'm going to say a real quick prayer because I just got somebody that said I have to be somewhere right now. We'll do this next week. Let's just go through three or four other things to connect next week, and then maybe we can drill down on them a little bit. And so that people can get their arms around this. This was a good show. And I'm going to clip this down and it'll be great. We'll talk about the timeline. I have to go. I'm really sorry. So let's say a prayer and we'll come back. Dear Heavenly Father, thank you so very much for Bob and all the work that he's put in. Thank you for getting us up again today online so that we can get to these things and all of the wonderful information that was shared. We ask your blessings on all of us. Keep us safe. And we just want to let you know that we love you. In the name of Jesus Christ, we pray. Amen. And this is where you go to. Go to because I'm the best non-conceiver who's ever not conceded in the history of the United States. And with that said, God bless you all. God bless all those whom you love. And God bless America. Be at peace. It's going to be okay. It's going to be God that's going to win this war. It's not us. We help. But this is God's war. And we can be at peace with that. So have a great day. Bye.