That's a different Aleksandar... There are plenty of people with that name, but the handle he used on LinkedIn and in a research paper is the link that ties this Aleksandar to Dominion Voting Systems.
Yeah the one on your orig video allegedly gave a speech to an online conference , using the second photo in the bio as an employee of Stanley Black and Decker.
The one from Stanley Black & Decker is the "real" one which is also tied to Dominion via the 777 handle. This one had Army High Performance Center experience as well as experience in Raytheon, who has numerous research papers on Algorithms and SMOTEBoost. He deleted his professional profile on LinkedIn, but in the video you see a screenshot of it.
You got close to that part of the heist. They used a number of ways to get it done.
But I did find this. I dont think it was used in the video you posted. https://www.iqpc.com/events-cdao-exchange/speakers/aleksandar-lazarevic
That's the guy
and interesting this is now the Linkedinpage
https://www.linkedin.com/in/aleksandar-lazarevic-9702687
https://www-users.cs.umn.edu/~lazar027/
That's a different Aleksandar... There are plenty of people with that name, but the handle he used on LinkedIn and in a research paper is the link that ties this Aleksandar to Dominion Voting Systems.
Yeah the one on your orig video allegedly gave a speech to an online conference , using the second photo in the bio as an employee of Stanley Black and Decker.
I am not sure any of them are real.
The one from Stanley Black & Decker is the "real" one which is also tied to Dominion via the 777 handle. This one had Army High Performance Center experience as well as experience in Raytheon, who has numerous research papers on Algorithms and SMOTEBoost. He deleted his professional profile on LinkedIn, but in the video you see a screenshot of it.