I would advocate strongly AGAINST using the surveillance state for anything domestic, but how many phone calls would there be from Philly to Fulton to DC to Phoenix at 1AM? How many cellphones connected to a tower near the polling stations made or received calls or texts that would form a "ring" network between the cities in question? And if visualized with forensic software, it would probably form a node around a person controlling the network from DNC headquarter or a media desk.
Obamas head of the NSA argued with a straight face that "it's just meta data! See! No invasion of privacy!". With simple search parameters the cellphone metadata can draw a nice spider web across the voter fraud operation and point at the leader.
The metadata can easily construct insight into who coordinated and orchestrated these attacks. Unless they were smart enough to plan it all in-person in advance and acted independently and organically (ie everyone's got TDS and edit ballots on their own initiative at scheduled times.).
I would advocate strongly AGAINST using the surveillance state for anything domestic, but how many phone calls would there be from Philly to Fulton to DC to Phoenix at 1AM? How many cellphones connected to a tower near the polling stations made or received calls or texts that would form a "ring" network between the cities in question? And if visualized with forensic software, it would probably form a node around a person controlling the network from DNC headquarter or a media desk.
Obamas head of the NSA argued with a straight face that "it's just meta data! See! No invasion of privacy!". With simple search parameters the cellphone metadata can draw a nice spider web across the voter fraud operation and point at the leader.
The metadata can easily construct insight into who coordinated and orchestrated these attacks. Unless they were smart enough to plan it all in-person in advance and acted independently and organically (ie everyone's got TDS and edit ballots on their own initiative).
I would advocate strongly AGAINST using the surveillance state for anything domestic, but how many phone calls would there be from Philly to Fulton to DC to Phoenix at 1AM? How many cellphones connected to a tower near the polling stations made received calls that would form a "ring" network between the cities in question? And if visualized with forensic software, it would probably form a node around a person controlling the network from DNC headquarter or a media desk.
Obamas head of the NSA argued with a straight face that "it's just meta data! See! No invasion of privacy!". With simple search parameters the cellphone metadata can draw a nice spider web across the voter fraud operation and point at the leader.
The metadata can easily construct insight into who coordinated and orchestrated these attacks. Unless they were smart enough to plan it all in-person in advance and acted independently and organically (ie everyone's got TDS and edit ballots on their own initiative).
I would advocate strongly AGAINST using the surveillance state for anything domestic, but how many phone calls would there be from Philly to Fulton to DC to Phoenix at 1AM? How many cellphones connected to a tower near the polling stations made received calls that would form a "ring" network between the cities in question? And if visualized with forensic software, it would probably form a node around a person controlling the network from DNC headquarter or a media desk.