DC v. Heller 2008 SCOTUS
https://www.supremecourt.gov/opinions/07pdf/07-290.pdf
You're a typical hot-headed rabble-rouser trying to stir up trouble on subject YOU clearly know absolutely nothing about.
-
You don't join the Militia. The Militia of the People preexists - it is NOT created. Nor can you "quit" the Militia. (p. 22-23)
-
Because it preexists as coming from the preexisting People, it brings to a confrontation the same exact arms as the People, weapons suitable for self-defense for the purpose of confrontation. NOT military arms or weapons of war. (p .22-32 and p.52)
-
The Revolutionary War was fought primarily by Colonial formed militias and by Congressionally raised armies. It was codified in Article I, Sec. 8, Cls 12-13 of the Constitution of the United States. (p. 22-23)
So take your bloviating hot air and stuff it please.
After the elderly gentlemen gave his testimony about the 30k+ registrations day before vote day and day of vote, covered by a supplemental registry to cover the 61 boxes of ballots arriving on the 4th and the 5 person team that interfered with his ability to write names down...
...and no reaction from the committee.
One thing is clear:
That committee already knows what happened.
The whole "ooh they have super uber elite ultra duper high tech bit-steroid alien hacker level encrypted only detectable by super-man eyes watermarks" stuff was bullshit.
Yes our ballots are watermarked - and yes it includes the source printing machine numerization and serialization.
That's it . . . nothing more . . . no Elon Musk flying to Pluto tech nonsense.
Any ballots that don't have it at all are suspect . . . any ballots that are inconsistent with what is expected STATE by STATE are suspect.
Those if challenged will get tossed quick.
The harder ones are the ones that appear to be legit . . . but the record for request, send, receipt and the owner and their status is vague, is not recorded or not traceable - chain of custody is broken.
Ballots left behind by:
- party change
- provisional voting
- online cancellation
Will normally get destroyed. But those are exactly what corrupt election officials and actors need - leftover legitimate looking ballots for ballot stuffing.
And the existence of those ballots are EXACTLY the reason why in contested locations poll challengers are being harassed or blocked. Because once poll challengers have the normal access to challenge ballots closely - these legitimate looking BUT invalid ballots will get tossed by the 10s of thousands.
...and of course if they tried to use unused bytes of the MBR or Boot Record, the forensic community would catch that in a flash as well. Even then, probably not enough spare bytes to really do much or hide anything.
This would imply that the updates that went out to the servers in the days leading up to the election were not from an OFFICIAL Dominion repository, but from Coomer's personal server - updates modified for a purpose that were not tested or certified.
Today's FTP servers are not yesterday's FTP servers. They now have much better front end management including GUI management, encryption and alternative ports including utilities to make them behave as simple everyday file servers to the average end user whether they be PC, Mac or Unix/Linux users.
You are factually wrong.
NYSRPA asked for additional locations as a "prayer for relief" or "remedy" by which to transport a firearm to. New York smartly did exactly that by allowing a second location.
That satisfied the "prayer for relief" or "remedy" thereby mooting the case.
The fault resides with NYSRPA which is the NRA arm in NY.
NRA lawsuits have a long history of being poorly written and poorly argued by NRA lawyers hence their long string of losses in court.
Here's my take on this:
-
It was actually a routine visit per contract as is the case with so many customers for shredding companies.
-
Truck shows up, and of course picks up and shreds material from designated bins.
-
Meanwhile, Supervisor at operations office is getting emails and phones from folks asking what a shredder truck doing at an election office during a contested election. Supervisor doesn't think much of it until...
-
Employee reports in having that bad feeling that something is not right. Instead of just primary plain paper based coming out the output side of the shredding operation...it is instead a lot of heavy, thick, card stock like material that is being outputted.
-
Supervisor has an "Oh shit!" moment.
and here's where #6 is that big catch....
- Supervisor decides NOT to dispose of the shredded material as they would normally do in case there is an investigation of any kind by LEO.
All it takes is for confirmation that the bulk of the shredded material is very heavy cardstock associated with ballot production and suddenly that particular election office has some serious explaining to do.
Here's what really sad about this.
When it comes time for criminal proceedings.
You know this is orchestrated by DNC party members up top. You know this is coordinated by upper level Deep State people. You know this is assisted by executive level business leaders in bed with the DNC and the Deep State. You know heads of NGOs are assisting locally and from overseas. And you know damn well some Republicans are involved as well.
But in the end, who will end up in prison?
Mostly African American, Puerto Rican American, and other "minority" Americans who actually did the lower level machine manipulations, ballot stuffing, ballot harvesting, etc.
Meanwhile, the mostly White, Jewish and Asian henchmen / henchwomen will drive home in their Mercedes, stroll into their 2 story home in a quiet and guarded gated community, sit down at their glass top dinner table with a 7 dish meal already set.
. . . and psychologically brutalize the maid for missing a single fingerprint smudge on the table during their daily cleaning.
Here's what really sad about this.
When it comes time for criminal proceedings.
You know this is orchestrated by DNC party members up top. You know this is coordinated by upper level Deep State people. You know this is assisted by executive level business leaders in bed with the DNC and the Deep State. You know heads of NGOs are assisting locally and from overseas. And you know damn well some Republicans are involved as well.
But in the end, who will end up in prison?
Mostly African American, Puerto Rican American, and other "minority" Americans who actually did the lower level machine manipulations, ballot stuffing, ballot harvesting, etc.
Meanwhile, the mostly White, Jewish and Asian henchmen / henchwomen will drive home in their Mercedes, stroll into their 2 story home in a quiet and guarded gated community, sit down at their glass top dinner table with a 7 dish meal already set.
. . . and psychologically brutalize the maid for missing a single fingerprint smudge on the table during their daily cleaning.
So basically:
The Dominion machines were networked as noted by at least one witness.
A server daemon otherwise known as a process with a network socket was running on each of these networked Dominion machines.
Someone remotely launched a script against the application listening on those sockets to register votes at a certain ratio for a period of time.
Then killed the script and re-launched the same script using the same ratio against one or more other target machines for a period of time.
And again stopped the script, rinse, repeat...
Their mistake was using the same ratios too often.
They were too lazy to modify their script each time to apply a completely new ratio each time to avoid suspicion by shrewd observers such as Mr. Solomon.
Computer Science is first and foremost a behavioral science. It is fundamentally an attempt to identify a human behavior or process, model it, then mimic it as closely as is possible in the form of machine language.
The actual technical process of engineering hardware and coding algorithms to make it happen in reality is secondary.
Xerox Corporation's Ethernet + CSMACD protocols are a beautiful example of this is action.
Carrier Sense - Multiple Access - Collision Detect is an attempt to mimic the ideal human rule of
"Listen First, Then Talk"
But realized in everyday imperfect life as
Humans talking all at once, backing off and saying, " Excuse me, you go first..."
The downside to computer science is that while you are making an honest effort to model and mimic the human behavior or process in machine language - those who do so are also incorporating unintentionally BUT sometimes intentionally behaviors that are NOT desired.
If it's unintentional . . . we call it a "bug".
It it's intentional . . we call it a what it deserves to be called:
Somene f__cking around.
It's not a backdoor if the entirety can be decrypted on the fly 100% and is publicly known.
The fact that the NSA owns all master keys for publicly used encryption is PUBLIC knowledge. The fact that they monitor ALL public and some private communications is PUBLIC knowledge.
Backdoor by definition involves an undisclosed point of entry put in place that is not visible that only certain knowledgeable parties are able to access.
It is still done with some software for control purposes...but for communications it is not necessary anymore UNLESS the communication environment is known to be 100% isolated and propriety and private.
...and that ladies and gentlemen is where the CIA comes in. There's a reason why telecommunications / software / network hardware / aerospace / astrophysics startups are always on the lookout for the interviewee that might be the CIA plant.
Because it's the CIA who plants the backdoors needed to infiltrate a tightly controlled private and proprietary environment.
You have absolutely no frickin clue what you are talking about.
There is no backdoor . . . not even needed. All telephone communications are no longer carried in analog - they are carried in packets AND / OR cells.
Those packets AND / OR cells are carried over virtual circuits AND / OR trunks.
Those virtual circuits can be MIRRORED. That means the circuit is copied in real time. That mirror circuit is piped to a monitoring center with multiple monitoring servers. Because it is MIRRORED (copied) it has NO AFFECT on the source circuit - i.e., the end users will not notice nor detect anything.
Since the NSA owns the master keys to any and all PUBLICLY shared encryption - any encrypted phone calls on those circuits are decrypted on the fly in real time. The folks using that encryption don't escape monitoring.
For computer networks by the way - it's called PORT mirroring.
And the very same encryption / decryption rules apply.
Mirroring capabilities have been around for at least 3 decades for any and all digital communications networks.
By virtue of being outside all day:
Vitamin D
By virtue of being outside all day and all night:
Fresh Air
By virtue of being maskless all day and all night:
No ear, nose or mouth infections. No ingress of exhaled viral particles through the nose thru the brain barrier. NO INFLAMMATORY BRAIN OR CENTRAL NERVOUS SYSTEM DISEASES.
By virtue of receiving free oranges from food pantries:
Latent Mycobacteria Tuberculosis is kept latent.
All he has to do is:
- Buy a 99.00 Synology Box that takes up to 4 x 4 Gig drives.
- Upgrade it for 60.00 to 6 Gigs RAM.
- Get a uVerse/Comcast Business Line at 90.00 / month for 30 Down / 6 Up.
- Register a reverse DNS with AT&T / Comcast.
- Activate the WordPress Module for the Synology.
...and just like that...he's back up and running - no shenanigins.
Too many people keep hosting with politically shady providers - and whining about it - instead of just hosting themselves.
I'll also add that a lot of ballots could also be those printed BEFORE a Democrat registered as a Republican which is something that happened a lot. That would ad to the pool of "cancelled" ballots available for a corrupt official to pull from.
You can be certain that President Trump and his staff have already held meetings with DHS, FBI and DOJ. DHS has probably already informed them of how the problem of questionable ballots was worsened by cancellations directly or via provisional ballots. And you can bet, DHS has already clarified their tracking abilities. That includes USPS outbound and inbound postal camera scanning.
If you even read my post in its entirety . . .
. . . then you get the point.
Most of the fraudulent ballots likely came from a pool of cancelled ballots - cancelled online via request for a new ballot, or in person when casting a provisional ballot.
They are legit in the MATERIAL sense - but when re-used by corrupt election officials and poll workers - become illegal ballots. This is probably where Michigan, Wisconsin, Pennsylvania, Georgia's and Virginia's questionable ballots are coming from.
BOTH parties were creating them . . . when cancellations were occurring.
That pool of cancelled AND materially authentic ballots is a hole in the DHS ballot security scheme. DHS is going to have to fix this.
As Jim Troupis specifically pointed out, election officials are supposed to be gatekeepers against illegally cast ballots and vote fraud.
To allow 100s of thousands of people to use the "indefinitely confined" clause to get their votes counted IS TO REMOVE THE GATEKEEPERS, THE SENTRIES.
One of the Justices just flat out made it clear they are okay with letting that abuse of the clause slide.
That Justice literally wants to license the "indefinitely confined" clause ex post facto as an avenue for casting and counting unverified ballots.
Should this go to SCOTUS, SCOTUS "in theory" should have an easy time knocking this one down on this point.