Anonymous ID: c5e278 Jan. 19, 2021, 10:56 a.m. No.12608609   🗄️.is đź”—kun

Treason, rendition flights and military tribunals What is the remedy for such actions of treason against the United States? Under existing U.S. law, it’s a felony crime to try to rig votes. Under military law during a time of war, it’s treason. And under the 2018 EO, each of the entities engaging in this behavior will have all their assets seized by the U.S. Treasury. Translated into plain language, this means that Twitter, Facebook, CNN, the Washington Post, Google, MSNBC, etc., are all now able to be completely seized, shut down or taken over by the Trump administration, as they all engaged in the defined behaviors outlined in the 2018 EO, which Trump just cited. Consider that as I list all the evidence that Trump’s attorneys and DoD “white hat” team members now possess, much of which will surely be presented to SCOTUS, most likely by Sidney Powell, once one of her cases reaches that level of the judicial system: CIA director Gina Haspel admitting to election interference in a full confession which has now been acquired. (This is covered in the Dec. 3rd Situation) Dominion executives confessing to engineering backdoors into the systems, which has also been acquired. Packet analysis results from “white hats” who intercepted all the real-time vote rigging traffic, which includes the specific instructions from CIA servers to add the hundreds of thousands of votes in real time to Dominion tabulation machines in swing states. This is now publicly confirmed by Col. Phil Waldron. Log files and software evidence from the seized CIA servers in Frankfurt, which provides physical and intellectual proof that the CIA inserted hundreds of thousands of votes into the Dominion tabulation machines. All this evidence exists right now. Trump has it all. His speech lays the official groundwork that can now be cited by other officials (namely, in the DoD and Treasury, which runs the US Secret Service), in order to justify their own initiation of orders for further arrests, rendition flights and wartime activities necessary to defend the United States of America against foreign enemies who are waging cyber warfare against the United States. 10 USC 394: Authorities concerning military cyber operations In case you’re wondering whether the U.S. military under Trump really has the authorization to respond to acts of cyber warfare with coordinated conventional military actions, read 10 USC, Section 394. Subtitle A, Part 1, Chapter 19, which is available via uscode.house.gov: (I’m bolding the especially important sections): §394. Authorities concerning military cyber operations (a) In General.-The Secretary of Defense shall develop, prepare, and coordinate; make ready all armed forces for purposes of; and, when appropriately authorized to do so, conduct, military cyber activities or operations in cyberspace, including clandestine military activities or operations in cyberspace, to defend the United States and its allies, including in response to malicious cyber activity carried out against the United States or a United States person by a foreign power. (b) Affirmation of Authority.- Congress affirms that the activities or operations referred to in subsection (a), when appropriately authorized, include the conduct of military activities or operations in cyberspace short of hostilities (as such term is used in the War Powers Resolution (Public Law 93–148; 50 U.S.C. 1541 et seq.)) or in areas in which hostilities are not occurring, including for the purpose of preparation of the environment, information operations, force protection, and deterrence of hostilities, or counterterrorism operations involving the Armed Forces of the United States. (c) Clandestine Activities or Operations.- A clandestine military activity or operation in cyberspace shall be considered a traditional military activity for the purposes of section 503(e)(2) of the National Security Act of 1947 (50 U.S.C. 3093(e)(2)). f) Definitions.-In this section: (1) The term “clandestine military activity or operation in cyberspace” means a military activity or military operation carried out in cyberspace, or associated preparatory actions, authorized by the President or the Secretary that- (A) is marked by, held in, or conducted with secrecy, where the intent is that the activity or operation will not be apparent or acknowledged publicly; and (B) is to be carried out- (i) as part of a military operation plan approved by the President or the Secretary in anticipation of hostilities or as directed by the President or the Secretary; (ii) to deter, safeguard, or defend against attacks or malicious cyber activities against the United States or Department of Defense information, networks, systems, installations, facilities, or other assets; or (iii) in support of information related capabilities.